diff options
author | Jason Zaman <perfinion@gentoo.org> | 2020-02-15 21:05:46 +0800 |
---|---|---|
committer | Jason Zaman <perfinion@gentoo.org> | 2020-02-15 21:05:46 +0800 |
commit | 8864fd39c06d9e1583051604895982fa46336c39 (patch) | |
tree | e979678ad9ecbd4815a2584844ed43b466ea86a9 /doc | |
parent | access_vectors: Remove gentoo-specific unused permissions (diff) | |
download | hardened-refpolicy-8864fd39c06d9e1583051604895982fa46336c39.tar.gz hardened-refpolicy-8864fd39c06d9e1583051604895982fa46336c39.tar.bz2 hardened-refpolicy-8864fd39c06d9e1583051604895982fa46336c39.zip |
Update generated files
Signed-off-by: Jason Zaman <perfinion@gentoo.org>
Diffstat (limited to 'doc')
-rw-r--r-- | doc/policy.xml | 15944 |
1 files changed, 8391 insertions, 7553 deletions
diff --git a/doc/policy.xml b/doc/policy.xml index ad2a05a02..cfdf32537 100644 --- a/doc/policy.xml +++ b/doc/policy.xml @@ -953,7 +953,7 @@ Domain prefix to be used. </summary> </param> </template> -<interface name="cfengine_read_lib_files" lineno="46"> +<interface name="cfengine_read_lib_files" lineno="45"> <summary> Read cfengine lib files. </summary> @@ -963,7 +963,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cfengine_dontaudit_write_log_files" lineno="66"> +<interface name="cfengine_dontaudit_write_log_files" lineno="65"> <summary> Do not audit attempts to write cfengine log files. @@ -974,7 +974,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="cfengine_admin" lineno="91"> +<interface name="cfengine_admin" lineno="90"> <summary> All of the rules required to administrate an cfengine environment. @@ -2406,7 +2406,7 @@ Domain Allowed Access </summary> </param> </interface> -<interface name="portage_domtrans_fetch" lineno="235"> +<interface name="portage_domtrans_fetch" lineno="233"> <summary> Execute tree management functions (fetching, layman, ...) in the @@ -2418,7 +2418,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="portage_run_fetch" lineno="264"> +<interface name="portage_run_fetch" lineno="262"> <summary> Execute tree management functions (fetching, layman, ...) in the @@ -2438,7 +2438,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="portage_domtrans_gcc_config" lineno="283"> +<interface name="portage_domtrans_gcc_config" lineno="281"> <summary> Execute gcc-config in the gcc config domain. </summary> @@ -2448,7 +2448,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="portage_run_gcc_config" lineno="310"> +<interface name="portage_run_gcc_config" lineno="308"> <summary> Execute gcc-config in the gcc config domain, and allow the specified role @@ -2466,7 +2466,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="portage_dontaudit_use_fds" lineno="330"> +<interface name="portage_dontaudit_use_fds" lineno="328"> <summary> Do not audit attempts to use portage file descriptors. @@ -2477,7 +2477,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="portage_dontaudit_search_tmp" lineno="349"> +<interface name="portage_dontaudit_search_tmp" lineno="347"> <summary> Do not audit attempts to search the portage temporary directories. @@ -2488,7 +2488,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="portage_dontaudit_rw_tmp_files" lineno="368"> +<interface name="portage_dontaudit_rw_tmp_files" lineno="366"> <summary> Do not audit attempts to read and write the portage temporary files. @@ -2499,7 +2499,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="portage_eselect_module" lineno="393"> +<interface name="portage_eselect_module" lineno="391"> <summary> Allow the domain to run within an eselect module script. </summary> @@ -2509,7 +2509,7 @@ Domain to allow within an eselect module </summary> </param> </interface> -<interface name="portage_ro_role" lineno="416"> +<interface name="portage_ro_role" lineno="414"> <summary> Read all portage files </summary> @@ -2524,7 +2524,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_db" lineno="436"> +<interface name="portage_read_db" lineno="434"> <summary> Read portage db files </summary> @@ -2534,7 +2534,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_cache" lineno="456"> +<interface name="portage_read_cache" lineno="454"> <summary> Read portage cache files </summary> @@ -2544,7 +2544,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_config" lineno="477"> +<interface name="portage_read_config" lineno="475"> <summary> Read portage configuration files </summary> @@ -2554,7 +2554,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_ebuild" lineno="499"> +<interface name="portage_read_ebuild" lineno="497"> <summary> Read portage ebuild files </summary> @@ -2564,7 +2564,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_log" lineno="521"> +<interface name="portage_read_log" lineno="519"> <summary> Read portage log files </summary> @@ -2574,7 +2574,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_srcrepo" lineno="540"> +<interface name="portage_read_srcrepo" lineno="538"> <summary> Read portage src repository files </summary> @@ -2584,7 +2584,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_dontaudit_write_cache" lineno="562"> +<interface name="portage_dontaudit_write_cache" lineno="560"> <summary> Do not audit writing portage cache files </summary> @@ -3911,7 +3911,7 @@ The user domain associated with the role. </summary> </param> </template> -<interface name="sudo_sigchld" lineno="184"> +<interface name="sudo_sigchld" lineno="189"> <summary> Send a SIGCHLD signal to the sudo domain. </summary> @@ -4654,7 +4654,7 @@ User domain for the role </summary> </param> </interface> -<interface name="chromium_rw_tmp_pipes" lineno="57"> +<interface name="chromium_rw_tmp_pipes" lineno="60"> <summary> Read-write access to Chromiums' temporary fifo files </summary> @@ -4664,7 +4664,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="chromium_tmp_filetrans" lineno="86"> +<interface name="chromium_tmp_filetrans" lineno="89"> <summary> Automatically use the specified type for resources created in chromium's temporary locations @@ -4685,7 +4685,7 @@ The name of the resource being created </summary> </param> </interface> -<interface name="chromium_domtrans" lineno="105"> +<interface name="chromium_domtrans" lineno="108"> <summary> Execute a domain transition to the chromium domain (chromium_t) </summary> @@ -4695,7 +4695,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="chromium_run" lineno="130"> +<interface name="chromium_run" lineno="133"> <summary> Execute chromium in the chromium domain and allow the specified role to access the chromium domain </summary> @@ -4787,6 +4787,52 @@ Domain allowed access. </param> </interface> </module> +<module name="cryfs" filename="policy/modules/apps/cryfs.if"> +<summary>CryFS and similar other tools which mount encrypted directories using FUSE.</summary> +<interface name="cryfs_role" lineno="18"> +<summary> +Role access for CryFS. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role. +</summary> +</param> +</interface> +<tunable name="cryfs_read_generic_user_content" dftval="true"> +<desc> +<p> +Grant the cryfs domains read access to generic user content +</p> +</desc> +</tunable> +<tunable name="cryfs_read_all_user_content" dftval="false"> +<desc> +<p> +Grant the cryfs domains read access to all user content +</p> +</desc> +</tunable> +<tunable name="cryfs_manage_generic_user_content" dftval="false"> +<desc> +<p> +Grant the cryfs domains manage rights on generic user content +</p> +</desc> +</tunable> +<tunable name="cryfs_manage_all_user_content" dftval="false"> +<desc> +<p> +Grant the cryfs domains manage rights on all user content +</p> +</desc> +</tunable> +</module> <module name="evolution" filename="policy/modules/apps/evolution.if"> <summary>Evolution email client.</summary> <interface name="evolution_role" lineno="18"> @@ -7313,7 +7359,7 @@ Domain prefix to be used. </summary> </param> </template> -<template name="qemu_role" lineno="114"> +<template name="qemu_role" lineno="113"> <summary> Role access for qemu. </summary> @@ -7328,7 +7374,7 @@ User domain for the role. </summary> </param> </template> -<interface name="qemu_domtrans" lineno="135"> +<interface name="qemu_domtrans" lineno="134"> <summary> Execute a domain transition to run qemu. </summary> @@ -7338,7 +7384,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="qemu_exec" lineno="154"> +<interface name="qemu_exec" lineno="153"> <summary> Execute a qemu in the caller domain. </summary> @@ -7348,7 +7394,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_run" lineno="181"> +<interface name="qemu_run" lineno="180"> <summary> Execute qemu in the qemu domain, and allow the specified role the @@ -7366,7 +7412,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="qemu_read_state" lineno="200"> +<interface name="qemu_read_state" lineno="199"> <summary> Read qemu process state files. </summary> @@ -7376,7 +7422,7 @@ Domain to allow access. </summary> </param> </interface> -<interface name="qemu_setsched" lineno="221"> +<interface name="qemu_setsched" lineno="220"> <summary> Set qemu scheduler. </summary> @@ -7386,7 +7432,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_signal" lineno="239"> +<interface name="qemu_signal" lineno="238"> <summary> Send generic signals to qemu. </summary> @@ -7396,7 +7442,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_kill" lineno="257"> +<interface name="qemu_kill" lineno="256"> <summary> Send kill signals to qemu. </summary> @@ -7406,7 +7452,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_stream_connect" lineno="276"> +<interface name="qemu_stream_connect" lineno="275"> <summary> Connect to qemu with a unix domain stream socket. @@ -7417,7 +7463,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_delete_pid_sock_file" lineno="295"> +<interface name="qemu_delete_pid_sock_file" lineno="294"> <summary> Unlink qemu socket </summary> @@ -7427,7 +7473,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_domtrans_unconfined" lineno="314"> +<interface name="qemu_domtrans_unconfined" lineno="313"> <summary> Execute a domain transition to run qemu unconfined. @@ -7438,7 +7484,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="qemu_manage_tmp_dirs" lineno="334"> +<interface name="qemu_manage_tmp_dirs" lineno="333"> <summary> Create, read, write, and delete qemu temporary directories. @@ -7449,7 +7495,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_manage_tmp_files" lineno="354"> +<interface name="qemu_manage_tmp_files" lineno="353"> <summary> Create, read, write, and delete qemu temporary files. @@ -7460,7 +7506,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_spec_domtrans" lineno="388"> +<interface name="qemu_spec_domtrans" lineno="387"> <summary> Execute qemu in a specified domain. </summary> @@ -7485,7 +7531,7 @@ Domain to transition to. </summary> </param> </interface> -<interface name="qemu_entry_type" lineno="408"> +<interface name="qemu_entry_type" lineno="407"> <summary> Make qemu executable files an entrypoint for the specified domain. @@ -7496,7 +7542,7 @@ The domain for which qemu_exec_t is an entrypoint. </summary> </param> </interface> -<interface name="qemu_rw_pid_sock_files" lineno="428"> +<interface name="qemu_rw_pid_sock_files" lineno="427"> <summary> Read/write to qemu socket files in /var/run </summary> @@ -8679,7 +8725,7 @@ The daemon (osd, mds or mon) for which the rules are created </summary> </param> </template> -<interface name="ceph_admin" lineno="65"> +<interface name="ceph_admin" lineno="66"> <summary> Administrative access for Ceph </summary> @@ -8694,7 +8740,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="ceph_read_key" lineno="98"> +<interface name="ceph_read_key" lineno="99"> <summary> Read Ceph key files </summary> @@ -9816,7 +9862,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_read_bin_pipes" lineno="269"> +<interface name="corecmd_read_bin_pipes" lineno="265"> <summary> Read pipes in bin directories. </summary> @@ -9826,7 +9872,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_read_bin_sockets" lineno="288"> +<interface name="corecmd_read_bin_sockets" lineno="284"> <summary> Read named sockets in bin directories. </summary> @@ -9836,7 +9882,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_exec_bin" lineno="328"> +<interface name="corecmd_exec_bin" lineno="324"> <summary> Execute generic programs in bin directories, in the caller domain. @@ -9867,7 +9913,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_manage_bin_files" lineno="347"> +<interface name="corecmd_manage_bin_files" lineno="343"> <summary> Create, read, write, and delete bin files. </summary> @@ -9877,7 +9923,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_relabel_bin_files" lineno="366"> +<interface name="corecmd_relabel_bin_files" lineno="362"> <summary> Relabel to and from the bin type. </summary> @@ -9887,7 +9933,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_mmap_bin_files" lineno="385"> +<interface name="corecmd_mmap_bin_files" lineno="381"> <summary> Mmap a bin file as executable. </summary> @@ -9897,7 +9943,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_bin_spec_domtrans" lineno="430"> +<interface name="corecmd_bin_spec_domtrans" lineno="426"> <summary> Execute a file in a bin directory in the specified domain but do not @@ -9933,7 +9979,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="corecmd_bin_domtrans" lineno="473"> +<interface name="corecmd_bin_domtrans" lineno="469"> <summary> Execute a file in a bin directory in the specified domain. @@ -9967,7 +10013,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="corecmd_check_exec_shell" lineno="492"> +<interface name="corecmd_check_exec_shell" lineno="488"> <summary> Check if a shell is executable (DAC-wise). </summary> @@ -9977,7 +10023,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_exec_shell" lineno="529"> +<interface name="corecmd_exec_shell" lineno="525"> <summary> Execute shells in the caller domain. </summary> @@ -10005,7 +10051,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_shell_spec_domtrans" lineno="567"> +<interface name="corecmd_shell_spec_domtrans" lineno="563"> <summary> Execute a shell in the target domain. This is an explicit transition, requiring the @@ -10034,7 +10080,7 @@ The type of the shell process. </summary> </param> </interface> -<interface name="corecmd_shell_domtrans" lineno="601"> +<interface name="corecmd_shell_domtrans" lineno="597"> <summary> Execute a shell in the specified domain. </summary> @@ -10059,7 +10105,7 @@ The type of the shell process. </summary> </param> </interface> -<interface name="corecmd_exec_chroot" lineno="620"> +<interface name="corecmd_exec_chroot" lineno="616"> <summary> Execute chroot in the caller domain. </summary> @@ -10069,7 +10115,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_getattr_all_executables" lineno="641"> +<interface name="corecmd_getattr_all_executables" lineno="637"> <summary> Get the attributes of all executable files. </summary> @@ -10080,7 +10126,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_read_all_executables" lineno="662"> +<interface name="corecmd_read_all_executables" lineno="658"> <summary> Read all executable files. </summary> @@ -10091,7 +10137,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_exec_all_executables" lineno="682"> +<interface name="corecmd_exec_all_executables" lineno="678"> <summary> Execute all executable files. </summary> @@ -10102,7 +10148,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_dontaudit_exec_all_executables" lineno="703"> +<interface name="corecmd_dontaudit_exec_all_executables" lineno="699"> <summary> Do not audit attempts to execute all executables. </summary> @@ -10112,7 +10158,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corecmd_manage_all_executables" lineno="722"> +<interface name="corecmd_manage_all_executables" lineno="718"> <summary> Create, read, write, and all executable files. </summary> @@ -10123,7 +10169,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_relabel_all_executables" lineno="744"> +<interface name="corecmd_relabel_all_executables" lineno="740"> <summary> Relabel to and from the bin type. </summary> @@ -10134,7 +10180,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_mmap_all_executables" lineno="764"> +<interface name="corecmd_mmap_all_executables" lineno="760"> <summary> Mmap all executables as executable. </summary> @@ -10144,7 +10190,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_relabel_bin_dirs" lineno="786"> +<interface name="corecmd_relabel_bin_dirs" lineno="782"> <summary> Relabel to and from the bin type. </summary> @@ -10154,7 +10200,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_relabel_bin_lnk_files" lineno="804"> +<interface name="corecmd_relabel_bin_lnk_files" lineno="800"> <summary> Relabel to and from the bin type. </summary> @@ -11002,7 +11048,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_bind_all_nodes" lineno="1298"> +<interface name="corenet_sctp_bind_all_nodes" lineno="1294"> <summary> Bind SCTP sockets to all nodes. </summary> @@ -11012,7 +11058,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1317"> +<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1313"> <summary> Do not audit send and receive TCP network traffic on generic ports. </summary> @@ -11022,7 +11068,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_send_generic_port" lineno="1335"> +<interface name="corenet_udp_send_generic_port" lineno="1327"> <summary> Send UDP network traffic on generic ports. </summary> @@ -11032,7 +11078,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_receive_generic_port" lineno="1353"> +<interface name="corenet_udp_receive_generic_port" lineno="1341"> <summary> Receive UDP network traffic on generic ports. </summary> @@ -11042,7 +11088,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_sendrecv_generic_port" lineno="1371"> +<interface name="corenet_udp_sendrecv_generic_port" lineno="1355"> <summary> Send and receive UDP network traffic on generic ports. </summary> @@ -11052,7 +11098,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_bind_generic_port" lineno="1386"> +<interface name="corenet_tcp_bind_generic_port" lineno="1369"> <summary> Bind TCP sockets to generic ports. </summary> @@ -11062,7 +11108,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1406"> +<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1389"> <summary> Do not audit bind TCP sockets to generic ports. </summary> @@ -11072,7 +11118,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_udp_bind_generic_port" lineno="1424"> +<interface name="corenet_udp_bind_generic_port" lineno="1407"> <summary> Bind UDP sockets to generic ports. </summary> @@ -11082,7 +11128,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_connect_generic_port" lineno="1444"> +<interface name="corenet_tcp_connect_generic_port" lineno="1427"> <summary> Connect TCP sockets to generic ports. </summary> @@ -11092,7 +11138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_all_ports" lineno="1488"> +<interface name="corenet_tcp_sendrecv_all_ports" lineno="1471"> <summary> Send and receive TCP network traffic on all ports. </summary> @@ -11128,7 +11174,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_all_ports" lineno="1506"> +<interface name="corenet_udp_send_all_ports" lineno="1485"> <summary> Send UDP network traffic on all ports. </summary> @@ -11138,7 +11184,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_bind_generic_port" lineno="1524"> +<interface name="corenet_sctp_bind_generic_port" lineno="1499"> <summary> Bind SCTP sockets to generic ports. </summary> @@ -11148,7 +11194,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_receive_all_ports" lineno="1544"> +<interface name="corenet_udp_receive_all_ports" lineno="1519"> <summary> Receive UDP network traffic on all ports. </summary> @@ -11158,7 +11204,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_sendrecv_all_ports" lineno="1586"> +<interface name="corenet_udp_sendrecv_all_ports" lineno="1557"> <summary> Send and receive UDP network traffic on all ports. </summary> @@ -11192,7 +11238,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1602"> +<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1572"> <summary> Do not audit attempts to bind SCTP sockets to generic ports. @@ -11203,7 +11249,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_bind_all_ports" lineno="1620"> +<interface name="corenet_tcp_bind_all_ports" lineno="1590"> <summary> Bind TCP sockets to all ports. </summary> @@ -11213,7 +11259,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1639"> +<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1609"> <summary> Do not audit attepts to bind TCP sockets to any ports. </summary> @@ -11223,7 +11269,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_udp_bind_all_ports" lineno="1657"> +<interface name="corenet_udp_bind_all_ports" lineno="1627"> <summary> Bind UDP sockets to all ports. </summary> @@ -11233,7 +11279,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_connect_generic_port" lineno="1676"> +<interface name="corenet_sctp_connect_generic_port" lineno="1646"> <summary> Connect SCTP sockets to generic ports. </summary> @@ -11243,7 +11289,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1694"> +<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1664"> <summary> Do not audit attepts to bind UDP sockets to any ports. </summary> @@ -11253,7 +11299,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_connect_all_ports" lineno="1740"> +<interface name="corenet_tcp_connect_all_ports" lineno="1710"> <summary> Connect TCP sockets to all ports. </summary> @@ -11291,7 +11337,7 @@ Domain allowed access. </param> <infoflow type="write" weight="1"/> </interface> -<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1759"> +<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1729"> <summary> Do not audit attempts to connect TCP sockets to all ports. @@ -11302,7 +11348,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1777"> +<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1747"> <summary> Send and receive TCP network traffic on generic reserved ports. </summary> @@ -11312,7 +11358,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_send_reserved_port" lineno="1795"> +<interface name="corenet_udp_send_reserved_port" lineno="1761"> <summary> Send UDP network traffic on generic reserved ports. </summary> @@ -11322,7 +11368,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_receive_reserved_port" lineno="1813"> +<interface name="corenet_udp_receive_reserved_port" lineno="1775"> <summary> Receive UDP network traffic on generic reserved ports. </summary> @@ -11332,7 +11378,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_sendrecv_reserved_port" lineno="1831"> +<interface name="corenet_udp_sendrecv_reserved_port" lineno="1789"> <summary> Send and receive UDP network traffic on generic reserved ports. </summary> @@ -11342,7 +11388,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_bind_reserved_port" lineno="1846"> +<interface name="corenet_tcp_bind_reserved_port" lineno="1803"> <summary> Bind TCP sockets to generic reserved ports. </summary> @@ -11352,7 +11398,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_bind_all_ports" lineno="1865"> +<interface name="corenet_sctp_bind_all_ports" lineno="1822"> <summary> Bind SCTP sockets to all ports. </summary> @@ -11362,7 +11408,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_bind_reserved_port" lineno="1884"> +<interface name="corenet_udp_bind_reserved_port" lineno="1841"> <summary> Bind UDP sockets to generic reserved ports. </summary> @@ -11372,7 +11418,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_connect_reserved_port" lineno="1903"> +<interface name="corenet_tcp_connect_reserved_port" lineno="1860"> <summary> Connect TCP sockets to generic reserved ports. </summary> @@ -11382,7 +11428,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1921"> +<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1878"> <summary> Do not audit attempts to bind SCTP sockets to any ports. </summary> @@ -11392,7 +11438,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1939"> +<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1896"> <summary> Send and receive TCP network traffic on all reserved ports. </summary> @@ -11402,7 +11448,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_send_all_reserved_ports" lineno="1957"> +<interface name="corenet_udp_send_all_reserved_ports" lineno="1910"> <summary> Send UDP network traffic on all reserved ports. </summary> @@ -11412,7 +11458,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_receive_all_reserved_ports" lineno="1975"> +<interface name="corenet_udp_receive_all_reserved_ports" lineno="1924"> <summary> Receive UDP network traffic on all reserved ports. </summary> @@ -11422,7 +11468,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1993"> +<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1938"> <summary> Send and receive UDP network traffic on all reserved ports. </summary> @@ -11432,7 +11478,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_connect_all_ports" lineno="2008"> +<interface name="corenet_sctp_connect_all_ports" lineno="1952"> <summary> Connect SCTP sockets to all ports. </summary> @@ -11442,7 +11488,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_bind_all_reserved_ports" lineno="2026"> +<interface name="corenet_tcp_bind_all_reserved_ports" lineno="1970"> <summary> Bind TCP sockets to all reserved ports. </summary> @@ -11452,7 +11498,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="2045"> +<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="1989"> <summary> Do not audit attempts to bind TCP sockets to all reserved ports. </summary> @@ -11462,7 +11508,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_udp_bind_all_reserved_ports" lineno="2063"> +<interface name="corenet_udp_bind_all_reserved_ports" lineno="2007"> <summary> Bind UDP sockets to all reserved ports. </summary> @@ -11472,7 +11518,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2082"> +<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2026"> <summary> Do not audit attempts to bind UDP sockets to all reserved ports. </summary> @@ -11482,7 +11528,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2101"> +<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2045"> <summary> Do not audit attempts to connect SCTP sockets to all ports. @@ -11493,7 +11539,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2119"> +<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2063"> <summary> Bind TCP sockets to all ports > 1024. </summary> @@ -11503,7 +11549,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2137"> +<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2081"> <summary> Bind UDP sockets to all ports > 1024. </summary> @@ -11513,7 +11559,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2155"> +<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2099"> <summary> Connect TCP sockets to reserved ports. </summary> @@ -11523,7 +11569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2173"> +<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2117"> <summary> Connect SCTP sockets to all ports > 1024. </summary> @@ -11533,7 +11579,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2192"> +<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2136"> <summary> Do not audit connect attempts to TCP sockets on ports greater than 1024. @@ -11544,7 +11590,7 @@ Domain not to audit access to. </summary> </param> </interface> -<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2210"> +<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2154"> <summary> Connect TCP sockets to all ports > 1024. </summary> @@ -11554,7 +11600,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2229"> +<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2173"> <summary> Do not audit attempts to connect TCP sockets all reserved ports. @@ -11565,7 +11611,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2247"> +<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2191"> <summary> Connect TCP sockets to rpc ports. </summary> @@ -11575,7 +11621,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2266"> +<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2210"> <summary> Do not audit attempts to connect TCP sockets all rpc ports. @@ -11586,7 +11632,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_sctp_bind_reserved_port" lineno="2284"> +<interface name="corenet_sctp_bind_reserved_port" lineno="2228"> <summary> Bind SCTP sockets to generic reserved ports. </summary> @@ -11596,7 +11642,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_read_tun_tap_dev" lineno="2303"> +<interface name="corenet_read_tun_tap_dev" lineno="2247"> <summary> Read the TUN/TAP virtual network device. </summary> @@ -11606,7 +11652,7 @@ The domain read allowed access. </summary> </param> </interface> -<interface name="corenet_write_tun_tap_dev" lineno="2322"> +<interface name="corenet_write_tun_tap_dev" lineno="2266"> <summary> Write the TUN/TAP virtual network device. </summary> @@ -11616,7 +11662,7 @@ The domain allowed write access. </summary> </param> </interface> -<interface name="corenet_rw_tun_tap_dev" lineno="2341"> +<interface name="corenet_rw_tun_tap_dev" lineno="2285"> <summary> Read and write the TUN/TAP virtual network device. </summary> @@ -11626,7 +11672,7 @@ The domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_connect_reserved_port" lineno="2360"> +<interface name="corenet_sctp_connect_reserved_port" lineno="2304"> <summary> Connect SCTP sockets to generic reserved ports. </summary> @@ -11636,7 +11682,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2379"> +<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2323"> <summary> Do not audit attempts to read or write the TUN/TAP virtual network device. @@ -11647,7 +11693,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_getattr_ppp_dev" lineno="2397"> +<interface name="corenet_getattr_ppp_dev" lineno="2341"> <summary> Getattr the point-to-point device. </summary> @@ -11657,7 +11703,7 @@ The domain allowed access. </summary> </param> </interface> -<interface name="corenet_rw_ppp_dev" lineno="2415"> +<interface name="corenet_rw_ppp_dev" lineno="2359"> <summary> Read and write the point-to-point device. </summary> @@ -11667,7 +11713,7 @@ The domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2434"> +<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2378"> <summary> Bind TCP sockets to all RPC ports. </summary> @@ -11677,7 +11723,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2453"> +<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2397"> <summary> Do not audit attempts to bind TCP sockets to all RPC ports. </summary> @@ -11687,7 +11733,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_udp_bind_all_rpc_ports" lineno="2471"> +<interface name="corenet_udp_bind_all_rpc_ports" lineno="2415"> <summary> Bind UDP sockets to all RPC ports. </summary> @@ -11697,7 +11743,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2490"> +<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2434"> <summary> Do not audit attempts to bind UDP sockets to all RPC ports. </summary> @@ -11707,7 +11753,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2508"> +<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2452"> <summary> Bind SCTP sockets to all reserved ports. </summary> @@ -11717,7 +11763,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_recvfrom_netlabel" lineno="2527"> +<interface name="corenet_tcp_recvfrom_netlabel" lineno="2471"> <summary> Receive TCP packets from a NetLabel connection. </summary> @@ -11727,7 +11773,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2546"> +<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2490"> <summary> Receive TCP packets from an unlabled connection. </summary> @@ -11737,7 +11783,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2566"> +<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2510"> <summary> Do not audit attempts to bind SCTP sockets to all reserved ports. </summary> @@ -11747,7 +11793,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2585"> +<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2529"> <summary> Do not audit attempts to receive TCP packets from a NetLabel connection. @@ -11758,7 +11804,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2605"> +<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2549"> <summary> Do not audit attempts to receive TCP packets from an unlabeled connection. @@ -11769,7 +11815,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_udp_recvfrom_netlabel" lineno="2625"> +<interface name="corenet_udp_recvfrom_netlabel" lineno="2569"> <summary> Receive UDP packets from a NetLabel connection. </summary> @@ -11779,7 +11825,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_recvfrom_unlabeled" lineno="2644"> +<interface name="corenet_udp_recvfrom_unlabeled" lineno="2588"> <summary> Receive UDP packets from an unlabeled connection. </summary> @@ -11789,7 +11835,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2664"> +<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2608"> <summary> Bind SCTP sockets to all ports > 1024. </summary> @@ -11799,7 +11845,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2683"> +<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2627"> <summary> Do not audit attempts to receive UDP packets from a NetLabel connection. @@ -11810,7 +11856,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2703"> +<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2647"> <summary> Do not audit attempts to receive UDP packets from an unlabeled connection. @@ -11821,7 +11867,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_raw_recvfrom_netlabel" lineno="2723"> +<interface name="corenet_raw_recvfrom_netlabel" lineno="2667"> <summary> Receive Raw IP packets from a NetLabel connection. </summary> @@ -11831,7 +11877,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_raw_recvfrom_unlabeled" lineno="2742"> +<interface name="corenet_raw_recvfrom_unlabeled" lineno="2686"> <summary> Receive Raw IP packets from an unlabeled connection. </summary> @@ -11841,7 +11887,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2763"> +<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2707"> <summary> Do not audit attempts to receive Raw IP packets from a NetLabel connection. @@ -11852,7 +11898,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2782"> +<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2726"> <summary> Connect SCTP sockets to reserved ports. </summary> @@ -11862,7 +11908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2801"> +<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2745"> <summary> Do not audit attempts to receive Raw IP packets from an unlabeled connection. @@ -11873,7 +11919,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_all_recvfrom_unlabeled" lineno="2833"> +<interface name="corenet_all_recvfrom_unlabeled" lineno="2777"> <summary> Receive packets from an unlabeled connection. </summary> @@ -11895,7 +11941,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_all_recvfrom_netlabel" lineno="2866"> +<interface name="corenet_all_recvfrom_netlabel" lineno="2810"> <summary> Receive packets from a NetLabel connection. </summary> @@ -11916,7 +11962,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2885"> +<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2829"> <summary> Do not audit attempts to receive packets from an unlabeled connection. </summary> @@ -11926,7 +11972,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2908"> +<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2852"> <summary> Do not audit attempts to connect SCTP sockets all reserved ports. @@ -11937,7 +11983,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2927"> +<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2871"> <summary> Do not audit attempts to receive packets from a NetLabel connection. @@ -11948,7 +11994,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_recvfrom_labeled" lineno="2959"> +<interface name="corenet_tcp_recvfrom_labeled" lineno="2903"> <summary> Rules for receiving labeled TCP packets. </summary> @@ -11971,7 +12017,7 @@ Peer domain. </summary> </param> </interface> -<interface name="corenet_udp_recvfrom_labeled" lineno="2987"> +<interface name="corenet_udp_recvfrom_labeled" lineno="2931"> <summary> Rules for receiving labeled UDP packets. </summary> @@ -11986,7 +12032,7 @@ Peer domain. </summary> </param> </interface> -<interface name="corenet_raw_recvfrom_labeled" lineno="3012"> +<interface name="corenet_raw_recvfrom_labeled" lineno="2956"> <summary> Rules for receiving labeled raw IP packets. </summary> @@ -12001,7 +12047,7 @@ Peer domain. </summary> </param> </interface> -<interface name="corenet_all_recvfrom_labeled" lineno="3046"> +<interface name="corenet_all_recvfrom_labeled" lineno="2990"> <summary> Rules for receiving labeled packets via TCP, UDP and raw IP. </summary> @@ -12025,7 +12071,7 @@ Peer domain. </summary> </param> </interface> -<interface name="corenet_setcontext_all_spds" lineno="3064"> +<interface name="corenet_setcontext_all_spds" lineno="3008"> <summary> Allow specified type to set the context of a SPD entry for labeled ipsec associations. @@ -12036,7 +12082,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_generic_client_packets" lineno="3082"> +<interface name="corenet_send_generic_client_packets" lineno="3026"> <summary> Send generic client packets. </summary> @@ -12046,7 +12092,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_receive_generic_client_packets" lineno="3100"> +<interface name="corenet_receive_generic_client_packets" lineno="3044"> <summary> Receive generic client packets. </summary> @@ -12056,7 +12102,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_generic_client_packets" lineno="3118"> +<interface name="corenet_sendrecv_generic_client_packets" lineno="3062"> <summary> Send and receive generic client packets. </summary> @@ -12066,7 +12112,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_relabelto_generic_client_packets" lineno="3133"> +<interface name="corenet_relabelto_generic_client_packets" lineno="3077"> <summary> Relabel packets to the generic client packet type. </summary> @@ -12076,7 +12122,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_generic_server_packets" lineno="3151"> +<interface name="corenet_send_generic_server_packets" lineno="3095"> <summary> Send generic server packets. </summary> @@ -12086,7 +12132,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_receive_generic_server_packets" lineno="3169"> +<interface name="corenet_receive_generic_server_packets" lineno="3113"> <summary> Receive generic server packets. </summary> @@ -12096,7 +12142,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_generic_server_packets" lineno="3187"> +<interface name="corenet_sendrecv_generic_server_packets" lineno="3131"> <summary> Send and receive generic server packets. </summary> @@ -12106,7 +12152,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_relabelto_generic_server_packets" lineno="3202"> +<interface name="corenet_relabelto_generic_server_packets" lineno="3146"> <summary> Relabel packets to the generic server packet type. </summary> @@ -12116,7 +12162,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_unlabeled_packets" lineno="3227"> +<interface name="corenet_sendrecv_unlabeled_packets" lineno="3171"> <summary> Send and receive unlabeled packets. </summary> @@ -12133,7 +12179,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_all_client_packets" lineno="3241"> +<interface name="corenet_send_all_client_packets" lineno="3185"> <summary> Send all client packets. </summary> @@ -12143,7 +12189,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_receive_all_client_packets" lineno="3259"> +<interface name="corenet_receive_all_client_packets" lineno="3203"> <summary> Receive all client packets. </summary> @@ -12153,7 +12199,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_all_client_packets" lineno="3277"> +<interface name="corenet_sendrecv_all_client_packets" lineno="3221"> <summary> Send and receive all client packets. </summary> @@ -12163,7 +12209,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_relabelto_all_client_packets" lineno="3292"> +<interface name="corenet_relabelto_all_client_packets" lineno="3236"> <summary> Relabel packets to any client packet type. </summary> @@ -12173,7 +12219,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_all_server_packets" lineno="3310"> +<interface name="corenet_send_all_server_packets" lineno="3254"> <summary> Send all server packets. </summary> @@ -12183,7 +12229,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_recvfrom_netlabel" lineno="3328"> +<interface name="corenet_sctp_recvfrom_netlabel" lineno="3272"> <summary> Receive SCTP packets from a NetLabel connection. </summary> @@ -12193,7 +12239,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_receive_all_server_packets" lineno="3346"> +<interface name="corenet_receive_all_server_packets" lineno="3290"> <summary> Receive all server packets. </summary> @@ -12203,7 +12249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_all_server_packets" lineno="3364"> +<interface name="corenet_sendrecv_all_server_packets" lineno="3308"> <summary> Send and receive all server packets. </summary> @@ -12213,7 +12259,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_relabelto_all_server_packets" lineno="3379"> +<interface name="corenet_relabelto_all_server_packets" lineno="3323"> <summary> Relabel packets to any server packet type. </summary> @@ -12223,7 +12269,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3397"> +<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3341"> <summary> Receive SCTP packets from an unlabled connection. </summary> @@ -12233,7 +12279,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_all_packets" lineno="3418"> +<interface name="corenet_send_all_packets" lineno="3362"> <summary> Send all packets. </summary> @@ -12243,7 +12289,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_receive_all_packets" lineno="3436"> +<interface name="corenet_receive_all_packets" lineno="3380"> <summary> Receive all packets. </summary> @@ -12253,7 +12299,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_all_packets" lineno="3454"> +<interface name="corenet_sendrecv_all_packets" lineno="3398"> <summary> Send and receive all packets. </summary> @@ -12263,7 +12309,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_relabelto_all_packets" lineno="3469"> +<interface name="corenet_relabelto_all_packets" lineno="3413"> <summary> Relabel packets to any packet type. </summary> @@ -12273,7 +12319,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3487"> +<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3431"> <summary> Access unlabeled infiniband pkeys. </summary> @@ -12283,7 +12329,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_ib_access_all_pkeys" lineno="3501"> +<interface name="corenet_ib_access_all_pkeys" lineno="3445"> <summary> Access all labeled infiniband pkeys. </summary> @@ -12293,7 +12339,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_ib_manage_subnet_all_endports" lineno="3519"> +<interface name="corenet_ib_manage_subnet_all_endports" lineno="3463"> <summary> Manage subnets on all labeled Infiniband endports </summary> @@ -12303,7 +12349,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3537"> +<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3481"> <summary> Manage subnet on all unlabeled Infiniband endports </summary> @@ -12313,7 +12359,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_recvfrom_labeled" lineno="3556"> +<interface name="corenet_sctp_recvfrom_labeled" lineno="3500"> <summary> Rules for receiving labeled SCTP packets. </summary> @@ -12328,7 +12374,7 @@ Peer domain. </summary> </param> </interface> -<interface name="corenet_unconfined" lineno="3579"> +<interface name="corenet_unconfined" lineno="3523"> <summary> Unconfined access to network objects. </summary> @@ -12338,7 +12384,7 @@ The domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_adb_port" lineno="3599"> +<interface name="corenet_tcp_sendrecv_adb_port" lineno="3543"> <summary> Send and receive TCP traffic on the adb port. </summary> @@ -12349,7 +12395,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_adb_port" lineno="3618"> +<interface name="corenet_udp_send_adb_port" lineno="3558"> <summary> Send UDP traffic on the adb port. </summary> @@ -12360,7 +12406,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3637"> +<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3573"> <summary> Do not audit attempts to send UDP traffic on the adb port. </summary> @@ -12371,7 +12417,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_adb_port" lineno="3656"> +<interface name="corenet_udp_receive_adb_port" lineno="3588"> <summary> Receive UDP traffic on the adb port. </summary> @@ -12382,7 +12428,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3675"> +<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3603"> <summary> Do not audit attempts to receive UDP traffic on the adb port. </summary> @@ -12393,7 +12439,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_adb_port" lineno="3694"> +<interface name="corenet_udp_sendrecv_adb_port" lineno="3618"> <summary> Send and receive UDP traffic on the adb port. </summary> @@ -12404,7 +12450,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3711"> +<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3634"> <summary> Do not audit attempts to send and receive UDP traffic on the adb port. @@ -12416,7 +12462,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_adb_port" lineno="3727"> +<interface name="corenet_tcp_bind_adb_port" lineno="3649"> <summary> Bind TCP sockets to the adb port. </summary> @@ -12427,7 +12473,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_adb_port" lineno="3747"> +<interface name="corenet_udp_bind_adb_port" lineno="3669"> <summary> Bind UDP sockets to the adb port. </summary> @@ -12438,7 +12484,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_adb_port" lineno="3766"> +<interface name="corenet_tcp_connect_adb_port" lineno="3688"> <summary> Make a TCP connection to the adb port. </summary> @@ -12448,7 +12494,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_adb_client_packets" lineno="3786"> +<interface name="corenet_send_adb_client_packets" lineno="3708"> <summary> Send adb_client packets. </summary> @@ -12459,7 +12505,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3805"> +<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3727"> <summary> Do not audit attempts to send adb_client packets. </summary> @@ -12470,7 +12516,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_adb_client_packets" lineno="3824"> +<interface name="corenet_receive_adb_client_packets" lineno="3746"> <summary> Receive adb_client packets. </summary> @@ -12481,7 +12527,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3843"> +<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3765"> <summary> Do not audit attempts to receive adb_client packets. </summary> @@ -12492,7 +12538,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_adb_client_packets" lineno="3862"> +<interface name="corenet_sendrecv_adb_client_packets" lineno="3784"> <summary> Send and receive adb_client packets. </summary> @@ -12503,7 +12549,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3878"> +<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3800"> <summary> Do not audit attempts to send and receive adb_client packets. </summary> @@ -12514,7 +12560,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_adb_client_packets" lineno="3893"> +<interface name="corenet_relabelto_adb_client_packets" lineno="3815"> <summary> Relabel packets to adb_client the packet type. </summary> @@ -12524,7 +12570,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_adb_server_packets" lineno="3913"> +<interface name="corenet_send_adb_server_packets" lineno="3835"> <summary> Send adb_server packets. </summary> @@ -12535,7 +12581,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3932"> +<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3854"> <summary> Do not audit attempts to send adb_server packets. </summary> @@ -12546,7 +12592,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_adb_server_packets" lineno="3951"> +<interface name="corenet_receive_adb_server_packets" lineno="3873"> <summary> Receive adb_server packets. </summary> @@ -12557,7 +12603,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="3970"> +<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="3892"> <summary> Do not audit attempts to receive adb_server packets. </summary> @@ -12568,7 +12614,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_adb_server_packets" lineno="3989"> +<interface name="corenet_sendrecv_adb_server_packets" lineno="3911"> <summary> Send and receive adb_server packets. </summary> @@ -12579,7 +12625,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4005"> +<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="3927"> <summary> Do not audit attempts to send and receive adb_server packets. </summary> @@ -12590,7 +12636,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_adb_server_packets" lineno="4020"> +<interface name="corenet_relabelto_adb_server_packets" lineno="3942"> <summary> Relabel packets to adb_server the packet type. </summary> @@ -12600,7 +12646,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4042"> +<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="3964"> <summary> Send and receive TCP traffic on the afs_bos port. </summary> @@ -12611,7 +12657,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs_bos_port" lineno="4061"> +<interface name="corenet_udp_send_afs_bos_port" lineno="3979"> <summary> Send UDP traffic on the afs_bos port. </summary> @@ -12622,7 +12668,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4080"> +<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="3994"> <summary> Do not audit attempts to send UDP traffic on the afs_bos port. </summary> @@ -12633,7 +12679,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs_bos_port" lineno="4099"> +<interface name="corenet_udp_receive_afs_bos_port" lineno="4009"> <summary> Receive UDP traffic on the afs_bos port. </summary> @@ -12644,7 +12690,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4118"> +<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4024"> <summary> Do not audit attempts to receive UDP traffic on the afs_bos port. </summary> @@ -12655,7 +12701,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4137"> +<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4039"> <summary> Send and receive UDP traffic on the afs_bos port. </summary> @@ -12666,7 +12712,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4154"> +<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4055"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_bos port. @@ -12678,7 +12724,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs_bos_port" lineno="4170"> +<interface name="corenet_tcp_bind_afs_bos_port" lineno="4070"> <summary> Bind TCP sockets to the afs_bos port. </summary> @@ -12689,7 +12735,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_bos_port" lineno="4190"> +<interface name="corenet_udp_bind_afs_bos_port" lineno="4090"> <summary> Bind UDP sockets to the afs_bos port. </summary> @@ -12700,7 +12746,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_bos_port" lineno="4209"> +<interface name="corenet_tcp_connect_afs_bos_port" lineno="4109"> <summary> Make a TCP connection to the afs_bos port. </summary> @@ -12710,7 +12756,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_bos_client_packets" lineno="4229"> +<interface name="corenet_send_afs_bos_client_packets" lineno="4129"> <summary> Send afs_bos_client packets. </summary> @@ -12721,7 +12767,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4248"> +<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4148"> <summary> Do not audit attempts to send afs_bos_client packets. </summary> @@ -12732,7 +12778,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_bos_client_packets" lineno="4267"> +<interface name="corenet_receive_afs_bos_client_packets" lineno="4167"> <summary> Receive afs_bos_client packets. </summary> @@ -12743,7 +12789,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4286"> +<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4186"> <summary> Do not audit attempts to receive afs_bos_client packets. </summary> @@ -12754,7 +12800,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4305"> +<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4205"> <summary> Send and receive afs_bos_client packets. </summary> @@ -12765,7 +12811,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4321"> +<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4221"> <summary> Do not audit attempts to send and receive afs_bos_client packets. </summary> @@ -12776,7 +12822,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4336"> +<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4236"> <summary> Relabel packets to afs_bos_client the packet type. </summary> @@ -12786,7 +12832,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_bos_server_packets" lineno="4356"> +<interface name="corenet_send_afs_bos_server_packets" lineno="4256"> <summary> Send afs_bos_server packets. </summary> @@ -12797,7 +12843,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4375"> +<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4275"> <summary> Do not audit attempts to send afs_bos_server packets. </summary> @@ -12808,7 +12854,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_bos_server_packets" lineno="4394"> +<interface name="corenet_receive_afs_bos_server_packets" lineno="4294"> <summary> Receive afs_bos_server packets. </summary> @@ -12819,7 +12865,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4413"> +<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4313"> <summary> Do not audit attempts to receive afs_bos_server packets. </summary> @@ -12830,7 +12876,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4432"> +<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4332"> <summary> Send and receive afs_bos_server packets. </summary> @@ -12841,7 +12887,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4448"> +<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4348"> <summary> Do not audit attempts to send and receive afs_bos_server packets. </summary> @@ -12852,7 +12898,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4463"> +<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4363"> <summary> Relabel packets to afs_bos_server the packet type. </summary> @@ -12862,7 +12908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4485"> +<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4385"> <summary> Send and receive TCP traffic on the afs_fs port. </summary> @@ -12873,7 +12919,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs_fs_port" lineno="4504"> +<interface name="corenet_udp_send_afs_fs_port" lineno="4400"> <summary> Send UDP traffic on the afs_fs port. </summary> @@ -12884,7 +12930,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4523"> +<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4415"> <summary> Do not audit attempts to send UDP traffic on the afs_fs port. </summary> @@ -12895,7 +12941,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs_fs_port" lineno="4542"> +<interface name="corenet_udp_receive_afs_fs_port" lineno="4430"> <summary> Receive UDP traffic on the afs_fs port. </summary> @@ -12906,7 +12952,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4561"> +<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4445"> <summary> Do not audit attempts to receive UDP traffic on the afs_fs port. </summary> @@ -12917,7 +12963,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4580"> +<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4460"> <summary> Send and receive UDP traffic on the afs_fs port. </summary> @@ -12928,7 +12974,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4597"> +<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4476"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_fs port. @@ -12940,7 +12986,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs_fs_port" lineno="4613"> +<interface name="corenet_tcp_bind_afs_fs_port" lineno="4491"> <summary> Bind TCP sockets to the afs_fs port. </summary> @@ -12951,7 +12997,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_fs_port" lineno="4633"> +<interface name="corenet_udp_bind_afs_fs_port" lineno="4511"> <summary> Bind UDP sockets to the afs_fs port. </summary> @@ -12962,7 +13008,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_fs_port" lineno="4652"> +<interface name="corenet_tcp_connect_afs_fs_port" lineno="4530"> <summary> Make a TCP connection to the afs_fs port. </summary> @@ -12972,7 +13018,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_fs_client_packets" lineno="4672"> +<interface name="corenet_send_afs_fs_client_packets" lineno="4550"> <summary> Send afs_fs_client packets. </summary> @@ -12983,7 +13029,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4691"> +<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4569"> <summary> Do not audit attempts to send afs_fs_client packets. </summary> @@ -12994,7 +13040,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_fs_client_packets" lineno="4710"> +<interface name="corenet_receive_afs_fs_client_packets" lineno="4588"> <summary> Receive afs_fs_client packets. </summary> @@ -13005,7 +13051,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4729"> +<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4607"> <summary> Do not audit attempts to receive afs_fs_client packets. </summary> @@ -13016,7 +13062,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4748"> +<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4626"> <summary> Send and receive afs_fs_client packets. </summary> @@ -13027,7 +13073,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4764"> +<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4642"> <summary> Do not audit attempts to send and receive afs_fs_client packets. </summary> @@ -13038,7 +13084,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4779"> +<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4657"> <summary> Relabel packets to afs_fs_client the packet type. </summary> @@ -13048,7 +13094,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_fs_server_packets" lineno="4799"> +<interface name="corenet_send_afs_fs_server_packets" lineno="4677"> <summary> Send afs_fs_server packets. </summary> @@ -13059,7 +13105,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4818"> +<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4696"> <summary> Do not audit attempts to send afs_fs_server packets. </summary> @@ -13070,7 +13116,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_fs_server_packets" lineno="4837"> +<interface name="corenet_receive_afs_fs_server_packets" lineno="4715"> <summary> Receive afs_fs_server packets. </summary> @@ -13081,7 +13127,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4856"> +<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4734"> <summary> Do not audit attempts to receive afs_fs_server packets. </summary> @@ -13092,7 +13138,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4875"> +<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4753"> <summary> Send and receive afs_fs_server packets. </summary> @@ -13103,7 +13149,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4891"> +<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4769"> <summary> Do not audit attempts to send and receive afs_fs_server packets. </summary> @@ -13114,7 +13160,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4906"> +<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4784"> <summary> Relabel packets to afs_fs_server the packet type. </summary> @@ -13124,7 +13170,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4928"> +<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4806"> <summary> Send and receive TCP traffic on the afs_ka port. </summary> @@ -13135,7 +13181,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs_ka_port" lineno="4947"> +<interface name="corenet_udp_send_afs_ka_port" lineno="4821"> <summary> Send UDP traffic on the afs_ka port. </summary> @@ -13146,7 +13192,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4966"> +<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4836"> <summary> Do not audit attempts to send UDP traffic on the afs_ka port. </summary> @@ -13157,7 +13203,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs_ka_port" lineno="4985"> +<interface name="corenet_udp_receive_afs_ka_port" lineno="4851"> <summary> Receive UDP traffic on the afs_ka port. </summary> @@ -13168,7 +13214,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="5004"> +<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4866"> <summary> Do not audit attempts to receive UDP traffic on the afs_ka port. </summary> @@ -13179,7 +13225,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5023"> +<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="4881"> <summary> Send and receive UDP traffic on the afs_ka port. </summary> @@ -13190,7 +13236,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5040"> +<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="4897"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_ka port. @@ -13202,7 +13248,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs_ka_port" lineno="5056"> +<interface name="corenet_tcp_bind_afs_ka_port" lineno="4912"> <summary> Bind TCP sockets to the afs_ka port. </summary> @@ -13213,7 +13259,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_ka_port" lineno="5076"> +<interface name="corenet_udp_bind_afs_ka_port" lineno="4932"> <summary> Bind UDP sockets to the afs_ka port. </summary> @@ -13224,7 +13270,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_ka_port" lineno="5095"> +<interface name="corenet_tcp_connect_afs_ka_port" lineno="4951"> <summary> Make a TCP connection to the afs_ka port. </summary> @@ -13234,7 +13280,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_ka_client_packets" lineno="5115"> +<interface name="corenet_send_afs_ka_client_packets" lineno="4971"> <summary> Send afs_ka_client packets. </summary> @@ -13245,7 +13291,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5134"> +<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="4990"> <summary> Do not audit attempts to send afs_ka_client packets. </summary> @@ -13256,7 +13302,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_ka_client_packets" lineno="5153"> +<interface name="corenet_receive_afs_ka_client_packets" lineno="5009"> <summary> Receive afs_ka_client packets. </summary> @@ -13267,7 +13313,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5172"> +<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5028"> <summary> Do not audit attempts to receive afs_ka_client packets. </summary> @@ -13278,7 +13324,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5191"> +<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5047"> <summary> Send and receive afs_ka_client packets. </summary> @@ -13289,7 +13335,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5207"> +<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5063"> <summary> Do not audit attempts to send and receive afs_ka_client packets. </summary> @@ -13300,7 +13346,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5222"> +<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5078"> <summary> Relabel packets to afs_ka_client the packet type. </summary> @@ -13310,7 +13356,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_ka_server_packets" lineno="5242"> +<interface name="corenet_send_afs_ka_server_packets" lineno="5098"> <summary> Send afs_ka_server packets. </summary> @@ -13321,7 +13367,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5261"> +<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5117"> <summary> Do not audit attempts to send afs_ka_server packets. </summary> @@ -13332,7 +13378,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_ka_server_packets" lineno="5280"> +<interface name="corenet_receive_afs_ka_server_packets" lineno="5136"> <summary> Receive afs_ka_server packets. </summary> @@ -13343,7 +13389,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5299"> +<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5155"> <summary> Do not audit attempts to receive afs_ka_server packets. </summary> @@ -13354,7 +13400,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5318"> +<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5174"> <summary> Send and receive afs_ka_server packets. </summary> @@ -13365,7 +13411,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5334"> +<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5190"> <summary> Do not audit attempts to send and receive afs_ka_server packets. </summary> @@ -13376,7 +13422,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5349"> +<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5205"> <summary> Relabel packets to afs_ka_server the packet type. </summary> @@ -13386,7 +13432,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5371"> +<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5227"> <summary> Send and receive TCP traffic on the afs_pt port. </summary> @@ -13397,7 +13443,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs_pt_port" lineno="5390"> +<interface name="corenet_udp_send_afs_pt_port" lineno="5242"> <summary> Send UDP traffic on the afs_pt port. </summary> @@ -13408,7 +13454,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5409"> +<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5257"> <summary> Do not audit attempts to send UDP traffic on the afs_pt port. </summary> @@ -13419,7 +13465,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs_pt_port" lineno="5428"> +<interface name="corenet_udp_receive_afs_pt_port" lineno="5272"> <summary> Receive UDP traffic on the afs_pt port. </summary> @@ -13430,7 +13476,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5447"> +<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5287"> <summary> Do not audit attempts to receive UDP traffic on the afs_pt port. </summary> @@ -13441,7 +13487,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5466"> +<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5302"> <summary> Send and receive UDP traffic on the afs_pt port. </summary> @@ -13452,7 +13498,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5483"> +<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5318"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_pt port. @@ -13464,7 +13510,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs_pt_port" lineno="5499"> +<interface name="corenet_tcp_bind_afs_pt_port" lineno="5333"> <summary> Bind TCP sockets to the afs_pt port. </summary> @@ -13475,7 +13521,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_pt_port" lineno="5519"> +<interface name="corenet_udp_bind_afs_pt_port" lineno="5353"> <summary> Bind UDP sockets to the afs_pt port. </summary> @@ -13486,7 +13532,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_pt_port" lineno="5538"> +<interface name="corenet_tcp_connect_afs_pt_port" lineno="5372"> <summary> Make a TCP connection to the afs_pt port. </summary> @@ -13496,7 +13542,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_pt_client_packets" lineno="5558"> +<interface name="corenet_send_afs_pt_client_packets" lineno="5392"> <summary> Send afs_pt_client packets. </summary> @@ -13507,7 +13553,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5577"> +<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5411"> <summary> Do not audit attempts to send afs_pt_client packets. </summary> @@ -13518,7 +13564,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_pt_client_packets" lineno="5596"> +<interface name="corenet_receive_afs_pt_client_packets" lineno="5430"> <summary> Receive afs_pt_client packets. </summary> @@ -13529,7 +13575,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5615"> +<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5449"> <summary> Do not audit attempts to receive afs_pt_client packets. </summary> @@ -13540,7 +13586,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5634"> +<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5468"> <summary> Send and receive afs_pt_client packets. </summary> @@ -13551,7 +13597,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5650"> +<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5484"> <summary> Do not audit attempts to send and receive afs_pt_client packets. </summary> @@ -13562,7 +13608,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5665"> +<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5499"> <summary> Relabel packets to afs_pt_client the packet type. </summary> @@ -13572,7 +13618,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_pt_server_packets" lineno="5685"> +<interface name="corenet_send_afs_pt_server_packets" lineno="5519"> <summary> Send afs_pt_server packets. </summary> @@ -13583,7 +13629,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5704"> +<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5538"> <summary> Do not audit attempts to send afs_pt_server packets. </summary> @@ -13594,7 +13640,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_pt_server_packets" lineno="5723"> +<interface name="corenet_receive_afs_pt_server_packets" lineno="5557"> <summary> Receive afs_pt_server packets. </summary> @@ -13605,7 +13651,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5742"> +<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5576"> <summary> Do not audit attempts to receive afs_pt_server packets. </summary> @@ -13616,7 +13662,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5761"> +<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5595"> <summary> Send and receive afs_pt_server packets. </summary> @@ -13627,7 +13673,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5777"> +<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5611"> <summary> Do not audit attempts to send and receive afs_pt_server packets. </summary> @@ -13638,7 +13684,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5792"> +<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5626"> <summary> Relabel packets to afs_pt_server the packet type. </summary> @@ -13648,7 +13694,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5814"> +<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5648"> <summary> Send and receive TCP traffic on the afs_vl port. </summary> @@ -13659,7 +13705,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs_vl_port" lineno="5833"> +<interface name="corenet_udp_send_afs_vl_port" lineno="5663"> <summary> Send UDP traffic on the afs_vl port. </summary> @@ -13670,7 +13716,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5852"> +<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5678"> <summary> Do not audit attempts to send UDP traffic on the afs_vl port. </summary> @@ -13681,7 +13727,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs_vl_port" lineno="5871"> +<interface name="corenet_udp_receive_afs_vl_port" lineno="5693"> <summary> Receive UDP traffic on the afs_vl port. </summary> @@ -13692,7 +13738,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5890"> +<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5708"> <summary> Do not audit attempts to receive UDP traffic on the afs_vl port. </summary> @@ -13703,7 +13749,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5909"> +<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5723"> <summary> Send and receive UDP traffic on the afs_vl port. </summary> @@ -13714,7 +13760,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5926"> +<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5739"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_vl port. @@ -13726,7 +13772,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs_vl_port" lineno="5942"> +<interface name="corenet_tcp_bind_afs_vl_port" lineno="5754"> <summary> Bind TCP sockets to the afs_vl port. </summary> @@ -13737,7 +13783,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_vl_port" lineno="5962"> +<interface name="corenet_udp_bind_afs_vl_port" lineno="5774"> <summary> Bind UDP sockets to the afs_vl port. </summary> @@ -13748,7 +13794,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_vl_port" lineno="5981"> +<interface name="corenet_tcp_connect_afs_vl_port" lineno="5793"> <summary> Make a TCP connection to the afs_vl port. </summary> @@ -13758,7 +13804,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_vl_client_packets" lineno="6001"> +<interface name="corenet_send_afs_vl_client_packets" lineno="5813"> <summary> Send afs_vl_client packets. </summary> @@ -13769,7 +13815,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="6020"> +<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5832"> <summary> Do not audit attempts to send afs_vl_client packets. </summary> @@ -13780,7 +13826,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_vl_client_packets" lineno="6039"> +<interface name="corenet_receive_afs_vl_client_packets" lineno="5851"> <summary> Receive afs_vl_client packets. </summary> @@ -13791,7 +13837,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="6058"> +<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5870"> <summary> Do not audit attempts to receive afs_vl_client packets. </summary> @@ -13802,7 +13848,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6077"> +<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="5889"> <summary> Send and receive afs_vl_client packets. </summary> @@ -13813,7 +13859,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6093"> +<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="5905"> <summary> Do not audit attempts to send and receive afs_vl_client packets. </summary> @@ -13824,7 +13870,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6108"> +<interface name="corenet_relabelto_afs_vl_client_packets" lineno="5920"> <summary> Relabel packets to afs_vl_client the packet type. </summary> @@ -13834,7 +13880,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_vl_server_packets" lineno="6128"> +<interface name="corenet_send_afs_vl_server_packets" lineno="5940"> <summary> Send afs_vl_server packets. </summary> @@ -13845,7 +13891,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6147"> +<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="5959"> <summary> Do not audit attempts to send afs_vl_server packets. </summary> @@ -13856,7 +13902,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_vl_server_packets" lineno="6166"> +<interface name="corenet_receive_afs_vl_server_packets" lineno="5978"> <summary> Receive afs_vl_server packets. </summary> @@ -13867,7 +13913,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6185"> +<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="5997"> <summary> Do not audit attempts to receive afs_vl_server packets. </summary> @@ -13878,7 +13924,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6204"> +<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6016"> <summary> Send and receive afs_vl_server packets. </summary> @@ -13889,7 +13935,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6220"> +<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6032"> <summary> Do not audit attempts to send and receive afs_vl_server packets. </summary> @@ -13900,7 +13946,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6235"> +<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6047"> <summary> Relabel packets to afs_vl_server the packet type. </summary> @@ -13910,7 +13956,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6257"> +<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6069"> <summary> Send and receive TCP traffic on the afs3_callback port. </summary> @@ -13921,7 +13967,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs3_callback_port" lineno="6276"> +<interface name="corenet_udp_send_afs3_callback_port" lineno="6084"> <summary> Send UDP traffic on the afs3_callback port. </summary> @@ -13932,7 +13978,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6295"> +<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6099"> <summary> Do not audit attempts to send UDP traffic on the afs3_callback port. </summary> @@ -13943,7 +13989,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs3_callback_port" lineno="6314"> +<interface name="corenet_udp_receive_afs3_callback_port" lineno="6114"> <summary> Receive UDP traffic on the afs3_callback port. </summary> @@ -13954,7 +14000,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6333"> +<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6129"> <summary> Do not audit attempts to receive UDP traffic on the afs3_callback port. </summary> @@ -13965,7 +14011,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6352"> +<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6144"> <summary> Send and receive UDP traffic on the afs3_callback port. </summary> @@ -13976,7 +14022,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6369"> +<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6160"> <summary> Do not audit attempts to send and receive UDP traffic on the afs3_callback port. @@ -13988,7 +14034,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6385"> +<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6175"> <summary> Bind TCP sockets to the afs3_callback port. </summary> @@ -13999,7 +14045,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs3_callback_port" lineno="6405"> +<interface name="corenet_udp_bind_afs3_callback_port" lineno="6195"> <summary> Bind UDP sockets to the afs3_callback port. </summary> @@ -14010,7 +14056,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6424"> +<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6214"> <summary> Make a TCP connection to the afs3_callback port. </summary> @@ -14020,7 +14066,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs3_callback_client_packets" lineno="6444"> +<interface name="corenet_send_afs3_callback_client_packets" lineno="6234"> <summary> Send afs3_callback_client packets. </summary> @@ -14031,7 +14077,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6463"> +<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6253"> <summary> Do not audit attempts to send afs3_callback_client packets. </summary> @@ -14042,7 +14088,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs3_callback_client_packets" lineno="6482"> +<interface name="corenet_receive_afs3_callback_client_packets" lineno="6272"> <summary> Receive afs3_callback_client packets. </summary> @@ -14053,7 +14099,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6501"> +<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6291"> <summary> Do not audit attempts to receive afs3_callback_client packets. </summary> @@ -14064,7 +14110,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6520"> +<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6310"> <summary> Send and receive afs3_callback_client packets. </summary> @@ -14075,7 +14121,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6536"> +<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6326"> <summary> Do not audit attempts to send and receive afs3_callback_client packets. </summary> @@ -14086,7 +14132,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6551"> +<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6341"> <summary> Relabel packets to afs3_callback_client the packet type. </summary> @@ -14096,7 +14142,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs3_callback_server_packets" lineno="6571"> +<interface name="corenet_send_afs3_callback_server_packets" lineno="6361"> <summary> Send afs3_callback_server packets. </summary> @@ -14107,7 +14153,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6590"> +<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6380"> <summary> Do not audit attempts to send afs3_callback_server packets. </summary> @@ -14118,7 +14164,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs3_callback_server_packets" lineno="6609"> +<interface name="corenet_receive_afs3_callback_server_packets" lineno="6399"> <summary> Receive afs3_callback_server packets. </summary> @@ -14129,7 +14175,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6628"> +<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6418"> <summary> Do not audit attempts to receive afs3_callback_server packets. </summary> @@ -14140,7 +14186,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6647"> +<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6437"> <summary> Send and receive afs3_callback_server packets. </summary> @@ -14151,7 +14197,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6663"> +<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6453"> <summary> Do not audit attempts to send and receive afs3_callback_server packets. </summary> @@ -14162,7 +14208,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6678"> +<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6468"> <summary> Relabel packets to afs3_callback_server the packet type. </summary> @@ -14172,7 +14218,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6700"> +<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6490"> <summary> Send and receive TCP traffic on the agentx port. </summary> @@ -14183,7 +14229,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_agentx_port" lineno="6719"> +<interface name="corenet_udp_send_agentx_port" lineno="6505"> <summary> Send UDP traffic on the agentx port. </summary> @@ -14194,7 +14240,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6738"> +<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6520"> <summary> Do not audit attempts to send UDP traffic on the agentx port. </summary> @@ -14205,7 +14251,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_agentx_port" lineno="6757"> +<interface name="corenet_udp_receive_agentx_port" lineno="6535"> <summary> Receive UDP traffic on the agentx port. </summary> @@ -14216,7 +14262,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6776"> +<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6550"> <summary> Do not audit attempts to receive UDP traffic on the agentx port. </summary> @@ -14227,7 +14273,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_agentx_port" lineno="6795"> +<interface name="corenet_udp_sendrecv_agentx_port" lineno="6565"> <summary> Send and receive UDP traffic on the agentx port. </summary> @@ -14238,7 +14284,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6812"> +<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6581"> <summary> Do not audit attempts to send and receive UDP traffic on the agentx port. @@ -14250,7 +14296,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_agentx_port" lineno="6828"> +<interface name="corenet_tcp_bind_agentx_port" lineno="6596"> <summary> Bind TCP sockets to the agentx port. </summary> @@ -14261,7 +14307,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_agentx_port" lineno="6848"> +<interface name="corenet_udp_bind_agentx_port" lineno="6616"> <summary> Bind UDP sockets to the agentx port. </summary> @@ -14272,7 +14318,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_agentx_port" lineno="6867"> +<interface name="corenet_tcp_connect_agentx_port" lineno="6635"> <summary> Make a TCP connection to the agentx port. </summary> @@ -14282,7 +14328,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_agentx_client_packets" lineno="6887"> +<interface name="corenet_send_agentx_client_packets" lineno="6655"> <summary> Send agentx_client packets. </summary> @@ -14293,7 +14339,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6906"> +<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6674"> <summary> Do not audit attempts to send agentx_client packets. </summary> @@ -14304,7 +14350,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_agentx_client_packets" lineno="6925"> +<interface name="corenet_receive_agentx_client_packets" lineno="6693"> <summary> Receive agentx_client packets. </summary> @@ -14315,7 +14361,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6944"> +<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6712"> <summary> Do not audit attempts to receive agentx_client packets. </summary> @@ -14326,7 +14372,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_agentx_client_packets" lineno="6963"> +<interface name="corenet_sendrecv_agentx_client_packets" lineno="6731"> <summary> Send and receive agentx_client packets. </summary> @@ -14337,7 +14383,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6979"> +<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6747"> <summary> Do not audit attempts to send and receive agentx_client packets. </summary> @@ -14348,7 +14394,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_agentx_client_packets" lineno="6994"> +<interface name="corenet_relabelto_agentx_client_packets" lineno="6762"> <summary> Relabel packets to agentx_client the packet type. </summary> @@ -14358,7 +14404,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_agentx_server_packets" lineno="7014"> +<interface name="corenet_send_agentx_server_packets" lineno="6782"> <summary> Send agentx_server packets. </summary> @@ -14369,7 +14415,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="7033"> +<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6801"> <summary> Do not audit attempts to send agentx_server packets. </summary> @@ -14380,7 +14426,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_agentx_server_packets" lineno="7052"> +<interface name="corenet_receive_agentx_server_packets" lineno="6820"> <summary> Receive agentx_server packets. </summary> @@ -14391,7 +14437,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="7071"> +<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6839"> <summary> Do not audit attempts to receive agentx_server packets. </summary> @@ -14402,7 +14448,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_agentx_server_packets" lineno="7090"> +<interface name="corenet_sendrecv_agentx_server_packets" lineno="6858"> <summary> Send and receive agentx_server packets. </summary> @@ -14413,7 +14459,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="7106"> +<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6874"> <summary> Do not audit attempts to send and receive agentx_server packets. </summary> @@ -14424,7 +14470,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_agentx_server_packets" lineno="7121"> +<interface name="corenet_relabelto_agentx_server_packets" lineno="6889"> <summary> Relabel packets to agentx_server the packet type. </summary> @@ -14434,7 +14480,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7143"> +<interface name="corenet_tcp_sendrecv_amanda_port" lineno="6911"> <summary> Send and receive TCP traffic on the amanda port. </summary> @@ -14445,7 +14491,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_amanda_port" lineno="7162"> +<interface name="corenet_udp_send_amanda_port" lineno="6926"> <summary> Send UDP traffic on the amanda port. </summary> @@ -14456,7 +14502,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7181"> +<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="6941"> <summary> Do not audit attempts to send UDP traffic on the amanda port. </summary> @@ -14467,7 +14513,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_amanda_port" lineno="7200"> +<interface name="corenet_udp_receive_amanda_port" lineno="6956"> <summary> Receive UDP traffic on the amanda port. </summary> @@ -14478,7 +14524,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7219"> +<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="6971"> <summary> Do not audit attempts to receive UDP traffic on the amanda port. </summary> @@ -14489,7 +14535,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_amanda_port" lineno="7238"> +<interface name="corenet_udp_sendrecv_amanda_port" lineno="6986"> <summary> Send and receive UDP traffic on the amanda port. </summary> @@ -14500,7 +14546,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7255"> +<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7002"> <summary> Do not audit attempts to send and receive UDP traffic on the amanda port. @@ -14512,7 +14558,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_amanda_port" lineno="7271"> +<interface name="corenet_tcp_bind_amanda_port" lineno="7017"> <summary> Bind TCP sockets to the amanda port. </summary> @@ -14523,7 +14569,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amanda_port" lineno="7291"> +<interface name="corenet_udp_bind_amanda_port" lineno="7037"> <summary> Bind UDP sockets to the amanda port. </summary> @@ -14534,7 +14580,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amanda_port" lineno="7310"> +<interface name="corenet_tcp_connect_amanda_port" lineno="7056"> <summary> Make a TCP connection to the amanda port. </summary> @@ -14544,7 +14590,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amanda_client_packets" lineno="7330"> +<interface name="corenet_send_amanda_client_packets" lineno="7076"> <summary> Send amanda_client packets. </summary> @@ -14555,7 +14601,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7349"> +<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7095"> <summary> Do not audit attempts to send amanda_client packets. </summary> @@ -14566,7 +14612,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amanda_client_packets" lineno="7368"> +<interface name="corenet_receive_amanda_client_packets" lineno="7114"> <summary> Receive amanda_client packets. </summary> @@ -14577,7 +14623,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7387"> +<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7133"> <summary> Do not audit attempts to receive amanda_client packets. </summary> @@ -14588,7 +14634,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amanda_client_packets" lineno="7406"> +<interface name="corenet_sendrecv_amanda_client_packets" lineno="7152"> <summary> Send and receive amanda_client packets. </summary> @@ -14599,7 +14645,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7422"> +<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7168"> <summary> Do not audit attempts to send and receive amanda_client packets. </summary> @@ -14610,7 +14656,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amanda_client_packets" lineno="7437"> +<interface name="corenet_relabelto_amanda_client_packets" lineno="7183"> <summary> Relabel packets to amanda_client the packet type. </summary> @@ -14620,7 +14666,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amanda_server_packets" lineno="7457"> +<interface name="corenet_send_amanda_server_packets" lineno="7203"> <summary> Send amanda_server packets. </summary> @@ -14631,7 +14677,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7476"> +<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7222"> <summary> Do not audit attempts to send amanda_server packets. </summary> @@ -14642,7 +14688,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amanda_server_packets" lineno="7495"> +<interface name="corenet_receive_amanda_server_packets" lineno="7241"> <summary> Receive amanda_server packets. </summary> @@ -14653,7 +14699,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7514"> +<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7260"> <summary> Do not audit attempts to receive amanda_server packets. </summary> @@ -14664,7 +14710,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amanda_server_packets" lineno="7533"> +<interface name="corenet_sendrecv_amanda_server_packets" lineno="7279"> <summary> Send and receive amanda_server packets. </summary> @@ -14675,7 +14721,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7549"> +<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7295"> <summary> Do not audit attempts to send and receive amanda_server packets. </summary> @@ -14686,7 +14732,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amanda_server_packets" lineno="7564"> +<interface name="corenet_relabelto_amanda_server_packets" lineno="7310"> <summary> Relabel packets to amanda_server the packet type. </summary> @@ -14696,7 +14742,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7586"> +<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7332"> <summary> Send and receive TCP traffic on the amavisd_recv port. </summary> @@ -14707,7 +14753,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_amavisd_recv_port" lineno="7605"> +<interface name="corenet_udp_send_amavisd_recv_port" lineno="7347"> <summary> Send UDP traffic on the amavisd_recv port. </summary> @@ -14718,7 +14764,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7624"> +<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7362"> <summary> Do not audit attempts to send UDP traffic on the amavisd_recv port. </summary> @@ -14729,7 +14775,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7643"> +<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7377"> <summary> Receive UDP traffic on the amavisd_recv port. </summary> @@ -14740,7 +14786,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7662"> +<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7392"> <summary> Do not audit attempts to receive UDP traffic on the amavisd_recv port. </summary> @@ -14751,7 +14797,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7681"> +<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7407"> <summary> Send and receive UDP traffic on the amavisd_recv port. </summary> @@ -14762,7 +14808,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7698"> +<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7423"> <summary> Do not audit attempts to send and receive UDP traffic on the amavisd_recv port. @@ -14774,7 +14820,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7714"> +<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7438"> <summary> Bind TCP sockets to the amavisd_recv port. </summary> @@ -14785,7 +14831,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7734"> +<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7458"> <summary> Bind UDP sockets to the amavisd_recv port. </summary> @@ -14796,7 +14842,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7753"> +<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7477"> <summary> Make a TCP connection to the amavisd_recv port. </summary> @@ -14806,7 +14852,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_recv_client_packets" lineno="7773"> +<interface name="corenet_send_amavisd_recv_client_packets" lineno="7497"> <summary> Send amavisd_recv_client packets. </summary> @@ -14817,7 +14863,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7792"> +<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7516"> <summary> Do not audit attempts to send amavisd_recv_client packets. </summary> @@ -14828,7 +14874,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7811"> +<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7535"> <summary> Receive amavisd_recv_client packets. </summary> @@ -14839,7 +14885,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7830"> +<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7554"> <summary> Do not audit attempts to receive amavisd_recv_client packets. </summary> @@ -14850,7 +14896,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7849"> +<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7573"> <summary> Send and receive amavisd_recv_client packets. </summary> @@ -14861,7 +14907,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7865"> +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7589"> <summary> Do not audit attempts to send and receive amavisd_recv_client packets. </summary> @@ -14872,7 +14918,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7880"> +<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7604"> <summary> Relabel packets to amavisd_recv_client the packet type. </summary> @@ -14882,7 +14928,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_recv_server_packets" lineno="7900"> +<interface name="corenet_send_amavisd_recv_server_packets" lineno="7624"> <summary> Send amavisd_recv_server packets. </summary> @@ -14893,7 +14939,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7919"> +<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7643"> <summary> Do not audit attempts to send amavisd_recv_server packets. </summary> @@ -14904,7 +14950,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7938"> +<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7662"> <summary> Receive amavisd_recv_server packets. </summary> @@ -14915,7 +14961,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7957"> +<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7681"> <summary> Do not audit attempts to receive amavisd_recv_server packets. </summary> @@ -14926,7 +14972,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7976"> +<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7700"> <summary> Send and receive amavisd_recv_server packets. </summary> @@ -14937,7 +14983,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7992"> +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7716"> <summary> Do not audit attempts to send and receive amavisd_recv_server packets. </summary> @@ -14948,7 +14994,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="8007"> +<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7731"> <summary> Relabel packets to amavisd_recv_server the packet type. </summary> @@ -14958,7 +15004,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="8029"> +<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7753"> <summary> Send and receive TCP traffic on the amavisd_send port. </summary> @@ -14969,7 +15015,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_amavisd_send_port" lineno="8048"> +<interface name="corenet_udp_send_amavisd_send_port" lineno="7768"> <summary> Send UDP traffic on the amavisd_send port. </summary> @@ -14980,7 +15026,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="8067"> +<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7783"> <summary> Do not audit attempts to send UDP traffic on the amavisd_send port. </summary> @@ -14991,7 +15037,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_amavisd_send_port" lineno="8086"> +<interface name="corenet_udp_receive_amavisd_send_port" lineno="7798"> <summary> Receive UDP traffic on the amavisd_send port. </summary> @@ -15002,7 +15048,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="8105"> +<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7813"> <summary> Do not audit attempts to receive UDP traffic on the amavisd_send port. </summary> @@ -15013,7 +15059,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="8124"> +<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7828"> <summary> Send and receive UDP traffic on the amavisd_send port. </summary> @@ -15024,7 +15070,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="8141"> +<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7844"> <summary> Do not audit attempts to send and receive UDP traffic on the amavisd_send port. @@ -15036,7 +15082,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_amavisd_send_port" lineno="8157"> +<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7859"> <summary> Bind TCP sockets to the amavisd_send port. </summary> @@ -15047,7 +15093,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amavisd_send_port" lineno="8177"> +<interface name="corenet_udp_bind_amavisd_send_port" lineno="7879"> <summary> Bind UDP sockets to the amavisd_send port. </summary> @@ -15058,7 +15104,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8196"> +<interface name="corenet_tcp_connect_amavisd_send_port" lineno="7898"> <summary> Make a TCP connection to the amavisd_send port. </summary> @@ -15068,7 +15114,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_send_client_packets" lineno="8216"> +<interface name="corenet_send_amavisd_send_client_packets" lineno="7918"> <summary> Send amavisd_send_client packets. </summary> @@ -15079,7 +15125,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8235"> +<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="7937"> <summary> Do not audit attempts to send amavisd_send_client packets. </summary> @@ -15090,7 +15136,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_send_client_packets" lineno="8254"> +<interface name="corenet_receive_amavisd_send_client_packets" lineno="7956"> <summary> Receive amavisd_send_client packets. </summary> @@ -15101,7 +15147,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8273"> +<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="7975"> <summary> Do not audit attempts to receive amavisd_send_client packets. </summary> @@ -15112,7 +15158,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8292"> +<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="7994"> <summary> Send and receive amavisd_send_client packets. </summary> @@ -15123,7 +15169,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8308"> +<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8010"> <summary> Do not audit attempts to send and receive amavisd_send_client packets. </summary> @@ -15134,7 +15180,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8323"> +<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8025"> <summary> Relabel packets to amavisd_send_client the packet type. </summary> @@ -15144,7 +15190,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_send_server_packets" lineno="8343"> +<interface name="corenet_send_amavisd_send_server_packets" lineno="8045"> <summary> Send amavisd_send_server packets. </summary> @@ -15155,7 +15201,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8362"> +<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8064"> <summary> Do not audit attempts to send amavisd_send_server packets. </summary> @@ -15166,7 +15212,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_send_server_packets" lineno="8381"> +<interface name="corenet_receive_amavisd_send_server_packets" lineno="8083"> <summary> Receive amavisd_send_server packets. </summary> @@ -15177,7 +15223,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8400"> +<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8102"> <summary> Do not audit attempts to receive amavisd_send_server packets. </summary> @@ -15188,7 +15234,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8419"> +<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8121"> <summary> Send and receive amavisd_send_server packets. </summary> @@ -15199,7 +15245,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8435"> +<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8137"> <summary> Do not audit attempts to send and receive amavisd_send_server packets. </summary> @@ -15210,7 +15256,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8450"> +<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8152"> <summary> Relabel packets to amavisd_send_server the packet type. </summary> @@ -15220,7 +15266,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8472"> +<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8174"> <summary> Send and receive TCP traffic on the amqp port. </summary> @@ -15231,7 +15277,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_amqp_port" lineno="8491"> +<interface name="corenet_udp_send_amqp_port" lineno="8189"> <summary> Send UDP traffic on the amqp port. </summary> @@ -15242,7 +15288,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8510"> +<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8204"> <summary> Do not audit attempts to send UDP traffic on the amqp port. </summary> @@ -15253,7 +15299,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_amqp_port" lineno="8529"> +<interface name="corenet_udp_receive_amqp_port" lineno="8219"> <summary> Receive UDP traffic on the amqp port. </summary> @@ -15264,7 +15310,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8548"> +<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8234"> <summary> Do not audit attempts to receive UDP traffic on the amqp port. </summary> @@ -15275,7 +15321,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_amqp_port" lineno="8567"> +<interface name="corenet_udp_sendrecv_amqp_port" lineno="8249"> <summary> Send and receive UDP traffic on the amqp port. </summary> @@ -15286,7 +15332,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8584"> +<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8265"> <summary> Do not audit attempts to send and receive UDP traffic on the amqp port. @@ -15298,7 +15344,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_amqp_port" lineno="8600"> +<interface name="corenet_tcp_bind_amqp_port" lineno="8280"> <summary> Bind TCP sockets to the amqp port. </summary> @@ -15309,7 +15355,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amqp_port" lineno="8620"> +<interface name="corenet_udp_bind_amqp_port" lineno="8300"> <summary> Bind UDP sockets to the amqp port. </summary> @@ -15320,7 +15366,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amqp_port" lineno="8639"> +<interface name="corenet_tcp_connect_amqp_port" lineno="8319"> <summary> Make a TCP connection to the amqp port. </summary> @@ -15330,7 +15376,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amqp_client_packets" lineno="8659"> +<interface name="corenet_send_amqp_client_packets" lineno="8339"> <summary> Send amqp_client packets. </summary> @@ -15341,7 +15387,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8678"> +<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8358"> <summary> Do not audit attempts to send amqp_client packets. </summary> @@ -15352,7 +15398,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amqp_client_packets" lineno="8697"> +<interface name="corenet_receive_amqp_client_packets" lineno="8377"> <summary> Receive amqp_client packets. </summary> @@ -15363,7 +15409,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8716"> +<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8396"> <summary> Do not audit attempts to receive amqp_client packets. </summary> @@ -15374,7 +15420,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amqp_client_packets" lineno="8735"> +<interface name="corenet_sendrecv_amqp_client_packets" lineno="8415"> <summary> Send and receive amqp_client packets. </summary> @@ -15385,7 +15431,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8751"> +<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8431"> <summary> Do not audit attempts to send and receive amqp_client packets. </summary> @@ -15396,7 +15442,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amqp_client_packets" lineno="8766"> +<interface name="corenet_relabelto_amqp_client_packets" lineno="8446"> <summary> Relabel packets to amqp_client the packet type. </summary> @@ -15406,7 +15452,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amqp_server_packets" lineno="8786"> +<interface name="corenet_send_amqp_server_packets" lineno="8466"> <summary> Send amqp_server packets. </summary> @@ -15417,7 +15463,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8805"> +<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8485"> <summary> Do not audit attempts to send amqp_server packets. </summary> @@ -15428,7 +15474,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amqp_server_packets" lineno="8824"> +<interface name="corenet_receive_amqp_server_packets" lineno="8504"> <summary> Receive amqp_server packets. </summary> @@ -15439,7 +15485,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8843"> +<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8523"> <summary> Do not audit attempts to receive amqp_server packets. </summary> @@ -15450,7 +15496,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amqp_server_packets" lineno="8862"> +<interface name="corenet_sendrecv_amqp_server_packets" lineno="8542"> <summary> Send and receive amqp_server packets. </summary> @@ -15461,7 +15507,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8878"> +<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8558"> <summary> Do not audit attempts to send and receive amqp_server packets. </summary> @@ -15472,7 +15518,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amqp_server_packets" lineno="8893"> +<interface name="corenet_relabelto_amqp_server_packets" lineno="8573"> <summary> Relabel packets to amqp_server the packet type. </summary> @@ -15482,7 +15528,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_aol_port" lineno="8915"> +<interface name="corenet_tcp_sendrecv_aol_port" lineno="8595"> <summary> Send and receive TCP traffic on the aol port. </summary> @@ -15493,7 +15539,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_aol_port" lineno="8934"> +<interface name="corenet_udp_send_aol_port" lineno="8610"> <summary> Send UDP traffic on the aol port. </summary> @@ -15504,7 +15550,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8953"> +<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8625"> <summary> Do not audit attempts to send UDP traffic on the aol port. </summary> @@ -15515,7 +15561,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_aol_port" lineno="8972"> +<interface name="corenet_udp_receive_aol_port" lineno="8640"> <summary> Receive UDP traffic on the aol port. </summary> @@ -15526,7 +15572,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8991"> +<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8655"> <summary> Do not audit attempts to receive UDP traffic on the aol port. </summary> @@ -15537,7 +15583,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_aol_port" lineno="9010"> +<interface name="corenet_udp_sendrecv_aol_port" lineno="8670"> <summary> Send and receive UDP traffic on the aol port. </summary> @@ -15548,7 +15594,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="9027"> +<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8686"> <summary> Do not audit attempts to send and receive UDP traffic on the aol port. @@ -15560,7 +15606,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_aol_port" lineno="9043"> +<interface name="corenet_tcp_bind_aol_port" lineno="8701"> <summary> Bind TCP sockets to the aol port. </summary> @@ -15571,7 +15617,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_aol_port" lineno="9063"> +<interface name="corenet_udp_bind_aol_port" lineno="8721"> <summary> Bind UDP sockets to the aol port. </summary> @@ -15582,7 +15628,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_aol_port" lineno="9082"> +<interface name="corenet_tcp_connect_aol_port" lineno="8740"> <summary> Make a TCP connection to the aol port. </summary> @@ -15592,7 +15638,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_aol_client_packets" lineno="9102"> +<interface name="corenet_send_aol_client_packets" lineno="8760"> <summary> Send aol_client packets. </summary> @@ -15603,7 +15649,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_aol_client_packets" lineno="9121"> +<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8779"> <summary> Do not audit attempts to send aol_client packets. </summary> @@ -15614,7 +15660,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_aol_client_packets" lineno="9140"> +<interface name="corenet_receive_aol_client_packets" lineno="8798"> <summary> Receive aol_client packets. </summary> @@ -15625,7 +15671,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="9159"> +<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8817"> <summary> Do not audit attempts to receive aol_client packets. </summary> @@ -15636,7 +15682,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_aol_client_packets" lineno="9178"> +<interface name="corenet_sendrecv_aol_client_packets" lineno="8836"> <summary> Send and receive aol_client packets. </summary> @@ -15647,7 +15693,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="9194"> +<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8852"> <summary> Do not audit attempts to send and receive aol_client packets. </summary> @@ -15658,7 +15704,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_aol_client_packets" lineno="9209"> +<interface name="corenet_relabelto_aol_client_packets" lineno="8867"> <summary> Relabel packets to aol_client the packet type. </summary> @@ -15668,7 +15714,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_aol_server_packets" lineno="9229"> +<interface name="corenet_send_aol_server_packets" lineno="8887"> <summary> Send aol_server packets. </summary> @@ -15679,7 +15725,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9248"> +<interface name="corenet_dontaudit_send_aol_server_packets" lineno="8906"> <summary> Do not audit attempts to send aol_server packets. </summary> @@ -15690,7 +15736,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_aol_server_packets" lineno="9267"> +<interface name="corenet_receive_aol_server_packets" lineno="8925"> <summary> Receive aol_server packets. </summary> @@ -15701,7 +15747,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9286"> +<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="8944"> <summary> Do not audit attempts to receive aol_server packets. </summary> @@ -15712,7 +15758,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_aol_server_packets" lineno="9305"> +<interface name="corenet_sendrecv_aol_server_packets" lineno="8963"> <summary> Send and receive aol_server packets. </summary> @@ -15723,7 +15769,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9321"> +<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="8979"> <summary> Do not audit attempts to send and receive aol_server packets. </summary> @@ -15734,7 +15780,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_aol_server_packets" lineno="9336"> +<interface name="corenet_relabelto_aol_server_packets" lineno="8994"> <summary> Relabel packets to aol_server the packet type. </summary> @@ -15744,7 +15790,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9358"> +<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9016"> <summary> Send and receive TCP traffic on the apcupsd port. </summary> @@ -15755,7 +15801,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_apcupsd_port" lineno="9377"> +<interface name="corenet_udp_send_apcupsd_port" lineno="9031"> <summary> Send UDP traffic on the apcupsd port. </summary> @@ -15766,7 +15812,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9396"> +<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9046"> <summary> Do not audit attempts to send UDP traffic on the apcupsd port. </summary> @@ -15777,7 +15823,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_apcupsd_port" lineno="9415"> +<interface name="corenet_udp_receive_apcupsd_port" lineno="9061"> <summary> Receive UDP traffic on the apcupsd port. </summary> @@ -15788,7 +15834,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9434"> +<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9076"> <summary> Do not audit attempts to receive UDP traffic on the apcupsd port. </summary> @@ -15799,7 +15845,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9453"> +<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9091"> <summary> Send and receive UDP traffic on the apcupsd port. </summary> @@ -15810,7 +15856,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9470"> +<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9107"> <summary> Do not audit attempts to send and receive UDP traffic on the apcupsd port. @@ -15822,7 +15868,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_apcupsd_port" lineno="9486"> +<interface name="corenet_tcp_bind_apcupsd_port" lineno="9122"> <summary> Bind TCP sockets to the apcupsd port. </summary> @@ -15833,7 +15879,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_apcupsd_port" lineno="9506"> +<interface name="corenet_udp_bind_apcupsd_port" lineno="9142"> <summary> Bind UDP sockets to the apcupsd port. </summary> @@ -15844,7 +15890,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_apcupsd_port" lineno="9525"> +<interface name="corenet_tcp_connect_apcupsd_port" lineno="9161"> <summary> Make a TCP connection to the apcupsd port. </summary> @@ -15854,7 +15900,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apcupsd_client_packets" lineno="9545"> +<interface name="corenet_send_apcupsd_client_packets" lineno="9181"> <summary> Send apcupsd_client packets. </summary> @@ -15865,7 +15911,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9564"> +<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9200"> <summary> Do not audit attempts to send apcupsd_client packets. </summary> @@ -15876,7 +15922,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apcupsd_client_packets" lineno="9583"> +<interface name="corenet_receive_apcupsd_client_packets" lineno="9219"> <summary> Receive apcupsd_client packets. </summary> @@ -15887,7 +15933,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9602"> +<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9238"> <summary> Do not audit attempts to receive apcupsd_client packets. </summary> @@ -15898,7 +15944,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9621"> +<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9257"> <summary> Send and receive apcupsd_client packets. </summary> @@ -15909,7 +15955,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9637"> +<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9273"> <summary> Do not audit attempts to send and receive apcupsd_client packets. </summary> @@ -15920,7 +15966,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9652"> +<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9288"> <summary> Relabel packets to apcupsd_client the packet type. </summary> @@ -15930,7 +15976,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apcupsd_server_packets" lineno="9672"> +<interface name="corenet_send_apcupsd_server_packets" lineno="9308"> <summary> Send apcupsd_server packets. </summary> @@ -15941,7 +15987,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9691"> +<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9327"> <summary> Do not audit attempts to send apcupsd_server packets. </summary> @@ -15952,7 +15998,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apcupsd_server_packets" lineno="9710"> +<interface name="corenet_receive_apcupsd_server_packets" lineno="9346"> <summary> Receive apcupsd_server packets. </summary> @@ -15963,7 +16009,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9729"> +<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9365"> <summary> Do not audit attempts to receive apcupsd_server packets. </summary> @@ -15974,7 +16020,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9748"> +<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9384"> <summary> Send and receive apcupsd_server packets. </summary> @@ -15985,7 +16031,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9764"> +<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9400"> <summary> Do not audit attempts to send and receive apcupsd_server packets. </summary> @@ -15996,7 +16042,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9779"> +<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9415"> <summary> Relabel packets to apcupsd_server the packet type. </summary> @@ -16006,7 +16052,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9801"> +<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9437"> <summary> Send and receive TCP traffic on the apertus_ldp port. </summary> @@ -16017,7 +16063,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_apertus_ldp_port" lineno="9820"> +<interface name="corenet_udp_send_apertus_ldp_port" lineno="9452"> <summary> Send UDP traffic on the apertus_ldp port. </summary> @@ -16028,7 +16074,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9839"> +<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9467"> <summary> Do not audit attempts to send UDP traffic on the apertus_ldp port. </summary> @@ -16039,7 +16085,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9858"> +<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9482"> <summary> Receive UDP traffic on the apertus_ldp port. </summary> @@ -16050,7 +16096,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9877"> +<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9497"> <summary> Do not audit attempts to receive UDP traffic on the apertus_ldp port. </summary> @@ -16061,7 +16107,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9896"> +<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9512"> <summary> Send and receive UDP traffic on the apertus_ldp port. </summary> @@ -16072,7 +16118,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9913"> +<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9528"> <summary> Do not audit attempts to send and receive UDP traffic on the apertus_ldp port. @@ -16084,7 +16130,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9929"> +<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9543"> <summary> Bind TCP sockets to the apertus_ldp port. </summary> @@ -16095,7 +16141,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9949"> +<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9563"> <summary> Bind UDP sockets to the apertus_ldp port. </summary> @@ -16106,7 +16152,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9968"> +<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9582"> <summary> Make a TCP connection to the apertus_ldp port. </summary> @@ -16116,7 +16162,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apertus_ldp_client_packets" lineno="9988"> +<interface name="corenet_send_apertus_ldp_client_packets" lineno="9602"> <summary> Send apertus_ldp_client packets. </summary> @@ -16127,7 +16173,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="10007"> +<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9621"> <summary> Do not audit attempts to send apertus_ldp_client packets. </summary> @@ -16138,7 +16184,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apertus_ldp_client_packets" lineno="10026"> +<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9640"> <summary> Receive apertus_ldp_client packets. </summary> @@ -16149,7 +16195,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="10045"> +<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9659"> <summary> Do not audit attempts to receive apertus_ldp_client packets. </summary> @@ -16160,7 +16206,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="10064"> +<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9678"> <summary> Send and receive apertus_ldp_client packets. </summary> @@ -16171,7 +16217,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="10080"> +<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9694"> <summary> Do not audit attempts to send and receive apertus_ldp_client packets. </summary> @@ -16182,7 +16228,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="10095"> +<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9709"> <summary> Relabel packets to apertus_ldp_client the packet type. </summary> @@ -16192,7 +16238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apertus_ldp_server_packets" lineno="10115"> +<interface name="corenet_send_apertus_ldp_server_packets" lineno="9729"> <summary> Send apertus_ldp_server packets. </summary> @@ -16203,7 +16249,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="10134"> +<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9748"> <summary> Do not audit attempts to send apertus_ldp_server packets. </summary> @@ -16214,7 +16260,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apertus_ldp_server_packets" lineno="10153"> +<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9767"> <summary> Receive apertus_ldp_server packets. </summary> @@ -16225,7 +16271,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="10172"> +<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9786"> <summary> Do not audit attempts to receive apertus_ldp_server packets. </summary> @@ -16236,7 +16282,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="10191"> +<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9805"> <summary> Send and receive apertus_ldp_server packets. </summary> @@ -16247,7 +16293,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="10207"> +<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9821"> <summary> Do not audit attempts to send and receive apertus_ldp_server packets. </summary> @@ -16258,7 +16304,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="10222"> +<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9836"> <summary> Relabel packets to apertus_ldp_server the packet type. </summary> @@ -16268,7 +16314,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10244"> +<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="9858"> <summary> Send and receive TCP traffic on the armtechdaemon port. </summary> @@ -16279,7 +16325,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_armtechdaemon_port" lineno="10263"> +<interface name="corenet_udp_send_armtechdaemon_port" lineno="9873"> <summary> Send UDP traffic on the armtechdaemon port. </summary> @@ -16290,7 +16336,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10282"> +<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="9888"> <summary> Do not audit attempts to send UDP traffic on the armtechdaemon port. </summary> @@ -16301,7 +16347,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10301"> +<interface name="corenet_udp_receive_armtechdaemon_port" lineno="9903"> <summary> Receive UDP traffic on the armtechdaemon port. </summary> @@ -16312,7 +16358,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10320"> +<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="9918"> <summary> Do not audit attempts to receive UDP traffic on the armtechdaemon port. </summary> @@ -16323,7 +16369,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10339"> +<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="9933"> <summary> Send and receive UDP traffic on the armtechdaemon port. </summary> @@ -16334,7 +16380,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10356"> +<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="9949"> <summary> Do not audit attempts to send and receive UDP traffic on the armtechdaemon port. @@ -16346,7 +16392,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10372"> +<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="9964"> <summary> Bind TCP sockets to the armtechdaemon port. </summary> @@ -16357,7 +16403,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10392"> +<interface name="corenet_udp_bind_armtechdaemon_port" lineno="9984"> <summary> Bind UDP sockets to the armtechdaemon port. </summary> @@ -16368,7 +16414,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10411"> +<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10003"> <summary> Make a TCP connection to the armtechdaemon port. </summary> @@ -16378,7 +16424,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_armtechdaemon_client_packets" lineno="10431"> +<interface name="corenet_send_armtechdaemon_client_packets" lineno="10023"> <summary> Send armtechdaemon_client packets. </summary> @@ -16389,7 +16435,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10450"> +<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10042"> <summary> Do not audit attempts to send armtechdaemon_client packets. </summary> @@ -16400,7 +16446,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10469"> +<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10061"> <summary> Receive armtechdaemon_client packets. </summary> @@ -16411,7 +16457,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10488"> +<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10080"> <summary> Do not audit attempts to receive armtechdaemon_client packets. </summary> @@ -16422,7 +16468,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10507"> +<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10099"> <summary> Send and receive armtechdaemon_client packets. </summary> @@ -16433,7 +16479,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10523"> +<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10115"> <summary> Do not audit attempts to send and receive armtechdaemon_client packets. </summary> @@ -16444,7 +16490,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10538"> +<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10130"> <summary> Relabel packets to armtechdaemon_client the packet type. </summary> @@ -16454,7 +16500,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_armtechdaemon_server_packets" lineno="10558"> +<interface name="corenet_send_armtechdaemon_server_packets" lineno="10150"> <summary> Send armtechdaemon_server packets. </summary> @@ -16465,7 +16511,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10577"> +<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10169"> <summary> Do not audit attempts to send armtechdaemon_server packets. </summary> @@ -16476,7 +16522,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10596"> +<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10188"> <summary> Receive armtechdaemon_server packets. </summary> @@ -16487,7 +16533,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10615"> +<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10207"> <summary> Do not audit attempts to receive armtechdaemon_server packets. </summary> @@ -16498,7 +16544,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10634"> +<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10226"> <summary> Send and receive armtechdaemon_server packets. </summary> @@ -16509,7 +16555,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10650"> +<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10242"> <summary> Do not audit attempts to send and receive armtechdaemon_server packets. </summary> @@ -16520,7 +16566,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10665"> +<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10257"> <summary> Relabel packets to armtechdaemon_server the packet type. </summary> @@ -16530,7 +16576,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10687"> +<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10279"> <summary> Send and receive TCP traffic on the asterisk port. </summary> @@ -16541,7 +16587,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_asterisk_port" lineno="10706"> +<interface name="corenet_udp_send_asterisk_port" lineno="10294"> <summary> Send UDP traffic on the asterisk port. </summary> @@ -16552,7 +16598,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10725"> +<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10309"> <summary> Do not audit attempts to send UDP traffic on the asterisk port. </summary> @@ -16563,7 +16609,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_asterisk_port" lineno="10744"> +<interface name="corenet_udp_receive_asterisk_port" lineno="10324"> <summary> Receive UDP traffic on the asterisk port. </summary> @@ -16574,7 +16620,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10763"> +<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10339"> <summary> Do not audit attempts to receive UDP traffic on the asterisk port. </summary> @@ -16585,7 +16631,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10782"> +<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10354"> <summary> Send and receive UDP traffic on the asterisk port. </summary> @@ -16596,7 +16642,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10799"> +<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10370"> <summary> Do not audit attempts to send and receive UDP traffic on the asterisk port. @@ -16608,7 +16654,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_asterisk_port" lineno="10815"> +<interface name="corenet_tcp_bind_asterisk_port" lineno="10385"> <summary> Bind TCP sockets to the asterisk port. </summary> @@ -16619,7 +16665,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_asterisk_port" lineno="10835"> +<interface name="corenet_udp_bind_asterisk_port" lineno="10405"> <summary> Bind UDP sockets to the asterisk port. </summary> @@ -16630,7 +16676,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_asterisk_port" lineno="10854"> +<interface name="corenet_tcp_connect_asterisk_port" lineno="10424"> <summary> Make a TCP connection to the asterisk port. </summary> @@ -16640,7 +16686,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_asterisk_client_packets" lineno="10874"> +<interface name="corenet_send_asterisk_client_packets" lineno="10444"> <summary> Send asterisk_client packets. </summary> @@ -16651,7 +16697,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="10893"> +<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="10463"> <summary> Do not audit attempts to send asterisk_client packets. </summary> @@ -16662,7 +16708,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_asterisk_client_packets" lineno="10912"> +<interface name="corenet_receive_asterisk_client_packets" lineno="10482"> <summary> Receive asterisk_client packets. </summary> @@ -16673,7 +16719,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="10931"> +<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="10501"> <summary> Do not audit attempts to receive asterisk_client packets. </summary> @@ -16684,7 +16730,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_asterisk_client_packets" lineno="10950"> +<interface name="corenet_sendrecv_asterisk_client_packets" lineno="10520"> <summary> Send and receive asterisk_client packets. </summary> @@ -16695,7 +16741,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="10966"> +<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="10536"> <summary> Do not audit attempts to send and receive asterisk_client packets. </summary> @@ -16706,7 +16752,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_asterisk_client_packets" lineno="10981"> +<interface name="corenet_relabelto_asterisk_client_packets" lineno="10551"> <summary> Relabel packets to asterisk_client the packet type. </summary> @@ -16716,7 +16762,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_asterisk_server_packets" lineno="11001"> +<interface name="corenet_send_asterisk_server_packets" lineno="10571"> <summary> Send asterisk_server packets. </summary> @@ -16727,7 +16773,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11020"> +<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="10590"> <summary> Do not audit attempts to send asterisk_server packets. </summary> @@ -16738,7 +16784,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_asterisk_server_packets" lineno="11039"> +<interface name="corenet_receive_asterisk_server_packets" lineno="10609"> <summary> Receive asterisk_server packets. </summary> @@ -16749,7 +16795,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11058"> +<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="10628"> <summary> Do not audit attempts to receive asterisk_server packets. </summary> @@ -16760,7 +16806,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11077"> +<interface name="corenet_sendrecv_asterisk_server_packets" lineno="10647"> <summary> Send and receive asterisk_server packets. </summary> @@ -16771,7 +16817,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11093"> +<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="10663"> <summary> Do not audit attempts to send and receive asterisk_server packets. </summary> @@ -16782,7 +16828,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_asterisk_server_packets" lineno="11108"> +<interface name="corenet_relabelto_asterisk_server_packets" lineno="10678"> <summary> Relabel packets to asterisk_server the packet type. </summary> @@ -16792,7 +16838,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_audit_port" lineno="11130"> +<interface name="corenet_tcp_sendrecv_audit_port" lineno="10700"> <summary> Send and receive TCP traffic on the audit port. </summary> @@ -16803,7 +16849,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_audit_port" lineno="11149"> +<interface name="corenet_udp_send_audit_port" lineno="10715"> <summary> Send UDP traffic on the audit port. </summary> @@ -16814,7 +16860,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11168"> +<interface name="corenet_dontaudit_udp_send_audit_port" lineno="10730"> <summary> Do not audit attempts to send UDP traffic on the audit port. </summary> @@ -16825,7 +16871,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_audit_port" lineno="11187"> +<interface name="corenet_udp_receive_audit_port" lineno="10745"> <summary> Receive UDP traffic on the audit port. </summary> @@ -16836,7 +16882,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11206"> +<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="10760"> <summary> Do not audit attempts to receive UDP traffic on the audit port. </summary> @@ -16847,7 +16893,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_audit_port" lineno="11225"> +<interface name="corenet_udp_sendrecv_audit_port" lineno="10775"> <summary> Send and receive UDP traffic on the audit port. </summary> @@ -16858,7 +16904,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11242"> +<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="10791"> <summary> Do not audit attempts to send and receive UDP traffic on the audit port. @@ -16870,7 +16916,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_audit_port" lineno="11258"> +<interface name="corenet_tcp_bind_audit_port" lineno="10806"> <summary> Bind TCP sockets to the audit port. </summary> @@ -16881,7 +16927,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_audit_port" lineno="11278"> +<interface name="corenet_udp_bind_audit_port" lineno="10826"> <summary> Bind UDP sockets to the audit port. </summary> @@ -16892,7 +16938,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_audit_port" lineno="11297"> +<interface name="corenet_tcp_connect_audit_port" lineno="10845"> <summary> Make a TCP connection to the audit port. </summary> @@ -16902,7 +16948,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_audit_client_packets" lineno="11317"> +<interface name="corenet_send_audit_client_packets" lineno="10865"> <summary> Send audit_client packets. </summary> @@ -16913,7 +16959,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11336"> +<interface name="corenet_dontaudit_send_audit_client_packets" lineno="10884"> <summary> Do not audit attempts to send audit_client packets. </summary> @@ -16924,7 +16970,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_audit_client_packets" lineno="11355"> +<interface name="corenet_receive_audit_client_packets" lineno="10903"> <summary> Receive audit_client packets. </summary> @@ -16935,7 +16981,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11374"> +<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="10922"> <summary> Do not audit attempts to receive audit_client packets. </summary> @@ -16946,7 +16992,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_audit_client_packets" lineno="11393"> +<interface name="corenet_sendrecv_audit_client_packets" lineno="10941"> <summary> Send and receive audit_client packets. </summary> @@ -16957,7 +17003,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11409"> +<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="10957"> <summary> Do not audit attempts to send and receive audit_client packets. </summary> @@ -16968,7 +17014,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_audit_client_packets" lineno="11424"> +<interface name="corenet_relabelto_audit_client_packets" lineno="10972"> <summary> Relabel packets to audit_client the packet type. </summary> @@ -16978,7 +17024,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_audit_server_packets" lineno="11444"> +<interface name="corenet_send_audit_server_packets" lineno="10992"> <summary> Send audit_server packets. </summary> @@ -16989,7 +17035,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11463"> +<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11011"> <summary> Do not audit attempts to send audit_server packets. </summary> @@ -17000,7 +17046,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_audit_server_packets" lineno="11482"> +<interface name="corenet_receive_audit_server_packets" lineno="11030"> <summary> Receive audit_server packets. </summary> @@ -17011,7 +17057,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11501"> +<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11049"> <summary> Do not audit attempts to receive audit_server packets. </summary> @@ -17022,7 +17068,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_audit_server_packets" lineno="11520"> +<interface name="corenet_sendrecv_audit_server_packets" lineno="11068"> <summary> Send and receive audit_server packets. </summary> @@ -17033,7 +17079,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11536"> +<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11084"> <summary> Do not audit attempts to send and receive audit_server packets. </summary> @@ -17044,7 +17090,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_audit_server_packets" lineno="11551"> +<interface name="corenet_relabelto_audit_server_packets" lineno="11099"> <summary> Relabel packets to audit_server the packet type. </summary> @@ -17054,7 +17100,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_auth_port" lineno="11573"> +<interface name="corenet_tcp_sendrecv_auth_port" lineno="11121"> <summary> Send and receive TCP traffic on the auth port. </summary> @@ -17065,7 +17111,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_auth_port" lineno="11592"> +<interface name="corenet_udp_send_auth_port" lineno="11136"> <summary> Send UDP traffic on the auth port. </summary> @@ -17076,7 +17122,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11611"> +<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11151"> <summary> Do not audit attempts to send UDP traffic on the auth port. </summary> @@ -17087,7 +17133,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_auth_port" lineno="11630"> +<interface name="corenet_udp_receive_auth_port" lineno="11166"> <summary> Receive UDP traffic on the auth port. </summary> @@ -17098,7 +17144,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11649"> +<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11181"> <summary> Do not audit attempts to receive UDP traffic on the auth port. </summary> @@ -17109,7 +17155,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_auth_port" lineno="11668"> +<interface name="corenet_udp_sendrecv_auth_port" lineno="11196"> <summary> Send and receive UDP traffic on the auth port. </summary> @@ -17120,7 +17166,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11685"> +<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11212"> <summary> Do not audit attempts to send and receive UDP traffic on the auth port. @@ -17132,7 +17178,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_auth_port" lineno="11701"> +<interface name="corenet_tcp_bind_auth_port" lineno="11227"> <summary> Bind TCP sockets to the auth port. </summary> @@ -17143,7 +17189,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_auth_port" lineno="11721"> +<interface name="corenet_udp_bind_auth_port" lineno="11247"> <summary> Bind UDP sockets to the auth port. </summary> @@ -17154,7 +17200,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_auth_port" lineno="11740"> +<interface name="corenet_tcp_connect_auth_port" lineno="11266"> <summary> Make a TCP connection to the auth port. </summary> @@ -17164,7 +17210,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_auth_client_packets" lineno="11760"> +<interface name="corenet_send_auth_client_packets" lineno="11286"> <summary> Send auth_client packets. </summary> @@ -17175,7 +17221,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11779"> +<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11305"> <summary> Do not audit attempts to send auth_client packets. </summary> @@ -17186,7 +17232,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_auth_client_packets" lineno="11798"> +<interface name="corenet_receive_auth_client_packets" lineno="11324"> <summary> Receive auth_client packets. </summary> @@ -17197,7 +17243,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11817"> +<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11343"> <summary> Do not audit attempts to receive auth_client packets. </summary> @@ -17208,7 +17254,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_auth_client_packets" lineno="11836"> +<interface name="corenet_sendrecv_auth_client_packets" lineno="11362"> <summary> Send and receive auth_client packets. </summary> @@ -17219,7 +17265,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11852"> +<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11378"> <summary> Do not audit attempts to send and receive auth_client packets. </summary> @@ -17230,7 +17276,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_auth_client_packets" lineno="11867"> +<interface name="corenet_relabelto_auth_client_packets" lineno="11393"> <summary> Relabel packets to auth_client the packet type. </summary> @@ -17240,7 +17286,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_auth_server_packets" lineno="11887"> +<interface name="corenet_send_auth_server_packets" lineno="11413"> <summary> Send auth_server packets. </summary> @@ -17251,7 +17297,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11906"> +<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11432"> <summary> Do not audit attempts to send auth_server packets. </summary> @@ -17262,7 +17308,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_auth_server_packets" lineno="11925"> +<interface name="corenet_receive_auth_server_packets" lineno="11451"> <summary> Receive auth_server packets. </summary> @@ -17273,7 +17319,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="11944"> +<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="11470"> <summary> Do not audit attempts to receive auth_server packets. </summary> @@ -17284,7 +17330,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_auth_server_packets" lineno="11963"> +<interface name="corenet_sendrecv_auth_server_packets" lineno="11489"> <summary> Send and receive auth_server packets. </summary> @@ -17295,7 +17341,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="11979"> +<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="11505"> <summary> Do not audit attempts to send and receive auth_server packets. </summary> @@ -17306,7 +17352,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_auth_server_packets" lineno="11994"> +<interface name="corenet_relabelto_auth_server_packets" lineno="11520"> <summary> Relabel packets to auth_server the packet type. </summary> @@ -17316,7 +17362,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12016"> +<interface name="corenet_tcp_sendrecv_bgp_port" lineno="11542"> <summary> Send and receive TCP traffic on the bgp port. </summary> @@ -17327,7 +17373,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_bgp_port" lineno="12035"> +<interface name="corenet_udp_send_bgp_port" lineno="11557"> <summary> Send UDP traffic on the bgp port. </summary> @@ -17338,7 +17384,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12054"> +<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="11572"> <summary> Do not audit attempts to send UDP traffic on the bgp port. </summary> @@ -17349,7 +17395,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_bgp_port" lineno="12073"> +<interface name="corenet_udp_receive_bgp_port" lineno="11587"> <summary> Receive UDP traffic on the bgp port. </summary> @@ -17360,7 +17406,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12092"> +<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="11602"> <summary> Do not audit attempts to receive UDP traffic on the bgp port. </summary> @@ -17371,7 +17417,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_bgp_port" lineno="12111"> +<interface name="corenet_udp_sendrecv_bgp_port" lineno="11617"> <summary> Send and receive UDP traffic on the bgp port. </summary> @@ -17382,7 +17428,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12128"> +<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="11633"> <summary> Do not audit attempts to send and receive UDP traffic on the bgp port. @@ -17394,7 +17440,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_bgp_port" lineno="12144"> +<interface name="corenet_tcp_bind_bgp_port" lineno="11648"> <summary> Bind TCP sockets to the bgp port. </summary> @@ -17405,7 +17451,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_bgp_port" lineno="12164"> +<interface name="corenet_udp_bind_bgp_port" lineno="11668"> <summary> Bind UDP sockets to the bgp port. </summary> @@ -17416,7 +17462,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_bgp_port" lineno="12183"> +<interface name="corenet_tcp_connect_bgp_port" lineno="11687"> <summary> Make a TCP connection to the bgp port. </summary> @@ -17426,7 +17472,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bgp_client_packets" lineno="12203"> +<interface name="corenet_send_bgp_client_packets" lineno="11707"> <summary> Send bgp_client packets. </summary> @@ -17437,7 +17483,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12222"> +<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="11726"> <summary> Do not audit attempts to send bgp_client packets. </summary> @@ -17448,7 +17494,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bgp_client_packets" lineno="12241"> +<interface name="corenet_receive_bgp_client_packets" lineno="11745"> <summary> Receive bgp_client packets. </summary> @@ -17459,7 +17505,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12260"> +<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="11764"> <summary> Do not audit attempts to receive bgp_client packets. </summary> @@ -17470,7 +17516,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bgp_client_packets" lineno="12279"> +<interface name="corenet_sendrecv_bgp_client_packets" lineno="11783"> <summary> Send and receive bgp_client packets. </summary> @@ -17481,7 +17527,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12295"> +<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="11799"> <summary> Do not audit attempts to send and receive bgp_client packets. </summary> @@ -17492,7 +17538,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bgp_client_packets" lineno="12310"> +<interface name="corenet_relabelto_bgp_client_packets" lineno="11814"> <summary> Relabel packets to bgp_client the packet type. </summary> @@ -17502,7 +17548,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bgp_server_packets" lineno="12330"> +<interface name="corenet_send_bgp_server_packets" lineno="11834"> <summary> Send bgp_server packets. </summary> @@ -17513,7 +17559,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12349"> +<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="11853"> <summary> Do not audit attempts to send bgp_server packets. </summary> @@ -17524,7 +17570,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bgp_server_packets" lineno="12368"> +<interface name="corenet_receive_bgp_server_packets" lineno="11872"> <summary> Receive bgp_server packets. </summary> @@ -17535,7 +17581,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12387"> +<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="11891"> <summary> Do not audit attempts to receive bgp_server packets. </summary> @@ -17546,7 +17592,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bgp_server_packets" lineno="12406"> +<interface name="corenet_sendrecv_bgp_server_packets" lineno="11910"> <summary> Send and receive bgp_server packets. </summary> @@ -17557,7 +17603,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12422"> +<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="11926"> <summary> Do not audit attempts to send and receive bgp_server packets. </summary> @@ -17568,7 +17614,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bgp_server_packets" lineno="12437"> +<interface name="corenet_relabelto_bgp_server_packets" lineno="11941"> <summary> Relabel packets to bgp_server the packet type. </summary> @@ -17578,7 +17624,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12459"> +<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="11963"> <summary> Send and receive TCP traffic on the bitcoin port. </summary> @@ -17589,7 +17635,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_bitcoin_port" lineno="12478"> +<interface name="corenet_udp_send_bitcoin_port" lineno="11978"> <summary> Send UDP traffic on the bitcoin port. </summary> @@ -17600,7 +17646,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12497"> +<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="11993"> <summary> Do not audit attempts to send UDP traffic on the bitcoin port. </summary> @@ -17611,7 +17657,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_bitcoin_port" lineno="12516"> +<interface name="corenet_udp_receive_bitcoin_port" lineno="12008"> <summary> Receive UDP traffic on the bitcoin port. </summary> @@ -17622,7 +17668,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12535"> +<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12023"> <summary> Do not audit attempts to receive UDP traffic on the bitcoin port. </summary> @@ -17633,7 +17679,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12554"> +<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12038"> <summary> Send and receive UDP traffic on the bitcoin port. </summary> @@ -17644,7 +17690,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12571"> +<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12054"> <summary> Do not audit attempts to send and receive UDP traffic on the bitcoin port. @@ -17656,7 +17702,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_bitcoin_port" lineno="12587"> +<interface name="corenet_tcp_bind_bitcoin_port" lineno="12069"> <summary> Bind TCP sockets to the bitcoin port. </summary> @@ -17667,7 +17713,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_bitcoin_port" lineno="12607"> +<interface name="corenet_udp_bind_bitcoin_port" lineno="12089"> <summary> Bind UDP sockets to the bitcoin port. </summary> @@ -17678,7 +17724,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_bitcoin_port" lineno="12626"> +<interface name="corenet_tcp_connect_bitcoin_port" lineno="12108"> <summary> Make a TCP connection to the bitcoin port. </summary> @@ -17688,7 +17734,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bitcoin_client_packets" lineno="12646"> +<interface name="corenet_send_bitcoin_client_packets" lineno="12128"> <summary> Send bitcoin_client packets. </summary> @@ -17699,7 +17745,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12665"> +<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12147"> <summary> Do not audit attempts to send bitcoin_client packets. </summary> @@ -17710,7 +17756,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bitcoin_client_packets" lineno="12684"> +<interface name="corenet_receive_bitcoin_client_packets" lineno="12166"> <summary> Receive bitcoin_client packets. </summary> @@ -17721,7 +17767,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12703"> +<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12185"> <summary> Do not audit attempts to receive bitcoin_client packets. </summary> @@ -17732,7 +17778,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12722"> +<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12204"> <summary> Send and receive bitcoin_client packets. </summary> @@ -17743,7 +17789,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12738"> +<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12220"> <summary> Do not audit attempts to send and receive bitcoin_client packets. </summary> @@ -17754,7 +17800,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12753"> +<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12235"> <summary> Relabel packets to bitcoin_client the packet type. </summary> @@ -17764,7 +17810,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bitcoin_server_packets" lineno="12773"> +<interface name="corenet_send_bitcoin_server_packets" lineno="12255"> <summary> Send bitcoin_server packets. </summary> @@ -17775,7 +17821,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12792"> +<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12274"> <summary> Do not audit attempts to send bitcoin_server packets. </summary> @@ -17786,7 +17832,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bitcoin_server_packets" lineno="12811"> +<interface name="corenet_receive_bitcoin_server_packets" lineno="12293"> <summary> Receive bitcoin_server packets. </summary> @@ -17797,7 +17843,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12830"> +<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12312"> <summary> Do not audit attempts to receive bitcoin_server packets. </summary> @@ -17808,7 +17854,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12849"> +<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12331"> <summary> Send and receive bitcoin_server packets. </summary> @@ -17819,7 +17865,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12865"> +<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12347"> <summary> Do not audit attempts to send and receive bitcoin_server packets. </summary> @@ -17830,7 +17876,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12880"> +<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12362"> <summary> Relabel packets to bitcoin_server the packet type. </summary> @@ -17840,7 +17886,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12902"> +<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12384"> <summary> Send and receive TCP traffic on the boinc port. </summary> @@ -17851,7 +17897,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_boinc_port" lineno="12921"> +<interface name="corenet_udp_send_boinc_port" lineno="12399"> <summary> Send UDP traffic on the boinc port. </summary> @@ -17862,7 +17908,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12940"> +<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12414"> <summary> Do not audit attempts to send UDP traffic on the boinc port. </summary> @@ -17873,7 +17919,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_boinc_port" lineno="12959"> +<interface name="corenet_udp_receive_boinc_port" lineno="12429"> <summary> Receive UDP traffic on the boinc port. </summary> @@ -17884,7 +17930,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12978"> +<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12444"> <summary> Do not audit attempts to receive UDP traffic on the boinc port. </summary> @@ -17895,7 +17941,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_boinc_port" lineno="12997"> +<interface name="corenet_udp_sendrecv_boinc_port" lineno="12459"> <summary> Send and receive UDP traffic on the boinc port. </summary> @@ -17906,7 +17952,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13014"> +<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="12475"> <summary> Do not audit attempts to send and receive UDP traffic on the boinc port. @@ -17918,7 +17964,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_boinc_port" lineno="13030"> +<interface name="corenet_tcp_bind_boinc_port" lineno="12490"> <summary> Bind TCP sockets to the boinc port. </summary> @@ -17929,7 +17975,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_boinc_port" lineno="13050"> +<interface name="corenet_udp_bind_boinc_port" lineno="12510"> <summary> Bind UDP sockets to the boinc port. </summary> @@ -17940,7 +17986,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_boinc_port" lineno="13069"> +<interface name="corenet_tcp_connect_boinc_port" lineno="12529"> <summary> Make a TCP connection to the boinc port. </summary> @@ -17950,7 +17996,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_client_packets" lineno="13089"> +<interface name="corenet_send_boinc_client_packets" lineno="12549"> <summary> Send boinc_client packets. </summary> @@ -17961,7 +18007,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13108"> +<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="12568"> <summary> Do not audit attempts to send boinc_client packets. </summary> @@ -17972,7 +18018,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_client_packets" lineno="13127"> +<interface name="corenet_receive_boinc_client_packets" lineno="12587"> <summary> Receive boinc_client packets. </summary> @@ -17983,7 +18029,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13146"> +<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="12606"> <summary> Do not audit attempts to receive boinc_client packets. </summary> @@ -17994,7 +18040,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_client_packets" lineno="13165"> +<interface name="corenet_sendrecv_boinc_client_packets" lineno="12625"> <summary> Send and receive boinc_client packets. </summary> @@ -18005,7 +18051,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13181"> +<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="12641"> <summary> Do not audit attempts to send and receive boinc_client packets. </summary> @@ -18016,7 +18062,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_client_packets" lineno="13196"> +<interface name="corenet_relabelto_boinc_client_packets" lineno="12656"> <summary> Relabel packets to boinc_client the packet type. </summary> @@ -18026,7 +18072,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_server_packets" lineno="13216"> +<interface name="corenet_send_boinc_server_packets" lineno="12676"> <summary> Send boinc_server packets. </summary> @@ -18037,7 +18083,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13235"> +<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="12695"> <summary> Do not audit attempts to send boinc_server packets. </summary> @@ -18048,7 +18094,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_server_packets" lineno="13254"> +<interface name="corenet_receive_boinc_server_packets" lineno="12714"> <summary> Receive boinc_server packets. </summary> @@ -18059,7 +18105,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13273"> +<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="12733"> <summary> Do not audit attempts to receive boinc_server packets. </summary> @@ -18070,7 +18116,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_server_packets" lineno="13292"> +<interface name="corenet_sendrecv_boinc_server_packets" lineno="12752"> <summary> Send and receive boinc_server packets. </summary> @@ -18081,7 +18127,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13308"> +<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="12768"> <summary> Do not audit attempts to send and receive boinc_server packets. </summary> @@ -18092,7 +18138,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_server_packets" lineno="13323"> +<interface name="corenet_relabelto_boinc_server_packets" lineno="12783"> <summary> Relabel packets to boinc_server the packet type. </summary> @@ -18102,7 +18148,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13345"> +<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="12805"> <summary> Send and receive TCP traffic on the boinc_client port. </summary> @@ -18113,7 +18159,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_boinc_client_port" lineno="13364"> +<interface name="corenet_udp_send_boinc_client_port" lineno="12820"> <summary> Send UDP traffic on the boinc_client port. </summary> @@ -18124,7 +18170,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13383"> +<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="12835"> <summary> Do not audit attempts to send UDP traffic on the boinc_client port. </summary> @@ -18135,7 +18181,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_boinc_client_port" lineno="13402"> +<interface name="corenet_udp_receive_boinc_client_port" lineno="12850"> <summary> Receive UDP traffic on the boinc_client port. </summary> @@ -18146,7 +18192,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13421"> +<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="12865"> <summary> Do not audit attempts to receive UDP traffic on the boinc_client port. </summary> @@ -18157,7 +18203,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13440"> +<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="12880"> <summary> Send and receive UDP traffic on the boinc_client port. </summary> @@ -18168,7 +18214,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13457"> +<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="12896"> <summary> Do not audit attempts to send and receive UDP traffic on the boinc_client port. @@ -18180,7 +18226,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_boinc_client_port" lineno="13473"> +<interface name="corenet_tcp_bind_boinc_client_port" lineno="12911"> <summary> Bind TCP sockets to the boinc_client port. </summary> @@ -18191,7 +18237,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_boinc_client_port" lineno="13493"> +<interface name="corenet_udp_bind_boinc_client_port" lineno="12931"> <summary> Bind UDP sockets to the boinc_client port. </summary> @@ -18202,7 +18248,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_boinc_client_port" lineno="13512"> +<interface name="corenet_tcp_connect_boinc_client_port" lineno="12950"> <summary> Make a TCP connection to the boinc_client port. </summary> @@ -18212,7 +18258,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_client_client_packets" lineno="13532"> +<interface name="corenet_send_boinc_client_client_packets" lineno="12970"> <summary> Send boinc_client_client packets. </summary> @@ -18223,7 +18269,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13551"> +<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="12989"> <summary> Do not audit attempts to send boinc_client_client packets. </summary> @@ -18234,7 +18280,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_client_client_packets" lineno="13570"> +<interface name="corenet_receive_boinc_client_client_packets" lineno="13008"> <summary> Receive boinc_client_client packets. </summary> @@ -18245,7 +18291,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13589"> +<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13027"> <summary> Do not audit attempts to receive boinc_client_client packets. </summary> @@ -18256,7 +18302,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13608"> +<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13046"> <summary> Send and receive boinc_client_client packets. </summary> @@ -18267,7 +18313,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13624"> +<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13062"> <summary> Do not audit attempts to send and receive boinc_client_client packets. </summary> @@ -18278,7 +18324,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13639"> +<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13077"> <summary> Relabel packets to boinc_client_client the packet type. </summary> @@ -18288,7 +18334,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_client_server_packets" lineno="13659"> +<interface name="corenet_send_boinc_client_server_packets" lineno="13097"> <summary> Send boinc_client_server packets. </summary> @@ -18299,7 +18345,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13678"> +<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13116"> <summary> Do not audit attempts to send boinc_client_server packets. </summary> @@ -18310,7 +18356,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_client_server_packets" lineno="13697"> +<interface name="corenet_receive_boinc_client_server_packets" lineno="13135"> <summary> Receive boinc_client_server packets. </summary> @@ -18321,7 +18367,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13716"> +<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13154"> <summary> Do not audit attempts to receive boinc_client_server packets. </summary> @@ -18332,7 +18378,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13735"> +<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13173"> <summary> Send and receive boinc_client_server packets. </summary> @@ -18343,7 +18389,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13751"> +<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13189"> <summary> Do not audit attempts to send and receive boinc_client_server packets. </summary> @@ -18354,7 +18400,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13766"> +<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13204"> <summary> Relabel packets to boinc_client_server the packet type. </summary> @@ -18364,7 +18410,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_biff_port" lineno="13788"> +<interface name="corenet_tcp_sendrecv_biff_port" lineno="13226"> <summary> Send and receive TCP traffic on the biff port. </summary> @@ -18375,7 +18421,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_biff_port" lineno="13807"> +<interface name="corenet_udp_send_biff_port" lineno="13241"> <summary> Send UDP traffic on the biff port. </summary> @@ -18386,7 +18432,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13826"> +<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13256"> <summary> Do not audit attempts to send UDP traffic on the biff port. </summary> @@ -18397,7 +18443,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_biff_port" lineno="13845"> +<interface name="corenet_udp_receive_biff_port" lineno="13271"> <summary> Receive UDP traffic on the biff port. </summary> @@ -18408,7 +18454,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13864"> +<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13286"> <summary> Do not audit attempts to receive UDP traffic on the biff port. </summary> @@ -18419,7 +18465,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_biff_port" lineno="13883"> +<interface name="corenet_udp_sendrecv_biff_port" lineno="13301"> <summary> Send and receive UDP traffic on the biff port. </summary> @@ -18430,7 +18476,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13900"> +<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13317"> <summary> Do not audit attempts to send and receive UDP traffic on the biff port. @@ -18442,7 +18488,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_biff_port" lineno="13916"> +<interface name="corenet_tcp_bind_biff_port" lineno="13332"> <summary> Bind TCP sockets to the biff port. </summary> @@ -18453,7 +18499,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_biff_port" lineno="13936"> +<interface name="corenet_udp_bind_biff_port" lineno="13352"> <summary> Bind UDP sockets to the biff port. </summary> @@ -18464,7 +18510,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_biff_port" lineno="13955"> +<interface name="corenet_tcp_connect_biff_port" lineno="13371"> <summary> Make a TCP connection to the biff port. </summary> @@ -18474,7 +18520,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_biff_client_packets" lineno="13975"> +<interface name="corenet_send_biff_client_packets" lineno="13391"> <summary> Send biff_client packets. </summary> @@ -18485,7 +18531,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13994"> +<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13410"> <summary> Do not audit attempts to send biff_client packets. </summary> @@ -18496,7 +18542,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_biff_client_packets" lineno="14013"> +<interface name="corenet_receive_biff_client_packets" lineno="13429"> <summary> Receive biff_client packets. </summary> @@ -18507,7 +18553,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="14032"> +<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13448"> <summary> Do not audit attempts to receive biff_client packets. </summary> @@ -18518,7 +18564,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_biff_client_packets" lineno="14051"> +<interface name="corenet_sendrecv_biff_client_packets" lineno="13467"> <summary> Send and receive biff_client packets. </summary> @@ -18529,7 +18575,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14067"> +<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="13483"> <summary> Do not audit attempts to send and receive biff_client packets. </summary> @@ -18540,7 +18586,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_biff_client_packets" lineno="14082"> +<interface name="corenet_relabelto_biff_client_packets" lineno="13498"> <summary> Relabel packets to biff_client the packet type. </summary> @@ -18550,7 +18596,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_biff_server_packets" lineno="14102"> +<interface name="corenet_send_biff_server_packets" lineno="13518"> <summary> Send biff_server packets. </summary> @@ -18561,7 +18607,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14121"> +<interface name="corenet_dontaudit_send_biff_server_packets" lineno="13537"> <summary> Do not audit attempts to send biff_server packets. </summary> @@ -18572,7 +18618,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_biff_server_packets" lineno="14140"> +<interface name="corenet_receive_biff_server_packets" lineno="13556"> <summary> Receive biff_server packets. </summary> @@ -18583,7 +18629,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14159"> +<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="13575"> <summary> Do not audit attempts to receive biff_server packets. </summary> @@ -18594,7 +18640,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_biff_server_packets" lineno="14178"> +<interface name="corenet_sendrecv_biff_server_packets" lineno="13594"> <summary> Send and receive biff_server packets. </summary> @@ -18605,7 +18651,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14194"> +<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="13610"> <summary> Do not audit attempts to send and receive biff_server packets. </summary> @@ -18616,7 +18662,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_biff_server_packets" lineno="14209"> +<interface name="corenet_relabelto_biff_server_packets" lineno="13625"> <summary> Relabel packets to biff_server the packet type. </summary> @@ -18626,7 +18672,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14231"> +<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="13647"> <summary> Send and receive TCP traffic on the certmaster port. </summary> @@ -18637,7 +18683,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_certmaster_port" lineno="14250"> +<interface name="corenet_udp_send_certmaster_port" lineno="13662"> <summary> Send UDP traffic on the certmaster port. </summary> @@ -18648,7 +18694,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14269"> +<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="13677"> <summary> Do not audit attempts to send UDP traffic on the certmaster port. </summary> @@ -18659,7 +18705,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_certmaster_port" lineno="14288"> +<interface name="corenet_udp_receive_certmaster_port" lineno="13692"> <summary> Receive UDP traffic on the certmaster port. </summary> @@ -18670,7 +18716,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14307"> +<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="13707"> <summary> Do not audit attempts to receive UDP traffic on the certmaster port. </summary> @@ -18681,7 +18727,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14326"> +<interface name="corenet_udp_sendrecv_certmaster_port" lineno="13722"> <summary> Send and receive UDP traffic on the certmaster port. </summary> @@ -18692,7 +18738,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14343"> +<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="13738"> <summary> Do not audit attempts to send and receive UDP traffic on the certmaster port. @@ -18704,7 +18750,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_certmaster_port" lineno="14359"> +<interface name="corenet_tcp_bind_certmaster_port" lineno="13753"> <summary> Bind TCP sockets to the certmaster port. </summary> @@ -18715,7 +18761,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_certmaster_port" lineno="14379"> +<interface name="corenet_udp_bind_certmaster_port" lineno="13773"> <summary> Bind UDP sockets to the certmaster port. </summary> @@ -18726,7 +18772,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_certmaster_port" lineno="14398"> +<interface name="corenet_tcp_connect_certmaster_port" lineno="13792"> <summary> Make a TCP connection to the certmaster port. </summary> @@ -18736,7 +18782,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_certmaster_client_packets" lineno="14418"> +<interface name="corenet_send_certmaster_client_packets" lineno="13812"> <summary> Send certmaster_client packets. </summary> @@ -18747,7 +18793,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14437"> +<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="13831"> <summary> Do not audit attempts to send certmaster_client packets. </summary> @@ -18758,7 +18804,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_certmaster_client_packets" lineno="14456"> +<interface name="corenet_receive_certmaster_client_packets" lineno="13850"> <summary> Receive certmaster_client packets. </summary> @@ -18769,7 +18815,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14475"> +<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="13869"> <summary> Do not audit attempts to receive certmaster_client packets. </summary> @@ -18780,7 +18826,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14494"> +<interface name="corenet_sendrecv_certmaster_client_packets" lineno="13888"> <summary> Send and receive certmaster_client packets. </summary> @@ -18791,7 +18837,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14510"> +<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="13904"> <summary> Do not audit attempts to send and receive certmaster_client packets. </summary> @@ -18802,7 +18848,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_certmaster_client_packets" lineno="14525"> +<interface name="corenet_relabelto_certmaster_client_packets" lineno="13919"> <summary> Relabel packets to certmaster_client the packet type. </summary> @@ -18812,7 +18858,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_certmaster_server_packets" lineno="14545"> +<interface name="corenet_send_certmaster_server_packets" lineno="13939"> <summary> Send certmaster_server packets. </summary> @@ -18823,7 +18869,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14564"> +<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="13958"> <summary> Do not audit attempts to send certmaster_server packets. </summary> @@ -18834,7 +18880,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_certmaster_server_packets" lineno="14583"> +<interface name="corenet_receive_certmaster_server_packets" lineno="13977"> <summary> Receive certmaster_server packets. </summary> @@ -18845,7 +18891,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14602"> +<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="13996"> <summary> Do not audit attempts to receive certmaster_server packets. </summary> @@ -18856,7 +18902,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14621"> +<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14015"> <summary> Send and receive certmaster_server packets. </summary> @@ -18867,7 +18913,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14637"> +<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14031"> <summary> Do not audit attempts to send and receive certmaster_server packets. </summary> @@ -18878,7 +18924,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_certmaster_server_packets" lineno="14652"> +<interface name="corenet_relabelto_certmaster_server_packets" lineno="14046"> <summary> Relabel packets to certmaster_server the packet type. </summary> @@ -18888,7 +18934,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14674"> +<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14068"> <summary> Send and receive TCP traffic on the chronyd port. </summary> @@ -18899,7 +18945,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_chronyd_port" lineno="14693"> +<interface name="corenet_udp_send_chronyd_port" lineno="14083"> <summary> Send UDP traffic on the chronyd port. </summary> @@ -18910,7 +18956,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14712"> +<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14098"> <summary> Do not audit attempts to send UDP traffic on the chronyd port. </summary> @@ -18921,7 +18967,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_chronyd_port" lineno="14731"> +<interface name="corenet_udp_receive_chronyd_port" lineno="14113"> <summary> Receive UDP traffic on the chronyd port. </summary> @@ -18932,7 +18978,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14750"> +<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14128"> <summary> Do not audit attempts to receive UDP traffic on the chronyd port. </summary> @@ -18943,7 +18989,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14769"> +<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14143"> <summary> Send and receive UDP traffic on the chronyd port. </summary> @@ -18954,7 +19000,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14786"> +<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14159"> <summary> Do not audit attempts to send and receive UDP traffic on the chronyd port. @@ -18966,7 +19012,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_chronyd_port" lineno="14802"> +<interface name="corenet_tcp_bind_chronyd_port" lineno="14174"> <summary> Bind TCP sockets to the chronyd port. </summary> @@ -18977,7 +19023,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_chronyd_port" lineno="14822"> +<interface name="corenet_udp_bind_chronyd_port" lineno="14194"> <summary> Bind UDP sockets to the chronyd port. </summary> @@ -18988,7 +19034,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_chronyd_port" lineno="14841"> +<interface name="corenet_tcp_connect_chronyd_port" lineno="14213"> <summary> Make a TCP connection to the chronyd port. </summary> @@ -18998,7 +19044,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_chronyd_client_packets" lineno="14861"> +<interface name="corenet_send_chronyd_client_packets" lineno="14233"> <summary> Send chronyd_client packets. </summary> @@ -19009,7 +19055,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14880"> +<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14252"> <summary> Do not audit attempts to send chronyd_client packets. </summary> @@ -19020,7 +19066,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_chronyd_client_packets" lineno="14899"> +<interface name="corenet_receive_chronyd_client_packets" lineno="14271"> <summary> Receive chronyd_client packets. </summary> @@ -19031,7 +19077,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14918"> +<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14290"> <summary> Do not audit attempts to receive chronyd_client packets. </summary> @@ -19042,7 +19088,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14937"> +<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14309"> <summary> Send and receive chronyd_client packets. </summary> @@ -19053,7 +19099,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14953"> +<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14325"> <summary> Do not audit attempts to send and receive chronyd_client packets. </summary> @@ -19064,7 +19110,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_chronyd_client_packets" lineno="14968"> +<interface name="corenet_relabelto_chronyd_client_packets" lineno="14340"> <summary> Relabel packets to chronyd_client the packet type. </summary> @@ -19074,7 +19120,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_chronyd_server_packets" lineno="14988"> +<interface name="corenet_send_chronyd_server_packets" lineno="14360"> <summary> Send chronyd_server packets. </summary> @@ -19085,7 +19131,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="15007"> +<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14379"> <summary> Do not audit attempts to send chronyd_server packets. </summary> @@ -19096,7 +19142,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_chronyd_server_packets" lineno="15026"> +<interface name="corenet_receive_chronyd_server_packets" lineno="14398"> <summary> Receive chronyd_server packets. </summary> @@ -19107,7 +19153,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="15045"> +<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14417"> <summary> Do not audit attempts to receive chronyd_server packets. </summary> @@ -19118,7 +19164,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_chronyd_server_packets" lineno="15064"> +<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14436"> <summary> Send and receive chronyd_server packets. </summary> @@ -19129,7 +19175,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="15080"> +<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14452"> <summary> Do not audit attempts to send and receive chronyd_server packets. </summary> @@ -19140,7 +19186,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_chronyd_server_packets" lineno="15095"> +<interface name="corenet_relabelto_chronyd_server_packets" lineno="14467"> <summary> Relabel packets to chronyd_server the packet type. </summary> @@ -19150,7 +19196,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15117"> +<interface name="corenet_tcp_sendrecv_clamd_port" lineno="14489"> <summary> Send and receive TCP traffic on the clamd port. </summary> @@ -19161,7 +19207,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_clamd_port" lineno="15136"> +<interface name="corenet_udp_send_clamd_port" lineno="14504"> <summary> Send UDP traffic on the clamd port. </summary> @@ -19172,7 +19218,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15155"> +<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="14519"> <summary> Do not audit attempts to send UDP traffic on the clamd port. </summary> @@ -19183,7 +19229,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_clamd_port" lineno="15174"> +<interface name="corenet_udp_receive_clamd_port" lineno="14534"> <summary> Receive UDP traffic on the clamd port. </summary> @@ -19194,7 +19240,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15193"> +<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="14549"> <summary> Do not audit attempts to receive UDP traffic on the clamd port. </summary> @@ -19205,7 +19251,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_clamd_port" lineno="15212"> +<interface name="corenet_udp_sendrecv_clamd_port" lineno="14564"> <summary> Send and receive UDP traffic on the clamd port. </summary> @@ -19216,7 +19262,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15229"> +<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="14580"> <summary> Do not audit attempts to send and receive UDP traffic on the clamd port. @@ -19228,7 +19274,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_clamd_port" lineno="15245"> +<interface name="corenet_tcp_bind_clamd_port" lineno="14595"> <summary> Bind TCP sockets to the clamd port. </summary> @@ -19239,7 +19285,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_clamd_port" lineno="15265"> +<interface name="corenet_udp_bind_clamd_port" lineno="14615"> <summary> Bind UDP sockets to the clamd port. </summary> @@ -19250,7 +19296,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_clamd_port" lineno="15284"> +<interface name="corenet_tcp_connect_clamd_port" lineno="14634"> <summary> Make a TCP connection to the clamd port. </summary> @@ -19260,7 +19306,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clamd_client_packets" lineno="15304"> +<interface name="corenet_send_clamd_client_packets" lineno="14654"> <summary> Send clamd_client packets. </summary> @@ -19271,7 +19317,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15323"> +<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="14673"> <summary> Do not audit attempts to send clamd_client packets. </summary> @@ -19282,7 +19328,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clamd_client_packets" lineno="15342"> +<interface name="corenet_receive_clamd_client_packets" lineno="14692"> <summary> Receive clamd_client packets. </summary> @@ -19293,7 +19339,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15361"> +<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="14711"> <summary> Do not audit attempts to receive clamd_client packets. </summary> @@ -19304,7 +19350,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clamd_client_packets" lineno="15380"> +<interface name="corenet_sendrecv_clamd_client_packets" lineno="14730"> <summary> Send and receive clamd_client packets. </summary> @@ -19315,7 +19361,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15396"> +<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="14746"> <summary> Do not audit attempts to send and receive clamd_client packets. </summary> @@ -19326,7 +19372,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clamd_client_packets" lineno="15411"> +<interface name="corenet_relabelto_clamd_client_packets" lineno="14761"> <summary> Relabel packets to clamd_client the packet type. </summary> @@ -19336,7 +19382,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clamd_server_packets" lineno="15431"> +<interface name="corenet_send_clamd_server_packets" lineno="14781"> <summary> Send clamd_server packets. </summary> @@ -19347,7 +19393,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15450"> +<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="14800"> <summary> Do not audit attempts to send clamd_server packets. </summary> @@ -19358,7 +19404,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clamd_server_packets" lineno="15469"> +<interface name="corenet_receive_clamd_server_packets" lineno="14819"> <summary> Receive clamd_server packets. </summary> @@ -19369,7 +19415,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15488"> +<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="14838"> <summary> Do not audit attempts to receive clamd_server packets. </summary> @@ -19380,7 +19426,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clamd_server_packets" lineno="15507"> +<interface name="corenet_sendrecv_clamd_server_packets" lineno="14857"> <summary> Send and receive clamd_server packets. </summary> @@ -19391,7 +19437,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15523"> +<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="14873"> <summary> Do not audit attempts to send and receive clamd_server packets. </summary> @@ -19402,7 +19448,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clamd_server_packets" lineno="15538"> +<interface name="corenet_relabelto_clamd_server_packets" lineno="14888"> <summary> Relabel packets to clamd_server the packet type. </summary> @@ -19412,7 +19458,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15560"> +<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="14910"> <summary> Send and receive TCP traffic on the clockspeed port. </summary> @@ -19423,7 +19469,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_clockspeed_port" lineno="15579"> +<interface name="corenet_udp_send_clockspeed_port" lineno="14925"> <summary> Send UDP traffic on the clockspeed port. </summary> @@ -19434,7 +19480,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15598"> +<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="14940"> <summary> Do not audit attempts to send UDP traffic on the clockspeed port. </summary> @@ -19445,7 +19491,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_clockspeed_port" lineno="15617"> +<interface name="corenet_udp_receive_clockspeed_port" lineno="14955"> <summary> Receive UDP traffic on the clockspeed port. </summary> @@ -19456,7 +19502,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15636"> +<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="14970"> <summary> Do not audit attempts to receive UDP traffic on the clockspeed port. </summary> @@ -19467,7 +19513,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15655"> +<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="14985"> <summary> Send and receive UDP traffic on the clockspeed port. </summary> @@ -19478,7 +19524,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15672"> +<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15001"> <summary> Do not audit attempts to send and receive UDP traffic on the clockspeed port. @@ -19490,7 +19536,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_clockspeed_port" lineno="15688"> +<interface name="corenet_tcp_bind_clockspeed_port" lineno="15016"> <summary> Bind TCP sockets to the clockspeed port. </summary> @@ -19501,7 +19547,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_clockspeed_port" lineno="15708"> +<interface name="corenet_udp_bind_clockspeed_port" lineno="15036"> <summary> Bind UDP sockets to the clockspeed port. </summary> @@ -19512,7 +19558,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_clockspeed_port" lineno="15727"> +<interface name="corenet_tcp_connect_clockspeed_port" lineno="15055"> <summary> Make a TCP connection to the clockspeed port. </summary> @@ -19522,7 +19568,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clockspeed_client_packets" lineno="15747"> +<interface name="corenet_send_clockspeed_client_packets" lineno="15075"> <summary> Send clockspeed_client packets. </summary> @@ -19533,7 +19579,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15766"> +<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15094"> <summary> Do not audit attempts to send clockspeed_client packets. </summary> @@ -19544,7 +19590,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clockspeed_client_packets" lineno="15785"> +<interface name="corenet_receive_clockspeed_client_packets" lineno="15113"> <summary> Receive clockspeed_client packets. </summary> @@ -19555,7 +19601,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15804"> +<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15132"> <summary> Do not audit attempts to receive clockspeed_client packets. </summary> @@ -19566,7 +19612,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15823"> +<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15151"> <summary> Send and receive clockspeed_client packets. </summary> @@ -19577,7 +19623,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15839"> +<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15167"> <summary> Do not audit attempts to send and receive clockspeed_client packets. </summary> @@ -19588,7 +19634,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15854"> +<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15182"> <summary> Relabel packets to clockspeed_client the packet type. </summary> @@ -19598,7 +19644,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clockspeed_server_packets" lineno="15874"> +<interface name="corenet_send_clockspeed_server_packets" lineno="15202"> <summary> Send clockspeed_server packets. </summary> @@ -19609,7 +19655,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15893"> +<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15221"> <summary> Do not audit attempts to send clockspeed_server packets. </summary> @@ -19620,7 +19666,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clockspeed_server_packets" lineno="15912"> +<interface name="corenet_receive_clockspeed_server_packets" lineno="15240"> <summary> Receive clockspeed_server packets. </summary> @@ -19631,7 +19677,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15931"> +<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15259"> <summary> Do not audit attempts to receive clockspeed_server packets. </summary> @@ -19642,7 +19688,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15950"> +<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15278"> <summary> Send and receive clockspeed_server packets. </summary> @@ -19653,7 +19699,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15966"> +<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15294"> <summary> Do not audit attempts to send and receive clockspeed_server packets. </summary> @@ -19664,7 +19710,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15981"> +<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15309"> <summary> Relabel packets to clockspeed_server the packet type. </summary> @@ -19674,7 +19720,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cluster_port" lineno="16003"> +<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15331"> <summary> Send and receive TCP traffic on the cluster port. </summary> @@ -19685,7 +19731,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cluster_port" lineno="16022"> +<interface name="corenet_udp_send_cluster_port" lineno="15346"> <summary> Send UDP traffic on the cluster port. </summary> @@ -19696,7 +19742,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="16041"> +<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15361"> <summary> Do not audit attempts to send UDP traffic on the cluster port. </summary> @@ -19707,7 +19753,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cluster_port" lineno="16060"> +<interface name="corenet_udp_receive_cluster_port" lineno="15376"> <summary> Receive UDP traffic on the cluster port. </summary> @@ -19718,7 +19764,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="16079"> +<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15391"> <summary> Do not audit attempts to receive UDP traffic on the cluster port. </summary> @@ -19729,7 +19775,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cluster_port" lineno="16098"> +<interface name="corenet_udp_sendrecv_cluster_port" lineno="15406"> <summary> Send and receive UDP traffic on the cluster port. </summary> @@ -19740,7 +19786,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="16115"> +<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15422"> <summary> Do not audit attempts to send and receive UDP traffic on the cluster port. @@ -19752,7 +19798,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cluster_port" lineno="16131"> +<interface name="corenet_tcp_bind_cluster_port" lineno="15437"> <summary> Bind TCP sockets to the cluster port. </summary> @@ -19763,7 +19809,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cluster_port" lineno="16151"> +<interface name="corenet_udp_bind_cluster_port" lineno="15457"> <summary> Bind UDP sockets to the cluster port. </summary> @@ -19774,7 +19820,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cluster_port" lineno="16170"> +<interface name="corenet_tcp_connect_cluster_port" lineno="15476"> <summary> Make a TCP connection to the cluster port. </summary> @@ -19784,7 +19830,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cluster_client_packets" lineno="16190"> +<interface name="corenet_send_cluster_client_packets" lineno="15496"> <summary> Send cluster_client packets. </summary> @@ -19795,7 +19841,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16209"> +<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="15515"> <summary> Do not audit attempts to send cluster_client packets. </summary> @@ -19806,7 +19852,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cluster_client_packets" lineno="16228"> +<interface name="corenet_receive_cluster_client_packets" lineno="15534"> <summary> Receive cluster_client packets. </summary> @@ -19817,7 +19863,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16247"> +<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="15553"> <summary> Do not audit attempts to receive cluster_client packets. </summary> @@ -19828,7 +19874,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cluster_client_packets" lineno="16266"> +<interface name="corenet_sendrecv_cluster_client_packets" lineno="15572"> <summary> Send and receive cluster_client packets. </summary> @@ -19839,7 +19885,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16282"> +<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="15588"> <summary> Do not audit attempts to send and receive cluster_client packets. </summary> @@ -19850,7 +19896,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cluster_client_packets" lineno="16297"> +<interface name="corenet_relabelto_cluster_client_packets" lineno="15603"> <summary> Relabel packets to cluster_client the packet type. </summary> @@ -19860,7 +19906,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cluster_server_packets" lineno="16317"> +<interface name="corenet_send_cluster_server_packets" lineno="15623"> <summary> Send cluster_server packets. </summary> @@ -19871,7 +19917,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16336"> +<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="15642"> <summary> Do not audit attempts to send cluster_server packets. </summary> @@ -19882,7 +19928,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cluster_server_packets" lineno="16355"> +<interface name="corenet_receive_cluster_server_packets" lineno="15661"> <summary> Receive cluster_server packets. </summary> @@ -19893,7 +19939,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16374"> +<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="15680"> <summary> Do not audit attempts to receive cluster_server packets. </summary> @@ -19904,7 +19950,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cluster_server_packets" lineno="16393"> +<interface name="corenet_sendrecv_cluster_server_packets" lineno="15699"> <summary> Send and receive cluster_server packets. </summary> @@ -19915,7 +19961,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16409"> +<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="15715"> <summary> Do not audit attempts to send and receive cluster_server packets. </summary> @@ -19926,7 +19972,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cluster_server_packets" lineno="16424"> +<interface name="corenet_relabelto_cluster_server_packets" lineno="15730"> <summary> Relabel packets to cluster_server the packet type. </summary> @@ -19936,7 +19982,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cma_port" lineno="16446"> +<interface name="corenet_tcp_sendrecv_cma_port" lineno="15752"> <summary> Send and receive TCP traffic on the cma port. </summary> @@ -19947,7 +19993,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cma_port" lineno="16465"> +<interface name="corenet_udp_send_cma_port" lineno="15767"> <summary> Send UDP traffic on the cma port. </summary> @@ -19958,7 +20004,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16484"> +<interface name="corenet_dontaudit_udp_send_cma_port" lineno="15782"> <summary> Do not audit attempts to send UDP traffic on the cma port. </summary> @@ -19969,7 +20015,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cma_port" lineno="16503"> +<interface name="corenet_udp_receive_cma_port" lineno="15797"> <summary> Receive UDP traffic on the cma port. </summary> @@ -19980,7 +20026,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16522"> +<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="15812"> <summary> Do not audit attempts to receive UDP traffic on the cma port. </summary> @@ -19991,7 +20037,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cma_port" lineno="16541"> +<interface name="corenet_udp_sendrecv_cma_port" lineno="15827"> <summary> Send and receive UDP traffic on the cma port. </summary> @@ -20002,7 +20048,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16558"> +<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="15843"> <summary> Do not audit attempts to send and receive UDP traffic on the cma port. @@ -20014,7 +20060,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cma_port" lineno="16574"> +<interface name="corenet_tcp_bind_cma_port" lineno="15858"> <summary> Bind TCP sockets to the cma port. </summary> @@ -20025,7 +20071,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cma_port" lineno="16594"> +<interface name="corenet_udp_bind_cma_port" lineno="15878"> <summary> Bind UDP sockets to the cma port. </summary> @@ -20036,7 +20082,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cma_port" lineno="16613"> +<interface name="corenet_tcp_connect_cma_port" lineno="15897"> <summary> Make a TCP connection to the cma port. </summary> @@ -20046,7 +20092,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cma_client_packets" lineno="16633"> +<interface name="corenet_send_cma_client_packets" lineno="15917"> <summary> Send cma_client packets. </summary> @@ -20057,7 +20103,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16652"> +<interface name="corenet_dontaudit_send_cma_client_packets" lineno="15936"> <summary> Do not audit attempts to send cma_client packets. </summary> @@ -20068,7 +20114,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cma_client_packets" lineno="16671"> +<interface name="corenet_receive_cma_client_packets" lineno="15955"> <summary> Receive cma_client packets. </summary> @@ -20079,7 +20125,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16690"> +<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="15974"> <summary> Do not audit attempts to receive cma_client packets. </summary> @@ -20090,7 +20136,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cma_client_packets" lineno="16709"> +<interface name="corenet_sendrecv_cma_client_packets" lineno="15993"> <summary> Send and receive cma_client packets. </summary> @@ -20101,7 +20147,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16725"> +<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16009"> <summary> Do not audit attempts to send and receive cma_client packets. </summary> @@ -20112,7 +20158,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cma_client_packets" lineno="16740"> +<interface name="corenet_relabelto_cma_client_packets" lineno="16024"> <summary> Relabel packets to cma_client the packet type. </summary> @@ -20122,7 +20168,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cma_server_packets" lineno="16760"> +<interface name="corenet_send_cma_server_packets" lineno="16044"> <summary> Send cma_server packets. </summary> @@ -20133,7 +20179,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16779"> +<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16063"> <summary> Do not audit attempts to send cma_server packets. </summary> @@ -20144,7 +20190,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cma_server_packets" lineno="16798"> +<interface name="corenet_receive_cma_server_packets" lineno="16082"> <summary> Receive cma_server packets. </summary> @@ -20155,7 +20201,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16817"> +<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16101"> <summary> Do not audit attempts to receive cma_server packets. </summary> @@ -20166,7 +20212,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cma_server_packets" lineno="16836"> +<interface name="corenet_sendrecv_cma_server_packets" lineno="16120"> <summary> Send and receive cma_server packets. </summary> @@ -20177,7 +20223,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16852"> +<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16136"> <summary> Do not audit attempts to send and receive cma_server packets. </summary> @@ -20188,7 +20234,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cma_server_packets" lineno="16867"> +<interface name="corenet_relabelto_cma_server_packets" lineno="16151"> <summary> Relabel packets to cma_server the packet type. </summary> @@ -20198,7 +20244,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16889"> +<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16173"> <summary> Send and receive TCP traffic on the cobbler port. </summary> @@ -20209,7 +20255,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cobbler_port" lineno="16908"> +<interface name="corenet_udp_send_cobbler_port" lineno="16188"> <summary> Send UDP traffic on the cobbler port. </summary> @@ -20220,7 +20266,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16927"> +<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16203"> <summary> Do not audit attempts to send UDP traffic on the cobbler port. </summary> @@ -20231,7 +20277,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cobbler_port" lineno="16946"> +<interface name="corenet_udp_receive_cobbler_port" lineno="16218"> <summary> Receive UDP traffic on the cobbler port. </summary> @@ -20242,7 +20288,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16965"> +<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16233"> <summary> Do not audit attempts to receive UDP traffic on the cobbler port. </summary> @@ -20253,7 +20299,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16984"> +<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16248"> <summary> Send and receive UDP traffic on the cobbler port. </summary> @@ -20264,7 +20310,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="17001"> +<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16264"> <summary> Do not audit attempts to send and receive UDP traffic on the cobbler port. @@ -20276,7 +20322,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cobbler_port" lineno="17017"> +<interface name="corenet_tcp_bind_cobbler_port" lineno="16279"> <summary> Bind TCP sockets to the cobbler port. </summary> @@ -20287,7 +20333,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cobbler_port" lineno="17037"> +<interface name="corenet_udp_bind_cobbler_port" lineno="16299"> <summary> Bind UDP sockets to the cobbler port. </summary> @@ -20298,7 +20344,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cobbler_port" lineno="17056"> +<interface name="corenet_tcp_connect_cobbler_port" lineno="16318"> <summary> Make a TCP connection to the cobbler port. </summary> @@ -20308,7 +20354,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cobbler_client_packets" lineno="17076"> +<interface name="corenet_send_cobbler_client_packets" lineno="16338"> <summary> Send cobbler_client packets. </summary> @@ -20319,7 +20365,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="17095"> +<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16357"> <summary> Do not audit attempts to send cobbler_client packets. </summary> @@ -20330,7 +20376,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cobbler_client_packets" lineno="17114"> +<interface name="corenet_receive_cobbler_client_packets" lineno="16376"> <summary> Receive cobbler_client packets. </summary> @@ -20341,7 +20387,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="17133"> +<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16395"> <summary> Do not audit attempts to receive cobbler_client packets. </summary> @@ -20352,7 +20398,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cobbler_client_packets" lineno="17152"> +<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16414"> <summary> Send and receive cobbler_client packets. </summary> @@ -20363,7 +20409,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="17168"> +<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16430"> <summary> Do not audit attempts to send and receive cobbler_client packets. </summary> @@ -20374,7 +20420,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cobbler_client_packets" lineno="17183"> +<interface name="corenet_relabelto_cobbler_client_packets" lineno="16445"> <summary> Relabel packets to cobbler_client the packet type. </summary> @@ -20384,7 +20430,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cobbler_server_packets" lineno="17203"> +<interface name="corenet_send_cobbler_server_packets" lineno="16465"> <summary> Send cobbler_server packets. </summary> @@ -20395,7 +20441,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17222"> +<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="16484"> <summary> Do not audit attempts to send cobbler_server packets. </summary> @@ -20406,7 +20452,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cobbler_server_packets" lineno="17241"> +<interface name="corenet_receive_cobbler_server_packets" lineno="16503"> <summary> Receive cobbler_server packets. </summary> @@ -20417,7 +20463,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17260"> +<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="16522"> <summary> Do not audit attempts to receive cobbler_server packets. </summary> @@ -20428,7 +20474,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17279"> +<interface name="corenet_sendrecv_cobbler_server_packets" lineno="16541"> <summary> Send and receive cobbler_server packets. </summary> @@ -20439,7 +20485,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17295"> +<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="16557"> <summary> Do not audit attempts to send and receive cobbler_server packets. </summary> @@ -20450,7 +20496,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cobbler_server_packets" lineno="17310"> +<interface name="corenet_relabelto_cobbler_server_packets" lineno="16572"> <summary> Relabel packets to cobbler_server the packet type. </summary> @@ -20460,7 +20506,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17332"> +<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="16594"> <summary> Send and receive TCP traffic on the commplex_link port. </summary> @@ -20471,7 +20517,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_commplex_link_port" lineno="17351"> +<interface name="corenet_udp_send_commplex_link_port" lineno="16609"> <summary> Send UDP traffic on the commplex_link port. </summary> @@ -20482,7 +20528,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17370"> +<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="16624"> <summary> Do not audit attempts to send UDP traffic on the commplex_link port. </summary> @@ -20493,7 +20539,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_commplex_link_port" lineno="17389"> +<interface name="corenet_udp_receive_commplex_link_port" lineno="16639"> <summary> Receive UDP traffic on the commplex_link port. </summary> @@ -20504,7 +20550,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17408"> +<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="16654"> <summary> Do not audit attempts to receive UDP traffic on the commplex_link port. </summary> @@ -20515,7 +20561,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17427"> +<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="16669"> <summary> Send and receive UDP traffic on the commplex_link port. </summary> @@ -20526,7 +20572,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17444"> +<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="16685"> <summary> Do not audit attempts to send and receive UDP traffic on the commplex_link port. @@ -20538,7 +20584,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_commplex_link_port" lineno="17460"> +<interface name="corenet_tcp_bind_commplex_link_port" lineno="16700"> <summary> Bind TCP sockets to the commplex_link port. </summary> @@ -20549,7 +20595,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_commplex_link_port" lineno="17480"> +<interface name="corenet_udp_bind_commplex_link_port" lineno="16720"> <summary> Bind UDP sockets to the commplex_link port. </summary> @@ -20560,7 +20606,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_commplex_link_port" lineno="17499"> +<interface name="corenet_tcp_connect_commplex_link_port" lineno="16739"> <summary> Make a TCP connection to the commplex_link port. </summary> @@ -20570,7 +20616,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_link_client_packets" lineno="17519"> +<interface name="corenet_send_commplex_link_client_packets" lineno="16759"> <summary> Send commplex_link_client packets. </summary> @@ -20581,7 +20627,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17538"> +<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="16778"> <summary> Do not audit attempts to send commplex_link_client packets. </summary> @@ -20592,7 +20638,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_link_client_packets" lineno="17557"> +<interface name="corenet_receive_commplex_link_client_packets" lineno="16797"> <summary> Receive commplex_link_client packets. </summary> @@ -20603,7 +20649,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17576"> +<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="16816"> <summary> Do not audit attempts to receive commplex_link_client packets. </summary> @@ -20614,7 +20660,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17595"> +<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="16835"> <summary> Send and receive commplex_link_client packets. </summary> @@ -20625,7 +20671,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17611"> +<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="16851"> <summary> Do not audit attempts to send and receive commplex_link_client packets. </summary> @@ -20636,7 +20682,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17626"> +<interface name="corenet_relabelto_commplex_link_client_packets" lineno="16866"> <summary> Relabel packets to commplex_link_client the packet type. </summary> @@ -20646,7 +20692,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_link_server_packets" lineno="17646"> +<interface name="corenet_send_commplex_link_server_packets" lineno="16886"> <summary> Send commplex_link_server packets. </summary> @@ -20657,7 +20703,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17665"> +<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="16905"> <summary> Do not audit attempts to send commplex_link_server packets. </summary> @@ -20668,7 +20714,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_link_server_packets" lineno="17684"> +<interface name="corenet_receive_commplex_link_server_packets" lineno="16924"> <summary> Receive commplex_link_server packets. </summary> @@ -20679,7 +20725,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17703"> +<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="16943"> <summary> Do not audit attempts to receive commplex_link_server packets. </summary> @@ -20690,7 +20736,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17722"> +<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="16962"> <summary> Send and receive commplex_link_server packets. </summary> @@ -20701,7 +20747,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17738"> +<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="16978"> <summary> Do not audit attempts to send and receive commplex_link_server packets. </summary> @@ -20712,7 +20758,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17753"> +<interface name="corenet_relabelto_commplex_link_server_packets" lineno="16993"> <summary> Relabel packets to commplex_link_server the packet type. </summary> @@ -20722,7 +20768,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17775"> +<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17015"> <summary> Send and receive TCP traffic on the commplex_main port. </summary> @@ -20733,7 +20779,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_commplex_main_port" lineno="17794"> +<interface name="corenet_udp_send_commplex_main_port" lineno="17030"> <summary> Send UDP traffic on the commplex_main port. </summary> @@ -20744,7 +20790,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17813"> +<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17045"> <summary> Do not audit attempts to send UDP traffic on the commplex_main port. </summary> @@ -20755,7 +20801,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_commplex_main_port" lineno="17832"> +<interface name="corenet_udp_receive_commplex_main_port" lineno="17060"> <summary> Receive UDP traffic on the commplex_main port. </summary> @@ -20766,7 +20812,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17851"> +<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17075"> <summary> Do not audit attempts to receive UDP traffic on the commplex_main port. </summary> @@ -20777,7 +20823,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17870"> +<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17090"> <summary> Send and receive UDP traffic on the commplex_main port. </summary> @@ -20788,7 +20834,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17887"> +<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17106"> <summary> Do not audit attempts to send and receive UDP traffic on the commplex_main port. @@ -20800,7 +20846,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_commplex_main_port" lineno="17903"> +<interface name="corenet_tcp_bind_commplex_main_port" lineno="17121"> <summary> Bind TCP sockets to the commplex_main port. </summary> @@ -20811,7 +20857,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_commplex_main_port" lineno="17923"> +<interface name="corenet_udp_bind_commplex_main_port" lineno="17141"> <summary> Bind UDP sockets to the commplex_main port. </summary> @@ -20822,7 +20868,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_commplex_main_port" lineno="17942"> +<interface name="corenet_tcp_connect_commplex_main_port" lineno="17160"> <summary> Make a TCP connection to the commplex_main port. </summary> @@ -20832,7 +20878,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_main_client_packets" lineno="17962"> +<interface name="corenet_send_commplex_main_client_packets" lineno="17180"> <summary> Send commplex_main_client packets. </summary> @@ -20843,7 +20889,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17981"> +<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17199"> <summary> Do not audit attempts to send commplex_main_client packets. </summary> @@ -20854,7 +20900,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_main_client_packets" lineno="18000"> +<interface name="corenet_receive_commplex_main_client_packets" lineno="17218"> <summary> Receive commplex_main_client packets. </summary> @@ -20865,7 +20911,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="18019"> +<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17237"> <summary> Do not audit attempts to receive commplex_main_client packets. </summary> @@ -20876,7 +20922,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="18038"> +<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17256"> <summary> Send and receive commplex_main_client packets. </summary> @@ -20887,7 +20933,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="18054"> +<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17272"> <summary> Do not audit attempts to send and receive commplex_main_client packets. </summary> @@ -20898,7 +20944,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_main_client_packets" lineno="18069"> +<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17287"> <summary> Relabel packets to commplex_main_client the packet type. </summary> @@ -20908,7 +20954,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_main_server_packets" lineno="18089"> +<interface name="corenet_send_commplex_main_server_packets" lineno="17307"> <summary> Send commplex_main_server packets. </summary> @@ -20919,7 +20965,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="18108"> +<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17326"> <summary> Do not audit attempts to send commplex_main_server packets. </summary> @@ -20930,7 +20976,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_main_server_packets" lineno="18127"> +<interface name="corenet_receive_commplex_main_server_packets" lineno="17345"> <summary> Receive commplex_main_server packets. </summary> @@ -20941,7 +20987,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="18146"> +<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17364"> <summary> Do not audit attempts to receive commplex_main_server packets. </summary> @@ -20952,7 +20998,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="18165"> +<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17383"> <summary> Send and receive commplex_main_server packets. </summary> @@ -20963,7 +21009,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="18181"> +<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17399"> <summary> Do not audit attempts to send and receive commplex_main_server packets. </summary> @@ -20974,7 +21020,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_main_server_packets" lineno="18196"> +<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17414"> <summary> Relabel packets to commplex_main_server the packet type. </summary> @@ -20984,7 +21030,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_comsat_port" lineno="18218"> +<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17436"> <summary> Send and receive TCP traffic on the comsat port. </summary> @@ -20995,7 +21041,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_comsat_port" lineno="18237"> +<interface name="corenet_udp_send_comsat_port" lineno="17451"> <summary> Send UDP traffic on the comsat port. </summary> @@ -21006,7 +21052,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18256"> +<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="17466"> <summary> Do not audit attempts to send UDP traffic on the comsat port. </summary> @@ -21017,7 +21063,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_comsat_port" lineno="18275"> +<interface name="corenet_udp_receive_comsat_port" lineno="17481"> <summary> Receive UDP traffic on the comsat port. </summary> @@ -21028,7 +21074,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18294"> +<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="17496"> <summary> Do not audit attempts to receive UDP traffic on the comsat port. </summary> @@ -21039,7 +21085,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_comsat_port" lineno="18313"> +<interface name="corenet_udp_sendrecv_comsat_port" lineno="17511"> <summary> Send and receive UDP traffic on the comsat port. </summary> @@ -21050,7 +21096,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18330"> +<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="17527"> <summary> Do not audit attempts to send and receive UDP traffic on the comsat port. @@ -21062,7 +21108,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_comsat_port" lineno="18346"> +<interface name="corenet_tcp_bind_comsat_port" lineno="17542"> <summary> Bind TCP sockets to the comsat port. </summary> @@ -21073,7 +21119,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_comsat_port" lineno="18366"> +<interface name="corenet_udp_bind_comsat_port" lineno="17562"> <summary> Bind UDP sockets to the comsat port. </summary> @@ -21084,7 +21130,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_comsat_port" lineno="18385"> +<interface name="corenet_tcp_connect_comsat_port" lineno="17581"> <summary> Make a TCP connection to the comsat port. </summary> @@ -21094,7 +21140,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_comsat_client_packets" lineno="18405"> +<interface name="corenet_send_comsat_client_packets" lineno="17601"> <summary> Send comsat_client packets. </summary> @@ -21105,7 +21151,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18424"> +<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="17620"> <summary> Do not audit attempts to send comsat_client packets. </summary> @@ -21116,7 +21162,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_comsat_client_packets" lineno="18443"> +<interface name="corenet_receive_comsat_client_packets" lineno="17639"> <summary> Receive comsat_client packets. </summary> @@ -21127,7 +21173,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18462"> +<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="17658"> <summary> Do not audit attempts to receive comsat_client packets. </summary> @@ -21138,7 +21184,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_comsat_client_packets" lineno="18481"> +<interface name="corenet_sendrecv_comsat_client_packets" lineno="17677"> <summary> Send and receive comsat_client packets. </summary> @@ -21149,7 +21195,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18497"> +<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="17693"> <summary> Do not audit attempts to send and receive comsat_client packets. </summary> @@ -21160,7 +21206,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_comsat_client_packets" lineno="18512"> +<interface name="corenet_relabelto_comsat_client_packets" lineno="17708"> <summary> Relabel packets to comsat_client the packet type. </summary> @@ -21170,7 +21216,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_comsat_server_packets" lineno="18532"> +<interface name="corenet_send_comsat_server_packets" lineno="17728"> <summary> Send comsat_server packets. </summary> @@ -21181,7 +21227,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18551"> +<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="17747"> <summary> Do not audit attempts to send comsat_server packets. </summary> @@ -21192,7 +21238,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_comsat_server_packets" lineno="18570"> +<interface name="corenet_receive_comsat_server_packets" lineno="17766"> <summary> Receive comsat_server packets. </summary> @@ -21203,7 +21249,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18589"> +<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="17785"> <summary> Do not audit attempts to receive comsat_server packets. </summary> @@ -21214,7 +21260,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_comsat_server_packets" lineno="18608"> +<interface name="corenet_sendrecv_comsat_server_packets" lineno="17804"> <summary> Send and receive comsat_server packets. </summary> @@ -21225,7 +21271,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18624"> +<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="17820"> <summary> Do not audit attempts to send and receive comsat_server packets. </summary> @@ -21236,7 +21282,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_comsat_server_packets" lineno="18639"> +<interface name="corenet_relabelto_comsat_server_packets" lineno="17835"> <summary> Relabel packets to comsat_server the packet type. </summary> @@ -21246,7 +21292,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_condor_port" lineno="18661"> +<interface name="corenet_tcp_sendrecv_condor_port" lineno="17857"> <summary> Send and receive TCP traffic on the condor port. </summary> @@ -21257,7 +21303,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_condor_port" lineno="18680"> +<interface name="corenet_udp_send_condor_port" lineno="17872"> <summary> Send UDP traffic on the condor port. </summary> @@ -21268,7 +21314,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18699"> +<interface name="corenet_dontaudit_udp_send_condor_port" lineno="17887"> <summary> Do not audit attempts to send UDP traffic on the condor port. </summary> @@ -21279,7 +21325,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_condor_port" lineno="18718"> +<interface name="corenet_udp_receive_condor_port" lineno="17902"> <summary> Receive UDP traffic on the condor port. </summary> @@ -21290,7 +21336,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18737"> +<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="17917"> <summary> Do not audit attempts to receive UDP traffic on the condor port. </summary> @@ -21301,7 +21347,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_condor_port" lineno="18756"> +<interface name="corenet_udp_sendrecv_condor_port" lineno="17932"> <summary> Send and receive UDP traffic on the condor port. </summary> @@ -21312,7 +21358,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18773"> +<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="17948"> <summary> Do not audit attempts to send and receive UDP traffic on the condor port. @@ -21324,7 +21370,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_condor_port" lineno="18789"> +<interface name="corenet_tcp_bind_condor_port" lineno="17963"> <summary> Bind TCP sockets to the condor port. </summary> @@ -21335,7 +21381,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_condor_port" lineno="18809"> +<interface name="corenet_udp_bind_condor_port" lineno="17983"> <summary> Bind UDP sockets to the condor port. </summary> @@ -21346,7 +21392,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_condor_port" lineno="18828"> +<interface name="corenet_tcp_connect_condor_port" lineno="18002"> <summary> Make a TCP connection to the condor port. </summary> @@ -21356,7 +21402,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_condor_client_packets" lineno="18848"> +<interface name="corenet_send_condor_client_packets" lineno="18022"> <summary> Send condor_client packets. </summary> @@ -21367,7 +21413,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18867"> +<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18041"> <summary> Do not audit attempts to send condor_client packets. </summary> @@ -21378,7 +21424,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_condor_client_packets" lineno="18886"> +<interface name="corenet_receive_condor_client_packets" lineno="18060"> <summary> Receive condor_client packets. </summary> @@ -21389,7 +21435,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18905"> +<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18079"> <summary> Do not audit attempts to receive condor_client packets. </summary> @@ -21400,7 +21446,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_condor_client_packets" lineno="18924"> +<interface name="corenet_sendrecv_condor_client_packets" lineno="18098"> <summary> Send and receive condor_client packets. </summary> @@ -21411,7 +21457,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18940"> +<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18114"> <summary> Do not audit attempts to send and receive condor_client packets. </summary> @@ -21422,7 +21468,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_condor_client_packets" lineno="18955"> +<interface name="corenet_relabelto_condor_client_packets" lineno="18129"> <summary> Relabel packets to condor_client the packet type. </summary> @@ -21432,7 +21478,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_condor_server_packets" lineno="18975"> +<interface name="corenet_send_condor_server_packets" lineno="18149"> <summary> Send condor_server packets. </summary> @@ -21443,7 +21489,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18994"> +<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18168"> <summary> Do not audit attempts to send condor_server packets. </summary> @@ -21454,7 +21500,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_condor_server_packets" lineno="19013"> +<interface name="corenet_receive_condor_server_packets" lineno="18187"> <summary> Receive condor_server packets. </summary> @@ -21465,7 +21511,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="19032"> +<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18206"> <summary> Do not audit attempts to receive condor_server packets. </summary> @@ -21476,7 +21522,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_condor_server_packets" lineno="19051"> +<interface name="corenet_sendrecv_condor_server_packets" lineno="18225"> <summary> Send and receive condor_server packets. </summary> @@ -21487,7 +21533,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="19067"> +<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18241"> <summary> Do not audit attempts to send and receive condor_server packets. </summary> @@ -21498,7 +21544,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_condor_server_packets" lineno="19082"> +<interface name="corenet_relabelto_condor_server_packets" lineno="18256"> <summary> Relabel packets to condor_server the packet type. </summary> @@ -21508,7 +21554,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="19104"> +<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18278"> <summary> Send and receive TCP traffic on the couchdb port. </summary> @@ -21519,7 +21565,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_couchdb_port" lineno="19123"> +<interface name="corenet_udp_send_couchdb_port" lineno="18293"> <summary> Send UDP traffic on the couchdb port. </summary> @@ -21530,7 +21576,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="19142"> +<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18308"> <summary> Do not audit attempts to send UDP traffic on the couchdb port. </summary> @@ -21541,7 +21587,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_couchdb_port" lineno="19161"> +<interface name="corenet_udp_receive_couchdb_port" lineno="18323"> <summary> Receive UDP traffic on the couchdb port. </summary> @@ -21552,7 +21598,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="19180"> +<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18338"> <summary> Do not audit attempts to receive UDP traffic on the couchdb port. </summary> @@ -21563,7 +21609,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_couchdb_port" lineno="19199"> +<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18353"> <summary> Send and receive UDP traffic on the couchdb port. </summary> @@ -21574,7 +21620,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="19216"> +<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18369"> <summary> Do not audit attempts to send and receive UDP traffic on the couchdb port. @@ -21586,7 +21632,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_couchdb_port" lineno="19232"> +<interface name="corenet_tcp_bind_couchdb_port" lineno="18384"> <summary> Bind TCP sockets to the couchdb port. </summary> @@ -21597,7 +21643,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_couchdb_port" lineno="19252"> +<interface name="corenet_udp_bind_couchdb_port" lineno="18404"> <summary> Bind UDP sockets to the couchdb port. </summary> @@ -21608,7 +21654,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_couchdb_port" lineno="19271"> +<interface name="corenet_tcp_connect_couchdb_port" lineno="18423"> <summary> Make a TCP connection to the couchdb port. </summary> @@ -21618,7 +21664,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_couchdb_client_packets" lineno="19291"> +<interface name="corenet_send_couchdb_client_packets" lineno="18443"> <summary> Send couchdb_client packets. </summary> @@ -21629,7 +21675,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19310"> +<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="18462"> <summary> Do not audit attempts to send couchdb_client packets. </summary> @@ -21640,7 +21686,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_couchdb_client_packets" lineno="19329"> +<interface name="corenet_receive_couchdb_client_packets" lineno="18481"> <summary> Receive couchdb_client packets. </summary> @@ -21651,7 +21697,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19348"> +<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="18500"> <summary> Do not audit attempts to receive couchdb_client packets. </summary> @@ -21662,7 +21708,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19367"> +<interface name="corenet_sendrecv_couchdb_client_packets" lineno="18519"> <summary> Send and receive couchdb_client packets. </summary> @@ -21673,7 +21719,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19383"> +<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="18535"> <summary> Do not audit attempts to send and receive couchdb_client packets. </summary> @@ -21684,7 +21730,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_couchdb_client_packets" lineno="19398"> +<interface name="corenet_relabelto_couchdb_client_packets" lineno="18550"> <summary> Relabel packets to couchdb_client the packet type. </summary> @@ -21694,7 +21740,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_couchdb_server_packets" lineno="19418"> +<interface name="corenet_send_couchdb_server_packets" lineno="18570"> <summary> Send couchdb_server packets. </summary> @@ -21705,7 +21751,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19437"> +<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="18589"> <summary> Do not audit attempts to send couchdb_server packets. </summary> @@ -21716,7 +21762,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_couchdb_server_packets" lineno="19456"> +<interface name="corenet_receive_couchdb_server_packets" lineno="18608"> <summary> Receive couchdb_server packets. </summary> @@ -21727,7 +21773,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19475"> +<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="18627"> <summary> Do not audit attempts to receive couchdb_server packets. </summary> @@ -21738,7 +21784,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19494"> +<interface name="corenet_sendrecv_couchdb_server_packets" lineno="18646"> <summary> Send and receive couchdb_server packets. </summary> @@ -21749,7 +21795,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19510"> +<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="18662"> <summary> Do not audit attempts to send and receive couchdb_server packets. </summary> @@ -21760,7 +21806,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_couchdb_server_packets" lineno="19525"> +<interface name="corenet_relabelto_couchdb_server_packets" lineno="18677"> <summary> Relabel packets to couchdb_server the packet type. </summary> @@ -21770,7 +21816,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19547"> +<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="18699"> <summary> Send and receive TCP traffic on the cslistener port. </summary> @@ -21781,7 +21827,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cslistener_port" lineno="19566"> +<interface name="corenet_udp_send_cslistener_port" lineno="18714"> <summary> Send UDP traffic on the cslistener port. </summary> @@ -21792,7 +21838,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19585"> +<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="18729"> <summary> Do not audit attempts to send UDP traffic on the cslistener port. </summary> @@ -21803,7 +21849,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cslistener_port" lineno="19604"> +<interface name="corenet_udp_receive_cslistener_port" lineno="18744"> <summary> Receive UDP traffic on the cslistener port. </summary> @@ -21814,7 +21860,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19623"> +<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="18759"> <summary> Do not audit attempts to receive UDP traffic on the cslistener port. </summary> @@ -21825,7 +21871,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19642"> +<interface name="corenet_udp_sendrecv_cslistener_port" lineno="18774"> <summary> Send and receive UDP traffic on the cslistener port. </summary> @@ -21836,7 +21882,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19659"> +<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="18790"> <summary> Do not audit attempts to send and receive UDP traffic on the cslistener port. @@ -21848,7 +21894,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cslistener_port" lineno="19675"> +<interface name="corenet_tcp_bind_cslistener_port" lineno="18805"> <summary> Bind TCP sockets to the cslistener port. </summary> @@ -21859,7 +21905,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cslistener_port" lineno="19695"> +<interface name="corenet_udp_bind_cslistener_port" lineno="18825"> <summary> Bind UDP sockets to the cslistener port. </summary> @@ -21870,7 +21916,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cslistener_port" lineno="19714"> +<interface name="corenet_tcp_connect_cslistener_port" lineno="18844"> <summary> Make a TCP connection to the cslistener port. </summary> @@ -21880,7 +21926,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cslistener_client_packets" lineno="19734"> +<interface name="corenet_send_cslistener_client_packets" lineno="18864"> <summary> Send cslistener_client packets. </summary> @@ -21891,7 +21937,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19753"> +<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="18883"> <summary> Do not audit attempts to send cslistener_client packets. </summary> @@ -21902,7 +21948,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cslistener_client_packets" lineno="19772"> +<interface name="corenet_receive_cslistener_client_packets" lineno="18902"> <summary> Receive cslistener_client packets. </summary> @@ -21913,7 +21959,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19791"> +<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="18921"> <summary> Do not audit attempts to receive cslistener_client packets. </summary> @@ -21924,7 +21970,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19810"> +<interface name="corenet_sendrecv_cslistener_client_packets" lineno="18940"> <summary> Send and receive cslistener_client packets. </summary> @@ -21935,7 +21981,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19826"> +<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="18956"> <summary> Do not audit attempts to send and receive cslistener_client packets. </summary> @@ -21946,7 +21992,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cslistener_client_packets" lineno="19841"> +<interface name="corenet_relabelto_cslistener_client_packets" lineno="18971"> <summary> Relabel packets to cslistener_client the packet type. </summary> @@ -21956,7 +22002,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cslistener_server_packets" lineno="19861"> +<interface name="corenet_send_cslistener_server_packets" lineno="18991"> <summary> Send cslistener_server packets. </summary> @@ -21967,7 +22013,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19880"> +<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19010"> <summary> Do not audit attempts to send cslistener_server packets. </summary> @@ -21978,7 +22024,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cslistener_server_packets" lineno="19899"> +<interface name="corenet_receive_cslistener_server_packets" lineno="19029"> <summary> Receive cslistener_server packets. </summary> @@ -21989,7 +22035,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19918"> +<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19048"> <summary> Do not audit attempts to receive cslistener_server packets. </summary> @@ -22000,7 +22046,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19937"> +<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19067"> <summary> Send and receive cslistener_server packets. </summary> @@ -22011,7 +22057,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19953"> +<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19083"> <summary> Do not audit attempts to send and receive cslistener_server packets. </summary> @@ -22022,7 +22068,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cslistener_server_packets" lineno="19968"> +<interface name="corenet_relabelto_cslistener_server_packets" lineno="19098"> <summary> Relabel packets to cslistener_server the packet type. </summary> @@ -22032,7 +22078,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19990"> +<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19120"> <summary> Send and receive TCP traffic on the ctdb port. </summary> @@ -22043,7 +22089,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ctdb_port" lineno="20009"> +<interface name="corenet_udp_send_ctdb_port" lineno="19135"> <summary> Send UDP traffic on the ctdb port. </summary> @@ -22054,7 +22100,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="20028"> +<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19150"> <summary> Do not audit attempts to send UDP traffic on the ctdb port. </summary> @@ -22065,7 +22111,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ctdb_port" lineno="20047"> +<interface name="corenet_udp_receive_ctdb_port" lineno="19165"> <summary> Receive UDP traffic on the ctdb port. </summary> @@ -22076,7 +22122,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="20066"> +<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19180"> <summary> Do not audit attempts to receive UDP traffic on the ctdb port. </summary> @@ -22087,7 +22133,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ctdb_port" lineno="20085"> +<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19195"> <summary> Send and receive UDP traffic on the ctdb port. </summary> @@ -22098,7 +22144,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="20102"> +<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19211"> <summary> Do not audit attempts to send and receive UDP traffic on the ctdb port. @@ -22110,7 +22156,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ctdb_port" lineno="20118"> +<interface name="corenet_tcp_bind_ctdb_port" lineno="19226"> <summary> Bind TCP sockets to the ctdb port. </summary> @@ -22121,7 +22167,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ctdb_port" lineno="20138"> +<interface name="corenet_udp_bind_ctdb_port" lineno="19246"> <summary> Bind UDP sockets to the ctdb port. </summary> @@ -22132,7 +22178,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ctdb_port" lineno="20157"> +<interface name="corenet_tcp_connect_ctdb_port" lineno="19265"> <summary> Make a TCP connection to the ctdb port. </summary> @@ -22142,7 +22188,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ctdb_client_packets" lineno="20177"> +<interface name="corenet_send_ctdb_client_packets" lineno="19285"> <summary> Send ctdb_client packets. </summary> @@ -22153,7 +22199,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="20196"> +<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19304"> <summary> Do not audit attempts to send ctdb_client packets. </summary> @@ -22164,7 +22210,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ctdb_client_packets" lineno="20215"> +<interface name="corenet_receive_ctdb_client_packets" lineno="19323"> <summary> Receive ctdb_client packets. </summary> @@ -22175,7 +22221,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="20234"> +<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19342"> <summary> Do not audit attempts to receive ctdb_client packets. </summary> @@ -22186,7 +22232,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ctdb_client_packets" lineno="20253"> +<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19361"> <summary> Send and receive ctdb_client packets. </summary> @@ -22197,7 +22243,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="20269"> +<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19377"> <summary> Do not audit attempts to send and receive ctdb_client packets. </summary> @@ -22208,7 +22254,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ctdb_client_packets" lineno="20284"> +<interface name="corenet_relabelto_ctdb_client_packets" lineno="19392"> <summary> Relabel packets to ctdb_client the packet type. </summary> @@ -22218,7 +22264,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ctdb_server_packets" lineno="20304"> +<interface name="corenet_send_ctdb_server_packets" lineno="19412"> <summary> Send ctdb_server packets. </summary> @@ -22229,7 +22275,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="20323"> +<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19431"> <summary> Do not audit attempts to send ctdb_server packets. </summary> @@ -22240,7 +22286,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ctdb_server_packets" lineno="20342"> +<interface name="corenet_receive_ctdb_server_packets" lineno="19450"> <summary> Receive ctdb_server packets. </summary> @@ -22251,7 +22297,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20361"> +<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="19469"> <summary> Do not audit attempts to receive ctdb_server packets. </summary> @@ -22262,7 +22308,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20380"> +<interface name="corenet_sendrecv_ctdb_server_packets" lineno="19488"> <summary> Send and receive ctdb_server packets. </summary> @@ -22273,7 +22319,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20396"> +<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="19504"> <summary> Do not audit attempts to send and receive ctdb_server packets. </summary> @@ -22284,7 +22330,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ctdb_server_packets" lineno="20411"> +<interface name="corenet_relabelto_ctdb_server_packets" lineno="19519"> <summary> Relabel packets to ctdb_server the packet type. </summary> @@ -22294,7 +22340,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20433"> +<interface name="corenet_tcp_sendrecv_cvs_port" lineno="19541"> <summary> Send and receive TCP traffic on the cvs port. </summary> @@ -22305,7 +22351,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cvs_port" lineno="20452"> +<interface name="corenet_udp_send_cvs_port" lineno="19556"> <summary> Send UDP traffic on the cvs port. </summary> @@ -22316,7 +22362,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20471"> +<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="19571"> <summary> Do not audit attempts to send UDP traffic on the cvs port. </summary> @@ -22327,7 +22373,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cvs_port" lineno="20490"> +<interface name="corenet_udp_receive_cvs_port" lineno="19586"> <summary> Receive UDP traffic on the cvs port. </summary> @@ -22338,7 +22384,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20509"> +<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="19601"> <summary> Do not audit attempts to receive UDP traffic on the cvs port. </summary> @@ -22349,7 +22395,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cvs_port" lineno="20528"> +<interface name="corenet_udp_sendrecv_cvs_port" lineno="19616"> <summary> Send and receive UDP traffic on the cvs port. </summary> @@ -22360,7 +22406,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20545"> +<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="19632"> <summary> Do not audit attempts to send and receive UDP traffic on the cvs port. @@ -22372,7 +22418,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cvs_port" lineno="20561"> +<interface name="corenet_tcp_bind_cvs_port" lineno="19647"> <summary> Bind TCP sockets to the cvs port. </summary> @@ -22383,7 +22429,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cvs_port" lineno="20581"> +<interface name="corenet_udp_bind_cvs_port" lineno="19667"> <summary> Bind UDP sockets to the cvs port. </summary> @@ -22394,7 +22440,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cvs_port" lineno="20600"> +<interface name="corenet_tcp_connect_cvs_port" lineno="19686"> <summary> Make a TCP connection to the cvs port. </summary> @@ -22404,7 +22450,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cvs_client_packets" lineno="20620"> +<interface name="corenet_send_cvs_client_packets" lineno="19706"> <summary> Send cvs_client packets. </summary> @@ -22415,7 +22461,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20639"> +<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="19725"> <summary> Do not audit attempts to send cvs_client packets. </summary> @@ -22426,7 +22472,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cvs_client_packets" lineno="20658"> +<interface name="corenet_receive_cvs_client_packets" lineno="19744"> <summary> Receive cvs_client packets. </summary> @@ -22437,7 +22483,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20677"> +<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="19763"> <summary> Do not audit attempts to receive cvs_client packets. </summary> @@ -22448,7 +22494,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cvs_client_packets" lineno="20696"> +<interface name="corenet_sendrecv_cvs_client_packets" lineno="19782"> <summary> Send and receive cvs_client packets. </summary> @@ -22459,7 +22505,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20712"> +<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="19798"> <summary> Do not audit attempts to send and receive cvs_client packets. </summary> @@ -22470,7 +22516,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cvs_client_packets" lineno="20727"> +<interface name="corenet_relabelto_cvs_client_packets" lineno="19813"> <summary> Relabel packets to cvs_client the packet type. </summary> @@ -22480,7 +22526,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cvs_server_packets" lineno="20747"> +<interface name="corenet_send_cvs_server_packets" lineno="19833"> <summary> Send cvs_server packets. </summary> @@ -22491,7 +22537,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20766"> +<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="19852"> <summary> Do not audit attempts to send cvs_server packets. </summary> @@ -22502,7 +22548,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cvs_server_packets" lineno="20785"> +<interface name="corenet_receive_cvs_server_packets" lineno="19871"> <summary> Receive cvs_server packets. </summary> @@ -22513,7 +22559,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20804"> +<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="19890"> <summary> Do not audit attempts to receive cvs_server packets. </summary> @@ -22524,7 +22570,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cvs_server_packets" lineno="20823"> +<interface name="corenet_sendrecv_cvs_server_packets" lineno="19909"> <summary> Send and receive cvs_server packets. </summary> @@ -22535,7 +22581,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20839"> +<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="19925"> <summary> Do not audit attempts to send and receive cvs_server packets. </summary> @@ -22546,7 +22592,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cvs_server_packets" lineno="20854"> +<interface name="corenet_relabelto_cvs_server_packets" lineno="19940"> <summary> Relabel packets to cvs_server the packet type. </summary> @@ -22556,7 +22602,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20876"> +<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="19962"> <summary> Send and receive TCP traffic on the cyphesis port. </summary> @@ -22567,7 +22613,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cyphesis_port" lineno="20895"> +<interface name="corenet_udp_send_cyphesis_port" lineno="19977"> <summary> Send UDP traffic on the cyphesis port. </summary> @@ -22578,7 +22624,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20914"> +<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="19992"> <summary> Do not audit attempts to send UDP traffic on the cyphesis port. </summary> @@ -22589,7 +22635,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cyphesis_port" lineno="20933"> +<interface name="corenet_udp_receive_cyphesis_port" lineno="20007"> <summary> Receive UDP traffic on the cyphesis port. </summary> @@ -22600,7 +22646,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20952"> +<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20022"> <summary> Do not audit attempts to receive UDP traffic on the cyphesis port. </summary> @@ -22611,7 +22657,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20971"> +<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20037"> <summary> Send and receive UDP traffic on the cyphesis port. </summary> @@ -22622,7 +22668,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20988"> +<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20053"> <summary> Do not audit attempts to send and receive UDP traffic on the cyphesis port. @@ -22634,7 +22680,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cyphesis_port" lineno="21004"> +<interface name="corenet_tcp_bind_cyphesis_port" lineno="20068"> <summary> Bind TCP sockets to the cyphesis port. </summary> @@ -22645,7 +22691,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cyphesis_port" lineno="21024"> +<interface name="corenet_udp_bind_cyphesis_port" lineno="20088"> <summary> Bind UDP sockets to the cyphesis port. </summary> @@ -22656,7 +22702,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cyphesis_port" lineno="21043"> +<interface name="corenet_tcp_connect_cyphesis_port" lineno="20107"> <summary> Make a TCP connection to the cyphesis port. </summary> @@ -22666,7 +22712,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cyphesis_client_packets" lineno="21063"> +<interface name="corenet_send_cyphesis_client_packets" lineno="20127"> <summary> Send cyphesis_client packets. </summary> @@ -22677,7 +22723,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="21082"> +<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20146"> <summary> Do not audit attempts to send cyphesis_client packets. </summary> @@ -22688,7 +22734,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cyphesis_client_packets" lineno="21101"> +<interface name="corenet_receive_cyphesis_client_packets" lineno="20165"> <summary> Receive cyphesis_client packets. </summary> @@ -22699,7 +22745,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="21120"> +<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20184"> <summary> Do not audit attempts to receive cyphesis_client packets. </summary> @@ -22710,7 +22756,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="21139"> +<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20203"> <summary> Send and receive cyphesis_client packets. </summary> @@ -22721,7 +22767,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="21155"> +<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20219"> <summary> Do not audit attempts to send and receive cyphesis_client packets. </summary> @@ -22732,7 +22778,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cyphesis_client_packets" lineno="21170"> +<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20234"> <summary> Relabel packets to cyphesis_client the packet type. </summary> @@ -22742,7 +22788,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cyphesis_server_packets" lineno="21190"> +<interface name="corenet_send_cyphesis_server_packets" lineno="20254"> <summary> Send cyphesis_server packets. </summary> @@ -22753,7 +22799,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="21209"> +<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20273"> <summary> Do not audit attempts to send cyphesis_server packets. </summary> @@ -22764,7 +22810,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cyphesis_server_packets" lineno="21228"> +<interface name="corenet_receive_cyphesis_server_packets" lineno="20292"> <summary> Receive cyphesis_server packets. </summary> @@ -22775,7 +22821,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="21247"> +<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20311"> <summary> Do not audit attempts to receive cyphesis_server packets. </summary> @@ -22786,7 +22832,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="21266"> +<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20330"> <summary> Send and receive cyphesis_server packets. </summary> @@ -22797,7 +22843,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="21282"> +<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20346"> <summary> Do not audit attempts to send and receive cyphesis_server packets. </summary> @@ -22808,7 +22854,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cyphesis_server_packets" lineno="21297"> +<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20361"> <summary> Relabel packets to cyphesis_server the packet type. </summary> @@ -22818,7 +22864,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_daap_port" lineno="21319"> +<interface name="corenet_tcp_sendrecv_daap_port" lineno="20383"> <summary> Send and receive TCP traffic on the daap port. </summary> @@ -22829,7 +22875,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_daap_port" lineno="21338"> +<interface name="corenet_udp_send_daap_port" lineno="20398"> <summary> Send UDP traffic on the daap port. </summary> @@ -22840,7 +22886,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_daap_port" lineno="21357"> +<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20413"> <summary> Do not audit attempts to send UDP traffic on the daap port. </summary> @@ -22851,7 +22897,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_daap_port" lineno="21376"> +<interface name="corenet_udp_receive_daap_port" lineno="20428"> <summary> Receive UDP traffic on the daap port. </summary> @@ -22862,7 +22908,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="21395"> +<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20443"> <summary> Do not audit attempts to receive UDP traffic on the daap port. </summary> @@ -22873,7 +22919,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_daap_port" lineno="21414"> +<interface name="corenet_udp_sendrecv_daap_port" lineno="20458"> <summary> Send and receive UDP traffic on the daap port. </summary> @@ -22884,7 +22930,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21431"> +<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="20474"> <summary> Do not audit attempts to send and receive UDP traffic on the daap port. @@ -22896,7 +22942,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_daap_port" lineno="21447"> +<interface name="corenet_tcp_bind_daap_port" lineno="20489"> <summary> Bind TCP sockets to the daap port. </summary> @@ -22907,7 +22953,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_daap_port" lineno="21467"> +<interface name="corenet_udp_bind_daap_port" lineno="20509"> <summary> Bind UDP sockets to the daap port. </summary> @@ -22918,7 +22964,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_daap_port" lineno="21486"> +<interface name="corenet_tcp_connect_daap_port" lineno="20528"> <summary> Make a TCP connection to the daap port. </summary> @@ -22928,7 +22974,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_daap_client_packets" lineno="21506"> +<interface name="corenet_send_daap_client_packets" lineno="20548"> <summary> Send daap_client packets. </summary> @@ -22939,7 +22985,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21525"> +<interface name="corenet_dontaudit_send_daap_client_packets" lineno="20567"> <summary> Do not audit attempts to send daap_client packets. </summary> @@ -22950,7 +22996,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_daap_client_packets" lineno="21544"> +<interface name="corenet_receive_daap_client_packets" lineno="20586"> <summary> Receive daap_client packets. </summary> @@ -22961,7 +23007,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21563"> +<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="20605"> <summary> Do not audit attempts to receive daap_client packets. </summary> @@ -22972,7 +23018,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_daap_client_packets" lineno="21582"> +<interface name="corenet_sendrecv_daap_client_packets" lineno="20624"> <summary> Send and receive daap_client packets. </summary> @@ -22983,7 +23029,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21598"> +<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="20640"> <summary> Do not audit attempts to send and receive daap_client packets. </summary> @@ -22994,7 +23040,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_daap_client_packets" lineno="21613"> +<interface name="corenet_relabelto_daap_client_packets" lineno="20655"> <summary> Relabel packets to daap_client the packet type. </summary> @@ -23004,7 +23050,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_daap_server_packets" lineno="21633"> +<interface name="corenet_send_daap_server_packets" lineno="20675"> <summary> Send daap_server packets. </summary> @@ -23015,7 +23061,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21652"> +<interface name="corenet_dontaudit_send_daap_server_packets" lineno="20694"> <summary> Do not audit attempts to send daap_server packets. </summary> @@ -23026,7 +23072,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_daap_server_packets" lineno="21671"> +<interface name="corenet_receive_daap_server_packets" lineno="20713"> <summary> Receive daap_server packets. </summary> @@ -23037,7 +23083,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21690"> +<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="20732"> <summary> Do not audit attempts to receive daap_server packets. </summary> @@ -23048,7 +23094,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_daap_server_packets" lineno="21709"> +<interface name="corenet_sendrecv_daap_server_packets" lineno="20751"> <summary> Send and receive daap_server packets. </summary> @@ -23059,7 +23105,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21725"> +<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="20767"> <summary> Do not audit attempts to send and receive daap_server packets. </summary> @@ -23070,7 +23116,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_daap_server_packets" lineno="21740"> +<interface name="corenet_relabelto_daap_server_packets" lineno="20782"> <summary> Relabel packets to daap_server the packet type. </summary> @@ -23080,7 +23126,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21762"> +<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="20804"> <summary> Send and receive TCP traffic on the dbskkd port. </summary> @@ -23091,7 +23137,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dbskkd_port" lineno="21781"> +<interface name="corenet_udp_send_dbskkd_port" lineno="20819"> <summary> Send UDP traffic on the dbskkd port. </summary> @@ -23102,7 +23148,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21800"> +<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="20834"> <summary> Do not audit attempts to send UDP traffic on the dbskkd port. </summary> @@ -23113,7 +23159,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dbskkd_port" lineno="21819"> +<interface name="corenet_udp_receive_dbskkd_port" lineno="20849"> <summary> Receive UDP traffic on the dbskkd port. </summary> @@ -23124,7 +23170,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21838"> +<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="20864"> <summary> Do not audit attempts to receive UDP traffic on the dbskkd port. </summary> @@ -23135,7 +23181,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21857"> +<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="20879"> <summary> Send and receive UDP traffic on the dbskkd port. </summary> @@ -23146,7 +23192,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21874"> +<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="20895"> <summary> Do not audit attempts to send and receive UDP traffic on the dbskkd port. @@ -23158,7 +23204,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dbskkd_port" lineno="21890"> +<interface name="corenet_tcp_bind_dbskkd_port" lineno="20910"> <summary> Bind TCP sockets to the dbskkd port. </summary> @@ -23169,7 +23215,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dbskkd_port" lineno="21910"> +<interface name="corenet_udp_bind_dbskkd_port" lineno="20930"> <summary> Bind UDP sockets to the dbskkd port. </summary> @@ -23180,7 +23226,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dbskkd_port" lineno="21929"> +<interface name="corenet_tcp_connect_dbskkd_port" lineno="20949"> <summary> Make a TCP connection to the dbskkd port. </summary> @@ -23190,7 +23236,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dbskkd_client_packets" lineno="21949"> +<interface name="corenet_send_dbskkd_client_packets" lineno="20969"> <summary> Send dbskkd_client packets. </summary> @@ -23201,7 +23247,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21968"> +<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="20988"> <summary> Do not audit attempts to send dbskkd_client packets. </summary> @@ -23212,7 +23258,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dbskkd_client_packets" lineno="21987"> +<interface name="corenet_receive_dbskkd_client_packets" lineno="21007"> <summary> Receive dbskkd_client packets. </summary> @@ -23223,7 +23269,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="22006"> +<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21026"> <summary> Do not audit attempts to receive dbskkd_client packets. </summary> @@ -23234,7 +23280,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="22025"> +<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21045"> <summary> Send and receive dbskkd_client packets. </summary> @@ -23245,7 +23291,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="22041"> +<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21061"> <summary> Do not audit attempts to send and receive dbskkd_client packets. </summary> @@ -23256,7 +23302,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dbskkd_client_packets" lineno="22056"> +<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21076"> <summary> Relabel packets to dbskkd_client the packet type. </summary> @@ -23266,7 +23312,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dbskkd_server_packets" lineno="22076"> +<interface name="corenet_send_dbskkd_server_packets" lineno="21096"> <summary> Send dbskkd_server packets. </summary> @@ -23277,7 +23323,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="22095"> +<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21115"> <summary> Do not audit attempts to send dbskkd_server packets. </summary> @@ -23288,7 +23334,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dbskkd_server_packets" lineno="22114"> +<interface name="corenet_receive_dbskkd_server_packets" lineno="21134"> <summary> Receive dbskkd_server packets. </summary> @@ -23299,7 +23345,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="22133"> +<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21153"> <summary> Do not audit attempts to receive dbskkd_server packets. </summary> @@ -23310,7 +23356,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="22152"> +<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21172"> <summary> Send and receive dbskkd_server packets. </summary> @@ -23321,7 +23367,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="22168"> +<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21188"> <summary> Do not audit attempts to send and receive dbskkd_server packets. </summary> @@ -23332,7 +23378,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dbskkd_server_packets" lineno="22183"> +<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21203"> <summary> Relabel packets to dbskkd_server the packet type. </summary> @@ -23342,7 +23388,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dcc_port" lineno="22205"> +<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21225"> <summary> Send and receive TCP traffic on the dcc port. </summary> @@ -23353,7 +23399,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dcc_port" lineno="22224"> +<interface name="corenet_udp_send_dcc_port" lineno="21240"> <summary> Send UDP traffic on the dcc port. </summary> @@ -23364,7 +23410,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="22243"> +<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21255"> <summary> Do not audit attempts to send UDP traffic on the dcc port. </summary> @@ -23375,7 +23421,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dcc_port" lineno="22262"> +<interface name="corenet_udp_receive_dcc_port" lineno="21270"> <summary> Receive UDP traffic on the dcc port. </summary> @@ -23386,7 +23432,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="22281"> +<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21285"> <summary> Do not audit attempts to receive UDP traffic on the dcc port. </summary> @@ -23397,7 +23443,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dcc_port" lineno="22300"> +<interface name="corenet_udp_sendrecv_dcc_port" lineno="21300"> <summary> Send and receive UDP traffic on the dcc port. </summary> @@ -23408,7 +23454,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="22317"> +<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21316"> <summary> Do not audit attempts to send and receive UDP traffic on the dcc port. @@ -23420,7 +23466,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dcc_port" lineno="22333"> +<interface name="corenet_tcp_bind_dcc_port" lineno="21331"> <summary> Bind TCP sockets to the dcc port. </summary> @@ -23431,7 +23477,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dcc_port" lineno="22353"> +<interface name="corenet_udp_bind_dcc_port" lineno="21351"> <summary> Bind UDP sockets to the dcc port. </summary> @@ -23442,7 +23488,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dcc_port" lineno="22372"> +<interface name="corenet_tcp_connect_dcc_port" lineno="21370"> <summary> Make a TCP connection to the dcc port. </summary> @@ -23452,7 +23498,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dcc_client_packets" lineno="22392"> +<interface name="corenet_send_dcc_client_packets" lineno="21390"> <summary> Send dcc_client packets. </summary> @@ -23463,7 +23509,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="22411"> +<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21409"> <summary> Do not audit attempts to send dcc_client packets. </summary> @@ -23474,7 +23520,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dcc_client_packets" lineno="22430"> +<interface name="corenet_receive_dcc_client_packets" lineno="21428"> <summary> Receive dcc_client packets. </summary> @@ -23485,7 +23531,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="22449"> +<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21447"> <summary> Do not audit attempts to receive dcc_client packets. </summary> @@ -23496,7 +23542,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dcc_client_packets" lineno="22468"> +<interface name="corenet_sendrecv_dcc_client_packets" lineno="21466"> <summary> Send and receive dcc_client packets. </summary> @@ -23507,7 +23553,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22484"> +<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="21482"> <summary> Do not audit attempts to send and receive dcc_client packets. </summary> @@ -23518,7 +23564,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dcc_client_packets" lineno="22499"> +<interface name="corenet_relabelto_dcc_client_packets" lineno="21497"> <summary> Relabel packets to dcc_client the packet type. </summary> @@ -23528,7 +23574,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dcc_server_packets" lineno="22519"> +<interface name="corenet_send_dcc_server_packets" lineno="21517"> <summary> Send dcc_server packets. </summary> @@ -23539,7 +23585,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22538"> +<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="21536"> <summary> Do not audit attempts to send dcc_server packets. </summary> @@ -23550,7 +23596,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dcc_server_packets" lineno="22557"> +<interface name="corenet_receive_dcc_server_packets" lineno="21555"> <summary> Receive dcc_server packets. </summary> @@ -23561,7 +23607,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22576"> +<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="21574"> <summary> Do not audit attempts to receive dcc_server packets. </summary> @@ -23572,7 +23618,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dcc_server_packets" lineno="22595"> +<interface name="corenet_sendrecv_dcc_server_packets" lineno="21593"> <summary> Send and receive dcc_server packets. </summary> @@ -23583,7 +23629,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22611"> +<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="21609"> <summary> Do not audit attempts to send and receive dcc_server packets. </summary> @@ -23594,7 +23640,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dcc_server_packets" lineno="22626"> +<interface name="corenet_relabelto_dcc_server_packets" lineno="21624"> <summary> Relabel packets to dcc_server the packet type. </summary> @@ -23604,7 +23650,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22648"> +<interface name="corenet_tcp_sendrecv_dccm_port" lineno="21646"> <summary> Send and receive TCP traffic on the dccm port. </summary> @@ -23615,7 +23661,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dccm_port" lineno="22667"> +<interface name="corenet_udp_send_dccm_port" lineno="21661"> <summary> Send UDP traffic on the dccm port. </summary> @@ -23626,7 +23672,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22686"> +<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="21676"> <summary> Do not audit attempts to send UDP traffic on the dccm port. </summary> @@ -23637,7 +23683,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dccm_port" lineno="22705"> +<interface name="corenet_udp_receive_dccm_port" lineno="21691"> <summary> Receive UDP traffic on the dccm port. </summary> @@ -23648,7 +23694,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22724"> +<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="21706"> <summary> Do not audit attempts to receive UDP traffic on the dccm port. </summary> @@ -23659,7 +23705,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dccm_port" lineno="22743"> +<interface name="corenet_udp_sendrecv_dccm_port" lineno="21721"> <summary> Send and receive UDP traffic on the dccm port. </summary> @@ -23670,7 +23716,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22760"> +<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="21737"> <summary> Do not audit attempts to send and receive UDP traffic on the dccm port. @@ -23682,7 +23728,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dccm_port" lineno="22776"> +<interface name="corenet_tcp_bind_dccm_port" lineno="21752"> <summary> Bind TCP sockets to the dccm port. </summary> @@ -23693,7 +23739,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dccm_port" lineno="22796"> +<interface name="corenet_udp_bind_dccm_port" lineno="21772"> <summary> Bind UDP sockets to the dccm port. </summary> @@ -23704,7 +23750,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dccm_port" lineno="22815"> +<interface name="corenet_tcp_connect_dccm_port" lineno="21791"> <summary> Make a TCP connection to the dccm port. </summary> @@ -23714,7 +23760,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dccm_client_packets" lineno="22835"> +<interface name="corenet_send_dccm_client_packets" lineno="21811"> <summary> Send dccm_client packets. </summary> @@ -23725,7 +23771,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22854"> +<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="21830"> <summary> Do not audit attempts to send dccm_client packets. </summary> @@ -23736,7 +23782,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dccm_client_packets" lineno="22873"> +<interface name="corenet_receive_dccm_client_packets" lineno="21849"> <summary> Receive dccm_client packets. </summary> @@ -23747,7 +23793,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22892"> +<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="21868"> <summary> Do not audit attempts to receive dccm_client packets. </summary> @@ -23758,7 +23804,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dccm_client_packets" lineno="22911"> +<interface name="corenet_sendrecv_dccm_client_packets" lineno="21887"> <summary> Send and receive dccm_client packets. </summary> @@ -23769,7 +23815,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22927"> +<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="21903"> <summary> Do not audit attempts to send and receive dccm_client packets. </summary> @@ -23780,7 +23826,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dccm_client_packets" lineno="22942"> +<interface name="corenet_relabelto_dccm_client_packets" lineno="21918"> <summary> Relabel packets to dccm_client the packet type. </summary> @@ -23790,7 +23836,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dccm_server_packets" lineno="22962"> +<interface name="corenet_send_dccm_server_packets" lineno="21938"> <summary> Send dccm_server packets. </summary> @@ -23801,7 +23847,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22981"> +<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="21957"> <summary> Do not audit attempts to send dccm_server packets. </summary> @@ -23812,7 +23858,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dccm_server_packets" lineno="23000"> +<interface name="corenet_receive_dccm_server_packets" lineno="21976"> <summary> Receive dccm_server packets. </summary> @@ -23823,7 +23869,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="23019"> +<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="21995"> <summary> Do not audit attempts to receive dccm_server packets. </summary> @@ -23834,7 +23880,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dccm_server_packets" lineno="23038"> +<interface name="corenet_sendrecv_dccm_server_packets" lineno="22014"> <summary> Send and receive dccm_server packets. </summary> @@ -23845,7 +23891,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="23054"> +<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22030"> <summary> Do not audit attempts to send and receive dccm_server packets. </summary> @@ -23856,7 +23902,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dccm_server_packets" lineno="23069"> +<interface name="corenet_relabelto_dccm_server_packets" lineno="22045"> <summary> Relabel packets to dccm_server the packet type. </summary> @@ -23866,7 +23912,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="23091"> +<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22067"> <summary> Send and receive TCP traffic on the dhcpc port. </summary> @@ -23877,7 +23923,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dhcpc_port" lineno="23110"> +<interface name="corenet_udp_send_dhcpc_port" lineno="22082"> <summary> Send UDP traffic on the dhcpc port. </summary> @@ -23888,7 +23934,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="23129"> +<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22097"> <summary> Do not audit attempts to send UDP traffic on the dhcpc port. </summary> @@ -23899,7 +23945,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dhcpc_port" lineno="23148"> +<interface name="corenet_udp_receive_dhcpc_port" lineno="22112"> <summary> Receive UDP traffic on the dhcpc port. </summary> @@ -23910,7 +23956,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="23167"> +<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22127"> <summary> Do not audit attempts to receive UDP traffic on the dhcpc port. </summary> @@ -23921,7 +23967,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="23186"> +<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22142"> <summary> Send and receive UDP traffic on the dhcpc port. </summary> @@ -23932,7 +23978,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="23203"> +<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22158"> <summary> Do not audit attempts to send and receive UDP traffic on the dhcpc port. @@ -23944,7 +23990,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dhcpc_port" lineno="23219"> +<interface name="corenet_tcp_bind_dhcpc_port" lineno="22173"> <summary> Bind TCP sockets to the dhcpc port. </summary> @@ -23955,7 +24001,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dhcpc_port" lineno="23239"> +<interface name="corenet_udp_bind_dhcpc_port" lineno="22193"> <summary> Bind UDP sockets to the dhcpc port. </summary> @@ -23966,7 +24012,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dhcpc_port" lineno="23258"> +<interface name="corenet_tcp_connect_dhcpc_port" lineno="22212"> <summary> Make a TCP connection to the dhcpc port. </summary> @@ -23976,7 +24022,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpc_client_packets" lineno="23278"> +<interface name="corenet_send_dhcpc_client_packets" lineno="22232"> <summary> Send dhcpc_client packets. </summary> @@ -23987,7 +24033,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="23297"> +<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22251"> <summary> Do not audit attempts to send dhcpc_client packets. </summary> @@ -23998,7 +24044,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpc_client_packets" lineno="23316"> +<interface name="corenet_receive_dhcpc_client_packets" lineno="22270"> <summary> Receive dhcpc_client packets. </summary> @@ -24009,7 +24055,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="23335"> +<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22289"> <summary> Do not audit attempts to receive dhcpc_client packets. </summary> @@ -24020,7 +24066,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="23354"> +<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22308"> <summary> Send and receive dhcpc_client packets. </summary> @@ -24031,7 +24077,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="23370"> +<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22324"> <summary> Do not audit attempts to send and receive dhcpc_client packets. </summary> @@ -24042,7 +24088,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpc_client_packets" lineno="23385"> +<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22339"> <summary> Relabel packets to dhcpc_client the packet type. </summary> @@ -24052,7 +24098,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpc_server_packets" lineno="23405"> +<interface name="corenet_send_dhcpc_server_packets" lineno="22359"> <summary> Send dhcpc_server packets. </summary> @@ -24063,7 +24109,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="23424"> +<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22378"> <summary> Do not audit attempts to send dhcpc_server packets. </summary> @@ -24074,7 +24120,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpc_server_packets" lineno="23443"> +<interface name="corenet_receive_dhcpc_server_packets" lineno="22397"> <summary> Receive dhcpc_server packets. </summary> @@ -24085,7 +24131,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="23462"> +<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22416"> <summary> Do not audit attempts to receive dhcpc_server packets. </summary> @@ -24096,7 +24142,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="23481"> +<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22435"> <summary> Send and receive dhcpc_server packets. </summary> @@ -24107,7 +24153,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="23497"> +<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22451"> <summary> Do not audit attempts to send and receive dhcpc_server packets. </summary> @@ -24118,7 +24164,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23512"> +<interface name="corenet_relabelto_dhcpc_server_packets" lineno="22466"> <summary> Relabel packets to dhcpc_server the packet type. </summary> @@ -24128,7 +24174,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23534"> +<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="22488"> <summary> Send and receive TCP traffic on the dhcpd port. </summary> @@ -24139,7 +24185,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dhcpd_port" lineno="23553"> +<interface name="corenet_udp_send_dhcpd_port" lineno="22503"> <summary> Send UDP traffic on the dhcpd port. </summary> @@ -24150,7 +24196,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23572"> +<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="22518"> <summary> Do not audit attempts to send UDP traffic on the dhcpd port. </summary> @@ -24161,7 +24207,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dhcpd_port" lineno="23591"> +<interface name="corenet_udp_receive_dhcpd_port" lineno="22533"> <summary> Receive UDP traffic on the dhcpd port. </summary> @@ -24172,7 +24218,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23610"> +<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="22548"> <summary> Do not audit attempts to receive UDP traffic on the dhcpd port. </summary> @@ -24183,7 +24229,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23629"> +<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="22563"> <summary> Send and receive UDP traffic on the dhcpd port. </summary> @@ -24194,7 +24240,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23646"> +<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="22579"> <summary> Do not audit attempts to send and receive UDP traffic on the dhcpd port. @@ -24206,7 +24252,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dhcpd_port" lineno="23662"> +<interface name="corenet_tcp_bind_dhcpd_port" lineno="22594"> <summary> Bind TCP sockets to the dhcpd port. </summary> @@ -24217,7 +24263,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dhcpd_port" lineno="23682"> +<interface name="corenet_udp_bind_dhcpd_port" lineno="22614"> <summary> Bind UDP sockets to the dhcpd port. </summary> @@ -24228,7 +24274,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dhcpd_port" lineno="23701"> +<interface name="corenet_tcp_connect_dhcpd_port" lineno="22633"> <summary> Make a TCP connection to the dhcpd port. </summary> @@ -24238,7 +24284,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpd_client_packets" lineno="23721"> +<interface name="corenet_send_dhcpd_client_packets" lineno="22653"> <summary> Send dhcpd_client packets. </summary> @@ -24249,7 +24295,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23740"> +<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="22672"> <summary> Do not audit attempts to send dhcpd_client packets. </summary> @@ -24260,7 +24306,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpd_client_packets" lineno="23759"> +<interface name="corenet_receive_dhcpd_client_packets" lineno="22691"> <summary> Receive dhcpd_client packets. </summary> @@ -24271,7 +24317,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23778"> +<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="22710"> <summary> Do not audit attempts to receive dhcpd_client packets. </summary> @@ -24282,7 +24328,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23797"> +<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="22729"> <summary> Send and receive dhcpd_client packets. </summary> @@ -24293,7 +24339,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23813"> +<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="22745"> <summary> Do not audit attempts to send and receive dhcpd_client packets. </summary> @@ -24304,7 +24350,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23828"> +<interface name="corenet_relabelto_dhcpd_client_packets" lineno="22760"> <summary> Relabel packets to dhcpd_client the packet type. </summary> @@ -24314,7 +24360,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpd_server_packets" lineno="23848"> +<interface name="corenet_send_dhcpd_server_packets" lineno="22780"> <summary> Send dhcpd_server packets. </summary> @@ -24325,7 +24371,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23867"> +<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="22799"> <summary> Do not audit attempts to send dhcpd_server packets. </summary> @@ -24336,7 +24382,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpd_server_packets" lineno="23886"> +<interface name="corenet_receive_dhcpd_server_packets" lineno="22818"> <summary> Receive dhcpd_server packets. </summary> @@ -24347,7 +24393,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23905"> +<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="22837"> <summary> Do not audit attempts to receive dhcpd_server packets. </summary> @@ -24358,7 +24404,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23924"> +<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="22856"> <summary> Send and receive dhcpd_server packets. </summary> @@ -24369,7 +24415,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23940"> +<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="22872"> <summary> Do not audit attempts to send and receive dhcpd_server packets. </summary> @@ -24380,7 +24426,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23955"> +<interface name="corenet_relabelto_dhcpd_server_packets" lineno="22887"> <summary> Relabel packets to dhcpd_server the packet type. </summary> @@ -24390,7 +24436,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dict_port" lineno="23977"> +<interface name="corenet_tcp_sendrecv_dict_port" lineno="22909"> <summary> Send and receive TCP traffic on the dict port. </summary> @@ -24401,7 +24447,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dict_port" lineno="23996"> +<interface name="corenet_udp_send_dict_port" lineno="22924"> <summary> Send UDP traffic on the dict port. </summary> @@ -24412,7 +24458,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dict_port" lineno="24015"> +<interface name="corenet_dontaudit_udp_send_dict_port" lineno="22939"> <summary> Do not audit attempts to send UDP traffic on the dict port. </summary> @@ -24423,7 +24469,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dict_port" lineno="24034"> +<interface name="corenet_udp_receive_dict_port" lineno="22954"> <summary> Receive UDP traffic on the dict port. </summary> @@ -24434,7 +24480,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="24053"> +<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="22969"> <summary> Do not audit attempts to receive UDP traffic on the dict port. </summary> @@ -24445,7 +24491,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dict_port" lineno="24072"> +<interface name="corenet_udp_sendrecv_dict_port" lineno="22984"> <summary> Send and receive UDP traffic on the dict port. </summary> @@ -24456,7 +24502,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="24089"> +<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23000"> <summary> Do not audit attempts to send and receive UDP traffic on the dict port. @@ -24468,7 +24514,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dict_port" lineno="24105"> +<interface name="corenet_tcp_bind_dict_port" lineno="23015"> <summary> Bind TCP sockets to the dict port. </summary> @@ -24479,7 +24525,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dict_port" lineno="24125"> +<interface name="corenet_udp_bind_dict_port" lineno="23035"> <summary> Bind UDP sockets to the dict port. </summary> @@ -24490,7 +24536,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dict_port" lineno="24144"> +<interface name="corenet_tcp_connect_dict_port" lineno="23054"> <summary> Make a TCP connection to the dict port. </summary> @@ -24500,7 +24546,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dict_client_packets" lineno="24164"> +<interface name="corenet_send_dict_client_packets" lineno="23074"> <summary> Send dict_client packets. </summary> @@ -24511,7 +24557,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dict_client_packets" lineno="24183"> +<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23093"> <summary> Do not audit attempts to send dict_client packets. </summary> @@ -24522,7 +24568,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dict_client_packets" lineno="24202"> +<interface name="corenet_receive_dict_client_packets" lineno="23112"> <summary> Receive dict_client packets. </summary> @@ -24533,7 +24579,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="24221"> +<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23131"> <summary> Do not audit attempts to receive dict_client packets. </summary> @@ -24544,7 +24590,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dict_client_packets" lineno="24240"> +<interface name="corenet_sendrecv_dict_client_packets" lineno="23150"> <summary> Send and receive dict_client packets. </summary> @@ -24555,7 +24601,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="24256"> +<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23166"> <summary> Do not audit attempts to send and receive dict_client packets. </summary> @@ -24566,7 +24612,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dict_client_packets" lineno="24271"> +<interface name="corenet_relabelto_dict_client_packets" lineno="23181"> <summary> Relabel packets to dict_client the packet type. </summary> @@ -24576,7 +24622,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dict_server_packets" lineno="24291"> +<interface name="corenet_send_dict_server_packets" lineno="23201"> <summary> Send dict_server packets. </summary> @@ -24587,7 +24633,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dict_server_packets" lineno="24310"> +<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23220"> <summary> Do not audit attempts to send dict_server packets. </summary> @@ -24598,7 +24644,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dict_server_packets" lineno="24329"> +<interface name="corenet_receive_dict_server_packets" lineno="23239"> <summary> Receive dict_server packets. </summary> @@ -24609,7 +24655,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="24348"> +<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23258"> <summary> Do not audit attempts to receive dict_server packets. </summary> @@ -24620,7 +24666,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dict_server_packets" lineno="24367"> +<interface name="corenet_sendrecv_dict_server_packets" lineno="23277"> <summary> Send and receive dict_server packets. </summary> @@ -24631,7 +24677,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="24383"> +<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23293"> <summary> Do not audit attempts to send and receive dict_server packets. </summary> @@ -24642,7 +24688,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dict_server_packets" lineno="24398"> +<interface name="corenet_relabelto_dict_server_packets" lineno="23308"> <summary> Relabel packets to dict_server the packet type. </summary> @@ -24652,7 +24698,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_distccd_port" lineno="24420"> +<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23330"> <summary> Send and receive TCP traffic on the distccd port. </summary> @@ -24663,7 +24709,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_distccd_port" lineno="24439"> +<interface name="corenet_udp_send_distccd_port" lineno="23345"> <summary> Send UDP traffic on the distccd port. </summary> @@ -24674,7 +24720,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="24458"> +<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23360"> <summary> Do not audit attempts to send UDP traffic on the distccd port. </summary> @@ -24685,7 +24731,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_distccd_port" lineno="24477"> +<interface name="corenet_udp_receive_distccd_port" lineno="23375"> <summary> Receive UDP traffic on the distccd port. </summary> @@ -24696,7 +24742,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="24496"> +<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23390"> <summary> Do not audit attempts to receive UDP traffic on the distccd port. </summary> @@ -24707,7 +24753,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_distccd_port" lineno="24515"> +<interface name="corenet_udp_sendrecv_distccd_port" lineno="23405"> <summary> Send and receive UDP traffic on the distccd port. </summary> @@ -24718,7 +24764,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="24532"> +<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23421"> <summary> Do not audit attempts to send and receive UDP traffic on the distccd port. @@ -24730,7 +24776,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_distccd_port" lineno="24548"> +<interface name="corenet_tcp_bind_distccd_port" lineno="23436"> <summary> Bind TCP sockets to the distccd port. </summary> @@ -24741,7 +24787,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_distccd_port" lineno="24568"> +<interface name="corenet_udp_bind_distccd_port" lineno="23456"> <summary> Bind UDP sockets to the distccd port. </summary> @@ -24752,7 +24798,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_distccd_port" lineno="24587"> +<interface name="corenet_tcp_connect_distccd_port" lineno="23475"> <summary> Make a TCP connection to the distccd port. </summary> @@ -24762,7 +24808,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_distccd_client_packets" lineno="24607"> +<interface name="corenet_send_distccd_client_packets" lineno="23495"> <summary> Send distccd_client packets. </summary> @@ -24773,7 +24819,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24626"> +<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="23514"> <summary> Do not audit attempts to send distccd_client packets. </summary> @@ -24784,7 +24830,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_distccd_client_packets" lineno="24645"> +<interface name="corenet_receive_distccd_client_packets" lineno="23533"> <summary> Receive distccd_client packets. </summary> @@ -24795,7 +24841,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24664"> +<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="23552"> <summary> Do not audit attempts to receive distccd_client packets. </summary> @@ -24806,7 +24852,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_distccd_client_packets" lineno="24683"> +<interface name="corenet_sendrecv_distccd_client_packets" lineno="23571"> <summary> Send and receive distccd_client packets. </summary> @@ -24817,7 +24863,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24699"> +<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="23587"> <summary> Do not audit attempts to send and receive distccd_client packets. </summary> @@ -24828,7 +24874,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_distccd_client_packets" lineno="24714"> +<interface name="corenet_relabelto_distccd_client_packets" lineno="23602"> <summary> Relabel packets to distccd_client the packet type. </summary> @@ -24838,7 +24884,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_distccd_server_packets" lineno="24734"> +<interface name="corenet_send_distccd_server_packets" lineno="23622"> <summary> Send distccd_server packets. </summary> @@ -24849,7 +24895,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24753"> +<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="23641"> <summary> Do not audit attempts to send distccd_server packets. </summary> @@ -24860,7 +24906,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_distccd_server_packets" lineno="24772"> +<interface name="corenet_receive_distccd_server_packets" lineno="23660"> <summary> Receive distccd_server packets. </summary> @@ -24871,7 +24917,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24791"> +<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="23679"> <summary> Do not audit attempts to receive distccd_server packets. </summary> @@ -24882,7 +24928,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_distccd_server_packets" lineno="24810"> +<interface name="corenet_sendrecv_distccd_server_packets" lineno="23698"> <summary> Send and receive distccd_server packets. </summary> @@ -24893,7 +24939,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24826"> +<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="23714"> <summary> Do not audit attempts to send and receive distccd_server packets. </summary> @@ -24904,7 +24950,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_distccd_server_packets" lineno="24841"> +<interface name="corenet_relabelto_distccd_server_packets" lineno="23729"> <summary> Relabel packets to distccd_server the packet type. </summary> @@ -24914,7 +24960,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dns_port" lineno="24863"> +<interface name="corenet_tcp_sendrecv_dns_port" lineno="23751"> <summary> Send and receive TCP traffic on the dns port. </summary> @@ -24925,7 +24971,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dns_port" lineno="24882"> +<interface name="corenet_udp_send_dns_port" lineno="23766"> <summary> Send UDP traffic on the dns port. </summary> @@ -24936,7 +24982,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24901"> +<interface name="corenet_dontaudit_udp_send_dns_port" lineno="23781"> <summary> Do not audit attempts to send UDP traffic on the dns port. </summary> @@ -24947,7 +24993,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dns_port" lineno="24920"> +<interface name="corenet_udp_receive_dns_port" lineno="23796"> <summary> Receive UDP traffic on the dns port. </summary> @@ -24958,7 +25004,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24939"> +<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="23811"> <summary> Do not audit attempts to receive UDP traffic on the dns port. </summary> @@ -24969,7 +25015,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dns_port" lineno="24958"> +<interface name="corenet_udp_sendrecv_dns_port" lineno="23826"> <summary> Send and receive UDP traffic on the dns port. </summary> @@ -24980,7 +25026,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24975"> +<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="23842"> <summary> Do not audit attempts to send and receive UDP traffic on the dns port. @@ -24992,7 +25038,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dns_port" lineno="24991"> +<interface name="corenet_tcp_bind_dns_port" lineno="23857"> <summary> Bind TCP sockets to the dns port. </summary> @@ -25003,7 +25049,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dns_port" lineno="25011"> +<interface name="corenet_udp_bind_dns_port" lineno="23877"> <summary> Bind UDP sockets to the dns port. </summary> @@ -25014,7 +25060,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dns_port" lineno="25030"> +<interface name="corenet_tcp_connect_dns_port" lineno="23896"> <summary> Make a TCP connection to the dns port. </summary> @@ -25024,7 +25070,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dns_client_packets" lineno="25050"> +<interface name="corenet_send_dns_client_packets" lineno="23916"> <summary> Send dns_client packets. </summary> @@ -25035,7 +25081,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dns_client_packets" lineno="25069"> +<interface name="corenet_dontaudit_send_dns_client_packets" lineno="23935"> <summary> Do not audit attempts to send dns_client packets. </summary> @@ -25046,7 +25092,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dns_client_packets" lineno="25088"> +<interface name="corenet_receive_dns_client_packets" lineno="23954"> <summary> Receive dns_client packets. </summary> @@ -25057,7 +25103,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="25107"> +<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="23973"> <summary> Do not audit attempts to receive dns_client packets. </summary> @@ -25068,7 +25114,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dns_client_packets" lineno="25126"> +<interface name="corenet_sendrecv_dns_client_packets" lineno="23992"> <summary> Send and receive dns_client packets. </summary> @@ -25079,7 +25125,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="25142"> +<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24008"> <summary> Do not audit attempts to send and receive dns_client packets. </summary> @@ -25090,7 +25136,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dns_client_packets" lineno="25157"> +<interface name="corenet_relabelto_dns_client_packets" lineno="24023"> <summary> Relabel packets to dns_client the packet type. </summary> @@ -25100,7 +25146,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dns_server_packets" lineno="25177"> +<interface name="corenet_send_dns_server_packets" lineno="24043"> <summary> Send dns_server packets. </summary> @@ -25111,7 +25157,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dns_server_packets" lineno="25196"> +<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24062"> <summary> Do not audit attempts to send dns_server packets. </summary> @@ -25122,7 +25168,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dns_server_packets" lineno="25215"> +<interface name="corenet_receive_dns_server_packets" lineno="24081"> <summary> Receive dns_server packets. </summary> @@ -25133,7 +25179,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="25234"> +<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24100"> <summary> Do not audit attempts to receive dns_server packets. </summary> @@ -25144,7 +25190,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dns_server_packets" lineno="25253"> +<interface name="corenet_sendrecv_dns_server_packets" lineno="24119"> <summary> Send and receive dns_server packets. </summary> @@ -25155,7 +25201,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="25269"> +<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24135"> <summary> Do not audit attempts to send and receive dns_server packets. </summary> @@ -25166,7 +25212,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dns_server_packets" lineno="25284"> +<interface name="corenet_relabelto_dns_server_packets" lineno="24150"> <summary> Relabel packets to dns_server the packet type. </summary> @@ -25176,7 +25222,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="25306"> +<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24172"> <summary> Send and receive TCP traffic on the dropbox port. </summary> @@ -25187,7 +25233,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dropbox_port" lineno="25325"> +<interface name="corenet_udp_send_dropbox_port" lineno="24187"> <summary> Send UDP traffic on the dropbox port. </summary> @@ -25198,7 +25244,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="25344"> +<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24202"> <summary> Do not audit attempts to send UDP traffic on the dropbox port. </summary> @@ -25209,7 +25255,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dropbox_port" lineno="25363"> +<interface name="corenet_udp_receive_dropbox_port" lineno="24217"> <summary> Receive UDP traffic on the dropbox port. </summary> @@ -25220,7 +25266,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="25382"> +<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24232"> <summary> Do not audit attempts to receive UDP traffic on the dropbox port. </summary> @@ -25231,7 +25277,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dropbox_port" lineno="25401"> +<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24247"> <summary> Send and receive UDP traffic on the dropbox port. </summary> @@ -25242,7 +25288,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="25418"> +<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24263"> <summary> Do not audit attempts to send and receive UDP traffic on the dropbox port. @@ -25254,7 +25300,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dropbox_port" lineno="25434"> +<interface name="corenet_tcp_bind_dropbox_port" lineno="24278"> <summary> Bind TCP sockets to the dropbox port. </summary> @@ -25265,7 +25311,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dropbox_port" lineno="25454"> +<interface name="corenet_udp_bind_dropbox_port" lineno="24298"> <summary> Bind UDP sockets to the dropbox port. </summary> @@ -25276,7 +25322,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dropbox_port" lineno="25473"> +<interface name="corenet_tcp_connect_dropbox_port" lineno="24317"> <summary> Make a TCP connection to the dropbox port. </summary> @@ -25286,7 +25332,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dropbox_client_packets" lineno="25493"> +<interface name="corenet_send_dropbox_client_packets" lineno="24337"> <summary> Send dropbox_client packets. </summary> @@ -25297,7 +25343,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="25512"> +<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24356"> <summary> Do not audit attempts to send dropbox_client packets. </summary> @@ -25308,7 +25354,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dropbox_client_packets" lineno="25531"> +<interface name="corenet_receive_dropbox_client_packets" lineno="24375"> <summary> Receive dropbox_client packets. </summary> @@ -25319,7 +25365,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="25550"> +<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24394"> <summary> Do not audit attempts to receive dropbox_client packets. </summary> @@ -25330,7 +25376,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dropbox_client_packets" lineno="25569"> +<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24413"> <summary> Send and receive dropbox_client packets. </summary> @@ -25341,7 +25387,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="25585"> +<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24429"> <summary> Do not audit attempts to send and receive dropbox_client packets. </summary> @@ -25352,7 +25398,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dropbox_client_packets" lineno="25600"> +<interface name="corenet_relabelto_dropbox_client_packets" lineno="24444"> <summary> Relabel packets to dropbox_client the packet type. </summary> @@ -25362,7 +25408,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dropbox_server_packets" lineno="25620"> +<interface name="corenet_send_dropbox_server_packets" lineno="24464"> <summary> Send dropbox_server packets. </summary> @@ -25373,7 +25419,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25639"> +<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="24483"> <summary> Do not audit attempts to send dropbox_server packets. </summary> @@ -25384,7 +25430,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dropbox_server_packets" lineno="25658"> +<interface name="corenet_receive_dropbox_server_packets" lineno="24502"> <summary> Receive dropbox_server packets. </summary> @@ -25395,7 +25441,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25677"> +<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="24521"> <summary> Do not audit attempts to receive dropbox_server packets. </summary> @@ -25406,7 +25452,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25696"> +<interface name="corenet_sendrecv_dropbox_server_packets" lineno="24540"> <summary> Send and receive dropbox_server packets. </summary> @@ -25417,7 +25463,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25712"> +<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="24556"> <summary> Do not audit attempts to send and receive dropbox_server packets. </summary> @@ -25428,7 +25474,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dropbox_server_packets" lineno="25727"> +<interface name="corenet_relabelto_dropbox_server_packets" lineno="24571"> <summary> Relabel packets to dropbox_server the packet type. </summary> @@ -25438,7 +25484,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_efs_port" lineno="25749"> +<interface name="corenet_tcp_sendrecv_efs_port" lineno="24593"> <summary> Send and receive TCP traffic on the efs port. </summary> @@ -25449,7 +25495,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_efs_port" lineno="25768"> +<interface name="corenet_udp_send_efs_port" lineno="24608"> <summary> Send UDP traffic on the efs port. </summary> @@ -25460,7 +25506,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25787"> +<interface name="corenet_dontaudit_udp_send_efs_port" lineno="24623"> <summary> Do not audit attempts to send UDP traffic on the efs port. </summary> @@ -25471,7 +25517,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_efs_port" lineno="25806"> +<interface name="corenet_udp_receive_efs_port" lineno="24638"> <summary> Receive UDP traffic on the efs port. </summary> @@ -25482,7 +25528,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25825"> +<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="24653"> <summary> Do not audit attempts to receive UDP traffic on the efs port. </summary> @@ -25493,7 +25539,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_efs_port" lineno="25844"> +<interface name="corenet_udp_sendrecv_efs_port" lineno="24668"> <summary> Send and receive UDP traffic on the efs port. </summary> @@ -25504,7 +25550,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25861"> +<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="24684"> <summary> Do not audit attempts to send and receive UDP traffic on the efs port. @@ -25516,7 +25562,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_efs_port" lineno="25877"> +<interface name="corenet_tcp_bind_efs_port" lineno="24699"> <summary> Bind TCP sockets to the efs port. </summary> @@ -25527,7 +25573,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_efs_port" lineno="25897"> +<interface name="corenet_udp_bind_efs_port" lineno="24719"> <summary> Bind UDP sockets to the efs port. </summary> @@ -25538,7 +25584,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_efs_port" lineno="25916"> +<interface name="corenet_tcp_connect_efs_port" lineno="24738"> <summary> Make a TCP connection to the efs port. </summary> @@ -25548,7 +25594,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_efs_client_packets" lineno="25936"> +<interface name="corenet_send_efs_client_packets" lineno="24758"> <summary> Send efs_client packets. </summary> @@ -25559,7 +25605,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25955"> +<interface name="corenet_dontaudit_send_efs_client_packets" lineno="24777"> <summary> Do not audit attempts to send efs_client packets. </summary> @@ -25570,7 +25616,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_efs_client_packets" lineno="25974"> +<interface name="corenet_receive_efs_client_packets" lineno="24796"> <summary> Receive efs_client packets. </summary> @@ -25581,7 +25627,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25993"> +<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="24815"> <summary> Do not audit attempts to receive efs_client packets. </summary> @@ -25592,7 +25638,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_efs_client_packets" lineno="26012"> +<interface name="corenet_sendrecv_efs_client_packets" lineno="24834"> <summary> Send and receive efs_client packets. </summary> @@ -25603,7 +25649,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="26028"> +<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="24850"> <summary> Do not audit attempts to send and receive efs_client packets. </summary> @@ -25614,7 +25660,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_efs_client_packets" lineno="26043"> +<interface name="corenet_relabelto_efs_client_packets" lineno="24865"> <summary> Relabel packets to efs_client the packet type. </summary> @@ -25624,7 +25670,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_efs_server_packets" lineno="26063"> +<interface name="corenet_send_efs_server_packets" lineno="24885"> <summary> Send efs_server packets. </summary> @@ -25635,7 +25681,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_efs_server_packets" lineno="26082"> +<interface name="corenet_dontaudit_send_efs_server_packets" lineno="24904"> <summary> Do not audit attempts to send efs_server packets. </summary> @@ -25646,7 +25692,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_efs_server_packets" lineno="26101"> +<interface name="corenet_receive_efs_server_packets" lineno="24923"> <summary> Receive efs_server packets. </summary> @@ -25657,7 +25703,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="26120"> +<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="24942"> <summary> Do not audit attempts to receive efs_server packets. </summary> @@ -25668,7 +25714,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_efs_server_packets" lineno="26139"> +<interface name="corenet_sendrecv_efs_server_packets" lineno="24961"> <summary> Send and receive efs_server packets. </summary> @@ -25679,7 +25725,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="26155"> +<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="24977"> <summary> Do not audit attempts to send and receive efs_server packets. </summary> @@ -25690,7 +25736,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_efs_server_packets" lineno="26170"> +<interface name="corenet_relabelto_efs_server_packets" lineno="24992"> <summary> Relabel packets to efs_server the packet type. </summary> @@ -25700,7 +25746,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="26192"> +<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25014"> <summary> Send and receive TCP traffic on the embrace_dp_c port. </summary> @@ -25711,7 +25757,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_embrace_dp_c_port" lineno="26211"> +<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25029"> <summary> Send UDP traffic on the embrace_dp_c port. </summary> @@ -25722,7 +25768,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="26230"> +<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25044"> <summary> Do not audit attempts to send UDP traffic on the embrace_dp_c port. </summary> @@ -25733,7 +25779,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="26249"> +<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25059"> <summary> Receive UDP traffic on the embrace_dp_c port. </summary> @@ -25744,7 +25790,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="26268"> +<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25074"> <summary> Do not audit attempts to receive UDP traffic on the embrace_dp_c port. </summary> @@ -25755,7 +25801,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="26287"> +<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25089"> <summary> Send and receive UDP traffic on the embrace_dp_c port. </summary> @@ -25766,7 +25812,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="26304"> +<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25105"> <summary> Do not audit attempts to send and receive UDP traffic on the embrace_dp_c port. @@ -25778,7 +25824,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="26320"> +<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25120"> <summary> Bind TCP sockets to the embrace_dp_c port. </summary> @@ -25789,7 +25835,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="26340"> +<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25140"> <summary> Bind UDP sockets to the embrace_dp_c port. </summary> @@ -25800,7 +25846,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="26359"> +<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25159"> <summary> Make a TCP connection to the embrace_dp_c port. </summary> @@ -25810,7 +25856,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_embrace_dp_c_client_packets" lineno="26379"> +<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25179"> <summary> Send embrace_dp_c_client packets. </summary> @@ -25821,7 +25867,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="26398"> +<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25198"> <summary> Do not audit attempts to send embrace_dp_c_client packets. </summary> @@ -25832,7 +25878,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="26417"> +<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25217"> <summary> Receive embrace_dp_c_client packets. </summary> @@ -25843,7 +25889,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="26436"> +<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25236"> <summary> Do not audit attempts to receive embrace_dp_c_client packets. </summary> @@ -25854,7 +25900,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="26455"> +<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25255"> <summary> Send and receive embrace_dp_c_client packets. </summary> @@ -25865,7 +25911,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="26471"> +<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25271"> <summary> Do not audit attempts to send and receive embrace_dp_c_client packets. </summary> @@ -25876,7 +25922,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="26486"> +<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25286"> <summary> Relabel packets to embrace_dp_c_client the packet type. </summary> @@ -25886,7 +25932,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_embrace_dp_c_server_packets" lineno="26506"> +<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25306"> <summary> Send embrace_dp_c_server packets. </summary> @@ -25897,7 +25943,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="26525"> +<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25325"> <summary> Do not audit attempts to send embrace_dp_c_server packets. </summary> @@ -25908,7 +25954,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="26544"> +<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25344"> <summary> Receive embrace_dp_c_server packets. </summary> @@ -25919,7 +25965,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="26563"> +<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25363"> <summary> Do not audit attempts to receive embrace_dp_c_server packets. </summary> @@ -25930,7 +25976,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="26582"> +<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25382"> <summary> Send and receive embrace_dp_c_server packets. </summary> @@ -25941,7 +25987,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="26598"> +<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25398"> <summary> Do not audit attempts to send and receive embrace_dp_c_server packets. </summary> @@ -25952,7 +25998,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="26613"> +<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25413"> <summary> Relabel packets to embrace_dp_c_server the packet type. </summary> @@ -25962,7 +26008,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_epmap_port" lineno="26635"> +<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25435"> <summary> Send and receive TCP traffic on the epmap port. </summary> @@ -25973,7 +26019,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_epmap_port" lineno="26654"> +<interface name="corenet_udp_send_epmap_port" lineno="25450"> <summary> Send UDP traffic on the epmap port. </summary> @@ -25984,7 +26030,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26673"> +<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="25465"> <summary> Do not audit attempts to send UDP traffic on the epmap port. </summary> @@ -25995,7 +26041,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_epmap_port" lineno="26692"> +<interface name="corenet_udp_receive_epmap_port" lineno="25480"> <summary> Receive UDP traffic on the epmap port. </summary> @@ -26006,7 +26052,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26711"> +<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="25495"> <summary> Do not audit attempts to receive UDP traffic on the epmap port. </summary> @@ -26017,7 +26063,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_epmap_port" lineno="26730"> +<interface name="corenet_udp_sendrecv_epmap_port" lineno="25510"> <summary> Send and receive UDP traffic on the epmap port. </summary> @@ -26028,7 +26074,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26747"> +<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="25526"> <summary> Do not audit attempts to send and receive UDP traffic on the epmap port. @@ -26040,7 +26086,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_epmap_port" lineno="26763"> +<interface name="corenet_tcp_bind_epmap_port" lineno="25541"> <summary> Bind TCP sockets to the epmap port. </summary> @@ -26051,7 +26097,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_epmap_port" lineno="26783"> +<interface name="corenet_udp_bind_epmap_port" lineno="25561"> <summary> Bind UDP sockets to the epmap port. </summary> @@ -26062,7 +26108,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_epmap_port" lineno="26802"> +<interface name="corenet_tcp_connect_epmap_port" lineno="25580"> <summary> Make a TCP connection to the epmap port. </summary> @@ -26072,7 +26118,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmap_client_packets" lineno="26822"> +<interface name="corenet_send_epmap_client_packets" lineno="25600"> <summary> Send epmap_client packets. </summary> @@ -26083,7 +26129,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26841"> +<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="25619"> <summary> Do not audit attempts to send epmap_client packets. </summary> @@ -26094,7 +26140,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmap_client_packets" lineno="26860"> +<interface name="corenet_receive_epmap_client_packets" lineno="25638"> <summary> Receive epmap_client packets. </summary> @@ -26105,7 +26151,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26879"> +<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="25657"> <summary> Do not audit attempts to receive epmap_client packets. </summary> @@ -26116,7 +26162,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmap_client_packets" lineno="26898"> +<interface name="corenet_sendrecv_epmap_client_packets" lineno="25676"> <summary> Send and receive epmap_client packets. </summary> @@ -26127,7 +26173,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26914"> +<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="25692"> <summary> Do not audit attempts to send and receive epmap_client packets. </summary> @@ -26138,7 +26184,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmap_client_packets" lineno="26929"> +<interface name="corenet_relabelto_epmap_client_packets" lineno="25707"> <summary> Relabel packets to epmap_client the packet type. </summary> @@ -26148,7 +26194,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmap_server_packets" lineno="26949"> +<interface name="corenet_send_epmap_server_packets" lineno="25727"> <summary> Send epmap_server packets. </summary> @@ -26159,7 +26205,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26968"> +<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="25746"> <summary> Do not audit attempts to send epmap_server packets. </summary> @@ -26170,7 +26216,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmap_server_packets" lineno="26987"> +<interface name="corenet_receive_epmap_server_packets" lineno="25765"> <summary> Receive epmap_server packets. </summary> @@ -26181,7 +26227,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="27006"> +<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="25784"> <summary> Do not audit attempts to receive epmap_server packets. </summary> @@ -26192,7 +26238,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmap_server_packets" lineno="27025"> +<interface name="corenet_sendrecv_epmap_server_packets" lineno="25803"> <summary> Send and receive epmap_server packets. </summary> @@ -26203,7 +26249,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="27041"> +<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="25819"> <summary> Do not audit attempts to send and receive epmap_server packets. </summary> @@ -26214,7 +26260,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmap_server_packets" lineno="27056"> +<interface name="corenet_relabelto_epmap_server_packets" lineno="25834"> <summary> Relabel packets to epmap_server the packet type. </summary> @@ -26224,7 +26270,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_epmd_port" lineno="27078"> +<interface name="corenet_tcp_sendrecv_epmd_port" lineno="25856"> <summary> Send and receive TCP traffic on the epmd port. </summary> @@ -26235,7 +26281,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_epmd_port" lineno="27097"> +<interface name="corenet_udp_send_epmd_port" lineno="25871"> <summary> Send UDP traffic on the epmd port. </summary> @@ -26246,7 +26292,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="27116"> +<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="25886"> <summary> Do not audit attempts to send UDP traffic on the epmd port. </summary> @@ -26257,7 +26303,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_epmd_port" lineno="27135"> +<interface name="corenet_udp_receive_epmd_port" lineno="25901"> <summary> Receive UDP traffic on the epmd port. </summary> @@ -26268,7 +26314,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="27154"> +<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="25916"> <summary> Do not audit attempts to receive UDP traffic on the epmd port. </summary> @@ -26279,7 +26325,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_epmd_port" lineno="27173"> +<interface name="corenet_udp_sendrecv_epmd_port" lineno="25931"> <summary> Send and receive UDP traffic on the epmd port. </summary> @@ -26290,7 +26336,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="27190"> +<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="25947"> <summary> Do not audit attempts to send and receive UDP traffic on the epmd port. @@ -26302,7 +26348,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_epmd_port" lineno="27206"> +<interface name="corenet_tcp_bind_epmd_port" lineno="25962"> <summary> Bind TCP sockets to the epmd port. </summary> @@ -26313,7 +26359,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_epmd_port" lineno="27226"> +<interface name="corenet_udp_bind_epmd_port" lineno="25982"> <summary> Bind UDP sockets to the epmd port. </summary> @@ -26324,7 +26370,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_epmd_port" lineno="27245"> +<interface name="corenet_tcp_connect_epmd_port" lineno="26001"> <summary> Make a TCP connection to the epmd port. </summary> @@ -26334,7 +26380,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmd_client_packets" lineno="27265"> +<interface name="corenet_send_epmd_client_packets" lineno="26021"> <summary> Send epmd_client packets. </summary> @@ -26345,7 +26391,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="27284"> +<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26040"> <summary> Do not audit attempts to send epmd_client packets. </summary> @@ -26356,7 +26402,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmd_client_packets" lineno="27303"> +<interface name="corenet_receive_epmd_client_packets" lineno="26059"> <summary> Receive epmd_client packets. </summary> @@ -26367,7 +26413,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="27322"> +<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26078"> <summary> Do not audit attempts to receive epmd_client packets. </summary> @@ -26378,7 +26424,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmd_client_packets" lineno="27341"> +<interface name="corenet_sendrecv_epmd_client_packets" lineno="26097"> <summary> Send and receive epmd_client packets. </summary> @@ -26389,7 +26435,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="27357"> +<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26113"> <summary> Do not audit attempts to send and receive epmd_client packets. </summary> @@ -26400,7 +26446,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmd_client_packets" lineno="27372"> +<interface name="corenet_relabelto_epmd_client_packets" lineno="26128"> <summary> Relabel packets to epmd_client the packet type. </summary> @@ -26410,7 +26456,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmd_server_packets" lineno="27392"> +<interface name="corenet_send_epmd_server_packets" lineno="26148"> <summary> Send epmd_server packets. </summary> @@ -26421,7 +26467,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="27411"> +<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26167"> <summary> Do not audit attempts to send epmd_server packets. </summary> @@ -26432,7 +26478,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmd_server_packets" lineno="27430"> +<interface name="corenet_receive_epmd_server_packets" lineno="26186"> <summary> Receive epmd_server packets. </summary> @@ -26443,7 +26489,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="27449"> +<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26205"> <summary> Do not audit attempts to receive epmd_server packets. </summary> @@ -26454,7 +26500,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmd_server_packets" lineno="27468"> +<interface name="corenet_sendrecv_epmd_server_packets" lineno="26224"> <summary> Send and receive epmd_server packets. </summary> @@ -26465,7 +26511,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="27484"> +<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26240"> <summary> Do not audit attempts to send and receive epmd_server packets. </summary> @@ -26476,7 +26522,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmd_server_packets" lineno="27499"> +<interface name="corenet_relabelto_epmd_server_packets" lineno="26255"> <summary> Relabel packets to epmd_server the packet type. </summary> @@ -26486,7 +26532,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="27521"> +<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26277"> <summary> Send and receive TCP traffic on the fingerd port. </summary> @@ -26497,7 +26543,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_fingerd_port" lineno="27540"> +<interface name="corenet_udp_send_fingerd_port" lineno="26292"> <summary> Send UDP traffic on the fingerd port. </summary> @@ -26508,7 +26554,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="27559"> +<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26307"> <summary> Do not audit attempts to send UDP traffic on the fingerd port. </summary> @@ -26519,7 +26565,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_fingerd_port" lineno="27578"> +<interface name="corenet_udp_receive_fingerd_port" lineno="26322"> <summary> Receive UDP traffic on the fingerd port. </summary> @@ -26530,7 +26576,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="27597"> +<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26337"> <summary> Do not audit attempts to receive UDP traffic on the fingerd port. </summary> @@ -26541,7 +26587,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_fingerd_port" lineno="27616"> +<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26352"> <summary> Send and receive UDP traffic on the fingerd port. </summary> @@ -26552,7 +26598,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="27633"> +<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26368"> <summary> Do not audit attempts to send and receive UDP traffic on the fingerd port. @@ -26564,7 +26610,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_fingerd_port" lineno="27649"> +<interface name="corenet_tcp_bind_fingerd_port" lineno="26383"> <summary> Bind TCP sockets to the fingerd port. </summary> @@ -26575,7 +26621,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_fingerd_port" lineno="27669"> +<interface name="corenet_udp_bind_fingerd_port" lineno="26403"> <summary> Bind UDP sockets to the fingerd port. </summary> @@ -26586,7 +26632,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_fingerd_port" lineno="27688"> +<interface name="corenet_tcp_connect_fingerd_port" lineno="26422"> <summary> Make a TCP connection to the fingerd port. </summary> @@ -26596,7 +26642,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_fingerd_client_packets" lineno="27708"> +<interface name="corenet_send_fingerd_client_packets" lineno="26442"> <summary> Send fingerd_client packets. </summary> @@ -26607,7 +26653,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27727"> +<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="26461"> <summary> Do not audit attempts to send fingerd_client packets. </summary> @@ -26618,7 +26664,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_fingerd_client_packets" lineno="27746"> +<interface name="corenet_receive_fingerd_client_packets" lineno="26480"> <summary> Receive fingerd_client packets. </summary> @@ -26629,7 +26675,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27765"> +<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="26499"> <summary> Do not audit attempts to receive fingerd_client packets. </summary> @@ -26640,7 +26686,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27784"> +<interface name="corenet_sendrecv_fingerd_client_packets" lineno="26518"> <summary> Send and receive fingerd_client packets. </summary> @@ -26651,7 +26697,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27800"> +<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="26534"> <summary> Do not audit attempts to send and receive fingerd_client packets. </summary> @@ -26662,7 +26708,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_fingerd_client_packets" lineno="27815"> +<interface name="corenet_relabelto_fingerd_client_packets" lineno="26549"> <summary> Relabel packets to fingerd_client the packet type. </summary> @@ -26672,7 +26718,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_fingerd_server_packets" lineno="27835"> +<interface name="corenet_send_fingerd_server_packets" lineno="26569"> <summary> Send fingerd_server packets. </summary> @@ -26683,7 +26729,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27854"> +<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="26588"> <summary> Do not audit attempts to send fingerd_server packets. </summary> @@ -26694,7 +26740,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_fingerd_server_packets" lineno="27873"> +<interface name="corenet_receive_fingerd_server_packets" lineno="26607"> <summary> Receive fingerd_server packets. </summary> @@ -26705,7 +26751,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27892"> +<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="26626"> <summary> Do not audit attempts to receive fingerd_server packets. </summary> @@ -26716,7 +26762,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27911"> +<interface name="corenet_sendrecv_fingerd_server_packets" lineno="26645"> <summary> Send and receive fingerd_server packets. </summary> @@ -26727,7 +26773,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27927"> +<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="26661"> <summary> Do not audit attempts to send and receive fingerd_server packets. </summary> @@ -26738,7 +26784,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_fingerd_server_packets" lineno="27942"> +<interface name="corenet_relabelto_fingerd_server_packets" lineno="26676"> <summary> Relabel packets to fingerd_server the packet type. </summary> @@ -26748,7 +26794,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27964"> +<interface name="corenet_tcp_sendrecv_ftp_port" lineno="26698"> <summary> Send and receive TCP traffic on the ftp port. </summary> @@ -26759,7 +26805,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ftp_port" lineno="27983"> +<interface name="corenet_udp_send_ftp_port" lineno="26713"> <summary> Send UDP traffic on the ftp port. </summary> @@ -26770,7 +26816,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="28002"> +<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="26728"> <summary> Do not audit attempts to send UDP traffic on the ftp port. </summary> @@ -26781,7 +26827,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ftp_port" lineno="28021"> +<interface name="corenet_udp_receive_ftp_port" lineno="26743"> <summary> Receive UDP traffic on the ftp port. </summary> @@ -26792,7 +26838,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="28040"> +<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="26758"> <summary> Do not audit attempts to receive UDP traffic on the ftp port. </summary> @@ -26803,7 +26849,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ftp_port" lineno="28059"> +<interface name="corenet_udp_sendrecv_ftp_port" lineno="26773"> <summary> Send and receive UDP traffic on the ftp port. </summary> @@ -26814,7 +26860,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="28076"> +<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="26789"> <summary> Do not audit attempts to send and receive UDP traffic on the ftp port. @@ -26826,7 +26872,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ftp_port" lineno="28092"> +<interface name="corenet_tcp_bind_ftp_port" lineno="26804"> <summary> Bind TCP sockets to the ftp port. </summary> @@ -26837,7 +26883,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ftp_port" lineno="28112"> +<interface name="corenet_udp_bind_ftp_port" lineno="26824"> <summary> Bind UDP sockets to the ftp port. </summary> @@ -26848,7 +26894,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ftp_port" lineno="28131"> +<interface name="corenet_tcp_connect_ftp_port" lineno="26843"> <summary> Make a TCP connection to the ftp port. </summary> @@ -26858,7 +26904,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_client_packets" lineno="28151"> +<interface name="corenet_send_ftp_client_packets" lineno="26863"> <summary> Send ftp_client packets. </summary> @@ -26869,7 +26915,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="28170"> +<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="26882"> <summary> Do not audit attempts to send ftp_client packets. </summary> @@ -26880,7 +26926,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_client_packets" lineno="28189"> +<interface name="corenet_receive_ftp_client_packets" lineno="26901"> <summary> Receive ftp_client packets. </summary> @@ -26891,7 +26937,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="28208"> +<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="26920"> <summary> Do not audit attempts to receive ftp_client packets. </summary> @@ -26902,7 +26948,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_client_packets" lineno="28227"> +<interface name="corenet_sendrecv_ftp_client_packets" lineno="26939"> <summary> Send and receive ftp_client packets. </summary> @@ -26913,7 +26959,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="28243"> +<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="26955"> <summary> Do not audit attempts to send and receive ftp_client packets. </summary> @@ -26924,7 +26970,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_client_packets" lineno="28258"> +<interface name="corenet_relabelto_ftp_client_packets" lineno="26970"> <summary> Relabel packets to ftp_client the packet type. </summary> @@ -26934,7 +26980,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_server_packets" lineno="28278"> +<interface name="corenet_send_ftp_server_packets" lineno="26990"> <summary> Send ftp_server packets. </summary> @@ -26945,7 +26991,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="28297"> +<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27009"> <summary> Do not audit attempts to send ftp_server packets. </summary> @@ -26956,7 +27002,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_server_packets" lineno="28316"> +<interface name="corenet_receive_ftp_server_packets" lineno="27028"> <summary> Receive ftp_server packets. </summary> @@ -26967,7 +27013,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="28335"> +<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27047"> <summary> Do not audit attempts to receive ftp_server packets. </summary> @@ -26978,7 +27024,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_server_packets" lineno="28354"> +<interface name="corenet_sendrecv_ftp_server_packets" lineno="27066"> <summary> Send and receive ftp_server packets. </summary> @@ -26989,7 +27035,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="28370"> +<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27082"> <summary> Do not audit attempts to send and receive ftp_server packets. </summary> @@ -27000,7 +27046,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_server_packets" lineno="28385"> +<interface name="corenet_relabelto_ftp_server_packets" lineno="27097"> <summary> Relabel packets to ftp_server the packet type. </summary> @@ -27010,7 +27056,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="28407"> +<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27119"> <summary> Send and receive TCP traffic on the ftp_data port. </summary> @@ -27021,7 +27067,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ftp_data_port" lineno="28426"> +<interface name="corenet_udp_send_ftp_data_port" lineno="27134"> <summary> Send UDP traffic on the ftp_data port. </summary> @@ -27032,7 +27078,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="28445"> +<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27149"> <summary> Do not audit attempts to send UDP traffic on the ftp_data port. </summary> @@ -27043,7 +27089,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ftp_data_port" lineno="28464"> +<interface name="corenet_udp_receive_ftp_data_port" lineno="27164"> <summary> Receive UDP traffic on the ftp_data port. </summary> @@ -27054,7 +27100,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="28483"> +<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27179"> <summary> Do not audit attempts to receive UDP traffic on the ftp_data port. </summary> @@ -27065,7 +27111,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="28502"> +<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27194"> <summary> Send and receive UDP traffic on the ftp_data port. </summary> @@ -27076,7 +27122,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="28519"> +<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27210"> <summary> Do not audit attempts to send and receive UDP traffic on the ftp_data port. @@ -27088,7 +27134,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ftp_data_port" lineno="28535"> +<interface name="corenet_tcp_bind_ftp_data_port" lineno="27225"> <summary> Bind TCP sockets to the ftp_data port. </summary> @@ -27099,7 +27145,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ftp_data_port" lineno="28555"> +<interface name="corenet_udp_bind_ftp_data_port" lineno="27245"> <summary> Bind UDP sockets to the ftp_data port. </summary> @@ -27110,7 +27156,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ftp_data_port" lineno="28574"> +<interface name="corenet_tcp_connect_ftp_data_port" lineno="27264"> <summary> Make a TCP connection to the ftp_data port. </summary> @@ -27120,7 +27166,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_data_client_packets" lineno="28594"> +<interface name="corenet_send_ftp_data_client_packets" lineno="27284"> <summary> Send ftp_data_client packets. </summary> @@ -27131,7 +27177,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="28613"> +<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27303"> <summary> Do not audit attempts to send ftp_data_client packets. </summary> @@ -27142,7 +27188,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_data_client_packets" lineno="28632"> +<interface name="corenet_receive_ftp_data_client_packets" lineno="27322"> <summary> Receive ftp_data_client packets. </summary> @@ -27153,7 +27199,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="28651"> +<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27341"> <summary> Do not audit attempts to receive ftp_data_client packets. </summary> @@ -27164,7 +27210,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="28670"> +<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27360"> <summary> Send and receive ftp_data_client packets. </summary> @@ -27175,7 +27221,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="28686"> +<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27376"> <summary> Do not audit attempts to send and receive ftp_data_client packets. </summary> @@ -27186,7 +27232,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_data_client_packets" lineno="28701"> +<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27391"> <summary> Relabel packets to ftp_data_client the packet type. </summary> @@ -27196,7 +27242,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_data_server_packets" lineno="28721"> +<interface name="corenet_send_ftp_data_server_packets" lineno="27411"> <summary> Send ftp_data_server packets. </summary> @@ -27207,7 +27253,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="28740"> +<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27430"> <summary> Do not audit attempts to send ftp_data_server packets. </summary> @@ -27218,7 +27264,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_data_server_packets" lineno="28759"> +<interface name="corenet_receive_ftp_data_server_packets" lineno="27449"> <summary> Receive ftp_data_server packets. </summary> @@ -27229,7 +27275,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28778"> +<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="27468"> <summary> Do not audit attempts to receive ftp_data_server packets. </summary> @@ -27240,7 +27286,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28797"> +<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="27487"> <summary> Send and receive ftp_data_server packets. </summary> @@ -27251,7 +27297,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28813"> +<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="27503"> <summary> Do not audit attempts to send and receive ftp_data_server packets. </summary> @@ -27262,7 +27308,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28828"> +<interface name="corenet_relabelto_ftp_data_server_packets" lineno="27518"> <summary> Relabel packets to ftp_data_server the packet type. </summary> @@ -27272,7 +27318,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28850"> +<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="27540"> <summary> Send and receive TCP traffic on the gatekeeper port. </summary> @@ -27283,7 +27329,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_gatekeeper_port" lineno="28869"> +<interface name="corenet_udp_send_gatekeeper_port" lineno="27555"> <summary> Send UDP traffic on the gatekeeper port. </summary> @@ -27294,7 +27340,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28888"> +<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="27570"> <summary> Do not audit attempts to send UDP traffic on the gatekeeper port. </summary> @@ -27305,7 +27351,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gatekeeper_port" lineno="28907"> +<interface name="corenet_udp_receive_gatekeeper_port" lineno="27585"> <summary> Receive UDP traffic on the gatekeeper port. </summary> @@ -27316,7 +27362,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28926"> +<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="27600"> <summary> Do not audit attempts to receive UDP traffic on the gatekeeper port. </summary> @@ -27327,7 +27373,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28945"> +<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="27615"> <summary> Send and receive UDP traffic on the gatekeeper port. </summary> @@ -27338,7 +27384,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28962"> +<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="27631"> <summary> Do not audit attempts to send and receive UDP traffic on the gatekeeper port. @@ -27350,7 +27396,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28978"> +<interface name="corenet_tcp_bind_gatekeeper_port" lineno="27646"> <summary> Bind TCP sockets to the gatekeeper port. </summary> @@ -27361,7 +27407,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gatekeeper_port" lineno="28998"> +<interface name="corenet_udp_bind_gatekeeper_port" lineno="27666"> <summary> Bind UDP sockets to the gatekeeper port. </summary> @@ -27372,7 +27418,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gatekeeper_port" lineno="29017"> +<interface name="corenet_tcp_connect_gatekeeper_port" lineno="27685"> <summary> Make a TCP connection to the gatekeeper port. </summary> @@ -27382,7 +27428,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gatekeeper_client_packets" lineno="29037"> +<interface name="corenet_send_gatekeeper_client_packets" lineno="27705"> <summary> Send gatekeeper_client packets. </summary> @@ -27393,7 +27439,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="29056"> +<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="27724"> <summary> Do not audit attempts to send gatekeeper_client packets. </summary> @@ -27404,7 +27450,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gatekeeper_client_packets" lineno="29075"> +<interface name="corenet_receive_gatekeeper_client_packets" lineno="27743"> <summary> Receive gatekeeper_client packets. </summary> @@ -27415,7 +27461,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="29094"> +<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="27762"> <summary> Do not audit attempts to receive gatekeeper_client packets. </summary> @@ -27426,7 +27472,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="29113"> +<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="27781"> <summary> Send and receive gatekeeper_client packets. </summary> @@ -27437,7 +27483,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="29129"> +<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="27797"> <summary> Do not audit attempts to send and receive gatekeeper_client packets. </summary> @@ -27448,7 +27494,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="29144"> +<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="27812"> <summary> Relabel packets to gatekeeper_client the packet type. </summary> @@ -27458,7 +27504,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gatekeeper_server_packets" lineno="29164"> +<interface name="corenet_send_gatekeeper_server_packets" lineno="27832"> <summary> Send gatekeeper_server packets. </summary> @@ -27469,7 +27515,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="29183"> +<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="27851"> <summary> Do not audit attempts to send gatekeeper_server packets. </summary> @@ -27480,7 +27526,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gatekeeper_server_packets" lineno="29202"> +<interface name="corenet_receive_gatekeeper_server_packets" lineno="27870"> <summary> Receive gatekeeper_server packets. </summary> @@ -27491,7 +27537,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="29221"> +<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="27889"> <summary> Do not audit attempts to receive gatekeeper_server packets. </summary> @@ -27502,7 +27548,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="29240"> +<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="27908"> <summary> Send and receive gatekeeper_server packets. </summary> @@ -27513,7 +27559,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="29256"> +<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="27924"> <summary> Do not audit attempts to send and receive gatekeeper_server packets. </summary> @@ -27524,7 +27570,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="29271"> +<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="27939"> <summary> Relabel packets to gatekeeper_server the packet type. </summary> @@ -27534,7 +27580,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="29293"> +<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="27961"> <summary> Send and receive TCP traffic on the gdomap port. </summary> @@ -27545,7 +27591,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_gdomap_port" lineno="29312"> +<interface name="corenet_udp_send_gdomap_port" lineno="27976"> <summary> Send UDP traffic on the gdomap port. </summary> @@ -27556,7 +27602,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="29331"> +<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="27991"> <summary> Do not audit attempts to send UDP traffic on the gdomap port. </summary> @@ -27567,7 +27613,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gdomap_port" lineno="29350"> +<interface name="corenet_udp_receive_gdomap_port" lineno="28006"> <summary> Receive UDP traffic on the gdomap port. </summary> @@ -27578,7 +27624,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="29369"> +<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28021"> <summary> Do not audit attempts to receive UDP traffic on the gdomap port. </summary> @@ -27589,7 +27635,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gdomap_port" lineno="29388"> +<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28036"> <summary> Send and receive UDP traffic on the gdomap port. </summary> @@ -27600,7 +27646,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="29405"> +<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28052"> <summary> Do not audit attempts to send and receive UDP traffic on the gdomap port. @@ -27612,7 +27658,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gdomap_port" lineno="29421"> +<interface name="corenet_tcp_bind_gdomap_port" lineno="28067"> <summary> Bind TCP sockets to the gdomap port. </summary> @@ -27623,7 +27669,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gdomap_port" lineno="29441"> +<interface name="corenet_udp_bind_gdomap_port" lineno="28087"> <summary> Bind UDP sockets to the gdomap port. </summary> @@ -27634,7 +27680,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gdomap_port" lineno="29460"> +<interface name="corenet_tcp_connect_gdomap_port" lineno="28106"> <summary> Make a TCP connection to the gdomap port. </summary> @@ -27644,7 +27690,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gdomap_client_packets" lineno="29480"> +<interface name="corenet_send_gdomap_client_packets" lineno="28126"> <summary> Send gdomap_client packets. </summary> @@ -27655,7 +27701,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="29499"> +<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28145"> <summary> Do not audit attempts to send gdomap_client packets. </summary> @@ -27666,7 +27712,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gdomap_client_packets" lineno="29518"> +<interface name="corenet_receive_gdomap_client_packets" lineno="28164"> <summary> Receive gdomap_client packets. </summary> @@ -27677,7 +27723,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="29537"> +<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28183"> <summary> Do not audit attempts to receive gdomap_client packets. </summary> @@ -27688,7 +27734,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gdomap_client_packets" lineno="29556"> +<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28202"> <summary> Send and receive gdomap_client packets. </summary> @@ -27699,7 +27745,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="29572"> +<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28218"> <summary> Do not audit attempts to send and receive gdomap_client packets. </summary> @@ -27710,7 +27756,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gdomap_client_packets" lineno="29587"> +<interface name="corenet_relabelto_gdomap_client_packets" lineno="28233"> <summary> Relabel packets to gdomap_client the packet type. </summary> @@ -27720,7 +27766,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gdomap_server_packets" lineno="29607"> +<interface name="corenet_send_gdomap_server_packets" lineno="28253"> <summary> Send gdomap_server packets. </summary> @@ -27731,7 +27777,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="29626"> +<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28272"> <summary> Do not audit attempts to send gdomap_server packets. </summary> @@ -27742,7 +27788,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gdomap_server_packets" lineno="29645"> +<interface name="corenet_receive_gdomap_server_packets" lineno="28291"> <summary> Receive gdomap_server packets. </summary> @@ -27753,7 +27799,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="29664"> +<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28310"> <summary> Do not audit attempts to receive gdomap_server packets. </summary> @@ -27764,7 +27810,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gdomap_server_packets" lineno="29683"> +<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28329"> <summary> Send and receive gdomap_server packets. </summary> @@ -27775,7 +27821,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="29699"> +<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28345"> <summary> Do not audit attempts to send and receive gdomap_server packets. </summary> @@ -27786,7 +27832,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gdomap_server_packets" lineno="29714"> +<interface name="corenet_relabelto_gdomap_server_packets" lineno="28360"> <summary> Relabel packets to gdomap_server the packet type. </summary> @@ -27796,7 +27842,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="29736"> +<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28382"> <summary> Send and receive TCP traffic on the gds_db port. </summary> @@ -27807,7 +27853,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_gds_db_port" lineno="29755"> +<interface name="corenet_udp_send_gds_db_port" lineno="28397"> <summary> Send UDP traffic on the gds_db port. </summary> @@ -27818,7 +27864,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="29774"> +<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28412"> <summary> Do not audit attempts to send UDP traffic on the gds_db port. </summary> @@ -27829,7 +27875,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gds_db_port" lineno="29793"> +<interface name="corenet_udp_receive_gds_db_port" lineno="28427"> <summary> Receive UDP traffic on the gds_db port. </summary> @@ -27840,7 +27886,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="29812"> +<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28442"> <summary> Do not audit attempts to receive UDP traffic on the gds_db port. </summary> @@ -27851,7 +27897,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29831"> +<interface name="corenet_udp_sendrecv_gds_db_port" lineno="28457"> <summary> Send and receive UDP traffic on the gds_db port. </summary> @@ -27862,7 +27908,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29848"> +<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="28473"> <summary> Do not audit attempts to send and receive UDP traffic on the gds_db port. @@ -27874,7 +27920,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gds_db_port" lineno="29864"> +<interface name="corenet_tcp_bind_gds_db_port" lineno="28488"> <summary> Bind TCP sockets to the gds_db port. </summary> @@ -27885,7 +27931,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gds_db_port" lineno="29884"> +<interface name="corenet_udp_bind_gds_db_port" lineno="28508"> <summary> Bind UDP sockets to the gds_db port. </summary> @@ -27896,7 +27942,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gds_db_port" lineno="29903"> +<interface name="corenet_tcp_connect_gds_db_port" lineno="28527"> <summary> Make a TCP connection to the gds_db port. </summary> @@ -27906,7 +27952,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gds_db_client_packets" lineno="29923"> +<interface name="corenet_send_gds_db_client_packets" lineno="28547"> <summary> Send gds_db_client packets. </summary> @@ -27917,7 +27963,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29942"> +<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="28566"> <summary> Do not audit attempts to send gds_db_client packets. </summary> @@ -27928,7 +27974,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gds_db_client_packets" lineno="29961"> +<interface name="corenet_receive_gds_db_client_packets" lineno="28585"> <summary> Receive gds_db_client packets. </summary> @@ -27939,7 +27985,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29980"> +<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="28604"> <summary> Do not audit attempts to receive gds_db_client packets. </summary> @@ -27950,7 +27996,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29999"> +<interface name="corenet_sendrecv_gds_db_client_packets" lineno="28623"> <summary> Send and receive gds_db_client packets. </summary> @@ -27961,7 +28007,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="30015"> +<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="28639"> <summary> Do not audit attempts to send and receive gds_db_client packets. </summary> @@ -27972,7 +28018,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gds_db_client_packets" lineno="30030"> +<interface name="corenet_relabelto_gds_db_client_packets" lineno="28654"> <summary> Relabel packets to gds_db_client the packet type. </summary> @@ -27982,7 +28028,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gds_db_server_packets" lineno="30050"> +<interface name="corenet_send_gds_db_server_packets" lineno="28674"> <summary> Send gds_db_server packets. </summary> @@ -27993,7 +28039,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="30069"> +<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="28693"> <summary> Do not audit attempts to send gds_db_server packets. </summary> @@ -28004,7 +28050,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gds_db_server_packets" lineno="30088"> +<interface name="corenet_receive_gds_db_server_packets" lineno="28712"> <summary> Receive gds_db_server packets. </summary> @@ -28015,7 +28061,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="30107"> +<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="28731"> <summary> Do not audit attempts to receive gds_db_server packets. </summary> @@ -28026,7 +28072,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gds_db_server_packets" lineno="30126"> +<interface name="corenet_sendrecv_gds_db_server_packets" lineno="28750"> <summary> Send and receive gds_db_server packets. </summary> @@ -28037,7 +28083,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="30142"> +<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="28766"> <summary> Do not audit attempts to send and receive gds_db_server packets. </summary> @@ -28048,7 +28094,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gds_db_server_packets" lineno="30157"> +<interface name="corenet_relabelto_gds_db_server_packets" lineno="28781"> <summary> Relabel packets to gds_db_server the packet type. </summary> @@ -28058,7 +28104,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_giftd_port" lineno="30179"> +<interface name="corenet_tcp_sendrecv_giftd_port" lineno="28803"> <summary> Send and receive TCP traffic on the giftd port. </summary> @@ -28069,7 +28115,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_giftd_port" lineno="30198"> +<interface name="corenet_udp_send_giftd_port" lineno="28818"> <summary> Send UDP traffic on the giftd port. </summary> @@ -28080,7 +28126,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_giftd_port" lineno="30217"> +<interface name="corenet_dontaudit_udp_send_giftd_port" lineno="28833"> <summary> Do not audit attempts to send UDP traffic on the giftd port. </summary> @@ -28091,7 +28137,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_giftd_port" lineno="30236"> +<interface name="corenet_udp_receive_giftd_port" lineno="28848"> <summary> Receive UDP traffic on the giftd port. </summary> @@ -28102,7 +28148,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_giftd_port" lineno="30255"> +<interface name="corenet_dontaudit_udp_receive_giftd_port" lineno="28863"> <summary> Do not audit attempts to receive UDP traffic on the giftd port. </summary> @@ -28113,7 +28159,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_giftd_port" lineno="30274"> +<interface name="corenet_udp_sendrecv_giftd_port" lineno="28878"> <summary> Send and receive UDP traffic on the giftd port. </summary> @@ -28124,7 +28170,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_giftd_port" lineno="30291"> +<interface name="corenet_dontaudit_udp_sendrecv_giftd_port" lineno="28894"> <summary> Do not audit attempts to send and receive UDP traffic on the giftd port. @@ -28136,7 +28182,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_giftd_port" lineno="30307"> +<interface name="corenet_tcp_bind_giftd_port" lineno="28909"> <summary> Bind TCP sockets to the giftd port. </summary> @@ -28147,7 +28193,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_giftd_port" lineno="30327"> +<interface name="corenet_udp_bind_giftd_port" lineno="28929"> <summary> Bind UDP sockets to the giftd port. </summary> @@ -28158,7 +28204,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_giftd_port" lineno="30346"> +<interface name="corenet_tcp_connect_giftd_port" lineno="28948"> <summary> Make a TCP connection to the giftd port. </summary> @@ -28168,7 +28214,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_giftd_client_packets" lineno="30366"> +<interface name="corenet_send_giftd_client_packets" lineno="28968"> <summary> Send giftd_client packets. </summary> @@ -28179,7 +28225,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_giftd_client_packets" lineno="30385"> +<interface name="corenet_dontaudit_send_giftd_client_packets" lineno="28987"> <summary> Do not audit attempts to send giftd_client packets. </summary> @@ -28190,7 +28236,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_giftd_client_packets" lineno="30404"> +<interface name="corenet_receive_giftd_client_packets" lineno="29006"> <summary> Receive giftd_client packets. </summary> @@ -28201,7 +28247,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_giftd_client_packets" lineno="30423"> +<interface name="corenet_dontaudit_receive_giftd_client_packets" lineno="29025"> <summary> Do not audit attempts to receive giftd_client packets. </summary> @@ -28212,7 +28258,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_giftd_client_packets" lineno="30442"> +<interface name="corenet_sendrecv_giftd_client_packets" lineno="29044"> <summary> Send and receive giftd_client packets. </summary> @@ -28223,7 +28269,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_giftd_client_packets" lineno="30458"> +<interface name="corenet_dontaudit_sendrecv_giftd_client_packets" lineno="29060"> <summary> Do not audit attempts to send and receive giftd_client packets. </summary> @@ -28234,7 +28280,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_giftd_client_packets" lineno="30473"> +<interface name="corenet_relabelto_giftd_client_packets" lineno="29075"> <summary> Relabel packets to giftd_client the packet type. </summary> @@ -28244,7 +28290,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_giftd_server_packets" lineno="30493"> +<interface name="corenet_send_giftd_server_packets" lineno="29095"> <summary> Send giftd_server packets. </summary> @@ -28255,7 +28301,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_giftd_server_packets" lineno="30512"> +<interface name="corenet_dontaudit_send_giftd_server_packets" lineno="29114"> <summary> Do not audit attempts to send giftd_server packets. </summary> @@ -28266,7 +28312,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_giftd_server_packets" lineno="30531"> +<interface name="corenet_receive_giftd_server_packets" lineno="29133"> <summary> Receive giftd_server packets. </summary> @@ -28277,7 +28323,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_giftd_server_packets" lineno="30550"> +<interface name="corenet_dontaudit_receive_giftd_server_packets" lineno="29152"> <summary> Do not audit attempts to receive giftd_server packets. </summary> @@ -28288,7 +28334,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_giftd_server_packets" lineno="30569"> +<interface name="corenet_sendrecv_giftd_server_packets" lineno="29171"> <summary> Send and receive giftd_server packets. </summary> @@ -28299,7 +28345,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_giftd_server_packets" lineno="30585"> +<interface name="corenet_dontaudit_sendrecv_giftd_server_packets" lineno="29187"> <summary> Do not audit attempts to send and receive giftd_server packets. </summary> @@ -28310,7 +28356,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_giftd_server_packets" lineno="30600"> +<interface name="corenet_relabelto_giftd_server_packets" lineno="29202"> <summary> Relabel packets to giftd_server the packet type. </summary> @@ -28320,7 +28366,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_git_port" lineno="30622"> +<interface name="corenet_tcp_sendrecv_git_port" lineno="29224"> <summary> Send and receive TCP traffic on the git port. </summary> @@ -28331,7 +28377,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_git_port" lineno="30641"> +<interface name="corenet_udp_send_git_port" lineno="29239"> <summary> Send UDP traffic on the git port. </summary> @@ -28342,7 +28388,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_git_port" lineno="30660"> +<interface name="corenet_dontaudit_udp_send_git_port" lineno="29254"> <summary> Do not audit attempts to send UDP traffic on the git port. </summary> @@ -28353,7 +28399,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_git_port" lineno="30679"> +<interface name="corenet_udp_receive_git_port" lineno="29269"> <summary> Receive UDP traffic on the git port. </summary> @@ -28364,7 +28410,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_git_port" lineno="30698"> +<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29284"> <summary> Do not audit attempts to receive UDP traffic on the git port. </summary> @@ -28375,7 +28421,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_git_port" lineno="30717"> +<interface name="corenet_udp_sendrecv_git_port" lineno="29299"> <summary> Send and receive UDP traffic on the git port. </summary> @@ -28386,7 +28432,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="30734"> +<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29315"> <summary> Do not audit attempts to send and receive UDP traffic on the git port. @@ -28398,7 +28444,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_git_port" lineno="30750"> +<interface name="corenet_tcp_bind_git_port" lineno="29330"> <summary> Bind TCP sockets to the git port. </summary> @@ -28409,7 +28455,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_git_port" lineno="30770"> +<interface name="corenet_udp_bind_git_port" lineno="29350"> <summary> Bind UDP sockets to the git port. </summary> @@ -28420,7 +28466,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_git_port" lineno="30789"> +<interface name="corenet_tcp_connect_git_port" lineno="29369"> <summary> Make a TCP connection to the git port. </summary> @@ -28430,7 +28476,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_git_client_packets" lineno="30809"> +<interface name="corenet_send_git_client_packets" lineno="29389"> <summary> Send git_client packets. </summary> @@ -28441,7 +28487,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_git_client_packets" lineno="30828"> +<interface name="corenet_dontaudit_send_git_client_packets" lineno="29408"> <summary> Do not audit attempts to send git_client packets. </summary> @@ -28452,7 +28498,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_git_client_packets" lineno="30847"> +<interface name="corenet_receive_git_client_packets" lineno="29427"> <summary> Receive git_client packets. </summary> @@ -28463,7 +28509,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_git_client_packets" lineno="30866"> +<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29446"> <summary> Do not audit attempts to receive git_client packets. </summary> @@ -28474,7 +28520,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_git_client_packets" lineno="30885"> +<interface name="corenet_sendrecv_git_client_packets" lineno="29465"> <summary> Send and receive git_client packets. </summary> @@ -28485,7 +28531,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="30901"> +<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29481"> <summary> Do not audit attempts to send and receive git_client packets. </summary> @@ -28496,7 +28542,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_git_client_packets" lineno="30916"> +<interface name="corenet_relabelto_git_client_packets" lineno="29496"> <summary> Relabel packets to git_client the packet type. </summary> @@ -28506,7 +28552,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_git_server_packets" lineno="30936"> +<interface name="corenet_send_git_server_packets" lineno="29516"> <summary> Send git_server packets. </summary> @@ -28517,7 +28563,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_git_server_packets" lineno="30955"> +<interface name="corenet_dontaudit_send_git_server_packets" lineno="29535"> <summary> Do not audit attempts to send git_server packets. </summary> @@ -28528,7 +28574,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_git_server_packets" lineno="30974"> +<interface name="corenet_receive_git_server_packets" lineno="29554"> <summary> Receive git_server packets. </summary> @@ -28539,7 +28585,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_git_server_packets" lineno="30993"> +<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29573"> <summary> Do not audit attempts to receive git_server packets. </summary> @@ -28550,7 +28596,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_git_server_packets" lineno="31012"> +<interface name="corenet_sendrecv_git_server_packets" lineno="29592"> <summary> Send and receive git_server packets. </summary> @@ -28561,7 +28607,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="31028"> +<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29608"> <summary> Do not audit attempts to send and receive git_server packets. </summary> @@ -28572,7 +28618,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_git_server_packets" lineno="31043"> +<interface name="corenet_relabelto_git_server_packets" lineno="29623"> <summary> Relabel packets to git_server the packet type. </summary> @@ -28582,7 +28628,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="31065"> +<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29645"> <summary> Send and receive TCP traffic on the glance_registry port. </summary> @@ -28593,7 +28639,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_glance_registry_port" lineno="31084"> +<interface name="corenet_udp_send_glance_registry_port" lineno="29660"> <summary> Send UDP traffic on the glance_registry port. </summary> @@ -28604,7 +28650,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="31103"> +<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29675"> <summary> Do not audit attempts to send UDP traffic on the glance_registry port. </summary> @@ -28615,7 +28661,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_glance_registry_port" lineno="31122"> +<interface name="corenet_udp_receive_glance_registry_port" lineno="29690"> <summary> Receive UDP traffic on the glance_registry port. </summary> @@ -28626,7 +28672,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="31141"> +<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29705"> <summary> Do not audit attempts to receive UDP traffic on the glance_registry port. </summary> @@ -28637,7 +28683,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="31160"> +<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29720"> <summary> Send and receive UDP traffic on the glance_registry port. </summary> @@ -28648,7 +28694,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="31177"> +<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29736"> <summary> Do not audit attempts to send and receive UDP traffic on the glance_registry port. @@ -28660,7 +28706,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_glance_registry_port" lineno="31193"> +<interface name="corenet_tcp_bind_glance_registry_port" lineno="29751"> <summary> Bind TCP sockets to the glance_registry port. </summary> @@ -28671,7 +28717,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_glance_registry_port" lineno="31213"> +<interface name="corenet_udp_bind_glance_registry_port" lineno="29771"> <summary> Bind UDP sockets to the glance_registry port. </summary> @@ -28682,7 +28728,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_glance_registry_port" lineno="31232"> +<interface name="corenet_tcp_connect_glance_registry_port" lineno="29790"> <summary> Make a TCP connection to the glance_registry port. </summary> @@ -28692,7 +28738,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_glance_registry_client_packets" lineno="31252"> +<interface name="corenet_send_glance_registry_client_packets" lineno="29810"> <summary> Send glance_registry_client packets. </summary> @@ -28703,7 +28749,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="31271"> +<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29829"> <summary> Do not audit attempts to send glance_registry_client packets. </summary> @@ -28714,7 +28760,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_glance_registry_client_packets" lineno="31290"> +<interface name="corenet_receive_glance_registry_client_packets" lineno="29848"> <summary> Receive glance_registry_client packets. </summary> @@ -28725,7 +28771,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="31309"> +<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29867"> <summary> Do not audit attempts to receive glance_registry_client packets. </summary> @@ -28736,7 +28782,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="31328"> +<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="29886"> <summary> Send and receive glance_registry_client packets. </summary> @@ -28747,7 +28793,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="31344"> +<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="29902"> <summary> Do not audit attempts to send and receive glance_registry_client packets. </summary> @@ -28758,7 +28804,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_glance_registry_client_packets" lineno="31359"> +<interface name="corenet_relabelto_glance_registry_client_packets" lineno="29917"> <summary> Relabel packets to glance_registry_client the packet type. </summary> @@ -28768,7 +28814,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_glance_registry_server_packets" lineno="31379"> +<interface name="corenet_send_glance_registry_server_packets" lineno="29937"> <summary> Send glance_registry_server packets. </summary> @@ -28779,7 +28825,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="31398"> +<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="29956"> <summary> Do not audit attempts to send glance_registry_server packets. </summary> @@ -28790,7 +28836,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_glance_registry_server_packets" lineno="31417"> +<interface name="corenet_receive_glance_registry_server_packets" lineno="29975"> <summary> Receive glance_registry_server packets. </summary> @@ -28801,7 +28847,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="31436"> +<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="29994"> <summary> Do not audit attempts to receive glance_registry_server packets. </summary> @@ -28812,7 +28858,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="31455"> +<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30013"> <summary> Send and receive glance_registry_server packets. </summary> @@ -28823,7 +28869,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="31471"> +<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30029"> <summary> Do not audit attempts to send and receive glance_registry_server packets. </summary> @@ -28834,7 +28880,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_glance_registry_server_packets" lineno="31486"> +<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30044"> <summary> Relabel packets to glance_registry_server the packet type. </summary> @@ -28844,7 +28890,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gopher_port" lineno="31508"> +<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30066"> <summary> Send and receive TCP traffic on the gopher port. </summary> @@ -28855,7 +28901,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_gopher_port" lineno="31527"> +<interface name="corenet_udp_send_gopher_port" lineno="30081"> <summary> Send UDP traffic on the gopher port. </summary> @@ -28866,7 +28912,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="31546"> +<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30096"> <summary> Do not audit attempts to send UDP traffic on the gopher port. </summary> @@ -28877,7 +28923,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gopher_port" lineno="31565"> +<interface name="corenet_udp_receive_gopher_port" lineno="30111"> <summary> Receive UDP traffic on the gopher port. </summary> @@ -28888,7 +28934,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="31584"> +<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30126"> <summary> Do not audit attempts to receive UDP traffic on the gopher port. </summary> @@ -28899,7 +28945,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gopher_port" lineno="31603"> +<interface name="corenet_udp_sendrecv_gopher_port" lineno="30141"> <summary> Send and receive UDP traffic on the gopher port. </summary> @@ -28910,7 +28956,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="31620"> +<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30157"> <summary> Do not audit attempts to send and receive UDP traffic on the gopher port. @@ -28922,7 +28968,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gopher_port" lineno="31636"> +<interface name="corenet_tcp_bind_gopher_port" lineno="30172"> <summary> Bind TCP sockets to the gopher port. </summary> @@ -28933,7 +28979,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gopher_port" lineno="31656"> +<interface name="corenet_udp_bind_gopher_port" lineno="30192"> <summary> Bind UDP sockets to the gopher port. </summary> @@ -28944,7 +28990,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gopher_port" lineno="31675"> +<interface name="corenet_tcp_connect_gopher_port" lineno="30211"> <summary> Make a TCP connection to the gopher port. </summary> @@ -28954,7 +29000,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gopher_client_packets" lineno="31695"> +<interface name="corenet_send_gopher_client_packets" lineno="30231"> <summary> Send gopher_client packets. </summary> @@ -28965,7 +29011,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="31714"> +<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30250"> <summary> Do not audit attempts to send gopher_client packets. </summary> @@ -28976,7 +29022,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gopher_client_packets" lineno="31733"> +<interface name="corenet_receive_gopher_client_packets" lineno="30269"> <summary> Receive gopher_client packets. </summary> @@ -28987,7 +29033,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="31752"> +<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30288"> <summary> Do not audit attempts to receive gopher_client packets. </summary> @@ -28998,7 +29044,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gopher_client_packets" lineno="31771"> +<interface name="corenet_sendrecv_gopher_client_packets" lineno="30307"> <summary> Send and receive gopher_client packets. </summary> @@ -29009,7 +29055,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="31787"> +<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30323"> <summary> Do not audit attempts to send and receive gopher_client packets. </summary> @@ -29020,7 +29066,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gopher_client_packets" lineno="31802"> +<interface name="corenet_relabelto_gopher_client_packets" lineno="30338"> <summary> Relabel packets to gopher_client the packet type. </summary> @@ -29030,7 +29076,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gopher_server_packets" lineno="31822"> +<interface name="corenet_send_gopher_server_packets" lineno="30358"> <summary> Send gopher_server packets. </summary> @@ -29041,7 +29087,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="31841"> +<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30377"> <summary> Do not audit attempts to send gopher_server packets. </summary> @@ -29052,7 +29098,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gopher_server_packets" lineno="31860"> +<interface name="corenet_receive_gopher_server_packets" lineno="30396"> <summary> Receive gopher_server packets. </summary> @@ -29063,7 +29109,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="31879"> +<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30415"> <summary> Do not audit attempts to receive gopher_server packets. </summary> @@ -29074,7 +29120,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gopher_server_packets" lineno="31898"> +<interface name="corenet_sendrecv_gopher_server_packets" lineno="30434"> <summary> Send and receive gopher_server packets. </summary> @@ -29085,7 +29131,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="31914"> +<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30450"> <summary> Do not audit attempts to send and receive gopher_server packets. </summary> @@ -29096,7 +29142,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gopher_server_packets" lineno="31929"> +<interface name="corenet_relabelto_gopher_server_packets" lineno="30465"> <summary> Relabel packets to gopher_server the packet type. </summary> @@ -29106,7 +29152,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="31951"> +<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30487"> <summary> Send and receive TCP traffic on the gpsd port. </summary> @@ -29117,7 +29163,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_gpsd_port" lineno="31970"> +<interface name="corenet_udp_send_gpsd_port" lineno="30502"> <summary> Send UDP traffic on the gpsd port. </summary> @@ -29128,7 +29174,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="31989"> +<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30517"> <summary> Do not audit attempts to send UDP traffic on the gpsd port. </summary> @@ -29139,7 +29185,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gpsd_port" lineno="32008"> +<interface name="corenet_udp_receive_gpsd_port" lineno="30532"> <summary> Receive UDP traffic on the gpsd port. </summary> @@ -29150,7 +29196,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="32027"> +<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30547"> <summary> Do not audit attempts to receive UDP traffic on the gpsd port. </summary> @@ -29161,7 +29207,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gpsd_port" lineno="32046"> +<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30562"> <summary> Send and receive UDP traffic on the gpsd port. </summary> @@ -29172,7 +29218,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="32063"> +<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30578"> <summary> Do not audit attempts to send and receive UDP traffic on the gpsd port. @@ -29184,7 +29230,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gpsd_port" lineno="32079"> +<interface name="corenet_tcp_bind_gpsd_port" lineno="30593"> <summary> Bind TCP sockets to the gpsd port. </summary> @@ -29195,7 +29241,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gpsd_port" lineno="32099"> +<interface name="corenet_udp_bind_gpsd_port" lineno="30613"> <summary> Bind UDP sockets to the gpsd port. </summary> @@ -29206,7 +29252,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gpsd_port" lineno="32118"> +<interface name="corenet_tcp_connect_gpsd_port" lineno="30632"> <summary> Make a TCP connection to the gpsd port. </summary> @@ -29216,7 +29262,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gpsd_client_packets" lineno="32138"> +<interface name="corenet_send_gpsd_client_packets" lineno="30652"> <summary> Send gpsd_client packets. </summary> @@ -29227,7 +29273,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="32157"> +<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30671"> <summary> Do not audit attempts to send gpsd_client packets. </summary> @@ -29238,7 +29284,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gpsd_client_packets" lineno="32176"> +<interface name="corenet_receive_gpsd_client_packets" lineno="30690"> <summary> Receive gpsd_client packets. </summary> @@ -29249,7 +29295,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="32195"> +<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30709"> <summary> Do not audit attempts to receive gpsd_client packets. </summary> @@ -29260,7 +29306,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gpsd_client_packets" lineno="32214"> +<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30728"> <summary> Send and receive gpsd_client packets. </summary> @@ -29271,7 +29317,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="32230"> +<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30744"> <summary> Do not audit attempts to send and receive gpsd_client packets. </summary> @@ -29282,7 +29328,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gpsd_client_packets" lineno="32245"> +<interface name="corenet_relabelto_gpsd_client_packets" lineno="30759"> <summary> Relabel packets to gpsd_client the packet type. </summary> @@ -29292,7 +29338,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gpsd_server_packets" lineno="32265"> +<interface name="corenet_send_gpsd_server_packets" lineno="30779"> <summary> Send gpsd_server packets. </summary> @@ -29303,7 +29349,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="32284"> +<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30798"> <summary> Do not audit attempts to send gpsd_server packets. </summary> @@ -29314,7 +29360,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gpsd_server_packets" lineno="32303"> +<interface name="corenet_receive_gpsd_server_packets" lineno="30817"> <summary> Receive gpsd_server packets. </summary> @@ -29325,7 +29371,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="32322"> +<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30836"> <summary> Do not audit attempts to receive gpsd_server packets. </summary> @@ -29336,7 +29382,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gpsd_server_packets" lineno="32341"> +<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30855"> <summary> Send and receive gpsd_server packets. </summary> @@ -29347,7 +29393,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="32357"> +<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30871"> <summary> Do not audit attempts to send and receive gpsd_server packets. </summary> @@ -29358,7 +29404,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gpsd_server_packets" lineno="32372"> +<interface name="corenet_relabelto_gpsd_server_packets" lineno="30886"> <summary> Relabel packets to gpsd_server the packet type. </summary> @@ -29368,7 +29414,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="32394"> +<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="30908"> <summary> Send and receive TCP traffic on the hadoop_datanode port. </summary> @@ -29379,7 +29425,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_hadoop_datanode_port" lineno="32413"> +<interface name="corenet_udp_send_hadoop_datanode_port" lineno="30923"> <summary> Send UDP traffic on the hadoop_datanode port. </summary> @@ -29390,7 +29436,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="32432"> +<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="30938"> <summary> Do not audit attempts to send UDP traffic on the hadoop_datanode port. </summary> @@ -29401,7 +29447,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="32451"> +<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="30953"> <summary> Receive UDP traffic on the hadoop_datanode port. </summary> @@ -29412,7 +29458,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="32470"> +<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="30968"> <summary> Do not audit attempts to receive UDP traffic on the hadoop_datanode port. </summary> @@ -29423,7 +29469,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="32489"> +<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="30983"> <summary> Send and receive UDP traffic on the hadoop_datanode port. </summary> @@ -29434,7 +29480,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="32506"> +<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="30999"> <summary> Do not audit attempts to send and receive UDP traffic on the hadoop_datanode port. @@ -29446,7 +29492,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="32522"> +<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31014"> <summary> Bind TCP sockets to the hadoop_datanode port. </summary> @@ -29457,7 +29503,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="32542"> +<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31034"> <summary> Bind UDP sockets to the hadoop_datanode port. </summary> @@ -29468,7 +29514,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="32561"> +<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31053"> <summary> Make a TCP connection to the hadoop_datanode port. </summary> @@ -29478,7 +29524,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_datanode_client_packets" lineno="32581"> +<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31073"> <summary> Send hadoop_datanode_client packets. </summary> @@ -29489,7 +29535,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="32600"> +<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31092"> <summary> Do not audit attempts to send hadoop_datanode_client packets. </summary> @@ -29500,7 +29546,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="32619"> +<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31111"> <summary> Receive hadoop_datanode_client packets. </summary> @@ -29511,7 +29557,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="32638"> +<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31130"> <summary> Do not audit attempts to receive hadoop_datanode_client packets. </summary> @@ -29522,7 +29568,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="32657"> +<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31149"> <summary> Send and receive hadoop_datanode_client packets. </summary> @@ -29533,7 +29579,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="32673"> +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31165"> <summary> Do not audit attempts to send and receive hadoop_datanode_client packets. </summary> @@ -29544,7 +29590,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="32688"> +<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31180"> <summary> Relabel packets to hadoop_datanode_client the packet type. </summary> @@ -29554,7 +29600,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_datanode_server_packets" lineno="32708"> +<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31200"> <summary> Send hadoop_datanode_server packets. </summary> @@ -29565,7 +29611,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="32727"> +<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31219"> <summary> Do not audit attempts to send hadoop_datanode_server packets. </summary> @@ -29576,7 +29622,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="32746"> +<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31238"> <summary> Receive hadoop_datanode_server packets. </summary> @@ -29587,7 +29633,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="32765"> +<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31257"> <summary> Do not audit attempts to receive hadoop_datanode_server packets. </summary> @@ -29598,7 +29644,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="32784"> +<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31276"> <summary> Send and receive hadoop_datanode_server packets. </summary> @@ -29609,7 +29655,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="32800"> +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31292"> <summary> Do not audit attempts to send and receive hadoop_datanode_server packets. </summary> @@ -29620,7 +29666,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="32815"> +<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31307"> <summary> Relabel packets to hadoop_datanode_server the packet type. </summary> @@ -29630,7 +29676,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="32837"> +<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31329"> <summary> Send and receive TCP traffic on the hadoop_namenode port. </summary> @@ -29641,7 +29687,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_hadoop_namenode_port" lineno="32856"> +<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31344"> <summary> Send UDP traffic on the hadoop_namenode port. </summary> @@ -29652,7 +29698,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="32875"> +<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31359"> <summary> Do not audit attempts to send UDP traffic on the hadoop_namenode port. </summary> @@ -29663,7 +29709,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="32894"> +<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31374"> <summary> Receive UDP traffic on the hadoop_namenode port. </summary> @@ -29674,7 +29720,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="32913"> +<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31389"> <summary> Do not audit attempts to receive UDP traffic on the hadoop_namenode port. </summary> @@ -29685,7 +29731,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="32932"> +<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31404"> <summary> Send and receive UDP traffic on the hadoop_namenode port. </summary> @@ -29696,7 +29742,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="32949"> +<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31420"> <summary> Do not audit attempts to send and receive UDP traffic on the hadoop_namenode port. @@ -29708,7 +29754,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="32965"> +<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31435"> <summary> Bind TCP sockets to the hadoop_namenode port. </summary> @@ -29719,7 +29765,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="32985"> +<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31455"> <summary> Bind UDP sockets to the hadoop_namenode port. </summary> @@ -29730,7 +29776,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="33004"> +<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31474"> <summary> Make a TCP connection to the hadoop_namenode port. </summary> @@ -29740,7 +29786,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_namenode_client_packets" lineno="33024"> +<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31494"> <summary> Send hadoop_namenode_client packets. </summary> @@ -29751,7 +29797,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="33043"> +<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31513"> <summary> Do not audit attempts to send hadoop_namenode_client packets. </summary> @@ -29762,7 +29808,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="33062"> +<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31532"> <summary> Receive hadoop_namenode_client packets. </summary> @@ -29773,7 +29819,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="33081"> +<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31551"> <summary> Do not audit attempts to receive hadoop_namenode_client packets. </summary> @@ -29784,7 +29830,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="33100"> +<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31570"> <summary> Send and receive hadoop_namenode_client packets. </summary> @@ -29795,7 +29841,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="33116"> +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31586"> <summary> Do not audit attempts to send and receive hadoop_namenode_client packets. </summary> @@ -29806,7 +29852,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="33131"> +<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31601"> <summary> Relabel packets to hadoop_namenode_client the packet type. </summary> @@ -29816,7 +29862,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_namenode_server_packets" lineno="33151"> +<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31621"> <summary> Send hadoop_namenode_server packets. </summary> @@ -29827,7 +29873,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="33170"> +<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31640"> <summary> Do not audit attempts to send hadoop_namenode_server packets. </summary> @@ -29838,7 +29884,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="33189"> +<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31659"> <summary> Receive hadoop_namenode_server packets. </summary> @@ -29849,7 +29895,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="33208"> +<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31678"> <summary> Do not audit attempts to receive hadoop_namenode_server packets. </summary> @@ -29860,7 +29906,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="33227"> +<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31697"> <summary> Send and receive hadoop_namenode_server packets. </summary> @@ -29871,7 +29917,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="33243"> +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31713"> <summary> Do not audit attempts to send and receive hadoop_namenode_server packets. </summary> @@ -29882,7 +29928,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="33258"> +<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31728"> <summary> Relabel packets to hadoop_namenode_server the packet type. </summary> @@ -29892,7 +29938,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="33280"> +<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31750"> <summary> Send and receive TCP traffic on the hddtemp port. </summary> @@ -29903,7 +29949,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_hddtemp_port" lineno="33299"> +<interface name="corenet_udp_send_hddtemp_port" lineno="31765"> <summary> Send UDP traffic on the hddtemp port. </summary> @@ -29914,7 +29960,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="33318"> +<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31780"> <summary> Do not audit attempts to send UDP traffic on the hddtemp port. </summary> @@ -29925,7 +29971,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_hddtemp_port" lineno="33337"> +<interface name="corenet_udp_receive_hddtemp_port" lineno="31795"> <summary> Receive UDP traffic on the hddtemp port. </summary> @@ -29936,7 +29982,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="33356"> +<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31810"> <summary> Do not audit attempts to receive UDP traffic on the hddtemp port. </summary> @@ -29947,7 +29993,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="33375"> +<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31825"> <summary> Send and receive UDP traffic on the hddtemp port. </summary> @@ -29958,7 +30004,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="33392"> +<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31841"> <summary> Do not audit attempts to send and receive UDP traffic on the hddtemp port. @@ -29970,7 +30016,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_hddtemp_port" lineno="33408"> +<interface name="corenet_tcp_bind_hddtemp_port" lineno="31856"> <summary> Bind TCP sockets to the hddtemp port. </summary> @@ -29981,7 +30027,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hddtemp_port" lineno="33428"> +<interface name="corenet_udp_bind_hddtemp_port" lineno="31876"> <summary> Bind UDP sockets to the hddtemp port. </summary> @@ -29992,7 +30038,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hddtemp_port" lineno="33447"> +<interface name="corenet_tcp_connect_hddtemp_port" lineno="31895"> <summary> Make a TCP connection to the hddtemp port. </summary> @@ -30002,7 +30048,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hddtemp_client_packets" lineno="33467"> +<interface name="corenet_send_hddtemp_client_packets" lineno="31915"> <summary> Send hddtemp_client packets. </summary> @@ -30013,7 +30059,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="33486"> +<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="31934"> <summary> Do not audit attempts to send hddtemp_client packets. </summary> @@ -30024,7 +30070,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hddtemp_client_packets" lineno="33505"> +<interface name="corenet_receive_hddtemp_client_packets" lineno="31953"> <summary> Receive hddtemp_client packets. </summary> @@ -30035,7 +30081,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="33524"> +<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="31972"> <summary> Do not audit attempts to receive hddtemp_client packets. </summary> @@ -30046,7 +30092,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="33543"> +<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="31991"> <summary> Send and receive hddtemp_client packets. </summary> @@ -30057,7 +30103,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="33559"> +<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32007"> <summary> Do not audit attempts to send and receive hddtemp_client packets. </summary> @@ -30068,7 +30114,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hddtemp_client_packets" lineno="33574"> +<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32022"> <summary> Relabel packets to hddtemp_client the packet type. </summary> @@ -30078,7 +30124,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hddtemp_server_packets" lineno="33594"> +<interface name="corenet_send_hddtemp_server_packets" lineno="32042"> <summary> Send hddtemp_server packets. </summary> @@ -30089,7 +30135,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="33613"> +<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32061"> <summary> Do not audit attempts to send hddtemp_server packets. </summary> @@ -30100,7 +30146,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hddtemp_server_packets" lineno="33632"> +<interface name="corenet_receive_hddtemp_server_packets" lineno="32080"> <summary> Receive hddtemp_server packets. </summary> @@ -30111,7 +30157,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="33651"> +<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32099"> <summary> Do not audit attempts to receive hddtemp_server packets. </summary> @@ -30122,7 +30168,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="33670"> +<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32118"> <summary> Send and receive hddtemp_server packets. </summary> @@ -30133,7 +30179,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="33686"> +<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32134"> <summary> Do not audit attempts to send and receive hddtemp_server packets. </summary> @@ -30144,7 +30190,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hddtemp_server_packets" lineno="33701"> +<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32149"> <summary> Relabel packets to hddtemp_server the packet type. </summary> @@ -30154,7 +30200,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_howl_port" lineno="33723"> +<interface name="corenet_tcp_sendrecv_howl_port" lineno="32171"> <summary> Send and receive TCP traffic on the howl port. </summary> @@ -30165,7 +30211,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_howl_port" lineno="33742"> +<interface name="corenet_udp_send_howl_port" lineno="32186"> <summary> Send UDP traffic on the howl port. </summary> @@ -30176,7 +30222,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_howl_port" lineno="33761"> +<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32201"> <summary> Do not audit attempts to send UDP traffic on the howl port. </summary> @@ -30187,7 +30233,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_howl_port" lineno="33780"> +<interface name="corenet_udp_receive_howl_port" lineno="32216"> <summary> Receive UDP traffic on the howl port. </summary> @@ -30198,7 +30244,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="33799"> +<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32231"> <summary> Do not audit attempts to receive UDP traffic on the howl port. </summary> @@ -30209,7 +30255,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_howl_port" lineno="33818"> +<interface name="corenet_udp_sendrecv_howl_port" lineno="32246"> <summary> Send and receive UDP traffic on the howl port. </summary> @@ -30220,7 +30266,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="33835"> +<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32262"> <summary> Do not audit attempts to send and receive UDP traffic on the howl port. @@ -30232,7 +30278,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_howl_port" lineno="33851"> +<interface name="corenet_tcp_bind_howl_port" lineno="32277"> <summary> Bind TCP sockets to the howl port. </summary> @@ -30243,7 +30289,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_howl_port" lineno="33871"> +<interface name="corenet_udp_bind_howl_port" lineno="32297"> <summary> Bind UDP sockets to the howl port. </summary> @@ -30254,7 +30300,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_howl_port" lineno="33890"> +<interface name="corenet_tcp_connect_howl_port" lineno="32316"> <summary> Make a TCP connection to the howl port. </summary> @@ -30264,7 +30310,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_howl_client_packets" lineno="33910"> +<interface name="corenet_send_howl_client_packets" lineno="32336"> <summary> Send howl_client packets. </summary> @@ -30275,7 +30321,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_howl_client_packets" lineno="33929"> +<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32355"> <summary> Do not audit attempts to send howl_client packets. </summary> @@ -30286,7 +30332,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_howl_client_packets" lineno="33948"> +<interface name="corenet_receive_howl_client_packets" lineno="32374"> <summary> Receive howl_client packets. </summary> @@ -30297,7 +30343,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="33967"> +<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32393"> <summary> Do not audit attempts to receive howl_client packets. </summary> @@ -30308,7 +30354,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_howl_client_packets" lineno="33986"> +<interface name="corenet_sendrecv_howl_client_packets" lineno="32412"> <summary> Send and receive howl_client packets. </summary> @@ -30319,7 +30365,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="34002"> +<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32428"> <summary> Do not audit attempts to send and receive howl_client packets. </summary> @@ -30330,7 +30376,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_howl_client_packets" lineno="34017"> +<interface name="corenet_relabelto_howl_client_packets" lineno="32443"> <summary> Relabel packets to howl_client the packet type. </summary> @@ -30340,7 +30386,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_howl_server_packets" lineno="34037"> +<interface name="corenet_send_howl_server_packets" lineno="32463"> <summary> Send howl_server packets. </summary> @@ -30351,7 +30397,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_howl_server_packets" lineno="34056"> +<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32482"> <summary> Do not audit attempts to send howl_server packets. </summary> @@ -30362,7 +30408,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_howl_server_packets" lineno="34075"> +<interface name="corenet_receive_howl_server_packets" lineno="32501"> <summary> Receive howl_server packets. </summary> @@ -30373,7 +30419,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="34094"> +<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32520"> <summary> Do not audit attempts to receive howl_server packets. </summary> @@ -30384,7 +30430,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_howl_server_packets" lineno="34113"> +<interface name="corenet_sendrecv_howl_server_packets" lineno="32539"> <summary> Send and receive howl_server packets. </summary> @@ -30395,7 +30441,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="34129"> +<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32555"> <summary> Do not audit attempts to send and receive howl_server packets. </summary> @@ -30406,7 +30452,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_howl_server_packets" lineno="34144"> +<interface name="corenet_relabelto_howl_server_packets" lineno="32570"> <summary> Relabel packets to howl_server the packet type. </summary> @@ -30416,7 +30462,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hplip_port" lineno="34166"> +<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32592"> <summary> Send and receive TCP traffic on the hplip port. </summary> @@ -30427,7 +30473,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_hplip_port" lineno="34185"> +<interface name="corenet_udp_send_hplip_port" lineno="32607"> <summary> Send UDP traffic on the hplip port. </summary> @@ -30438,7 +30484,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="34204"> +<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32622"> <summary> Do not audit attempts to send UDP traffic on the hplip port. </summary> @@ -30449,7 +30495,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_hplip_port" lineno="34223"> +<interface name="corenet_udp_receive_hplip_port" lineno="32637"> <summary> Receive UDP traffic on the hplip port. </summary> @@ -30460,7 +30506,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="34242"> +<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32652"> <summary> Do not audit attempts to receive UDP traffic on the hplip port. </summary> @@ -30471,7 +30517,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_hplip_port" lineno="34261"> +<interface name="corenet_udp_sendrecv_hplip_port" lineno="32667"> <summary> Send and receive UDP traffic on the hplip port. </summary> @@ -30482,7 +30528,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="34278"> +<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32683"> <summary> Do not audit attempts to send and receive UDP traffic on the hplip port. @@ -30494,7 +30540,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_hplip_port" lineno="34294"> +<interface name="corenet_tcp_bind_hplip_port" lineno="32698"> <summary> Bind TCP sockets to the hplip port. </summary> @@ -30505,7 +30551,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hplip_port" lineno="34314"> +<interface name="corenet_udp_bind_hplip_port" lineno="32718"> <summary> Bind UDP sockets to the hplip port. </summary> @@ -30516,7 +30562,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hplip_port" lineno="34333"> +<interface name="corenet_tcp_connect_hplip_port" lineno="32737"> <summary> Make a TCP connection to the hplip port. </summary> @@ -30526,7 +30572,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hplip_client_packets" lineno="34353"> +<interface name="corenet_send_hplip_client_packets" lineno="32757"> <summary> Send hplip_client packets. </summary> @@ -30537,7 +30583,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="34372"> +<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32776"> <summary> Do not audit attempts to send hplip_client packets. </summary> @@ -30548,7 +30594,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hplip_client_packets" lineno="34391"> +<interface name="corenet_receive_hplip_client_packets" lineno="32795"> <summary> Receive hplip_client packets. </summary> @@ -30559,7 +30605,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="34410"> +<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32814"> <summary> Do not audit attempts to receive hplip_client packets. </summary> @@ -30570,7 +30616,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hplip_client_packets" lineno="34429"> +<interface name="corenet_sendrecv_hplip_client_packets" lineno="32833"> <summary> Send and receive hplip_client packets. </summary> @@ -30581,7 +30627,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="34445"> +<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32849"> <summary> Do not audit attempts to send and receive hplip_client packets. </summary> @@ -30592,7 +30638,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hplip_client_packets" lineno="34460"> +<interface name="corenet_relabelto_hplip_client_packets" lineno="32864"> <summary> Relabel packets to hplip_client the packet type. </summary> @@ -30602,7 +30648,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hplip_server_packets" lineno="34480"> +<interface name="corenet_send_hplip_server_packets" lineno="32884"> <summary> Send hplip_server packets. </summary> @@ -30613,7 +30659,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="34499"> +<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="32903"> <summary> Do not audit attempts to send hplip_server packets. </summary> @@ -30624,7 +30670,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hplip_server_packets" lineno="34518"> +<interface name="corenet_receive_hplip_server_packets" lineno="32922"> <summary> Receive hplip_server packets. </summary> @@ -30635,7 +30681,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="34537"> +<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="32941"> <summary> Do not audit attempts to receive hplip_server packets. </summary> @@ -30646,7 +30692,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hplip_server_packets" lineno="34556"> +<interface name="corenet_sendrecv_hplip_server_packets" lineno="32960"> <summary> Send and receive hplip_server packets. </summary> @@ -30657,7 +30703,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="34572"> +<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="32976"> <summary> Do not audit attempts to send and receive hplip_server packets. </summary> @@ -30668,7 +30714,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hplip_server_packets" lineno="34587"> +<interface name="corenet_relabelto_hplip_server_packets" lineno="32991"> <summary> Relabel packets to hplip_server the packet type. </summary> @@ -30678,7 +30724,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_http_port" lineno="34609"> +<interface name="corenet_tcp_sendrecv_http_port" lineno="33013"> <summary> Send and receive TCP traffic on the http port. </summary> @@ -30689,7 +30735,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_http_port" lineno="34628"> +<interface name="corenet_udp_send_http_port" lineno="33028"> <summary> Send UDP traffic on the http port. </summary> @@ -30700,7 +30746,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_http_port" lineno="34647"> +<interface name="corenet_dontaudit_udp_send_http_port" lineno="33043"> <summary> Do not audit attempts to send UDP traffic on the http port. </summary> @@ -30711,7 +30757,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_http_port" lineno="34666"> +<interface name="corenet_udp_receive_http_port" lineno="33058"> <summary> Receive UDP traffic on the http port. </summary> @@ -30722,7 +30768,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_http_port" lineno="34685"> +<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33073"> <summary> Do not audit attempts to receive UDP traffic on the http port. </summary> @@ -30733,7 +30779,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_http_port" lineno="34704"> +<interface name="corenet_udp_sendrecv_http_port" lineno="33088"> <summary> Send and receive UDP traffic on the http port. </summary> @@ -30744,7 +30790,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="34721"> +<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33104"> <summary> Do not audit attempts to send and receive UDP traffic on the http port. @@ -30756,7 +30802,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_http_port" lineno="34737"> +<interface name="corenet_tcp_bind_http_port" lineno="33119"> <summary> Bind TCP sockets to the http port. </summary> @@ -30767,7 +30813,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_http_port" lineno="34757"> +<interface name="corenet_udp_bind_http_port" lineno="33139"> <summary> Bind UDP sockets to the http port. </summary> @@ -30778,7 +30824,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_http_port" lineno="34776"> +<interface name="corenet_tcp_connect_http_port" lineno="33158"> <summary> Make a TCP connection to the http port. </summary> @@ -30788,7 +30834,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_client_packets" lineno="34796"> +<interface name="corenet_send_http_client_packets" lineno="33178"> <summary> Send http_client packets. </summary> @@ -30799,7 +30845,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_client_packets" lineno="34815"> +<interface name="corenet_dontaudit_send_http_client_packets" lineno="33197"> <summary> Do not audit attempts to send http_client packets. </summary> @@ -30810,7 +30856,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_client_packets" lineno="34834"> +<interface name="corenet_receive_http_client_packets" lineno="33216"> <summary> Receive http_client packets. </summary> @@ -30821,7 +30867,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_client_packets" lineno="34853"> +<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33235"> <summary> Do not audit attempts to receive http_client packets. </summary> @@ -30832,7 +30878,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_client_packets" lineno="34872"> +<interface name="corenet_sendrecv_http_client_packets" lineno="33254"> <summary> Send and receive http_client packets. </summary> @@ -30843,7 +30889,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="34888"> +<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33270"> <summary> Do not audit attempts to send and receive http_client packets. </summary> @@ -30854,7 +30900,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_client_packets" lineno="34903"> +<interface name="corenet_relabelto_http_client_packets" lineno="33285"> <summary> Relabel packets to http_client the packet type. </summary> @@ -30864,7 +30910,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_server_packets" lineno="34923"> +<interface name="corenet_send_http_server_packets" lineno="33305"> <summary> Send http_server packets. </summary> @@ -30875,7 +30921,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_server_packets" lineno="34942"> +<interface name="corenet_dontaudit_send_http_server_packets" lineno="33324"> <summary> Do not audit attempts to send http_server packets. </summary> @@ -30886,7 +30932,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_server_packets" lineno="34961"> +<interface name="corenet_receive_http_server_packets" lineno="33343"> <summary> Receive http_server packets. </summary> @@ -30897,7 +30943,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_server_packets" lineno="34980"> +<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33362"> <summary> Do not audit attempts to receive http_server packets. </summary> @@ -30908,7 +30954,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_server_packets" lineno="34999"> +<interface name="corenet_sendrecv_http_server_packets" lineno="33381"> <summary> Send and receive http_server packets. </summary> @@ -30919,7 +30965,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="35015"> +<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33397"> <summary> Do not audit attempts to send and receive http_server packets. </summary> @@ -30930,7 +30976,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_server_packets" lineno="35030"> +<interface name="corenet_relabelto_http_server_packets" lineno="33412"> <summary> Relabel packets to http_server the packet type. </summary> @@ -30940,7 +30986,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="35052"> +<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33434"> <summary> Send and receive TCP traffic on the http_cache port. </summary> @@ -30951,7 +30997,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_http_cache_port" lineno="35071"> +<interface name="corenet_udp_send_http_cache_port" lineno="33449"> <summary> Send UDP traffic on the http_cache port. </summary> @@ -30962,7 +31008,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="35090"> +<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33464"> <summary> Do not audit attempts to send UDP traffic on the http_cache port. </summary> @@ -30973,7 +31019,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_http_cache_port" lineno="35109"> +<interface name="corenet_udp_receive_http_cache_port" lineno="33479"> <summary> Receive UDP traffic on the http_cache port. </summary> @@ -30984,7 +31030,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="35128"> +<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33494"> <summary> Do not audit attempts to receive UDP traffic on the http_cache port. </summary> @@ -30995,7 +31041,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_http_cache_port" lineno="35147"> +<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33509"> <summary> Send and receive UDP traffic on the http_cache port. </summary> @@ -31006,7 +31052,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="35164"> +<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33525"> <summary> Do not audit attempts to send and receive UDP traffic on the http_cache port. @@ -31018,7 +31064,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_http_cache_port" lineno="35180"> +<interface name="corenet_tcp_bind_http_cache_port" lineno="33540"> <summary> Bind TCP sockets to the http_cache port. </summary> @@ -31029,7 +31075,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_http_cache_port" lineno="35200"> +<interface name="corenet_udp_bind_http_cache_port" lineno="33560"> <summary> Bind UDP sockets to the http_cache port. </summary> @@ -31040,7 +31086,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_http_cache_port" lineno="35219"> +<interface name="corenet_tcp_connect_http_cache_port" lineno="33579"> <summary> Make a TCP connection to the http_cache port. </summary> @@ -31050,7 +31096,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_cache_client_packets" lineno="35239"> +<interface name="corenet_send_http_cache_client_packets" lineno="33599"> <summary> Send http_cache_client packets. </summary> @@ -31061,7 +31107,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="35258"> +<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33618"> <summary> Do not audit attempts to send http_cache_client packets. </summary> @@ -31072,7 +31118,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_cache_client_packets" lineno="35277"> +<interface name="corenet_receive_http_cache_client_packets" lineno="33637"> <summary> Receive http_cache_client packets. </summary> @@ -31083,7 +31129,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="35296"> +<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33656"> <summary> Do not audit attempts to receive http_cache_client packets. </summary> @@ -31094,7 +31140,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_cache_client_packets" lineno="35315"> +<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33675"> <summary> Send and receive http_cache_client packets. </summary> @@ -31105,7 +31151,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="35331"> +<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33691"> <summary> Do not audit attempts to send and receive http_cache_client packets. </summary> @@ -31116,7 +31162,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_cache_client_packets" lineno="35346"> +<interface name="corenet_relabelto_http_cache_client_packets" lineno="33706"> <summary> Relabel packets to http_cache_client the packet type. </summary> @@ -31126,7 +31172,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_cache_server_packets" lineno="35366"> +<interface name="corenet_send_http_cache_server_packets" lineno="33726"> <summary> Send http_cache_server packets. </summary> @@ -31137,7 +31183,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="35385"> +<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33745"> <summary> Do not audit attempts to send http_cache_server packets. </summary> @@ -31148,7 +31194,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_cache_server_packets" lineno="35404"> +<interface name="corenet_receive_http_cache_server_packets" lineno="33764"> <summary> Receive http_cache_server packets. </summary> @@ -31159,7 +31205,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="35423"> +<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33783"> <summary> Do not audit attempts to receive http_cache_server packets. </summary> @@ -31170,7 +31216,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_cache_server_packets" lineno="35442"> +<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33802"> <summary> Send and receive http_cache_server packets. </summary> @@ -31181,7 +31227,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="35458"> +<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33818"> <summary> Do not audit attempts to send and receive http_cache_server packets. </summary> @@ -31192,7 +31238,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_cache_server_packets" lineno="35473"> +<interface name="corenet_relabelto_http_cache_server_packets" lineno="33833"> <summary> Relabel packets to http_cache_server the packet type. </summary> @@ -31202,7 +31248,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="35495"> +<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33855"> <summary> Send and receive TCP traffic on the i18n_input port. </summary> @@ -31213,7 +31259,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_i18n_input_port" lineno="35514"> +<interface name="corenet_udp_send_i18n_input_port" lineno="33870"> <summary> Send UDP traffic on the i18n_input port. </summary> @@ -31224,7 +31270,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="35533"> +<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="33885"> <summary> Do not audit attempts to send UDP traffic on the i18n_input port. </summary> @@ -31235,7 +31281,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_i18n_input_port" lineno="35552"> +<interface name="corenet_udp_receive_i18n_input_port" lineno="33900"> <summary> Receive UDP traffic on the i18n_input port. </summary> @@ -31246,7 +31292,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="35571"> +<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="33915"> <summary> Do not audit attempts to receive UDP traffic on the i18n_input port. </summary> @@ -31257,7 +31303,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="35590"> +<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="33930"> <summary> Send and receive UDP traffic on the i18n_input port. </summary> @@ -31268,7 +31314,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="35607"> +<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="33946"> <summary> Do not audit attempts to send and receive UDP traffic on the i18n_input port. @@ -31280,7 +31326,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_i18n_input_port" lineno="35623"> +<interface name="corenet_tcp_bind_i18n_input_port" lineno="33961"> <summary> Bind TCP sockets to the i18n_input port. </summary> @@ -31291,7 +31337,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_i18n_input_port" lineno="35643"> +<interface name="corenet_udp_bind_i18n_input_port" lineno="33981"> <summary> Bind UDP sockets to the i18n_input port. </summary> @@ -31302,7 +31348,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_i18n_input_port" lineno="35662"> +<interface name="corenet_tcp_connect_i18n_input_port" lineno="34000"> <summary> Make a TCP connection to the i18n_input port. </summary> @@ -31312,7 +31358,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_i18n_input_client_packets" lineno="35682"> +<interface name="corenet_send_i18n_input_client_packets" lineno="34020"> <summary> Send i18n_input_client packets. </summary> @@ -31323,7 +31369,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="35701"> +<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34039"> <summary> Do not audit attempts to send i18n_input_client packets. </summary> @@ -31334,7 +31380,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_i18n_input_client_packets" lineno="35720"> +<interface name="corenet_receive_i18n_input_client_packets" lineno="34058"> <summary> Receive i18n_input_client packets. </summary> @@ -31345,7 +31391,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="35739"> +<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34077"> <summary> Do not audit attempts to receive i18n_input_client packets. </summary> @@ -31356,7 +31402,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="35758"> +<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34096"> <summary> Send and receive i18n_input_client packets. </summary> @@ -31367,7 +31413,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="35774"> +<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34112"> <summary> Do not audit attempts to send and receive i18n_input_client packets. </summary> @@ -31378,7 +31424,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_i18n_input_client_packets" lineno="35789"> +<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34127"> <summary> Relabel packets to i18n_input_client the packet type. </summary> @@ -31388,7 +31434,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_i18n_input_server_packets" lineno="35809"> +<interface name="corenet_send_i18n_input_server_packets" lineno="34147"> <summary> Send i18n_input_server packets. </summary> @@ -31399,7 +31445,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="35828"> +<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34166"> <summary> Do not audit attempts to send i18n_input_server packets. </summary> @@ -31410,7 +31456,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_i18n_input_server_packets" lineno="35847"> +<interface name="corenet_receive_i18n_input_server_packets" lineno="34185"> <summary> Receive i18n_input_server packets. </summary> @@ -31421,7 +31467,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="35866"> +<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34204"> <summary> Do not audit attempts to receive i18n_input_server packets. </summary> @@ -31432,7 +31478,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="35885"> +<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34223"> <summary> Send and receive i18n_input_server packets. </summary> @@ -31443,7 +31489,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="35901"> +<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34239"> <summary> Do not audit attempts to send and receive i18n_input_server packets. </summary> @@ -31454,7 +31500,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_i18n_input_server_packets" lineno="35916"> +<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34254"> <summary> Relabel packets to i18n_input_server the packet type. </summary> @@ -31464,7 +31510,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_imaze_port" lineno="35938"> +<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34276"> <summary> Send and receive TCP traffic on the imaze port. </summary> @@ -31475,7 +31521,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_imaze_port" lineno="35957"> +<interface name="corenet_udp_send_imaze_port" lineno="34291"> <summary> Send UDP traffic on the imaze port. </summary> @@ -31486,7 +31532,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="35976"> +<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34306"> <summary> Do not audit attempts to send UDP traffic on the imaze port. </summary> @@ -31497,7 +31543,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_imaze_port" lineno="35995"> +<interface name="corenet_udp_receive_imaze_port" lineno="34321"> <summary> Receive UDP traffic on the imaze port. </summary> @@ -31508,7 +31554,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="36014"> +<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34336"> <summary> Do not audit attempts to receive UDP traffic on the imaze port. </summary> @@ -31519,7 +31565,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_imaze_port" lineno="36033"> +<interface name="corenet_udp_sendrecv_imaze_port" lineno="34351"> <summary> Send and receive UDP traffic on the imaze port. </summary> @@ -31530,7 +31576,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="36050"> +<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34367"> <summary> Do not audit attempts to send and receive UDP traffic on the imaze port. @@ -31542,7 +31588,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_imaze_port" lineno="36066"> +<interface name="corenet_tcp_bind_imaze_port" lineno="34382"> <summary> Bind TCP sockets to the imaze port. </summary> @@ -31553,7 +31599,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_imaze_port" lineno="36086"> +<interface name="corenet_udp_bind_imaze_port" lineno="34402"> <summary> Bind UDP sockets to the imaze port. </summary> @@ -31564,7 +31610,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_imaze_port" lineno="36105"> +<interface name="corenet_tcp_connect_imaze_port" lineno="34421"> <summary> Make a TCP connection to the imaze port. </summary> @@ -31574,7 +31620,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_imaze_client_packets" lineno="36125"> +<interface name="corenet_send_imaze_client_packets" lineno="34441"> <summary> Send imaze_client packets. </summary> @@ -31585,7 +31631,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="36144"> +<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34460"> <summary> Do not audit attempts to send imaze_client packets. </summary> @@ -31596,7 +31642,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_imaze_client_packets" lineno="36163"> +<interface name="corenet_receive_imaze_client_packets" lineno="34479"> <summary> Receive imaze_client packets. </summary> @@ -31607,7 +31653,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="36182"> +<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34498"> <summary> Do not audit attempts to receive imaze_client packets. </summary> @@ -31618,7 +31664,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_imaze_client_packets" lineno="36201"> +<interface name="corenet_sendrecv_imaze_client_packets" lineno="34517"> <summary> Send and receive imaze_client packets. </summary> @@ -31629,7 +31675,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="36217"> +<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34533"> <summary> Do not audit attempts to send and receive imaze_client packets. </summary> @@ -31640,7 +31686,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_imaze_client_packets" lineno="36232"> +<interface name="corenet_relabelto_imaze_client_packets" lineno="34548"> <summary> Relabel packets to imaze_client the packet type. </summary> @@ -31650,7 +31696,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_imaze_server_packets" lineno="36252"> +<interface name="corenet_send_imaze_server_packets" lineno="34568"> <summary> Send imaze_server packets. </summary> @@ -31661,7 +31707,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="36271"> +<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34587"> <summary> Do not audit attempts to send imaze_server packets. </summary> @@ -31672,7 +31718,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_imaze_server_packets" lineno="36290"> +<interface name="corenet_receive_imaze_server_packets" lineno="34606"> <summary> Receive imaze_server packets. </summary> @@ -31683,7 +31729,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="36309"> +<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34625"> <summary> Do not audit attempts to receive imaze_server packets. </summary> @@ -31694,7 +31740,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_imaze_server_packets" lineno="36328"> +<interface name="corenet_sendrecv_imaze_server_packets" lineno="34644"> <summary> Send and receive imaze_server packets. </summary> @@ -31705,7 +31751,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="36344"> +<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34660"> <summary> Do not audit attempts to send and receive imaze_server packets. </summary> @@ -31716,7 +31762,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_imaze_server_packets" lineno="36359"> +<interface name="corenet_relabelto_imaze_server_packets" lineno="34675"> <summary> Relabel packets to imaze_server the packet type. </summary> @@ -31726,7 +31772,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="36381"> +<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34697"> <summary> Send and receive TCP traffic on the inetd_child port. </summary> @@ -31737,7 +31783,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_inetd_child_port" lineno="36400"> +<interface name="corenet_udp_send_inetd_child_port" lineno="34712"> <summary> Send UDP traffic on the inetd_child port. </summary> @@ -31748,7 +31794,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="36419"> +<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34727"> <summary> Do not audit attempts to send UDP traffic on the inetd_child port. </summary> @@ -31759,7 +31805,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_inetd_child_port" lineno="36438"> +<interface name="corenet_udp_receive_inetd_child_port" lineno="34742"> <summary> Receive UDP traffic on the inetd_child port. </summary> @@ -31770,7 +31816,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="36457"> +<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34757"> <summary> Do not audit attempts to receive UDP traffic on the inetd_child port. </summary> @@ -31781,7 +31827,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="36476"> +<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34772"> <summary> Send and receive UDP traffic on the inetd_child port. </summary> @@ -31792,7 +31838,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="36493"> +<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34788"> <summary> Do not audit attempts to send and receive UDP traffic on the inetd_child port. @@ -31804,7 +31850,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_inetd_child_port" lineno="36509"> +<interface name="corenet_tcp_bind_inetd_child_port" lineno="34803"> <summary> Bind TCP sockets to the inetd_child port. </summary> @@ -31815,7 +31861,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_inetd_child_port" lineno="36529"> +<interface name="corenet_udp_bind_inetd_child_port" lineno="34823"> <summary> Bind UDP sockets to the inetd_child port. </summary> @@ -31826,7 +31872,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_inetd_child_port" lineno="36548"> +<interface name="corenet_tcp_connect_inetd_child_port" lineno="34842"> <summary> Make a TCP connection to the inetd_child port. </summary> @@ -31836,7 +31882,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_inetd_child_client_packets" lineno="36568"> +<interface name="corenet_send_inetd_child_client_packets" lineno="34862"> <summary> Send inetd_child_client packets. </summary> @@ -31847,7 +31893,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="36587"> +<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="34881"> <summary> Do not audit attempts to send inetd_child_client packets. </summary> @@ -31858,7 +31904,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_inetd_child_client_packets" lineno="36606"> +<interface name="corenet_receive_inetd_child_client_packets" lineno="34900"> <summary> Receive inetd_child_client packets. </summary> @@ -31869,7 +31915,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="36625"> +<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="34919"> <summary> Do not audit attempts to receive inetd_child_client packets. </summary> @@ -31880,7 +31926,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="36644"> +<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="34938"> <summary> Send and receive inetd_child_client packets. </summary> @@ -31891,7 +31937,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="36660"> +<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="34954"> <summary> Do not audit attempts to send and receive inetd_child_client packets. </summary> @@ -31902,7 +31948,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_inetd_child_client_packets" lineno="36675"> +<interface name="corenet_relabelto_inetd_child_client_packets" lineno="34969"> <summary> Relabel packets to inetd_child_client the packet type. </summary> @@ -31912,7 +31958,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_inetd_child_server_packets" lineno="36695"> +<interface name="corenet_send_inetd_child_server_packets" lineno="34989"> <summary> Send inetd_child_server packets. </summary> @@ -31923,7 +31969,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="36714"> +<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35008"> <summary> Do not audit attempts to send inetd_child_server packets. </summary> @@ -31934,7 +31980,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_inetd_child_server_packets" lineno="36733"> +<interface name="corenet_receive_inetd_child_server_packets" lineno="35027"> <summary> Receive inetd_child_server packets. </summary> @@ -31945,7 +31991,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="36752"> +<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35046"> <summary> Do not audit attempts to receive inetd_child_server packets. </summary> @@ -31956,7 +32002,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="36771"> +<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35065"> <summary> Send and receive inetd_child_server packets. </summary> @@ -31967,7 +32013,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="36787"> +<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35081"> <summary> Do not audit attempts to send and receive inetd_child_server packets. </summary> @@ -31978,7 +32024,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_inetd_child_server_packets" lineno="36802"> +<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35096"> <summary> Relabel packets to inetd_child_server the packet type. </summary> @@ -31988,7 +32034,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_innd_port" lineno="36824"> +<interface name="corenet_tcp_sendrecv_innd_port" lineno="35118"> <summary> Send and receive TCP traffic on the innd port. </summary> @@ -31999,7 +32045,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_innd_port" lineno="36843"> +<interface name="corenet_udp_send_innd_port" lineno="35133"> <summary> Send UDP traffic on the innd port. </summary> @@ -32010,7 +32056,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_innd_port" lineno="36862"> +<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35148"> <summary> Do not audit attempts to send UDP traffic on the innd port. </summary> @@ -32021,7 +32067,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_innd_port" lineno="36881"> +<interface name="corenet_udp_receive_innd_port" lineno="35163"> <summary> Receive UDP traffic on the innd port. </summary> @@ -32032,7 +32078,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="36900"> +<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35178"> <summary> Do not audit attempts to receive UDP traffic on the innd port. </summary> @@ -32043,7 +32089,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_innd_port" lineno="36919"> +<interface name="corenet_udp_sendrecv_innd_port" lineno="35193"> <summary> Send and receive UDP traffic on the innd port. </summary> @@ -32054,7 +32100,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="36936"> +<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35209"> <summary> Do not audit attempts to send and receive UDP traffic on the innd port. @@ -32066,7 +32112,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_innd_port" lineno="36952"> +<interface name="corenet_tcp_bind_innd_port" lineno="35224"> <summary> Bind TCP sockets to the innd port. </summary> @@ -32077,7 +32123,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_innd_port" lineno="36972"> +<interface name="corenet_udp_bind_innd_port" lineno="35244"> <summary> Bind UDP sockets to the innd port. </summary> @@ -32088,7 +32134,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_innd_port" lineno="36991"> +<interface name="corenet_tcp_connect_innd_port" lineno="35263"> <summary> Make a TCP connection to the innd port. </summary> @@ -32098,7 +32144,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_innd_client_packets" lineno="37011"> +<interface name="corenet_send_innd_client_packets" lineno="35283"> <summary> Send innd_client packets. </summary> @@ -32109,7 +32155,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_innd_client_packets" lineno="37030"> +<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35302"> <summary> Do not audit attempts to send innd_client packets. </summary> @@ -32120,7 +32166,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_innd_client_packets" lineno="37049"> +<interface name="corenet_receive_innd_client_packets" lineno="35321"> <summary> Receive innd_client packets. </summary> @@ -32131,7 +32177,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="37068"> +<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35340"> <summary> Do not audit attempts to receive innd_client packets. </summary> @@ -32142,7 +32188,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_innd_client_packets" lineno="37087"> +<interface name="corenet_sendrecv_innd_client_packets" lineno="35359"> <summary> Send and receive innd_client packets. </summary> @@ -32153,7 +32199,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="37103"> +<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35375"> <summary> Do not audit attempts to send and receive innd_client packets. </summary> @@ -32164,7 +32210,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_innd_client_packets" lineno="37118"> +<interface name="corenet_relabelto_innd_client_packets" lineno="35390"> <summary> Relabel packets to innd_client the packet type. </summary> @@ -32174,7 +32220,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_innd_server_packets" lineno="37138"> +<interface name="corenet_send_innd_server_packets" lineno="35410"> <summary> Send innd_server packets. </summary> @@ -32185,7 +32231,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_innd_server_packets" lineno="37157"> +<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35429"> <summary> Do not audit attempts to send innd_server packets. </summary> @@ -32196,7 +32242,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_innd_server_packets" lineno="37176"> +<interface name="corenet_receive_innd_server_packets" lineno="35448"> <summary> Receive innd_server packets. </summary> @@ -32207,7 +32253,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="37195"> +<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35467"> <summary> Do not audit attempts to receive innd_server packets. </summary> @@ -32218,7 +32264,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_innd_server_packets" lineno="37214"> +<interface name="corenet_sendrecv_innd_server_packets" lineno="35486"> <summary> Send and receive innd_server packets. </summary> @@ -32229,7 +32275,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="37230"> +<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35502"> <summary> Do not audit attempts to send and receive innd_server packets. </summary> @@ -32240,7 +32286,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_innd_server_packets" lineno="37245"> +<interface name="corenet_relabelto_innd_server_packets" lineno="35517"> <summary> Relabel packets to innd_server the packet type. </summary> @@ -32250,7 +32296,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_interwise_port" lineno="37267"> +<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35539"> <summary> Send and receive TCP traffic on the interwise port. </summary> @@ -32261,7 +32307,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_interwise_port" lineno="37286"> +<interface name="corenet_udp_send_interwise_port" lineno="35554"> <summary> Send UDP traffic on the interwise port. </summary> @@ -32272,7 +32318,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="37305"> +<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35569"> <summary> Do not audit attempts to send UDP traffic on the interwise port. </summary> @@ -32283,7 +32329,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_interwise_port" lineno="37324"> +<interface name="corenet_udp_receive_interwise_port" lineno="35584"> <summary> Receive UDP traffic on the interwise port. </summary> @@ -32294,7 +32340,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="37343"> +<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35599"> <summary> Do not audit attempts to receive UDP traffic on the interwise port. </summary> @@ -32305,7 +32351,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_interwise_port" lineno="37362"> +<interface name="corenet_udp_sendrecv_interwise_port" lineno="35614"> <summary> Send and receive UDP traffic on the interwise port. </summary> @@ -32316,7 +32362,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="37379"> +<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35630"> <summary> Do not audit attempts to send and receive UDP traffic on the interwise port. @@ -32328,7 +32374,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_interwise_port" lineno="37395"> +<interface name="corenet_tcp_bind_interwise_port" lineno="35645"> <summary> Bind TCP sockets to the interwise port. </summary> @@ -32339,7 +32385,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_interwise_port" lineno="37415"> +<interface name="corenet_udp_bind_interwise_port" lineno="35665"> <summary> Bind UDP sockets to the interwise port. </summary> @@ -32350,7 +32396,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_interwise_port" lineno="37434"> +<interface name="corenet_tcp_connect_interwise_port" lineno="35684"> <summary> Make a TCP connection to the interwise port. </summary> @@ -32360,7 +32406,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_interwise_client_packets" lineno="37454"> +<interface name="corenet_send_interwise_client_packets" lineno="35704"> <summary> Send interwise_client packets. </summary> @@ -32371,7 +32417,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="37473"> +<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35723"> <summary> Do not audit attempts to send interwise_client packets. </summary> @@ -32382,7 +32428,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_interwise_client_packets" lineno="37492"> +<interface name="corenet_receive_interwise_client_packets" lineno="35742"> <summary> Receive interwise_client packets. </summary> @@ -32393,7 +32439,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="37511"> +<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35761"> <summary> Do not audit attempts to receive interwise_client packets. </summary> @@ -32404,7 +32450,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_interwise_client_packets" lineno="37530"> +<interface name="corenet_sendrecv_interwise_client_packets" lineno="35780"> <summary> Send and receive interwise_client packets. </summary> @@ -32415,7 +32461,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="37546"> +<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35796"> <summary> Do not audit attempts to send and receive interwise_client packets. </summary> @@ -32426,7 +32472,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_interwise_client_packets" lineno="37561"> +<interface name="corenet_relabelto_interwise_client_packets" lineno="35811"> <summary> Relabel packets to interwise_client the packet type. </summary> @@ -32436,7 +32482,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_interwise_server_packets" lineno="37581"> +<interface name="corenet_send_interwise_server_packets" lineno="35831"> <summary> Send interwise_server packets. </summary> @@ -32447,7 +32493,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="37600"> +<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35850"> <summary> Do not audit attempts to send interwise_server packets. </summary> @@ -32458,7 +32504,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_interwise_server_packets" lineno="37619"> +<interface name="corenet_receive_interwise_server_packets" lineno="35869"> <summary> Receive interwise_server packets. </summary> @@ -32469,7 +32515,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="37638"> +<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="35888"> <summary> Do not audit attempts to receive interwise_server packets. </summary> @@ -32480,7 +32526,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_interwise_server_packets" lineno="37657"> +<interface name="corenet_sendrecv_interwise_server_packets" lineno="35907"> <summary> Send and receive interwise_server packets. </summary> @@ -32491,7 +32537,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="37673"> +<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="35923"> <summary> Do not audit attempts to send and receive interwise_server packets. </summary> @@ -32502,7 +32548,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_interwise_server_packets" lineno="37688"> +<interface name="corenet_relabelto_interwise_server_packets" lineno="35938"> <summary> Relabel packets to interwise_server the packet type. </summary> @@ -32512,7 +32558,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="37710"> +<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="35960"> <summary> Send and receive TCP traffic on the ionixnetmon port. </summary> @@ -32523,7 +32569,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ionixnetmon_port" lineno="37729"> +<interface name="corenet_udp_send_ionixnetmon_port" lineno="35975"> <summary> Send UDP traffic on the ionixnetmon port. </summary> @@ -32534,7 +32580,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="37748"> +<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="35990"> <summary> Do not audit attempts to send UDP traffic on the ionixnetmon port. </summary> @@ -32545,7 +32591,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ionixnetmon_port" lineno="37767"> +<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36005"> <summary> Receive UDP traffic on the ionixnetmon port. </summary> @@ -32556,7 +32602,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="37786"> +<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36020"> <summary> Do not audit attempts to receive UDP traffic on the ionixnetmon port. </summary> @@ -32567,7 +32613,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="37805"> +<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36035"> <summary> Send and receive UDP traffic on the ionixnetmon port. </summary> @@ -32578,7 +32624,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="37822"> +<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36051"> <summary> Do not audit attempts to send and receive UDP traffic on the ionixnetmon port. @@ -32590,7 +32636,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="37838"> +<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36066"> <summary> Bind TCP sockets to the ionixnetmon port. </summary> @@ -32601,7 +32647,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ionixnetmon_port" lineno="37858"> +<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36086"> <summary> Bind UDP sockets to the ionixnetmon port. </summary> @@ -32612,7 +32658,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="37877"> +<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36105"> <summary> Make a TCP connection to the ionixnetmon port. </summary> @@ -32622,7 +32668,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ionixnetmon_client_packets" lineno="37897"> +<interface name="corenet_send_ionixnetmon_client_packets" lineno="36125"> <summary> Send ionixnetmon_client packets. </summary> @@ -32633,7 +32679,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="37916"> +<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36144"> <summary> Do not audit attempts to send ionixnetmon_client packets. </summary> @@ -32644,7 +32690,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ionixnetmon_client_packets" lineno="37935"> +<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36163"> <summary> Receive ionixnetmon_client packets. </summary> @@ -32655,7 +32701,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="37954"> +<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36182"> <summary> Do not audit attempts to receive ionixnetmon_client packets. </summary> @@ -32666,7 +32712,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="37973"> +<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36201"> <summary> Send and receive ionixnetmon_client packets. </summary> @@ -32677,7 +32723,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="37989"> +<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36217"> <summary> Do not audit attempts to send and receive ionixnetmon_client packets. </summary> @@ -32688,7 +32734,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="38004"> +<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36232"> <summary> Relabel packets to ionixnetmon_client the packet type. </summary> @@ -32698,7 +32744,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ionixnetmon_server_packets" lineno="38024"> +<interface name="corenet_send_ionixnetmon_server_packets" lineno="36252"> <summary> Send ionixnetmon_server packets. </summary> @@ -32709,7 +32755,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="38043"> +<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36271"> <summary> Do not audit attempts to send ionixnetmon_server packets. </summary> @@ -32720,7 +32766,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ionixnetmon_server_packets" lineno="38062"> +<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36290"> <summary> Receive ionixnetmon_server packets. </summary> @@ -32731,7 +32777,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="38081"> +<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36309"> <summary> Do not audit attempts to receive ionixnetmon_server packets. </summary> @@ -32742,7 +32788,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="38100"> +<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36328"> <summary> Send and receive ionixnetmon_server packets. </summary> @@ -32753,7 +32799,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="38116"> +<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36344"> <summary> Do not audit attempts to send and receive ionixnetmon_server packets. </summary> @@ -32764,7 +32810,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="38131"> +<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36359"> <summary> Relabel packets to ionixnetmon_server the packet type. </summary> @@ -32774,7 +32820,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="38153"> +<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36381"> <summary> Send and receive TCP traffic on the ipmi port. </summary> @@ -32785,7 +32831,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ipmi_port" lineno="38172"> +<interface name="corenet_udp_send_ipmi_port" lineno="36396"> <summary> Send UDP traffic on the ipmi port. </summary> @@ -32796,7 +32842,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="38191"> +<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36411"> <summary> Do not audit attempts to send UDP traffic on the ipmi port. </summary> @@ -32807,7 +32853,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ipmi_port" lineno="38210"> +<interface name="corenet_udp_receive_ipmi_port" lineno="36426"> <summary> Receive UDP traffic on the ipmi port. </summary> @@ -32818,7 +32864,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="38229"> +<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36441"> <summary> Do not audit attempts to receive UDP traffic on the ipmi port. </summary> @@ -32829,7 +32875,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ipmi_port" lineno="38248"> +<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36456"> <summary> Send and receive UDP traffic on the ipmi port. </summary> @@ -32840,7 +32886,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="38265"> +<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36472"> <summary> Do not audit attempts to send and receive UDP traffic on the ipmi port. @@ -32852,7 +32898,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ipmi_port" lineno="38281"> +<interface name="corenet_tcp_bind_ipmi_port" lineno="36487"> <summary> Bind TCP sockets to the ipmi port. </summary> @@ -32863,7 +32909,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ipmi_port" lineno="38301"> +<interface name="corenet_udp_bind_ipmi_port" lineno="36507"> <summary> Bind UDP sockets to the ipmi port. </summary> @@ -32874,7 +32920,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ipmi_port" lineno="38320"> +<interface name="corenet_tcp_connect_ipmi_port" lineno="36526"> <summary> Make a TCP connection to the ipmi port. </summary> @@ -32884,7 +32930,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipmi_client_packets" lineno="38340"> +<interface name="corenet_send_ipmi_client_packets" lineno="36546"> <summary> Send ipmi_client packets. </summary> @@ -32895,7 +32941,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="38359"> +<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36565"> <summary> Do not audit attempts to send ipmi_client packets. </summary> @@ -32906,7 +32952,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipmi_client_packets" lineno="38378"> +<interface name="corenet_receive_ipmi_client_packets" lineno="36584"> <summary> Receive ipmi_client packets. </summary> @@ -32917,7 +32963,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="38397"> +<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36603"> <summary> Do not audit attempts to receive ipmi_client packets. </summary> @@ -32928,7 +32974,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipmi_client_packets" lineno="38416"> +<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36622"> <summary> Send and receive ipmi_client packets. </summary> @@ -32939,7 +32985,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="38432"> +<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36638"> <summary> Do not audit attempts to send and receive ipmi_client packets. </summary> @@ -32950,7 +32996,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipmi_client_packets" lineno="38447"> +<interface name="corenet_relabelto_ipmi_client_packets" lineno="36653"> <summary> Relabel packets to ipmi_client the packet type. </summary> @@ -32960,7 +33006,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipmi_server_packets" lineno="38467"> +<interface name="corenet_send_ipmi_server_packets" lineno="36673"> <summary> Send ipmi_server packets. </summary> @@ -32971,7 +33017,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="38486"> +<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36692"> <summary> Do not audit attempts to send ipmi_server packets. </summary> @@ -32982,7 +33028,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipmi_server_packets" lineno="38505"> +<interface name="corenet_receive_ipmi_server_packets" lineno="36711"> <summary> Receive ipmi_server packets. </summary> @@ -32993,7 +33039,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="38524"> +<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36730"> <summary> Do not audit attempts to receive ipmi_server packets. </summary> @@ -33004,7 +33050,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipmi_server_packets" lineno="38543"> +<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36749"> <summary> Send and receive ipmi_server packets. </summary> @@ -33015,7 +33061,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="38559"> +<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36765"> <summary> Do not audit attempts to send and receive ipmi_server packets. </summary> @@ -33026,7 +33072,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipmi_server_packets" lineno="38574"> +<interface name="corenet_relabelto_ipmi_server_packets" lineno="36780"> <summary> Relabel packets to ipmi_server the packet type. </summary> @@ -33036,7 +33082,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ipp_port" lineno="38596"> +<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36802"> <summary> Send and receive TCP traffic on the ipp port. </summary> @@ -33047,7 +33093,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ipp_port" lineno="38615"> +<interface name="corenet_udp_send_ipp_port" lineno="36817"> <summary> Send UDP traffic on the ipp port. </summary> @@ -33058,7 +33104,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="38634"> +<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36832"> <summary> Do not audit attempts to send UDP traffic on the ipp port. </summary> @@ -33069,7 +33115,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ipp_port" lineno="38653"> +<interface name="corenet_udp_receive_ipp_port" lineno="36847"> <summary> Receive UDP traffic on the ipp port. </summary> @@ -33080,7 +33126,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="38672"> +<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36862"> <summary> Do not audit attempts to receive UDP traffic on the ipp port. </summary> @@ -33091,7 +33137,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ipp_port" lineno="38691"> +<interface name="corenet_udp_sendrecv_ipp_port" lineno="36877"> <summary> Send and receive UDP traffic on the ipp port. </summary> @@ -33102,7 +33148,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="38708"> +<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="36893"> <summary> Do not audit attempts to send and receive UDP traffic on the ipp port. @@ -33114,7 +33160,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ipp_port" lineno="38724"> +<interface name="corenet_tcp_bind_ipp_port" lineno="36908"> <summary> Bind TCP sockets to the ipp port. </summary> @@ -33125,7 +33171,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ipp_port" lineno="38744"> +<interface name="corenet_udp_bind_ipp_port" lineno="36928"> <summary> Bind UDP sockets to the ipp port. </summary> @@ -33136,7 +33182,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ipp_port" lineno="38763"> +<interface name="corenet_tcp_connect_ipp_port" lineno="36947"> <summary> Make a TCP connection to the ipp port. </summary> @@ -33146,7 +33192,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipp_client_packets" lineno="38783"> +<interface name="corenet_send_ipp_client_packets" lineno="36967"> <summary> Send ipp_client packets. </summary> @@ -33157,7 +33203,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="38802"> +<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="36986"> <summary> Do not audit attempts to send ipp_client packets. </summary> @@ -33168,7 +33214,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipp_client_packets" lineno="38821"> +<interface name="corenet_receive_ipp_client_packets" lineno="37005"> <summary> Receive ipp_client packets. </summary> @@ -33179,7 +33225,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="38840"> +<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37024"> <summary> Do not audit attempts to receive ipp_client packets. </summary> @@ -33190,7 +33236,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipp_client_packets" lineno="38859"> +<interface name="corenet_sendrecv_ipp_client_packets" lineno="37043"> <summary> Send and receive ipp_client packets. </summary> @@ -33201,7 +33247,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="38875"> +<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37059"> <summary> Do not audit attempts to send and receive ipp_client packets. </summary> @@ -33212,7 +33258,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipp_client_packets" lineno="38890"> +<interface name="corenet_relabelto_ipp_client_packets" lineno="37074"> <summary> Relabel packets to ipp_client the packet type. </summary> @@ -33222,7 +33268,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipp_server_packets" lineno="38910"> +<interface name="corenet_send_ipp_server_packets" lineno="37094"> <summary> Send ipp_server packets. </summary> @@ -33233,7 +33279,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="38929"> +<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37113"> <summary> Do not audit attempts to send ipp_server packets. </summary> @@ -33244,7 +33290,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipp_server_packets" lineno="38948"> +<interface name="corenet_receive_ipp_server_packets" lineno="37132"> <summary> Receive ipp_server packets. </summary> @@ -33255,7 +33301,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="38967"> +<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37151"> <summary> Do not audit attempts to receive ipp_server packets. </summary> @@ -33266,7 +33312,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipp_server_packets" lineno="38986"> +<interface name="corenet_sendrecv_ipp_server_packets" lineno="37170"> <summary> Send and receive ipp_server packets. </summary> @@ -33277,7 +33323,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="39002"> +<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37186"> <summary> Do not audit attempts to send and receive ipp_server packets. </summary> @@ -33288,7 +33334,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipp_server_packets" lineno="39017"> +<interface name="corenet_relabelto_ipp_server_packets" lineno="37201"> <summary> Relabel packets to ipp_server the packet type. </summary> @@ -33298,7 +33344,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="39039"> +<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37223"> <summary> Send and receive TCP traffic on the ipsecnat port. </summary> @@ -33309,7 +33355,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ipsecnat_port" lineno="39058"> +<interface name="corenet_udp_send_ipsecnat_port" lineno="37238"> <summary> Send UDP traffic on the ipsecnat port. </summary> @@ -33320,7 +33366,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="39077"> +<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37253"> <summary> Do not audit attempts to send UDP traffic on the ipsecnat port. </summary> @@ -33331,7 +33377,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ipsecnat_port" lineno="39096"> +<interface name="corenet_udp_receive_ipsecnat_port" lineno="37268"> <summary> Receive UDP traffic on the ipsecnat port. </summary> @@ -33342,7 +33388,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="39115"> +<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37283"> <summary> Do not audit attempts to receive UDP traffic on the ipsecnat port. </summary> @@ -33353,7 +33399,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="39134"> +<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37298"> <summary> Send and receive UDP traffic on the ipsecnat port. </summary> @@ -33364,7 +33410,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="39151"> +<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37314"> <summary> Do not audit attempts to send and receive UDP traffic on the ipsecnat port. @@ -33376,7 +33422,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ipsecnat_port" lineno="39167"> +<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37329"> <summary> Bind TCP sockets to the ipsecnat port. </summary> @@ -33387,7 +33433,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ipsecnat_port" lineno="39187"> +<interface name="corenet_udp_bind_ipsecnat_port" lineno="37349"> <summary> Bind UDP sockets to the ipsecnat port. </summary> @@ -33398,7 +33444,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ipsecnat_port" lineno="39206"> +<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37368"> <summary> Make a TCP connection to the ipsecnat port. </summary> @@ -33408,7 +33454,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipsecnat_client_packets" lineno="39226"> +<interface name="corenet_send_ipsecnat_client_packets" lineno="37388"> <summary> Send ipsecnat_client packets. </summary> @@ -33419,7 +33465,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="39245"> +<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37407"> <summary> Do not audit attempts to send ipsecnat_client packets. </summary> @@ -33430,7 +33476,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipsecnat_client_packets" lineno="39264"> +<interface name="corenet_receive_ipsecnat_client_packets" lineno="37426"> <summary> Receive ipsecnat_client packets. </summary> @@ -33441,7 +33487,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="39283"> +<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37445"> <summary> Do not audit attempts to receive ipsecnat_client packets. </summary> @@ -33452,7 +33498,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="39302"> +<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37464"> <summary> Send and receive ipsecnat_client packets. </summary> @@ -33463,7 +33509,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="39318"> +<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37480"> <summary> Do not audit attempts to send and receive ipsecnat_client packets. </summary> @@ -33474,7 +33520,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="39333"> +<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37495"> <summary> Relabel packets to ipsecnat_client the packet type. </summary> @@ -33484,7 +33530,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipsecnat_server_packets" lineno="39353"> +<interface name="corenet_send_ipsecnat_server_packets" lineno="37515"> <summary> Send ipsecnat_server packets. </summary> @@ -33495,7 +33541,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="39372"> +<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37534"> <summary> Do not audit attempts to send ipsecnat_server packets. </summary> @@ -33506,7 +33552,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipsecnat_server_packets" lineno="39391"> +<interface name="corenet_receive_ipsecnat_server_packets" lineno="37553"> <summary> Receive ipsecnat_server packets. </summary> @@ -33517,7 +33563,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="39410"> +<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37572"> <summary> Do not audit attempts to receive ipsecnat_server packets. </summary> @@ -33528,7 +33574,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="39429"> +<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37591"> <summary> Send and receive ipsecnat_server packets. </summary> @@ -33539,7 +33585,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="39445"> +<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37607"> <summary> Do not audit attempts to send and receive ipsecnat_server packets. </summary> @@ -33550,7 +33596,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="39460"> +<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37622"> <summary> Relabel packets to ipsecnat_server the packet type. </summary> @@ -33560,7 +33606,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ircd_port" lineno="39482"> +<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37644"> <summary> Send and receive TCP traffic on the ircd port. </summary> @@ -33571,7 +33617,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ircd_port" lineno="39501"> +<interface name="corenet_udp_send_ircd_port" lineno="37659"> <summary> Send UDP traffic on the ircd port. </summary> @@ -33582,7 +33628,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="39520"> +<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37674"> <summary> Do not audit attempts to send UDP traffic on the ircd port. </summary> @@ -33593,7 +33639,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ircd_port" lineno="39539"> +<interface name="corenet_udp_receive_ircd_port" lineno="37689"> <summary> Receive UDP traffic on the ircd port. </summary> @@ -33604,7 +33650,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="39558"> +<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37704"> <summary> Do not audit attempts to receive UDP traffic on the ircd port. </summary> @@ -33615,7 +33661,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ircd_port" lineno="39577"> +<interface name="corenet_udp_sendrecv_ircd_port" lineno="37719"> <summary> Send and receive UDP traffic on the ircd port. </summary> @@ -33626,7 +33672,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="39594"> +<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37735"> <summary> Do not audit attempts to send and receive UDP traffic on the ircd port. @@ -33638,7 +33684,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ircd_port" lineno="39610"> +<interface name="corenet_tcp_bind_ircd_port" lineno="37750"> <summary> Bind TCP sockets to the ircd port. </summary> @@ -33649,7 +33695,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ircd_port" lineno="39630"> +<interface name="corenet_udp_bind_ircd_port" lineno="37770"> <summary> Bind UDP sockets to the ircd port. </summary> @@ -33660,7 +33706,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ircd_port" lineno="39649"> +<interface name="corenet_tcp_connect_ircd_port" lineno="37789"> <summary> Make a TCP connection to the ircd port. </summary> @@ -33670,7 +33716,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ircd_client_packets" lineno="39669"> +<interface name="corenet_send_ircd_client_packets" lineno="37809"> <summary> Send ircd_client packets. </summary> @@ -33681,7 +33727,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="39688"> +<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37828"> <summary> Do not audit attempts to send ircd_client packets. </summary> @@ -33692,7 +33738,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ircd_client_packets" lineno="39707"> +<interface name="corenet_receive_ircd_client_packets" lineno="37847"> <summary> Receive ircd_client packets. </summary> @@ -33703,7 +33749,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="39726"> +<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37866"> <summary> Do not audit attempts to receive ircd_client packets. </summary> @@ -33714,7 +33760,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ircd_client_packets" lineno="39745"> +<interface name="corenet_sendrecv_ircd_client_packets" lineno="37885"> <summary> Send and receive ircd_client packets. </summary> @@ -33725,7 +33771,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="39761"> +<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="37901"> <summary> Do not audit attempts to send and receive ircd_client packets. </summary> @@ -33736,7 +33782,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ircd_client_packets" lineno="39776"> +<interface name="corenet_relabelto_ircd_client_packets" lineno="37916"> <summary> Relabel packets to ircd_client the packet type. </summary> @@ -33746,7 +33792,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ircd_server_packets" lineno="39796"> +<interface name="corenet_send_ircd_server_packets" lineno="37936"> <summary> Send ircd_server packets. </summary> @@ -33757,7 +33803,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="39815"> +<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="37955"> <summary> Do not audit attempts to send ircd_server packets. </summary> @@ -33768,7 +33814,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ircd_server_packets" lineno="39834"> +<interface name="corenet_receive_ircd_server_packets" lineno="37974"> <summary> Receive ircd_server packets. </summary> @@ -33779,7 +33825,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="39853"> +<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="37993"> <summary> Do not audit attempts to receive ircd_server packets. </summary> @@ -33790,7 +33836,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ircd_server_packets" lineno="39872"> +<interface name="corenet_sendrecv_ircd_server_packets" lineno="38012"> <summary> Send and receive ircd_server packets. </summary> @@ -33801,7 +33847,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="39888"> +<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38028"> <summary> Do not audit attempts to send and receive ircd_server packets. </summary> @@ -33812,7 +33858,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ircd_server_packets" lineno="39903"> +<interface name="corenet_relabelto_ircd_server_packets" lineno="38043"> <summary> Relabel packets to ircd_server the packet type. </summary> @@ -33822,7 +33868,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="39925"> +<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38065"> <summary> Send and receive TCP traffic on the isakmp port. </summary> @@ -33833,7 +33879,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_isakmp_port" lineno="39944"> +<interface name="corenet_udp_send_isakmp_port" lineno="38080"> <summary> Send UDP traffic on the isakmp port. </summary> @@ -33844,7 +33890,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="39963"> +<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38095"> <summary> Do not audit attempts to send UDP traffic on the isakmp port. </summary> @@ -33855,7 +33901,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_isakmp_port" lineno="39982"> +<interface name="corenet_udp_receive_isakmp_port" lineno="38110"> <summary> Receive UDP traffic on the isakmp port. </summary> @@ -33866,7 +33912,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="40001"> +<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38125"> <summary> Do not audit attempts to receive UDP traffic on the isakmp port. </summary> @@ -33877,7 +33923,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_isakmp_port" lineno="40020"> +<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38140"> <summary> Send and receive UDP traffic on the isakmp port. </summary> @@ -33888,7 +33934,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="40037"> +<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38156"> <summary> Do not audit attempts to send and receive UDP traffic on the isakmp port. @@ -33900,7 +33946,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_isakmp_port" lineno="40053"> +<interface name="corenet_tcp_bind_isakmp_port" lineno="38171"> <summary> Bind TCP sockets to the isakmp port. </summary> @@ -33911,7 +33957,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_isakmp_port" lineno="40073"> +<interface name="corenet_udp_bind_isakmp_port" lineno="38191"> <summary> Bind UDP sockets to the isakmp port. </summary> @@ -33922,7 +33968,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_isakmp_port" lineno="40092"> +<interface name="corenet_tcp_connect_isakmp_port" lineno="38210"> <summary> Make a TCP connection to the isakmp port. </summary> @@ -33932,7 +33978,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isakmp_client_packets" lineno="40112"> +<interface name="corenet_send_isakmp_client_packets" lineno="38230"> <summary> Send isakmp_client packets. </summary> @@ -33943,7 +33989,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="40131"> +<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38249"> <summary> Do not audit attempts to send isakmp_client packets. </summary> @@ -33954,7 +34000,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isakmp_client_packets" lineno="40150"> +<interface name="corenet_receive_isakmp_client_packets" lineno="38268"> <summary> Receive isakmp_client packets. </summary> @@ -33965,7 +34011,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="40169"> +<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38287"> <summary> Do not audit attempts to receive isakmp_client packets. </summary> @@ -33976,7 +34022,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isakmp_client_packets" lineno="40188"> +<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38306"> <summary> Send and receive isakmp_client packets. </summary> @@ -33987,7 +34033,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="40204"> +<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38322"> <summary> Do not audit attempts to send and receive isakmp_client packets. </summary> @@ -33998,7 +34044,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isakmp_client_packets" lineno="40219"> +<interface name="corenet_relabelto_isakmp_client_packets" lineno="38337"> <summary> Relabel packets to isakmp_client the packet type. </summary> @@ -34008,7 +34054,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isakmp_server_packets" lineno="40239"> +<interface name="corenet_send_isakmp_server_packets" lineno="38357"> <summary> Send isakmp_server packets. </summary> @@ -34019,7 +34065,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="40258"> +<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38376"> <summary> Do not audit attempts to send isakmp_server packets. </summary> @@ -34030,7 +34076,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isakmp_server_packets" lineno="40277"> +<interface name="corenet_receive_isakmp_server_packets" lineno="38395"> <summary> Receive isakmp_server packets. </summary> @@ -34041,7 +34087,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="40296"> +<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38414"> <summary> Do not audit attempts to receive isakmp_server packets. </summary> @@ -34052,7 +34098,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isakmp_server_packets" lineno="40315"> +<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38433"> <summary> Send and receive isakmp_server packets. </summary> @@ -34063,7 +34109,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="40331"> +<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38449"> <summary> Do not audit attempts to send and receive isakmp_server packets. </summary> @@ -34074,7 +34120,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isakmp_server_packets" lineno="40346"> +<interface name="corenet_relabelto_isakmp_server_packets" lineno="38464"> <summary> Relabel packets to isakmp_server the packet type. </summary> @@ -34084,7 +34130,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="40368"> +<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38486"> <summary> Send and receive TCP traffic on the iscsi port. </summary> @@ -34095,7 +34141,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_iscsi_port" lineno="40387"> +<interface name="corenet_udp_send_iscsi_port" lineno="38501"> <summary> Send UDP traffic on the iscsi port. </summary> @@ -34106,7 +34152,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="40406"> +<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38516"> <summary> Do not audit attempts to send UDP traffic on the iscsi port. </summary> @@ -34117,7 +34163,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_iscsi_port" lineno="40425"> +<interface name="corenet_udp_receive_iscsi_port" lineno="38531"> <summary> Receive UDP traffic on the iscsi port. </summary> @@ -34128,7 +34174,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="40444"> +<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38546"> <summary> Do not audit attempts to receive UDP traffic on the iscsi port. </summary> @@ -34139,7 +34185,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_iscsi_port" lineno="40463"> +<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38561"> <summary> Send and receive UDP traffic on the iscsi port. </summary> @@ -34150,7 +34196,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="40480"> +<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38577"> <summary> Do not audit attempts to send and receive UDP traffic on the iscsi port. @@ -34162,7 +34208,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_iscsi_port" lineno="40496"> +<interface name="corenet_tcp_bind_iscsi_port" lineno="38592"> <summary> Bind TCP sockets to the iscsi port. </summary> @@ -34173,7 +34219,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_iscsi_port" lineno="40516"> +<interface name="corenet_udp_bind_iscsi_port" lineno="38612"> <summary> Bind UDP sockets to the iscsi port. </summary> @@ -34184,7 +34230,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_iscsi_port" lineno="40535"> +<interface name="corenet_tcp_connect_iscsi_port" lineno="38631"> <summary> Make a TCP connection to the iscsi port. </summary> @@ -34194,7 +34240,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_iscsi_client_packets" lineno="40555"> +<interface name="corenet_send_iscsi_client_packets" lineno="38651"> <summary> Send iscsi_client packets. </summary> @@ -34205,7 +34251,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="40574"> +<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38670"> <summary> Do not audit attempts to send iscsi_client packets. </summary> @@ -34216,7 +34262,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_iscsi_client_packets" lineno="40593"> +<interface name="corenet_receive_iscsi_client_packets" lineno="38689"> <summary> Receive iscsi_client packets. </summary> @@ -34227,7 +34273,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="40612"> +<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38708"> <summary> Do not audit attempts to receive iscsi_client packets. </summary> @@ -34238,7 +34284,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_iscsi_client_packets" lineno="40631"> +<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38727"> <summary> Send and receive iscsi_client packets. </summary> @@ -34249,7 +34295,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="40647"> +<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38743"> <summary> Do not audit attempts to send and receive iscsi_client packets. </summary> @@ -34260,7 +34306,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_iscsi_client_packets" lineno="40662"> +<interface name="corenet_relabelto_iscsi_client_packets" lineno="38758"> <summary> Relabel packets to iscsi_client the packet type. </summary> @@ -34270,7 +34316,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_iscsi_server_packets" lineno="40682"> +<interface name="corenet_send_iscsi_server_packets" lineno="38778"> <summary> Send iscsi_server packets. </summary> @@ -34281,7 +34327,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="40701"> +<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38797"> <summary> Do not audit attempts to send iscsi_server packets. </summary> @@ -34292,7 +34338,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_iscsi_server_packets" lineno="40720"> +<interface name="corenet_receive_iscsi_server_packets" lineno="38816"> <summary> Receive iscsi_server packets. </summary> @@ -34303,7 +34349,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="40739"> +<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38835"> <summary> Do not audit attempts to receive iscsi_server packets. </summary> @@ -34314,7 +34360,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_iscsi_server_packets" lineno="40758"> +<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38854"> <summary> Send and receive iscsi_server packets. </summary> @@ -34325,7 +34371,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="40774"> +<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38870"> <summary> Do not audit attempts to send and receive iscsi_server packets. </summary> @@ -34336,7 +34382,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_iscsi_server_packets" lineno="40789"> +<interface name="corenet_relabelto_iscsi_server_packets" lineno="38885"> <summary> Relabel packets to iscsi_server the packet type. </summary> @@ -34346,7 +34392,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_isns_port" lineno="40811"> +<interface name="corenet_tcp_sendrecv_isns_port" lineno="38907"> <summary> Send and receive TCP traffic on the isns port. </summary> @@ -34357,7 +34403,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_isns_port" lineno="40830"> +<interface name="corenet_udp_send_isns_port" lineno="38922"> <summary> Send UDP traffic on the isns port. </summary> @@ -34368,7 +34414,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_isns_port" lineno="40849"> +<interface name="corenet_dontaudit_udp_send_isns_port" lineno="38937"> <summary> Do not audit attempts to send UDP traffic on the isns port. </summary> @@ -34379,7 +34425,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_isns_port" lineno="40868"> +<interface name="corenet_udp_receive_isns_port" lineno="38952"> <summary> Receive UDP traffic on the isns port. </summary> @@ -34390,7 +34436,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="40887"> +<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="38967"> <summary> Do not audit attempts to receive UDP traffic on the isns port. </summary> @@ -34401,7 +34447,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_isns_port" lineno="40906"> +<interface name="corenet_udp_sendrecv_isns_port" lineno="38982"> <summary> Send and receive UDP traffic on the isns port. </summary> @@ -34412,7 +34458,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="40923"> +<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="38998"> <summary> Do not audit attempts to send and receive UDP traffic on the isns port. @@ -34424,7 +34470,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_isns_port" lineno="40939"> +<interface name="corenet_tcp_bind_isns_port" lineno="39013"> <summary> Bind TCP sockets to the isns port. </summary> @@ -34435,7 +34481,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_isns_port" lineno="40959"> +<interface name="corenet_udp_bind_isns_port" lineno="39033"> <summary> Bind UDP sockets to the isns port. </summary> @@ -34446,7 +34492,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_isns_port" lineno="40978"> +<interface name="corenet_tcp_connect_isns_port" lineno="39052"> <summary> Make a TCP connection to the isns port. </summary> @@ -34456,7 +34502,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isns_client_packets" lineno="40998"> +<interface name="corenet_send_isns_client_packets" lineno="39072"> <summary> Send isns_client packets. </summary> @@ -34467,7 +34513,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isns_client_packets" lineno="41017"> +<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39091"> <summary> Do not audit attempts to send isns_client packets. </summary> @@ -34478,7 +34524,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isns_client_packets" lineno="41036"> +<interface name="corenet_receive_isns_client_packets" lineno="39110"> <summary> Receive isns_client packets. </summary> @@ -34489,7 +34535,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="41055"> +<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39129"> <summary> Do not audit attempts to receive isns_client packets. </summary> @@ -34500,7 +34546,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isns_client_packets" lineno="41074"> +<interface name="corenet_sendrecv_isns_client_packets" lineno="39148"> <summary> Send and receive isns_client packets. </summary> @@ -34511,7 +34557,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="41090"> +<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39164"> <summary> Do not audit attempts to send and receive isns_client packets. </summary> @@ -34522,7 +34568,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isns_client_packets" lineno="41105"> +<interface name="corenet_relabelto_isns_client_packets" lineno="39179"> <summary> Relabel packets to isns_client the packet type. </summary> @@ -34532,7 +34578,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isns_server_packets" lineno="41125"> +<interface name="corenet_send_isns_server_packets" lineno="39199"> <summary> Send isns_server packets. </summary> @@ -34543,7 +34589,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isns_server_packets" lineno="41144"> +<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39218"> <summary> Do not audit attempts to send isns_server packets. </summary> @@ -34554,7 +34600,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isns_server_packets" lineno="41163"> +<interface name="corenet_receive_isns_server_packets" lineno="39237"> <summary> Receive isns_server packets. </summary> @@ -34565,7 +34611,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="41182"> +<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39256"> <summary> Do not audit attempts to receive isns_server packets. </summary> @@ -34576,7 +34622,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isns_server_packets" lineno="41201"> +<interface name="corenet_sendrecv_isns_server_packets" lineno="39275"> <summary> Send and receive isns_server packets. </summary> @@ -34587,7 +34633,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="41217"> +<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39291"> <summary> Do not audit attempts to send and receive isns_server packets. </summary> @@ -34598,7 +34644,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isns_server_packets" lineno="41232"> +<interface name="corenet_relabelto_isns_server_packets" lineno="39306"> <summary> Relabel packets to isns_server the packet type. </summary> @@ -34608,7 +34654,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="41254"> +<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39328"> <summary> Send and receive TCP traffic on the jabber_client port. </summary> @@ -34619,7 +34665,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_jabber_client_port" lineno="41273"> +<interface name="corenet_udp_send_jabber_client_port" lineno="39343"> <summary> Send UDP traffic on the jabber_client port. </summary> @@ -34630,7 +34676,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="41292"> +<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39358"> <summary> Do not audit attempts to send UDP traffic on the jabber_client port. </summary> @@ -34641,7 +34687,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_jabber_client_port" lineno="41311"> +<interface name="corenet_udp_receive_jabber_client_port" lineno="39373"> <summary> Receive UDP traffic on the jabber_client port. </summary> @@ -34652,7 +34698,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="41330"> +<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39388"> <summary> Do not audit attempts to receive UDP traffic on the jabber_client port. </summary> @@ -34663,7 +34709,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="41349"> +<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39403"> <summary> Send and receive UDP traffic on the jabber_client port. </summary> @@ -34674,7 +34720,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="41366"> +<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39419"> <summary> Do not audit attempts to send and receive UDP traffic on the jabber_client port. @@ -34686,7 +34732,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_jabber_client_port" lineno="41382"> +<interface name="corenet_tcp_bind_jabber_client_port" lineno="39434"> <summary> Bind TCP sockets to the jabber_client port. </summary> @@ -34697,7 +34743,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_jabber_client_port" lineno="41402"> +<interface name="corenet_udp_bind_jabber_client_port" lineno="39454"> <summary> Bind UDP sockets to the jabber_client port. </summary> @@ -34708,7 +34754,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_jabber_client_port" lineno="41421"> +<interface name="corenet_tcp_connect_jabber_client_port" lineno="39473"> <summary> Make a TCP connection to the jabber_client port. </summary> @@ -34718,7 +34764,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_client_client_packets" lineno="41441"> +<interface name="corenet_send_jabber_client_client_packets" lineno="39493"> <summary> Send jabber_client_client packets. </summary> @@ -34729,7 +34775,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="41460"> +<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39512"> <summary> Do not audit attempts to send jabber_client_client packets. </summary> @@ -34740,7 +34786,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_client_client_packets" lineno="41479"> +<interface name="corenet_receive_jabber_client_client_packets" lineno="39531"> <summary> Receive jabber_client_client packets. </summary> @@ -34751,7 +34797,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="41498"> +<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39550"> <summary> Do not audit attempts to receive jabber_client_client packets. </summary> @@ -34762,7 +34808,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="41517"> +<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39569"> <summary> Send and receive jabber_client_client packets. </summary> @@ -34773,7 +34819,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="41533"> +<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39585"> <summary> Do not audit attempts to send and receive jabber_client_client packets. </summary> @@ -34784,7 +34830,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_client_client_packets" lineno="41548"> +<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39600"> <summary> Relabel packets to jabber_client_client the packet type. </summary> @@ -34794,7 +34840,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_client_server_packets" lineno="41568"> +<interface name="corenet_send_jabber_client_server_packets" lineno="39620"> <summary> Send jabber_client_server packets. </summary> @@ -34805,7 +34851,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="41587"> +<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39639"> <summary> Do not audit attempts to send jabber_client_server packets. </summary> @@ -34816,7 +34862,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_client_server_packets" lineno="41606"> +<interface name="corenet_receive_jabber_client_server_packets" lineno="39658"> <summary> Receive jabber_client_server packets. </summary> @@ -34827,7 +34873,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="41625"> +<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39677"> <summary> Do not audit attempts to receive jabber_client_server packets. </summary> @@ -34838,7 +34884,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="41644"> +<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39696"> <summary> Send and receive jabber_client_server packets. </summary> @@ -34849,7 +34895,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="41660"> +<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39712"> <summary> Do not audit attempts to send and receive jabber_client_server packets. </summary> @@ -34860,7 +34906,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_client_server_packets" lineno="41675"> +<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39727"> <summary> Relabel packets to jabber_client_server the packet type. </summary> @@ -34870,7 +34916,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="41697"> +<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39749"> <summary> Send and receive TCP traffic on the jabber_interserver port. </summary> @@ -34881,7 +34927,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_jabber_interserver_port" lineno="41716"> +<interface name="corenet_udp_send_jabber_interserver_port" lineno="39764"> <summary> Send UDP traffic on the jabber_interserver port. </summary> @@ -34892,7 +34938,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="41735"> +<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39779"> <summary> Do not audit attempts to send UDP traffic on the jabber_interserver port. </summary> @@ -34903,7 +34949,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_jabber_interserver_port" lineno="41754"> +<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39794"> <summary> Receive UDP traffic on the jabber_interserver port. </summary> @@ -34914,7 +34960,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="41773"> +<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39809"> <summary> Do not audit attempts to receive UDP traffic on the jabber_interserver port. </summary> @@ -34925,7 +34971,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="41792"> +<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39824"> <summary> Send and receive UDP traffic on the jabber_interserver port. </summary> @@ -34936,7 +34982,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="41809"> +<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39840"> <summary> Do not audit attempts to send and receive UDP traffic on the jabber_interserver port. @@ -34948,7 +34994,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="41825"> +<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39855"> <summary> Bind TCP sockets to the jabber_interserver port. </summary> @@ -34959,7 +35005,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_jabber_interserver_port" lineno="41845"> +<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39875"> <summary> Bind UDP sockets to the jabber_interserver port. </summary> @@ -34970,7 +35016,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="41864"> +<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="39894"> <summary> Make a TCP connection to the jabber_interserver port. </summary> @@ -34980,7 +35026,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_interserver_client_packets" lineno="41884"> +<interface name="corenet_send_jabber_interserver_client_packets" lineno="39914"> <summary> Send jabber_interserver_client packets. </summary> @@ -34991,7 +35037,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="41903"> +<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="39933"> <summary> Do not audit attempts to send jabber_interserver_client packets. </summary> @@ -35002,7 +35048,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_interserver_client_packets" lineno="41922"> +<interface name="corenet_receive_jabber_interserver_client_packets" lineno="39952"> <summary> Receive jabber_interserver_client packets. </summary> @@ -35013,7 +35059,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="41941"> +<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="39971"> <summary> Do not audit attempts to receive jabber_interserver_client packets. </summary> @@ -35024,7 +35070,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="41960"> +<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="39990"> <summary> Send and receive jabber_interserver_client packets. </summary> @@ -35035,7 +35081,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="41976"> +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40006"> <summary> Do not audit attempts to send and receive jabber_interserver_client packets. </summary> @@ -35046,7 +35092,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="41991"> +<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40021"> <summary> Relabel packets to jabber_interserver_client the packet type. </summary> @@ -35056,7 +35102,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_interserver_server_packets" lineno="42011"> +<interface name="corenet_send_jabber_interserver_server_packets" lineno="40041"> <summary> Send jabber_interserver_server packets. </summary> @@ -35067,7 +35113,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="42030"> +<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40060"> <summary> Do not audit attempts to send jabber_interserver_server packets. </summary> @@ -35078,7 +35124,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_interserver_server_packets" lineno="42049"> +<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40079"> <summary> Receive jabber_interserver_server packets. </summary> @@ -35089,7 +35135,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="42068"> +<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40098"> <summary> Do not audit attempts to receive jabber_interserver_server packets. </summary> @@ -35100,7 +35146,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="42087"> +<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40117"> <summary> Send and receive jabber_interserver_server packets. </summary> @@ -35111,7 +35157,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="42103"> +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40133"> <summary> Do not audit attempts to send and receive jabber_interserver_server packets. </summary> @@ -35122,7 +35168,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="42118"> +<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40148"> <summary> Relabel packets to jabber_interserver_server the packet type. </summary> @@ -35132,7 +35178,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="42140"> +<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40170"> <summary> Send and receive TCP traffic on the jboss_iiop port. </summary> @@ -35143,7 +35189,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_jboss_iiop_port" lineno="42159"> +<interface name="corenet_udp_send_jboss_iiop_port" lineno="40185"> <summary> Send UDP traffic on the jboss_iiop port. </summary> @@ -35154,7 +35200,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="42178"> +<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40200"> <summary> Do not audit attempts to send UDP traffic on the jboss_iiop port. </summary> @@ -35165,7 +35211,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_jboss_iiop_port" lineno="42197"> +<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40215"> <summary> Receive UDP traffic on the jboss_iiop port. </summary> @@ -35176,7 +35222,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="42216"> +<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40230"> <summary> Do not audit attempts to receive UDP traffic on the jboss_iiop port. </summary> @@ -35187,7 +35233,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="42235"> +<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40245"> <summary> Send and receive UDP traffic on the jboss_iiop port. </summary> @@ -35198,7 +35244,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="42252"> +<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40261"> <summary> Do not audit attempts to send and receive UDP traffic on the jboss_iiop port. @@ -35210,7 +35256,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="42268"> +<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40276"> <summary> Bind TCP sockets to the jboss_iiop port. </summary> @@ -35221,7 +35267,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_jboss_iiop_port" lineno="42288"> +<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40296"> <summary> Bind UDP sockets to the jboss_iiop port. </summary> @@ -35232,7 +35278,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="42307"> +<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40315"> <summary> Make a TCP connection to the jboss_iiop port. </summary> @@ -35242,7 +35288,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jboss_iiop_client_packets" lineno="42327"> +<interface name="corenet_send_jboss_iiop_client_packets" lineno="40335"> <summary> Send jboss_iiop_client packets. </summary> @@ -35253,7 +35299,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="42346"> +<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40354"> <summary> Do not audit attempts to send jboss_iiop_client packets. </summary> @@ -35264,7 +35310,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jboss_iiop_client_packets" lineno="42365"> +<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40373"> <summary> Receive jboss_iiop_client packets. </summary> @@ -35275,7 +35321,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="42384"> +<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40392"> <summary> Do not audit attempts to receive jboss_iiop_client packets. </summary> @@ -35286,7 +35332,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="42403"> +<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40411"> <summary> Send and receive jboss_iiop_client packets. </summary> @@ -35297,7 +35343,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="42419"> +<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40427"> <summary> Do not audit attempts to send and receive jboss_iiop_client packets. </summary> @@ -35308,7 +35354,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="42434"> +<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40442"> <summary> Relabel packets to jboss_iiop_client the packet type. </summary> @@ -35318,7 +35364,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jboss_iiop_server_packets" lineno="42454"> +<interface name="corenet_send_jboss_iiop_server_packets" lineno="40462"> <summary> Send jboss_iiop_server packets. </summary> @@ -35329,7 +35375,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="42473"> +<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40481"> <summary> Do not audit attempts to send jboss_iiop_server packets. </summary> @@ -35340,7 +35386,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jboss_iiop_server_packets" lineno="42492"> +<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40500"> <summary> Receive jboss_iiop_server packets. </summary> @@ -35351,7 +35397,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="42511"> +<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40519"> <summary> Do not audit attempts to receive jboss_iiop_server packets. </summary> @@ -35362,7 +35408,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="42530"> +<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40538"> <summary> Send and receive jboss_iiop_server packets. </summary> @@ -35373,7 +35419,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="42546"> +<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40554"> <summary> Do not audit attempts to send and receive jboss_iiop_server packets. </summary> @@ -35384,7 +35430,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="42561"> +<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40569"> <summary> Relabel packets to jboss_iiop_server the packet type. </summary> @@ -35394,7 +35440,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="42583"> +<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40591"> <summary> Send and receive TCP traffic on the kerberos port. </summary> @@ -35405,7 +35451,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kerberos_port" lineno="42602"> +<interface name="corenet_udp_send_kerberos_port" lineno="40606"> <summary> Send UDP traffic on the kerberos port. </summary> @@ -35416,7 +35462,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="42621"> +<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40621"> <summary> Do not audit attempts to send UDP traffic on the kerberos port. </summary> @@ -35427,7 +35473,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kerberos_port" lineno="42640"> +<interface name="corenet_udp_receive_kerberos_port" lineno="40636"> <summary> Receive UDP traffic on the kerberos port. </summary> @@ -35438,7 +35484,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="42659"> +<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40651"> <summary> Do not audit attempts to receive UDP traffic on the kerberos port. </summary> @@ -35449,7 +35495,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kerberos_port" lineno="42678"> +<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40666"> <summary> Send and receive UDP traffic on the kerberos port. </summary> @@ -35460,7 +35506,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="42695"> +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40682"> <summary> Do not audit attempts to send and receive UDP traffic on the kerberos port. @@ -35472,7 +35518,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kerberos_port" lineno="42711"> +<interface name="corenet_tcp_bind_kerberos_port" lineno="40697"> <summary> Bind TCP sockets to the kerberos port. </summary> @@ -35483,7 +35529,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kerberos_port" lineno="42731"> +<interface name="corenet_udp_bind_kerberos_port" lineno="40717"> <summary> Bind UDP sockets to the kerberos port. </summary> @@ -35494,7 +35540,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kerberos_port" lineno="42750"> +<interface name="corenet_tcp_connect_kerberos_port" lineno="40736"> <summary> Make a TCP connection to the kerberos port. </summary> @@ -35504,7 +35550,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_client_packets" lineno="42770"> +<interface name="corenet_send_kerberos_client_packets" lineno="40756"> <summary> Send kerberos_client packets. </summary> @@ -35515,7 +35561,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="42789"> +<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40775"> <summary> Do not audit attempts to send kerberos_client packets. </summary> @@ -35526,7 +35572,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_client_packets" lineno="42808"> +<interface name="corenet_receive_kerberos_client_packets" lineno="40794"> <summary> Receive kerberos_client packets. </summary> @@ -35537,7 +35583,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="42827"> +<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40813"> <summary> Do not audit attempts to receive kerberos_client packets. </summary> @@ -35548,7 +35594,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_client_packets" lineno="42846"> +<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40832"> <summary> Send and receive kerberos_client packets. </summary> @@ -35559,7 +35605,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="42862"> +<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40848"> <summary> Do not audit attempts to send and receive kerberos_client packets. </summary> @@ -35570,7 +35616,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_client_packets" lineno="42877"> +<interface name="corenet_relabelto_kerberos_client_packets" lineno="40863"> <summary> Relabel packets to kerberos_client the packet type. </summary> @@ -35580,7 +35626,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_server_packets" lineno="42897"> +<interface name="corenet_send_kerberos_server_packets" lineno="40883"> <summary> Send kerberos_server packets. </summary> @@ -35591,7 +35637,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="42916"> +<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="40902"> <summary> Do not audit attempts to send kerberos_server packets. </summary> @@ -35602,7 +35648,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_server_packets" lineno="42935"> +<interface name="corenet_receive_kerberos_server_packets" lineno="40921"> <summary> Receive kerberos_server packets. </summary> @@ -35613,7 +35659,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="42954"> +<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="40940"> <summary> Do not audit attempts to receive kerberos_server packets. </summary> @@ -35624,7 +35670,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_server_packets" lineno="42973"> +<interface name="corenet_sendrecv_kerberos_server_packets" lineno="40959"> <summary> Send and receive kerberos_server packets. </summary> @@ -35635,7 +35681,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="42989"> +<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="40975"> <summary> Do not audit attempts to send and receive kerberos_server packets. </summary> @@ -35646,7 +35692,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_server_packets" lineno="43004"> +<interface name="corenet_relabelto_kerberos_server_packets" lineno="40990"> <summary> Relabel packets to kerberos_server the packet type. </summary> @@ -35656,7 +35702,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="43026"> +<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41012"> <summary> Send and receive TCP traffic on the kerberos_admin port. </summary> @@ -35667,7 +35713,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kerberos_admin_port" lineno="43045"> +<interface name="corenet_udp_send_kerberos_admin_port" lineno="41027"> <summary> Send UDP traffic on the kerberos_admin port. </summary> @@ -35678,7 +35724,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="43064"> +<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41042"> <summary> Do not audit attempts to send UDP traffic on the kerberos_admin port. </summary> @@ -35689,7 +35735,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kerberos_admin_port" lineno="43083"> +<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41057"> <summary> Receive UDP traffic on the kerberos_admin port. </summary> @@ -35700,7 +35746,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="43102"> +<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41072"> <summary> Do not audit attempts to receive UDP traffic on the kerberos_admin port. </summary> @@ -35711,7 +35757,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="43121"> +<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41087"> <summary> Send and receive UDP traffic on the kerberos_admin port. </summary> @@ -35722,7 +35768,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="43138"> +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41103"> <summary> Do not audit attempts to send and receive UDP traffic on the kerberos_admin port. @@ -35734,7 +35780,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="43154"> +<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41118"> <summary> Bind TCP sockets to the kerberos_admin port. </summary> @@ -35745,7 +35791,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kerberos_admin_port" lineno="43174"> +<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41138"> <summary> Bind UDP sockets to the kerberos_admin port. </summary> @@ -35756,7 +35802,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="43193"> +<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41157"> <summary> Make a TCP connection to the kerberos_admin port. </summary> @@ -35766,7 +35812,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_admin_client_packets" lineno="43213"> +<interface name="corenet_send_kerberos_admin_client_packets" lineno="41177"> <summary> Send kerberos_admin_client packets. </summary> @@ -35777,7 +35823,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="43232"> +<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41196"> <summary> Do not audit attempts to send kerberos_admin_client packets. </summary> @@ -35788,7 +35834,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_admin_client_packets" lineno="43251"> +<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41215"> <summary> Receive kerberos_admin_client packets. </summary> @@ -35799,7 +35845,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="43270"> +<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41234"> <summary> Do not audit attempts to receive kerberos_admin_client packets. </summary> @@ -35810,7 +35856,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="43289"> +<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41253"> <summary> Send and receive kerberos_admin_client packets. </summary> @@ -35821,7 +35867,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="43305"> +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41269"> <summary> Do not audit attempts to send and receive kerberos_admin_client packets. </summary> @@ -35832,7 +35878,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="43320"> +<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41284"> <summary> Relabel packets to kerberos_admin_client the packet type. </summary> @@ -35842,7 +35888,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_admin_server_packets" lineno="43340"> +<interface name="corenet_send_kerberos_admin_server_packets" lineno="41304"> <summary> Send kerberos_admin_server packets. </summary> @@ -35853,7 +35899,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="43359"> +<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41323"> <summary> Do not audit attempts to send kerberos_admin_server packets. </summary> @@ -35864,7 +35910,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_admin_server_packets" lineno="43378"> +<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41342"> <summary> Receive kerberos_admin_server packets. </summary> @@ -35875,7 +35921,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="43397"> +<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41361"> <summary> Do not audit attempts to receive kerberos_admin_server packets. </summary> @@ -35886,7 +35932,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="43416"> +<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41380"> <summary> Send and receive kerberos_admin_server packets. </summary> @@ -35897,7 +35943,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="43432"> +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41396"> <summary> Do not audit attempts to send and receive kerberos_admin_server packets. </summary> @@ -35908,7 +35954,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="43447"> +<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41411"> <summary> Relabel packets to kerberos_admin_server the packet type. </summary> @@ -35918,7 +35964,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="43469"> +<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41433"> <summary> Send and receive TCP traffic on the kerberos_master port. </summary> @@ -35929,7 +35975,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kerberos_master_port" lineno="43488"> +<interface name="corenet_udp_send_kerberos_master_port" lineno="41448"> <summary> Send UDP traffic on the kerberos_master port. </summary> @@ -35940,7 +35986,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="43507"> +<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41463"> <summary> Do not audit attempts to send UDP traffic on the kerberos_master port. </summary> @@ -35951,7 +35997,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kerberos_master_port" lineno="43526"> +<interface name="corenet_udp_receive_kerberos_master_port" lineno="41478"> <summary> Receive UDP traffic on the kerberos_master port. </summary> @@ -35962,7 +36008,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="43545"> +<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41493"> <summary> Do not audit attempts to receive UDP traffic on the kerberos_master port. </summary> @@ -35973,7 +36019,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="43564"> +<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41508"> <summary> Send and receive UDP traffic on the kerberos_master port. </summary> @@ -35984,7 +36030,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="43581"> +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41524"> <summary> Do not audit attempts to send and receive UDP traffic on the kerberos_master port. @@ -35996,7 +36042,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kerberos_master_port" lineno="43597"> +<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41539"> <summary> Bind TCP sockets to the kerberos_master port. </summary> @@ -36007,7 +36053,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kerberos_master_port" lineno="43617"> +<interface name="corenet_udp_bind_kerberos_master_port" lineno="41559"> <summary> Bind UDP sockets to the kerberos_master port. </summary> @@ -36018,7 +36064,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kerberos_master_port" lineno="43636"> +<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41578"> <summary> Make a TCP connection to the kerberos_master port. </summary> @@ -36028,7 +36074,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_master_client_packets" lineno="43656"> +<interface name="corenet_send_kerberos_master_client_packets" lineno="41598"> <summary> Send kerberos_master_client packets. </summary> @@ -36039,7 +36085,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="43675"> +<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41617"> <summary> Do not audit attempts to send kerberos_master_client packets. </summary> @@ -36050,7 +36096,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_master_client_packets" lineno="43694"> +<interface name="corenet_receive_kerberos_master_client_packets" lineno="41636"> <summary> Receive kerberos_master_client packets. </summary> @@ -36061,7 +36107,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="43713"> +<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41655"> <summary> Do not audit attempts to receive kerberos_master_client packets. </summary> @@ -36072,7 +36118,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="43732"> +<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41674"> <summary> Send and receive kerberos_master_client packets. </summary> @@ -36083,7 +36129,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="43748"> +<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41690"> <summary> Do not audit attempts to send and receive kerberos_master_client packets. </summary> @@ -36094,7 +36140,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="43763"> +<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41705"> <summary> Relabel packets to kerberos_master_client the packet type. </summary> @@ -36104,7 +36150,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_master_server_packets" lineno="43783"> +<interface name="corenet_send_kerberos_master_server_packets" lineno="41725"> <summary> Send kerberos_master_server packets. </summary> @@ -36115,7 +36161,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="43802"> +<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41744"> <summary> Do not audit attempts to send kerberos_master_server packets. </summary> @@ -36126,7 +36172,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_master_server_packets" lineno="43821"> +<interface name="corenet_receive_kerberos_master_server_packets" lineno="41763"> <summary> Receive kerberos_master_server packets. </summary> @@ -36137,7 +36183,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="43840"> +<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41782"> <summary> Do not audit attempts to receive kerberos_master_server packets. </summary> @@ -36148,7 +36194,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="43859"> +<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41801"> <summary> Send and receive kerberos_master_server packets. </summary> @@ -36159,7 +36205,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="43875"> +<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41817"> <summary> Do not audit attempts to send and receive kerberos_master_server packets. </summary> @@ -36170,7 +36216,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="43890"> +<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41832"> <summary> Relabel packets to kerberos_master_server the packet type. </summary> @@ -36180,7 +36226,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kismet_port" lineno="43912"> +<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41854"> <summary> Send and receive TCP traffic on the kismet port. </summary> @@ -36191,7 +36237,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kismet_port" lineno="43931"> +<interface name="corenet_udp_send_kismet_port" lineno="41869"> <summary> Send UDP traffic on the kismet port. </summary> @@ -36202,7 +36248,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="43950"> +<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="41884"> <summary> Do not audit attempts to send UDP traffic on the kismet port. </summary> @@ -36213,7 +36259,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kismet_port" lineno="43969"> +<interface name="corenet_udp_receive_kismet_port" lineno="41899"> <summary> Receive UDP traffic on the kismet port. </summary> @@ -36224,7 +36270,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="43988"> +<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="41914"> <summary> Do not audit attempts to receive UDP traffic on the kismet port. </summary> @@ -36235,7 +36281,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kismet_port" lineno="44007"> +<interface name="corenet_udp_sendrecv_kismet_port" lineno="41929"> <summary> Send and receive UDP traffic on the kismet port. </summary> @@ -36246,7 +36292,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="44024"> +<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="41945"> <summary> Do not audit attempts to send and receive UDP traffic on the kismet port. @@ -36258,7 +36304,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kismet_port" lineno="44040"> +<interface name="corenet_tcp_bind_kismet_port" lineno="41960"> <summary> Bind TCP sockets to the kismet port. </summary> @@ -36269,7 +36315,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kismet_port" lineno="44060"> +<interface name="corenet_udp_bind_kismet_port" lineno="41980"> <summary> Bind UDP sockets to the kismet port. </summary> @@ -36280,7 +36326,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kismet_port" lineno="44079"> +<interface name="corenet_tcp_connect_kismet_port" lineno="41999"> <summary> Make a TCP connection to the kismet port. </summary> @@ -36290,7 +36336,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kismet_client_packets" lineno="44099"> +<interface name="corenet_send_kismet_client_packets" lineno="42019"> <summary> Send kismet_client packets. </summary> @@ -36301,7 +36347,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="44118"> +<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42038"> <summary> Do not audit attempts to send kismet_client packets. </summary> @@ -36312,7 +36358,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kismet_client_packets" lineno="44137"> +<interface name="corenet_receive_kismet_client_packets" lineno="42057"> <summary> Receive kismet_client packets. </summary> @@ -36323,7 +36369,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="44156"> +<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42076"> <summary> Do not audit attempts to receive kismet_client packets. </summary> @@ -36334,7 +36380,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kismet_client_packets" lineno="44175"> +<interface name="corenet_sendrecv_kismet_client_packets" lineno="42095"> <summary> Send and receive kismet_client packets. </summary> @@ -36345,7 +36391,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="44191"> +<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42111"> <summary> Do not audit attempts to send and receive kismet_client packets. </summary> @@ -36356,7 +36402,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kismet_client_packets" lineno="44206"> +<interface name="corenet_relabelto_kismet_client_packets" lineno="42126"> <summary> Relabel packets to kismet_client the packet type. </summary> @@ -36366,7 +36412,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kismet_server_packets" lineno="44226"> +<interface name="corenet_send_kismet_server_packets" lineno="42146"> <summary> Send kismet_server packets. </summary> @@ -36377,7 +36423,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="44245"> +<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42165"> <summary> Do not audit attempts to send kismet_server packets. </summary> @@ -36388,7 +36434,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kismet_server_packets" lineno="44264"> +<interface name="corenet_receive_kismet_server_packets" lineno="42184"> <summary> Receive kismet_server packets. </summary> @@ -36399,7 +36445,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="44283"> +<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42203"> <summary> Do not audit attempts to receive kismet_server packets. </summary> @@ -36410,7 +36456,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kismet_server_packets" lineno="44302"> +<interface name="corenet_sendrecv_kismet_server_packets" lineno="42222"> <summary> Send and receive kismet_server packets. </summary> @@ -36421,7 +36467,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="44318"> +<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42238"> <summary> Do not audit attempts to send and receive kismet_server packets. </summary> @@ -36432,7 +36478,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kismet_server_packets" lineno="44333"> +<interface name="corenet_relabelto_kismet_server_packets" lineno="42253"> <summary> Relabel packets to kismet_server the packet type. </summary> @@ -36442,7 +36488,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="44355"> +<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42275"> <summary> Send and receive TCP traffic on the kdeconnect port. </summary> @@ -36453,7 +36499,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kdeconnect_port" lineno="44374"> +<interface name="corenet_udp_send_kdeconnect_port" lineno="42290"> <summary> Send UDP traffic on the kdeconnect port. </summary> @@ -36464,7 +36510,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="44393"> +<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42305"> <summary> Do not audit attempts to send UDP traffic on the kdeconnect port. </summary> @@ -36475,7 +36521,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kdeconnect_port" lineno="44412"> +<interface name="corenet_udp_receive_kdeconnect_port" lineno="42320"> <summary> Receive UDP traffic on the kdeconnect port. </summary> @@ -36486,7 +36532,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="44431"> +<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42335"> <summary> Do not audit attempts to receive UDP traffic on the kdeconnect port. </summary> @@ -36497,7 +36543,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="44450"> +<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42350"> <summary> Send and receive UDP traffic on the kdeconnect port. </summary> @@ -36508,7 +36554,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="44467"> +<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42366"> <summary> Do not audit attempts to send and receive UDP traffic on the kdeconnect port. @@ -36520,7 +36566,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kdeconnect_port" lineno="44483"> +<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42381"> <summary> Bind TCP sockets to the kdeconnect port. </summary> @@ -36531,7 +36577,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kdeconnect_port" lineno="44503"> +<interface name="corenet_udp_bind_kdeconnect_port" lineno="42401"> <summary> Bind UDP sockets to the kdeconnect port. </summary> @@ -36542,7 +36588,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kdeconnect_port" lineno="44522"> +<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42420"> <summary> Make a TCP connection to the kdeconnect port. </summary> @@ -36552,7 +36598,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kdeconnect_client_packets" lineno="44542"> +<interface name="corenet_send_kdeconnect_client_packets" lineno="42440"> <summary> Send kdeconnect_client packets. </summary> @@ -36563,7 +36609,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="44561"> +<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42459"> <summary> Do not audit attempts to send kdeconnect_client packets. </summary> @@ -36574,7 +36620,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kdeconnect_client_packets" lineno="44580"> +<interface name="corenet_receive_kdeconnect_client_packets" lineno="42478"> <summary> Receive kdeconnect_client packets. </summary> @@ -36585,7 +36631,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="44599"> +<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42497"> <summary> Do not audit attempts to receive kdeconnect_client packets. </summary> @@ -36596,7 +36642,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="44618"> +<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42516"> <summary> Send and receive kdeconnect_client packets. </summary> @@ -36607,7 +36653,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="44634"> +<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42532"> <summary> Do not audit attempts to send and receive kdeconnect_client packets. </summary> @@ -36618,7 +36664,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="44649"> +<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42547"> <summary> Relabel packets to kdeconnect_client the packet type. </summary> @@ -36628,7 +36674,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kdeconnect_server_packets" lineno="44669"> +<interface name="corenet_send_kdeconnect_server_packets" lineno="42567"> <summary> Send kdeconnect_server packets. </summary> @@ -36639,7 +36685,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="44688"> +<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42586"> <summary> Do not audit attempts to send kdeconnect_server packets. </summary> @@ -36650,7 +36696,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kdeconnect_server_packets" lineno="44707"> +<interface name="corenet_receive_kdeconnect_server_packets" lineno="42605"> <summary> Receive kdeconnect_server packets. </summary> @@ -36661,7 +36707,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="44726"> +<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42624"> <summary> Do not audit attempts to receive kdeconnect_server packets. </summary> @@ -36672,7 +36718,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="44745"> +<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42643"> <summary> Send and receive kdeconnect_server packets. </summary> @@ -36683,7 +36729,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="44761"> +<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42659"> <summary> Do not audit attempts to send and receive kdeconnect_server packets. </summary> @@ -36694,7 +36740,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="44776"> +<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42674"> <summary> Relabel packets to kdeconnect_server the packet type. </summary> @@ -36704,7 +36750,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kprop_port" lineno="44798"> +<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42696"> <summary> Send and receive TCP traffic on the kprop port. </summary> @@ -36715,7 +36761,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kprop_port" lineno="44817"> +<interface name="corenet_udp_send_kprop_port" lineno="42711"> <summary> Send UDP traffic on the kprop port. </summary> @@ -36726,7 +36772,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="44836"> +<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42726"> <summary> Do not audit attempts to send UDP traffic on the kprop port. </summary> @@ -36737,7 +36783,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kprop_port" lineno="44855"> +<interface name="corenet_udp_receive_kprop_port" lineno="42741"> <summary> Receive UDP traffic on the kprop port. </summary> @@ -36748,7 +36794,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="44874"> +<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42756"> <summary> Do not audit attempts to receive UDP traffic on the kprop port. </summary> @@ -36759,7 +36805,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kprop_port" lineno="44893"> +<interface name="corenet_udp_sendrecv_kprop_port" lineno="42771"> <summary> Send and receive UDP traffic on the kprop port. </summary> @@ -36770,7 +36816,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="44910"> +<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42787"> <summary> Do not audit attempts to send and receive UDP traffic on the kprop port. @@ -36782,7 +36828,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kprop_port" lineno="44926"> +<interface name="corenet_tcp_bind_kprop_port" lineno="42802"> <summary> Bind TCP sockets to the kprop port. </summary> @@ -36793,7 +36839,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kprop_port" lineno="44946"> +<interface name="corenet_udp_bind_kprop_port" lineno="42822"> <summary> Bind UDP sockets to the kprop port. </summary> @@ -36804,7 +36850,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kprop_port" lineno="44965"> +<interface name="corenet_tcp_connect_kprop_port" lineno="42841"> <summary> Make a TCP connection to the kprop port. </summary> @@ -36814,7 +36860,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kprop_client_packets" lineno="44985"> +<interface name="corenet_send_kprop_client_packets" lineno="42861"> <summary> Send kprop_client packets. </summary> @@ -36825,7 +36871,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="45004"> +<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="42880"> <summary> Do not audit attempts to send kprop_client packets. </summary> @@ -36836,7 +36882,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kprop_client_packets" lineno="45023"> +<interface name="corenet_receive_kprop_client_packets" lineno="42899"> <summary> Receive kprop_client packets. </summary> @@ -36847,7 +36893,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="45042"> +<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="42918"> <summary> Do not audit attempts to receive kprop_client packets. </summary> @@ -36858,7 +36904,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kprop_client_packets" lineno="45061"> +<interface name="corenet_sendrecv_kprop_client_packets" lineno="42937"> <summary> Send and receive kprop_client packets. </summary> @@ -36869,7 +36915,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="45077"> +<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="42953"> <summary> Do not audit attempts to send and receive kprop_client packets. </summary> @@ -36880,7 +36926,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kprop_client_packets" lineno="45092"> +<interface name="corenet_relabelto_kprop_client_packets" lineno="42968"> <summary> Relabel packets to kprop_client the packet type. </summary> @@ -36890,7 +36936,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kprop_server_packets" lineno="45112"> +<interface name="corenet_send_kprop_server_packets" lineno="42988"> <summary> Send kprop_server packets. </summary> @@ -36901,7 +36947,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="45131"> +<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43007"> <summary> Do not audit attempts to send kprop_server packets. </summary> @@ -36912,7 +36958,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kprop_server_packets" lineno="45150"> +<interface name="corenet_receive_kprop_server_packets" lineno="43026"> <summary> Receive kprop_server packets. </summary> @@ -36923,7 +36969,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="45169"> +<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43045"> <summary> Do not audit attempts to receive kprop_server packets. </summary> @@ -36934,7 +36980,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kprop_server_packets" lineno="45188"> +<interface name="corenet_sendrecv_kprop_server_packets" lineno="43064"> <summary> Send and receive kprop_server packets. </summary> @@ -36945,7 +36991,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="45204"> +<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43080"> <summary> Do not audit attempts to send and receive kprop_server packets. </summary> @@ -36956,7 +37002,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kprop_server_packets" lineno="45219"> +<interface name="corenet_relabelto_kprop_server_packets" lineno="43095"> <summary> Relabel packets to kprop_server the packet type. </summary> @@ -36966,7 +37012,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="45241"> +<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43117"> <summary> Send and receive TCP traffic on the ktalkd port. </summary> @@ -36977,7 +37023,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ktalkd_port" lineno="45260"> +<interface name="corenet_udp_send_ktalkd_port" lineno="43132"> <summary> Send UDP traffic on the ktalkd port. </summary> @@ -36988,7 +37034,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="45279"> +<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43147"> <summary> Do not audit attempts to send UDP traffic on the ktalkd port. </summary> @@ -36999,7 +37045,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ktalkd_port" lineno="45298"> +<interface name="corenet_udp_receive_ktalkd_port" lineno="43162"> <summary> Receive UDP traffic on the ktalkd port. </summary> @@ -37010,7 +37056,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="45317"> +<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43177"> <summary> Do not audit attempts to receive UDP traffic on the ktalkd port. </summary> @@ -37021,7 +37067,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="45336"> +<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43192"> <summary> Send and receive UDP traffic on the ktalkd port. </summary> @@ -37032,7 +37078,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="45353"> +<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43208"> <summary> Do not audit attempts to send and receive UDP traffic on the ktalkd port. @@ -37044,7 +37090,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ktalkd_port" lineno="45369"> +<interface name="corenet_tcp_bind_ktalkd_port" lineno="43223"> <summary> Bind TCP sockets to the ktalkd port. </summary> @@ -37055,7 +37101,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ktalkd_port" lineno="45389"> +<interface name="corenet_udp_bind_ktalkd_port" lineno="43243"> <summary> Bind UDP sockets to the ktalkd port. </summary> @@ -37066,7 +37112,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ktalkd_port" lineno="45408"> +<interface name="corenet_tcp_connect_ktalkd_port" lineno="43262"> <summary> Make a TCP connection to the ktalkd port. </summary> @@ -37076,7 +37122,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ktalkd_client_packets" lineno="45428"> +<interface name="corenet_send_ktalkd_client_packets" lineno="43282"> <summary> Send ktalkd_client packets. </summary> @@ -37087,7 +37133,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="45447"> +<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43301"> <summary> Do not audit attempts to send ktalkd_client packets. </summary> @@ -37098,7 +37144,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ktalkd_client_packets" lineno="45466"> +<interface name="corenet_receive_ktalkd_client_packets" lineno="43320"> <summary> Receive ktalkd_client packets. </summary> @@ -37109,7 +37155,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="45485"> +<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43339"> <summary> Do not audit attempts to receive ktalkd_client packets. </summary> @@ -37120,7 +37166,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="45504"> +<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43358"> <summary> Send and receive ktalkd_client packets. </summary> @@ -37131,7 +37177,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="45520"> +<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43374"> <summary> Do not audit attempts to send and receive ktalkd_client packets. </summary> @@ -37142,7 +37188,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ktalkd_client_packets" lineno="45535"> +<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43389"> <summary> Relabel packets to ktalkd_client the packet type. </summary> @@ -37152,7 +37198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ktalkd_server_packets" lineno="45555"> +<interface name="corenet_send_ktalkd_server_packets" lineno="43409"> <summary> Send ktalkd_server packets. </summary> @@ -37163,7 +37209,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="45574"> +<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43428"> <summary> Do not audit attempts to send ktalkd_server packets. </summary> @@ -37174,7 +37220,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ktalkd_server_packets" lineno="45593"> +<interface name="corenet_receive_ktalkd_server_packets" lineno="43447"> <summary> Receive ktalkd_server packets. </summary> @@ -37185,7 +37231,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="45612"> +<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43466"> <summary> Do not audit attempts to receive ktalkd_server packets. </summary> @@ -37196,7 +37242,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="45631"> +<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43485"> <summary> Send and receive ktalkd_server packets. </summary> @@ -37207,7 +37253,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="45647"> +<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43501"> <summary> Do not audit attempts to send and receive ktalkd_server packets. </summary> @@ -37218,7 +37264,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ktalkd_server_packets" lineno="45662"> +<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43516"> <summary> Relabel packets to ktalkd_server the packet type. </summary> @@ -37228,7 +37274,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="45684"> +<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43538"> <summary> Send and receive TCP traffic on the l2tp port. </summary> @@ -37239,7 +37285,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_l2tp_port" lineno="45703"> +<interface name="corenet_udp_send_l2tp_port" lineno="43553"> <summary> Send UDP traffic on the l2tp port. </summary> @@ -37250,7 +37296,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="45722"> +<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43568"> <summary> Do not audit attempts to send UDP traffic on the l2tp port. </summary> @@ -37261,7 +37307,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_l2tp_port" lineno="45741"> +<interface name="corenet_udp_receive_l2tp_port" lineno="43583"> <summary> Receive UDP traffic on the l2tp port. </summary> @@ -37272,7 +37318,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="45760"> +<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43598"> <summary> Do not audit attempts to receive UDP traffic on the l2tp port. </summary> @@ -37283,7 +37329,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_l2tp_port" lineno="45779"> +<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43613"> <summary> Send and receive UDP traffic on the l2tp port. </summary> @@ -37294,7 +37340,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="45796"> +<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43629"> <summary> Do not audit attempts to send and receive UDP traffic on the l2tp port. @@ -37306,7 +37352,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_l2tp_port" lineno="45812"> +<interface name="corenet_tcp_bind_l2tp_port" lineno="43644"> <summary> Bind TCP sockets to the l2tp port. </summary> @@ -37317,7 +37363,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_l2tp_port" lineno="45832"> +<interface name="corenet_udp_bind_l2tp_port" lineno="43664"> <summary> Bind UDP sockets to the l2tp port. </summary> @@ -37328,7 +37374,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_l2tp_port" lineno="45851"> +<interface name="corenet_tcp_connect_l2tp_port" lineno="43683"> <summary> Make a TCP connection to the l2tp port. </summary> @@ -37338,7 +37384,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_l2tp_client_packets" lineno="45871"> +<interface name="corenet_send_l2tp_client_packets" lineno="43703"> <summary> Send l2tp_client packets. </summary> @@ -37349,7 +37395,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="45890"> +<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43722"> <summary> Do not audit attempts to send l2tp_client packets. </summary> @@ -37360,7 +37406,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_l2tp_client_packets" lineno="45909"> +<interface name="corenet_receive_l2tp_client_packets" lineno="43741"> <summary> Receive l2tp_client packets. </summary> @@ -37371,7 +37417,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="45928"> +<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43760"> <summary> Do not audit attempts to receive l2tp_client packets. </summary> @@ -37382,7 +37428,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_l2tp_client_packets" lineno="45947"> +<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43779"> <summary> Send and receive l2tp_client packets. </summary> @@ -37393,7 +37439,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="45963"> +<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43795"> <summary> Do not audit attempts to send and receive l2tp_client packets. </summary> @@ -37404,7 +37450,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_l2tp_client_packets" lineno="45978"> +<interface name="corenet_relabelto_l2tp_client_packets" lineno="43810"> <summary> Relabel packets to l2tp_client the packet type. </summary> @@ -37414,7 +37460,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_l2tp_server_packets" lineno="45998"> +<interface name="corenet_send_l2tp_server_packets" lineno="43830"> <summary> Send l2tp_server packets. </summary> @@ -37425,7 +37471,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="46017"> +<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43849"> <summary> Do not audit attempts to send l2tp_server packets. </summary> @@ -37436,7 +37482,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_l2tp_server_packets" lineno="46036"> +<interface name="corenet_receive_l2tp_server_packets" lineno="43868"> <summary> Receive l2tp_server packets. </summary> @@ -37447,7 +37493,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="46055"> +<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="43887"> <summary> Do not audit attempts to receive l2tp_server packets. </summary> @@ -37458,7 +37504,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_l2tp_server_packets" lineno="46074"> +<interface name="corenet_sendrecv_l2tp_server_packets" lineno="43906"> <summary> Send and receive l2tp_server packets. </summary> @@ -37469,7 +37515,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="46090"> +<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="43922"> <summary> Do not audit attempts to send and receive l2tp_server packets. </summary> @@ -37480,7 +37526,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_l2tp_server_packets" lineno="46105"> +<interface name="corenet_relabelto_l2tp_server_packets" lineno="43937"> <summary> Relabel packets to l2tp_server the packet type. </summary> @@ -37490,7 +37536,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ldap_port" lineno="46127"> +<interface name="corenet_tcp_sendrecv_ldap_port" lineno="43959"> <summary> Send and receive TCP traffic on the ldap port. </summary> @@ -37501,7 +37547,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ldap_port" lineno="46146"> +<interface name="corenet_udp_send_ldap_port" lineno="43974"> <summary> Send UDP traffic on the ldap port. </summary> @@ -37512,7 +37558,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="46165"> +<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="43989"> <summary> Do not audit attempts to send UDP traffic on the ldap port. </summary> @@ -37523,7 +37569,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ldap_port" lineno="46184"> +<interface name="corenet_udp_receive_ldap_port" lineno="44004"> <summary> Receive UDP traffic on the ldap port. </summary> @@ -37534,7 +37580,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="46203"> +<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44019"> <summary> Do not audit attempts to receive UDP traffic on the ldap port. </summary> @@ -37545,7 +37591,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ldap_port" lineno="46222"> +<interface name="corenet_udp_sendrecv_ldap_port" lineno="44034"> <summary> Send and receive UDP traffic on the ldap port. </summary> @@ -37556,7 +37602,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="46239"> +<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44050"> <summary> Do not audit attempts to send and receive UDP traffic on the ldap port. @@ -37568,7 +37614,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ldap_port" lineno="46255"> +<interface name="corenet_tcp_bind_ldap_port" lineno="44065"> <summary> Bind TCP sockets to the ldap port. </summary> @@ -37579,7 +37625,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ldap_port" lineno="46275"> +<interface name="corenet_udp_bind_ldap_port" lineno="44085"> <summary> Bind UDP sockets to the ldap port. </summary> @@ -37590,7 +37636,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ldap_port" lineno="46294"> +<interface name="corenet_tcp_connect_ldap_port" lineno="44104"> <summary> Make a TCP connection to the ldap port. </summary> @@ -37600,7 +37646,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ldap_client_packets" lineno="46314"> +<interface name="corenet_send_ldap_client_packets" lineno="44124"> <summary> Send ldap_client packets. </summary> @@ -37611,7 +37657,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="46333"> +<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44143"> <summary> Do not audit attempts to send ldap_client packets. </summary> @@ -37622,7 +37668,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ldap_client_packets" lineno="46352"> +<interface name="corenet_receive_ldap_client_packets" lineno="44162"> <summary> Receive ldap_client packets. </summary> @@ -37633,7 +37679,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="46371"> +<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44181"> <summary> Do not audit attempts to receive ldap_client packets. </summary> @@ -37644,7 +37690,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ldap_client_packets" lineno="46390"> +<interface name="corenet_sendrecv_ldap_client_packets" lineno="44200"> <summary> Send and receive ldap_client packets. </summary> @@ -37655,7 +37701,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="46406"> +<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44216"> <summary> Do not audit attempts to send and receive ldap_client packets. </summary> @@ -37666,7 +37712,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ldap_client_packets" lineno="46421"> +<interface name="corenet_relabelto_ldap_client_packets" lineno="44231"> <summary> Relabel packets to ldap_client the packet type. </summary> @@ -37676,7 +37722,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ldap_server_packets" lineno="46441"> +<interface name="corenet_send_ldap_server_packets" lineno="44251"> <summary> Send ldap_server packets. </summary> @@ -37687,7 +37733,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="46460"> +<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44270"> <summary> Do not audit attempts to send ldap_server packets. </summary> @@ -37698,7 +37744,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ldap_server_packets" lineno="46479"> +<interface name="corenet_receive_ldap_server_packets" lineno="44289"> <summary> Receive ldap_server packets. </summary> @@ -37709,7 +37755,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="46498"> +<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44308"> <summary> Do not audit attempts to receive ldap_server packets. </summary> @@ -37720,7 +37766,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ldap_server_packets" lineno="46517"> +<interface name="corenet_sendrecv_ldap_server_packets" lineno="44327"> <summary> Send and receive ldap_server packets. </summary> @@ -37731,7 +37777,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="46533"> +<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44343"> <summary> Do not audit attempts to send and receive ldap_server packets. </summary> @@ -37742,7 +37788,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ldap_server_packets" lineno="46548"> +<interface name="corenet_relabelto_ldap_server_packets" lineno="44358"> <summary> Relabel packets to ldap_server the packet type. </summary> @@ -37752,7 +37798,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lirc_port" lineno="46570"> +<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44380"> <summary> Send and receive TCP traffic on the lirc port. </summary> @@ -37763,7 +37809,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_lirc_port" lineno="46589"> +<interface name="corenet_udp_send_lirc_port" lineno="44395"> <summary> Send UDP traffic on the lirc port. </summary> @@ -37774,7 +37820,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="46608"> +<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44410"> <summary> Do not audit attempts to send UDP traffic on the lirc port. </summary> @@ -37785,7 +37831,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_lirc_port" lineno="46627"> +<interface name="corenet_udp_receive_lirc_port" lineno="44425"> <summary> Receive UDP traffic on the lirc port. </summary> @@ -37796,7 +37842,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="46646"> +<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44440"> <summary> Do not audit attempts to receive UDP traffic on the lirc port. </summary> @@ -37807,7 +37853,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_lirc_port" lineno="46665"> +<interface name="corenet_udp_sendrecv_lirc_port" lineno="44455"> <summary> Send and receive UDP traffic on the lirc port. </summary> @@ -37818,7 +37864,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="46682"> +<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44471"> <summary> Do not audit attempts to send and receive UDP traffic on the lirc port. @@ -37830,7 +37876,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_lirc_port" lineno="46698"> +<interface name="corenet_tcp_bind_lirc_port" lineno="44486"> <summary> Bind TCP sockets to the lirc port. </summary> @@ -37841,7 +37887,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_lirc_port" lineno="46718"> +<interface name="corenet_udp_bind_lirc_port" lineno="44506"> <summary> Bind UDP sockets to the lirc port. </summary> @@ -37852,7 +37898,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_lirc_port" lineno="46737"> +<interface name="corenet_tcp_connect_lirc_port" lineno="44525"> <summary> Make a TCP connection to the lirc port. </summary> @@ -37862,7 +37908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lirc_client_packets" lineno="46757"> +<interface name="corenet_send_lirc_client_packets" lineno="44545"> <summary> Send lirc_client packets. </summary> @@ -37873,7 +37919,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="46776"> +<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44564"> <summary> Do not audit attempts to send lirc_client packets. </summary> @@ -37884,7 +37930,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lirc_client_packets" lineno="46795"> +<interface name="corenet_receive_lirc_client_packets" lineno="44583"> <summary> Receive lirc_client packets. </summary> @@ -37895,7 +37941,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="46814"> +<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44602"> <summary> Do not audit attempts to receive lirc_client packets. </summary> @@ -37906,7 +37952,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lirc_client_packets" lineno="46833"> +<interface name="corenet_sendrecv_lirc_client_packets" lineno="44621"> <summary> Send and receive lirc_client packets. </summary> @@ -37917,7 +37963,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="46849"> +<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44637"> <summary> Do not audit attempts to send and receive lirc_client packets. </summary> @@ -37928,7 +37974,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lirc_client_packets" lineno="46864"> +<interface name="corenet_relabelto_lirc_client_packets" lineno="44652"> <summary> Relabel packets to lirc_client the packet type. </summary> @@ -37938,7 +37984,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lirc_server_packets" lineno="46884"> +<interface name="corenet_send_lirc_server_packets" lineno="44672"> <summary> Send lirc_server packets. </summary> @@ -37949,7 +37995,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="46903"> +<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44691"> <summary> Do not audit attempts to send lirc_server packets. </summary> @@ -37960,7 +38006,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lirc_server_packets" lineno="46922"> +<interface name="corenet_receive_lirc_server_packets" lineno="44710"> <summary> Receive lirc_server packets. </summary> @@ -37971,7 +38017,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="46941"> +<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44729"> <summary> Do not audit attempts to receive lirc_server packets. </summary> @@ -37982,7 +38028,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lirc_server_packets" lineno="46960"> +<interface name="corenet_sendrecv_lirc_server_packets" lineno="44748"> <summary> Send and receive lirc_server packets. </summary> @@ -37993,7 +38039,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="46976"> +<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44764"> <summary> Do not audit attempts to send and receive lirc_server packets. </summary> @@ -38004,7 +38050,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lirc_server_packets" lineno="46991"> +<interface name="corenet_relabelto_lirc_server_packets" lineno="44779"> <summary> Relabel packets to lirc_server the packet type. </summary> @@ -38014,7 +38060,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="47013"> +<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44801"> <summary> Send and receive TCP traffic on the llmnr port. </summary> @@ -38025,7 +38071,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_llmnr_port" lineno="47032"> +<interface name="corenet_udp_send_llmnr_port" lineno="44816"> <summary> Send UDP traffic on the llmnr port. </summary> @@ -38036,7 +38082,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="47051"> +<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44831"> <summary> Do not audit attempts to send UDP traffic on the llmnr port. </summary> @@ -38047,7 +38093,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_llmnr_port" lineno="47070"> +<interface name="corenet_udp_receive_llmnr_port" lineno="44846"> <summary> Receive UDP traffic on the llmnr port. </summary> @@ -38058,7 +38104,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="47089"> +<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44861"> <summary> Do not audit attempts to receive UDP traffic on the llmnr port. </summary> @@ -38069,7 +38115,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_llmnr_port" lineno="47108"> +<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44876"> <summary> Send and receive UDP traffic on the llmnr port. </summary> @@ -38080,7 +38126,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="47125"> +<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="44892"> <summary> Do not audit attempts to send and receive UDP traffic on the llmnr port. @@ -38092,7 +38138,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_llmnr_port" lineno="47141"> +<interface name="corenet_tcp_bind_llmnr_port" lineno="44907"> <summary> Bind TCP sockets to the llmnr port. </summary> @@ -38103,7 +38149,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_llmnr_port" lineno="47161"> +<interface name="corenet_udp_bind_llmnr_port" lineno="44927"> <summary> Bind UDP sockets to the llmnr port. </summary> @@ -38114,7 +38160,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_llmnr_port" lineno="47180"> +<interface name="corenet_tcp_connect_llmnr_port" lineno="44946"> <summary> Make a TCP connection to the llmnr port. </summary> @@ -38124,7 +38170,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_llmnr_client_packets" lineno="47200"> +<interface name="corenet_send_llmnr_client_packets" lineno="44966"> <summary> Send llmnr_client packets. </summary> @@ -38135,7 +38181,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="47219"> +<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="44985"> <summary> Do not audit attempts to send llmnr_client packets. </summary> @@ -38146,7 +38192,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_llmnr_client_packets" lineno="47238"> +<interface name="corenet_receive_llmnr_client_packets" lineno="45004"> <summary> Receive llmnr_client packets. </summary> @@ -38157,7 +38203,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="47257"> +<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45023"> <summary> Do not audit attempts to receive llmnr_client packets. </summary> @@ -38168,7 +38214,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_llmnr_client_packets" lineno="47276"> +<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45042"> <summary> Send and receive llmnr_client packets. </summary> @@ -38179,7 +38225,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="47292"> +<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45058"> <summary> Do not audit attempts to send and receive llmnr_client packets. </summary> @@ -38190,7 +38236,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_llmnr_client_packets" lineno="47307"> +<interface name="corenet_relabelto_llmnr_client_packets" lineno="45073"> <summary> Relabel packets to llmnr_client the packet type. </summary> @@ -38200,7 +38246,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_llmnr_server_packets" lineno="47327"> +<interface name="corenet_send_llmnr_server_packets" lineno="45093"> <summary> Send llmnr_server packets. </summary> @@ -38211,7 +38257,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="47346"> +<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45112"> <summary> Do not audit attempts to send llmnr_server packets. </summary> @@ -38222,7 +38268,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_llmnr_server_packets" lineno="47365"> +<interface name="corenet_receive_llmnr_server_packets" lineno="45131"> <summary> Receive llmnr_server packets. </summary> @@ -38233,7 +38279,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="47384"> +<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45150"> <summary> Do not audit attempts to receive llmnr_server packets. </summary> @@ -38244,7 +38290,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_llmnr_server_packets" lineno="47403"> +<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45169"> <summary> Send and receive llmnr_server packets. </summary> @@ -38255,7 +38301,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="47419"> +<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45185"> <summary> Do not audit attempts to send and receive llmnr_server packets. </summary> @@ -38266,7 +38312,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_llmnr_server_packets" lineno="47434"> +<interface name="corenet_relabelto_llmnr_server_packets" lineno="45200"> <summary> Relabel packets to llmnr_server the packet type. </summary> @@ -38276,7 +38322,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="47456"> +<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45222"> <summary> Send and receive TCP traffic on the lmtp port. </summary> @@ -38287,7 +38333,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_lmtp_port" lineno="47475"> +<interface name="corenet_udp_send_lmtp_port" lineno="45237"> <summary> Send UDP traffic on the lmtp port. </summary> @@ -38298,7 +38344,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="47494"> +<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45252"> <summary> Do not audit attempts to send UDP traffic on the lmtp port. </summary> @@ -38309,7 +38355,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_lmtp_port" lineno="47513"> +<interface name="corenet_udp_receive_lmtp_port" lineno="45267"> <summary> Receive UDP traffic on the lmtp port. </summary> @@ -38320,7 +38366,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="47532"> +<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45282"> <summary> Do not audit attempts to receive UDP traffic on the lmtp port. </summary> @@ -38331,7 +38377,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_lmtp_port" lineno="47551"> +<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45297"> <summary> Send and receive UDP traffic on the lmtp port. </summary> @@ -38342,7 +38388,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="47568"> +<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45313"> <summary> Do not audit attempts to send and receive UDP traffic on the lmtp port. @@ -38354,7 +38400,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_lmtp_port" lineno="47584"> +<interface name="corenet_tcp_bind_lmtp_port" lineno="45328"> <summary> Bind TCP sockets to the lmtp port. </summary> @@ -38365,7 +38411,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_lmtp_port" lineno="47604"> +<interface name="corenet_udp_bind_lmtp_port" lineno="45348"> <summary> Bind UDP sockets to the lmtp port. </summary> @@ -38376,7 +38422,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_lmtp_port" lineno="47623"> +<interface name="corenet_tcp_connect_lmtp_port" lineno="45367"> <summary> Make a TCP connection to the lmtp port. </summary> @@ -38386,7 +38432,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lmtp_client_packets" lineno="47643"> +<interface name="corenet_send_lmtp_client_packets" lineno="45387"> <summary> Send lmtp_client packets. </summary> @@ -38397,7 +38443,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="47662"> +<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45406"> <summary> Do not audit attempts to send lmtp_client packets. </summary> @@ -38408,7 +38454,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lmtp_client_packets" lineno="47681"> +<interface name="corenet_receive_lmtp_client_packets" lineno="45425"> <summary> Receive lmtp_client packets. </summary> @@ -38419,7 +38465,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="47700"> +<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45444"> <summary> Do not audit attempts to receive lmtp_client packets. </summary> @@ -38430,7 +38476,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lmtp_client_packets" lineno="47719"> +<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45463"> <summary> Send and receive lmtp_client packets. </summary> @@ -38441,7 +38487,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="47735"> +<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45479"> <summary> Do not audit attempts to send and receive lmtp_client packets. </summary> @@ -38452,7 +38498,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lmtp_client_packets" lineno="47750"> +<interface name="corenet_relabelto_lmtp_client_packets" lineno="45494"> <summary> Relabel packets to lmtp_client the packet type. </summary> @@ -38462,7 +38508,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lmtp_server_packets" lineno="47770"> +<interface name="corenet_send_lmtp_server_packets" lineno="45514"> <summary> Send lmtp_server packets. </summary> @@ -38473,7 +38519,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="47789"> +<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45533"> <summary> Do not audit attempts to send lmtp_server packets. </summary> @@ -38484,7 +38530,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lmtp_server_packets" lineno="47808"> +<interface name="corenet_receive_lmtp_server_packets" lineno="45552"> <summary> Receive lmtp_server packets. </summary> @@ -38495,7 +38541,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="47827"> +<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45571"> <summary> Do not audit attempts to receive lmtp_server packets. </summary> @@ -38506,7 +38552,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lmtp_server_packets" lineno="47846"> +<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45590"> <summary> Send and receive lmtp_server packets. </summary> @@ -38517,7 +38563,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="47862"> +<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45606"> <summary> Do not audit attempts to send and receive lmtp_server packets. </summary> @@ -38528,7 +38574,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lmtp_server_packets" lineno="47877"> +<interface name="corenet_relabelto_lmtp_server_packets" lineno="45621"> <summary> Relabel packets to lmtp_server the packet type. </summary> @@ -38538,7 +38584,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="47899"> +<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45643"> <summary> Send and receive TCP traffic on the lrrd port. </summary> @@ -38549,7 +38595,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_lrrd_port" lineno="47918"> +<interface name="corenet_udp_send_lrrd_port" lineno="45658"> <summary> Send UDP traffic on the lrrd port. </summary> @@ -38560,7 +38606,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="47937"> +<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45673"> <summary> Do not audit attempts to send UDP traffic on the lrrd port. </summary> @@ -38571,7 +38617,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_lrrd_port" lineno="47956"> +<interface name="corenet_udp_receive_lrrd_port" lineno="45688"> <summary> Receive UDP traffic on the lrrd port. </summary> @@ -38582,7 +38628,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="47975"> +<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45703"> <summary> Do not audit attempts to receive UDP traffic on the lrrd port. </summary> @@ -38593,7 +38639,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_lrrd_port" lineno="47994"> +<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45718"> <summary> Send and receive UDP traffic on the lrrd port. </summary> @@ -38604,7 +38650,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="48011"> +<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45734"> <summary> Do not audit attempts to send and receive UDP traffic on the lrrd port. @@ -38616,7 +38662,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_lrrd_port" lineno="48027"> +<interface name="corenet_tcp_bind_lrrd_port" lineno="45749"> <summary> Bind TCP sockets to the lrrd port. </summary> @@ -38627,7 +38673,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_lrrd_port" lineno="48047"> +<interface name="corenet_udp_bind_lrrd_port" lineno="45769"> <summary> Bind UDP sockets to the lrrd port. </summary> @@ -38638,7 +38684,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_lrrd_port" lineno="48066"> +<interface name="corenet_tcp_connect_lrrd_port" lineno="45788"> <summary> Make a TCP connection to the lrrd port. </summary> @@ -38648,7 +38694,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lrrd_client_packets" lineno="48086"> +<interface name="corenet_send_lrrd_client_packets" lineno="45808"> <summary> Send lrrd_client packets. </summary> @@ -38659,7 +38705,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="48105"> +<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45827"> <summary> Do not audit attempts to send lrrd_client packets. </summary> @@ -38670,7 +38716,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lrrd_client_packets" lineno="48124"> +<interface name="corenet_receive_lrrd_client_packets" lineno="45846"> <summary> Receive lrrd_client packets. </summary> @@ -38681,7 +38727,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="48143"> +<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45865"> <summary> Do not audit attempts to receive lrrd_client packets. </summary> @@ -38692,7 +38738,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lrrd_client_packets" lineno="48162"> +<interface name="corenet_sendrecv_lrrd_client_packets" lineno="45884"> <summary> Send and receive lrrd_client packets. </summary> @@ -38703,7 +38749,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="48178"> +<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="45900"> <summary> Do not audit attempts to send and receive lrrd_client packets. </summary> @@ -38714,7 +38760,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lrrd_client_packets" lineno="48193"> +<interface name="corenet_relabelto_lrrd_client_packets" lineno="45915"> <summary> Relabel packets to lrrd_client the packet type. </summary> @@ -38724,7 +38770,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lrrd_server_packets" lineno="48213"> +<interface name="corenet_send_lrrd_server_packets" lineno="45935"> <summary> Send lrrd_server packets. </summary> @@ -38735,7 +38781,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="48232"> +<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="45954"> <summary> Do not audit attempts to send lrrd_server packets. </summary> @@ -38746,7 +38792,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lrrd_server_packets" lineno="48251"> +<interface name="corenet_receive_lrrd_server_packets" lineno="45973"> <summary> Receive lrrd_server packets. </summary> @@ -38757,7 +38803,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="48270"> +<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="45992"> <summary> Do not audit attempts to receive lrrd_server packets. </summary> @@ -38768,7 +38814,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lrrd_server_packets" lineno="48289"> +<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46011"> <summary> Send and receive lrrd_server packets. </summary> @@ -38779,7 +38825,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="48305"> +<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46027"> <summary> Do not audit attempts to send and receive lrrd_server packets. </summary> @@ -38790,7 +38836,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lrrd_server_packets" lineno="48320"> +<interface name="corenet_relabelto_lrrd_server_packets" lineno="46042"> <summary> Relabel packets to lrrd_server the packet type. </summary> @@ -38800,7 +38846,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mail_port" lineno="48342"> +<interface name="corenet_tcp_sendrecv_mail_port" lineno="46064"> <summary> Send and receive TCP traffic on the mail port. </summary> @@ -38811,7 +38857,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mail_port" lineno="48361"> +<interface name="corenet_udp_send_mail_port" lineno="46079"> <summary> Send UDP traffic on the mail port. </summary> @@ -38822,7 +38868,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mail_port" lineno="48380"> +<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46094"> <summary> Do not audit attempts to send UDP traffic on the mail port. </summary> @@ -38833,7 +38879,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mail_port" lineno="48399"> +<interface name="corenet_udp_receive_mail_port" lineno="46109"> <summary> Receive UDP traffic on the mail port. </summary> @@ -38844,7 +38890,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="48418"> +<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46124"> <summary> Do not audit attempts to receive UDP traffic on the mail port. </summary> @@ -38855,7 +38901,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mail_port" lineno="48437"> +<interface name="corenet_udp_sendrecv_mail_port" lineno="46139"> <summary> Send and receive UDP traffic on the mail port. </summary> @@ -38866,7 +38912,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="48454"> +<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46155"> <summary> Do not audit attempts to send and receive UDP traffic on the mail port. @@ -38878,7 +38924,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mail_port" lineno="48470"> +<interface name="corenet_tcp_bind_mail_port" lineno="46170"> <summary> Bind TCP sockets to the mail port. </summary> @@ -38889,7 +38935,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mail_port" lineno="48490"> +<interface name="corenet_udp_bind_mail_port" lineno="46190"> <summary> Bind UDP sockets to the mail port. </summary> @@ -38900,7 +38946,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mail_port" lineno="48509"> +<interface name="corenet_tcp_connect_mail_port" lineno="46209"> <summary> Make a TCP connection to the mail port. </summary> @@ -38910,7 +38956,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mail_client_packets" lineno="48529"> +<interface name="corenet_send_mail_client_packets" lineno="46229"> <summary> Send mail_client packets. </summary> @@ -38921,7 +38967,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mail_client_packets" lineno="48548"> +<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46248"> <summary> Do not audit attempts to send mail_client packets. </summary> @@ -38932,7 +38978,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mail_client_packets" lineno="48567"> +<interface name="corenet_receive_mail_client_packets" lineno="46267"> <summary> Receive mail_client packets. </summary> @@ -38943,7 +38989,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="48586"> +<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46286"> <summary> Do not audit attempts to receive mail_client packets. </summary> @@ -38954,7 +39000,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mail_client_packets" lineno="48605"> +<interface name="corenet_sendrecv_mail_client_packets" lineno="46305"> <summary> Send and receive mail_client packets. </summary> @@ -38965,7 +39011,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="48621"> +<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46321"> <summary> Do not audit attempts to send and receive mail_client packets. </summary> @@ -38976,7 +39022,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mail_client_packets" lineno="48636"> +<interface name="corenet_relabelto_mail_client_packets" lineno="46336"> <summary> Relabel packets to mail_client the packet type. </summary> @@ -38986,7 +39032,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mail_server_packets" lineno="48656"> +<interface name="corenet_send_mail_server_packets" lineno="46356"> <summary> Send mail_server packets. </summary> @@ -38997,7 +39043,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mail_server_packets" lineno="48675"> +<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46375"> <summary> Do not audit attempts to send mail_server packets. </summary> @@ -39008,7 +39054,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mail_server_packets" lineno="48694"> +<interface name="corenet_receive_mail_server_packets" lineno="46394"> <summary> Receive mail_server packets. </summary> @@ -39019,7 +39065,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="48713"> +<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46413"> <summary> Do not audit attempts to receive mail_server packets. </summary> @@ -39030,7 +39076,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mail_server_packets" lineno="48732"> +<interface name="corenet_sendrecv_mail_server_packets" lineno="46432"> <summary> Send and receive mail_server packets. </summary> @@ -39041,7 +39087,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="48748"> +<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46448"> <summary> Do not audit attempts to send and receive mail_server packets. </summary> @@ -39052,7 +39098,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mail_server_packets" lineno="48763"> +<interface name="corenet_relabelto_mail_server_packets" lineno="46463"> <summary> Relabel packets to mail_server the packet type. </summary> @@ -39062,7 +39108,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_matahari_port" lineno="48785"> +<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46485"> <summary> Send and receive TCP traffic on the matahari port. </summary> @@ -39073,7 +39119,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_matahari_port" lineno="48804"> +<interface name="corenet_udp_send_matahari_port" lineno="46500"> <summary> Send UDP traffic on the matahari port. </summary> @@ -39084,7 +39130,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="48823"> +<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46515"> <summary> Do not audit attempts to send UDP traffic on the matahari port. </summary> @@ -39095,7 +39141,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_matahari_port" lineno="48842"> +<interface name="corenet_udp_receive_matahari_port" lineno="46530"> <summary> Receive UDP traffic on the matahari port. </summary> @@ -39106,7 +39152,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="48861"> +<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46545"> <summary> Do not audit attempts to receive UDP traffic on the matahari port. </summary> @@ -39117,7 +39163,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_matahari_port" lineno="48880"> +<interface name="corenet_udp_sendrecv_matahari_port" lineno="46560"> <summary> Send and receive UDP traffic on the matahari port. </summary> @@ -39128,7 +39174,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="48897"> +<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46576"> <summary> Do not audit attempts to send and receive UDP traffic on the matahari port. @@ -39140,7 +39186,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_matahari_port" lineno="48913"> +<interface name="corenet_tcp_bind_matahari_port" lineno="46591"> <summary> Bind TCP sockets to the matahari port. </summary> @@ -39151,7 +39197,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_matahari_port" lineno="48933"> +<interface name="corenet_udp_bind_matahari_port" lineno="46611"> <summary> Bind UDP sockets to the matahari port. </summary> @@ -39162,7 +39208,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_matahari_port" lineno="48952"> +<interface name="corenet_tcp_connect_matahari_port" lineno="46630"> <summary> Make a TCP connection to the matahari port. </summary> @@ -39172,7 +39218,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_matahari_client_packets" lineno="48972"> +<interface name="corenet_send_matahari_client_packets" lineno="46650"> <summary> Send matahari_client packets. </summary> @@ -39183,7 +39229,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="48991"> +<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46669"> <summary> Do not audit attempts to send matahari_client packets. </summary> @@ -39194,7 +39240,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_matahari_client_packets" lineno="49010"> +<interface name="corenet_receive_matahari_client_packets" lineno="46688"> <summary> Receive matahari_client packets. </summary> @@ -39205,7 +39251,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="49029"> +<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46707"> <summary> Do not audit attempts to receive matahari_client packets. </summary> @@ -39216,7 +39262,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_matahari_client_packets" lineno="49048"> +<interface name="corenet_sendrecv_matahari_client_packets" lineno="46726"> <summary> Send and receive matahari_client packets. </summary> @@ -39227,7 +39273,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="49064"> +<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46742"> <summary> Do not audit attempts to send and receive matahari_client packets. </summary> @@ -39238,7 +39284,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_matahari_client_packets" lineno="49079"> +<interface name="corenet_relabelto_matahari_client_packets" lineno="46757"> <summary> Relabel packets to matahari_client the packet type. </summary> @@ -39248,7 +39294,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_matahari_server_packets" lineno="49099"> +<interface name="corenet_send_matahari_server_packets" lineno="46777"> <summary> Send matahari_server packets. </summary> @@ -39259,7 +39305,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="49118"> +<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46796"> <summary> Do not audit attempts to send matahari_server packets. </summary> @@ -39270,7 +39316,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_matahari_server_packets" lineno="49137"> +<interface name="corenet_receive_matahari_server_packets" lineno="46815"> <summary> Receive matahari_server packets. </summary> @@ -39281,7 +39327,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="49156"> +<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46834"> <summary> Do not audit attempts to receive matahari_server packets. </summary> @@ -39292,7 +39338,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_matahari_server_packets" lineno="49175"> +<interface name="corenet_sendrecv_matahari_server_packets" lineno="46853"> <summary> Send and receive matahari_server packets. </summary> @@ -39303,7 +39349,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="49191"> +<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46869"> <summary> Do not audit attempts to send and receive matahari_server packets. </summary> @@ -39314,7 +39360,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_matahari_server_packets" lineno="49206"> +<interface name="corenet_relabelto_matahari_server_packets" lineno="46884"> <summary> Relabel packets to matahari_server the packet type. </summary> @@ -39324,7 +39370,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_memcache_port" lineno="49228"> +<interface name="corenet_tcp_sendrecv_memcache_port" lineno="46906"> <summary> Send and receive TCP traffic on the memcache port. </summary> @@ -39335,7 +39381,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_memcache_port" lineno="49247"> +<interface name="corenet_udp_send_memcache_port" lineno="46921"> <summary> Send UDP traffic on the memcache port. </summary> @@ -39346,7 +39392,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="49266"> +<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="46936"> <summary> Do not audit attempts to send UDP traffic on the memcache port. </summary> @@ -39357,7 +39403,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_memcache_port" lineno="49285"> +<interface name="corenet_udp_receive_memcache_port" lineno="46951"> <summary> Receive UDP traffic on the memcache port. </summary> @@ -39368,7 +39414,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="49304"> +<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="46966"> <summary> Do not audit attempts to receive UDP traffic on the memcache port. </summary> @@ -39379,7 +39425,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_memcache_port" lineno="49323"> +<interface name="corenet_udp_sendrecv_memcache_port" lineno="46981"> <summary> Send and receive UDP traffic on the memcache port. </summary> @@ -39390,7 +39436,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="49340"> +<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="46997"> <summary> Do not audit attempts to send and receive UDP traffic on the memcache port. @@ -39402,7 +39448,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_memcache_port" lineno="49356"> +<interface name="corenet_tcp_bind_memcache_port" lineno="47012"> <summary> Bind TCP sockets to the memcache port. </summary> @@ -39413,7 +39459,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_memcache_port" lineno="49376"> +<interface name="corenet_udp_bind_memcache_port" lineno="47032"> <summary> Bind UDP sockets to the memcache port. </summary> @@ -39424,7 +39470,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_memcache_port" lineno="49395"> +<interface name="corenet_tcp_connect_memcache_port" lineno="47051"> <summary> Make a TCP connection to the memcache port. </summary> @@ -39434,7 +39480,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_memcache_client_packets" lineno="49415"> +<interface name="corenet_send_memcache_client_packets" lineno="47071"> <summary> Send memcache_client packets. </summary> @@ -39445,7 +39491,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="49434"> +<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47090"> <summary> Do not audit attempts to send memcache_client packets. </summary> @@ -39456,7 +39502,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_memcache_client_packets" lineno="49453"> +<interface name="corenet_receive_memcache_client_packets" lineno="47109"> <summary> Receive memcache_client packets. </summary> @@ -39467,7 +39513,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="49472"> +<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47128"> <summary> Do not audit attempts to receive memcache_client packets. </summary> @@ -39478,7 +39524,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_memcache_client_packets" lineno="49491"> +<interface name="corenet_sendrecv_memcache_client_packets" lineno="47147"> <summary> Send and receive memcache_client packets. </summary> @@ -39489,7 +39535,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="49507"> +<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47163"> <summary> Do not audit attempts to send and receive memcache_client packets. </summary> @@ -39500,7 +39546,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_memcache_client_packets" lineno="49522"> +<interface name="corenet_relabelto_memcache_client_packets" lineno="47178"> <summary> Relabel packets to memcache_client the packet type. </summary> @@ -39510,7 +39556,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_memcache_server_packets" lineno="49542"> +<interface name="corenet_send_memcache_server_packets" lineno="47198"> <summary> Send memcache_server packets. </summary> @@ -39521,7 +39567,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="49561"> +<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47217"> <summary> Do not audit attempts to send memcache_server packets. </summary> @@ -39532,7 +39578,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_memcache_server_packets" lineno="49580"> +<interface name="corenet_receive_memcache_server_packets" lineno="47236"> <summary> Receive memcache_server packets. </summary> @@ -39543,7 +39589,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="49599"> +<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47255"> <summary> Do not audit attempts to receive memcache_server packets. </summary> @@ -39554,7 +39600,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_memcache_server_packets" lineno="49618"> +<interface name="corenet_sendrecv_memcache_server_packets" lineno="47274"> <summary> Send and receive memcache_server packets. </summary> @@ -39565,7 +39611,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="49634"> +<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47290"> <summary> Do not audit attempts to send and receive memcache_server packets. </summary> @@ -39576,7 +39622,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_memcache_server_packets" lineno="49649"> +<interface name="corenet_relabelto_memcache_server_packets" lineno="47305"> <summary> Relabel packets to memcache_server the packet type. </summary> @@ -39586,7 +39632,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_milter_port" lineno="49671"> +<interface name="corenet_tcp_sendrecv_milter_port" lineno="47327"> <summary> Send and receive TCP traffic on the milter port. </summary> @@ -39597,7 +39643,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_milter_port" lineno="49690"> +<interface name="corenet_udp_send_milter_port" lineno="47342"> <summary> Send UDP traffic on the milter port. </summary> @@ -39608,7 +39654,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_milter_port" lineno="49709"> +<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47357"> <summary> Do not audit attempts to send UDP traffic on the milter port. </summary> @@ -39619,7 +39665,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_milter_port" lineno="49728"> +<interface name="corenet_udp_receive_milter_port" lineno="47372"> <summary> Receive UDP traffic on the milter port. </summary> @@ -39630,7 +39676,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="49747"> +<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47387"> <summary> Do not audit attempts to receive UDP traffic on the milter port. </summary> @@ -39641,7 +39687,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_milter_port" lineno="49766"> +<interface name="corenet_udp_sendrecv_milter_port" lineno="47402"> <summary> Send and receive UDP traffic on the milter port. </summary> @@ -39652,7 +39698,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="49783"> +<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47418"> <summary> Do not audit attempts to send and receive UDP traffic on the milter port. @@ -39664,7 +39710,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_milter_port" lineno="49799"> +<interface name="corenet_tcp_bind_milter_port" lineno="47433"> <summary> Bind TCP sockets to the milter port. </summary> @@ -39675,7 +39721,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_milter_port" lineno="49819"> +<interface name="corenet_udp_bind_milter_port" lineno="47453"> <summary> Bind UDP sockets to the milter port. </summary> @@ -39686,7 +39732,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_milter_port" lineno="49838"> +<interface name="corenet_tcp_connect_milter_port" lineno="47472"> <summary> Make a TCP connection to the milter port. </summary> @@ -39696,7 +39742,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_milter_client_packets" lineno="49858"> +<interface name="corenet_send_milter_client_packets" lineno="47492"> <summary> Send milter_client packets. </summary> @@ -39707,7 +39753,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_milter_client_packets" lineno="49877"> +<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47511"> <summary> Do not audit attempts to send milter_client packets. </summary> @@ -39718,7 +39764,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_milter_client_packets" lineno="49896"> +<interface name="corenet_receive_milter_client_packets" lineno="47530"> <summary> Receive milter_client packets. </summary> @@ -39729,7 +39775,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="49915"> +<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47549"> <summary> Do not audit attempts to receive milter_client packets. </summary> @@ -39740,7 +39786,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_milter_client_packets" lineno="49934"> +<interface name="corenet_sendrecv_milter_client_packets" lineno="47568"> <summary> Send and receive milter_client packets. </summary> @@ -39751,7 +39797,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="49950"> +<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47584"> <summary> Do not audit attempts to send and receive milter_client packets. </summary> @@ -39762,7 +39808,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_milter_client_packets" lineno="49965"> +<interface name="corenet_relabelto_milter_client_packets" lineno="47599"> <summary> Relabel packets to milter_client the packet type. </summary> @@ -39772,7 +39818,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_milter_server_packets" lineno="49985"> +<interface name="corenet_send_milter_server_packets" lineno="47619"> <summary> Send milter_server packets. </summary> @@ -39783,7 +39829,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_milter_server_packets" lineno="50004"> +<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47638"> <summary> Do not audit attempts to send milter_server packets. </summary> @@ -39794,7 +39840,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_milter_server_packets" lineno="50023"> +<interface name="corenet_receive_milter_server_packets" lineno="47657"> <summary> Receive milter_server packets. </summary> @@ -39805,7 +39851,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="50042"> +<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47676"> <summary> Do not audit attempts to receive milter_server packets. </summary> @@ -39816,7 +39862,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_milter_server_packets" lineno="50061"> +<interface name="corenet_sendrecv_milter_server_packets" lineno="47695"> <summary> Send and receive milter_server packets. </summary> @@ -39827,7 +39873,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="50077"> +<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47711"> <summary> Do not audit attempts to send and receive milter_server packets. </summary> @@ -39838,7 +39884,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_milter_server_packets" lineno="50092"> +<interface name="corenet_relabelto_milter_server_packets" lineno="47726"> <summary> Relabel packets to milter_server the packet type. </summary> @@ -39848,7 +39894,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="50114"> +<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47748"> <summary> Send and receive TCP traffic on the mmcc port. </summary> @@ -39859,7 +39905,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mmcc_port" lineno="50133"> +<interface name="corenet_udp_send_mmcc_port" lineno="47763"> <summary> Send UDP traffic on the mmcc port. </summary> @@ -39870,7 +39916,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="50152"> +<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47778"> <summary> Do not audit attempts to send UDP traffic on the mmcc port. </summary> @@ -39881,7 +39927,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mmcc_port" lineno="50171"> +<interface name="corenet_udp_receive_mmcc_port" lineno="47793"> <summary> Receive UDP traffic on the mmcc port. </summary> @@ -39892,7 +39938,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="50190"> +<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47808"> <summary> Do not audit attempts to receive UDP traffic on the mmcc port. </summary> @@ -39903,7 +39949,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mmcc_port" lineno="50209"> +<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47823"> <summary> Send and receive UDP traffic on the mmcc port. </summary> @@ -39914,7 +39960,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="50226"> +<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47839"> <summary> Do not audit attempts to send and receive UDP traffic on the mmcc port. @@ -39926,7 +39972,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mmcc_port" lineno="50242"> +<interface name="corenet_tcp_bind_mmcc_port" lineno="47854"> <summary> Bind TCP sockets to the mmcc port. </summary> @@ -39937,7 +39983,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mmcc_port" lineno="50262"> +<interface name="corenet_udp_bind_mmcc_port" lineno="47874"> <summary> Bind UDP sockets to the mmcc port. </summary> @@ -39948,7 +39994,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mmcc_port" lineno="50281"> +<interface name="corenet_tcp_connect_mmcc_port" lineno="47893"> <summary> Make a TCP connection to the mmcc port. </summary> @@ -39958,7 +40004,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mmcc_client_packets" lineno="50301"> +<interface name="corenet_send_mmcc_client_packets" lineno="47913"> <summary> Send mmcc_client packets. </summary> @@ -39969,7 +40015,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="50320"> +<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="47932"> <summary> Do not audit attempts to send mmcc_client packets. </summary> @@ -39980,7 +40026,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mmcc_client_packets" lineno="50339"> +<interface name="corenet_receive_mmcc_client_packets" lineno="47951"> <summary> Receive mmcc_client packets. </summary> @@ -39991,7 +40037,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="50358"> +<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="47970"> <summary> Do not audit attempts to receive mmcc_client packets. </summary> @@ -40002,7 +40048,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mmcc_client_packets" lineno="50377"> +<interface name="corenet_sendrecv_mmcc_client_packets" lineno="47989"> <summary> Send and receive mmcc_client packets. </summary> @@ -40013,7 +40059,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="50393"> +<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48005"> <summary> Do not audit attempts to send and receive mmcc_client packets. </summary> @@ -40024,7 +40070,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mmcc_client_packets" lineno="50408"> +<interface name="corenet_relabelto_mmcc_client_packets" lineno="48020"> <summary> Relabel packets to mmcc_client the packet type. </summary> @@ -40034,7 +40080,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mmcc_server_packets" lineno="50428"> +<interface name="corenet_send_mmcc_server_packets" lineno="48040"> <summary> Send mmcc_server packets. </summary> @@ -40045,7 +40091,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="50447"> +<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48059"> <summary> Do not audit attempts to send mmcc_server packets. </summary> @@ -40056,7 +40102,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mmcc_server_packets" lineno="50466"> +<interface name="corenet_receive_mmcc_server_packets" lineno="48078"> <summary> Receive mmcc_server packets. </summary> @@ -40067,7 +40113,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="50485"> +<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48097"> <summary> Do not audit attempts to receive mmcc_server packets. </summary> @@ -40078,7 +40124,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mmcc_server_packets" lineno="50504"> +<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48116"> <summary> Send and receive mmcc_server packets. </summary> @@ -40089,7 +40135,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="50520"> +<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48132"> <summary> Do not audit attempts to send and receive mmcc_server packets. </summary> @@ -40100,7 +40146,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mmcc_server_packets" lineno="50535"> +<interface name="corenet_relabelto_mmcc_server_packets" lineno="48147"> <summary> Relabel packets to mmcc_server the packet type. </summary> @@ -40110,7 +40156,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mon_port" lineno="50557"> +<interface name="corenet_tcp_sendrecv_mon_port" lineno="48169"> <summary> Send and receive TCP traffic on the mon port. </summary> @@ -40121,7 +40167,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mon_port" lineno="50576"> +<interface name="corenet_udp_send_mon_port" lineno="48184"> <summary> Send UDP traffic on the mon port. </summary> @@ -40132,7 +40178,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mon_port" lineno="50595"> +<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48199"> <summary> Do not audit attempts to send UDP traffic on the mon port. </summary> @@ -40143,7 +40189,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mon_port" lineno="50614"> +<interface name="corenet_udp_receive_mon_port" lineno="48214"> <summary> Receive UDP traffic on the mon port. </summary> @@ -40154,7 +40200,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="50633"> +<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48229"> <summary> Do not audit attempts to receive UDP traffic on the mon port. </summary> @@ -40165,7 +40211,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mon_port" lineno="50652"> +<interface name="corenet_udp_sendrecv_mon_port" lineno="48244"> <summary> Send and receive UDP traffic on the mon port. </summary> @@ -40176,7 +40222,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="50669"> +<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48260"> <summary> Do not audit attempts to send and receive UDP traffic on the mon port. @@ -40188,7 +40234,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mon_port" lineno="50685"> +<interface name="corenet_tcp_bind_mon_port" lineno="48275"> <summary> Bind TCP sockets to the mon port. </summary> @@ -40199,7 +40245,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mon_port" lineno="50705"> +<interface name="corenet_udp_bind_mon_port" lineno="48295"> <summary> Bind UDP sockets to the mon port. </summary> @@ -40210,7 +40256,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mon_port" lineno="50724"> +<interface name="corenet_tcp_connect_mon_port" lineno="48314"> <summary> Make a TCP connection to the mon port. </summary> @@ -40220,7 +40266,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mon_client_packets" lineno="50744"> +<interface name="corenet_send_mon_client_packets" lineno="48334"> <summary> Send mon_client packets. </summary> @@ -40231,7 +40277,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mon_client_packets" lineno="50763"> +<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48353"> <summary> Do not audit attempts to send mon_client packets. </summary> @@ -40242,7 +40288,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mon_client_packets" lineno="50782"> +<interface name="corenet_receive_mon_client_packets" lineno="48372"> <summary> Receive mon_client packets. </summary> @@ -40253,7 +40299,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="50801"> +<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48391"> <summary> Do not audit attempts to receive mon_client packets. </summary> @@ -40264,7 +40310,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mon_client_packets" lineno="50820"> +<interface name="corenet_sendrecv_mon_client_packets" lineno="48410"> <summary> Send and receive mon_client packets. </summary> @@ -40275,7 +40321,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="50836"> +<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48426"> <summary> Do not audit attempts to send and receive mon_client packets. </summary> @@ -40286,7 +40332,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mon_client_packets" lineno="50851"> +<interface name="corenet_relabelto_mon_client_packets" lineno="48441"> <summary> Relabel packets to mon_client the packet type. </summary> @@ -40296,7 +40342,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mon_server_packets" lineno="50871"> +<interface name="corenet_send_mon_server_packets" lineno="48461"> <summary> Send mon_server packets. </summary> @@ -40307,7 +40353,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mon_server_packets" lineno="50890"> +<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48480"> <summary> Do not audit attempts to send mon_server packets. </summary> @@ -40318,7 +40364,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mon_server_packets" lineno="50909"> +<interface name="corenet_receive_mon_server_packets" lineno="48499"> <summary> Receive mon_server packets. </summary> @@ -40329,7 +40375,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="50928"> +<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48518"> <summary> Do not audit attempts to receive mon_server packets. </summary> @@ -40340,7 +40386,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mon_server_packets" lineno="50947"> +<interface name="corenet_sendrecv_mon_server_packets" lineno="48537"> <summary> Send and receive mon_server packets. </summary> @@ -40351,7 +40397,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="50963"> +<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48553"> <summary> Do not audit attempts to send and receive mon_server packets. </summary> @@ -40362,7 +40408,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mon_server_packets" lineno="50978"> +<interface name="corenet_relabelto_mon_server_packets" lineno="48568"> <summary> Relabel packets to mon_server the packet type. </summary> @@ -40372,7 +40418,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_monit_port" lineno="51000"> +<interface name="corenet_tcp_sendrecv_monit_port" lineno="48590"> <summary> Send and receive TCP traffic on the monit port. </summary> @@ -40383,7 +40429,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_monit_port" lineno="51019"> +<interface name="corenet_udp_send_monit_port" lineno="48605"> <summary> Send UDP traffic on the monit port. </summary> @@ -40394,7 +40440,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_monit_port" lineno="51038"> +<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48620"> <summary> Do not audit attempts to send UDP traffic on the monit port. </summary> @@ -40405,7 +40451,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_monit_port" lineno="51057"> +<interface name="corenet_udp_receive_monit_port" lineno="48635"> <summary> Receive UDP traffic on the monit port. </summary> @@ -40416,7 +40462,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="51076"> +<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48650"> <summary> Do not audit attempts to receive UDP traffic on the monit port. </summary> @@ -40427,7 +40473,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_monit_port" lineno="51095"> +<interface name="corenet_udp_sendrecv_monit_port" lineno="48665"> <summary> Send and receive UDP traffic on the monit port. </summary> @@ -40438,7 +40484,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="51112"> +<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48681"> <summary> Do not audit attempts to send and receive UDP traffic on the monit port. @@ -40450,7 +40496,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_monit_port" lineno="51128"> +<interface name="corenet_tcp_bind_monit_port" lineno="48696"> <summary> Bind TCP sockets to the monit port. </summary> @@ -40461,7 +40507,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_monit_port" lineno="51148"> +<interface name="corenet_udp_bind_monit_port" lineno="48716"> <summary> Bind UDP sockets to the monit port. </summary> @@ -40472,7 +40518,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_monit_port" lineno="51167"> +<interface name="corenet_tcp_connect_monit_port" lineno="48735"> <summary> Make a TCP connection to the monit port. </summary> @@ -40482,7 +40528,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monit_client_packets" lineno="51187"> +<interface name="corenet_send_monit_client_packets" lineno="48755"> <summary> Send monit_client packets. </summary> @@ -40493,7 +40539,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monit_client_packets" lineno="51206"> +<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48774"> <summary> Do not audit attempts to send monit_client packets. </summary> @@ -40504,7 +40550,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monit_client_packets" lineno="51225"> +<interface name="corenet_receive_monit_client_packets" lineno="48793"> <summary> Receive monit_client packets. </summary> @@ -40515,7 +40561,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="51244"> +<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48812"> <summary> Do not audit attempts to receive monit_client packets. </summary> @@ -40526,7 +40572,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monit_client_packets" lineno="51263"> +<interface name="corenet_sendrecv_monit_client_packets" lineno="48831"> <summary> Send and receive monit_client packets. </summary> @@ -40537,7 +40583,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="51279"> +<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48847"> <summary> Do not audit attempts to send and receive monit_client packets. </summary> @@ -40548,7 +40594,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monit_client_packets" lineno="51294"> +<interface name="corenet_relabelto_monit_client_packets" lineno="48862"> <summary> Relabel packets to monit_client the packet type. </summary> @@ -40558,7 +40604,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monit_server_packets" lineno="51314"> +<interface name="corenet_send_monit_server_packets" lineno="48882"> <summary> Send monit_server packets. </summary> @@ -40569,7 +40615,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monit_server_packets" lineno="51333"> +<interface name="corenet_dontaudit_send_monit_server_packets" lineno="48901"> <summary> Do not audit attempts to send monit_server packets. </summary> @@ -40580,7 +40626,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monit_server_packets" lineno="51352"> +<interface name="corenet_receive_monit_server_packets" lineno="48920"> <summary> Receive monit_server packets. </summary> @@ -40591,7 +40637,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="51371"> +<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="48939"> <summary> Do not audit attempts to receive monit_server packets. </summary> @@ -40602,7 +40648,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monit_server_packets" lineno="51390"> +<interface name="corenet_sendrecv_monit_server_packets" lineno="48958"> <summary> Send and receive monit_server packets. </summary> @@ -40613,7 +40659,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="51406"> +<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="48974"> <summary> Do not audit attempts to send and receive monit_server packets. </summary> @@ -40624,7 +40670,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monit_server_packets" lineno="51421"> +<interface name="corenet_relabelto_monit_server_packets" lineno="48989"> <summary> Relabel packets to monit_server the packet type. </summary> @@ -40634,7 +40680,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_monopd_port" lineno="51443"> +<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49011"> <summary> Send and receive TCP traffic on the monopd port. </summary> @@ -40645,7 +40691,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_monopd_port" lineno="51462"> +<interface name="corenet_udp_send_monopd_port" lineno="49026"> <summary> Send UDP traffic on the monopd port. </summary> @@ -40656,7 +40702,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="51481"> +<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49041"> <summary> Do not audit attempts to send UDP traffic on the monopd port. </summary> @@ -40667,7 +40713,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_monopd_port" lineno="51500"> +<interface name="corenet_udp_receive_monopd_port" lineno="49056"> <summary> Receive UDP traffic on the monopd port. </summary> @@ -40678,7 +40724,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="51519"> +<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49071"> <summary> Do not audit attempts to receive UDP traffic on the monopd port. </summary> @@ -40689,7 +40735,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_monopd_port" lineno="51538"> +<interface name="corenet_udp_sendrecv_monopd_port" lineno="49086"> <summary> Send and receive UDP traffic on the monopd port. </summary> @@ -40700,7 +40746,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="51555"> +<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49102"> <summary> Do not audit attempts to send and receive UDP traffic on the monopd port. @@ -40712,7 +40758,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_monopd_port" lineno="51571"> +<interface name="corenet_tcp_bind_monopd_port" lineno="49117"> <summary> Bind TCP sockets to the monopd port. </summary> @@ -40723,7 +40769,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_monopd_port" lineno="51591"> +<interface name="corenet_udp_bind_monopd_port" lineno="49137"> <summary> Bind UDP sockets to the monopd port. </summary> @@ -40734,7 +40780,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_monopd_port" lineno="51610"> +<interface name="corenet_tcp_connect_monopd_port" lineno="49156"> <summary> Make a TCP connection to the monopd port. </summary> @@ -40744,7 +40790,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monopd_client_packets" lineno="51630"> +<interface name="corenet_send_monopd_client_packets" lineno="49176"> <summary> Send monopd_client packets. </summary> @@ -40755,7 +40801,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="51649"> +<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49195"> <summary> Do not audit attempts to send monopd_client packets. </summary> @@ -40766,7 +40812,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monopd_client_packets" lineno="51668"> +<interface name="corenet_receive_monopd_client_packets" lineno="49214"> <summary> Receive monopd_client packets. </summary> @@ -40777,7 +40823,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="51687"> +<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49233"> <summary> Do not audit attempts to receive monopd_client packets. </summary> @@ -40788,7 +40834,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monopd_client_packets" lineno="51706"> +<interface name="corenet_sendrecv_monopd_client_packets" lineno="49252"> <summary> Send and receive monopd_client packets. </summary> @@ -40799,7 +40845,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="51722"> +<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49268"> <summary> Do not audit attempts to send and receive monopd_client packets. </summary> @@ -40810,7 +40856,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monopd_client_packets" lineno="51737"> +<interface name="corenet_relabelto_monopd_client_packets" lineno="49283"> <summary> Relabel packets to monopd_client the packet type. </summary> @@ -40820,7 +40866,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monopd_server_packets" lineno="51757"> +<interface name="corenet_send_monopd_server_packets" lineno="49303"> <summary> Send monopd_server packets. </summary> @@ -40831,7 +40877,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="51776"> +<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49322"> <summary> Do not audit attempts to send monopd_server packets. </summary> @@ -40842,7 +40888,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monopd_server_packets" lineno="51795"> +<interface name="corenet_receive_monopd_server_packets" lineno="49341"> <summary> Receive monopd_server packets. </summary> @@ -40853,7 +40899,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="51814"> +<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49360"> <summary> Do not audit attempts to receive monopd_server packets. </summary> @@ -40864,7 +40910,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monopd_server_packets" lineno="51833"> +<interface name="corenet_sendrecv_monopd_server_packets" lineno="49379"> <summary> Send and receive monopd_server packets. </summary> @@ -40875,7 +40921,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="51849"> +<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49395"> <summary> Do not audit attempts to send and receive monopd_server packets. </summary> @@ -40886,7 +40932,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monopd_server_packets" lineno="51864"> +<interface name="corenet_relabelto_monopd_server_packets" lineno="49410"> <summary> Relabel packets to monopd_server the packet type. </summary> @@ -40896,7 +40942,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mountd_port" lineno="51886"> +<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49432"> <summary> Send and receive TCP traffic on the mountd port. </summary> @@ -40907,7 +40953,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mountd_port" lineno="51905"> +<interface name="corenet_udp_send_mountd_port" lineno="49447"> <summary> Send UDP traffic on the mountd port. </summary> @@ -40918,7 +40964,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="51924"> +<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49462"> <summary> Do not audit attempts to send UDP traffic on the mountd port. </summary> @@ -40929,7 +40975,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mountd_port" lineno="51943"> +<interface name="corenet_udp_receive_mountd_port" lineno="49477"> <summary> Receive UDP traffic on the mountd port. </summary> @@ -40940,7 +40986,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="51962"> +<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49492"> <summary> Do not audit attempts to receive UDP traffic on the mountd port. </summary> @@ -40951,7 +40997,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mountd_port" lineno="51981"> +<interface name="corenet_udp_sendrecv_mountd_port" lineno="49507"> <summary> Send and receive UDP traffic on the mountd port. </summary> @@ -40962,7 +41008,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="51998"> +<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49523"> <summary> Do not audit attempts to send and receive UDP traffic on the mountd port. @@ -40974,7 +41020,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mountd_port" lineno="52014"> +<interface name="corenet_tcp_bind_mountd_port" lineno="49538"> <summary> Bind TCP sockets to the mountd port. </summary> @@ -40985,7 +41031,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mountd_port" lineno="52034"> +<interface name="corenet_udp_bind_mountd_port" lineno="49558"> <summary> Bind UDP sockets to the mountd port. </summary> @@ -40996,7 +41042,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mountd_port" lineno="52053"> +<interface name="corenet_tcp_connect_mountd_port" lineno="49577"> <summary> Make a TCP connection to the mountd port. </summary> @@ -41006,7 +41052,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mountd_client_packets" lineno="52073"> +<interface name="corenet_send_mountd_client_packets" lineno="49597"> <summary> Send mountd_client packets. </summary> @@ -41017,7 +41063,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="52092"> +<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49616"> <summary> Do not audit attempts to send mountd_client packets. </summary> @@ -41028,7 +41074,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mountd_client_packets" lineno="52111"> +<interface name="corenet_receive_mountd_client_packets" lineno="49635"> <summary> Receive mountd_client packets. </summary> @@ -41039,7 +41085,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="52130"> +<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49654"> <summary> Do not audit attempts to receive mountd_client packets. </summary> @@ -41050,7 +41096,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mountd_client_packets" lineno="52149"> +<interface name="corenet_sendrecv_mountd_client_packets" lineno="49673"> <summary> Send and receive mountd_client packets. </summary> @@ -41061,7 +41107,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="52165"> +<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49689"> <summary> Do not audit attempts to send and receive mountd_client packets. </summary> @@ -41072,7 +41118,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mountd_client_packets" lineno="52180"> +<interface name="corenet_relabelto_mountd_client_packets" lineno="49704"> <summary> Relabel packets to mountd_client the packet type. </summary> @@ -41082,7 +41128,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mountd_server_packets" lineno="52200"> +<interface name="corenet_send_mountd_server_packets" lineno="49724"> <summary> Send mountd_server packets. </summary> @@ -41093,7 +41139,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="52219"> +<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49743"> <summary> Do not audit attempts to send mountd_server packets. </summary> @@ -41104,7 +41150,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mountd_server_packets" lineno="52238"> +<interface name="corenet_receive_mountd_server_packets" lineno="49762"> <summary> Receive mountd_server packets. </summary> @@ -41115,7 +41161,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="52257"> +<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49781"> <summary> Do not audit attempts to receive mountd_server packets. </summary> @@ -41126,7 +41172,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mountd_server_packets" lineno="52276"> +<interface name="corenet_sendrecv_mountd_server_packets" lineno="49800"> <summary> Send and receive mountd_server packets. </summary> @@ -41137,7 +41183,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="52292"> +<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49816"> <summary> Do not audit attempts to send and receive mountd_server packets. </summary> @@ -41148,7 +41194,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mountd_server_packets" lineno="52307"> +<interface name="corenet_relabelto_mountd_server_packets" lineno="49831"> <summary> Relabel packets to mountd_server the packet type. </summary> @@ -41158,7 +41204,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="52329"> +<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49853"> <summary> Send and receive TCP traffic on the movaz_ssc port. </summary> @@ -41169,7 +41215,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_movaz_ssc_port" lineno="52348"> +<interface name="corenet_udp_send_movaz_ssc_port" lineno="49868"> <summary> Send UDP traffic on the movaz_ssc port. </summary> @@ -41180,7 +41226,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="52367"> +<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="49883"> <summary> Do not audit attempts to send UDP traffic on the movaz_ssc port. </summary> @@ -41191,7 +41237,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_movaz_ssc_port" lineno="52386"> +<interface name="corenet_udp_receive_movaz_ssc_port" lineno="49898"> <summary> Receive UDP traffic on the movaz_ssc port. </summary> @@ -41202,7 +41248,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="52405"> +<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="49913"> <summary> Do not audit attempts to receive UDP traffic on the movaz_ssc port. </summary> @@ -41213,7 +41259,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="52424"> +<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="49928"> <summary> Send and receive UDP traffic on the movaz_ssc port. </summary> @@ -41224,7 +41270,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="52441"> +<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="49944"> <summary> Do not audit attempts to send and receive UDP traffic on the movaz_ssc port. @@ -41236,7 +41282,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="52457"> +<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="49959"> <summary> Bind TCP sockets to the movaz_ssc port. </summary> @@ -41247,7 +41293,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_movaz_ssc_port" lineno="52477"> +<interface name="corenet_udp_bind_movaz_ssc_port" lineno="49979"> <summary> Bind UDP sockets to the movaz_ssc port. </summary> @@ -41258,7 +41304,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="52496"> +<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="49998"> <summary> Make a TCP connection to the movaz_ssc port. </summary> @@ -41268,7 +41314,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_movaz_ssc_client_packets" lineno="52516"> +<interface name="corenet_send_movaz_ssc_client_packets" lineno="50018"> <summary> Send movaz_ssc_client packets. </summary> @@ -41279,7 +41325,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="52535"> +<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50037"> <summary> Do not audit attempts to send movaz_ssc_client packets. </summary> @@ -41290,7 +41336,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_movaz_ssc_client_packets" lineno="52554"> +<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50056"> <summary> Receive movaz_ssc_client packets. </summary> @@ -41301,7 +41347,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="52573"> +<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50075"> <summary> Do not audit attempts to receive movaz_ssc_client packets. </summary> @@ -41312,7 +41358,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="52592"> +<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50094"> <summary> Send and receive movaz_ssc_client packets. </summary> @@ -41323,7 +41369,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="52608"> +<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50110"> <summary> Do not audit attempts to send and receive movaz_ssc_client packets. </summary> @@ -41334,7 +41380,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="52623"> +<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50125"> <summary> Relabel packets to movaz_ssc_client the packet type. </summary> @@ -41344,7 +41390,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_movaz_ssc_server_packets" lineno="52643"> +<interface name="corenet_send_movaz_ssc_server_packets" lineno="50145"> <summary> Send movaz_ssc_server packets. </summary> @@ -41355,7 +41401,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="52662"> +<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50164"> <summary> Do not audit attempts to send movaz_ssc_server packets. </summary> @@ -41366,7 +41412,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_movaz_ssc_server_packets" lineno="52681"> +<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50183"> <summary> Receive movaz_ssc_server packets. </summary> @@ -41377,7 +41423,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="52700"> +<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50202"> <summary> Do not audit attempts to receive movaz_ssc_server packets. </summary> @@ -41388,7 +41434,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="52719"> +<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50221"> <summary> Send and receive movaz_ssc_server packets. </summary> @@ -41399,7 +41445,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="52735"> +<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50237"> <summary> Do not audit attempts to send and receive movaz_ssc_server packets. </summary> @@ -41410,7 +41456,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="52750"> +<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50252"> <summary> Relabel packets to movaz_ssc_server the packet type. </summary> @@ -41420,7 +41466,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mpd_port" lineno="52772"> +<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50274"> <summary> Send and receive TCP traffic on the mpd port. </summary> @@ -41431,7 +41477,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mpd_port" lineno="52791"> +<interface name="corenet_udp_send_mpd_port" lineno="50289"> <summary> Send UDP traffic on the mpd port. </summary> @@ -41442,7 +41488,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="52810"> +<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50304"> <summary> Do not audit attempts to send UDP traffic on the mpd port. </summary> @@ -41453,7 +41499,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mpd_port" lineno="52829"> +<interface name="corenet_udp_receive_mpd_port" lineno="50319"> <summary> Receive UDP traffic on the mpd port. </summary> @@ -41464,7 +41510,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="52848"> +<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50334"> <summary> Do not audit attempts to receive UDP traffic on the mpd port. </summary> @@ -41475,7 +41521,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mpd_port" lineno="52867"> +<interface name="corenet_udp_sendrecv_mpd_port" lineno="50349"> <summary> Send and receive UDP traffic on the mpd port. </summary> @@ -41486,7 +41532,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="52884"> +<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50365"> <summary> Do not audit attempts to send and receive UDP traffic on the mpd port. @@ -41498,7 +41544,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mpd_port" lineno="52900"> +<interface name="corenet_tcp_bind_mpd_port" lineno="50380"> <summary> Bind TCP sockets to the mpd port. </summary> @@ -41509,7 +41555,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mpd_port" lineno="52920"> +<interface name="corenet_udp_bind_mpd_port" lineno="50400"> <summary> Bind UDP sockets to the mpd port. </summary> @@ -41520,7 +41566,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mpd_port" lineno="52939"> +<interface name="corenet_tcp_connect_mpd_port" lineno="50419"> <summary> Make a TCP connection to the mpd port. </summary> @@ -41530,7 +41576,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mpd_client_packets" lineno="52959"> +<interface name="corenet_send_mpd_client_packets" lineno="50439"> <summary> Send mpd_client packets. </summary> @@ -41541,7 +41587,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="52978"> +<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50458"> <summary> Do not audit attempts to send mpd_client packets. </summary> @@ -41552,7 +41598,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mpd_client_packets" lineno="52997"> +<interface name="corenet_receive_mpd_client_packets" lineno="50477"> <summary> Receive mpd_client packets. </summary> @@ -41563,7 +41609,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="53016"> +<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50496"> <summary> Do not audit attempts to receive mpd_client packets. </summary> @@ -41574,7 +41620,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mpd_client_packets" lineno="53035"> +<interface name="corenet_sendrecv_mpd_client_packets" lineno="50515"> <summary> Send and receive mpd_client packets. </summary> @@ -41585,7 +41631,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="53051"> +<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50531"> <summary> Do not audit attempts to send and receive mpd_client packets. </summary> @@ -41596,7 +41642,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mpd_client_packets" lineno="53066"> +<interface name="corenet_relabelto_mpd_client_packets" lineno="50546"> <summary> Relabel packets to mpd_client the packet type. </summary> @@ -41606,7 +41652,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mpd_server_packets" lineno="53086"> +<interface name="corenet_send_mpd_server_packets" lineno="50566"> <summary> Send mpd_server packets. </summary> @@ -41617,7 +41663,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="53105"> +<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50585"> <summary> Do not audit attempts to send mpd_server packets. </summary> @@ -41628,7 +41674,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mpd_server_packets" lineno="53124"> +<interface name="corenet_receive_mpd_server_packets" lineno="50604"> <summary> Receive mpd_server packets. </summary> @@ -41639,7 +41685,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="53143"> +<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50623"> <summary> Do not audit attempts to receive mpd_server packets. </summary> @@ -41650,7 +41696,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mpd_server_packets" lineno="53162"> +<interface name="corenet_sendrecv_mpd_server_packets" lineno="50642"> <summary> Send and receive mpd_server packets. </summary> @@ -41661,7 +41707,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="53178"> +<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50658"> <summary> Do not audit attempts to send and receive mpd_server packets. </summary> @@ -41672,7 +41718,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mpd_server_packets" lineno="53193"> +<interface name="corenet_relabelto_mpd_server_packets" lineno="50673"> <summary> Relabel packets to mpd_server the packet type. </summary> @@ -41682,7 +41728,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="53215"> +<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50695"> <summary> Send and receive TCP traffic on the msgsrvr port. </summary> @@ -41693,7 +41739,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_msgsrvr_port" lineno="53234"> +<interface name="corenet_udp_send_msgsrvr_port" lineno="50710"> <summary> Send UDP traffic on the msgsrvr port. </summary> @@ -41704,7 +41750,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="53253"> +<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50725"> <summary> Do not audit attempts to send UDP traffic on the msgsrvr port. </summary> @@ -41715,7 +41761,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_msgsrvr_port" lineno="53272"> +<interface name="corenet_udp_receive_msgsrvr_port" lineno="50740"> <summary> Receive UDP traffic on the msgsrvr port. </summary> @@ -41726,7 +41772,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="53291"> +<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50755"> <summary> Do not audit attempts to receive UDP traffic on the msgsrvr port. </summary> @@ -41737,7 +41783,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="53310"> +<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50770"> <summary> Send and receive UDP traffic on the msgsrvr port. </summary> @@ -41748,7 +41794,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="53327"> +<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50786"> <summary> Do not audit attempts to send and receive UDP traffic on the msgsrvr port. @@ -41760,7 +41806,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_msgsrvr_port" lineno="53343"> +<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50801"> <summary> Bind TCP sockets to the msgsrvr port. </summary> @@ -41771,7 +41817,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_msgsrvr_port" lineno="53363"> +<interface name="corenet_udp_bind_msgsrvr_port" lineno="50821"> <summary> Bind UDP sockets to the msgsrvr port. </summary> @@ -41782,7 +41828,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_msgsrvr_port" lineno="53382"> +<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50840"> <summary> Make a TCP connection to the msgsrvr port. </summary> @@ -41792,7 +41838,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msgsrvr_client_packets" lineno="53402"> +<interface name="corenet_send_msgsrvr_client_packets" lineno="50860"> <summary> Send msgsrvr_client packets. </summary> @@ -41803,7 +41849,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="53421"> +<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="50879"> <summary> Do not audit attempts to send msgsrvr_client packets. </summary> @@ -41814,7 +41860,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msgsrvr_client_packets" lineno="53440"> +<interface name="corenet_receive_msgsrvr_client_packets" lineno="50898"> <summary> Receive msgsrvr_client packets. </summary> @@ -41825,7 +41871,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="53459"> +<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="50917"> <summary> Do not audit attempts to receive msgsrvr_client packets. </summary> @@ -41836,7 +41882,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="53478"> +<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="50936"> <summary> Send and receive msgsrvr_client packets. </summary> @@ -41847,7 +41893,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="53494"> +<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="50952"> <summary> Do not audit attempts to send and receive msgsrvr_client packets. </summary> @@ -41858,7 +41904,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="53509"> +<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="50967"> <summary> Relabel packets to msgsrvr_client the packet type. </summary> @@ -41868,7 +41914,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msgsrvr_server_packets" lineno="53529"> +<interface name="corenet_send_msgsrvr_server_packets" lineno="50987"> <summary> Send msgsrvr_server packets. </summary> @@ -41879,7 +41925,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="53548"> +<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51006"> <summary> Do not audit attempts to send msgsrvr_server packets. </summary> @@ -41890,7 +41936,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msgsrvr_server_packets" lineno="53567"> +<interface name="corenet_receive_msgsrvr_server_packets" lineno="51025"> <summary> Receive msgsrvr_server packets. </summary> @@ -41901,7 +41947,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="53586"> +<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51044"> <summary> Do not audit attempts to receive msgsrvr_server packets. </summary> @@ -41912,7 +41958,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="53605"> +<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51063"> <summary> Send and receive msgsrvr_server packets. </summary> @@ -41923,7 +41969,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="53621"> +<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51079"> <summary> Do not audit attempts to send and receive msgsrvr_server packets. </summary> @@ -41934,7 +41980,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="53636"> +<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51094"> <summary> Relabel packets to msgsrvr_server the packet type. </summary> @@ -41944,7 +41990,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_msnp_port" lineno="53658"> +<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51116"> <summary> Send and receive TCP traffic on the msnp port. </summary> @@ -41955,7 +42001,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_msnp_port" lineno="53677"> +<interface name="corenet_udp_send_msnp_port" lineno="51131"> <summary> Send UDP traffic on the msnp port. </summary> @@ -41966,7 +42012,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="53696"> +<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51146"> <summary> Do not audit attempts to send UDP traffic on the msnp port. </summary> @@ -41977,7 +42023,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_msnp_port" lineno="53715"> +<interface name="corenet_udp_receive_msnp_port" lineno="51161"> <summary> Receive UDP traffic on the msnp port. </summary> @@ -41988,7 +42034,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="53734"> +<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51176"> <summary> Do not audit attempts to receive UDP traffic on the msnp port. </summary> @@ -41999,7 +42045,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_msnp_port" lineno="53753"> +<interface name="corenet_udp_sendrecv_msnp_port" lineno="51191"> <summary> Send and receive UDP traffic on the msnp port. </summary> @@ -42010,7 +42056,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="53770"> +<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51207"> <summary> Do not audit attempts to send and receive UDP traffic on the msnp port. @@ -42022,7 +42068,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_msnp_port" lineno="53786"> +<interface name="corenet_tcp_bind_msnp_port" lineno="51222"> <summary> Bind TCP sockets to the msnp port. </summary> @@ -42033,7 +42079,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_msnp_port" lineno="53806"> +<interface name="corenet_udp_bind_msnp_port" lineno="51242"> <summary> Bind UDP sockets to the msnp port. </summary> @@ -42044,7 +42090,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_msnp_port" lineno="53825"> +<interface name="corenet_tcp_connect_msnp_port" lineno="51261"> <summary> Make a TCP connection to the msnp port. </summary> @@ -42054,7 +42100,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msnp_client_packets" lineno="53845"> +<interface name="corenet_send_msnp_client_packets" lineno="51281"> <summary> Send msnp_client packets. </summary> @@ -42065,7 +42111,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="53864"> +<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51300"> <summary> Do not audit attempts to send msnp_client packets. </summary> @@ -42076,7 +42122,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msnp_client_packets" lineno="53883"> +<interface name="corenet_receive_msnp_client_packets" lineno="51319"> <summary> Receive msnp_client packets. </summary> @@ -42087,7 +42133,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="53902"> +<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51338"> <summary> Do not audit attempts to receive msnp_client packets. </summary> @@ -42098,7 +42144,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msnp_client_packets" lineno="53921"> +<interface name="corenet_sendrecv_msnp_client_packets" lineno="51357"> <summary> Send and receive msnp_client packets. </summary> @@ -42109,7 +42155,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="53937"> +<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51373"> <summary> Do not audit attempts to send and receive msnp_client packets. </summary> @@ -42120,7 +42166,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msnp_client_packets" lineno="53952"> +<interface name="corenet_relabelto_msnp_client_packets" lineno="51388"> <summary> Relabel packets to msnp_client the packet type. </summary> @@ -42130,7 +42176,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msnp_server_packets" lineno="53972"> +<interface name="corenet_send_msnp_server_packets" lineno="51408"> <summary> Send msnp_server packets. </summary> @@ -42141,7 +42187,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="53991"> +<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51427"> <summary> Do not audit attempts to send msnp_server packets. </summary> @@ -42152,7 +42198,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msnp_server_packets" lineno="54010"> +<interface name="corenet_receive_msnp_server_packets" lineno="51446"> <summary> Receive msnp_server packets. </summary> @@ -42163,7 +42209,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="54029"> +<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51465"> <summary> Do not audit attempts to receive msnp_server packets. </summary> @@ -42174,7 +42220,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msnp_server_packets" lineno="54048"> +<interface name="corenet_sendrecv_msnp_server_packets" lineno="51484"> <summary> Send and receive msnp_server packets. </summary> @@ -42185,7 +42231,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="54064"> +<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51500"> <summary> Do not audit attempts to send and receive msnp_server packets. </summary> @@ -42196,7 +42242,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msnp_server_packets" lineno="54079"> +<interface name="corenet_relabelto_msnp_server_packets" lineno="51515"> <summary> Relabel packets to msnp_server the packet type. </summary> @@ -42206,7 +42252,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mssql_port" lineno="54101"> +<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51537"> <summary> Send and receive TCP traffic on the mssql port. </summary> @@ -42217,7 +42263,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mssql_port" lineno="54120"> +<interface name="corenet_udp_send_mssql_port" lineno="51552"> <summary> Send UDP traffic on the mssql port. </summary> @@ -42228,7 +42274,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="54139"> +<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51567"> <summary> Do not audit attempts to send UDP traffic on the mssql port. </summary> @@ -42239,7 +42285,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mssql_port" lineno="54158"> +<interface name="corenet_udp_receive_mssql_port" lineno="51582"> <summary> Receive UDP traffic on the mssql port. </summary> @@ -42250,7 +42296,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="54177"> +<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51597"> <summary> Do not audit attempts to receive UDP traffic on the mssql port. </summary> @@ -42261,7 +42307,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mssql_port" lineno="54196"> +<interface name="corenet_udp_sendrecv_mssql_port" lineno="51612"> <summary> Send and receive UDP traffic on the mssql port. </summary> @@ -42272,7 +42318,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="54213"> +<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51628"> <summary> Do not audit attempts to send and receive UDP traffic on the mssql port. @@ -42284,7 +42330,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mssql_port" lineno="54229"> +<interface name="corenet_tcp_bind_mssql_port" lineno="51643"> <summary> Bind TCP sockets to the mssql port. </summary> @@ -42295,7 +42341,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mssql_port" lineno="54249"> +<interface name="corenet_udp_bind_mssql_port" lineno="51663"> <summary> Bind UDP sockets to the mssql port. </summary> @@ -42306,7 +42352,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mssql_port" lineno="54268"> +<interface name="corenet_tcp_connect_mssql_port" lineno="51682"> <summary> Make a TCP connection to the mssql port. </summary> @@ -42316,7 +42362,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mssql_client_packets" lineno="54288"> +<interface name="corenet_send_mssql_client_packets" lineno="51702"> <summary> Send mssql_client packets. </summary> @@ -42327,7 +42373,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="54307"> +<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51721"> <summary> Do not audit attempts to send mssql_client packets. </summary> @@ -42338,7 +42384,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mssql_client_packets" lineno="54326"> +<interface name="corenet_receive_mssql_client_packets" lineno="51740"> <summary> Receive mssql_client packets. </summary> @@ -42349,7 +42395,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="54345"> +<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51759"> <summary> Do not audit attempts to receive mssql_client packets. </summary> @@ -42360,7 +42406,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mssql_client_packets" lineno="54364"> +<interface name="corenet_sendrecv_mssql_client_packets" lineno="51778"> <summary> Send and receive mssql_client packets. </summary> @@ -42371,7 +42417,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="54380"> +<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51794"> <summary> Do not audit attempts to send and receive mssql_client packets. </summary> @@ -42382,7 +42428,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mssql_client_packets" lineno="54395"> +<interface name="corenet_relabelto_mssql_client_packets" lineno="51809"> <summary> Relabel packets to mssql_client the packet type. </summary> @@ -42392,7 +42438,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mssql_server_packets" lineno="54415"> +<interface name="corenet_send_mssql_server_packets" lineno="51829"> <summary> Send mssql_server packets. </summary> @@ -42403,7 +42449,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="54434"> +<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51848"> <summary> Do not audit attempts to send mssql_server packets. </summary> @@ -42414,7 +42460,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mssql_server_packets" lineno="54453"> +<interface name="corenet_receive_mssql_server_packets" lineno="51867"> <summary> Receive mssql_server packets. </summary> @@ -42425,7 +42471,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="54472"> +<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="51886"> <summary> Do not audit attempts to receive mssql_server packets. </summary> @@ -42436,7 +42482,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mssql_server_packets" lineno="54491"> +<interface name="corenet_sendrecv_mssql_server_packets" lineno="51905"> <summary> Send and receive mssql_server packets. </summary> @@ -42447,7 +42493,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="54507"> +<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="51921"> <summary> Do not audit attempts to send and receive mssql_server packets. </summary> @@ -42458,7 +42504,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mssql_server_packets" lineno="54522"> +<interface name="corenet_relabelto_mssql_server_packets" lineno="51936"> <summary> Relabel packets to mssql_server the packet type. </summary> @@ -42468,7 +42514,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="54544"> +<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="51958"> <summary> Send and receive TCP traffic on the ms_streaming port. </summary> @@ -42479,7 +42525,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ms_streaming_port" lineno="54563"> +<interface name="corenet_udp_send_ms_streaming_port" lineno="51973"> <summary> Send UDP traffic on the ms_streaming port. </summary> @@ -42490,7 +42536,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="54582"> +<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="51988"> <summary> Do not audit attempts to send UDP traffic on the ms_streaming port. </summary> @@ -42501,7 +42547,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ms_streaming_port" lineno="54601"> +<interface name="corenet_udp_receive_ms_streaming_port" lineno="52003"> <summary> Receive UDP traffic on the ms_streaming port. </summary> @@ -42512,7 +42558,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="54620"> +<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52018"> <summary> Do not audit attempts to receive UDP traffic on the ms_streaming port. </summary> @@ -42523,7 +42569,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="54639"> +<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52033"> <summary> Send and receive UDP traffic on the ms_streaming port. </summary> @@ -42534,7 +42580,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="54656"> +<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52049"> <summary> Do not audit attempts to send and receive UDP traffic on the ms_streaming port. @@ -42546,7 +42592,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ms_streaming_port" lineno="54672"> +<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52064"> <summary> Bind TCP sockets to the ms_streaming port. </summary> @@ -42557,7 +42603,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ms_streaming_port" lineno="54692"> +<interface name="corenet_udp_bind_ms_streaming_port" lineno="52084"> <summary> Bind UDP sockets to the ms_streaming port. </summary> @@ -42568,7 +42614,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ms_streaming_port" lineno="54711"> +<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52103"> <summary> Make a TCP connection to the ms_streaming port. </summary> @@ -42578,7 +42624,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ms_streaming_client_packets" lineno="54731"> +<interface name="corenet_send_ms_streaming_client_packets" lineno="52123"> <summary> Send ms_streaming_client packets. </summary> @@ -42589,7 +42635,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="54750"> +<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52142"> <summary> Do not audit attempts to send ms_streaming_client packets. </summary> @@ -42600,7 +42646,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ms_streaming_client_packets" lineno="54769"> +<interface name="corenet_receive_ms_streaming_client_packets" lineno="52161"> <summary> Receive ms_streaming_client packets. </summary> @@ -42611,7 +42657,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="54788"> +<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52180"> <summary> Do not audit attempts to receive ms_streaming_client packets. </summary> @@ -42622,7 +42668,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="54807"> +<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52199"> <summary> Send and receive ms_streaming_client packets. </summary> @@ -42633,7 +42679,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="54823"> +<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52215"> <summary> Do not audit attempts to send and receive ms_streaming_client packets. </summary> @@ -42644,7 +42690,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="54838"> +<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52230"> <summary> Relabel packets to ms_streaming_client the packet type. </summary> @@ -42654,7 +42700,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ms_streaming_server_packets" lineno="54858"> +<interface name="corenet_send_ms_streaming_server_packets" lineno="52250"> <summary> Send ms_streaming_server packets. </summary> @@ -42665,7 +42711,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="54877"> +<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52269"> <summary> Do not audit attempts to send ms_streaming_server packets. </summary> @@ -42676,7 +42722,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ms_streaming_server_packets" lineno="54896"> +<interface name="corenet_receive_ms_streaming_server_packets" lineno="52288"> <summary> Receive ms_streaming_server packets. </summary> @@ -42687,7 +42733,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="54915"> +<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52307"> <summary> Do not audit attempts to receive ms_streaming_server packets. </summary> @@ -42698,7 +42744,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="54934"> +<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52326"> <summary> Send and receive ms_streaming_server packets. </summary> @@ -42709,7 +42755,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="54950"> +<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52342"> <summary> Do not audit attempts to send and receive ms_streaming_server packets. </summary> @@ -42720,7 +42766,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="54965"> +<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52357"> <summary> Relabel packets to ms_streaming_server the packet type. </summary> @@ -42730,7 +42776,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_munin_port" lineno="54987"> +<interface name="corenet_tcp_sendrecv_munin_port" lineno="52379"> <summary> Send and receive TCP traffic on the munin port. </summary> @@ -42741,7 +42787,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_munin_port" lineno="55006"> +<interface name="corenet_udp_send_munin_port" lineno="52394"> <summary> Send UDP traffic on the munin port. </summary> @@ -42752,7 +42798,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_munin_port" lineno="55025"> +<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52409"> <summary> Do not audit attempts to send UDP traffic on the munin port. </summary> @@ -42763,7 +42809,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_munin_port" lineno="55044"> +<interface name="corenet_udp_receive_munin_port" lineno="52424"> <summary> Receive UDP traffic on the munin port. </summary> @@ -42774,7 +42820,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="55063"> +<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52439"> <summary> Do not audit attempts to receive UDP traffic on the munin port. </summary> @@ -42785,7 +42831,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_munin_port" lineno="55082"> +<interface name="corenet_udp_sendrecv_munin_port" lineno="52454"> <summary> Send and receive UDP traffic on the munin port. </summary> @@ -42796,7 +42842,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="55099"> +<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52470"> <summary> Do not audit attempts to send and receive UDP traffic on the munin port. @@ -42808,7 +42854,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_munin_port" lineno="55115"> +<interface name="corenet_tcp_bind_munin_port" lineno="52485"> <summary> Bind TCP sockets to the munin port. </summary> @@ -42819,7 +42865,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_munin_port" lineno="55135"> +<interface name="corenet_udp_bind_munin_port" lineno="52505"> <summary> Bind UDP sockets to the munin port. </summary> @@ -42830,7 +42876,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_munin_port" lineno="55154"> +<interface name="corenet_tcp_connect_munin_port" lineno="52524"> <summary> Make a TCP connection to the munin port. </summary> @@ -42840,7 +42886,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_munin_client_packets" lineno="55174"> +<interface name="corenet_send_munin_client_packets" lineno="52544"> <summary> Send munin_client packets. </summary> @@ -42851,7 +42897,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_munin_client_packets" lineno="55193"> +<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52563"> <summary> Do not audit attempts to send munin_client packets. </summary> @@ -42862,7 +42908,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_munin_client_packets" lineno="55212"> +<interface name="corenet_receive_munin_client_packets" lineno="52582"> <summary> Receive munin_client packets. </summary> @@ -42873,7 +42919,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="55231"> +<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52601"> <summary> Do not audit attempts to receive munin_client packets. </summary> @@ -42884,7 +42930,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_munin_client_packets" lineno="55250"> +<interface name="corenet_sendrecv_munin_client_packets" lineno="52620"> <summary> Send and receive munin_client packets. </summary> @@ -42895,7 +42941,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="55266"> +<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52636"> <summary> Do not audit attempts to send and receive munin_client packets. </summary> @@ -42906,7 +42952,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_munin_client_packets" lineno="55281"> +<interface name="corenet_relabelto_munin_client_packets" lineno="52651"> <summary> Relabel packets to munin_client the packet type. </summary> @@ -42916,7 +42962,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_munin_server_packets" lineno="55301"> +<interface name="corenet_send_munin_server_packets" lineno="52671"> <summary> Send munin_server packets. </summary> @@ -42927,7 +42973,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_munin_server_packets" lineno="55320"> +<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52690"> <summary> Do not audit attempts to send munin_server packets. </summary> @@ -42938,7 +42984,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_munin_server_packets" lineno="55339"> +<interface name="corenet_receive_munin_server_packets" lineno="52709"> <summary> Receive munin_server packets. </summary> @@ -42949,7 +42995,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="55358"> +<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52728"> <summary> Do not audit attempts to receive munin_server packets. </summary> @@ -42960,7 +43006,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_munin_server_packets" lineno="55377"> +<interface name="corenet_sendrecv_munin_server_packets" lineno="52747"> <summary> Send and receive munin_server packets. </summary> @@ -42971,7 +43017,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="55393"> +<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52763"> <summary> Do not audit attempts to send and receive munin_server packets. </summary> @@ -42982,7 +43028,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_munin_server_packets" lineno="55408"> +<interface name="corenet_relabelto_munin_server_packets" lineno="52778"> <summary> Relabel packets to munin_server the packet type. </summary> @@ -42992,7 +43038,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mxi_port" lineno="55430"> +<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52800"> <summary> Send and receive TCP traffic on the mxi port. </summary> @@ -43003,7 +43049,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mxi_port" lineno="55449"> +<interface name="corenet_udp_send_mxi_port" lineno="52815"> <summary> Send UDP traffic on the mxi port. </summary> @@ -43014,7 +43060,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="55468"> +<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52830"> <summary> Do not audit attempts to send UDP traffic on the mxi port. </summary> @@ -43025,7 +43071,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mxi_port" lineno="55487"> +<interface name="corenet_udp_receive_mxi_port" lineno="52845"> <summary> Receive UDP traffic on the mxi port. </summary> @@ -43036,7 +43082,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="55506"> +<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52860"> <summary> Do not audit attempts to receive UDP traffic on the mxi port. </summary> @@ -43047,7 +43093,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mxi_port" lineno="55525"> +<interface name="corenet_udp_sendrecv_mxi_port" lineno="52875"> <summary> Send and receive UDP traffic on the mxi port. </summary> @@ -43058,7 +43104,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="55542"> +<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="52891"> <summary> Do not audit attempts to send and receive UDP traffic on the mxi port. @@ -43070,7 +43116,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mxi_port" lineno="55558"> +<interface name="corenet_tcp_bind_mxi_port" lineno="52906"> <summary> Bind TCP sockets to the mxi port. </summary> @@ -43081,7 +43127,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mxi_port" lineno="55578"> +<interface name="corenet_udp_bind_mxi_port" lineno="52926"> <summary> Bind UDP sockets to the mxi port. </summary> @@ -43092,7 +43138,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mxi_port" lineno="55597"> +<interface name="corenet_tcp_connect_mxi_port" lineno="52945"> <summary> Make a TCP connection to the mxi port. </summary> @@ -43102,7 +43148,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mxi_client_packets" lineno="55617"> +<interface name="corenet_send_mxi_client_packets" lineno="52965"> <summary> Send mxi_client packets. </summary> @@ -43113,7 +43159,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="55636"> +<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="52984"> <summary> Do not audit attempts to send mxi_client packets. </summary> @@ -43124,7 +43170,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mxi_client_packets" lineno="55655"> +<interface name="corenet_receive_mxi_client_packets" lineno="53003"> <summary> Receive mxi_client packets. </summary> @@ -43135,7 +43181,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="55674"> +<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53022"> <summary> Do not audit attempts to receive mxi_client packets. </summary> @@ -43146,7 +43192,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mxi_client_packets" lineno="55693"> +<interface name="corenet_sendrecv_mxi_client_packets" lineno="53041"> <summary> Send and receive mxi_client packets. </summary> @@ -43157,7 +43203,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="55709"> +<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53057"> <summary> Do not audit attempts to send and receive mxi_client packets. </summary> @@ -43168,7 +43214,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mxi_client_packets" lineno="55724"> +<interface name="corenet_relabelto_mxi_client_packets" lineno="53072"> <summary> Relabel packets to mxi_client the packet type. </summary> @@ -43178,7 +43224,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mxi_server_packets" lineno="55744"> +<interface name="corenet_send_mxi_server_packets" lineno="53092"> <summary> Send mxi_server packets. </summary> @@ -43189,7 +43235,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="55763"> +<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53111"> <summary> Do not audit attempts to send mxi_server packets. </summary> @@ -43200,7 +43246,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mxi_server_packets" lineno="55782"> +<interface name="corenet_receive_mxi_server_packets" lineno="53130"> <summary> Receive mxi_server packets. </summary> @@ -43211,7 +43257,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="55801"> +<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53149"> <summary> Do not audit attempts to receive mxi_server packets. </summary> @@ -43222,7 +43268,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mxi_server_packets" lineno="55820"> +<interface name="corenet_sendrecv_mxi_server_packets" lineno="53168"> <summary> Send and receive mxi_server packets. </summary> @@ -43233,7 +43279,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="55836"> +<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53184"> <summary> Do not audit attempts to send and receive mxi_server packets. </summary> @@ -43244,7 +43290,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mxi_server_packets" lineno="55851"> +<interface name="corenet_relabelto_mxi_server_packets" lineno="53199"> <summary> Relabel packets to mxi_server the packet type. </summary> @@ -43254,7 +43300,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="55873"> +<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53221"> <summary> Send and receive TCP traffic on the mysqld port. </summary> @@ -43265,7 +43311,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mysqld_port" lineno="55892"> +<interface name="corenet_udp_send_mysqld_port" lineno="53236"> <summary> Send UDP traffic on the mysqld port. </summary> @@ -43276,7 +43322,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="55911"> +<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53251"> <summary> Do not audit attempts to send UDP traffic on the mysqld port. </summary> @@ -43287,7 +43333,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mysqld_port" lineno="55930"> +<interface name="corenet_udp_receive_mysqld_port" lineno="53266"> <summary> Receive UDP traffic on the mysqld port. </summary> @@ -43298,7 +43344,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="55949"> +<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53281"> <summary> Do not audit attempts to receive UDP traffic on the mysqld port. </summary> @@ -43309,7 +43355,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mysqld_port" lineno="55968"> +<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53296"> <summary> Send and receive UDP traffic on the mysqld port. </summary> @@ -43320,7 +43366,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="55985"> +<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53312"> <summary> Do not audit attempts to send and receive UDP traffic on the mysqld port. @@ -43332,7 +43378,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mysqld_port" lineno="56001"> +<interface name="corenet_tcp_bind_mysqld_port" lineno="53327"> <summary> Bind TCP sockets to the mysqld port. </summary> @@ -43343,7 +43389,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mysqld_port" lineno="56021"> +<interface name="corenet_udp_bind_mysqld_port" lineno="53347"> <summary> Bind UDP sockets to the mysqld port. </summary> @@ -43354,7 +43400,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mysqld_port" lineno="56040"> +<interface name="corenet_tcp_connect_mysqld_port" lineno="53366"> <summary> Make a TCP connection to the mysqld port. </summary> @@ -43364,7 +43410,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqld_client_packets" lineno="56060"> +<interface name="corenet_send_mysqld_client_packets" lineno="53386"> <summary> Send mysqld_client packets. </summary> @@ -43375,7 +43421,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="56079"> +<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53405"> <summary> Do not audit attempts to send mysqld_client packets. </summary> @@ -43386,7 +43432,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqld_client_packets" lineno="56098"> +<interface name="corenet_receive_mysqld_client_packets" lineno="53424"> <summary> Receive mysqld_client packets. </summary> @@ -43397,7 +43443,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="56117"> +<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53443"> <summary> Do not audit attempts to receive mysqld_client packets. </summary> @@ -43408,7 +43454,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqld_client_packets" lineno="56136"> +<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53462"> <summary> Send and receive mysqld_client packets. </summary> @@ -43419,7 +43465,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="56152"> +<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53478"> <summary> Do not audit attempts to send and receive mysqld_client packets. </summary> @@ -43430,7 +43476,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqld_client_packets" lineno="56167"> +<interface name="corenet_relabelto_mysqld_client_packets" lineno="53493"> <summary> Relabel packets to mysqld_client the packet type. </summary> @@ -43440,7 +43486,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqld_server_packets" lineno="56187"> +<interface name="corenet_send_mysqld_server_packets" lineno="53513"> <summary> Send mysqld_server packets. </summary> @@ -43451,7 +43497,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="56206"> +<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53532"> <summary> Do not audit attempts to send mysqld_server packets. </summary> @@ -43462,7 +43508,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqld_server_packets" lineno="56225"> +<interface name="corenet_receive_mysqld_server_packets" lineno="53551"> <summary> Receive mysqld_server packets. </summary> @@ -43473,7 +43519,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="56244"> +<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53570"> <summary> Do not audit attempts to receive mysqld_server packets. </summary> @@ -43484,7 +43530,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqld_server_packets" lineno="56263"> +<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53589"> <summary> Send and receive mysqld_server packets. </summary> @@ -43495,7 +43541,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="56279"> +<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53605"> <summary> Do not audit attempts to send and receive mysqld_server packets. </summary> @@ -43506,7 +43552,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqld_server_packets" lineno="56294"> +<interface name="corenet_relabelto_mysqld_server_packets" lineno="53620"> <summary> Relabel packets to mysqld_server the packet type. </summary> @@ -43516,7 +43562,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="56316"> +<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53642"> <summary> Send and receive TCP traffic on the mysqlmanagerd port. </summary> @@ -43527,7 +43573,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="56335"> +<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53657"> <summary> Send UDP traffic on the mysqlmanagerd port. </summary> @@ -43538,7 +43584,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="56354"> +<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53672"> <summary> Do not audit attempts to send UDP traffic on the mysqlmanagerd port. </summary> @@ -43549,7 +43595,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="56373"> +<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53687"> <summary> Receive UDP traffic on the mysqlmanagerd port. </summary> @@ -43560,7 +43606,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="56392"> +<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53702"> <summary> Do not audit attempts to receive UDP traffic on the mysqlmanagerd port. </summary> @@ -43571,7 +43617,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="56411"> +<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53717"> <summary> Send and receive UDP traffic on the mysqlmanagerd port. </summary> @@ -43582,7 +43628,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="56428"> +<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53733"> <summary> Do not audit attempts to send and receive UDP traffic on the mysqlmanagerd port. @@ -43594,7 +43640,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="56444"> +<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53748"> <summary> Bind TCP sockets to the mysqlmanagerd port. </summary> @@ -43605,7 +43651,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="56464"> +<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53768"> <summary> Bind UDP sockets to the mysqlmanagerd port. </summary> @@ -43616,7 +43662,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="56483"> +<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53787"> <summary> Make a TCP connection to the mysqlmanagerd port. </summary> @@ -43626,7 +43672,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="56503"> +<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53807"> <summary> Send mysqlmanagerd_client packets. </summary> @@ -43637,7 +43683,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="56522"> +<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53826"> <summary> Do not audit attempts to send mysqlmanagerd_client packets. </summary> @@ -43648,7 +43694,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="56541"> +<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53845"> <summary> Receive mysqlmanagerd_client packets. </summary> @@ -43659,7 +43705,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="56560"> +<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53864"> <summary> Do not audit attempts to receive mysqlmanagerd_client packets. </summary> @@ -43670,7 +43716,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="56579"> +<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="53883"> <summary> Send and receive mysqlmanagerd_client packets. </summary> @@ -43681,7 +43727,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="56595"> +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="53899"> <summary> Do not audit attempts to send and receive mysqlmanagerd_client packets. </summary> @@ -43692,7 +43738,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="56610"> +<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="53914"> <summary> Relabel packets to mysqlmanagerd_client the packet type. </summary> @@ -43702,7 +43748,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="56630"> +<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="53934"> <summary> Send mysqlmanagerd_server packets. </summary> @@ -43713,7 +43759,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="56649"> +<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="53953"> <summary> Do not audit attempts to send mysqlmanagerd_server packets. </summary> @@ -43724,7 +43770,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="56668"> +<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="53972"> <summary> Receive mysqlmanagerd_server packets. </summary> @@ -43735,7 +43781,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="56687"> +<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="53991"> <summary> Do not audit attempts to receive mysqlmanagerd_server packets. </summary> @@ -43746,7 +43792,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="56706"> +<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54010"> <summary> Send and receive mysqlmanagerd_server packets. </summary> @@ -43757,7 +43803,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="56722"> +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54026"> <summary> Do not audit attempts to send and receive mysqlmanagerd_server packets. </summary> @@ -43768,7 +43814,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="56737"> +<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54041"> <summary> Relabel packets to mysqlmanagerd_server the packet type. </summary> @@ -43778,7 +43824,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nessus_port" lineno="56759"> +<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54063"> <summary> Send and receive TCP traffic on the nessus port. </summary> @@ -43789,7 +43835,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_nessus_port" lineno="56778"> +<interface name="corenet_udp_send_nessus_port" lineno="54078"> <summary> Send UDP traffic on the nessus port. </summary> @@ -43800,7 +43846,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="56797"> +<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54093"> <summary> Do not audit attempts to send UDP traffic on the nessus port. </summary> @@ -43811,7 +43857,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_nessus_port" lineno="56816"> +<interface name="corenet_udp_receive_nessus_port" lineno="54108"> <summary> Receive UDP traffic on the nessus port. </summary> @@ -43822,7 +43868,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="56835"> +<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54123"> <summary> Do not audit attempts to receive UDP traffic on the nessus port. </summary> @@ -43833,7 +43879,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_nessus_port" lineno="56854"> +<interface name="corenet_udp_sendrecv_nessus_port" lineno="54138"> <summary> Send and receive UDP traffic on the nessus port. </summary> @@ -43844,7 +43890,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="56871"> +<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54154"> <summary> Do not audit attempts to send and receive UDP traffic on the nessus port. @@ -43856,7 +43902,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_nessus_port" lineno="56887"> +<interface name="corenet_tcp_bind_nessus_port" lineno="54169"> <summary> Bind TCP sockets to the nessus port. </summary> @@ -43867,7 +43913,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nessus_port" lineno="56907"> +<interface name="corenet_udp_bind_nessus_port" lineno="54189"> <summary> Bind UDP sockets to the nessus port. </summary> @@ -43878,7 +43924,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nessus_port" lineno="56926"> +<interface name="corenet_tcp_connect_nessus_port" lineno="54208"> <summary> Make a TCP connection to the nessus port. </summary> @@ -43888,7 +43934,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nessus_client_packets" lineno="56946"> +<interface name="corenet_send_nessus_client_packets" lineno="54228"> <summary> Send nessus_client packets. </summary> @@ -43899,7 +43945,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="56965"> +<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54247"> <summary> Do not audit attempts to send nessus_client packets. </summary> @@ -43910,7 +43956,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nessus_client_packets" lineno="56984"> +<interface name="corenet_receive_nessus_client_packets" lineno="54266"> <summary> Receive nessus_client packets. </summary> @@ -43921,7 +43967,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="57003"> +<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54285"> <summary> Do not audit attempts to receive nessus_client packets. </summary> @@ -43932,7 +43978,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nessus_client_packets" lineno="57022"> +<interface name="corenet_sendrecv_nessus_client_packets" lineno="54304"> <summary> Send and receive nessus_client packets. </summary> @@ -43943,7 +43989,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="57038"> +<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54320"> <summary> Do not audit attempts to send and receive nessus_client packets. </summary> @@ -43954,7 +44000,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nessus_client_packets" lineno="57053"> +<interface name="corenet_relabelto_nessus_client_packets" lineno="54335"> <summary> Relabel packets to nessus_client the packet type. </summary> @@ -43964,7 +44010,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nessus_server_packets" lineno="57073"> +<interface name="corenet_send_nessus_server_packets" lineno="54355"> <summary> Send nessus_server packets. </summary> @@ -43975,7 +44021,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="57092"> +<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54374"> <summary> Do not audit attempts to send nessus_server packets. </summary> @@ -43986,7 +44032,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nessus_server_packets" lineno="57111"> +<interface name="corenet_receive_nessus_server_packets" lineno="54393"> <summary> Receive nessus_server packets. </summary> @@ -43997,7 +44043,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="57130"> +<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54412"> <summary> Do not audit attempts to receive nessus_server packets. </summary> @@ -44008,7 +44054,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nessus_server_packets" lineno="57149"> +<interface name="corenet_sendrecv_nessus_server_packets" lineno="54431"> <summary> Send and receive nessus_server packets. </summary> @@ -44019,7 +44065,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="57165"> +<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54447"> <summary> Do not audit attempts to send and receive nessus_server packets. </summary> @@ -44030,7 +44076,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nessus_server_packets" lineno="57180"> +<interface name="corenet_relabelto_nessus_server_packets" lineno="54462"> <summary> Relabel packets to nessus_server the packet type. </summary> @@ -44040,7 +44086,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_netport_port" lineno="57202"> +<interface name="corenet_tcp_sendrecv_netport_port" lineno="54484"> <summary> Send and receive TCP traffic on the netport port. </summary> @@ -44051,7 +44097,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_netport_port" lineno="57221"> +<interface name="corenet_udp_send_netport_port" lineno="54499"> <summary> Send UDP traffic on the netport port. </summary> @@ -44062,7 +44108,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_netport_port" lineno="57240"> +<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54514"> <summary> Do not audit attempts to send UDP traffic on the netport port. </summary> @@ -44073,7 +44119,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_netport_port" lineno="57259"> +<interface name="corenet_udp_receive_netport_port" lineno="54529"> <summary> Receive UDP traffic on the netport port. </summary> @@ -44084,7 +44130,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="57278"> +<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54544"> <summary> Do not audit attempts to receive UDP traffic on the netport port. </summary> @@ -44095,7 +44141,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_netport_port" lineno="57297"> +<interface name="corenet_udp_sendrecv_netport_port" lineno="54559"> <summary> Send and receive UDP traffic on the netport port. </summary> @@ -44106,7 +44152,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="57314"> +<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54575"> <summary> Do not audit attempts to send and receive UDP traffic on the netport port. @@ -44118,7 +44164,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_netport_port" lineno="57330"> +<interface name="corenet_tcp_bind_netport_port" lineno="54590"> <summary> Bind TCP sockets to the netport port. </summary> @@ -44129,7 +44175,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_netport_port" lineno="57350"> +<interface name="corenet_udp_bind_netport_port" lineno="54610"> <summary> Bind UDP sockets to the netport port. </summary> @@ -44140,7 +44186,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_netport_port" lineno="57369"> +<interface name="corenet_tcp_connect_netport_port" lineno="54629"> <summary> Make a TCP connection to the netport port. </summary> @@ -44150,7 +44196,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netport_client_packets" lineno="57389"> +<interface name="corenet_send_netport_client_packets" lineno="54649"> <summary> Send netport_client packets. </summary> @@ -44161,7 +44207,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netport_client_packets" lineno="57408"> +<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54668"> <summary> Do not audit attempts to send netport_client packets. </summary> @@ -44172,7 +44218,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netport_client_packets" lineno="57427"> +<interface name="corenet_receive_netport_client_packets" lineno="54687"> <summary> Receive netport_client packets. </summary> @@ -44183,7 +44229,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="57446"> +<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54706"> <summary> Do not audit attempts to receive netport_client packets. </summary> @@ -44194,7 +44240,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netport_client_packets" lineno="57465"> +<interface name="corenet_sendrecv_netport_client_packets" lineno="54725"> <summary> Send and receive netport_client packets. </summary> @@ -44205,7 +44251,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="57481"> +<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54741"> <summary> Do not audit attempts to send and receive netport_client packets. </summary> @@ -44216,7 +44262,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netport_client_packets" lineno="57496"> +<interface name="corenet_relabelto_netport_client_packets" lineno="54756"> <summary> Relabel packets to netport_client the packet type. </summary> @@ -44226,7 +44272,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netport_server_packets" lineno="57516"> +<interface name="corenet_send_netport_server_packets" lineno="54776"> <summary> Send netport_server packets. </summary> @@ -44237,7 +44283,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netport_server_packets" lineno="57535"> +<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54795"> <summary> Do not audit attempts to send netport_server packets. </summary> @@ -44248,7 +44294,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netport_server_packets" lineno="57554"> +<interface name="corenet_receive_netport_server_packets" lineno="54814"> <summary> Receive netport_server packets. </summary> @@ -44259,7 +44305,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="57573"> +<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54833"> <summary> Do not audit attempts to receive netport_server packets. </summary> @@ -44270,7 +44316,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netport_server_packets" lineno="57592"> +<interface name="corenet_sendrecv_netport_server_packets" lineno="54852"> <summary> Send and receive netport_server packets. </summary> @@ -44281,7 +44327,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="57608"> +<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54868"> <summary> Do not audit attempts to send and receive netport_server packets. </summary> @@ -44292,7 +44338,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netport_server_packets" lineno="57623"> +<interface name="corenet_relabelto_netport_server_packets" lineno="54883"> <summary> Relabel packets to netport_server the packet type. </summary> @@ -44302,7 +44348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="57645"> +<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="54905"> <summary> Send and receive TCP traffic on the netsupport port. </summary> @@ -44313,7 +44359,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_netsupport_port" lineno="57664"> +<interface name="corenet_udp_send_netsupport_port" lineno="54920"> <summary> Send UDP traffic on the netsupport port. </summary> @@ -44324,7 +44370,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="57683"> +<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="54935"> <summary> Do not audit attempts to send UDP traffic on the netsupport port. </summary> @@ -44335,7 +44381,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_netsupport_port" lineno="57702"> +<interface name="corenet_udp_receive_netsupport_port" lineno="54950"> <summary> Receive UDP traffic on the netsupport port. </summary> @@ -44346,7 +44392,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="57721"> +<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="54965"> <summary> Do not audit attempts to receive UDP traffic on the netsupport port. </summary> @@ -44357,7 +44403,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_netsupport_port" lineno="57740"> +<interface name="corenet_udp_sendrecv_netsupport_port" lineno="54980"> <summary> Send and receive UDP traffic on the netsupport port. </summary> @@ -44368,7 +44414,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="57757"> +<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="54996"> <summary> Do not audit attempts to send and receive UDP traffic on the netsupport port. @@ -44380,7 +44426,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_netsupport_port" lineno="57773"> +<interface name="corenet_tcp_bind_netsupport_port" lineno="55011"> <summary> Bind TCP sockets to the netsupport port. </summary> @@ -44391,7 +44437,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_netsupport_port" lineno="57793"> +<interface name="corenet_udp_bind_netsupport_port" lineno="55031"> <summary> Bind UDP sockets to the netsupport port. </summary> @@ -44402,7 +44448,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_netsupport_port" lineno="57812"> +<interface name="corenet_tcp_connect_netsupport_port" lineno="55050"> <summary> Make a TCP connection to the netsupport port. </summary> @@ -44412,7 +44458,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netsupport_client_packets" lineno="57832"> +<interface name="corenet_send_netsupport_client_packets" lineno="55070"> <summary> Send netsupport_client packets. </summary> @@ -44423,7 +44469,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="57851"> +<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55089"> <summary> Do not audit attempts to send netsupport_client packets. </summary> @@ -44434,7 +44480,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netsupport_client_packets" lineno="57870"> +<interface name="corenet_receive_netsupport_client_packets" lineno="55108"> <summary> Receive netsupport_client packets. </summary> @@ -44445,7 +44491,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="57889"> +<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55127"> <summary> Do not audit attempts to receive netsupport_client packets. </summary> @@ -44456,7 +44502,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netsupport_client_packets" lineno="57908"> +<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55146"> <summary> Send and receive netsupport_client packets. </summary> @@ -44467,7 +44513,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="57924"> +<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55162"> <summary> Do not audit attempts to send and receive netsupport_client packets. </summary> @@ -44478,7 +44524,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netsupport_client_packets" lineno="57939"> +<interface name="corenet_relabelto_netsupport_client_packets" lineno="55177"> <summary> Relabel packets to netsupport_client the packet type. </summary> @@ -44488,7 +44534,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netsupport_server_packets" lineno="57959"> +<interface name="corenet_send_netsupport_server_packets" lineno="55197"> <summary> Send netsupport_server packets. </summary> @@ -44499,7 +44545,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="57978"> +<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55216"> <summary> Do not audit attempts to send netsupport_server packets. </summary> @@ -44510,7 +44556,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netsupport_server_packets" lineno="57997"> +<interface name="corenet_receive_netsupport_server_packets" lineno="55235"> <summary> Receive netsupport_server packets. </summary> @@ -44521,7 +44567,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="58016"> +<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55254"> <summary> Do not audit attempts to receive netsupport_server packets. </summary> @@ -44532,7 +44578,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netsupport_server_packets" lineno="58035"> +<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55273"> <summary> Send and receive netsupport_server packets. </summary> @@ -44543,7 +44589,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="58051"> +<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55289"> <summary> Do not audit attempts to send and receive netsupport_server packets. </summary> @@ -44554,7 +44600,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netsupport_server_packets" lineno="58066"> +<interface name="corenet_relabelto_netsupport_server_packets" lineno="55304"> <summary> Relabel packets to netsupport_server the packet type. </summary> @@ -44564,7 +44610,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nfs_port" lineno="58088"> +<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55326"> <summary> Send and receive TCP traffic on the nfs port. </summary> @@ -44575,7 +44621,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_nfs_port" lineno="58107"> +<interface name="corenet_udp_send_nfs_port" lineno="55341"> <summary> Send UDP traffic on the nfs port. </summary> @@ -44586,7 +44632,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="58126"> +<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55356"> <summary> Do not audit attempts to send UDP traffic on the nfs port. </summary> @@ -44597,7 +44643,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_nfs_port" lineno="58145"> +<interface name="corenet_udp_receive_nfs_port" lineno="55371"> <summary> Receive UDP traffic on the nfs port. </summary> @@ -44608,7 +44654,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="58164"> +<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55386"> <summary> Do not audit attempts to receive UDP traffic on the nfs port. </summary> @@ -44619,7 +44665,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_nfs_port" lineno="58183"> +<interface name="corenet_udp_sendrecv_nfs_port" lineno="55401"> <summary> Send and receive UDP traffic on the nfs port. </summary> @@ -44630,7 +44676,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="58200"> +<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55417"> <summary> Do not audit attempts to send and receive UDP traffic on the nfs port. @@ -44642,7 +44688,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_nfs_port" lineno="58216"> +<interface name="corenet_tcp_bind_nfs_port" lineno="55432"> <summary> Bind TCP sockets to the nfs port. </summary> @@ -44653,7 +44699,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nfs_port" lineno="58236"> +<interface name="corenet_udp_bind_nfs_port" lineno="55452"> <summary> Bind UDP sockets to the nfs port. </summary> @@ -44664,7 +44710,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nfs_port" lineno="58255"> +<interface name="corenet_tcp_connect_nfs_port" lineno="55471"> <summary> Make a TCP connection to the nfs port. </summary> @@ -44674,7 +44720,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfs_client_packets" lineno="58275"> +<interface name="corenet_send_nfs_client_packets" lineno="55491"> <summary> Send nfs_client packets. </summary> @@ -44685,7 +44731,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="58294"> +<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55510"> <summary> Do not audit attempts to send nfs_client packets. </summary> @@ -44696,7 +44742,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfs_client_packets" lineno="58313"> +<interface name="corenet_receive_nfs_client_packets" lineno="55529"> <summary> Receive nfs_client packets. </summary> @@ -44707,7 +44753,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="58332"> +<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55548"> <summary> Do not audit attempts to receive nfs_client packets. </summary> @@ -44718,7 +44764,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfs_client_packets" lineno="58351"> +<interface name="corenet_sendrecv_nfs_client_packets" lineno="55567"> <summary> Send and receive nfs_client packets. </summary> @@ -44729,7 +44775,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="58367"> +<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55583"> <summary> Do not audit attempts to send and receive nfs_client packets. </summary> @@ -44740,7 +44786,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfs_client_packets" lineno="58382"> +<interface name="corenet_relabelto_nfs_client_packets" lineno="55598"> <summary> Relabel packets to nfs_client the packet type. </summary> @@ -44750,7 +44796,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfs_server_packets" lineno="58402"> +<interface name="corenet_send_nfs_server_packets" lineno="55618"> <summary> Send nfs_server packets. </summary> @@ -44761,7 +44807,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="58421"> +<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55637"> <summary> Do not audit attempts to send nfs_server packets. </summary> @@ -44772,7 +44818,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfs_server_packets" lineno="58440"> +<interface name="corenet_receive_nfs_server_packets" lineno="55656"> <summary> Receive nfs_server packets. </summary> @@ -44783,7 +44829,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="58459"> +<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55675"> <summary> Do not audit attempts to receive nfs_server packets. </summary> @@ -44794,7 +44840,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfs_server_packets" lineno="58478"> +<interface name="corenet_sendrecv_nfs_server_packets" lineno="55694"> <summary> Send and receive nfs_server packets. </summary> @@ -44805,7 +44851,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="58494"> +<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55710"> <summary> Do not audit attempts to send and receive nfs_server packets. </summary> @@ -44816,7 +44862,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfs_server_packets" lineno="58509"> +<interface name="corenet_relabelto_nfs_server_packets" lineno="55725"> <summary> Relabel packets to nfs_server the packet type. </summary> @@ -44826,7 +44872,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="58531"> +<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55747"> <summary> Send and receive TCP traffic on the nfsrdma port. </summary> @@ -44837,7 +44883,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_nfsrdma_port" lineno="58550"> +<interface name="corenet_udp_send_nfsrdma_port" lineno="55762"> <summary> Send UDP traffic on the nfsrdma port. </summary> @@ -44848,7 +44894,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="58569"> +<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55777"> <summary> Do not audit attempts to send UDP traffic on the nfsrdma port. </summary> @@ -44859,7 +44905,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_nfsrdma_port" lineno="58588"> +<interface name="corenet_udp_receive_nfsrdma_port" lineno="55792"> <summary> Receive UDP traffic on the nfsrdma port. </summary> @@ -44870,7 +44916,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="58607"> +<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55807"> <summary> Do not audit attempts to receive UDP traffic on the nfsrdma port. </summary> @@ -44881,7 +44927,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="58626"> +<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55822"> <summary> Send and receive UDP traffic on the nfsrdma port. </summary> @@ -44892,7 +44938,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="58643"> +<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55838"> <summary> Do not audit attempts to send and receive UDP traffic on the nfsrdma port. @@ -44904,7 +44950,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_nfsrdma_port" lineno="58659"> +<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55853"> <summary> Bind TCP sockets to the nfsrdma port. </summary> @@ -44915,7 +44961,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nfsrdma_port" lineno="58679"> +<interface name="corenet_udp_bind_nfsrdma_port" lineno="55873"> <summary> Bind UDP sockets to the nfsrdma port. </summary> @@ -44926,7 +44972,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nfsrdma_port" lineno="58698"> +<interface name="corenet_tcp_connect_nfsrdma_port" lineno="55892"> <summary> Make a TCP connection to the nfsrdma port. </summary> @@ -44936,7 +44982,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfsrdma_client_packets" lineno="58718"> +<interface name="corenet_send_nfsrdma_client_packets" lineno="55912"> <summary> Send nfsrdma_client packets. </summary> @@ -44947,7 +44993,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="58737"> +<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="55931"> <summary> Do not audit attempts to send nfsrdma_client packets. </summary> @@ -44958,7 +45004,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfsrdma_client_packets" lineno="58756"> +<interface name="corenet_receive_nfsrdma_client_packets" lineno="55950"> <summary> Receive nfsrdma_client packets. </summary> @@ -44969,7 +45015,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="58775"> +<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="55969"> <summary> Do not audit attempts to receive nfsrdma_client packets. </summary> @@ -44980,7 +45026,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="58794"> +<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="55988"> <summary> Send and receive nfsrdma_client packets. </summary> @@ -44991,7 +45037,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="58810"> +<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56004"> <summary> Do not audit attempts to send and receive nfsrdma_client packets. </summary> @@ -45002,7 +45048,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="58825"> +<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56019"> <summary> Relabel packets to nfsrdma_client the packet type. </summary> @@ -45012,7 +45058,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfsrdma_server_packets" lineno="58845"> +<interface name="corenet_send_nfsrdma_server_packets" lineno="56039"> <summary> Send nfsrdma_server packets. </summary> @@ -45023,7 +45069,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="58864"> +<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56058"> <summary> Do not audit attempts to send nfsrdma_server packets. </summary> @@ -45034,7 +45080,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfsrdma_server_packets" lineno="58883"> +<interface name="corenet_receive_nfsrdma_server_packets" lineno="56077"> <summary> Receive nfsrdma_server packets. </summary> @@ -45045,7 +45091,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="58902"> +<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56096"> <summary> Do not audit attempts to receive nfsrdma_server packets. </summary> @@ -45056,7 +45102,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="58921"> +<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56115"> <summary> Send and receive nfsrdma_server packets. </summary> @@ -45067,7 +45113,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="58937"> +<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56131"> <summary> Do not audit attempts to send and receive nfsrdma_server packets. </summary> @@ -45078,7 +45124,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="58952"> +<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56146"> <summary> Relabel packets to nfsrdma_server the packet type. </summary> @@ -45088,7 +45134,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="58974"> +<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56168"> <summary> Send and receive TCP traffic on the nmbd port. </summary> @@ -45099,7 +45145,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_nmbd_port" lineno="58993"> +<interface name="corenet_udp_send_nmbd_port" lineno="56183"> <summary> Send UDP traffic on the nmbd port. </summary> @@ -45110,7 +45156,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="59012"> +<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56198"> <summary> Do not audit attempts to send UDP traffic on the nmbd port. </summary> @@ -45121,7 +45167,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_nmbd_port" lineno="59031"> +<interface name="corenet_udp_receive_nmbd_port" lineno="56213"> <summary> Receive UDP traffic on the nmbd port. </summary> @@ -45132,7 +45178,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="59050"> +<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56228"> <summary> Do not audit attempts to receive UDP traffic on the nmbd port. </summary> @@ -45143,7 +45189,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_nmbd_port" lineno="59069"> +<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56243"> <summary> Send and receive UDP traffic on the nmbd port. </summary> @@ -45154,7 +45200,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="59086"> +<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56259"> <summary> Do not audit attempts to send and receive UDP traffic on the nmbd port. @@ -45166,7 +45212,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_nmbd_port" lineno="59102"> +<interface name="corenet_tcp_bind_nmbd_port" lineno="56274"> <summary> Bind TCP sockets to the nmbd port. </summary> @@ -45177,7 +45223,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nmbd_port" lineno="59122"> +<interface name="corenet_udp_bind_nmbd_port" lineno="56294"> <summary> Bind UDP sockets to the nmbd port. </summary> @@ -45188,7 +45234,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nmbd_port" lineno="59141"> +<interface name="corenet_tcp_connect_nmbd_port" lineno="56313"> <summary> Make a TCP connection to the nmbd port. </summary> @@ -45198,7 +45244,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nmbd_client_packets" lineno="59161"> +<interface name="corenet_send_nmbd_client_packets" lineno="56333"> <summary> Send nmbd_client packets. </summary> @@ -45209,7 +45255,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="59180"> +<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56352"> <summary> Do not audit attempts to send nmbd_client packets. </summary> @@ -45220,7 +45266,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nmbd_client_packets" lineno="59199"> +<interface name="corenet_receive_nmbd_client_packets" lineno="56371"> <summary> Receive nmbd_client packets. </summary> @@ -45231,7 +45277,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="59218"> +<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56390"> <summary> Do not audit attempts to receive nmbd_client packets. </summary> @@ -45242,7 +45288,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nmbd_client_packets" lineno="59237"> +<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56409"> <summary> Send and receive nmbd_client packets. </summary> @@ -45253,7 +45299,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="59253"> +<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56425"> <summary> Do not audit attempts to send and receive nmbd_client packets. </summary> @@ -45264,7 +45310,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nmbd_client_packets" lineno="59268"> +<interface name="corenet_relabelto_nmbd_client_packets" lineno="56440"> <summary> Relabel packets to nmbd_client the packet type. </summary> @@ -45274,7 +45320,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nmbd_server_packets" lineno="59288"> +<interface name="corenet_send_nmbd_server_packets" lineno="56460"> <summary> Send nmbd_server packets. </summary> @@ -45285,7 +45331,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="59307"> +<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56479"> <summary> Do not audit attempts to send nmbd_server packets. </summary> @@ -45296,7 +45342,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nmbd_server_packets" lineno="59326"> +<interface name="corenet_receive_nmbd_server_packets" lineno="56498"> <summary> Receive nmbd_server packets. </summary> @@ -45307,7 +45353,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="59345"> +<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56517"> <summary> Do not audit attempts to receive nmbd_server packets. </summary> @@ -45318,7 +45364,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nmbd_server_packets" lineno="59364"> +<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56536"> <summary> Send and receive nmbd_server packets. </summary> @@ -45329,7 +45375,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="59380"> +<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56552"> <summary> Do not audit attempts to send and receive nmbd_server packets. </summary> @@ -45340,7 +45386,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nmbd_server_packets" lineno="59395"> +<interface name="corenet_relabelto_nmbd_server_packets" lineno="56567"> <summary> Relabel packets to nmbd_server the packet type. </summary> @@ -45350,7 +45396,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ntop_port" lineno="59417"> +<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56589"> <summary> Send and receive TCP traffic on the ntop port. </summary> @@ -45361,7 +45407,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ntop_port" lineno="59436"> +<interface name="corenet_udp_send_ntop_port" lineno="56604"> <summary> Send UDP traffic on the ntop port. </summary> @@ -45372,7 +45418,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="59455"> +<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56619"> <summary> Do not audit attempts to send UDP traffic on the ntop port. </summary> @@ -45383,7 +45429,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ntop_port" lineno="59474"> +<interface name="corenet_udp_receive_ntop_port" lineno="56634"> <summary> Receive UDP traffic on the ntop port. </summary> @@ -45394,7 +45440,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="59493"> +<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56649"> <summary> Do not audit attempts to receive UDP traffic on the ntop port. </summary> @@ -45405,7 +45451,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ntop_port" lineno="59512"> +<interface name="corenet_udp_sendrecv_ntop_port" lineno="56664"> <summary> Send and receive UDP traffic on the ntop port. </summary> @@ -45416,7 +45462,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="59529"> +<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56680"> <summary> Do not audit attempts to send and receive UDP traffic on the ntop port. @@ -45428,7 +45474,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ntop_port" lineno="59545"> +<interface name="corenet_tcp_bind_ntop_port" lineno="56695"> <summary> Bind TCP sockets to the ntop port. </summary> @@ -45439,7 +45485,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ntop_port" lineno="59565"> +<interface name="corenet_udp_bind_ntop_port" lineno="56715"> <summary> Bind UDP sockets to the ntop port. </summary> @@ -45450,7 +45496,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ntop_port" lineno="59584"> +<interface name="corenet_tcp_connect_ntop_port" lineno="56734"> <summary> Make a TCP connection to the ntop port. </summary> @@ -45460,7 +45506,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntop_client_packets" lineno="59604"> +<interface name="corenet_send_ntop_client_packets" lineno="56754"> <summary> Send ntop_client packets. </summary> @@ -45471,7 +45517,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="59623"> +<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56773"> <summary> Do not audit attempts to send ntop_client packets. </summary> @@ -45482,7 +45528,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntop_client_packets" lineno="59642"> +<interface name="corenet_receive_ntop_client_packets" lineno="56792"> <summary> Receive ntop_client packets. </summary> @@ -45493,7 +45539,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="59661"> +<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56811"> <summary> Do not audit attempts to receive ntop_client packets. </summary> @@ -45504,7 +45550,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntop_client_packets" lineno="59680"> +<interface name="corenet_sendrecv_ntop_client_packets" lineno="56830"> <summary> Send and receive ntop_client packets. </summary> @@ -45515,7 +45561,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="59696"> +<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56846"> <summary> Do not audit attempts to send and receive ntop_client packets. </summary> @@ -45526,7 +45572,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntop_client_packets" lineno="59711"> +<interface name="corenet_relabelto_ntop_client_packets" lineno="56861"> <summary> Relabel packets to ntop_client the packet type. </summary> @@ -45536,7 +45582,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntop_server_packets" lineno="59731"> +<interface name="corenet_send_ntop_server_packets" lineno="56881"> <summary> Send ntop_server packets. </summary> @@ -45547,7 +45593,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="59750"> +<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="56900"> <summary> Do not audit attempts to send ntop_server packets. </summary> @@ -45558,7 +45604,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntop_server_packets" lineno="59769"> +<interface name="corenet_receive_ntop_server_packets" lineno="56919"> <summary> Receive ntop_server packets. </summary> @@ -45569,7 +45615,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="59788"> +<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="56938"> <summary> Do not audit attempts to receive ntop_server packets. </summary> @@ -45580,7 +45626,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntop_server_packets" lineno="59807"> +<interface name="corenet_sendrecv_ntop_server_packets" lineno="56957"> <summary> Send and receive ntop_server packets. </summary> @@ -45591,7 +45637,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="59823"> +<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="56973"> <summary> Do not audit attempts to send and receive ntop_server packets. </summary> @@ -45602,7 +45648,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntop_server_packets" lineno="59838"> +<interface name="corenet_relabelto_ntop_server_packets" lineno="56988"> <summary> Relabel packets to ntop_server the packet type. </summary> @@ -45612,7 +45658,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ntp_port" lineno="59860"> +<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57010"> <summary> Send and receive TCP traffic on the ntp port. </summary> @@ -45623,7 +45669,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ntp_port" lineno="59879"> +<interface name="corenet_udp_send_ntp_port" lineno="57025"> <summary> Send UDP traffic on the ntp port. </summary> @@ -45634,7 +45680,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="59898"> +<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57040"> <summary> Do not audit attempts to send UDP traffic on the ntp port. </summary> @@ -45645,7 +45691,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ntp_port" lineno="59917"> +<interface name="corenet_udp_receive_ntp_port" lineno="57055"> <summary> Receive UDP traffic on the ntp port. </summary> @@ -45656,7 +45702,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="59936"> +<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57070"> <summary> Do not audit attempts to receive UDP traffic on the ntp port. </summary> @@ -45667,7 +45713,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ntp_port" lineno="59955"> +<interface name="corenet_udp_sendrecv_ntp_port" lineno="57085"> <summary> Send and receive UDP traffic on the ntp port. </summary> @@ -45678,7 +45724,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="59972"> +<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57101"> <summary> Do not audit attempts to send and receive UDP traffic on the ntp port. @@ -45690,7 +45736,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ntp_port" lineno="59988"> +<interface name="corenet_tcp_bind_ntp_port" lineno="57116"> <summary> Bind TCP sockets to the ntp port. </summary> @@ -45701,7 +45747,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ntp_port" lineno="60008"> +<interface name="corenet_udp_bind_ntp_port" lineno="57136"> <summary> Bind UDP sockets to the ntp port. </summary> @@ -45712,7 +45758,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ntp_port" lineno="60027"> +<interface name="corenet_tcp_connect_ntp_port" lineno="57155"> <summary> Make a TCP connection to the ntp port. </summary> @@ -45722,7 +45768,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntp_client_packets" lineno="60047"> +<interface name="corenet_send_ntp_client_packets" lineno="57175"> <summary> Send ntp_client packets. </summary> @@ -45733,7 +45779,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="60066"> +<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57194"> <summary> Do not audit attempts to send ntp_client packets. </summary> @@ -45744,7 +45790,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntp_client_packets" lineno="60085"> +<interface name="corenet_receive_ntp_client_packets" lineno="57213"> <summary> Receive ntp_client packets. </summary> @@ -45755,7 +45801,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="60104"> +<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57232"> <summary> Do not audit attempts to receive ntp_client packets. </summary> @@ -45766,7 +45812,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntp_client_packets" lineno="60123"> +<interface name="corenet_sendrecv_ntp_client_packets" lineno="57251"> <summary> Send and receive ntp_client packets. </summary> @@ -45777,7 +45823,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="60139"> +<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57267"> <summary> Do not audit attempts to send and receive ntp_client packets. </summary> @@ -45788,7 +45834,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntp_client_packets" lineno="60154"> +<interface name="corenet_relabelto_ntp_client_packets" lineno="57282"> <summary> Relabel packets to ntp_client the packet type. </summary> @@ -45798,7 +45844,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntp_server_packets" lineno="60174"> +<interface name="corenet_send_ntp_server_packets" lineno="57302"> <summary> Send ntp_server packets. </summary> @@ -45809,7 +45855,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="60193"> +<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57321"> <summary> Do not audit attempts to send ntp_server packets. </summary> @@ -45820,7 +45866,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntp_server_packets" lineno="60212"> +<interface name="corenet_receive_ntp_server_packets" lineno="57340"> <summary> Receive ntp_server packets. </summary> @@ -45831,7 +45877,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="60231"> +<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57359"> <summary> Do not audit attempts to receive ntp_server packets. </summary> @@ -45842,7 +45888,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntp_server_packets" lineno="60250"> +<interface name="corenet_sendrecv_ntp_server_packets" lineno="57378"> <summary> Send and receive ntp_server packets. </summary> @@ -45853,7 +45899,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="60266"> +<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57394"> <summary> Do not audit attempts to send and receive ntp_server packets. </summary> @@ -45864,7 +45910,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntp_server_packets" lineno="60281"> +<interface name="corenet_relabelto_ntp_server_packets" lineno="57409"> <summary> Relabel packets to ntp_server the packet type. </summary> @@ -45874,7 +45920,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="60303"> +<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57431"> <summary> Send and receive TCP traffic on the oa_system port. </summary> @@ -45885,7 +45931,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_oa_system_port" lineno="60322"> +<interface name="corenet_udp_send_oa_system_port" lineno="57446"> <summary> Send UDP traffic on the oa_system port. </summary> @@ -45896,7 +45942,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="60341"> +<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="57461"> <summary> Do not audit attempts to send UDP traffic on the oa_system port. </summary> @@ -45907,7 +45953,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_oa_system_port" lineno="60360"> +<interface name="corenet_udp_receive_oa_system_port" lineno="57476"> <summary> Receive UDP traffic on the oa_system port. </summary> @@ -45918,7 +45964,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="60379"> +<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="57491"> <summary> Do not audit attempts to receive UDP traffic on the oa_system port. </summary> @@ -45929,7 +45975,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_oa_system_port" lineno="60398"> +<interface name="corenet_udp_sendrecv_oa_system_port" lineno="57506"> <summary> Send and receive UDP traffic on the oa_system port. </summary> @@ -45940,7 +45986,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="60415"> +<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="57522"> <summary> Do not audit attempts to send and receive UDP traffic on the oa_system port. @@ -45952,7 +45998,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_oa_system_port" lineno="60431"> +<interface name="corenet_tcp_bind_oa_system_port" lineno="57537"> <summary> Bind TCP sockets to the oa_system port. </summary> @@ -45963,7 +46009,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_oa_system_port" lineno="60451"> +<interface name="corenet_udp_bind_oa_system_port" lineno="57557"> <summary> Bind UDP sockets to the oa_system port. </summary> @@ -45974,7 +46020,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_oa_system_port" lineno="60470"> +<interface name="corenet_tcp_connect_oa_system_port" lineno="57576"> <summary> Make a TCP connection to the oa_system port. </summary> @@ -45984,7 +46030,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oa_system_client_packets" lineno="60490"> +<interface name="corenet_send_oa_system_client_packets" lineno="57596"> <summary> Send oa_system_client packets. </summary> @@ -45995,7 +46041,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="60509"> +<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="57615"> <summary> Do not audit attempts to send oa_system_client packets. </summary> @@ -46006,7 +46052,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oa_system_client_packets" lineno="60528"> +<interface name="corenet_receive_oa_system_client_packets" lineno="57634"> <summary> Receive oa_system_client packets. </summary> @@ -46017,7 +46063,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="60547"> +<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="57653"> <summary> Do not audit attempts to receive oa_system_client packets. </summary> @@ -46028,7 +46074,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oa_system_client_packets" lineno="60566"> +<interface name="corenet_sendrecv_oa_system_client_packets" lineno="57672"> <summary> Send and receive oa_system_client packets. </summary> @@ -46039,7 +46085,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="60582"> +<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="57688"> <summary> Do not audit attempts to send and receive oa_system_client packets. </summary> @@ -46050,7 +46096,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oa_system_client_packets" lineno="60597"> +<interface name="corenet_relabelto_oa_system_client_packets" lineno="57703"> <summary> Relabel packets to oa_system_client the packet type. </summary> @@ -46060,7 +46106,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oa_system_server_packets" lineno="60617"> +<interface name="corenet_send_oa_system_server_packets" lineno="57723"> <summary> Send oa_system_server packets. </summary> @@ -46071,7 +46117,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="60636"> +<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="57742"> <summary> Do not audit attempts to send oa_system_server packets. </summary> @@ -46082,7 +46128,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oa_system_server_packets" lineno="60655"> +<interface name="corenet_receive_oa_system_server_packets" lineno="57761"> <summary> Receive oa_system_server packets. </summary> @@ -46093,7 +46139,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="60674"> +<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="57780"> <summary> Do not audit attempts to receive oa_system_server packets. </summary> @@ -46104,7 +46150,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oa_system_server_packets" lineno="60693"> +<interface name="corenet_sendrecv_oa_system_server_packets" lineno="57799"> <summary> Send and receive oa_system_server packets. </summary> @@ -46115,7 +46161,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="60709"> +<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="57815"> <summary> Do not audit attempts to send and receive oa_system_server packets. </summary> @@ -46126,7 +46172,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oa_system_server_packets" lineno="60724"> +<interface name="corenet_relabelto_oa_system_server_packets" lineno="57830"> <summary> Relabel packets to oa_system_server the packet type. </summary> @@ -46136,7 +46182,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="60746"> +<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="57852"> <summary> Send and receive TCP traffic on the oracledb port. </summary> @@ -46147,7 +46193,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_oracledb_port" lineno="60765"> +<interface name="corenet_udp_send_oracledb_port" lineno="57867"> <summary> Send UDP traffic on the oracledb port. </summary> @@ -46158,7 +46204,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="60784"> +<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="57882"> <summary> Do not audit attempts to send UDP traffic on the oracledb port. </summary> @@ -46169,7 +46215,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_oracledb_port" lineno="60803"> +<interface name="corenet_udp_receive_oracledb_port" lineno="57897"> <summary> Receive UDP traffic on the oracledb port. </summary> @@ -46180,7 +46226,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="60822"> +<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="57912"> <summary> Do not audit attempts to receive UDP traffic on the oracledb port. </summary> @@ -46191,7 +46237,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_oracledb_port" lineno="60841"> +<interface name="corenet_udp_sendrecv_oracledb_port" lineno="57927"> <summary> Send and receive UDP traffic on the oracledb port. </summary> @@ -46202,7 +46248,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="60858"> +<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="57943"> <summary> Do not audit attempts to send and receive UDP traffic on the oracledb port. @@ -46214,7 +46260,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_oracledb_port" lineno="60874"> +<interface name="corenet_tcp_bind_oracledb_port" lineno="57958"> <summary> Bind TCP sockets to the oracledb port. </summary> @@ -46225,7 +46271,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_oracledb_port" lineno="60894"> +<interface name="corenet_udp_bind_oracledb_port" lineno="57978"> <summary> Bind UDP sockets to the oracledb port. </summary> @@ -46236,7 +46282,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_oracledb_port" lineno="60913"> +<interface name="corenet_tcp_connect_oracledb_port" lineno="57997"> <summary> Make a TCP connection to the oracledb port. </summary> @@ -46246,7 +46292,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oracledb_client_packets" lineno="60933"> +<interface name="corenet_send_oracledb_client_packets" lineno="58017"> <summary> Send oracledb_client packets. </summary> @@ -46257,7 +46303,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="60952"> +<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58036"> <summary> Do not audit attempts to send oracledb_client packets. </summary> @@ -46268,7 +46314,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oracledb_client_packets" lineno="60971"> +<interface name="corenet_receive_oracledb_client_packets" lineno="58055"> <summary> Receive oracledb_client packets. </summary> @@ -46279,7 +46325,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="60990"> +<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58074"> <summary> Do not audit attempts to receive oracledb_client packets. </summary> @@ -46290,7 +46336,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oracledb_client_packets" lineno="61009"> +<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58093"> <summary> Send and receive oracledb_client packets. </summary> @@ -46301,7 +46347,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="61025"> +<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58109"> <summary> Do not audit attempts to send and receive oracledb_client packets. </summary> @@ -46312,7 +46358,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oracledb_client_packets" lineno="61040"> +<interface name="corenet_relabelto_oracledb_client_packets" lineno="58124"> <summary> Relabel packets to oracledb_client the packet type. </summary> @@ -46322,7 +46368,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oracledb_server_packets" lineno="61060"> +<interface name="corenet_send_oracledb_server_packets" lineno="58144"> <summary> Send oracledb_server packets. </summary> @@ -46333,7 +46379,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="61079"> +<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58163"> <summary> Do not audit attempts to send oracledb_server packets. </summary> @@ -46344,7 +46390,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oracledb_server_packets" lineno="61098"> +<interface name="corenet_receive_oracledb_server_packets" lineno="58182"> <summary> Receive oracledb_server packets. </summary> @@ -46355,7 +46401,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="61117"> +<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58201"> <summary> Do not audit attempts to receive oracledb_server packets. </summary> @@ -46366,7 +46412,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oracledb_server_packets" lineno="61136"> +<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58220"> <summary> Send and receive oracledb_server packets. </summary> @@ -46377,7 +46423,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="61152"> +<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58236"> <summary> Do not audit attempts to send and receive oracledb_server packets. </summary> @@ -46388,7 +46434,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oracledb_server_packets" lineno="61167"> +<interface name="corenet_relabelto_oracledb_server_packets" lineno="58251"> <summary> Relabel packets to oracledb_server the packet type. </summary> @@ -46398,7 +46444,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="61189"> +<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58273"> <summary> Send and receive TCP traffic on the ocsp port. </summary> @@ -46409,7 +46455,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ocsp_port" lineno="61208"> +<interface name="corenet_udp_send_ocsp_port" lineno="58288"> <summary> Send UDP traffic on the ocsp port. </summary> @@ -46420,7 +46466,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="61227"> +<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58303"> <summary> Do not audit attempts to send UDP traffic on the ocsp port. </summary> @@ -46431,7 +46477,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ocsp_port" lineno="61246"> +<interface name="corenet_udp_receive_ocsp_port" lineno="58318"> <summary> Receive UDP traffic on the ocsp port. </summary> @@ -46442,7 +46488,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="61265"> +<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58333"> <summary> Do not audit attempts to receive UDP traffic on the ocsp port. </summary> @@ -46453,7 +46499,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ocsp_port" lineno="61284"> +<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58348"> <summary> Send and receive UDP traffic on the ocsp port. </summary> @@ -46464,7 +46510,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="61301"> +<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58364"> <summary> Do not audit attempts to send and receive UDP traffic on the ocsp port. @@ -46476,7 +46522,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ocsp_port" lineno="61317"> +<interface name="corenet_tcp_bind_ocsp_port" lineno="58379"> <summary> Bind TCP sockets to the ocsp port. </summary> @@ -46487,7 +46533,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ocsp_port" lineno="61337"> +<interface name="corenet_udp_bind_ocsp_port" lineno="58399"> <summary> Bind UDP sockets to the ocsp port. </summary> @@ -46498,7 +46544,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ocsp_port" lineno="61356"> +<interface name="corenet_tcp_connect_ocsp_port" lineno="58418"> <summary> Make a TCP connection to the ocsp port. </summary> @@ -46508,7 +46554,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ocsp_client_packets" lineno="61376"> +<interface name="corenet_send_ocsp_client_packets" lineno="58438"> <summary> Send ocsp_client packets. </summary> @@ -46519,7 +46565,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="61395"> +<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="58457"> <summary> Do not audit attempts to send ocsp_client packets. </summary> @@ -46530,7 +46576,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ocsp_client_packets" lineno="61414"> +<interface name="corenet_receive_ocsp_client_packets" lineno="58476"> <summary> Receive ocsp_client packets. </summary> @@ -46541,7 +46587,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="61433"> +<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="58495"> <summary> Do not audit attempts to receive ocsp_client packets. </summary> @@ -46552,7 +46598,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ocsp_client_packets" lineno="61452"> +<interface name="corenet_sendrecv_ocsp_client_packets" lineno="58514"> <summary> Send and receive ocsp_client packets. </summary> @@ -46563,7 +46609,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="61468"> +<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="58530"> <summary> Do not audit attempts to send and receive ocsp_client packets. </summary> @@ -46574,7 +46620,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ocsp_client_packets" lineno="61483"> +<interface name="corenet_relabelto_ocsp_client_packets" lineno="58545"> <summary> Relabel packets to ocsp_client the packet type. </summary> @@ -46584,7 +46630,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ocsp_server_packets" lineno="61503"> +<interface name="corenet_send_ocsp_server_packets" lineno="58565"> <summary> Send ocsp_server packets. </summary> @@ -46595,7 +46641,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="61522"> +<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="58584"> <summary> Do not audit attempts to send ocsp_server packets. </summary> @@ -46606,7 +46652,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ocsp_server_packets" lineno="61541"> +<interface name="corenet_receive_ocsp_server_packets" lineno="58603"> <summary> Receive ocsp_server packets. </summary> @@ -46617,7 +46663,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="61560"> +<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="58622"> <summary> Do not audit attempts to receive ocsp_server packets. </summary> @@ -46628,7 +46674,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ocsp_server_packets" lineno="61579"> +<interface name="corenet_sendrecv_ocsp_server_packets" lineno="58641"> <summary> Send and receive ocsp_server packets. </summary> @@ -46639,7 +46685,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="61595"> +<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="58657"> <summary> Do not audit attempts to send and receive ocsp_server packets. </summary> @@ -46650,7 +46696,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ocsp_server_packets" lineno="61610"> +<interface name="corenet_relabelto_ocsp_server_packets" lineno="58672"> <summary> Relabel packets to ocsp_server the packet type. </summary> @@ -46660,7 +46706,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="61632"> +<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="58694"> <summary> Send and receive TCP traffic on the openhpid port. </summary> @@ -46671,7 +46717,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_openhpid_port" lineno="61651"> +<interface name="corenet_udp_send_openhpid_port" lineno="58709"> <summary> Send UDP traffic on the openhpid port. </summary> @@ -46682,7 +46728,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="61670"> +<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="58724"> <summary> Do not audit attempts to send UDP traffic on the openhpid port. </summary> @@ -46693,7 +46739,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_openhpid_port" lineno="61689"> +<interface name="corenet_udp_receive_openhpid_port" lineno="58739"> <summary> Receive UDP traffic on the openhpid port. </summary> @@ -46704,7 +46750,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="61708"> +<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="58754"> <summary> Do not audit attempts to receive UDP traffic on the openhpid port. </summary> @@ -46715,7 +46761,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_openhpid_port" lineno="61727"> +<interface name="corenet_udp_sendrecv_openhpid_port" lineno="58769"> <summary> Send and receive UDP traffic on the openhpid port. </summary> @@ -46726,7 +46772,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="61744"> +<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="58785"> <summary> Do not audit attempts to send and receive UDP traffic on the openhpid port. @@ -46738,7 +46784,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_openhpid_port" lineno="61760"> +<interface name="corenet_tcp_bind_openhpid_port" lineno="58800"> <summary> Bind TCP sockets to the openhpid port. </summary> @@ -46749,7 +46795,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_openhpid_port" lineno="61780"> +<interface name="corenet_udp_bind_openhpid_port" lineno="58820"> <summary> Bind UDP sockets to the openhpid port. </summary> @@ -46760,7 +46806,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_openhpid_port" lineno="61799"> +<interface name="corenet_tcp_connect_openhpid_port" lineno="58839"> <summary> Make a TCP connection to the openhpid port. </summary> @@ -46770,7 +46816,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openhpid_client_packets" lineno="61819"> +<interface name="corenet_send_openhpid_client_packets" lineno="58859"> <summary> Send openhpid_client packets. </summary> @@ -46781,7 +46827,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="61838"> +<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="58878"> <summary> Do not audit attempts to send openhpid_client packets. </summary> @@ -46792,7 +46838,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openhpid_client_packets" lineno="61857"> +<interface name="corenet_receive_openhpid_client_packets" lineno="58897"> <summary> Receive openhpid_client packets. </summary> @@ -46803,7 +46849,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="61876"> +<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="58916"> <summary> Do not audit attempts to receive openhpid_client packets. </summary> @@ -46814,7 +46860,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openhpid_client_packets" lineno="61895"> +<interface name="corenet_sendrecv_openhpid_client_packets" lineno="58935"> <summary> Send and receive openhpid_client packets. </summary> @@ -46825,7 +46871,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="61911"> +<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="58951"> <summary> Do not audit attempts to send and receive openhpid_client packets. </summary> @@ -46836,7 +46882,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openhpid_client_packets" lineno="61926"> +<interface name="corenet_relabelto_openhpid_client_packets" lineno="58966"> <summary> Relabel packets to openhpid_client the packet type. </summary> @@ -46846,7 +46892,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openhpid_server_packets" lineno="61946"> +<interface name="corenet_send_openhpid_server_packets" lineno="58986"> <summary> Send openhpid_server packets. </summary> @@ -46857,7 +46903,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="61965"> +<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59005"> <summary> Do not audit attempts to send openhpid_server packets. </summary> @@ -46868,7 +46914,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openhpid_server_packets" lineno="61984"> +<interface name="corenet_receive_openhpid_server_packets" lineno="59024"> <summary> Receive openhpid_server packets. </summary> @@ -46879,7 +46925,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="62003"> +<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59043"> <summary> Do not audit attempts to receive openhpid_server packets. </summary> @@ -46890,7 +46936,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openhpid_server_packets" lineno="62022"> +<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59062"> <summary> Send and receive openhpid_server packets. </summary> @@ -46901,7 +46947,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="62038"> +<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59078"> <summary> Do not audit attempts to send and receive openhpid_server packets. </summary> @@ -46912,7 +46958,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openhpid_server_packets" lineno="62053"> +<interface name="corenet_relabelto_openhpid_server_packets" lineno="59093"> <summary> Relabel packets to openhpid_server the packet type. </summary> @@ -46922,7 +46968,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="62075"> +<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59115"> <summary> Send and receive TCP traffic on the openvpn port. </summary> @@ -46933,7 +46979,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_openvpn_port" lineno="62094"> +<interface name="corenet_udp_send_openvpn_port" lineno="59130"> <summary> Send UDP traffic on the openvpn port. </summary> @@ -46944,7 +46990,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="62113"> +<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59145"> <summary> Do not audit attempts to send UDP traffic on the openvpn port. </summary> @@ -46955,7 +47001,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_openvpn_port" lineno="62132"> +<interface name="corenet_udp_receive_openvpn_port" lineno="59160"> <summary> Receive UDP traffic on the openvpn port. </summary> @@ -46966,7 +47012,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="62151"> +<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59175"> <summary> Do not audit attempts to receive UDP traffic on the openvpn port. </summary> @@ -46977,7 +47023,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_openvpn_port" lineno="62170"> +<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59190"> <summary> Send and receive UDP traffic on the openvpn port. </summary> @@ -46988,7 +47034,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="62187"> +<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59206"> <summary> Do not audit attempts to send and receive UDP traffic on the openvpn port. @@ -47000,7 +47046,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_openvpn_port" lineno="62203"> +<interface name="corenet_tcp_bind_openvpn_port" lineno="59221"> <summary> Bind TCP sockets to the openvpn port. </summary> @@ -47011,7 +47057,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_openvpn_port" lineno="62223"> +<interface name="corenet_udp_bind_openvpn_port" lineno="59241"> <summary> Bind UDP sockets to the openvpn port. </summary> @@ -47022,7 +47068,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_openvpn_port" lineno="62242"> +<interface name="corenet_tcp_connect_openvpn_port" lineno="59260"> <summary> Make a TCP connection to the openvpn port. </summary> @@ -47032,7 +47078,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openvpn_client_packets" lineno="62262"> +<interface name="corenet_send_openvpn_client_packets" lineno="59280"> <summary> Send openvpn_client packets. </summary> @@ -47043,7 +47089,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="62281"> +<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59299"> <summary> Do not audit attempts to send openvpn_client packets. </summary> @@ -47054,7 +47100,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openvpn_client_packets" lineno="62300"> +<interface name="corenet_receive_openvpn_client_packets" lineno="59318"> <summary> Receive openvpn_client packets. </summary> @@ -47065,7 +47111,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="62319"> +<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59337"> <summary> Do not audit attempts to receive openvpn_client packets. </summary> @@ -47076,7 +47122,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openvpn_client_packets" lineno="62338"> +<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59356"> <summary> Send and receive openvpn_client packets. </summary> @@ -47087,7 +47133,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="62354"> +<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59372"> <summary> Do not audit attempts to send and receive openvpn_client packets. </summary> @@ -47098,7 +47144,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openvpn_client_packets" lineno="62369"> +<interface name="corenet_relabelto_openvpn_client_packets" lineno="59387"> <summary> Relabel packets to openvpn_client the packet type. </summary> @@ -47108,7 +47154,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openvpn_server_packets" lineno="62389"> +<interface name="corenet_send_openvpn_server_packets" lineno="59407"> <summary> Send openvpn_server packets. </summary> @@ -47119,7 +47165,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="62408"> +<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59426"> <summary> Do not audit attempts to send openvpn_server packets. </summary> @@ -47130,7 +47176,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openvpn_server_packets" lineno="62427"> +<interface name="corenet_receive_openvpn_server_packets" lineno="59445"> <summary> Receive openvpn_server packets. </summary> @@ -47141,7 +47187,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="62446"> +<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="59464"> <summary> Do not audit attempts to receive openvpn_server packets. </summary> @@ -47152,7 +47198,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openvpn_server_packets" lineno="62465"> +<interface name="corenet_sendrecv_openvpn_server_packets" lineno="59483"> <summary> Send and receive openvpn_server packets. </summary> @@ -47163,7 +47209,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="62481"> +<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="59499"> <summary> Do not audit attempts to send and receive openvpn_server packets. </summary> @@ -47174,7 +47220,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openvpn_server_packets" lineno="62496"> +<interface name="corenet_relabelto_openvpn_server_packets" lineno="59514"> <summary> Relabel packets to openvpn_server the packet type. </summary> @@ -47184,7 +47230,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pdps_port" lineno="62518"> +<interface name="corenet_tcp_sendrecv_pdps_port" lineno="59536"> <summary> Send and receive TCP traffic on the pdps port. </summary> @@ -47195,7 +47241,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pdps_port" lineno="62537"> +<interface name="corenet_udp_send_pdps_port" lineno="59551"> <summary> Send UDP traffic on the pdps port. </summary> @@ -47206,7 +47252,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="62556"> +<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="59566"> <summary> Do not audit attempts to send UDP traffic on the pdps port. </summary> @@ -47217,7 +47263,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pdps_port" lineno="62575"> +<interface name="corenet_udp_receive_pdps_port" lineno="59581"> <summary> Receive UDP traffic on the pdps port. </summary> @@ -47228,7 +47274,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="62594"> +<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="59596"> <summary> Do not audit attempts to receive UDP traffic on the pdps port. </summary> @@ -47239,7 +47285,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pdps_port" lineno="62613"> +<interface name="corenet_udp_sendrecv_pdps_port" lineno="59611"> <summary> Send and receive UDP traffic on the pdps port. </summary> @@ -47250,7 +47296,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="62630"> +<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="59627"> <summary> Do not audit attempts to send and receive UDP traffic on the pdps port. @@ -47262,7 +47308,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pdps_port" lineno="62646"> +<interface name="corenet_tcp_bind_pdps_port" lineno="59642"> <summary> Bind TCP sockets to the pdps port. </summary> @@ -47273,7 +47319,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pdps_port" lineno="62666"> +<interface name="corenet_udp_bind_pdps_port" lineno="59662"> <summary> Bind UDP sockets to the pdps port. </summary> @@ -47284,7 +47330,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pdps_port" lineno="62685"> +<interface name="corenet_tcp_connect_pdps_port" lineno="59681"> <summary> Make a TCP connection to the pdps port. </summary> @@ -47294,7 +47340,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pdps_client_packets" lineno="62705"> +<interface name="corenet_send_pdps_client_packets" lineno="59701"> <summary> Send pdps_client packets. </summary> @@ -47305,7 +47351,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="62724"> +<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="59720"> <summary> Do not audit attempts to send pdps_client packets. </summary> @@ -47316,7 +47362,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pdps_client_packets" lineno="62743"> +<interface name="corenet_receive_pdps_client_packets" lineno="59739"> <summary> Receive pdps_client packets. </summary> @@ -47327,7 +47373,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="62762"> +<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="59758"> <summary> Do not audit attempts to receive pdps_client packets. </summary> @@ -47338,7 +47384,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pdps_client_packets" lineno="62781"> +<interface name="corenet_sendrecv_pdps_client_packets" lineno="59777"> <summary> Send and receive pdps_client packets. </summary> @@ -47349,7 +47395,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="62797"> +<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="59793"> <summary> Do not audit attempts to send and receive pdps_client packets. </summary> @@ -47360,7 +47406,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pdps_client_packets" lineno="62812"> +<interface name="corenet_relabelto_pdps_client_packets" lineno="59808"> <summary> Relabel packets to pdps_client the packet type. </summary> @@ -47370,7 +47416,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pdps_server_packets" lineno="62832"> +<interface name="corenet_send_pdps_server_packets" lineno="59828"> <summary> Send pdps_server packets. </summary> @@ -47381,7 +47427,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="62851"> +<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="59847"> <summary> Do not audit attempts to send pdps_server packets. </summary> @@ -47392,7 +47438,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pdps_server_packets" lineno="62870"> +<interface name="corenet_receive_pdps_server_packets" lineno="59866"> <summary> Receive pdps_server packets. </summary> @@ -47403,7 +47449,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="62889"> +<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="59885"> <summary> Do not audit attempts to receive pdps_server packets. </summary> @@ -47414,7 +47460,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pdps_server_packets" lineno="62908"> +<interface name="corenet_sendrecv_pdps_server_packets" lineno="59904"> <summary> Send and receive pdps_server packets. </summary> @@ -47425,7 +47471,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="62924"> +<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="59920"> <summary> Do not audit attempts to send and receive pdps_server packets. </summary> @@ -47436,7 +47482,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pdps_server_packets" lineno="62939"> +<interface name="corenet_relabelto_pdps_server_packets" lineno="59935"> <summary> Relabel packets to pdps_server the packet type. </summary> @@ -47446,7 +47492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="62961"> +<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="59957"> <summary> Send and receive TCP traffic on the pegasus_http port. </summary> @@ -47457,7 +47503,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pegasus_http_port" lineno="62980"> +<interface name="corenet_udp_send_pegasus_http_port" lineno="59972"> <summary> Send UDP traffic on the pegasus_http port. </summary> @@ -47468,7 +47514,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="62999"> +<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="59987"> <summary> Do not audit attempts to send UDP traffic on the pegasus_http port. </summary> @@ -47479,7 +47525,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pegasus_http_port" lineno="63018"> +<interface name="corenet_udp_receive_pegasus_http_port" lineno="60002"> <summary> Receive UDP traffic on the pegasus_http port. </summary> @@ -47490,7 +47536,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="63037"> +<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60017"> <summary> Do not audit attempts to receive UDP traffic on the pegasus_http port. </summary> @@ -47501,7 +47547,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="63056"> +<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60032"> <summary> Send and receive UDP traffic on the pegasus_http port. </summary> @@ -47512,7 +47558,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="63073"> +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60048"> <summary> Do not audit attempts to send and receive UDP traffic on the pegasus_http port. @@ -47524,7 +47570,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pegasus_http_port" lineno="63089"> +<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60063"> <summary> Bind TCP sockets to the pegasus_http port. </summary> @@ -47535,7 +47581,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pegasus_http_port" lineno="63109"> +<interface name="corenet_udp_bind_pegasus_http_port" lineno="60083"> <summary> Bind UDP sockets to the pegasus_http port. </summary> @@ -47546,7 +47592,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pegasus_http_port" lineno="63128"> +<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60102"> <summary> Make a TCP connection to the pegasus_http port. </summary> @@ -47556,7 +47602,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_http_client_packets" lineno="63148"> +<interface name="corenet_send_pegasus_http_client_packets" lineno="60122"> <summary> Send pegasus_http_client packets. </summary> @@ -47567,7 +47613,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="63167"> +<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60141"> <summary> Do not audit attempts to send pegasus_http_client packets. </summary> @@ -47578,7 +47624,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_http_client_packets" lineno="63186"> +<interface name="corenet_receive_pegasus_http_client_packets" lineno="60160"> <summary> Receive pegasus_http_client packets. </summary> @@ -47589,7 +47635,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="63205"> +<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60179"> <summary> Do not audit attempts to receive pegasus_http_client packets. </summary> @@ -47600,7 +47646,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="63224"> +<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60198"> <summary> Send and receive pegasus_http_client packets. </summary> @@ -47611,7 +47657,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="63240"> +<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60214"> <summary> Do not audit attempts to send and receive pegasus_http_client packets. </summary> @@ -47622,7 +47668,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="63255"> +<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60229"> <summary> Relabel packets to pegasus_http_client the packet type. </summary> @@ -47632,7 +47678,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_http_server_packets" lineno="63275"> +<interface name="corenet_send_pegasus_http_server_packets" lineno="60249"> <summary> Send pegasus_http_server packets. </summary> @@ -47643,7 +47689,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="63294"> +<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60268"> <summary> Do not audit attempts to send pegasus_http_server packets. </summary> @@ -47654,7 +47700,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_http_server_packets" lineno="63313"> +<interface name="corenet_receive_pegasus_http_server_packets" lineno="60287"> <summary> Receive pegasus_http_server packets. </summary> @@ -47665,7 +47711,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="63332"> +<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60306"> <summary> Do not audit attempts to receive pegasus_http_server packets. </summary> @@ -47676,7 +47722,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="63351"> +<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60325"> <summary> Send and receive pegasus_http_server packets. </summary> @@ -47687,7 +47733,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="63367"> +<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60341"> <summary> Do not audit attempts to send and receive pegasus_http_server packets. </summary> @@ -47698,7 +47744,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="63382"> +<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60356"> <summary> Relabel packets to pegasus_http_server the packet type. </summary> @@ -47708,7 +47754,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="63404"> +<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60378"> <summary> Send and receive TCP traffic on the pegasus_https port. </summary> @@ -47719,7 +47765,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pegasus_https_port" lineno="63423"> +<interface name="corenet_udp_send_pegasus_https_port" lineno="60393"> <summary> Send UDP traffic on the pegasus_https port. </summary> @@ -47730,7 +47776,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="63442"> +<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60408"> <summary> Do not audit attempts to send UDP traffic on the pegasus_https port. </summary> @@ -47741,7 +47787,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pegasus_https_port" lineno="63461"> +<interface name="corenet_udp_receive_pegasus_https_port" lineno="60423"> <summary> Receive UDP traffic on the pegasus_https port. </summary> @@ -47752,7 +47798,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="63480"> +<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60438"> <summary> Do not audit attempts to receive UDP traffic on the pegasus_https port. </summary> @@ -47763,7 +47809,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="63499"> +<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60453"> <summary> Send and receive UDP traffic on the pegasus_https port. </summary> @@ -47774,7 +47820,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="63516"> +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="60469"> <summary> Do not audit attempts to send and receive UDP traffic on the pegasus_https port. @@ -47786,7 +47832,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pegasus_https_port" lineno="63532"> +<interface name="corenet_tcp_bind_pegasus_https_port" lineno="60484"> <summary> Bind TCP sockets to the pegasus_https port. </summary> @@ -47797,7 +47843,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pegasus_https_port" lineno="63552"> +<interface name="corenet_udp_bind_pegasus_https_port" lineno="60504"> <summary> Bind UDP sockets to the pegasus_https port. </summary> @@ -47808,7 +47854,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pegasus_https_port" lineno="63571"> +<interface name="corenet_tcp_connect_pegasus_https_port" lineno="60523"> <summary> Make a TCP connection to the pegasus_https port. </summary> @@ -47818,7 +47864,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_https_client_packets" lineno="63591"> +<interface name="corenet_send_pegasus_https_client_packets" lineno="60543"> <summary> Send pegasus_https_client packets. </summary> @@ -47829,7 +47875,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="63610"> +<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="60562"> <summary> Do not audit attempts to send pegasus_https_client packets. </summary> @@ -47840,7 +47886,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_https_client_packets" lineno="63629"> +<interface name="corenet_receive_pegasus_https_client_packets" lineno="60581"> <summary> Receive pegasus_https_client packets. </summary> @@ -47851,7 +47897,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="63648"> +<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="60600"> <summary> Do not audit attempts to receive pegasus_https_client packets. </summary> @@ -47862,7 +47908,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="63667"> +<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="60619"> <summary> Send and receive pegasus_https_client packets. </summary> @@ -47873,7 +47919,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="63683"> +<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="60635"> <summary> Do not audit attempts to send and receive pegasus_https_client packets. </summary> @@ -47884,7 +47930,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="63698"> +<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="60650"> <summary> Relabel packets to pegasus_https_client the packet type. </summary> @@ -47894,7 +47940,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_https_server_packets" lineno="63718"> +<interface name="corenet_send_pegasus_https_server_packets" lineno="60670"> <summary> Send pegasus_https_server packets. </summary> @@ -47905,7 +47951,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="63737"> +<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="60689"> <summary> Do not audit attempts to send pegasus_https_server packets. </summary> @@ -47916,7 +47962,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_https_server_packets" lineno="63756"> +<interface name="corenet_receive_pegasus_https_server_packets" lineno="60708"> <summary> Receive pegasus_https_server packets. </summary> @@ -47927,7 +47973,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="63775"> +<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="60727"> <summary> Do not audit attempts to receive pegasus_https_server packets. </summary> @@ -47938,7 +47984,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="63794"> +<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="60746"> <summary> Send and receive pegasus_https_server packets. </summary> @@ -47949,7 +47995,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="63810"> +<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="60762"> <summary> Do not audit attempts to send and receive pegasus_https_server packets. </summary> @@ -47960,7 +48006,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="63825"> +<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="60777"> <summary> Relabel packets to pegasus_https_server the packet type. </summary> @@ -47970,7 +48016,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="63847"> +<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="60799"> <summary> Send and receive TCP traffic on the pgpkeyserver port. </summary> @@ -47981,7 +48027,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pgpkeyserver_port" lineno="63866"> +<interface name="corenet_udp_send_pgpkeyserver_port" lineno="60814"> <summary> Send UDP traffic on the pgpkeyserver port. </summary> @@ -47992,7 +48038,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="63885"> +<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="60829"> <summary> Do not audit attempts to send UDP traffic on the pgpkeyserver port. </summary> @@ -48003,7 +48049,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="63904"> +<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="60844"> <summary> Receive UDP traffic on the pgpkeyserver port. </summary> @@ -48014,7 +48060,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="63923"> +<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="60859"> <summary> Do not audit attempts to receive UDP traffic on the pgpkeyserver port. </summary> @@ -48025,7 +48071,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="63942"> +<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="60874"> <summary> Send and receive UDP traffic on the pgpkeyserver port. </summary> @@ -48036,7 +48082,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="63959"> +<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="60890"> <summary> Do not audit attempts to send and receive UDP traffic on the pgpkeyserver port. @@ -48048,7 +48094,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="63975"> +<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="60905"> <summary> Bind TCP sockets to the pgpkeyserver port. </summary> @@ -48059,7 +48105,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="63995"> +<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="60925"> <summary> Bind UDP sockets to the pgpkeyserver port. </summary> @@ -48070,7 +48116,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="64014"> +<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="60944"> <summary> Make a TCP connection to the pgpkeyserver port. </summary> @@ -48080,7 +48126,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pgpkeyserver_client_packets" lineno="64034"> +<interface name="corenet_send_pgpkeyserver_client_packets" lineno="60964"> <summary> Send pgpkeyserver_client packets. </summary> @@ -48091,7 +48137,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="64053"> +<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="60983"> <summary> Do not audit attempts to send pgpkeyserver_client packets. </summary> @@ -48102,7 +48148,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="64072"> +<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61002"> <summary> Receive pgpkeyserver_client packets. </summary> @@ -48113,7 +48159,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="64091"> +<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61021"> <summary> Do not audit attempts to receive pgpkeyserver_client packets. </summary> @@ -48124,7 +48170,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="64110"> +<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61040"> <summary> Send and receive pgpkeyserver_client packets. </summary> @@ -48135,7 +48181,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="64126"> +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61056"> <summary> Do not audit attempts to send and receive pgpkeyserver_client packets. </summary> @@ -48146,7 +48192,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="64141"> +<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61071"> <summary> Relabel packets to pgpkeyserver_client the packet type. </summary> @@ -48156,7 +48202,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pgpkeyserver_server_packets" lineno="64161"> +<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61091"> <summary> Send pgpkeyserver_server packets. </summary> @@ -48167,7 +48213,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="64180"> +<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61110"> <summary> Do not audit attempts to send pgpkeyserver_server packets. </summary> @@ -48178,7 +48224,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="64199"> +<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61129"> <summary> Receive pgpkeyserver_server packets. </summary> @@ -48189,7 +48235,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="64218"> +<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61148"> <summary> Do not audit attempts to receive pgpkeyserver_server packets. </summary> @@ -48200,7 +48246,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="64237"> +<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61167"> <summary> Send and receive pgpkeyserver_server packets. </summary> @@ -48211,7 +48257,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="64253"> +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61183"> <summary> Do not audit attempts to send and receive pgpkeyserver_server packets. </summary> @@ -48222,7 +48268,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="64268"> +<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61198"> <summary> Relabel packets to pgpkeyserver_server the packet type. </summary> @@ -48232,7 +48278,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pingd_port" lineno="64290"> +<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61220"> <summary> Send and receive TCP traffic on the pingd port. </summary> @@ -48243,7 +48289,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pingd_port" lineno="64309"> +<interface name="corenet_udp_send_pingd_port" lineno="61235"> <summary> Send UDP traffic on the pingd port. </summary> @@ -48254,7 +48300,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="64328"> +<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61250"> <summary> Do not audit attempts to send UDP traffic on the pingd port. </summary> @@ -48265,7 +48311,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pingd_port" lineno="64347"> +<interface name="corenet_udp_receive_pingd_port" lineno="61265"> <summary> Receive UDP traffic on the pingd port. </summary> @@ -48276,7 +48322,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="64366"> +<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61280"> <summary> Do not audit attempts to receive UDP traffic on the pingd port. </summary> @@ -48287,7 +48333,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pingd_port" lineno="64385"> +<interface name="corenet_udp_sendrecv_pingd_port" lineno="61295"> <summary> Send and receive UDP traffic on the pingd port. </summary> @@ -48298,7 +48344,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="64402"> +<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61311"> <summary> Do not audit attempts to send and receive UDP traffic on the pingd port. @@ -48310,7 +48356,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pingd_port" lineno="64418"> +<interface name="corenet_tcp_bind_pingd_port" lineno="61326"> <summary> Bind TCP sockets to the pingd port. </summary> @@ -48321,7 +48367,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pingd_port" lineno="64438"> +<interface name="corenet_udp_bind_pingd_port" lineno="61346"> <summary> Bind UDP sockets to the pingd port. </summary> @@ -48332,7 +48378,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pingd_port" lineno="64457"> +<interface name="corenet_tcp_connect_pingd_port" lineno="61365"> <summary> Make a TCP connection to the pingd port. </summary> @@ -48342,7 +48388,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pingd_client_packets" lineno="64477"> +<interface name="corenet_send_pingd_client_packets" lineno="61385"> <summary> Send pingd_client packets. </summary> @@ -48353,7 +48399,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="64496"> +<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61404"> <summary> Do not audit attempts to send pingd_client packets. </summary> @@ -48364,7 +48410,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pingd_client_packets" lineno="64515"> +<interface name="corenet_receive_pingd_client_packets" lineno="61423"> <summary> Receive pingd_client packets. </summary> @@ -48375,7 +48421,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="64534"> +<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61442"> <summary> Do not audit attempts to receive pingd_client packets. </summary> @@ -48386,7 +48432,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pingd_client_packets" lineno="64553"> +<interface name="corenet_sendrecv_pingd_client_packets" lineno="61461"> <summary> Send and receive pingd_client packets. </summary> @@ -48397,7 +48443,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="64569"> +<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="61477"> <summary> Do not audit attempts to send and receive pingd_client packets. </summary> @@ -48408,7 +48454,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pingd_client_packets" lineno="64584"> +<interface name="corenet_relabelto_pingd_client_packets" lineno="61492"> <summary> Relabel packets to pingd_client the packet type. </summary> @@ -48418,7 +48464,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pingd_server_packets" lineno="64604"> +<interface name="corenet_send_pingd_server_packets" lineno="61512"> <summary> Send pingd_server packets. </summary> @@ -48429,7 +48475,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="64623"> +<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="61531"> <summary> Do not audit attempts to send pingd_server packets. </summary> @@ -48440,7 +48486,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pingd_server_packets" lineno="64642"> +<interface name="corenet_receive_pingd_server_packets" lineno="61550"> <summary> Receive pingd_server packets. </summary> @@ -48451,7 +48497,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="64661"> +<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="61569"> <summary> Do not audit attempts to receive pingd_server packets. </summary> @@ -48462,7 +48508,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pingd_server_packets" lineno="64680"> +<interface name="corenet_sendrecv_pingd_server_packets" lineno="61588"> <summary> Send and receive pingd_server packets. </summary> @@ -48473,7 +48519,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="64696"> +<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="61604"> <summary> Do not audit attempts to send and receive pingd_server packets. </summary> @@ -48484,7 +48530,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pingd_server_packets" lineno="64711"> +<interface name="corenet_relabelto_pingd_server_packets" lineno="61619"> <summary> Relabel packets to pingd_server the packet type. </summary> @@ -48494,7 +48540,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="64733"> +<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="61641"> <summary> Send and receive TCP traffic on the pktcable_cops port. </summary> @@ -48505,7 +48551,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pktcable_cops_port" lineno="64752"> +<interface name="corenet_udp_send_pktcable_cops_port" lineno="61656"> <summary> Send UDP traffic on the pktcable_cops port. </summary> @@ -48516,7 +48562,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="64771"> +<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="61671"> <summary> Do not audit attempts to send UDP traffic on the pktcable_cops port. </summary> @@ -48527,7 +48573,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pktcable_cops_port" lineno="64790"> +<interface name="corenet_udp_receive_pktcable_cops_port" lineno="61686"> <summary> Receive UDP traffic on the pktcable_cops port. </summary> @@ -48538,7 +48584,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="64809"> +<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="61701"> <summary> Do not audit attempts to receive UDP traffic on the pktcable_cops port. </summary> @@ -48549,7 +48595,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="64828"> +<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="61716"> <summary> Send and receive UDP traffic on the pktcable_cops port. </summary> @@ -48560,7 +48606,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="64845"> +<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="61732"> <summary> Do not audit attempts to send and receive UDP traffic on the pktcable_cops port. @@ -48572,7 +48618,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="64861"> +<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="61747"> <summary> Bind TCP sockets to the pktcable_cops port. </summary> @@ -48583,7 +48629,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pktcable_cops_port" lineno="64881"> +<interface name="corenet_udp_bind_pktcable_cops_port" lineno="61767"> <summary> Bind UDP sockets to the pktcable_cops port. </summary> @@ -48594,7 +48640,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="64900"> +<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="61786"> <summary> Make a TCP connection to the pktcable_cops port. </summary> @@ -48604,7 +48650,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pktcable_cops_client_packets" lineno="64920"> +<interface name="corenet_send_pktcable_cops_client_packets" lineno="61806"> <summary> Send pktcable_cops_client packets. </summary> @@ -48615,7 +48661,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="64939"> +<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="61825"> <summary> Do not audit attempts to send pktcable_cops_client packets. </summary> @@ -48626,7 +48672,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pktcable_cops_client_packets" lineno="64958"> +<interface name="corenet_receive_pktcable_cops_client_packets" lineno="61844"> <summary> Receive pktcable_cops_client packets. </summary> @@ -48637,7 +48683,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="64977"> +<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="61863"> <summary> Do not audit attempts to receive pktcable_cops_client packets. </summary> @@ -48648,7 +48694,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="64996"> +<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="61882"> <summary> Send and receive pktcable_cops_client packets. </summary> @@ -48659,7 +48705,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="65012"> +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="61898"> <summary> Do not audit attempts to send and receive pktcable_cops_client packets. </summary> @@ -48670,7 +48716,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="65027"> +<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="61913"> <summary> Relabel packets to pktcable_cops_client the packet type. </summary> @@ -48680,7 +48726,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pktcable_cops_server_packets" lineno="65047"> +<interface name="corenet_send_pktcable_cops_server_packets" lineno="61933"> <summary> Send pktcable_cops_server packets. </summary> @@ -48691,7 +48737,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="65066"> +<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="61952"> <summary> Do not audit attempts to send pktcable_cops_server packets. </summary> @@ -48702,7 +48748,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pktcable_cops_server_packets" lineno="65085"> +<interface name="corenet_receive_pktcable_cops_server_packets" lineno="61971"> <summary> Receive pktcable_cops_server packets. </summary> @@ -48713,7 +48759,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="65104"> +<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="61990"> <summary> Do not audit attempts to receive pktcable_cops_server packets. </summary> @@ -48724,7 +48770,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="65123"> +<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62009"> <summary> Send and receive pktcable_cops_server packets. </summary> @@ -48735,7 +48781,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="65139"> +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62025"> <summary> Do not audit attempts to send and receive pktcable_cops_server packets. </summary> @@ -48746,7 +48792,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="65154"> +<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62040"> <summary> Relabel packets to pktcable_cops_server the packet type. </summary> @@ -48756,7 +48802,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pop_port" lineno="65176"> +<interface name="corenet_tcp_sendrecv_pop_port" lineno="62062"> <summary> Send and receive TCP traffic on the pop port. </summary> @@ -48767,7 +48813,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pop_port" lineno="65195"> +<interface name="corenet_udp_send_pop_port" lineno="62077"> <summary> Send UDP traffic on the pop port. </summary> @@ -48778,7 +48824,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pop_port" lineno="65214"> +<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62092"> <summary> Do not audit attempts to send UDP traffic on the pop port. </summary> @@ -48789,7 +48835,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pop_port" lineno="65233"> +<interface name="corenet_udp_receive_pop_port" lineno="62107"> <summary> Receive UDP traffic on the pop port. </summary> @@ -48800,7 +48846,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="65252"> +<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62122"> <summary> Do not audit attempts to receive UDP traffic on the pop port. </summary> @@ -48811,7 +48857,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pop_port" lineno="65271"> +<interface name="corenet_udp_sendrecv_pop_port" lineno="62137"> <summary> Send and receive UDP traffic on the pop port. </summary> @@ -48822,7 +48868,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="65288"> +<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62153"> <summary> Do not audit attempts to send and receive UDP traffic on the pop port. @@ -48834,7 +48880,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pop_port" lineno="65304"> +<interface name="corenet_tcp_bind_pop_port" lineno="62168"> <summary> Bind TCP sockets to the pop port. </summary> @@ -48845,7 +48891,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pop_port" lineno="65324"> +<interface name="corenet_udp_bind_pop_port" lineno="62188"> <summary> Bind UDP sockets to the pop port. </summary> @@ -48856,7 +48902,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pop_port" lineno="65343"> +<interface name="corenet_tcp_connect_pop_port" lineno="62207"> <summary> Make a TCP connection to the pop port. </summary> @@ -48866,7 +48912,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pop_client_packets" lineno="65363"> +<interface name="corenet_send_pop_client_packets" lineno="62227"> <summary> Send pop_client packets. </summary> @@ -48877,7 +48923,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pop_client_packets" lineno="65382"> +<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62246"> <summary> Do not audit attempts to send pop_client packets. </summary> @@ -48888,7 +48934,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pop_client_packets" lineno="65401"> +<interface name="corenet_receive_pop_client_packets" lineno="62265"> <summary> Receive pop_client packets. </summary> @@ -48899,7 +48945,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="65420"> +<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62284"> <summary> Do not audit attempts to receive pop_client packets. </summary> @@ -48910,7 +48956,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pop_client_packets" lineno="65439"> +<interface name="corenet_sendrecv_pop_client_packets" lineno="62303"> <summary> Send and receive pop_client packets. </summary> @@ -48921,7 +48967,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="65455"> +<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62319"> <summary> Do not audit attempts to send and receive pop_client packets. </summary> @@ -48932,7 +48978,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pop_client_packets" lineno="65470"> +<interface name="corenet_relabelto_pop_client_packets" lineno="62334"> <summary> Relabel packets to pop_client the packet type. </summary> @@ -48942,7 +48988,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pop_server_packets" lineno="65490"> +<interface name="corenet_send_pop_server_packets" lineno="62354"> <summary> Send pop_server packets. </summary> @@ -48953,7 +48999,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pop_server_packets" lineno="65509"> +<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62373"> <summary> Do not audit attempts to send pop_server packets. </summary> @@ -48964,7 +49010,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pop_server_packets" lineno="65528"> +<interface name="corenet_receive_pop_server_packets" lineno="62392"> <summary> Receive pop_server packets. </summary> @@ -48975,7 +49021,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="65547"> +<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62411"> <summary> Do not audit attempts to receive pop_server packets. </summary> @@ -48986,7 +49032,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pop_server_packets" lineno="65566"> +<interface name="corenet_sendrecv_pop_server_packets" lineno="62430"> <summary> Send and receive pop_server packets. </summary> @@ -48997,7 +49043,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="65582"> +<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62446"> <summary> Do not audit attempts to send and receive pop_server packets. </summary> @@ -49008,7 +49054,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pop_server_packets" lineno="65597"> +<interface name="corenet_relabelto_pop_server_packets" lineno="62461"> <summary> Relabel packets to pop_server the packet type. </summary> @@ -49018,7 +49064,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_portmap_port" lineno="65619"> +<interface name="corenet_tcp_sendrecv_portmap_port" lineno="62483"> <summary> Send and receive TCP traffic on the portmap port. </summary> @@ -49029,7 +49075,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_portmap_port" lineno="65638"> +<interface name="corenet_udp_send_portmap_port" lineno="62498"> <summary> Send UDP traffic on the portmap port. </summary> @@ -49040,7 +49086,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="65657"> +<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="62513"> <summary> Do not audit attempts to send UDP traffic on the portmap port. </summary> @@ -49051,7 +49097,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_portmap_port" lineno="65676"> +<interface name="corenet_udp_receive_portmap_port" lineno="62528"> <summary> Receive UDP traffic on the portmap port. </summary> @@ -49062,7 +49108,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="65695"> +<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="62543"> <summary> Do not audit attempts to receive UDP traffic on the portmap port. </summary> @@ -49073,7 +49119,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_portmap_port" lineno="65714"> +<interface name="corenet_udp_sendrecv_portmap_port" lineno="62558"> <summary> Send and receive UDP traffic on the portmap port. </summary> @@ -49084,7 +49130,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="65731"> +<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="62574"> <summary> Do not audit attempts to send and receive UDP traffic on the portmap port. @@ -49096,7 +49142,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_portmap_port" lineno="65747"> +<interface name="corenet_tcp_bind_portmap_port" lineno="62589"> <summary> Bind TCP sockets to the portmap port. </summary> @@ -49107,7 +49153,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_portmap_port" lineno="65767"> +<interface name="corenet_udp_bind_portmap_port" lineno="62609"> <summary> Bind UDP sockets to the portmap port. </summary> @@ -49118,7 +49164,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_portmap_port" lineno="65786"> +<interface name="corenet_tcp_connect_portmap_port" lineno="62628"> <summary> Make a TCP connection to the portmap port. </summary> @@ -49128,7 +49174,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_portmap_client_packets" lineno="65806"> +<interface name="corenet_send_portmap_client_packets" lineno="62648"> <summary> Send portmap_client packets. </summary> @@ -49139,7 +49185,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="65825"> +<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="62667"> <summary> Do not audit attempts to send portmap_client packets. </summary> @@ -49150,7 +49196,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_portmap_client_packets" lineno="65844"> +<interface name="corenet_receive_portmap_client_packets" lineno="62686"> <summary> Receive portmap_client packets. </summary> @@ -49161,7 +49207,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="65863"> +<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="62705"> <summary> Do not audit attempts to receive portmap_client packets. </summary> @@ -49172,7 +49218,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_portmap_client_packets" lineno="65882"> +<interface name="corenet_sendrecv_portmap_client_packets" lineno="62724"> <summary> Send and receive portmap_client packets. </summary> @@ -49183,7 +49229,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="65898"> +<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="62740"> <summary> Do not audit attempts to send and receive portmap_client packets. </summary> @@ -49194,7 +49240,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_portmap_client_packets" lineno="65913"> +<interface name="corenet_relabelto_portmap_client_packets" lineno="62755"> <summary> Relabel packets to portmap_client the packet type. </summary> @@ -49204,7 +49250,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_portmap_server_packets" lineno="65933"> +<interface name="corenet_send_portmap_server_packets" lineno="62775"> <summary> Send portmap_server packets. </summary> @@ -49215,7 +49261,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="65952"> +<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="62794"> <summary> Do not audit attempts to send portmap_server packets. </summary> @@ -49226,7 +49272,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_portmap_server_packets" lineno="65971"> +<interface name="corenet_receive_portmap_server_packets" lineno="62813"> <summary> Receive portmap_server packets. </summary> @@ -49237,7 +49283,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="65990"> +<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="62832"> <summary> Do not audit attempts to receive portmap_server packets. </summary> @@ -49248,7 +49294,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_portmap_server_packets" lineno="66009"> +<interface name="corenet_sendrecv_portmap_server_packets" lineno="62851"> <summary> Send and receive portmap_server packets. </summary> @@ -49259,7 +49305,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="66025"> +<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="62867"> <summary> Do not audit attempts to send and receive portmap_server packets. </summary> @@ -49270,7 +49316,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_portmap_server_packets" lineno="66040"> +<interface name="corenet_relabelto_portmap_server_packets" lineno="62882"> <summary> Relabel packets to portmap_server the packet type. </summary> @@ -49280,7 +49326,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="66062"> +<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="62904"> <summary> Send and receive TCP traffic on the postfix_policyd port. </summary> @@ -49291,7 +49337,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_postfix_policyd_port" lineno="66081"> +<interface name="corenet_udp_send_postfix_policyd_port" lineno="62919"> <summary> Send UDP traffic on the postfix_policyd port. </summary> @@ -49302,7 +49348,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="66100"> +<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="62934"> <summary> Do not audit attempts to send UDP traffic on the postfix_policyd port. </summary> @@ -49313,7 +49359,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_postfix_policyd_port" lineno="66119"> +<interface name="corenet_udp_receive_postfix_policyd_port" lineno="62949"> <summary> Receive UDP traffic on the postfix_policyd port. </summary> @@ -49324,7 +49370,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="66138"> +<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="62964"> <summary> Do not audit attempts to receive UDP traffic on the postfix_policyd port. </summary> @@ -49335,7 +49381,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="66157"> +<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="62979"> <summary> Send and receive UDP traffic on the postfix_policyd port. </summary> @@ -49346,7 +49392,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="66174"> +<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="62995"> <summary> Do not audit attempts to send and receive UDP traffic on the postfix_policyd port. @@ -49358,7 +49404,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="66190"> +<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63010"> <summary> Bind TCP sockets to the postfix_policyd port. </summary> @@ -49369,7 +49415,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_postfix_policyd_port" lineno="66210"> +<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63030"> <summary> Bind UDP sockets to the postfix_policyd port. </summary> @@ -49380,7 +49426,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="66229"> +<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63049"> <summary> Make a TCP connection to the postfix_policyd port. </summary> @@ -49390,7 +49436,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postfix_policyd_client_packets" lineno="66249"> +<interface name="corenet_send_postfix_policyd_client_packets" lineno="63069"> <summary> Send postfix_policyd_client packets. </summary> @@ -49401,7 +49447,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="66268"> +<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63088"> <summary> Do not audit attempts to send postfix_policyd_client packets. </summary> @@ -49412,7 +49458,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postfix_policyd_client_packets" lineno="66287"> +<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63107"> <summary> Receive postfix_policyd_client packets. </summary> @@ -49423,7 +49469,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="66306"> +<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63126"> <summary> Do not audit attempts to receive postfix_policyd_client packets. </summary> @@ -49434,7 +49480,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="66325"> +<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63145"> <summary> Send and receive postfix_policyd_client packets. </summary> @@ -49445,7 +49491,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="66341"> +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63161"> <summary> Do not audit attempts to send and receive postfix_policyd_client packets. </summary> @@ -49456,7 +49502,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="66356"> +<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63176"> <summary> Relabel packets to postfix_policyd_client the packet type. </summary> @@ -49466,7 +49512,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postfix_policyd_server_packets" lineno="66376"> +<interface name="corenet_send_postfix_policyd_server_packets" lineno="63196"> <summary> Send postfix_policyd_server packets. </summary> @@ -49477,7 +49523,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="66395"> +<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63215"> <summary> Do not audit attempts to send postfix_policyd_server packets. </summary> @@ -49488,7 +49534,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postfix_policyd_server_packets" lineno="66414"> +<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63234"> <summary> Receive postfix_policyd_server packets. </summary> @@ -49499,7 +49545,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="66433"> +<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63253"> <summary> Do not audit attempts to receive postfix_policyd_server packets. </summary> @@ -49510,7 +49556,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="66452"> +<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63272"> <summary> Send and receive postfix_policyd_server packets. </summary> @@ -49521,7 +49567,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="66468"> +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63288"> <summary> Do not audit attempts to send and receive postfix_policyd_server packets. </summary> @@ -49532,7 +49578,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="66483"> +<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63303"> <summary> Relabel packets to postfix_policyd_server the packet type. </summary> @@ -49542,7 +49588,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="66505"> +<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63325"> <summary> Send and receive TCP traffic on the postgresql port. </summary> @@ -49553,7 +49599,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_postgresql_port" lineno="66524"> +<interface name="corenet_udp_send_postgresql_port" lineno="63340"> <summary> Send UDP traffic on the postgresql port. </summary> @@ -49564,7 +49610,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="66543"> +<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63355"> <summary> Do not audit attempts to send UDP traffic on the postgresql port. </summary> @@ -49575,7 +49621,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_postgresql_port" lineno="66562"> +<interface name="corenet_udp_receive_postgresql_port" lineno="63370"> <summary> Receive UDP traffic on the postgresql port. </summary> @@ -49586,7 +49632,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="66581"> +<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63385"> <summary> Do not audit attempts to receive UDP traffic on the postgresql port. </summary> @@ -49597,7 +49643,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_postgresql_port" lineno="66600"> +<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63400"> <summary> Send and receive UDP traffic on the postgresql port. </summary> @@ -49608,7 +49654,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="66617"> +<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63416"> <summary> Do not audit attempts to send and receive UDP traffic on the postgresql port. @@ -49620,7 +49666,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_postgresql_port" lineno="66633"> +<interface name="corenet_tcp_bind_postgresql_port" lineno="63431"> <summary> Bind TCP sockets to the postgresql port. </summary> @@ -49631,7 +49677,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_postgresql_port" lineno="66653"> +<interface name="corenet_udp_bind_postgresql_port" lineno="63451"> <summary> Bind UDP sockets to the postgresql port. </summary> @@ -49642,7 +49688,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_postgresql_port" lineno="66672"> +<interface name="corenet_tcp_connect_postgresql_port" lineno="63470"> <summary> Make a TCP connection to the postgresql port. </summary> @@ -49652,7 +49698,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgresql_client_packets" lineno="66692"> +<interface name="corenet_send_postgresql_client_packets" lineno="63490"> <summary> Send postgresql_client packets. </summary> @@ -49663,7 +49709,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="66711"> +<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="63509"> <summary> Do not audit attempts to send postgresql_client packets. </summary> @@ -49674,7 +49720,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgresql_client_packets" lineno="66730"> +<interface name="corenet_receive_postgresql_client_packets" lineno="63528"> <summary> Receive postgresql_client packets. </summary> @@ -49685,7 +49731,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="66749"> +<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="63547"> <summary> Do not audit attempts to receive postgresql_client packets. </summary> @@ -49696,7 +49742,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgresql_client_packets" lineno="66768"> +<interface name="corenet_sendrecv_postgresql_client_packets" lineno="63566"> <summary> Send and receive postgresql_client packets. </summary> @@ -49707,7 +49753,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="66784"> +<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="63582"> <summary> Do not audit attempts to send and receive postgresql_client packets. </summary> @@ -49718,7 +49764,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgresql_client_packets" lineno="66799"> +<interface name="corenet_relabelto_postgresql_client_packets" lineno="63597"> <summary> Relabel packets to postgresql_client the packet type. </summary> @@ -49728,7 +49774,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgresql_server_packets" lineno="66819"> +<interface name="corenet_send_postgresql_server_packets" lineno="63617"> <summary> Send postgresql_server packets. </summary> @@ -49739,7 +49785,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="66838"> +<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="63636"> <summary> Do not audit attempts to send postgresql_server packets. </summary> @@ -49750,7 +49796,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgresql_server_packets" lineno="66857"> +<interface name="corenet_receive_postgresql_server_packets" lineno="63655"> <summary> Receive postgresql_server packets. </summary> @@ -49761,7 +49807,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="66876"> +<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="63674"> <summary> Do not audit attempts to receive postgresql_server packets. </summary> @@ -49772,7 +49818,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgresql_server_packets" lineno="66895"> +<interface name="corenet_sendrecv_postgresql_server_packets" lineno="63693"> <summary> Send and receive postgresql_server packets. </summary> @@ -49783,7 +49829,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="66911"> +<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="63709"> <summary> Do not audit attempts to send and receive postgresql_server packets. </summary> @@ -49794,7 +49840,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgresql_server_packets" lineno="66926"> +<interface name="corenet_relabelto_postgresql_server_packets" lineno="63724"> <summary> Relabel packets to postgresql_server the packet type. </summary> @@ -49804,7 +49850,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="66948"> +<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="63746"> <summary> Send and receive TCP traffic on the postgrey port. </summary> @@ -49815,7 +49861,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_postgrey_port" lineno="66967"> +<interface name="corenet_udp_send_postgrey_port" lineno="63761"> <summary> Send UDP traffic on the postgrey port. </summary> @@ -49826,7 +49872,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="66986"> +<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="63776"> <summary> Do not audit attempts to send UDP traffic on the postgrey port. </summary> @@ -49837,7 +49883,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_postgrey_port" lineno="67005"> +<interface name="corenet_udp_receive_postgrey_port" lineno="63791"> <summary> Receive UDP traffic on the postgrey port. </summary> @@ -49848,7 +49894,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="67024"> +<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="63806"> <summary> Do not audit attempts to receive UDP traffic on the postgrey port. </summary> @@ -49859,7 +49905,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_postgrey_port" lineno="67043"> +<interface name="corenet_udp_sendrecv_postgrey_port" lineno="63821"> <summary> Send and receive UDP traffic on the postgrey port. </summary> @@ -49870,7 +49916,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="67060"> +<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="63837"> <summary> Do not audit attempts to send and receive UDP traffic on the postgrey port. @@ -49882,7 +49928,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_postgrey_port" lineno="67076"> +<interface name="corenet_tcp_bind_postgrey_port" lineno="63852"> <summary> Bind TCP sockets to the postgrey port. </summary> @@ -49893,7 +49939,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_postgrey_port" lineno="67096"> +<interface name="corenet_udp_bind_postgrey_port" lineno="63872"> <summary> Bind UDP sockets to the postgrey port. </summary> @@ -49904,7 +49950,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_postgrey_port" lineno="67115"> +<interface name="corenet_tcp_connect_postgrey_port" lineno="63891"> <summary> Make a TCP connection to the postgrey port. </summary> @@ -49914,7 +49960,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgrey_client_packets" lineno="67135"> +<interface name="corenet_send_postgrey_client_packets" lineno="63911"> <summary> Send postgrey_client packets. </summary> @@ -49925,7 +49971,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="67154"> +<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="63930"> <summary> Do not audit attempts to send postgrey_client packets. </summary> @@ -49936,7 +49982,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgrey_client_packets" lineno="67173"> +<interface name="corenet_receive_postgrey_client_packets" lineno="63949"> <summary> Receive postgrey_client packets. </summary> @@ -49947,7 +49993,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="67192"> +<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="63968"> <summary> Do not audit attempts to receive postgrey_client packets. </summary> @@ -49958,7 +50004,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgrey_client_packets" lineno="67211"> +<interface name="corenet_sendrecv_postgrey_client_packets" lineno="63987"> <summary> Send and receive postgrey_client packets. </summary> @@ -49969,7 +50015,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="67227"> +<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64003"> <summary> Do not audit attempts to send and receive postgrey_client packets. </summary> @@ -49980,7 +50026,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgrey_client_packets" lineno="67242"> +<interface name="corenet_relabelto_postgrey_client_packets" lineno="64018"> <summary> Relabel packets to postgrey_client the packet type. </summary> @@ -49990,7 +50036,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgrey_server_packets" lineno="67262"> +<interface name="corenet_send_postgrey_server_packets" lineno="64038"> <summary> Send postgrey_server packets. </summary> @@ -50001,7 +50047,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="67281"> +<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64057"> <summary> Do not audit attempts to send postgrey_server packets. </summary> @@ -50012,7 +50058,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgrey_server_packets" lineno="67300"> +<interface name="corenet_receive_postgrey_server_packets" lineno="64076"> <summary> Receive postgrey_server packets. </summary> @@ -50023,7 +50069,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="67319"> +<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64095"> <summary> Do not audit attempts to receive postgrey_server packets. </summary> @@ -50034,7 +50080,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgrey_server_packets" lineno="67338"> +<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64114"> <summary> Send and receive postgrey_server packets. </summary> @@ -50045,7 +50091,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="67354"> +<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64130"> <summary> Do not audit attempts to send and receive postgrey_server packets. </summary> @@ -50056,7 +50102,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgrey_server_packets" lineno="67369"> +<interface name="corenet_relabelto_postgrey_server_packets" lineno="64145"> <summary> Relabel packets to postgrey_server the packet type. </summary> @@ -50066,7 +50112,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pptp_port" lineno="67391"> +<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64167"> <summary> Send and receive TCP traffic on the pptp port. </summary> @@ -50077,7 +50123,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pptp_port" lineno="67410"> +<interface name="corenet_udp_send_pptp_port" lineno="64182"> <summary> Send UDP traffic on the pptp port. </summary> @@ -50088,7 +50134,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="67429"> +<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64197"> <summary> Do not audit attempts to send UDP traffic on the pptp port. </summary> @@ -50099,7 +50145,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pptp_port" lineno="67448"> +<interface name="corenet_udp_receive_pptp_port" lineno="64212"> <summary> Receive UDP traffic on the pptp port. </summary> @@ -50110,7 +50156,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="67467"> +<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64227"> <summary> Do not audit attempts to receive UDP traffic on the pptp port. </summary> @@ -50121,7 +50167,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pptp_port" lineno="67486"> +<interface name="corenet_udp_sendrecv_pptp_port" lineno="64242"> <summary> Send and receive UDP traffic on the pptp port. </summary> @@ -50132,7 +50178,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="67503"> +<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64258"> <summary> Do not audit attempts to send and receive UDP traffic on the pptp port. @@ -50144,7 +50190,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pptp_port" lineno="67519"> +<interface name="corenet_tcp_bind_pptp_port" lineno="64273"> <summary> Bind TCP sockets to the pptp port. </summary> @@ -50155,7 +50201,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pptp_port" lineno="67539"> +<interface name="corenet_udp_bind_pptp_port" lineno="64293"> <summary> Bind UDP sockets to the pptp port. </summary> @@ -50166,7 +50212,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pptp_port" lineno="67558"> +<interface name="corenet_tcp_connect_pptp_port" lineno="64312"> <summary> Make a TCP connection to the pptp port. </summary> @@ -50176,7 +50222,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pptp_client_packets" lineno="67578"> +<interface name="corenet_send_pptp_client_packets" lineno="64332"> <summary> Send pptp_client packets. </summary> @@ -50187,7 +50233,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="67597"> +<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64351"> <summary> Do not audit attempts to send pptp_client packets. </summary> @@ -50198,7 +50244,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pptp_client_packets" lineno="67616"> +<interface name="corenet_receive_pptp_client_packets" lineno="64370"> <summary> Receive pptp_client packets. </summary> @@ -50209,7 +50255,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="67635"> +<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64389"> <summary> Do not audit attempts to receive pptp_client packets. </summary> @@ -50220,7 +50266,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pptp_client_packets" lineno="67654"> +<interface name="corenet_sendrecv_pptp_client_packets" lineno="64408"> <summary> Send and receive pptp_client packets. </summary> @@ -50231,7 +50277,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="67670"> +<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64424"> <summary> Do not audit attempts to send and receive pptp_client packets. </summary> @@ -50242,7 +50288,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pptp_client_packets" lineno="67685"> +<interface name="corenet_relabelto_pptp_client_packets" lineno="64439"> <summary> Relabel packets to pptp_client the packet type. </summary> @@ -50252,7 +50298,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pptp_server_packets" lineno="67705"> +<interface name="corenet_send_pptp_server_packets" lineno="64459"> <summary> Send pptp_server packets. </summary> @@ -50263,7 +50309,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="67724"> +<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="64478"> <summary> Do not audit attempts to send pptp_server packets. </summary> @@ -50274,7 +50320,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pptp_server_packets" lineno="67743"> +<interface name="corenet_receive_pptp_server_packets" lineno="64497"> <summary> Receive pptp_server packets. </summary> @@ -50285,7 +50331,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="67762"> +<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="64516"> <summary> Do not audit attempts to receive pptp_server packets. </summary> @@ -50296,7 +50342,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pptp_server_packets" lineno="67781"> +<interface name="corenet_sendrecv_pptp_server_packets" lineno="64535"> <summary> Send and receive pptp_server packets. </summary> @@ -50307,7 +50353,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="67797"> +<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="64551"> <summary> Do not audit attempts to send and receive pptp_server packets. </summary> @@ -50318,7 +50364,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pptp_server_packets" lineno="67812"> +<interface name="corenet_relabelto_pptp_server_packets" lineno="64566"> <summary> Relabel packets to pptp_server the packet type. </summary> @@ -50328,7 +50374,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_prelude_port" lineno="67834"> +<interface name="corenet_tcp_sendrecv_prelude_port" lineno="64588"> <summary> Send and receive TCP traffic on the prelude port. </summary> @@ -50339,7 +50385,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_prelude_port" lineno="67853"> +<interface name="corenet_udp_send_prelude_port" lineno="64603"> <summary> Send UDP traffic on the prelude port. </summary> @@ -50350,7 +50396,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="67872"> +<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="64618"> <summary> Do not audit attempts to send UDP traffic on the prelude port. </summary> @@ -50361,7 +50407,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_prelude_port" lineno="67891"> +<interface name="corenet_udp_receive_prelude_port" lineno="64633"> <summary> Receive UDP traffic on the prelude port. </summary> @@ -50372,7 +50418,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="67910"> +<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="64648"> <summary> Do not audit attempts to receive UDP traffic on the prelude port. </summary> @@ -50383,7 +50429,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_prelude_port" lineno="67929"> +<interface name="corenet_udp_sendrecv_prelude_port" lineno="64663"> <summary> Send and receive UDP traffic on the prelude port. </summary> @@ -50394,7 +50440,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="67946"> +<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="64679"> <summary> Do not audit attempts to send and receive UDP traffic on the prelude port. @@ -50406,7 +50452,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_prelude_port" lineno="67962"> +<interface name="corenet_tcp_bind_prelude_port" lineno="64694"> <summary> Bind TCP sockets to the prelude port. </summary> @@ -50417,7 +50463,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_prelude_port" lineno="67982"> +<interface name="corenet_udp_bind_prelude_port" lineno="64714"> <summary> Bind UDP sockets to the prelude port. </summary> @@ -50428,7 +50474,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_prelude_port" lineno="68001"> +<interface name="corenet_tcp_connect_prelude_port" lineno="64733"> <summary> Make a TCP connection to the prelude port. </summary> @@ -50438,7 +50484,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_prelude_client_packets" lineno="68021"> +<interface name="corenet_send_prelude_client_packets" lineno="64753"> <summary> Send prelude_client packets. </summary> @@ -50449,7 +50495,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="68040"> +<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="64772"> <summary> Do not audit attempts to send prelude_client packets. </summary> @@ -50460,7 +50506,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_prelude_client_packets" lineno="68059"> +<interface name="corenet_receive_prelude_client_packets" lineno="64791"> <summary> Receive prelude_client packets. </summary> @@ -50471,7 +50517,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="68078"> +<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="64810"> <summary> Do not audit attempts to receive prelude_client packets. </summary> @@ -50482,7 +50528,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_prelude_client_packets" lineno="68097"> +<interface name="corenet_sendrecv_prelude_client_packets" lineno="64829"> <summary> Send and receive prelude_client packets. </summary> @@ -50493,7 +50539,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="68113"> +<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="64845"> <summary> Do not audit attempts to send and receive prelude_client packets. </summary> @@ -50504,7 +50550,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_prelude_client_packets" lineno="68128"> +<interface name="corenet_relabelto_prelude_client_packets" lineno="64860"> <summary> Relabel packets to prelude_client the packet type. </summary> @@ -50514,7 +50560,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_prelude_server_packets" lineno="68148"> +<interface name="corenet_send_prelude_server_packets" lineno="64880"> <summary> Send prelude_server packets. </summary> @@ -50525,7 +50571,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="68167"> +<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="64899"> <summary> Do not audit attempts to send prelude_server packets. </summary> @@ -50536,7 +50582,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_prelude_server_packets" lineno="68186"> +<interface name="corenet_receive_prelude_server_packets" lineno="64918"> <summary> Receive prelude_server packets. </summary> @@ -50547,7 +50593,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="68205"> +<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="64937"> <summary> Do not audit attempts to receive prelude_server packets. </summary> @@ -50558,7 +50604,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_prelude_server_packets" lineno="68224"> +<interface name="corenet_sendrecv_prelude_server_packets" lineno="64956"> <summary> Send and receive prelude_server packets. </summary> @@ -50569,7 +50615,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="68240"> +<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="64972"> <summary> Do not audit attempts to send and receive prelude_server packets. </summary> @@ -50580,7 +50626,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_prelude_server_packets" lineno="68255"> +<interface name="corenet_relabelto_prelude_server_packets" lineno="64987"> <summary> Relabel packets to prelude_server the packet type. </summary> @@ -50590,7 +50636,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_presence_port" lineno="68277"> +<interface name="corenet_tcp_sendrecv_presence_port" lineno="65009"> <summary> Send and receive TCP traffic on the presence port. </summary> @@ -50601,7 +50647,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_presence_port" lineno="68296"> +<interface name="corenet_udp_send_presence_port" lineno="65024"> <summary> Send UDP traffic on the presence port. </summary> @@ -50612,7 +50658,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_presence_port" lineno="68315"> +<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65039"> <summary> Do not audit attempts to send UDP traffic on the presence port. </summary> @@ -50623,7 +50669,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_presence_port" lineno="68334"> +<interface name="corenet_udp_receive_presence_port" lineno="65054"> <summary> Receive UDP traffic on the presence port. </summary> @@ -50634,7 +50680,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="68353"> +<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65069"> <summary> Do not audit attempts to receive UDP traffic on the presence port. </summary> @@ -50645,7 +50691,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_presence_port" lineno="68372"> +<interface name="corenet_udp_sendrecv_presence_port" lineno="65084"> <summary> Send and receive UDP traffic on the presence port. </summary> @@ -50656,7 +50702,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="68389"> +<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65100"> <summary> Do not audit attempts to send and receive UDP traffic on the presence port. @@ -50668,7 +50714,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_presence_port" lineno="68405"> +<interface name="corenet_tcp_bind_presence_port" lineno="65115"> <summary> Bind TCP sockets to the presence port. </summary> @@ -50679,7 +50725,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_presence_port" lineno="68425"> +<interface name="corenet_udp_bind_presence_port" lineno="65135"> <summary> Bind UDP sockets to the presence port. </summary> @@ -50690,7 +50736,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_presence_port" lineno="68444"> +<interface name="corenet_tcp_connect_presence_port" lineno="65154"> <summary> Make a TCP connection to the presence port. </summary> @@ -50700,7 +50746,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_presence_client_packets" lineno="68464"> +<interface name="corenet_send_presence_client_packets" lineno="65174"> <summary> Send presence_client packets. </summary> @@ -50711,7 +50757,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_presence_client_packets" lineno="68483"> +<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65193"> <summary> Do not audit attempts to send presence_client packets. </summary> @@ -50722,7 +50768,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_presence_client_packets" lineno="68502"> +<interface name="corenet_receive_presence_client_packets" lineno="65212"> <summary> Receive presence_client packets. </summary> @@ -50733,7 +50779,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="68521"> +<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65231"> <summary> Do not audit attempts to receive presence_client packets. </summary> @@ -50744,7 +50790,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_presence_client_packets" lineno="68540"> +<interface name="corenet_sendrecv_presence_client_packets" lineno="65250"> <summary> Send and receive presence_client packets. </summary> @@ -50755,7 +50801,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="68556"> +<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65266"> <summary> Do not audit attempts to send and receive presence_client packets. </summary> @@ -50766,7 +50812,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_presence_client_packets" lineno="68571"> +<interface name="corenet_relabelto_presence_client_packets" lineno="65281"> <summary> Relabel packets to presence_client the packet type. </summary> @@ -50776,7 +50822,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_presence_server_packets" lineno="68591"> +<interface name="corenet_send_presence_server_packets" lineno="65301"> <summary> Send presence_server packets. </summary> @@ -50787,7 +50833,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_presence_server_packets" lineno="68610"> +<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65320"> <summary> Do not audit attempts to send presence_server packets. </summary> @@ -50798,7 +50844,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_presence_server_packets" lineno="68629"> +<interface name="corenet_receive_presence_server_packets" lineno="65339"> <summary> Receive presence_server packets. </summary> @@ -50809,7 +50855,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="68648"> +<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65358"> <summary> Do not audit attempts to receive presence_server packets. </summary> @@ -50820,7 +50866,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_presence_server_packets" lineno="68667"> +<interface name="corenet_sendrecv_presence_server_packets" lineno="65377"> <summary> Send and receive presence_server packets. </summary> @@ -50831,7 +50877,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="68683"> +<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65393"> <summary> Do not audit attempts to send and receive presence_server packets. </summary> @@ -50842,7 +50888,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_presence_server_packets" lineno="68698"> +<interface name="corenet_relabelto_presence_server_packets" lineno="65408"> <summary> Relabel packets to presence_server the packet type. </summary> @@ -50852,7 +50898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_printer_port" lineno="68720"> +<interface name="corenet_tcp_sendrecv_printer_port" lineno="65430"> <summary> Send and receive TCP traffic on the printer port. </summary> @@ -50863,7 +50909,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_printer_port" lineno="68739"> +<interface name="corenet_udp_send_printer_port" lineno="65445"> <summary> Send UDP traffic on the printer port. </summary> @@ -50874,7 +50920,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_printer_port" lineno="68758"> +<interface name="corenet_dontaudit_udp_send_printer_port" lineno="65460"> <summary> Do not audit attempts to send UDP traffic on the printer port. </summary> @@ -50885,7 +50931,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_printer_port" lineno="68777"> +<interface name="corenet_udp_receive_printer_port" lineno="65475"> <summary> Receive UDP traffic on the printer port. </summary> @@ -50896,7 +50942,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="68796"> +<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="65490"> <summary> Do not audit attempts to receive UDP traffic on the printer port. </summary> @@ -50907,7 +50953,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_printer_port" lineno="68815"> +<interface name="corenet_udp_sendrecv_printer_port" lineno="65505"> <summary> Send and receive UDP traffic on the printer port. </summary> @@ -50918,7 +50964,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="68832"> +<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="65521"> <summary> Do not audit attempts to send and receive UDP traffic on the printer port. @@ -50930,7 +50976,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_printer_port" lineno="68848"> +<interface name="corenet_tcp_bind_printer_port" lineno="65536"> <summary> Bind TCP sockets to the printer port. </summary> @@ -50941,7 +50987,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_printer_port" lineno="68868"> +<interface name="corenet_udp_bind_printer_port" lineno="65556"> <summary> Bind UDP sockets to the printer port. </summary> @@ -50952,7 +50998,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_printer_port" lineno="68887"> +<interface name="corenet_tcp_connect_printer_port" lineno="65575"> <summary> Make a TCP connection to the printer port. </summary> @@ -50962,7 +51008,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_printer_client_packets" lineno="68907"> +<interface name="corenet_send_printer_client_packets" lineno="65595"> <summary> Send printer_client packets. </summary> @@ -50973,7 +51019,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_printer_client_packets" lineno="68926"> +<interface name="corenet_dontaudit_send_printer_client_packets" lineno="65614"> <summary> Do not audit attempts to send printer_client packets. </summary> @@ -50984,7 +51030,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_printer_client_packets" lineno="68945"> +<interface name="corenet_receive_printer_client_packets" lineno="65633"> <summary> Receive printer_client packets. </summary> @@ -50995,7 +51041,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="68964"> +<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="65652"> <summary> Do not audit attempts to receive printer_client packets. </summary> @@ -51006,7 +51052,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_printer_client_packets" lineno="68983"> +<interface name="corenet_sendrecv_printer_client_packets" lineno="65671"> <summary> Send and receive printer_client packets. </summary> @@ -51017,7 +51063,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="68999"> +<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="65687"> <summary> Do not audit attempts to send and receive printer_client packets. </summary> @@ -51028,7 +51074,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_printer_client_packets" lineno="69014"> +<interface name="corenet_relabelto_printer_client_packets" lineno="65702"> <summary> Relabel packets to printer_client the packet type. </summary> @@ -51038,7 +51084,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_printer_server_packets" lineno="69034"> +<interface name="corenet_send_printer_server_packets" lineno="65722"> <summary> Send printer_server packets. </summary> @@ -51049,7 +51095,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_printer_server_packets" lineno="69053"> +<interface name="corenet_dontaudit_send_printer_server_packets" lineno="65741"> <summary> Do not audit attempts to send printer_server packets. </summary> @@ -51060,7 +51106,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_printer_server_packets" lineno="69072"> +<interface name="corenet_receive_printer_server_packets" lineno="65760"> <summary> Receive printer_server packets. </summary> @@ -51071,7 +51117,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="69091"> +<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="65779"> <summary> Do not audit attempts to receive printer_server packets. </summary> @@ -51082,7 +51128,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_printer_server_packets" lineno="69110"> +<interface name="corenet_sendrecv_printer_server_packets" lineno="65798"> <summary> Send and receive printer_server packets. </summary> @@ -51093,7 +51139,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="69126"> +<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="65814"> <summary> Do not audit attempts to send and receive printer_server packets. </summary> @@ -51104,7 +51150,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_printer_server_packets" lineno="69141"> +<interface name="corenet_relabelto_printer_server_packets" lineno="65829"> <summary> Relabel packets to printer_server the packet type. </summary> @@ -51114,7 +51160,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ptal_port" lineno="69163"> +<interface name="corenet_tcp_sendrecv_ptal_port" lineno="65851"> <summary> Send and receive TCP traffic on the ptal port. </summary> @@ -51125,7 +51171,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ptal_port" lineno="69182"> +<interface name="corenet_udp_send_ptal_port" lineno="65866"> <summary> Send UDP traffic on the ptal port. </summary> @@ -51136,7 +51182,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="69201"> +<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="65881"> <summary> Do not audit attempts to send UDP traffic on the ptal port. </summary> @@ -51147,7 +51193,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ptal_port" lineno="69220"> +<interface name="corenet_udp_receive_ptal_port" lineno="65896"> <summary> Receive UDP traffic on the ptal port. </summary> @@ -51158,7 +51204,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="69239"> +<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="65911"> <summary> Do not audit attempts to receive UDP traffic on the ptal port. </summary> @@ -51169,7 +51215,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ptal_port" lineno="69258"> +<interface name="corenet_udp_sendrecv_ptal_port" lineno="65926"> <summary> Send and receive UDP traffic on the ptal port. </summary> @@ -51180,7 +51226,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="69275"> +<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="65942"> <summary> Do not audit attempts to send and receive UDP traffic on the ptal port. @@ -51192,7 +51238,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ptal_port" lineno="69291"> +<interface name="corenet_tcp_bind_ptal_port" lineno="65957"> <summary> Bind TCP sockets to the ptal port. </summary> @@ -51203,7 +51249,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ptal_port" lineno="69311"> +<interface name="corenet_udp_bind_ptal_port" lineno="65977"> <summary> Bind UDP sockets to the ptal port. </summary> @@ -51214,7 +51260,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ptal_port" lineno="69330"> +<interface name="corenet_tcp_connect_ptal_port" lineno="65996"> <summary> Make a TCP connection to the ptal port. </summary> @@ -51224,7 +51270,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ptal_client_packets" lineno="69350"> +<interface name="corenet_send_ptal_client_packets" lineno="66016"> <summary> Send ptal_client packets. </summary> @@ -51235,7 +51281,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="69369"> +<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66035"> <summary> Do not audit attempts to send ptal_client packets. </summary> @@ -51246,7 +51292,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ptal_client_packets" lineno="69388"> +<interface name="corenet_receive_ptal_client_packets" lineno="66054"> <summary> Receive ptal_client packets. </summary> @@ -51257,7 +51303,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="69407"> +<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66073"> <summary> Do not audit attempts to receive ptal_client packets. </summary> @@ -51268,7 +51314,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ptal_client_packets" lineno="69426"> +<interface name="corenet_sendrecv_ptal_client_packets" lineno="66092"> <summary> Send and receive ptal_client packets. </summary> @@ -51279,7 +51325,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="69442"> +<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66108"> <summary> Do not audit attempts to send and receive ptal_client packets. </summary> @@ -51290,7 +51336,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ptal_client_packets" lineno="69457"> +<interface name="corenet_relabelto_ptal_client_packets" lineno="66123"> <summary> Relabel packets to ptal_client the packet type. </summary> @@ -51300,7 +51346,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ptal_server_packets" lineno="69477"> +<interface name="corenet_send_ptal_server_packets" lineno="66143"> <summary> Send ptal_server packets. </summary> @@ -51311,7 +51357,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="69496"> +<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66162"> <summary> Do not audit attempts to send ptal_server packets. </summary> @@ -51322,7 +51368,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ptal_server_packets" lineno="69515"> +<interface name="corenet_receive_ptal_server_packets" lineno="66181"> <summary> Receive ptal_server packets. </summary> @@ -51333,7 +51379,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="69534"> +<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66200"> <summary> Do not audit attempts to receive ptal_server packets. </summary> @@ -51344,7 +51390,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ptal_server_packets" lineno="69553"> +<interface name="corenet_sendrecv_ptal_server_packets" lineno="66219"> <summary> Send and receive ptal_server packets. </summary> @@ -51355,7 +51401,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="69569"> +<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66235"> <summary> Do not audit attempts to send and receive ptal_server packets. </summary> @@ -51366,7 +51412,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ptal_server_packets" lineno="69584"> +<interface name="corenet_relabelto_ptal_server_packets" lineno="66250"> <summary> Relabel packets to ptal_server the packet type. </summary> @@ -51376,7 +51422,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="69606"> +<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66272"> <summary> Send and receive TCP traffic on the pulseaudio port. </summary> @@ -51387,7 +51433,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pulseaudio_port" lineno="69625"> +<interface name="corenet_udp_send_pulseaudio_port" lineno="66287"> <summary> Send UDP traffic on the pulseaudio port. </summary> @@ -51398,7 +51444,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="69644"> +<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66302"> <summary> Do not audit attempts to send UDP traffic on the pulseaudio port. </summary> @@ -51409,7 +51455,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pulseaudio_port" lineno="69663"> +<interface name="corenet_udp_receive_pulseaudio_port" lineno="66317"> <summary> Receive UDP traffic on the pulseaudio port. </summary> @@ -51420,7 +51466,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="69682"> +<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66332"> <summary> Do not audit attempts to receive UDP traffic on the pulseaudio port. </summary> @@ -51431,7 +51477,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="69701"> +<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66347"> <summary> Send and receive UDP traffic on the pulseaudio port. </summary> @@ -51442,7 +51488,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="69718"> +<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66363"> <summary> Do not audit attempts to send and receive UDP traffic on the pulseaudio port. @@ -51454,7 +51500,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pulseaudio_port" lineno="69734"> +<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66378"> <summary> Bind TCP sockets to the pulseaudio port. </summary> @@ -51465,7 +51511,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pulseaudio_port" lineno="69754"> +<interface name="corenet_udp_bind_pulseaudio_port" lineno="66398"> <summary> Bind UDP sockets to the pulseaudio port. </summary> @@ -51476,7 +51522,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pulseaudio_port" lineno="69773"> +<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66417"> <summary> Make a TCP connection to the pulseaudio port. </summary> @@ -51486,7 +51532,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pulseaudio_client_packets" lineno="69793"> +<interface name="corenet_send_pulseaudio_client_packets" lineno="66437"> <summary> Send pulseaudio_client packets. </summary> @@ -51497,7 +51543,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="69812"> +<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="66456"> <summary> Do not audit attempts to send pulseaudio_client packets. </summary> @@ -51508,7 +51554,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pulseaudio_client_packets" lineno="69831"> +<interface name="corenet_receive_pulseaudio_client_packets" lineno="66475"> <summary> Receive pulseaudio_client packets. </summary> @@ -51519,7 +51565,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="69850"> +<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="66494"> <summary> Do not audit attempts to receive pulseaudio_client packets. </summary> @@ -51530,7 +51576,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="69869"> +<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="66513"> <summary> Send and receive pulseaudio_client packets. </summary> @@ -51541,7 +51587,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="69885"> +<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="66529"> <summary> Do not audit attempts to send and receive pulseaudio_client packets. </summary> @@ -51552,7 +51598,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="69900"> +<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="66544"> <summary> Relabel packets to pulseaudio_client the packet type. </summary> @@ -51562,7 +51608,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pulseaudio_server_packets" lineno="69920"> +<interface name="corenet_send_pulseaudio_server_packets" lineno="66564"> <summary> Send pulseaudio_server packets. </summary> @@ -51573,7 +51619,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="69939"> +<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="66583"> <summary> Do not audit attempts to send pulseaudio_server packets. </summary> @@ -51584,7 +51630,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pulseaudio_server_packets" lineno="69958"> +<interface name="corenet_receive_pulseaudio_server_packets" lineno="66602"> <summary> Receive pulseaudio_server packets. </summary> @@ -51595,7 +51641,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="69977"> +<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="66621"> <summary> Do not audit attempts to receive pulseaudio_server packets. </summary> @@ -51606,7 +51652,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="69996"> +<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="66640"> <summary> Send and receive pulseaudio_server packets. </summary> @@ -51617,7 +51663,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="70012"> +<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="66656"> <summary> Do not audit attempts to send and receive pulseaudio_server packets. </summary> @@ -51628,7 +51674,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="70027"> +<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="66671"> <summary> Relabel packets to pulseaudio_server the packet type. </summary> @@ -51638,7 +51684,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_puppet_port" lineno="70049"> +<interface name="corenet_tcp_sendrecv_puppet_port" lineno="66693"> <summary> Send and receive TCP traffic on the puppet port. </summary> @@ -51649,7 +51695,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_puppet_port" lineno="70068"> +<interface name="corenet_udp_send_puppet_port" lineno="66708"> <summary> Send UDP traffic on the puppet port. </summary> @@ -51660,7 +51706,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="70087"> +<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="66723"> <summary> Do not audit attempts to send UDP traffic on the puppet port. </summary> @@ -51671,7 +51717,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_puppet_port" lineno="70106"> +<interface name="corenet_udp_receive_puppet_port" lineno="66738"> <summary> Receive UDP traffic on the puppet port. </summary> @@ -51682,7 +51728,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="70125"> +<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="66753"> <summary> Do not audit attempts to receive UDP traffic on the puppet port. </summary> @@ -51693,7 +51739,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_puppet_port" lineno="70144"> +<interface name="corenet_udp_sendrecv_puppet_port" lineno="66768"> <summary> Send and receive UDP traffic on the puppet port. </summary> @@ -51704,7 +51750,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="70161"> +<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="66784"> <summary> Do not audit attempts to send and receive UDP traffic on the puppet port. @@ -51716,7 +51762,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_puppet_port" lineno="70177"> +<interface name="corenet_tcp_bind_puppet_port" lineno="66799"> <summary> Bind TCP sockets to the puppet port. </summary> @@ -51727,7 +51773,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_puppet_port" lineno="70197"> +<interface name="corenet_udp_bind_puppet_port" lineno="66819"> <summary> Bind UDP sockets to the puppet port. </summary> @@ -51738,7 +51784,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_puppet_port" lineno="70216"> +<interface name="corenet_tcp_connect_puppet_port" lineno="66838"> <summary> Make a TCP connection to the puppet port. </summary> @@ -51748,7 +51794,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppet_client_packets" lineno="70236"> +<interface name="corenet_send_puppet_client_packets" lineno="66858"> <summary> Send puppet_client packets. </summary> @@ -51759,7 +51805,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="70255"> +<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="66877"> <summary> Do not audit attempts to send puppet_client packets. </summary> @@ -51770,7 +51816,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppet_client_packets" lineno="70274"> +<interface name="corenet_receive_puppet_client_packets" lineno="66896"> <summary> Receive puppet_client packets. </summary> @@ -51781,7 +51827,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="70293"> +<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="66915"> <summary> Do not audit attempts to receive puppet_client packets. </summary> @@ -51792,7 +51838,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppet_client_packets" lineno="70312"> +<interface name="corenet_sendrecv_puppet_client_packets" lineno="66934"> <summary> Send and receive puppet_client packets. </summary> @@ -51803,7 +51849,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="70328"> +<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="66950"> <summary> Do not audit attempts to send and receive puppet_client packets. </summary> @@ -51814,7 +51860,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppet_client_packets" lineno="70343"> +<interface name="corenet_relabelto_puppet_client_packets" lineno="66965"> <summary> Relabel packets to puppet_client the packet type. </summary> @@ -51824,7 +51870,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppet_server_packets" lineno="70363"> +<interface name="corenet_send_puppet_server_packets" lineno="66985"> <summary> Send puppet_server packets. </summary> @@ -51835,7 +51881,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="70382"> +<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67004"> <summary> Do not audit attempts to send puppet_server packets. </summary> @@ -51846,7 +51892,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppet_server_packets" lineno="70401"> +<interface name="corenet_receive_puppet_server_packets" lineno="67023"> <summary> Receive puppet_server packets. </summary> @@ -51857,7 +51903,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="70420"> +<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67042"> <summary> Do not audit attempts to receive puppet_server packets. </summary> @@ -51868,7 +51914,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppet_server_packets" lineno="70439"> +<interface name="corenet_sendrecv_puppet_server_packets" lineno="67061"> <summary> Send and receive puppet_server packets. </summary> @@ -51879,7 +51925,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="70455"> +<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67077"> <summary> Do not audit attempts to send and receive puppet_server packets. </summary> @@ -51890,7 +51936,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppet_server_packets" lineno="70470"> +<interface name="corenet_relabelto_puppet_server_packets" lineno="67092"> <summary> Relabel packets to puppet_server the packet type. </summary> @@ -51900,7 +51946,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="70492"> +<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67114"> <summary> Send and receive TCP traffic on the puppetclient port. </summary> @@ -51911,7 +51957,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_puppetclient_port" lineno="70511"> +<interface name="corenet_udp_send_puppetclient_port" lineno="67129"> <summary> Send UDP traffic on the puppetclient port. </summary> @@ -51922,7 +51968,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="70530"> +<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67144"> <summary> Do not audit attempts to send UDP traffic on the puppetclient port. </summary> @@ -51933,7 +51979,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_puppetclient_port" lineno="70549"> +<interface name="corenet_udp_receive_puppetclient_port" lineno="67159"> <summary> Receive UDP traffic on the puppetclient port. </summary> @@ -51944,7 +51990,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="70568"> +<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67174"> <summary> Do not audit attempts to receive UDP traffic on the puppetclient port. </summary> @@ -51955,7 +52001,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="70587"> +<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67189"> <summary> Send and receive UDP traffic on the puppetclient port. </summary> @@ -51966,7 +52012,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="70604"> +<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67205"> <summary> Do not audit attempts to send and receive UDP traffic on the puppetclient port. @@ -51978,7 +52024,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_puppetclient_port" lineno="70620"> +<interface name="corenet_tcp_bind_puppetclient_port" lineno="67220"> <summary> Bind TCP sockets to the puppetclient port. </summary> @@ -51989,7 +52035,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_puppetclient_port" lineno="70640"> +<interface name="corenet_udp_bind_puppetclient_port" lineno="67240"> <summary> Bind UDP sockets to the puppetclient port. </summary> @@ -52000,7 +52046,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_puppetclient_port" lineno="70659"> +<interface name="corenet_tcp_connect_puppetclient_port" lineno="67259"> <summary> Make a TCP connection to the puppetclient port. </summary> @@ -52010,7 +52056,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppetclient_client_packets" lineno="70679"> +<interface name="corenet_send_puppetclient_client_packets" lineno="67279"> <summary> Send puppetclient_client packets. </summary> @@ -52021,7 +52067,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="70698"> +<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67298"> <summary> Do not audit attempts to send puppetclient_client packets. </summary> @@ -52032,7 +52078,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppetclient_client_packets" lineno="70717"> +<interface name="corenet_receive_puppetclient_client_packets" lineno="67317"> <summary> Receive puppetclient_client packets. </summary> @@ -52043,7 +52089,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="70736"> +<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67336"> <summary> Do not audit attempts to receive puppetclient_client packets. </summary> @@ -52054,7 +52100,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="70755"> +<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67355"> <summary> Send and receive puppetclient_client packets. </summary> @@ -52065,7 +52111,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="70771"> +<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67371"> <summary> Do not audit attempts to send and receive puppetclient_client packets. </summary> @@ -52076,7 +52122,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppetclient_client_packets" lineno="70786"> +<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67386"> <summary> Relabel packets to puppetclient_client the packet type. </summary> @@ -52086,7 +52132,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppetclient_server_packets" lineno="70806"> +<interface name="corenet_send_puppetclient_server_packets" lineno="67406"> <summary> Send puppetclient_server packets. </summary> @@ -52097,7 +52143,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="70825"> +<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67425"> <summary> Do not audit attempts to send puppetclient_server packets. </summary> @@ -52108,7 +52154,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppetclient_server_packets" lineno="70844"> +<interface name="corenet_receive_puppetclient_server_packets" lineno="67444"> <summary> Receive puppetclient_server packets. </summary> @@ -52119,7 +52165,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="70863"> +<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="67463"> <summary> Do not audit attempts to receive puppetclient_server packets. </summary> @@ -52130,7 +52176,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="70882"> +<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="67482"> <summary> Send and receive puppetclient_server packets. </summary> @@ -52141,7 +52187,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="70898"> +<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="67498"> <summary> Do not audit attempts to send and receive puppetclient_server packets. </summary> @@ -52152,7 +52198,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppetclient_server_packets" lineno="70913"> +<interface name="corenet_relabelto_puppetclient_server_packets" lineno="67513"> <summary> Relabel packets to puppetclient_server the packet type. </summary> @@ -52162,7 +52208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pxe_port" lineno="70935"> +<interface name="corenet_tcp_sendrecv_pxe_port" lineno="67535"> <summary> Send and receive TCP traffic on the pxe port. </summary> @@ -52173,7 +52219,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pxe_port" lineno="70954"> +<interface name="corenet_udp_send_pxe_port" lineno="67550"> <summary> Send UDP traffic on the pxe port. </summary> @@ -52184,7 +52230,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="70973"> +<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="67565"> <summary> Do not audit attempts to send UDP traffic on the pxe port. </summary> @@ -52195,7 +52241,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pxe_port" lineno="70992"> +<interface name="corenet_udp_receive_pxe_port" lineno="67580"> <summary> Receive UDP traffic on the pxe port. </summary> @@ -52206,7 +52252,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="71011"> +<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="67595"> <summary> Do not audit attempts to receive UDP traffic on the pxe port. </summary> @@ -52217,7 +52263,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pxe_port" lineno="71030"> +<interface name="corenet_udp_sendrecv_pxe_port" lineno="67610"> <summary> Send and receive UDP traffic on the pxe port. </summary> @@ -52228,7 +52274,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="71047"> +<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="67626"> <summary> Do not audit attempts to send and receive UDP traffic on the pxe port. @@ -52240,7 +52286,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pxe_port" lineno="71063"> +<interface name="corenet_tcp_bind_pxe_port" lineno="67641"> <summary> Bind TCP sockets to the pxe port. </summary> @@ -52251,7 +52297,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pxe_port" lineno="71083"> +<interface name="corenet_udp_bind_pxe_port" lineno="67661"> <summary> Bind UDP sockets to the pxe port. </summary> @@ -52262,7 +52308,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pxe_port" lineno="71102"> +<interface name="corenet_tcp_connect_pxe_port" lineno="67680"> <summary> Make a TCP connection to the pxe port. </summary> @@ -52272,7 +52318,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pxe_client_packets" lineno="71122"> +<interface name="corenet_send_pxe_client_packets" lineno="67700"> <summary> Send pxe_client packets. </summary> @@ -52283,7 +52329,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="71141"> +<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="67719"> <summary> Do not audit attempts to send pxe_client packets. </summary> @@ -52294,7 +52340,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pxe_client_packets" lineno="71160"> +<interface name="corenet_receive_pxe_client_packets" lineno="67738"> <summary> Receive pxe_client packets. </summary> @@ -52305,7 +52351,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="71179"> +<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="67757"> <summary> Do not audit attempts to receive pxe_client packets. </summary> @@ -52316,7 +52362,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pxe_client_packets" lineno="71198"> +<interface name="corenet_sendrecv_pxe_client_packets" lineno="67776"> <summary> Send and receive pxe_client packets. </summary> @@ -52327,7 +52373,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="71214"> +<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="67792"> <summary> Do not audit attempts to send and receive pxe_client packets. </summary> @@ -52338,7 +52384,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pxe_client_packets" lineno="71229"> +<interface name="corenet_relabelto_pxe_client_packets" lineno="67807"> <summary> Relabel packets to pxe_client the packet type. </summary> @@ -52348,7 +52394,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pxe_server_packets" lineno="71249"> +<interface name="corenet_send_pxe_server_packets" lineno="67827"> <summary> Send pxe_server packets. </summary> @@ -52359,7 +52405,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="71268"> +<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="67846"> <summary> Do not audit attempts to send pxe_server packets. </summary> @@ -52370,7 +52416,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pxe_server_packets" lineno="71287"> +<interface name="corenet_receive_pxe_server_packets" lineno="67865"> <summary> Receive pxe_server packets. </summary> @@ -52381,7 +52427,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="71306"> +<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="67884"> <summary> Do not audit attempts to receive pxe_server packets. </summary> @@ -52392,7 +52438,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pxe_server_packets" lineno="71325"> +<interface name="corenet_sendrecv_pxe_server_packets" lineno="67903"> <summary> Send and receive pxe_server packets. </summary> @@ -52403,7 +52449,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="71341"> +<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="67919"> <summary> Do not audit attempts to send and receive pxe_server packets. </summary> @@ -52414,7 +52460,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pxe_server_packets" lineno="71356"> +<interface name="corenet_relabelto_pxe_server_packets" lineno="67934"> <summary> Relabel packets to pxe_server the packet type. </summary> @@ -52424,7 +52470,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="71378"> +<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="67956"> <summary> Send and receive TCP traffic on the pyzor port. </summary> @@ -52435,7 +52481,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pyzor_port" lineno="71397"> +<interface name="corenet_udp_send_pyzor_port" lineno="67971"> <summary> Send UDP traffic on the pyzor port. </summary> @@ -52446,7 +52492,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="71416"> +<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="67986"> <summary> Do not audit attempts to send UDP traffic on the pyzor port. </summary> @@ -52457,7 +52503,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pyzor_port" lineno="71435"> +<interface name="corenet_udp_receive_pyzor_port" lineno="68001"> <summary> Receive UDP traffic on the pyzor port. </summary> @@ -52468,7 +52514,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="71454"> +<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68016"> <summary> Do not audit attempts to receive UDP traffic on the pyzor port. </summary> @@ -52479,7 +52525,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pyzor_port" lineno="71473"> +<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68031"> <summary> Send and receive UDP traffic on the pyzor port. </summary> @@ -52490,7 +52536,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="71490"> +<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68047"> <summary> Do not audit attempts to send and receive UDP traffic on the pyzor port. @@ -52502,7 +52548,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pyzor_port" lineno="71506"> +<interface name="corenet_tcp_bind_pyzor_port" lineno="68062"> <summary> Bind TCP sockets to the pyzor port. </summary> @@ -52513,7 +52559,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pyzor_port" lineno="71526"> +<interface name="corenet_udp_bind_pyzor_port" lineno="68082"> <summary> Bind UDP sockets to the pyzor port. </summary> @@ -52524,7 +52570,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pyzor_port" lineno="71545"> +<interface name="corenet_tcp_connect_pyzor_port" lineno="68101"> <summary> Make a TCP connection to the pyzor port. </summary> @@ -52534,7 +52580,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pyzor_client_packets" lineno="71565"> +<interface name="corenet_send_pyzor_client_packets" lineno="68121"> <summary> Send pyzor_client packets. </summary> @@ -52545,7 +52591,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="71584"> +<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68140"> <summary> Do not audit attempts to send pyzor_client packets. </summary> @@ -52556,7 +52602,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pyzor_client_packets" lineno="71603"> +<interface name="corenet_receive_pyzor_client_packets" lineno="68159"> <summary> Receive pyzor_client packets. </summary> @@ -52567,7 +52613,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="71622"> +<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68178"> <summary> Do not audit attempts to receive pyzor_client packets. </summary> @@ -52578,7 +52624,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pyzor_client_packets" lineno="71641"> +<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68197"> <summary> Send and receive pyzor_client packets. </summary> @@ -52589,7 +52635,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="71657"> +<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68213"> <summary> Do not audit attempts to send and receive pyzor_client packets. </summary> @@ -52600,7 +52646,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pyzor_client_packets" lineno="71672"> +<interface name="corenet_relabelto_pyzor_client_packets" lineno="68228"> <summary> Relabel packets to pyzor_client the packet type. </summary> @@ -52610,7 +52656,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pyzor_server_packets" lineno="71692"> +<interface name="corenet_send_pyzor_server_packets" lineno="68248"> <summary> Send pyzor_server packets. </summary> @@ -52621,7 +52667,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="71711"> +<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68267"> <summary> Do not audit attempts to send pyzor_server packets. </summary> @@ -52632,7 +52678,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pyzor_server_packets" lineno="71730"> +<interface name="corenet_receive_pyzor_server_packets" lineno="68286"> <summary> Receive pyzor_server packets. </summary> @@ -52643,7 +52689,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="71749"> +<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68305"> <summary> Do not audit attempts to receive pyzor_server packets. </summary> @@ -52654,7 +52700,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pyzor_server_packets" lineno="71768"> +<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68324"> <summary> Send and receive pyzor_server packets. </summary> @@ -52665,7 +52711,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="71784"> +<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68340"> <summary> Do not audit attempts to send and receive pyzor_server packets. </summary> @@ -52676,7 +52722,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pyzor_server_packets" lineno="71799"> +<interface name="corenet_relabelto_pyzor_server_packets" lineno="68355"> <summary> Relabel packets to pyzor_server the packet type. </summary> @@ -52686,7 +52732,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_radacct_port" lineno="71821"> +<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68377"> <summary> Send and receive TCP traffic on the radacct port. </summary> @@ -52697,7 +52743,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_radacct_port" lineno="71840"> +<interface name="corenet_udp_send_radacct_port" lineno="68392"> <summary> Send UDP traffic on the radacct port. </summary> @@ -52708,7 +52754,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="71859"> +<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68407"> <summary> Do not audit attempts to send UDP traffic on the radacct port. </summary> @@ -52719,7 +52765,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_radacct_port" lineno="71878"> +<interface name="corenet_udp_receive_radacct_port" lineno="68422"> <summary> Receive UDP traffic on the radacct port. </summary> @@ -52730,7 +52776,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="71897"> +<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68437"> <summary> Do not audit attempts to receive UDP traffic on the radacct port. </summary> @@ -52741,7 +52787,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_radacct_port" lineno="71916"> +<interface name="corenet_udp_sendrecv_radacct_port" lineno="68452"> <summary> Send and receive UDP traffic on the radacct port. </summary> @@ -52752,7 +52798,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="71933"> +<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="68468"> <summary> Do not audit attempts to send and receive UDP traffic on the radacct port. @@ -52764,7 +52810,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_radacct_port" lineno="71949"> +<interface name="corenet_tcp_bind_radacct_port" lineno="68483"> <summary> Bind TCP sockets to the radacct port. </summary> @@ -52775,7 +52821,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_radacct_port" lineno="71969"> +<interface name="corenet_udp_bind_radacct_port" lineno="68503"> <summary> Bind UDP sockets to the radacct port. </summary> @@ -52786,7 +52832,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_radacct_port" lineno="71988"> +<interface name="corenet_tcp_connect_radacct_port" lineno="68522"> <summary> Make a TCP connection to the radacct port. </summary> @@ -52796,7 +52842,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radacct_client_packets" lineno="72008"> +<interface name="corenet_send_radacct_client_packets" lineno="68542"> <summary> Send radacct_client packets. </summary> @@ -52807,7 +52853,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="72027"> +<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="68561"> <summary> Do not audit attempts to send radacct_client packets. </summary> @@ -52818,7 +52864,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radacct_client_packets" lineno="72046"> +<interface name="corenet_receive_radacct_client_packets" lineno="68580"> <summary> Receive radacct_client packets. </summary> @@ -52829,7 +52875,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="72065"> +<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="68599"> <summary> Do not audit attempts to receive radacct_client packets. </summary> @@ -52840,7 +52886,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radacct_client_packets" lineno="72084"> +<interface name="corenet_sendrecv_radacct_client_packets" lineno="68618"> <summary> Send and receive radacct_client packets. </summary> @@ -52851,7 +52897,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="72100"> +<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="68634"> <summary> Do not audit attempts to send and receive radacct_client packets. </summary> @@ -52862,7 +52908,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radacct_client_packets" lineno="72115"> +<interface name="corenet_relabelto_radacct_client_packets" lineno="68649"> <summary> Relabel packets to radacct_client the packet type. </summary> @@ -52872,7 +52918,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radacct_server_packets" lineno="72135"> +<interface name="corenet_send_radacct_server_packets" lineno="68669"> <summary> Send radacct_server packets. </summary> @@ -52883,7 +52929,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="72154"> +<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="68688"> <summary> Do not audit attempts to send radacct_server packets. </summary> @@ -52894,7 +52940,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radacct_server_packets" lineno="72173"> +<interface name="corenet_receive_radacct_server_packets" lineno="68707"> <summary> Receive radacct_server packets. </summary> @@ -52905,7 +52951,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="72192"> +<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="68726"> <summary> Do not audit attempts to receive radacct_server packets. </summary> @@ -52916,7 +52962,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radacct_server_packets" lineno="72211"> +<interface name="corenet_sendrecv_radacct_server_packets" lineno="68745"> <summary> Send and receive radacct_server packets. </summary> @@ -52927,7 +52973,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="72227"> +<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="68761"> <summary> Do not audit attempts to send and receive radacct_server packets. </summary> @@ -52938,7 +52984,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radacct_server_packets" lineno="72242"> +<interface name="corenet_relabelto_radacct_server_packets" lineno="68776"> <summary> Relabel packets to radacct_server the packet type. </summary> @@ -52948,7 +52994,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_radius_port" lineno="72264"> +<interface name="corenet_tcp_sendrecv_radius_port" lineno="68798"> <summary> Send and receive TCP traffic on the radius port. </summary> @@ -52959,7 +53005,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_radius_port" lineno="72283"> +<interface name="corenet_udp_send_radius_port" lineno="68813"> <summary> Send UDP traffic on the radius port. </summary> @@ -52970,7 +53016,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_radius_port" lineno="72302"> +<interface name="corenet_dontaudit_udp_send_radius_port" lineno="68828"> <summary> Do not audit attempts to send UDP traffic on the radius port. </summary> @@ -52981,7 +53027,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_radius_port" lineno="72321"> +<interface name="corenet_udp_receive_radius_port" lineno="68843"> <summary> Receive UDP traffic on the radius port. </summary> @@ -52992,7 +53038,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="72340"> +<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="68858"> <summary> Do not audit attempts to receive UDP traffic on the radius port. </summary> @@ -53003,7 +53049,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_radius_port" lineno="72359"> +<interface name="corenet_udp_sendrecv_radius_port" lineno="68873"> <summary> Send and receive UDP traffic on the radius port. </summary> @@ -53014,7 +53060,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="72376"> +<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="68889"> <summary> Do not audit attempts to send and receive UDP traffic on the radius port. @@ -53026,7 +53072,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_radius_port" lineno="72392"> +<interface name="corenet_tcp_bind_radius_port" lineno="68904"> <summary> Bind TCP sockets to the radius port. </summary> @@ -53037,7 +53083,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_radius_port" lineno="72412"> +<interface name="corenet_udp_bind_radius_port" lineno="68924"> <summary> Bind UDP sockets to the radius port. </summary> @@ -53048,7 +53094,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_radius_port" lineno="72431"> +<interface name="corenet_tcp_connect_radius_port" lineno="68943"> <summary> Make a TCP connection to the radius port. </summary> @@ -53058,7 +53104,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radius_client_packets" lineno="72451"> +<interface name="corenet_send_radius_client_packets" lineno="68963"> <summary> Send radius_client packets. </summary> @@ -53069,7 +53115,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radius_client_packets" lineno="72470"> +<interface name="corenet_dontaudit_send_radius_client_packets" lineno="68982"> <summary> Do not audit attempts to send radius_client packets. </summary> @@ -53080,7 +53126,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radius_client_packets" lineno="72489"> +<interface name="corenet_receive_radius_client_packets" lineno="69001"> <summary> Receive radius_client packets. </summary> @@ -53091,7 +53137,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="72508"> +<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69020"> <summary> Do not audit attempts to receive radius_client packets. </summary> @@ -53102,7 +53148,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radius_client_packets" lineno="72527"> +<interface name="corenet_sendrecv_radius_client_packets" lineno="69039"> <summary> Send and receive radius_client packets. </summary> @@ -53113,7 +53159,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="72543"> +<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69055"> <summary> Do not audit attempts to send and receive radius_client packets. </summary> @@ -53124,7 +53170,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radius_client_packets" lineno="72558"> +<interface name="corenet_relabelto_radius_client_packets" lineno="69070"> <summary> Relabel packets to radius_client the packet type. </summary> @@ -53134,7 +53180,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radius_server_packets" lineno="72578"> +<interface name="corenet_send_radius_server_packets" lineno="69090"> <summary> Send radius_server packets. </summary> @@ -53145,7 +53191,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radius_server_packets" lineno="72597"> +<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69109"> <summary> Do not audit attempts to send radius_server packets. </summary> @@ -53156,7 +53202,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radius_server_packets" lineno="72616"> +<interface name="corenet_receive_radius_server_packets" lineno="69128"> <summary> Receive radius_server packets. </summary> @@ -53167,7 +53213,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="72635"> +<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69147"> <summary> Do not audit attempts to receive radius_server packets. </summary> @@ -53178,7 +53224,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radius_server_packets" lineno="72654"> +<interface name="corenet_sendrecv_radius_server_packets" lineno="69166"> <summary> Send and receive radius_server packets. </summary> @@ -53189,7 +53235,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="72670"> +<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69182"> <summary> Do not audit attempts to send and receive radius_server packets. </summary> @@ -53200,7 +53246,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radius_server_packets" lineno="72685"> +<interface name="corenet_relabelto_radius_server_packets" lineno="69197"> <summary> Relabel packets to radius_server the packet type. </summary> @@ -53210,7 +53256,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_radsec_port" lineno="72707"> +<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69219"> <summary> Send and receive TCP traffic on the radsec port. </summary> @@ -53221,7 +53267,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_radsec_port" lineno="72726"> +<interface name="corenet_udp_send_radsec_port" lineno="69234"> <summary> Send UDP traffic on the radsec port. </summary> @@ -53232,7 +53278,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="72745"> +<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69249"> <summary> Do not audit attempts to send UDP traffic on the radsec port. </summary> @@ -53243,7 +53289,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_radsec_port" lineno="72764"> +<interface name="corenet_udp_receive_radsec_port" lineno="69264"> <summary> Receive UDP traffic on the radsec port. </summary> @@ -53254,7 +53300,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="72783"> +<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69279"> <summary> Do not audit attempts to receive UDP traffic on the radsec port. </summary> @@ -53265,7 +53311,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_radsec_port" lineno="72802"> +<interface name="corenet_udp_sendrecv_radsec_port" lineno="69294"> <summary> Send and receive UDP traffic on the radsec port. </summary> @@ -53276,7 +53322,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="72819"> +<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69310"> <summary> Do not audit attempts to send and receive UDP traffic on the radsec port. @@ -53288,7 +53334,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_radsec_port" lineno="72835"> +<interface name="corenet_tcp_bind_radsec_port" lineno="69325"> <summary> Bind TCP sockets to the radsec port. </summary> @@ -53299,7 +53345,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_radsec_port" lineno="72855"> +<interface name="corenet_udp_bind_radsec_port" lineno="69345"> <summary> Bind UDP sockets to the radsec port. </summary> @@ -53310,7 +53356,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_radsec_port" lineno="72874"> +<interface name="corenet_tcp_connect_radsec_port" lineno="69364"> <summary> Make a TCP connection to the radsec port. </summary> @@ -53320,7 +53366,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radsec_client_packets" lineno="72894"> +<interface name="corenet_send_radsec_client_packets" lineno="69384"> <summary> Send radsec_client packets. </summary> @@ -53331,7 +53377,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="72913"> +<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69403"> <summary> Do not audit attempts to send radsec_client packets. </summary> @@ -53342,7 +53388,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radsec_client_packets" lineno="72932"> +<interface name="corenet_receive_radsec_client_packets" lineno="69422"> <summary> Receive radsec_client packets. </summary> @@ -53353,7 +53399,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="72951"> +<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69441"> <summary> Do not audit attempts to receive radsec_client packets. </summary> @@ -53364,7 +53410,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radsec_client_packets" lineno="72970"> +<interface name="corenet_sendrecv_radsec_client_packets" lineno="69460"> <summary> Send and receive radsec_client packets. </summary> @@ -53375,7 +53421,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="72986"> +<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="69476"> <summary> Do not audit attempts to send and receive radsec_client packets. </summary> @@ -53386,7 +53432,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radsec_client_packets" lineno="73001"> +<interface name="corenet_relabelto_radsec_client_packets" lineno="69491"> <summary> Relabel packets to radsec_client the packet type. </summary> @@ -53396,7 +53442,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radsec_server_packets" lineno="73021"> +<interface name="corenet_send_radsec_server_packets" lineno="69511"> <summary> Send radsec_server packets. </summary> @@ -53407,7 +53453,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="73040"> +<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="69530"> <summary> Do not audit attempts to send radsec_server packets. </summary> @@ -53418,7 +53464,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radsec_server_packets" lineno="73059"> +<interface name="corenet_receive_radsec_server_packets" lineno="69549"> <summary> Receive radsec_server packets. </summary> @@ -53429,7 +53475,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="73078"> +<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="69568"> <summary> Do not audit attempts to receive radsec_server packets. </summary> @@ -53440,7 +53486,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radsec_server_packets" lineno="73097"> +<interface name="corenet_sendrecv_radsec_server_packets" lineno="69587"> <summary> Send and receive radsec_server packets. </summary> @@ -53451,7 +53497,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="73113"> +<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="69603"> <summary> Do not audit attempts to send and receive radsec_server packets. </summary> @@ -53462,7 +53508,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radsec_server_packets" lineno="73128"> +<interface name="corenet_relabelto_radsec_server_packets" lineno="69618"> <summary> Relabel packets to radsec_server the packet type. </summary> @@ -53472,7 +53518,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_razor_port" lineno="73150"> +<interface name="corenet_tcp_sendrecv_razor_port" lineno="69640"> <summary> Send and receive TCP traffic on the razor port. </summary> @@ -53483,7 +53529,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_razor_port" lineno="73169"> +<interface name="corenet_udp_send_razor_port" lineno="69655"> <summary> Send UDP traffic on the razor port. </summary> @@ -53494,7 +53540,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_razor_port" lineno="73188"> +<interface name="corenet_dontaudit_udp_send_razor_port" lineno="69670"> <summary> Do not audit attempts to send UDP traffic on the razor port. </summary> @@ -53505,7 +53551,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_razor_port" lineno="73207"> +<interface name="corenet_udp_receive_razor_port" lineno="69685"> <summary> Receive UDP traffic on the razor port. </summary> @@ -53516,7 +53562,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="73226"> +<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="69700"> <summary> Do not audit attempts to receive UDP traffic on the razor port. </summary> @@ -53527,7 +53573,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_razor_port" lineno="73245"> +<interface name="corenet_udp_sendrecv_razor_port" lineno="69715"> <summary> Send and receive UDP traffic on the razor port. </summary> @@ -53538,7 +53584,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="73262"> +<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="69731"> <summary> Do not audit attempts to send and receive UDP traffic on the razor port. @@ -53550,7 +53596,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_razor_port" lineno="73278"> +<interface name="corenet_tcp_bind_razor_port" lineno="69746"> <summary> Bind TCP sockets to the razor port. </summary> @@ -53561,7 +53607,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_razor_port" lineno="73298"> +<interface name="corenet_udp_bind_razor_port" lineno="69766"> <summary> Bind UDP sockets to the razor port. </summary> @@ -53572,7 +53618,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_razor_port" lineno="73317"> +<interface name="corenet_tcp_connect_razor_port" lineno="69785"> <summary> Make a TCP connection to the razor port. </summary> @@ -53582,7 +53628,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_razor_client_packets" lineno="73337"> +<interface name="corenet_send_razor_client_packets" lineno="69805"> <summary> Send razor_client packets. </summary> @@ -53593,7 +53639,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_razor_client_packets" lineno="73356"> +<interface name="corenet_dontaudit_send_razor_client_packets" lineno="69824"> <summary> Do not audit attempts to send razor_client packets. </summary> @@ -53604,7 +53650,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_razor_client_packets" lineno="73375"> +<interface name="corenet_receive_razor_client_packets" lineno="69843"> <summary> Receive razor_client packets. </summary> @@ -53615,7 +53661,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="73394"> +<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="69862"> <summary> Do not audit attempts to receive razor_client packets. </summary> @@ -53626,7 +53672,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_razor_client_packets" lineno="73413"> +<interface name="corenet_sendrecv_razor_client_packets" lineno="69881"> <summary> Send and receive razor_client packets. </summary> @@ -53637,7 +53683,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="73429"> +<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="69897"> <summary> Do not audit attempts to send and receive razor_client packets. </summary> @@ -53648,7 +53694,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_razor_client_packets" lineno="73444"> +<interface name="corenet_relabelto_razor_client_packets" lineno="69912"> <summary> Relabel packets to razor_client the packet type. </summary> @@ -53658,7 +53704,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_razor_server_packets" lineno="73464"> +<interface name="corenet_send_razor_server_packets" lineno="69932"> <summary> Send razor_server packets. </summary> @@ -53669,7 +53715,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_razor_server_packets" lineno="73483"> +<interface name="corenet_dontaudit_send_razor_server_packets" lineno="69951"> <summary> Do not audit attempts to send razor_server packets. </summary> @@ -53680,7 +53726,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_razor_server_packets" lineno="73502"> +<interface name="corenet_receive_razor_server_packets" lineno="69970"> <summary> Receive razor_server packets. </summary> @@ -53691,7 +53737,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="73521"> +<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="69989"> <summary> Do not audit attempts to receive razor_server packets. </summary> @@ -53702,7 +53748,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_razor_server_packets" lineno="73540"> +<interface name="corenet_sendrecv_razor_server_packets" lineno="70008"> <summary> Send and receive razor_server packets. </summary> @@ -53713,7 +53759,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="73556"> +<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70024"> <summary> Do not audit attempts to send and receive razor_server packets. </summary> @@ -53724,7 +53770,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_razor_server_packets" lineno="73571"> +<interface name="corenet_relabelto_razor_server_packets" lineno="70039"> <summary> Relabel packets to razor_server the packet type. </summary> @@ -53734,7 +53780,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_redis_port" lineno="73593"> +<interface name="corenet_tcp_sendrecv_redis_port" lineno="70061"> <summary> Send and receive TCP traffic on the redis port. </summary> @@ -53745,7 +53791,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_redis_port" lineno="73612"> +<interface name="corenet_udp_send_redis_port" lineno="70076"> <summary> Send UDP traffic on the redis port. </summary> @@ -53756,7 +53802,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_redis_port" lineno="73631"> +<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70091"> <summary> Do not audit attempts to send UDP traffic on the redis port. </summary> @@ -53767,7 +53813,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_redis_port" lineno="73650"> +<interface name="corenet_udp_receive_redis_port" lineno="70106"> <summary> Receive UDP traffic on the redis port. </summary> @@ -53778,7 +53824,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="73669"> +<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70121"> <summary> Do not audit attempts to receive UDP traffic on the redis port. </summary> @@ -53789,7 +53835,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_redis_port" lineno="73688"> +<interface name="corenet_udp_sendrecv_redis_port" lineno="70136"> <summary> Send and receive UDP traffic on the redis port. </summary> @@ -53800,7 +53846,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="73705"> +<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70152"> <summary> Do not audit attempts to send and receive UDP traffic on the redis port. @@ -53812,7 +53858,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_redis_port" lineno="73721"> +<interface name="corenet_tcp_bind_redis_port" lineno="70167"> <summary> Bind TCP sockets to the redis port. </summary> @@ -53823,7 +53869,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_redis_port" lineno="73741"> +<interface name="corenet_udp_bind_redis_port" lineno="70187"> <summary> Bind UDP sockets to the redis port. </summary> @@ -53834,7 +53880,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_redis_port" lineno="73760"> +<interface name="corenet_tcp_connect_redis_port" lineno="70206"> <summary> Make a TCP connection to the redis port. </summary> @@ -53844,7 +53890,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_redis_client_packets" lineno="73780"> +<interface name="corenet_send_redis_client_packets" lineno="70226"> <summary> Send redis_client packets. </summary> @@ -53855,7 +53901,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_redis_client_packets" lineno="73799"> +<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70245"> <summary> Do not audit attempts to send redis_client packets. </summary> @@ -53866,7 +53912,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_redis_client_packets" lineno="73818"> +<interface name="corenet_receive_redis_client_packets" lineno="70264"> <summary> Receive redis_client packets. </summary> @@ -53877,7 +53923,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="73837"> +<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70283"> <summary> Do not audit attempts to receive redis_client packets. </summary> @@ -53888,7 +53934,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_redis_client_packets" lineno="73856"> +<interface name="corenet_sendrecv_redis_client_packets" lineno="70302"> <summary> Send and receive redis_client packets. </summary> @@ -53899,7 +53945,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="73872"> +<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70318"> <summary> Do not audit attempts to send and receive redis_client packets. </summary> @@ -53910,7 +53956,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_redis_client_packets" lineno="73887"> +<interface name="corenet_relabelto_redis_client_packets" lineno="70333"> <summary> Relabel packets to redis_client the packet type. </summary> @@ -53920,7 +53966,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_redis_server_packets" lineno="73907"> +<interface name="corenet_send_redis_server_packets" lineno="70353"> <summary> Send redis_server packets. </summary> @@ -53931,7 +53977,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_redis_server_packets" lineno="73926"> +<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70372"> <summary> Do not audit attempts to send redis_server packets. </summary> @@ -53942,7 +53988,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_redis_server_packets" lineno="73945"> +<interface name="corenet_receive_redis_server_packets" lineno="70391"> <summary> Receive redis_server packets. </summary> @@ -53953,7 +53999,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="73964"> +<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70410"> <summary> Do not audit attempts to receive redis_server packets. </summary> @@ -53964,7 +54010,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_redis_server_packets" lineno="73983"> +<interface name="corenet_sendrecv_redis_server_packets" lineno="70429"> <summary> Send and receive redis_server packets. </summary> @@ -53975,7 +54021,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="73999"> +<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70445"> <summary> Do not audit attempts to send and receive redis_server packets. </summary> @@ -53986,7 +54032,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_redis_server_packets" lineno="74014"> +<interface name="corenet_relabelto_redis_server_packets" lineno="70460"> <summary> Relabel packets to redis_server the packet type. </summary> @@ -53996,7 +54042,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_repository_port" lineno="74036"> +<interface name="corenet_tcp_sendrecv_repository_port" lineno="70482"> <summary> Send and receive TCP traffic on the repository port. </summary> @@ -54007,7 +54053,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_repository_port" lineno="74055"> +<interface name="corenet_udp_send_repository_port" lineno="70497"> <summary> Send UDP traffic on the repository port. </summary> @@ -54018,7 +54064,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_repository_port" lineno="74074"> +<interface name="corenet_dontaudit_udp_send_repository_port" lineno="70512"> <summary> Do not audit attempts to send UDP traffic on the repository port. </summary> @@ -54029,7 +54075,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_repository_port" lineno="74093"> +<interface name="corenet_udp_receive_repository_port" lineno="70527"> <summary> Receive UDP traffic on the repository port. </summary> @@ -54040,7 +54086,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="74112"> +<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="70542"> <summary> Do not audit attempts to receive UDP traffic on the repository port. </summary> @@ -54051,7 +54097,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_repository_port" lineno="74131"> +<interface name="corenet_udp_sendrecv_repository_port" lineno="70557"> <summary> Send and receive UDP traffic on the repository port. </summary> @@ -54062,7 +54108,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="74148"> +<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="70573"> <summary> Do not audit attempts to send and receive UDP traffic on the repository port. @@ -54074,7 +54120,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_repository_port" lineno="74164"> +<interface name="corenet_tcp_bind_repository_port" lineno="70588"> <summary> Bind TCP sockets to the repository port. </summary> @@ -54085,7 +54131,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_repository_port" lineno="74184"> +<interface name="corenet_udp_bind_repository_port" lineno="70608"> <summary> Bind UDP sockets to the repository port. </summary> @@ -54096,7 +54142,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_repository_port" lineno="74203"> +<interface name="corenet_tcp_connect_repository_port" lineno="70627"> <summary> Make a TCP connection to the repository port. </summary> @@ -54106,7 +54152,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_repository_client_packets" lineno="74223"> +<interface name="corenet_send_repository_client_packets" lineno="70647"> <summary> Send repository_client packets. </summary> @@ -54117,7 +54163,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_repository_client_packets" lineno="74242"> +<interface name="corenet_dontaudit_send_repository_client_packets" lineno="70666"> <summary> Do not audit attempts to send repository_client packets. </summary> @@ -54128,7 +54174,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_repository_client_packets" lineno="74261"> +<interface name="corenet_receive_repository_client_packets" lineno="70685"> <summary> Receive repository_client packets. </summary> @@ -54139,7 +54185,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="74280"> +<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="70704"> <summary> Do not audit attempts to receive repository_client packets. </summary> @@ -54150,7 +54196,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_repository_client_packets" lineno="74299"> +<interface name="corenet_sendrecv_repository_client_packets" lineno="70723"> <summary> Send and receive repository_client packets. </summary> @@ -54161,7 +54207,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="74315"> +<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="70739"> <summary> Do not audit attempts to send and receive repository_client packets. </summary> @@ -54172,7 +54218,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_repository_client_packets" lineno="74330"> +<interface name="corenet_relabelto_repository_client_packets" lineno="70754"> <summary> Relabel packets to repository_client the packet type. </summary> @@ -54182,7 +54228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_repository_server_packets" lineno="74350"> +<interface name="corenet_send_repository_server_packets" lineno="70774"> <summary> Send repository_server packets. </summary> @@ -54193,7 +54239,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_repository_server_packets" lineno="74369"> +<interface name="corenet_dontaudit_send_repository_server_packets" lineno="70793"> <summary> Do not audit attempts to send repository_server packets. </summary> @@ -54204,7 +54250,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_repository_server_packets" lineno="74388"> +<interface name="corenet_receive_repository_server_packets" lineno="70812"> <summary> Receive repository_server packets. </summary> @@ -54215,7 +54261,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="74407"> +<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="70831"> <summary> Do not audit attempts to receive repository_server packets. </summary> @@ -54226,7 +54272,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_repository_server_packets" lineno="74426"> +<interface name="corenet_sendrecv_repository_server_packets" lineno="70850"> <summary> Send and receive repository_server packets. </summary> @@ -54237,7 +54283,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="74442"> +<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="70866"> <summary> Do not audit attempts to send and receive repository_server packets. </summary> @@ -54248,7 +54294,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_repository_server_packets" lineno="74457"> +<interface name="corenet_relabelto_repository_server_packets" lineno="70881"> <summary> Relabel packets to repository_server the packet type. </summary> @@ -54258,7 +54304,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ricci_port" lineno="74479"> +<interface name="corenet_tcp_sendrecv_ricci_port" lineno="70903"> <summary> Send and receive TCP traffic on the ricci port. </summary> @@ -54269,7 +54315,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ricci_port" lineno="74498"> +<interface name="corenet_udp_send_ricci_port" lineno="70918"> <summary> Send UDP traffic on the ricci port. </summary> @@ -54280,7 +54326,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="74517"> +<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="70933"> <summary> Do not audit attempts to send UDP traffic on the ricci port. </summary> @@ -54291,7 +54337,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ricci_port" lineno="74536"> +<interface name="corenet_udp_receive_ricci_port" lineno="70948"> <summary> Receive UDP traffic on the ricci port. </summary> @@ -54302,7 +54348,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="74555"> +<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="70963"> <summary> Do not audit attempts to receive UDP traffic on the ricci port. </summary> @@ -54313,7 +54359,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ricci_port" lineno="74574"> +<interface name="corenet_udp_sendrecv_ricci_port" lineno="70978"> <summary> Send and receive UDP traffic on the ricci port. </summary> @@ -54324,7 +54370,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="74591"> +<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="70994"> <summary> Do not audit attempts to send and receive UDP traffic on the ricci port. @@ -54336,7 +54382,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ricci_port" lineno="74607"> +<interface name="corenet_tcp_bind_ricci_port" lineno="71009"> <summary> Bind TCP sockets to the ricci port. </summary> @@ -54347,7 +54393,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ricci_port" lineno="74627"> +<interface name="corenet_udp_bind_ricci_port" lineno="71029"> <summary> Bind UDP sockets to the ricci port. </summary> @@ -54358,7 +54404,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ricci_port" lineno="74646"> +<interface name="corenet_tcp_connect_ricci_port" lineno="71048"> <summary> Make a TCP connection to the ricci port. </summary> @@ -54368,7 +54414,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_client_packets" lineno="74666"> +<interface name="corenet_send_ricci_client_packets" lineno="71068"> <summary> Send ricci_client packets. </summary> @@ -54379,7 +54425,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="74685"> +<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71087"> <summary> Do not audit attempts to send ricci_client packets. </summary> @@ -54390,7 +54436,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_client_packets" lineno="74704"> +<interface name="corenet_receive_ricci_client_packets" lineno="71106"> <summary> Receive ricci_client packets. </summary> @@ -54401,7 +54447,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="74723"> +<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71125"> <summary> Do not audit attempts to receive ricci_client packets. </summary> @@ -54412,7 +54458,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_client_packets" lineno="74742"> +<interface name="corenet_sendrecv_ricci_client_packets" lineno="71144"> <summary> Send and receive ricci_client packets. </summary> @@ -54423,7 +54469,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="74758"> +<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71160"> <summary> Do not audit attempts to send and receive ricci_client packets. </summary> @@ -54434,7 +54480,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_client_packets" lineno="74773"> +<interface name="corenet_relabelto_ricci_client_packets" lineno="71175"> <summary> Relabel packets to ricci_client the packet type. </summary> @@ -54444,7 +54490,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_server_packets" lineno="74793"> +<interface name="corenet_send_ricci_server_packets" lineno="71195"> <summary> Send ricci_server packets. </summary> @@ -54455,7 +54501,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="74812"> +<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71214"> <summary> Do not audit attempts to send ricci_server packets. </summary> @@ -54466,7 +54512,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_server_packets" lineno="74831"> +<interface name="corenet_receive_ricci_server_packets" lineno="71233"> <summary> Receive ricci_server packets. </summary> @@ -54477,7 +54523,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="74850"> +<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71252"> <summary> Do not audit attempts to receive ricci_server packets. </summary> @@ -54488,7 +54534,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_server_packets" lineno="74869"> +<interface name="corenet_sendrecv_ricci_server_packets" lineno="71271"> <summary> Send and receive ricci_server packets. </summary> @@ -54499,7 +54545,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="74885"> +<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71287"> <summary> Do not audit attempts to send and receive ricci_server packets. </summary> @@ -54510,7 +54556,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_server_packets" lineno="74900"> +<interface name="corenet_relabelto_ricci_server_packets" lineno="71302"> <summary> Relabel packets to ricci_server the packet type. </summary> @@ -54520,7 +54566,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="74922"> +<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71324"> <summary> Send and receive TCP traffic on the ricci_modcluster port. </summary> @@ -54531,7 +54577,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ricci_modcluster_port" lineno="74941"> +<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71339"> <summary> Send UDP traffic on the ricci_modcluster port. </summary> @@ -54542,7 +54588,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="74960"> +<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71354"> <summary> Do not audit attempts to send UDP traffic on the ricci_modcluster port. </summary> @@ -54553,7 +54599,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="74979"> +<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71369"> <summary> Receive UDP traffic on the ricci_modcluster port. </summary> @@ -54564,7 +54610,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="74998"> +<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71384"> <summary> Do not audit attempts to receive UDP traffic on the ricci_modcluster port. </summary> @@ -54575,7 +54621,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="75017"> +<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71399"> <summary> Send and receive UDP traffic on the ricci_modcluster port. </summary> @@ -54586,7 +54632,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="75034"> +<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71415"> <summary> Do not audit attempts to send and receive UDP traffic on the ricci_modcluster port. @@ -54598,7 +54644,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="75050"> +<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71430"> <summary> Bind TCP sockets to the ricci_modcluster port. </summary> @@ -54609,7 +54655,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="75070"> +<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71450"> <summary> Bind UDP sockets to the ricci_modcluster port. </summary> @@ -54620,7 +54666,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="75089"> +<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="71469"> <summary> Make a TCP connection to the ricci_modcluster port. </summary> @@ -54630,7 +54676,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_modcluster_client_packets" lineno="75109"> +<interface name="corenet_send_ricci_modcluster_client_packets" lineno="71489"> <summary> Send ricci_modcluster_client packets. </summary> @@ -54641,7 +54687,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="75128"> +<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="71508"> <summary> Do not audit attempts to send ricci_modcluster_client packets. </summary> @@ -54652,7 +54698,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="75147"> +<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="71527"> <summary> Receive ricci_modcluster_client packets. </summary> @@ -54663,7 +54709,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="75166"> +<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="71546"> <summary> Do not audit attempts to receive ricci_modcluster_client packets. </summary> @@ -54674,7 +54720,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="75185"> +<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="71565"> <summary> Send and receive ricci_modcluster_client packets. </summary> @@ -54685,7 +54731,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="75201"> +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="71581"> <summary> Do not audit attempts to send and receive ricci_modcluster_client packets. </summary> @@ -54696,7 +54742,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="75216"> +<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="71596"> <summary> Relabel packets to ricci_modcluster_client the packet type. </summary> @@ -54706,7 +54752,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_modcluster_server_packets" lineno="75236"> +<interface name="corenet_send_ricci_modcluster_server_packets" lineno="71616"> <summary> Send ricci_modcluster_server packets. </summary> @@ -54717,7 +54763,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="75255"> +<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="71635"> <summary> Do not audit attempts to send ricci_modcluster_server packets. </summary> @@ -54728,7 +54774,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="75274"> +<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="71654"> <summary> Receive ricci_modcluster_server packets. </summary> @@ -54739,7 +54785,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="75293"> +<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="71673"> <summary> Do not audit attempts to receive ricci_modcluster_server packets. </summary> @@ -54750,7 +54796,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="75312"> +<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="71692"> <summary> Send and receive ricci_modcluster_server packets. </summary> @@ -54761,7 +54807,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="75328"> +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="71708"> <summary> Do not audit attempts to send and receive ricci_modcluster_server packets. </summary> @@ -54772,7 +54818,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="75343"> +<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="71723"> <summary> Relabel packets to ricci_modcluster_server the packet type. </summary> @@ -54782,7 +54828,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="75365"> +<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="71745"> <summary> Send and receive TCP traffic on the rlogind port. </summary> @@ -54793,7 +54839,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rlogind_port" lineno="75384"> +<interface name="corenet_udp_send_rlogind_port" lineno="71760"> <summary> Send UDP traffic on the rlogind port. </summary> @@ -54804,7 +54850,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="75403"> +<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="71775"> <summary> Do not audit attempts to send UDP traffic on the rlogind port. </summary> @@ -54815,7 +54861,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rlogind_port" lineno="75422"> +<interface name="corenet_udp_receive_rlogind_port" lineno="71790"> <summary> Receive UDP traffic on the rlogind port. </summary> @@ -54826,7 +54872,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="75441"> +<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="71805"> <summary> Do not audit attempts to receive UDP traffic on the rlogind port. </summary> @@ -54837,7 +54883,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rlogind_port" lineno="75460"> +<interface name="corenet_udp_sendrecv_rlogind_port" lineno="71820"> <summary> Send and receive UDP traffic on the rlogind port. </summary> @@ -54848,7 +54894,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="75477"> +<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="71836"> <summary> Do not audit attempts to send and receive UDP traffic on the rlogind port. @@ -54860,7 +54906,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rlogind_port" lineno="75493"> +<interface name="corenet_tcp_bind_rlogind_port" lineno="71851"> <summary> Bind TCP sockets to the rlogind port. </summary> @@ -54871,7 +54917,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rlogind_port" lineno="75513"> +<interface name="corenet_udp_bind_rlogind_port" lineno="71871"> <summary> Bind UDP sockets to the rlogind port. </summary> @@ -54882,7 +54928,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rlogind_port" lineno="75532"> +<interface name="corenet_tcp_connect_rlogind_port" lineno="71890"> <summary> Make a TCP connection to the rlogind port. </summary> @@ -54892,7 +54938,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rlogind_client_packets" lineno="75552"> +<interface name="corenet_send_rlogind_client_packets" lineno="71910"> <summary> Send rlogind_client packets. </summary> @@ -54903,7 +54949,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="75571"> +<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="71929"> <summary> Do not audit attempts to send rlogind_client packets. </summary> @@ -54914,7 +54960,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rlogind_client_packets" lineno="75590"> +<interface name="corenet_receive_rlogind_client_packets" lineno="71948"> <summary> Receive rlogind_client packets. </summary> @@ -54925,7 +54971,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="75609"> +<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="71967"> <summary> Do not audit attempts to receive rlogind_client packets. </summary> @@ -54936,7 +54982,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rlogind_client_packets" lineno="75628"> +<interface name="corenet_sendrecv_rlogind_client_packets" lineno="71986"> <summary> Send and receive rlogind_client packets. </summary> @@ -54947,7 +54993,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="75644"> +<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72002"> <summary> Do not audit attempts to send and receive rlogind_client packets. </summary> @@ -54958,7 +55004,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rlogind_client_packets" lineno="75659"> +<interface name="corenet_relabelto_rlogind_client_packets" lineno="72017"> <summary> Relabel packets to rlogind_client the packet type. </summary> @@ -54968,7 +55014,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rlogind_server_packets" lineno="75679"> +<interface name="corenet_send_rlogind_server_packets" lineno="72037"> <summary> Send rlogind_server packets. </summary> @@ -54979,7 +55025,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="75698"> +<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72056"> <summary> Do not audit attempts to send rlogind_server packets. </summary> @@ -54990,7 +55036,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rlogind_server_packets" lineno="75717"> +<interface name="corenet_receive_rlogind_server_packets" lineno="72075"> <summary> Receive rlogind_server packets. </summary> @@ -55001,7 +55047,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="75736"> +<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72094"> <summary> Do not audit attempts to receive rlogind_server packets. </summary> @@ -55012,7 +55058,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rlogind_server_packets" lineno="75755"> +<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72113"> <summary> Send and receive rlogind_server packets. </summary> @@ -55023,7 +55069,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="75771"> +<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72129"> <summary> Do not audit attempts to send and receive rlogind_server packets. </summary> @@ -55034,7 +55080,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rlogind_server_packets" lineno="75786"> +<interface name="corenet_relabelto_rlogind_server_packets" lineno="72144"> <summary> Relabel packets to rlogind_server the packet type. </summary> @@ -55044,7 +55090,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rndc_port" lineno="75808"> +<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72166"> <summary> Send and receive TCP traffic on the rndc port. </summary> @@ -55055,7 +55101,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rndc_port" lineno="75827"> +<interface name="corenet_udp_send_rndc_port" lineno="72181"> <summary> Send UDP traffic on the rndc port. </summary> @@ -55066,7 +55112,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="75846"> +<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72196"> <summary> Do not audit attempts to send UDP traffic on the rndc port. </summary> @@ -55077,7 +55123,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rndc_port" lineno="75865"> +<interface name="corenet_udp_receive_rndc_port" lineno="72211"> <summary> Receive UDP traffic on the rndc port. </summary> @@ -55088,7 +55134,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="75884"> +<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72226"> <summary> Do not audit attempts to receive UDP traffic on the rndc port. </summary> @@ -55099,7 +55145,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rndc_port" lineno="75903"> +<interface name="corenet_udp_sendrecv_rndc_port" lineno="72241"> <summary> Send and receive UDP traffic on the rndc port. </summary> @@ -55110,7 +55156,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="75920"> +<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72257"> <summary> Do not audit attempts to send and receive UDP traffic on the rndc port. @@ -55122,7 +55168,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rndc_port" lineno="75936"> +<interface name="corenet_tcp_bind_rndc_port" lineno="72272"> <summary> Bind TCP sockets to the rndc port. </summary> @@ -55133,7 +55179,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rndc_port" lineno="75956"> +<interface name="corenet_udp_bind_rndc_port" lineno="72292"> <summary> Bind UDP sockets to the rndc port. </summary> @@ -55144,7 +55190,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rndc_port" lineno="75975"> +<interface name="corenet_tcp_connect_rndc_port" lineno="72311"> <summary> Make a TCP connection to the rndc port. </summary> @@ -55154,7 +55200,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rndc_client_packets" lineno="75995"> +<interface name="corenet_send_rndc_client_packets" lineno="72331"> <summary> Send rndc_client packets. </summary> @@ -55165,7 +55211,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="76014"> +<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72350"> <summary> Do not audit attempts to send rndc_client packets. </summary> @@ -55176,7 +55222,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rndc_client_packets" lineno="76033"> +<interface name="corenet_receive_rndc_client_packets" lineno="72369"> <summary> Receive rndc_client packets. </summary> @@ -55187,7 +55233,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="76052"> +<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72388"> <summary> Do not audit attempts to receive rndc_client packets. </summary> @@ -55198,7 +55244,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rndc_client_packets" lineno="76071"> +<interface name="corenet_sendrecv_rndc_client_packets" lineno="72407"> <summary> Send and receive rndc_client packets. </summary> @@ -55209,7 +55255,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="76087"> +<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72423"> <summary> Do not audit attempts to send and receive rndc_client packets. </summary> @@ -55220,7 +55266,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rndc_client_packets" lineno="76102"> +<interface name="corenet_relabelto_rndc_client_packets" lineno="72438"> <summary> Relabel packets to rndc_client the packet type. </summary> @@ -55230,7 +55276,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rndc_server_packets" lineno="76122"> +<interface name="corenet_send_rndc_server_packets" lineno="72458"> <summary> Send rndc_server packets. </summary> @@ -55241,7 +55287,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="76141"> +<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="72477"> <summary> Do not audit attempts to send rndc_server packets. </summary> @@ -55252,7 +55298,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rndc_server_packets" lineno="76160"> +<interface name="corenet_receive_rndc_server_packets" lineno="72496"> <summary> Receive rndc_server packets. </summary> @@ -55263,7 +55309,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="76179"> +<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="72515"> <summary> Do not audit attempts to receive rndc_server packets. </summary> @@ -55274,7 +55320,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rndc_server_packets" lineno="76198"> +<interface name="corenet_sendrecv_rndc_server_packets" lineno="72534"> <summary> Send and receive rndc_server packets. </summary> @@ -55285,7 +55331,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="76214"> +<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="72550"> <summary> Do not audit attempts to send and receive rndc_server packets. </summary> @@ -55296,7 +55342,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rndc_server_packets" lineno="76229"> +<interface name="corenet_relabelto_rndc_server_packets" lineno="72565"> <summary> Relabel packets to rndc_server the packet type. </summary> @@ -55306,7 +55352,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_router_port" lineno="76251"> +<interface name="corenet_tcp_sendrecv_router_port" lineno="72587"> <summary> Send and receive TCP traffic on the router port. </summary> @@ -55317,7 +55363,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_router_port" lineno="76270"> +<interface name="corenet_udp_send_router_port" lineno="72602"> <summary> Send UDP traffic on the router port. </summary> @@ -55328,7 +55374,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_router_port" lineno="76289"> +<interface name="corenet_dontaudit_udp_send_router_port" lineno="72617"> <summary> Do not audit attempts to send UDP traffic on the router port. </summary> @@ -55339,7 +55385,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_router_port" lineno="76308"> +<interface name="corenet_udp_receive_router_port" lineno="72632"> <summary> Receive UDP traffic on the router port. </summary> @@ -55350,7 +55396,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_router_port" lineno="76327"> +<interface name="corenet_dontaudit_udp_receive_router_port" lineno="72647"> <summary> Do not audit attempts to receive UDP traffic on the router port. </summary> @@ -55361,7 +55407,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_router_port" lineno="76346"> +<interface name="corenet_udp_sendrecv_router_port" lineno="72662"> <summary> Send and receive UDP traffic on the router port. </summary> @@ -55372,7 +55418,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="76363"> +<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="72678"> <summary> Do not audit attempts to send and receive UDP traffic on the router port. @@ -55384,7 +55430,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_router_port" lineno="76379"> +<interface name="corenet_tcp_bind_router_port" lineno="72693"> <summary> Bind TCP sockets to the router port. </summary> @@ -55395,7 +55441,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_router_port" lineno="76399"> +<interface name="corenet_udp_bind_router_port" lineno="72713"> <summary> Bind UDP sockets to the router port. </summary> @@ -55406,7 +55452,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_router_port" lineno="76418"> +<interface name="corenet_tcp_connect_router_port" lineno="72732"> <summary> Make a TCP connection to the router port. </summary> @@ -55416,7 +55462,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_router_client_packets" lineno="76438"> +<interface name="corenet_send_router_client_packets" lineno="72752"> <summary> Send router_client packets. </summary> @@ -55427,7 +55473,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_router_client_packets" lineno="76457"> +<interface name="corenet_dontaudit_send_router_client_packets" lineno="72771"> <summary> Do not audit attempts to send router_client packets. </summary> @@ -55438,7 +55484,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_router_client_packets" lineno="76476"> +<interface name="corenet_receive_router_client_packets" lineno="72790"> <summary> Receive router_client packets. </summary> @@ -55449,7 +55495,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_router_client_packets" lineno="76495"> +<interface name="corenet_dontaudit_receive_router_client_packets" lineno="72809"> <summary> Do not audit attempts to receive router_client packets. </summary> @@ -55460,7 +55506,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_router_client_packets" lineno="76514"> +<interface name="corenet_sendrecv_router_client_packets" lineno="72828"> <summary> Send and receive router_client packets. </summary> @@ -55471,7 +55517,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="76530"> +<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="72844"> <summary> Do not audit attempts to send and receive router_client packets. </summary> @@ -55482,7 +55528,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_router_client_packets" lineno="76545"> +<interface name="corenet_relabelto_router_client_packets" lineno="72859"> <summary> Relabel packets to router_client the packet type. </summary> @@ -55492,7 +55538,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_router_server_packets" lineno="76565"> +<interface name="corenet_send_router_server_packets" lineno="72879"> <summary> Send router_server packets. </summary> @@ -55503,7 +55549,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_router_server_packets" lineno="76584"> +<interface name="corenet_dontaudit_send_router_server_packets" lineno="72898"> <summary> Do not audit attempts to send router_server packets. </summary> @@ -55514,7 +55560,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_router_server_packets" lineno="76603"> +<interface name="corenet_receive_router_server_packets" lineno="72917"> <summary> Receive router_server packets. </summary> @@ -55525,7 +55571,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_router_server_packets" lineno="76622"> +<interface name="corenet_dontaudit_receive_router_server_packets" lineno="72936"> <summary> Do not audit attempts to receive router_server packets. </summary> @@ -55536,7 +55582,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_router_server_packets" lineno="76641"> +<interface name="corenet_sendrecv_router_server_packets" lineno="72955"> <summary> Send and receive router_server packets. </summary> @@ -55547,7 +55593,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="76657"> +<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="72971"> <summary> Do not audit attempts to send and receive router_server packets. </summary> @@ -55558,7 +55604,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_router_server_packets" lineno="76672"> +<interface name="corenet_relabelto_router_server_packets" lineno="72986"> <summary> Relabel packets to router_server the packet type. </summary> @@ -55568,7 +55614,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rsh_port" lineno="76694"> +<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73008"> <summary> Send and receive TCP traffic on the rsh port. </summary> @@ -55579,7 +55625,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rsh_port" lineno="76713"> +<interface name="corenet_udp_send_rsh_port" lineno="73023"> <summary> Send UDP traffic on the rsh port. </summary> @@ -55590,7 +55636,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="76732"> +<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73038"> <summary> Do not audit attempts to send UDP traffic on the rsh port. </summary> @@ -55601,7 +55647,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rsh_port" lineno="76751"> +<interface name="corenet_udp_receive_rsh_port" lineno="73053"> <summary> Receive UDP traffic on the rsh port. </summary> @@ -55612,7 +55658,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="76770"> +<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73068"> <summary> Do not audit attempts to receive UDP traffic on the rsh port. </summary> @@ -55623,7 +55669,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rsh_port" lineno="76789"> +<interface name="corenet_udp_sendrecv_rsh_port" lineno="73083"> <summary> Send and receive UDP traffic on the rsh port. </summary> @@ -55634,7 +55680,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="76806"> +<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73099"> <summary> Do not audit attempts to send and receive UDP traffic on the rsh port. @@ -55646,7 +55692,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rsh_port" lineno="76822"> +<interface name="corenet_tcp_bind_rsh_port" lineno="73114"> <summary> Bind TCP sockets to the rsh port. </summary> @@ -55657,7 +55703,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rsh_port" lineno="76842"> +<interface name="corenet_udp_bind_rsh_port" lineno="73134"> <summary> Bind UDP sockets to the rsh port. </summary> @@ -55668,7 +55714,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rsh_port" lineno="76861"> +<interface name="corenet_tcp_connect_rsh_port" lineno="73153"> <summary> Make a TCP connection to the rsh port. </summary> @@ -55678,7 +55724,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsh_client_packets" lineno="76881"> +<interface name="corenet_send_rsh_client_packets" lineno="73173"> <summary> Send rsh_client packets. </summary> @@ -55689,7 +55735,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="76900"> +<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73192"> <summary> Do not audit attempts to send rsh_client packets. </summary> @@ -55700,7 +55746,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsh_client_packets" lineno="76919"> +<interface name="corenet_receive_rsh_client_packets" lineno="73211"> <summary> Receive rsh_client packets. </summary> @@ -55711,7 +55757,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="76938"> +<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73230"> <summary> Do not audit attempts to receive rsh_client packets. </summary> @@ -55722,7 +55768,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsh_client_packets" lineno="76957"> +<interface name="corenet_sendrecv_rsh_client_packets" lineno="73249"> <summary> Send and receive rsh_client packets. </summary> @@ -55733,7 +55779,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="76973"> +<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73265"> <summary> Do not audit attempts to send and receive rsh_client packets. </summary> @@ -55744,7 +55790,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsh_client_packets" lineno="76988"> +<interface name="corenet_relabelto_rsh_client_packets" lineno="73280"> <summary> Relabel packets to rsh_client the packet type. </summary> @@ -55754,7 +55800,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsh_server_packets" lineno="77008"> +<interface name="corenet_send_rsh_server_packets" lineno="73300"> <summary> Send rsh_server packets. </summary> @@ -55765,7 +55811,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="77027"> +<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73319"> <summary> Do not audit attempts to send rsh_server packets. </summary> @@ -55776,7 +55822,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsh_server_packets" lineno="77046"> +<interface name="corenet_receive_rsh_server_packets" lineno="73338"> <summary> Receive rsh_server packets. </summary> @@ -55787,7 +55833,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="77065"> +<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73357"> <summary> Do not audit attempts to receive rsh_server packets. </summary> @@ -55798,7 +55844,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsh_server_packets" lineno="77084"> +<interface name="corenet_sendrecv_rsh_server_packets" lineno="73376"> <summary> Send and receive rsh_server packets. </summary> @@ -55809,7 +55855,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="77100"> +<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73392"> <summary> Do not audit attempts to send and receive rsh_server packets. </summary> @@ -55820,7 +55866,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsh_server_packets" lineno="77115"> +<interface name="corenet_relabelto_rsh_server_packets" lineno="73407"> <summary> Relabel packets to rsh_server the packet type. </summary> @@ -55830,7 +55876,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rsync_port" lineno="77137"> +<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73429"> <summary> Send and receive TCP traffic on the rsync port. </summary> @@ -55841,7 +55887,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rsync_port" lineno="77156"> +<interface name="corenet_udp_send_rsync_port" lineno="73444"> <summary> Send UDP traffic on the rsync port. </summary> @@ -55852,7 +55898,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="77175"> +<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="73459"> <summary> Do not audit attempts to send UDP traffic on the rsync port. </summary> @@ -55863,7 +55909,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rsync_port" lineno="77194"> +<interface name="corenet_udp_receive_rsync_port" lineno="73474"> <summary> Receive UDP traffic on the rsync port. </summary> @@ -55874,7 +55920,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="77213"> +<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="73489"> <summary> Do not audit attempts to receive UDP traffic on the rsync port. </summary> @@ -55885,7 +55931,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rsync_port" lineno="77232"> +<interface name="corenet_udp_sendrecv_rsync_port" lineno="73504"> <summary> Send and receive UDP traffic on the rsync port. </summary> @@ -55896,7 +55942,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="77249"> +<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="73520"> <summary> Do not audit attempts to send and receive UDP traffic on the rsync port. @@ -55908,7 +55954,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rsync_port" lineno="77265"> +<interface name="corenet_tcp_bind_rsync_port" lineno="73535"> <summary> Bind TCP sockets to the rsync port. </summary> @@ -55919,7 +55965,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rsync_port" lineno="77285"> +<interface name="corenet_udp_bind_rsync_port" lineno="73555"> <summary> Bind UDP sockets to the rsync port. </summary> @@ -55930,7 +55976,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rsync_port" lineno="77304"> +<interface name="corenet_tcp_connect_rsync_port" lineno="73574"> <summary> Make a TCP connection to the rsync port. </summary> @@ -55940,7 +55986,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsync_client_packets" lineno="77324"> +<interface name="corenet_send_rsync_client_packets" lineno="73594"> <summary> Send rsync_client packets. </summary> @@ -55951,7 +55997,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="77343"> +<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="73613"> <summary> Do not audit attempts to send rsync_client packets. </summary> @@ -55962,7 +56008,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsync_client_packets" lineno="77362"> +<interface name="corenet_receive_rsync_client_packets" lineno="73632"> <summary> Receive rsync_client packets. </summary> @@ -55973,7 +56019,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="77381"> +<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="73651"> <summary> Do not audit attempts to receive rsync_client packets. </summary> @@ -55984,7 +56030,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsync_client_packets" lineno="77400"> +<interface name="corenet_sendrecv_rsync_client_packets" lineno="73670"> <summary> Send and receive rsync_client packets. </summary> @@ -55995,7 +56041,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="77416"> +<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="73686"> <summary> Do not audit attempts to send and receive rsync_client packets. </summary> @@ -56006,7 +56052,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsync_client_packets" lineno="77431"> +<interface name="corenet_relabelto_rsync_client_packets" lineno="73701"> <summary> Relabel packets to rsync_client the packet type. </summary> @@ -56016,7 +56062,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsync_server_packets" lineno="77451"> +<interface name="corenet_send_rsync_server_packets" lineno="73721"> <summary> Send rsync_server packets. </summary> @@ -56027,7 +56073,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="77470"> +<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="73740"> <summary> Do not audit attempts to send rsync_server packets. </summary> @@ -56038,7 +56084,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsync_server_packets" lineno="77489"> +<interface name="corenet_receive_rsync_server_packets" lineno="73759"> <summary> Receive rsync_server packets. </summary> @@ -56049,7 +56095,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="77508"> +<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="73778"> <summary> Do not audit attempts to receive rsync_server packets. </summary> @@ -56060,7 +56106,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsync_server_packets" lineno="77527"> +<interface name="corenet_sendrecv_rsync_server_packets" lineno="73797"> <summary> Send and receive rsync_server packets. </summary> @@ -56071,7 +56117,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="77543"> +<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="73813"> <summary> Do not audit attempts to send and receive rsync_server packets. </summary> @@ -56082,7 +56128,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsync_server_packets" lineno="77558"> +<interface name="corenet_relabelto_rsync_server_packets" lineno="73828"> <summary> Relabel packets to rsync_server the packet type. </summary> @@ -56092,7 +56138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="77580"> +<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="73850"> <summary> Send and receive TCP traffic on the rtorrent port. </summary> @@ -56103,7 +56149,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rtorrent_port" lineno="77599"> +<interface name="corenet_udp_send_rtorrent_port" lineno="73865"> <summary> Send UDP traffic on the rtorrent port. </summary> @@ -56114,7 +56160,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="77618"> +<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="73880"> <summary> Do not audit attempts to send UDP traffic on the rtorrent port. </summary> @@ -56125,7 +56171,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rtorrent_port" lineno="77637"> +<interface name="corenet_udp_receive_rtorrent_port" lineno="73895"> <summary> Receive UDP traffic on the rtorrent port. </summary> @@ -56136,7 +56182,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="77656"> +<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="73910"> <summary> Do not audit attempts to receive UDP traffic on the rtorrent port. </summary> @@ -56147,7 +56193,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="77675"> +<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="73925"> <summary> Send and receive UDP traffic on the rtorrent port. </summary> @@ -56158,7 +56204,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="77692"> +<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="73941"> <summary> Do not audit attempts to send and receive UDP traffic on the rtorrent port. @@ -56170,7 +56216,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rtorrent_port" lineno="77708"> +<interface name="corenet_tcp_bind_rtorrent_port" lineno="73956"> <summary> Bind TCP sockets to the rtorrent port. </summary> @@ -56181,7 +56227,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rtorrent_port" lineno="77728"> +<interface name="corenet_udp_bind_rtorrent_port" lineno="73976"> <summary> Bind UDP sockets to the rtorrent port. </summary> @@ -56192,7 +56238,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rtorrent_port" lineno="77747"> +<interface name="corenet_tcp_connect_rtorrent_port" lineno="73995"> <summary> Make a TCP connection to the rtorrent port. </summary> @@ -56202,7 +56248,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtorrent_client_packets" lineno="77767"> +<interface name="corenet_send_rtorrent_client_packets" lineno="74015"> <summary> Send rtorrent_client packets. </summary> @@ -56213,7 +56259,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="77786"> +<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74034"> <summary> Do not audit attempts to send rtorrent_client packets. </summary> @@ -56224,7 +56270,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtorrent_client_packets" lineno="77805"> +<interface name="corenet_receive_rtorrent_client_packets" lineno="74053"> <summary> Receive rtorrent_client packets. </summary> @@ -56235,7 +56281,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="77824"> +<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74072"> <summary> Do not audit attempts to receive rtorrent_client packets. </summary> @@ -56246,7 +56292,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="77843"> +<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74091"> <summary> Send and receive rtorrent_client packets. </summary> @@ -56257,7 +56303,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="77859"> +<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74107"> <summary> Do not audit attempts to send and receive rtorrent_client packets. </summary> @@ -56268,7 +56314,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtorrent_client_packets" lineno="77874"> +<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74122"> <summary> Relabel packets to rtorrent_client the packet type. </summary> @@ -56278,7 +56324,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtorrent_server_packets" lineno="77894"> +<interface name="corenet_send_rtorrent_server_packets" lineno="74142"> <summary> Send rtorrent_server packets. </summary> @@ -56289,7 +56335,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="77913"> +<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74161"> <summary> Do not audit attempts to send rtorrent_server packets. </summary> @@ -56300,7 +56346,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtorrent_server_packets" lineno="77932"> +<interface name="corenet_receive_rtorrent_server_packets" lineno="74180"> <summary> Receive rtorrent_server packets. </summary> @@ -56311,7 +56357,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="77951"> +<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74199"> <summary> Do not audit attempts to receive rtorrent_server packets. </summary> @@ -56322,7 +56368,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="77970"> +<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74218"> <summary> Send and receive rtorrent_server packets. </summary> @@ -56333,7 +56379,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="77986"> +<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74234"> <summary> Do not audit attempts to send and receive rtorrent_server packets. </summary> @@ -56344,7 +56390,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtorrent_server_packets" lineno="78001"> +<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74249"> <summary> Relabel packets to rtorrent_server the packet type. </summary> @@ -56354,7 +56400,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="78023"> +<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74271"> <summary> Send and receive TCP traffic on the rtsp port. </summary> @@ -56365,7 +56411,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rtsp_port" lineno="78042"> +<interface name="corenet_udp_send_rtsp_port" lineno="74286"> <summary> Send UDP traffic on the rtsp port. </summary> @@ -56376,7 +56422,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="78061"> +<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74301"> <summary> Do not audit attempts to send UDP traffic on the rtsp port. </summary> @@ -56387,7 +56433,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rtsp_port" lineno="78080"> +<interface name="corenet_udp_receive_rtsp_port" lineno="74316"> <summary> Receive UDP traffic on the rtsp port. </summary> @@ -56398,7 +56444,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="78099"> +<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74331"> <summary> Do not audit attempts to receive UDP traffic on the rtsp port. </summary> @@ -56409,7 +56455,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rtsp_port" lineno="78118"> +<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74346"> <summary> Send and receive UDP traffic on the rtsp port. </summary> @@ -56420,7 +56466,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="78135"> +<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74362"> <summary> Do not audit attempts to send and receive UDP traffic on the rtsp port. @@ -56432,7 +56478,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rtsp_port" lineno="78151"> +<interface name="corenet_tcp_bind_rtsp_port" lineno="74377"> <summary> Bind TCP sockets to the rtsp port. </summary> @@ -56443,7 +56489,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rtsp_port" lineno="78171"> +<interface name="corenet_udp_bind_rtsp_port" lineno="74397"> <summary> Bind UDP sockets to the rtsp port. </summary> @@ -56454,7 +56500,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rtsp_port" lineno="78190"> +<interface name="corenet_tcp_connect_rtsp_port" lineno="74416"> <summary> Make a TCP connection to the rtsp port. </summary> @@ -56464,7 +56510,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtsp_client_packets" lineno="78210"> +<interface name="corenet_send_rtsp_client_packets" lineno="74436"> <summary> Send rtsp_client packets. </summary> @@ -56475,7 +56521,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="78229"> +<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74455"> <summary> Do not audit attempts to send rtsp_client packets. </summary> @@ -56486,7 +56532,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtsp_client_packets" lineno="78248"> +<interface name="corenet_receive_rtsp_client_packets" lineno="74474"> <summary> Receive rtsp_client packets. </summary> @@ -56497,7 +56543,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="78267"> +<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="74493"> <summary> Do not audit attempts to receive rtsp_client packets. </summary> @@ -56508,7 +56554,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtsp_client_packets" lineno="78286"> +<interface name="corenet_sendrecv_rtsp_client_packets" lineno="74512"> <summary> Send and receive rtsp_client packets. </summary> @@ -56519,7 +56565,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="78302"> +<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="74528"> <summary> Do not audit attempts to send and receive rtsp_client packets. </summary> @@ -56530,7 +56576,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtsp_client_packets" lineno="78317"> +<interface name="corenet_relabelto_rtsp_client_packets" lineno="74543"> <summary> Relabel packets to rtsp_client the packet type. </summary> @@ -56540,7 +56586,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtsp_server_packets" lineno="78337"> +<interface name="corenet_send_rtsp_server_packets" lineno="74563"> <summary> Send rtsp_server packets. </summary> @@ -56551,7 +56597,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="78356"> +<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="74582"> <summary> Do not audit attempts to send rtsp_server packets. </summary> @@ -56562,7 +56608,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtsp_server_packets" lineno="78375"> +<interface name="corenet_receive_rtsp_server_packets" lineno="74601"> <summary> Receive rtsp_server packets. </summary> @@ -56573,7 +56619,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="78394"> +<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="74620"> <summary> Do not audit attempts to receive rtsp_server packets. </summary> @@ -56584,7 +56630,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtsp_server_packets" lineno="78413"> +<interface name="corenet_sendrecv_rtsp_server_packets" lineno="74639"> <summary> Send and receive rtsp_server packets. </summary> @@ -56595,7 +56641,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="78429"> +<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="74655"> <summary> Do not audit attempts to send and receive rtsp_server packets. </summary> @@ -56606,7 +56652,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtsp_server_packets" lineno="78444"> +<interface name="corenet_relabelto_rtsp_server_packets" lineno="74670"> <summary> Relabel packets to rtsp_server the packet type. </summary> @@ -56616,7 +56662,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rwho_port" lineno="78466"> +<interface name="corenet_tcp_sendrecv_rwho_port" lineno="74692"> <summary> Send and receive TCP traffic on the rwho port. </summary> @@ -56627,7 +56673,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rwho_port" lineno="78485"> +<interface name="corenet_udp_send_rwho_port" lineno="74707"> <summary> Send UDP traffic on the rwho port. </summary> @@ -56638,7 +56684,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="78504"> +<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="74722"> <summary> Do not audit attempts to send UDP traffic on the rwho port. </summary> @@ -56649,7 +56695,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rwho_port" lineno="78523"> +<interface name="corenet_udp_receive_rwho_port" lineno="74737"> <summary> Receive UDP traffic on the rwho port. </summary> @@ -56660,7 +56706,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="78542"> +<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="74752"> <summary> Do not audit attempts to receive UDP traffic on the rwho port. </summary> @@ -56671,7 +56717,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rwho_port" lineno="78561"> +<interface name="corenet_udp_sendrecv_rwho_port" lineno="74767"> <summary> Send and receive UDP traffic on the rwho port. </summary> @@ -56682,7 +56728,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="78578"> +<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="74783"> <summary> Do not audit attempts to send and receive UDP traffic on the rwho port. @@ -56694,7 +56740,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rwho_port" lineno="78594"> +<interface name="corenet_tcp_bind_rwho_port" lineno="74798"> <summary> Bind TCP sockets to the rwho port. </summary> @@ -56705,7 +56751,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rwho_port" lineno="78614"> +<interface name="corenet_udp_bind_rwho_port" lineno="74818"> <summary> Bind UDP sockets to the rwho port. </summary> @@ -56716,7 +56762,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rwho_port" lineno="78633"> +<interface name="corenet_tcp_connect_rwho_port" lineno="74837"> <summary> Make a TCP connection to the rwho port. </summary> @@ -56726,7 +56772,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rwho_client_packets" lineno="78653"> +<interface name="corenet_send_rwho_client_packets" lineno="74857"> <summary> Send rwho_client packets. </summary> @@ -56737,7 +56783,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="78672"> +<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="74876"> <summary> Do not audit attempts to send rwho_client packets. </summary> @@ -56748,7 +56794,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rwho_client_packets" lineno="78691"> +<interface name="corenet_receive_rwho_client_packets" lineno="74895"> <summary> Receive rwho_client packets. </summary> @@ -56759,7 +56805,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="78710"> +<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="74914"> <summary> Do not audit attempts to receive rwho_client packets. </summary> @@ -56770,7 +56816,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rwho_client_packets" lineno="78729"> +<interface name="corenet_sendrecv_rwho_client_packets" lineno="74933"> <summary> Send and receive rwho_client packets. </summary> @@ -56781,7 +56827,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="78745"> +<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="74949"> <summary> Do not audit attempts to send and receive rwho_client packets. </summary> @@ -56792,7 +56838,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rwho_client_packets" lineno="78760"> +<interface name="corenet_relabelto_rwho_client_packets" lineno="74964"> <summary> Relabel packets to rwho_client the packet type. </summary> @@ -56802,7 +56848,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rwho_server_packets" lineno="78780"> +<interface name="corenet_send_rwho_server_packets" lineno="74984"> <summary> Send rwho_server packets. </summary> @@ -56813,7 +56859,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="78799"> +<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75003"> <summary> Do not audit attempts to send rwho_server packets. </summary> @@ -56824,7 +56870,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rwho_server_packets" lineno="78818"> +<interface name="corenet_receive_rwho_server_packets" lineno="75022"> <summary> Receive rwho_server packets. </summary> @@ -56835,7 +56881,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="78837"> +<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75041"> <summary> Do not audit attempts to receive rwho_server packets. </summary> @@ -56846,7 +56892,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rwho_server_packets" lineno="78856"> +<interface name="corenet_sendrecv_rwho_server_packets" lineno="75060"> <summary> Send and receive rwho_server packets. </summary> @@ -56857,7 +56903,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="78872"> +<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75076"> <summary> Do not audit attempts to send and receive rwho_server packets. </summary> @@ -56868,7 +56914,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rwho_server_packets" lineno="78887"> +<interface name="corenet_relabelto_rwho_server_packets" lineno="75091"> <summary> Relabel packets to rwho_server the packet type. </summary> @@ -56878,7 +56924,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_salt_port" lineno="78909"> +<interface name="corenet_tcp_sendrecv_salt_port" lineno="75113"> <summary> Send and receive TCP traffic on the salt port. </summary> @@ -56889,7 +56935,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_salt_port" lineno="78928"> +<interface name="corenet_udp_send_salt_port" lineno="75128"> <summary> Send UDP traffic on the salt port. </summary> @@ -56900,7 +56946,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_salt_port" lineno="78947"> +<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75143"> <summary> Do not audit attempts to send UDP traffic on the salt port. </summary> @@ -56911,7 +56957,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_salt_port" lineno="78966"> +<interface name="corenet_udp_receive_salt_port" lineno="75158"> <summary> Receive UDP traffic on the salt port. </summary> @@ -56922,7 +56968,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="78985"> +<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75173"> <summary> Do not audit attempts to receive UDP traffic on the salt port. </summary> @@ -56933,7 +56979,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_salt_port" lineno="79004"> +<interface name="corenet_udp_sendrecv_salt_port" lineno="75188"> <summary> Send and receive UDP traffic on the salt port. </summary> @@ -56944,7 +56990,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="79021"> +<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75204"> <summary> Do not audit attempts to send and receive UDP traffic on the salt port. @@ -56956,7 +57002,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_salt_port" lineno="79037"> +<interface name="corenet_tcp_bind_salt_port" lineno="75219"> <summary> Bind TCP sockets to the salt port. </summary> @@ -56967,7 +57013,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_salt_port" lineno="79057"> +<interface name="corenet_udp_bind_salt_port" lineno="75239"> <summary> Bind UDP sockets to the salt port. </summary> @@ -56978,7 +57024,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_salt_port" lineno="79076"> +<interface name="corenet_tcp_connect_salt_port" lineno="75258"> <summary> Make a TCP connection to the salt port. </summary> @@ -56988,7 +57034,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_salt_client_packets" lineno="79096"> +<interface name="corenet_send_salt_client_packets" lineno="75278"> <summary> Send salt_client packets. </summary> @@ -56999,7 +57045,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_salt_client_packets" lineno="79115"> +<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75297"> <summary> Do not audit attempts to send salt_client packets. </summary> @@ -57010,7 +57056,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_salt_client_packets" lineno="79134"> +<interface name="corenet_receive_salt_client_packets" lineno="75316"> <summary> Receive salt_client packets. </summary> @@ -57021,7 +57067,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="79153"> +<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75335"> <summary> Do not audit attempts to receive salt_client packets. </summary> @@ -57032,7 +57078,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_salt_client_packets" lineno="79172"> +<interface name="corenet_sendrecv_salt_client_packets" lineno="75354"> <summary> Send and receive salt_client packets. </summary> @@ -57043,7 +57089,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="79188"> +<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75370"> <summary> Do not audit attempts to send and receive salt_client packets. </summary> @@ -57054,7 +57100,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_salt_client_packets" lineno="79203"> +<interface name="corenet_relabelto_salt_client_packets" lineno="75385"> <summary> Relabel packets to salt_client the packet type. </summary> @@ -57064,7 +57110,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_salt_server_packets" lineno="79223"> +<interface name="corenet_send_salt_server_packets" lineno="75405"> <summary> Send salt_server packets. </summary> @@ -57075,7 +57121,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_salt_server_packets" lineno="79242"> +<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75424"> <summary> Do not audit attempts to send salt_server packets. </summary> @@ -57086,7 +57132,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_salt_server_packets" lineno="79261"> +<interface name="corenet_receive_salt_server_packets" lineno="75443"> <summary> Receive salt_server packets. </summary> @@ -57097,7 +57143,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="79280"> +<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="75462"> <summary> Do not audit attempts to receive salt_server packets. </summary> @@ -57108,7 +57154,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_salt_server_packets" lineno="79299"> +<interface name="corenet_sendrecv_salt_server_packets" lineno="75481"> <summary> Send and receive salt_server packets. </summary> @@ -57119,7 +57165,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="79315"> +<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="75497"> <summary> Do not audit attempts to send and receive salt_server packets. </summary> @@ -57130,7 +57176,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_salt_server_packets" lineno="79330"> +<interface name="corenet_relabelto_salt_server_packets" lineno="75512"> <summary> Relabel packets to salt_server the packet type. </summary> @@ -57140,7 +57186,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sap_port" lineno="79352"> +<interface name="corenet_tcp_sendrecv_sap_port" lineno="75534"> <summary> Send and receive TCP traffic on the sap port. </summary> @@ -57151,7 +57197,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_sap_port" lineno="79371"> +<interface name="corenet_udp_send_sap_port" lineno="75549"> <summary> Send UDP traffic on the sap port. </summary> @@ -57162,7 +57208,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_sap_port" lineno="79390"> +<interface name="corenet_dontaudit_udp_send_sap_port" lineno="75564"> <summary> Do not audit attempts to send UDP traffic on the sap port. </summary> @@ -57173,7 +57219,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_sap_port" lineno="79409"> +<interface name="corenet_udp_receive_sap_port" lineno="75579"> <summary> Receive UDP traffic on the sap port. </summary> @@ -57184,7 +57230,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="79428"> +<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="75594"> <summary> Do not audit attempts to receive UDP traffic on the sap port. </summary> @@ -57195,7 +57241,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_sap_port" lineno="79447"> +<interface name="corenet_udp_sendrecv_sap_port" lineno="75609"> <summary> Send and receive UDP traffic on the sap port. </summary> @@ -57206,7 +57252,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="79464"> +<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="75625"> <summary> Do not audit attempts to send and receive UDP traffic on the sap port. @@ -57218,7 +57264,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_sap_port" lineno="79480"> +<interface name="corenet_tcp_bind_sap_port" lineno="75640"> <summary> Bind TCP sockets to the sap port. </summary> @@ -57229,7 +57275,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sap_port" lineno="79500"> +<interface name="corenet_udp_bind_sap_port" lineno="75660"> <summary> Bind UDP sockets to the sap port. </summary> @@ -57240,7 +57286,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sap_port" lineno="79519"> +<interface name="corenet_tcp_connect_sap_port" lineno="75679"> <summary> Make a TCP connection to the sap port. </summary> @@ -57250,7 +57296,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sap_client_packets" lineno="79539"> +<interface name="corenet_send_sap_client_packets" lineno="75699"> <summary> Send sap_client packets. </summary> @@ -57261,7 +57307,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sap_client_packets" lineno="79558"> +<interface name="corenet_dontaudit_send_sap_client_packets" lineno="75718"> <summary> Do not audit attempts to send sap_client packets. </summary> @@ -57272,7 +57318,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sap_client_packets" lineno="79577"> +<interface name="corenet_receive_sap_client_packets" lineno="75737"> <summary> Receive sap_client packets. </summary> @@ -57283,7 +57329,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="79596"> +<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="75756"> <summary> Do not audit attempts to receive sap_client packets. </summary> @@ -57294,7 +57340,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sap_client_packets" lineno="79615"> +<interface name="corenet_sendrecv_sap_client_packets" lineno="75775"> <summary> Send and receive sap_client packets. </summary> @@ -57305,7 +57351,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="79631"> +<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="75791"> <summary> Do not audit attempts to send and receive sap_client packets. </summary> @@ -57316,7 +57362,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sap_client_packets" lineno="79646"> +<interface name="corenet_relabelto_sap_client_packets" lineno="75806"> <summary> Relabel packets to sap_client the packet type. </summary> @@ -57326,7 +57372,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sap_server_packets" lineno="79666"> +<interface name="corenet_send_sap_server_packets" lineno="75826"> <summary> Send sap_server packets. </summary> @@ -57337,7 +57383,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sap_server_packets" lineno="79685"> +<interface name="corenet_dontaudit_send_sap_server_packets" lineno="75845"> <summary> Do not audit attempts to send sap_server packets. </summary> @@ -57348,7 +57394,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sap_server_packets" lineno="79704"> +<interface name="corenet_receive_sap_server_packets" lineno="75864"> <summary> Receive sap_server packets. </summary> @@ -57359,7 +57405,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="79723"> +<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="75883"> <summary> Do not audit attempts to receive sap_server packets. </summary> @@ -57370,7 +57416,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sap_server_packets" lineno="79742"> +<interface name="corenet_sendrecv_sap_server_packets" lineno="75902"> <summary> Send and receive sap_server packets. </summary> @@ -57381,7 +57427,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="79758"> +<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="75918"> <summary> Do not audit attempts to send and receive sap_server packets. </summary> @@ -57392,7 +57438,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sap_server_packets" lineno="79773"> +<interface name="corenet_relabelto_sap_server_packets" lineno="75933"> <summary> Relabel packets to sap_server the packet type. </summary> @@ -57402,7 +57448,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="79795"> +<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="75955"> <summary> Send and receive TCP traffic on the servistaitsm port. </summary> @@ -57413,7 +57459,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_servistaitsm_port" lineno="79814"> +<interface name="corenet_udp_send_servistaitsm_port" lineno="75970"> <summary> Send UDP traffic on the servistaitsm port. </summary> @@ -57424,7 +57470,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="79833"> +<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="75985"> <summary> Do not audit attempts to send UDP traffic on the servistaitsm port. </summary> @@ -57435,7 +57481,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_servistaitsm_port" lineno="79852"> +<interface name="corenet_udp_receive_servistaitsm_port" lineno="76000"> <summary> Receive UDP traffic on the servistaitsm port. </summary> @@ -57446,7 +57492,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="79871"> +<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76015"> <summary> Do not audit attempts to receive UDP traffic on the servistaitsm port. </summary> @@ -57457,7 +57503,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="79890"> +<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76030"> <summary> Send and receive UDP traffic on the servistaitsm port. </summary> @@ -57468,7 +57514,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="79907"> +<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76046"> <summary> Do not audit attempts to send and receive UDP traffic on the servistaitsm port. @@ -57480,7 +57526,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_servistaitsm_port" lineno="79923"> +<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76061"> <summary> Bind TCP sockets to the servistaitsm port. </summary> @@ -57491,7 +57537,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_servistaitsm_port" lineno="79943"> +<interface name="corenet_udp_bind_servistaitsm_port" lineno="76081"> <summary> Bind UDP sockets to the servistaitsm port. </summary> @@ -57502,7 +57548,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_servistaitsm_port" lineno="79962"> +<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76100"> <summary> Make a TCP connection to the servistaitsm port. </summary> @@ -57512,7 +57558,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_servistaitsm_client_packets" lineno="79982"> +<interface name="corenet_send_servistaitsm_client_packets" lineno="76120"> <summary> Send servistaitsm_client packets. </summary> @@ -57523,7 +57569,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="80001"> +<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76139"> <summary> Do not audit attempts to send servistaitsm_client packets. </summary> @@ -57534,7 +57580,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_servistaitsm_client_packets" lineno="80020"> +<interface name="corenet_receive_servistaitsm_client_packets" lineno="76158"> <summary> Receive servistaitsm_client packets. </summary> @@ -57545,7 +57591,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="80039"> +<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76177"> <summary> Do not audit attempts to receive servistaitsm_client packets. </summary> @@ -57556,7 +57602,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="80058"> +<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76196"> <summary> Send and receive servistaitsm_client packets. </summary> @@ -57567,7 +57613,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="80074"> +<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76212"> <summary> Do not audit attempts to send and receive servistaitsm_client packets. </summary> @@ -57578,7 +57624,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="80089"> +<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76227"> <summary> Relabel packets to servistaitsm_client the packet type. </summary> @@ -57588,7 +57634,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_servistaitsm_server_packets" lineno="80109"> +<interface name="corenet_send_servistaitsm_server_packets" lineno="76247"> <summary> Send servistaitsm_server packets. </summary> @@ -57599,7 +57645,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="80128"> +<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76266"> <summary> Do not audit attempts to send servistaitsm_server packets. </summary> @@ -57610,7 +57656,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_servistaitsm_server_packets" lineno="80147"> +<interface name="corenet_receive_servistaitsm_server_packets" lineno="76285"> <summary> Receive servistaitsm_server packets. </summary> @@ -57621,7 +57667,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="80166"> +<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76304"> <summary> Do not audit attempts to receive servistaitsm_server packets. </summary> @@ -57632,7 +57678,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="80185"> +<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76323"> <summary> Send and receive servistaitsm_server packets. </summary> @@ -57643,7 +57689,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="80201"> +<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76339"> <summary> Do not audit attempts to send and receive servistaitsm_server packets. </summary> @@ -57654,7 +57700,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="80216"> +<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76354"> <summary> Relabel packets to servistaitsm_server the packet type. </summary> @@ -57664,7 +57710,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sieve_port" lineno="80238"> +<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76376"> <summary> Send and receive TCP traffic on the sieve port. </summary> @@ -57675,7 +57721,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_sieve_port" lineno="80257"> +<interface name="corenet_udp_send_sieve_port" lineno="76391"> <summary> Send UDP traffic on the sieve port. </summary> @@ -57686,7 +57732,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="80276"> +<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76406"> <summary> Do not audit attempts to send UDP traffic on the sieve port. </summary> @@ -57697,7 +57743,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_sieve_port" lineno="80295"> +<interface name="corenet_udp_receive_sieve_port" lineno="76421"> <summary> Receive UDP traffic on the sieve port. </summary> @@ -57708,7 +57754,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="80314"> +<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76436"> <summary> Do not audit attempts to receive UDP traffic on the sieve port. </summary> @@ -57719,7 +57765,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_sieve_port" lineno="80333"> +<interface name="corenet_udp_sendrecv_sieve_port" lineno="76451"> <summary> Send and receive UDP traffic on the sieve port. </summary> @@ -57730,7 +57776,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="80350"> +<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="76467"> <summary> Do not audit attempts to send and receive UDP traffic on the sieve port. @@ -57742,7 +57788,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_sieve_port" lineno="80366"> +<interface name="corenet_tcp_bind_sieve_port" lineno="76482"> <summary> Bind TCP sockets to the sieve port. </summary> @@ -57753,7 +57799,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sieve_port" lineno="80386"> +<interface name="corenet_udp_bind_sieve_port" lineno="76502"> <summary> Bind UDP sockets to the sieve port. </summary> @@ -57764,7 +57810,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sieve_port" lineno="80405"> +<interface name="corenet_tcp_connect_sieve_port" lineno="76521"> <summary> Make a TCP connection to the sieve port. </summary> @@ -57774,7 +57820,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sieve_client_packets" lineno="80425"> +<interface name="corenet_send_sieve_client_packets" lineno="76541"> <summary> Send sieve_client packets. </summary> @@ -57785,7 +57831,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="80444"> +<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="76560"> <summary> Do not audit attempts to send sieve_client packets. </summary> @@ -57796,7 +57842,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sieve_client_packets" lineno="80463"> +<interface name="corenet_receive_sieve_client_packets" lineno="76579"> <summary> Receive sieve_client packets. </summary> @@ -57807,7 +57853,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="80482"> +<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="76598"> <summary> Do not audit attempts to receive sieve_client packets. </summary> @@ -57818,7 +57864,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sieve_client_packets" lineno="80501"> +<interface name="corenet_sendrecv_sieve_client_packets" lineno="76617"> <summary> Send and receive sieve_client packets. </summary> @@ -57829,7 +57875,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="80517"> +<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="76633"> <summary> Do not audit attempts to send and receive sieve_client packets. </summary> @@ -57840,7 +57886,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sieve_client_packets" lineno="80532"> +<interface name="corenet_relabelto_sieve_client_packets" lineno="76648"> <summary> Relabel packets to sieve_client the packet type. </summary> @@ -57850,7 +57896,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sieve_server_packets" lineno="80552"> +<interface name="corenet_send_sieve_server_packets" lineno="76668"> <summary> Send sieve_server packets. </summary> @@ -57861,7 +57907,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="80571"> +<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="76687"> <summary> Do not audit attempts to send sieve_server packets. </summary> @@ -57872,7 +57918,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sieve_server_packets" lineno="80590"> +<interface name="corenet_receive_sieve_server_packets" lineno="76706"> <summary> Receive sieve_server packets. </summary> @@ -57883,7 +57929,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="80609"> +<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="76725"> <summary> Do not audit attempts to receive sieve_server packets. </summary> @@ -57894,7 +57940,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sieve_server_packets" lineno="80628"> +<interface name="corenet_sendrecv_sieve_server_packets" lineno="76744"> <summary> Send and receive sieve_server packets. </summary> @@ -57905,7 +57951,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="80644"> +<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="76760"> <summary> Do not audit attempts to send and receive sieve_server packets. </summary> @@ -57916,7 +57962,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sieve_server_packets" lineno="80659"> +<interface name="corenet_relabelto_sieve_server_packets" lineno="76775"> <summary> Relabel packets to sieve_server the packet type. </summary> @@ -57926,7 +57972,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sip_port" lineno="80681"> +<interface name="corenet_tcp_sendrecv_sip_port" lineno="76797"> <summary> Send and receive TCP traffic on the sip port. </summary> @@ -57937,7 +57983,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_sip_port" lineno="80700"> +<interface name="corenet_udp_send_sip_port" lineno="76812"> <summary> Send UDP traffic on the sip port. </summary> @@ -57948,7 +57994,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_sip_port" lineno="80719"> +<interface name="corenet_dontaudit_udp_send_sip_port" lineno="76827"> <summary> Do not audit attempts to send UDP traffic on the sip port. </summary> @@ -57959,7 +58005,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_sip_port" lineno="80738"> +<interface name="corenet_udp_receive_sip_port" lineno="76842"> <summary> Receive UDP traffic on the sip port. </summary> @@ -57970,7 +58016,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="80757"> +<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="76857"> <summary> Do not audit attempts to receive UDP traffic on the sip port. </summary> @@ -57981,7 +58027,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_sip_port" lineno="80776"> +<interface name="corenet_udp_sendrecv_sip_port" lineno="76872"> <summary> Send and receive UDP traffic on the sip port. </summary> @@ -57992,7 +58038,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="80793"> +<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="76888"> <summary> Do not audit attempts to send and receive UDP traffic on the sip port. @@ -58004,7 +58050,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_sip_port" lineno="80809"> +<interface name="corenet_tcp_bind_sip_port" lineno="76903"> <summary> Bind TCP sockets to the sip port. </summary> @@ -58015,7 +58061,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sip_port" lineno="80829"> +<interface name="corenet_udp_bind_sip_port" lineno="76923"> <summary> Bind UDP sockets to the sip port. </summary> @@ -58026,7 +58072,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sip_port" lineno="80848"> +<interface name="corenet_tcp_connect_sip_port" lineno="76942"> <summary> Make a TCP connection to the sip port. </summary> @@ -58036,7 +58082,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sip_client_packets" lineno="80868"> +<interface name="corenet_send_sip_client_packets" lineno="76962"> <summary> Send sip_client packets. </summary> @@ -58047,7 +58093,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sip_client_packets" lineno="80887"> +<interface name="corenet_dontaudit_send_sip_client_packets" lineno="76981"> <summary> Do not audit attempts to send sip_client packets. </summary> @@ -58058,7 +58104,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sip_client_packets" lineno="80906"> +<interface name="corenet_receive_sip_client_packets" lineno="77000"> <summary> Receive sip_client packets. </summary> @@ -58069,7 +58115,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="80925"> +<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77019"> <summary> Do not audit attempts to receive sip_client packets. </summary> @@ -58080,7 +58126,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sip_client_packets" lineno="80944"> +<interface name="corenet_sendrecv_sip_client_packets" lineno="77038"> <summary> Send and receive sip_client packets. </summary> @@ -58091,7 +58137,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="80960"> +<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77054"> <summary> Do not audit attempts to send and receive sip_client packets. </summary> @@ -58102,7 +58148,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sip_client_packets" lineno="80975"> +<interface name="corenet_relabelto_sip_client_packets" lineno="77069"> <summary> Relabel packets to sip_client the packet type. </summary> @@ -58112,7 +58158,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sip_server_packets" lineno="80995"> +<interface name="corenet_send_sip_server_packets" lineno="77089"> <summary> Send sip_server packets. </summary> @@ -58123,7 +58169,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sip_server_packets" lineno="81014"> +<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77108"> <summary> Do not audit attempts to send sip_server packets. </summary> @@ -58134,7 +58180,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sip_server_packets" lineno="81033"> +<interface name="corenet_receive_sip_server_packets" lineno="77127"> <summary> Receive sip_server packets. </summary> @@ -58145,7 +58191,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="81052"> +<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77146"> <summary> Do not audit attempts to receive sip_server packets. </summary> @@ -58156,7 +58202,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sip_server_packets" lineno="81071"> +<interface name="corenet_sendrecv_sip_server_packets" lineno="77165"> <summary> Send and receive sip_server packets. </summary> @@ -58167,7 +58213,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="81087"> +<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77181"> <summary> Do not audit attempts to send and receive sip_server packets. </summary> @@ -58178,7 +58224,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sip_server_packets" lineno="81102"> +<interface name="corenet_relabelto_sip_server_packets" lineno="77196"> <summary> Relabel packets to sip_server the packet type. </summary> @@ -58188,7 +58234,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="81124"> +<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77218"> <summary> Send and receive TCP traffic on the sixxsconfig port. </summary> @@ -58199,7 +58245,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_sixxsconfig_port" lineno="81143"> +<interface name="corenet_udp_send_sixxsconfig_port" lineno="77233"> <summary> Send UDP traffic on the sixxsconfig port. </summary> @@ -58210,7 +58256,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="81162"> +<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77248"> <summary> Do not audit attempts to send UDP traffic on the sixxsconfig port. </summary> @@ -58221,7 +58267,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_sixxsconfig_port" lineno="81181"> +<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77263"> <summary> Receive UDP traffic on the sixxsconfig port. </summary> @@ -58232,7 +58278,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="81200"> +<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77278"> <summary> Do not audit attempts to receive UDP traffic on the sixxsconfig port. </summary> @@ -58243,7 +58289,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="81219"> +<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77293"> <summary> Send and receive UDP traffic on the sixxsconfig port. </summary> @@ -58254,7 +58300,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="81236"> +<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77309"> <summary> Do not audit attempts to send and receive UDP traffic on the sixxsconfig port. @@ -58266,7 +58312,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="81252"> +<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77324"> <summary> Bind TCP sockets to the sixxsconfig port. </summary> @@ -58277,7 +58323,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sixxsconfig_port" lineno="81272"> +<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77344"> <summary> Bind UDP sockets to the sixxsconfig port. </summary> @@ -58288,7 +58334,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="81291"> +<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77363"> <summary> Make a TCP connection to the sixxsconfig port. </summary> @@ -58298,7 +58344,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sixxsconfig_client_packets" lineno="81311"> +<interface name="corenet_send_sixxsconfig_client_packets" lineno="77383"> <summary> Send sixxsconfig_client packets. </summary> @@ -58309,7 +58355,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="81330"> +<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77402"> <summary> Do not audit attempts to send sixxsconfig_client packets. </summary> @@ -58320,7 +58366,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sixxsconfig_client_packets" lineno="81349"> +<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77421"> <summary> Receive sixxsconfig_client packets. </summary> @@ -58331,7 +58377,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="81368"> +<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77440"> <summary> Do not audit attempts to receive sixxsconfig_client packets. </summary> @@ -58342,7 +58388,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="81387"> +<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="77459"> <summary> Send and receive sixxsconfig_client packets. </summary> @@ -58353,7 +58399,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="81403"> +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="77475"> <summary> Do not audit attempts to send and receive sixxsconfig_client packets. </summary> @@ -58364,7 +58410,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="81418"> +<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="77490"> <summary> Relabel packets to sixxsconfig_client the packet type. </summary> @@ -58374,7 +58420,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sixxsconfig_server_packets" lineno="81438"> +<interface name="corenet_send_sixxsconfig_server_packets" lineno="77510"> <summary> Send sixxsconfig_server packets. </summary> @@ -58385,7 +58431,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="81457"> +<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="77529"> <summary> Do not audit attempts to send sixxsconfig_server packets. </summary> @@ -58396,7 +58442,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sixxsconfig_server_packets" lineno="81476"> +<interface name="corenet_receive_sixxsconfig_server_packets" lineno="77548"> <summary> Receive sixxsconfig_server packets. </summary> @@ -58407,7 +58453,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="81495"> +<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="77567"> <summary> Do not audit attempts to receive sixxsconfig_server packets. </summary> @@ -58418,7 +58464,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="81514"> +<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="77586"> <summary> Send and receive sixxsconfig_server packets. </summary> @@ -58429,7 +58475,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="81530"> +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="77602"> <summary> Do not audit attempts to send and receive sixxsconfig_server packets. </summary> @@ -58440,7 +58486,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="81545"> +<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="77617"> <summary> Relabel packets to sixxsconfig_server the packet type. </summary> @@ -58450,7 +58496,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_smbd_port" lineno="81567"> +<interface name="corenet_tcp_sendrecv_smbd_port" lineno="77639"> <summary> Send and receive TCP traffic on the smbd port. </summary> @@ -58461,7 +58507,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_smbd_port" lineno="81586"> +<interface name="corenet_udp_send_smbd_port" lineno="77654"> <summary> Send UDP traffic on the smbd port. </summary> @@ -58472,7 +58518,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="81605"> +<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="77669"> <summary> Do not audit attempts to send UDP traffic on the smbd port. </summary> @@ -58483,7 +58529,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_smbd_port" lineno="81624"> +<interface name="corenet_udp_receive_smbd_port" lineno="77684"> <summary> Receive UDP traffic on the smbd port. </summary> @@ -58494,7 +58540,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="81643"> +<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="77699"> <summary> Do not audit attempts to receive UDP traffic on the smbd port. </summary> @@ -58505,7 +58551,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_smbd_port" lineno="81662"> +<interface name="corenet_udp_sendrecv_smbd_port" lineno="77714"> <summary> Send and receive UDP traffic on the smbd port. </summary> @@ -58516,7 +58562,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="81679"> +<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="77730"> <summary> Do not audit attempts to send and receive UDP traffic on the smbd port. @@ -58528,7 +58574,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_smbd_port" lineno="81695"> +<interface name="corenet_tcp_bind_smbd_port" lineno="77745"> <summary> Bind TCP sockets to the smbd port. </summary> @@ -58539,7 +58585,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_smbd_port" lineno="81715"> +<interface name="corenet_udp_bind_smbd_port" lineno="77765"> <summary> Bind UDP sockets to the smbd port. </summary> @@ -58550,7 +58596,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_smbd_port" lineno="81734"> +<interface name="corenet_tcp_connect_smbd_port" lineno="77784"> <summary> Make a TCP connection to the smbd port. </summary> @@ -58560,7 +58606,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smbd_client_packets" lineno="81754"> +<interface name="corenet_send_smbd_client_packets" lineno="77804"> <summary> Send smbd_client packets. </summary> @@ -58571,7 +58617,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="81773"> +<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="77823"> <summary> Do not audit attempts to send smbd_client packets. </summary> @@ -58582,7 +58628,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smbd_client_packets" lineno="81792"> +<interface name="corenet_receive_smbd_client_packets" lineno="77842"> <summary> Receive smbd_client packets. </summary> @@ -58593,7 +58639,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="81811"> +<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="77861"> <summary> Do not audit attempts to receive smbd_client packets. </summary> @@ -58604,7 +58650,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smbd_client_packets" lineno="81830"> +<interface name="corenet_sendrecv_smbd_client_packets" lineno="77880"> <summary> Send and receive smbd_client packets. </summary> @@ -58615,7 +58661,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="81846"> +<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="77896"> <summary> Do not audit attempts to send and receive smbd_client packets. </summary> @@ -58626,7 +58672,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smbd_client_packets" lineno="81861"> +<interface name="corenet_relabelto_smbd_client_packets" lineno="77911"> <summary> Relabel packets to smbd_client the packet type. </summary> @@ -58636,7 +58682,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smbd_server_packets" lineno="81881"> +<interface name="corenet_send_smbd_server_packets" lineno="77931"> <summary> Send smbd_server packets. </summary> @@ -58647,7 +58693,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="81900"> +<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="77950"> <summary> Do not audit attempts to send smbd_server packets. </summary> @@ -58658,7 +58704,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smbd_server_packets" lineno="81919"> +<interface name="corenet_receive_smbd_server_packets" lineno="77969"> <summary> Receive smbd_server packets. </summary> @@ -58669,7 +58715,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="81938"> +<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="77988"> <summary> Do not audit attempts to receive smbd_server packets. </summary> @@ -58680,7 +58726,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smbd_server_packets" lineno="81957"> +<interface name="corenet_sendrecv_smbd_server_packets" lineno="78007"> <summary> Send and receive smbd_server packets. </summary> @@ -58691,7 +58737,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="81973"> +<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78023"> <summary> Do not audit attempts to send and receive smbd_server packets. </summary> @@ -58702,7 +58748,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smbd_server_packets" lineno="81988"> +<interface name="corenet_relabelto_smbd_server_packets" lineno="78038"> <summary> Relabel packets to smbd_server the packet type. </summary> @@ -58712,7 +58758,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_smtp_port" lineno="82010"> +<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78060"> <summary> Send and receive TCP traffic on the smtp port. </summary> @@ -58723,7 +58769,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_smtp_port" lineno="82029"> +<interface name="corenet_udp_send_smtp_port" lineno="78075"> <summary> Send UDP traffic on the smtp port. </summary> @@ -58734,7 +58780,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="82048"> +<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78090"> <summary> Do not audit attempts to send UDP traffic on the smtp port. </summary> @@ -58745,7 +58791,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_smtp_port" lineno="82067"> +<interface name="corenet_udp_receive_smtp_port" lineno="78105"> <summary> Receive UDP traffic on the smtp port. </summary> @@ -58756,7 +58802,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="82086"> +<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78120"> <summary> Do not audit attempts to receive UDP traffic on the smtp port. </summary> @@ -58767,7 +58813,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_smtp_port" lineno="82105"> +<interface name="corenet_udp_sendrecv_smtp_port" lineno="78135"> <summary> Send and receive UDP traffic on the smtp port. </summary> @@ -58778,7 +58824,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="82122"> +<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78151"> <summary> Do not audit attempts to send and receive UDP traffic on the smtp port. @@ -58790,7 +58836,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_smtp_port" lineno="82138"> +<interface name="corenet_tcp_bind_smtp_port" lineno="78166"> <summary> Bind TCP sockets to the smtp port. </summary> @@ -58801,7 +58847,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_smtp_port" lineno="82158"> +<interface name="corenet_udp_bind_smtp_port" lineno="78186"> <summary> Bind UDP sockets to the smtp port. </summary> @@ -58812,7 +58858,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_smtp_port" lineno="82177"> +<interface name="corenet_tcp_connect_smtp_port" lineno="78205"> <summary> Make a TCP connection to the smtp port. </summary> @@ -58822,7 +58868,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smtp_client_packets" lineno="82197"> +<interface name="corenet_send_smtp_client_packets" lineno="78225"> <summary> Send smtp_client packets. </summary> @@ -58833,7 +58879,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="82216"> +<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78244"> <summary> Do not audit attempts to send smtp_client packets. </summary> @@ -58844,7 +58890,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smtp_client_packets" lineno="82235"> +<interface name="corenet_receive_smtp_client_packets" lineno="78263"> <summary> Receive smtp_client packets. </summary> @@ -58855,7 +58901,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="82254"> +<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78282"> <summary> Do not audit attempts to receive smtp_client packets. </summary> @@ -58866,7 +58912,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smtp_client_packets" lineno="82273"> +<interface name="corenet_sendrecv_smtp_client_packets" lineno="78301"> <summary> Send and receive smtp_client packets. </summary> @@ -58877,7 +58923,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="82289"> +<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78317"> <summary> Do not audit attempts to send and receive smtp_client packets. </summary> @@ -58888,7 +58934,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smtp_client_packets" lineno="82304"> +<interface name="corenet_relabelto_smtp_client_packets" lineno="78332"> <summary> Relabel packets to smtp_client the packet type. </summary> @@ -58898,7 +58944,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smtp_server_packets" lineno="82324"> +<interface name="corenet_send_smtp_server_packets" lineno="78352"> <summary> Send smtp_server packets. </summary> @@ -58909,7 +58955,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="82343"> +<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78371"> <summary> Do not audit attempts to send smtp_server packets. </summary> @@ -58920,7 +58966,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smtp_server_packets" lineno="82362"> +<interface name="corenet_receive_smtp_server_packets" lineno="78390"> <summary> Receive smtp_server packets. </summary> @@ -58931,7 +58977,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="82381"> +<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78409"> <summary> Do not audit attempts to receive smtp_server packets. </summary> @@ -58942,7 +58988,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smtp_server_packets" lineno="82400"> +<interface name="corenet_sendrecv_smtp_server_packets" lineno="78428"> <summary> Send and receive smtp_server packets. </summary> @@ -58953,7 +58999,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="82416"> +<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78444"> <summary> Do not audit attempts to send and receive smtp_server packets. </summary> @@ -58964,7 +59010,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smtp_server_packets" lineno="82431"> +<interface name="corenet_relabelto_smtp_server_packets" lineno="78459"> <summary> Relabel packets to smtp_server the packet type. </summary> @@ -58974,7 +59020,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_snmp_port" lineno="82453"> +<interface name="corenet_tcp_sendrecv_snmp_port" lineno="78481"> <summary> Send and receive TCP traffic on the snmp port. </summary> @@ -58985,7 +59031,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_snmp_port" lineno="82472"> +<interface name="corenet_udp_send_snmp_port" lineno="78496"> <summary> Send UDP traffic on the snmp port. </summary> @@ -58996,7 +59042,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="82491"> +<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="78511"> <summary> Do not audit attempts to send UDP traffic on the snmp port. </summary> @@ -59007,7 +59053,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_snmp_port" lineno="82510"> +<interface name="corenet_udp_receive_snmp_port" lineno="78526"> <summary> Receive UDP traffic on the snmp port. </summary> @@ -59018,7 +59064,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="82529"> +<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="78541"> <summary> Do not audit attempts to receive UDP traffic on the snmp port. </summary> @@ -59029,7 +59075,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_snmp_port" lineno="82548"> +<interface name="corenet_udp_sendrecv_snmp_port" lineno="78556"> <summary> Send and receive UDP traffic on the snmp port. </summary> @@ -59040,7 +59086,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="82565"> +<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="78572"> <summary> Do not audit attempts to send and receive UDP traffic on the snmp port. @@ -59052,7 +59098,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_snmp_port" lineno="82581"> +<interface name="corenet_tcp_bind_snmp_port" lineno="78587"> <summary> Bind TCP sockets to the snmp port. </summary> @@ -59063,7 +59109,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_snmp_port" lineno="82601"> +<interface name="corenet_udp_bind_snmp_port" lineno="78607"> <summary> Bind UDP sockets to the snmp port. </summary> @@ -59074,7 +59120,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_snmp_port" lineno="82620"> +<interface name="corenet_tcp_connect_snmp_port" lineno="78626"> <summary> Make a TCP connection to the snmp port. </summary> @@ -59084,7 +59130,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_snmp_client_packets" lineno="82640"> +<interface name="corenet_send_snmp_client_packets" lineno="78646"> <summary> Send snmp_client packets. </summary> @@ -59095,7 +59141,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="82659"> +<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="78665"> <summary> Do not audit attempts to send snmp_client packets. </summary> @@ -59106,7 +59152,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_snmp_client_packets" lineno="82678"> +<interface name="corenet_receive_snmp_client_packets" lineno="78684"> <summary> Receive snmp_client packets. </summary> @@ -59117,7 +59163,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="82697"> +<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="78703"> <summary> Do not audit attempts to receive snmp_client packets. </summary> @@ -59128,7 +59174,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_snmp_client_packets" lineno="82716"> +<interface name="corenet_sendrecv_snmp_client_packets" lineno="78722"> <summary> Send and receive snmp_client packets. </summary> @@ -59139,7 +59185,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="82732"> +<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="78738"> <summary> Do not audit attempts to send and receive snmp_client packets. </summary> @@ -59150,7 +59196,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_snmp_client_packets" lineno="82747"> +<interface name="corenet_relabelto_snmp_client_packets" lineno="78753"> <summary> Relabel packets to snmp_client the packet type. </summary> @@ -59160,7 +59206,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_snmp_server_packets" lineno="82767"> +<interface name="corenet_send_snmp_server_packets" lineno="78773"> <summary> Send snmp_server packets. </summary> @@ -59171,7 +59217,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="82786"> +<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="78792"> <summary> Do not audit attempts to send snmp_server packets. </summary> @@ -59182,7 +59228,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_snmp_server_packets" lineno="82805"> +<interface name="corenet_receive_snmp_server_packets" lineno="78811"> <summary> Receive snmp_server packets. </summary> @@ -59193,7 +59239,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="82824"> +<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="78830"> <summary> Do not audit attempts to receive snmp_server packets. </summary> @@ -59204,7 +59250,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_snmp_server_packets" lineno="82843"> +<interface name="corenet_sendrecv_snmp_server_packets" lineno="78849"> <summary> Send and receive snmp_server packets. </summary> @@ -59215,7 +59261,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="82859"> +<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="78865"> <summary> Do not audit attempts to send and receive snmp_server packets. </summary> @@ -59226,7 +59272,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_snmp_server_packets" lineno="82874"> +<interface name="corenet_relabelto_snmp_server_packets" lineno="78880"> <summary> Relabel packets to snmp_server the packet type. </summary> @@ -59236,7 +59282,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_socks_port" lineno="82896"> +<interface name="corenet_tcp_sendrecv_socks_port" lineno="78902"> <summary> Send and receive TCP traffic on the socks port. </summary> @@ -59247,7 +59293,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_socks_port" lineno="82915"> +<interface name="corenet_udp_send_socks_port" lineno="78917"> <summary> Send UDP traffic on the socks port. </summary> @@ -59258,7 +59304,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_socks_port" lineno="82934"> +<interface name="corenet_dontaudit_udp_send_socks_port" lineno="78932"> <summary> Do not audit attempts to send UDP traffic on the socks port. </summary> @@ -59269,7 +59315,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_socks_port" lineno="82953"> +<interface name="corenet_udp_receive_socks_port" lineno="78947"> <summary> Receive UDP traffic on the socks port. </summary> @@ -59280,7 +59326,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="82972"> +<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="78962"> <summary> Do not audit attempts to receive UDP traffic on the socks port. </summary> @@ -59291,7 +59337,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_socks_port" lineno="82991"> +<interface name="corenet_udp_sendrecv_socks_port" lineno="78977"> <summary> Send and receive UDP traffic on the socks port. </summary> @@ -59302,7 +59348,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="83008"> +<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="78993"> <summary> Do not audit attempts to send and receive UDP traffic on the socks port. @@ -59314,7 +59360,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_socks_port" lineno="83024"> +<interface name="corenet_tcp_bind_socks_port" lineno="79008"> <summary> Bind TCP sockets to the socks port. </summary> @@ -59325,7 +59371,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_socks_port" lineno="83044"> +<interface name="corenet_udp_bind_socks_port" lineno="79028"> <summary> Bind UDP sockets to the socks port. </summary> @@ -59336,7 +59382,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_socks_port" lineno="83063"> +<interface name="corenet_tcp_connect_socks_port" lineno="79047"> <summary> Make a TCP connection to the socks port. </summary> @@ -59346,7 +59392,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_socks_client_packets" lineno="83083"> +<interface name="corenet_send_socks_client_packets" lineno="79067"> <summary> Send socks_client packets. </summary> @@ -59357,7 +59403,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_socks_client_packets" lineno="83102"> +<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79086"> <summary> Do not audit attempts to send socks_client packets. </summary> @@ -59368,7 +59414,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_socks_client_packets" lineno="83121"> +<interface name="corenet_receive_socks_client_packets" lineno="79105"> <summary> Receive socks_client packets. </summary> @@ -59379,7 +59425,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="83140"> +<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79124"> <summary> Do not audit attempts to receive socks_client packets. </summary> @@ -59390,7 +59436,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_socks_client_packets" lineno="83159"> +<interface name="corenet_sendrecv_socks_client_packets" lineno="79143"> <summary> Send and receive socks_client packets. </summary> @@ -59401,7 +59447,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="83175"> +<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79159"> <summary> Do not audit attempts to send and receive socks_client packets. </summary> @@ -59412,7 +59458,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_socks_client_packets" lineno="83190"> +<interface name="corenet_relabelto_socks_client_packets" lineno="79174"> <summary> Relabel packets to socks_client the packet type. </summary> @@ -59422,7 +59468,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_socks_server_packets" lineno="83210"> +<interface name="corenet_send_socks_server_packets" lineno="79194"> <summary> Send socks_server packets. </summary> @@ -59433,7 +59479,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_socks_server_packets" lineno="83229"> +<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79213"> <summary> Do not audit attempts to send socks_server packets. </summary> @@ -59444,7 +59490,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_socks_server_packets" lineno="83248"> +<interface name="corenet_receive_socks_server_packets" lineno="79232"> <summary> Receive socks_server packets. </summary> @@ -59455,7 +59501,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="83267"> +<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79251"> <summary> Do not audit attempts to receive socks_server packets. </summary> @@ -59466,7 +59512,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_socks_server_packets" lineno="83286"> +<interface name="corenet_sendrecv_socks_server_packets" lineno="79270"> <summary> Send and receive socks_server packets. </summary> @@ -59477,7 +59523,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="83302"> +<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79286"> <summary> Do not audit attempts to send and receive socks_server packets. </summary> @@ -59488,7 +59534,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_socks_server_packets" lineno="83317"> +<interface name="corenet_relabelto_socks_server_packets" lineno="79301"> <summary> Relabel packets to socks_server the packet type. </summary> @@ -59498,7 +59544,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_soundd_port" lineno="83339"> +<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79323"> <summary> Send and receive TCP traffic on the soundd port. </summary> @@ -59509,7 +59555,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_soundd_port" lineno="83358"> +<interface name="corenet_udp_send_soundd_port" lineno="79338"> <summary> Send UDP traffic on the soundd port. </summary> @@ -59520,7 +59566,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="83377"> +<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79353"> <summary> Do not audit attempts to send UDP traffic on the soundd port. </summary> @@ -59531,7 +59577,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_soundd_port" lineno="83396"> +<interface name="corenet_udp_receive_soundd_port" lineno="79368"> <summary> Receive UDP traffic on the soundd port. </summary> @@ -59542,7 +59588,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="83415"> +<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79383"> <summary> Do not audit attempts to receive UDP traffic on the soundd port. </summary> @@ -59553,7 +59599,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_soundd_port" lineno="83434"> +<interface name="corenet_udp_sendrecv_soundd_port" lineno="79398"> <summary> Send and receive UDP traffic on the soundd port. </summary> @@ -59564,7 +59610,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="83451"> +<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79414"> <summary> Do not audit attempts to send and receive UDP traffic on the soundd port. @@ -59576,7 +59622,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_soundd_port" lineno="83467"> +<interface name="corenet_tcp_bind_soundd_port" lineno="79429"> <summary> Bind TCP sockets to the soundd port. </summary> @@ -59587,7 +59633,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_soundd_port" lineno="83487"> +<interface name="corenet_udp_bind_soundd_port" lineno="79449"> <summary> Bind UDP sockets to the soundd port. </summary> @@ -59598,7 +59644,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_soundd_port" lineno="83506"> +<interface name="corenet_tcp_connect_soundd_port" lineno="79468"> <summary> Make a TCP connection to the soundd port. </summary> @@ -59608,7 +59654,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_soundd_client_packets" lineno="83526"> +<interface name="corenet_send_soundd_client_packets" lineno="79488"> <summary> Send soundd_client packets. </summary> @@ -59619,7 +59665,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="83545"> +<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="79507"> <summary> Do not audit attempts to send soundd_client packets. </summary> @@ -59630,7 +59676,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_soundd_client_packets" lineno="83564"> +<interface name="corenet_receive_soundd_client_packets" lineno="79526"> <summary> Receive soundd_client packets. </summary> @@ -59641,7 +59687,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="83583"> +<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="79545"> <summary> Do not audit attempts to receive soundd_client packets. </summary> @@ -59652,7 +59698,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_soundd_client_packets" lineno="83602"> +<interface name="corenet_sendrecv_soundd_client_packets" lineno="79564"> <summary> Send and receive soundd_client packets. </summary> @@ -59663,7 +59709,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="83618"> +<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="79580"> <summary> Do not audit attempts to send and receive soundd_client packets. </summary> @@ -59674,7 +59720,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_soundd_client_packets" lineno="83633"> +<interface name="corenet_relabelto_soundd_client_packets" lineno="79595"> <summary> Relabel packets to soundd_client the packet type. </summary> @@ -59684,7 +59730,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_soundd_server_packets" lineno="83653"> +<interface name="corenet_send_soundd_server_packets" lineno="79615"> <summary> Send soundd_server packets. </summary> @@ -59695,7 +59741,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="83672"> +<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="79634"> <summary> Do not audit attempts to send soundd_server packets. </summary> @@ -59706,7 +59752,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_soundd_server_packets" lineno="83691"> +<interface name="corenet_receive_soundd_server_packets" lineno="79653"> <summary> Receive soundd_server packets. </summary> @@ -59717,7 +59763,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="83710"> +<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="79672"> <summary> Do not audit attempts to receive soundd_server packets. </summary> @@ -59728,7 +59774,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_soundd_server_packets" lineno="83729"> +<interface name="corenet_sendrecv_soundd_server_packets" lineno="79691"> <summary> Send and receive soundd_server packets. </summary> @@ -59739,7 +59785,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="83745"> +<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="79707"> <summary> Do not audit attempts to send and receive soundd_server packets. </summary> @@ -59750,7 +59796,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_soundd_server_packets" lineno="83760"> +<interface name="corenet_relabelto_soundd_server_packets" lineno="79722"> <summary> Relabel packets to soundd_server the packet type. </summary> @@ -59760,7 +59806,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_spamd_port" lineno="83782"> +<interface name="corenet_tcp_sendrecv_spamd_port" lineno="79744"> <summary> Send and receive TCP traffic on the spamd port. </summary> @@ -59771,7 +59817,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_spamd_port" lineno="83801"> +<interface name="corenet_udp_send_spamd_port" lineno="79759"> <summary> Send UDP traffic on the spamd port. </summary> @@ -59782,7 +59828,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="83820"> +<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="79774"> <summary> Do not audit attempts to send UDP traffic on the spamd port. </summary> @@ -59793,7 +59839,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_spamd_port" lineno="83839"> +<interface name="corenet_udp_receive_spamd_port" lineno="79789"> <summary> Receive UDP traffic on the spamd port. </summary> @@ -59804,7 +59850,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="83858"> +<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="79804"> <summary> Do not audit attempts to receive UDP traffic on the spamd port. </summary> @@ -59815,7 +59861,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_spamd_port" lineno="83877"> +<interface name="corenet_udp_sendrecv_spamd_port" lineno="79819"> <summary> Send and receive UDP traffic on the spamd port. </summary> @@ -59826,7 +59872,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="83894"> +<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="79835"> <summary> Do not audit attempts to send and receive UDP traffic on the spamd port. @@ -59838,7 +59884,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_spamd_port" lineno="83910"> +<interface name="corenet_tcp_bind_spamd_port" lineno="79850"> <summary> Bind TCP sockets to the spamd port. </summary> @@ -59849,7 +59895,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_spamd_port" lineno="83930"> +<interface name="corenet_udp_bind_spamd_port" lineno="79870"> <summary> Bind UDP sockets to the spamd port. </summary> @@ -59860,7 +59906,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_spamd_port" lineno="83949"> +<interface name="corenet_tcp_connect_spamd_port" lineno="79889"> <summary> Make a TCP connection to the spamd port. </summary> @@ -59870,7 +59916,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_spamd_client_packets" lineno="83969"> +<interface name="corenet_send_spamd_client_packets" lineno="79909"> <summary> Send spamd_client packets. </summary> @@ -59881,7 +59927,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="83988"> +<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="79928"> <summary> Do not audit attempts to send spamd_client packets. </summary> @@ -59892,7 +59938,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_spamd_client_packets" lineno="84007"> +<interface name="corenet_receive_spamd_client_packets" lineno="79947"> <summary> Receive spamd_client packets. </summary> @@ -59903,7 +59949,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="84026"> +<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="79966"> <summary> Do not audit attempts to receive spamd_client packets. </summary> @@ -59914,7 +59960,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_spamd_client_packets" lineno="84045"> +<interface name="corenet_sendrecv_spamd_client_packets" lineno="79985"> <summary> Send and receive spamd_client packets. </summary> @@ -59925,7 +59971,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="84061"> +<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80001"> <summary> Do not audit attempts to send and receive spamd_client packets. </summary> @@ -59936,7 +59982,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_spamd_client_packets" lineno="84076"> +<interface name="corenet_relabelto_spamd_client_packets" lineno="80016"> <summary> Relabel packets to spamd_client the packet type. </summary> @@ -59946,7 +59992,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_spamd_server_packets" lineno="84096"> +<interface name="corenet_send_spamd_server_packets" lineno="80036"> <summary> Send spamd_server packets. </summary> @@ -59957,7 +60003,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="84115"> +<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80055"> <summary> Do not audit attempts to send spamd_server packets. </summary> @@ -59968,7 +60014,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_spamd_server_packets" lineno="84134"> +<interface name="corenet_receive_spamd_server_packets" lineno="80074"> <summary> Receive spamd_server packets. </summary> @@ -59979,7 +60025,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="84153"> +<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80093"> <summary> Do not audit attempts to receive spamd_server packets. </summary> @@ -59990,7 +60036,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_spamd_server_packets" lineno="84172"> +<interface name="corenet_sendrecv_spamd_server_packets" lineno="80112"> <summary> Send and receive spamd_server packets. </summary> @@ -60001,7 +60047,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="84188"> +<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80128"> <summary> Do not audit attempts to send and receive spamd_server packets. </summary> @@ -60012,7 +60058,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_spamd_server_packets" lineno="84203"> +<interface name="corenet_relabelto_spamd_server_packets" lineno="80143"> <summary> Relabel packets to spamd_server the packet type. </summary> @@ -60022,7 +60068,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_speech_port" lineno="84225"> +<interface name="corenet_tcp_sendrecv_speech_port" lineno="80165"> <summary> Send and receive TCP traffic on the speech port. </summary> @@ -60033,7 +60079,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_speech_port" lineno="84244"> +<interface name="corenet_udp_send_speech_port" lineno="80180"> <summary> Send UDP traffic on the speech port. </summary> @@ -60044,7 +60090,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_speech_port" lineno="84263"> +<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80195"> <summary> Do not audit attempts to send UDP traffic on the speech port. </summary> @@ -60055,7 +60101,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_speech_port" lineno="84282"> +<interface name="corenet_udp_receive_speech_port" lineno="80210"> <summary> Receive UDP traffic on the speech port. </summary> @@ -60066,7 +60112,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="84301"> +<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80225"> <summary> Do not audit attempts to receive UDP traffic on the speech port. </summary> @@ -60077,7 +60123,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_speech_port" lineno="84320"> +<interface name="corenet_udp_sendrecv_speech_port" lineno="80240"> <summary> Send and receive UDP traffic on the speech port. </summary> @@ -60088,7 +60134,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="84337"> +<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80256"> <summary> Do not audit attempts to send and receive UDP traffic on the speech port. @@ -60100,7 +60146,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_speech_port" lineno="84353"> +<interface name="corenet_tcp_bind_speech_port" lineno="80271"> <summary> Bind TCP sockets to the speech port. </summary> @@ -60111,7 +60157,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_speech_port" lineno="84373"> +<interface name="corenet_udp_bind_speech_port" lineno="80291"> <summary> Bind UDP sockets to the speech port. </summary> @@ -60122,7 +60168,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_speech_port" lineno="84392"> +<interface name="corenet_tcp_connect_speech_port" lineno="80310"> <summary> Make a TCP connection to the speech port. </summary> @@ -60132,7 +60178,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_speech_client_packets" lineno="84412"> +<interface name="corenet_send_speech_client_packets" lineno="80330"> <summary> Send speech_client packets. </summary> @@ -60143,7 +60189,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_speech_client_packets" lineno="84431"> +<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80349"> <summary> Do not audit attempts to send speech_client packets. </summary> @@ -60154,7 +60200,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_speech_client_packets" lineno="84450"> +<interface name="corenet_receive_speech_client_packets" lineno="80368"> <summary> Receive speech_client packets. </summary> @@ -60165,7 +60211,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="84469"> +<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80387"> <summary> Do not audit attempts to receive speech_client packets. </summary> @@ -60176,7 +60222,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_speech_client_packets" lineno="84488"> +<interface name="corenet_sendrecv_speech_client_packets" lineno="80406"> <summary> Send and receive speech_client packets. </summary> @@ -60187,7 +60233,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="84504"> +<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80422"> <summary> Do not audit attempts to send and receive speech_client packets. </summary> @@ -60198,7 +60244,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_speech_client_packets" lineno="84519"> +<interface name="corenet_relabelto_speech_client_packets" lineno="80437"> <summary> Relabel packets to speech_client the packet type. </summary> @@ -60208,7 +60254,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_speech_server_packets" lineno="84539"> +<interface name="corenet_send_speech_server_packets" lineno="80457"> <summary> Send speech_server packets. </summary> @@ -60219,7 +60265,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_speech_server_packets" lineno="84558"> +<interface name="corenet_dontaudit_send_speech_server_packets" lineno="80476"> <summary> Do not audit attempts to send speech_server packets. </summary> @@ -60230,7 +60276,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_speech_server_packets" lineno="84577"> +<interface name="corenet_receive_speech_server_packets" lineno="80495"> <summary> Receive speech_server packets. </summary> @@ -60241,7 +60287,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="84596"> +<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="80514"> <summary> Do not audit attempts to receive speech_server packets. </summary> @@ -60252,7 +60298,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_speech_server_packets" lineno="84615"> +<interface name="corenet_sendrecv_speech_server_packets" lineno="80533"> <summary> Send and receive speech_server packets. </summary> @@ -60263,7 +60309,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="84631"> +<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="80549"> <summary> Do not audit attempts to send and receive speech_server packets. </summary> @@ -60274,7 +60320,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_speech_server_packets" lineno="84646"> +<interface name="corenet_relabelto_speech_server_packets" lineno="80564"> <summary> Relabel packets to speech_server the packet type. </summary> @@ -60284,7 +60330,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_squid_port" lineno="84668"> +<interface name="corenet_tcp_sendrecv_squid_port" lineno="80586"> <summary> Send and receive TCP traffic on the squid port. </summary> @@ -60295,7 +60341,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_squid_port" lineno="84687"> +<interface name="corenet_udp_send_squid_port" lineno="80601"> <summary> Send UDP traffic on the squid port. </summary> @@ -60306,7 +60352,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_squid_port" lineno="84706"> +<interface name="corenet_dontaudit_udp_send_squid_port" lineno="80616"> <summary> Do not audit attempts to send UDP traffic on the squid port. </summary> @@ -60317,7 +60363,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_squid_port" lineno="84725"> +<interface name="corenet_udp_receive_squid_port" lineno="80631"> <summary> Receive UDP traffic on the squid port. </summary> @@ -60328,7 +60374,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="84744"> +<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="80646"> <summary> Do not audit attempts to receive UDP traffic on the squid port. </summary> @@ -60339,7 +60385,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_squid_port" lineno="84763"> +<interface name="corenet_udp_sendrecv_squid_port" lineno="80661"> <summary> Send and receive UDP traffic on the squid port. </summary> @@ -60350,7 +60396,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="84780"> +<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="80677"> <summary> Do not audit attempts to send and receive UDP traffic on the squid port. @@ -60362,7 +60408,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_squid_port" lineno="84796"> +<interface name="corenet_tcp_bind_squid_port" lineno="80692"> <summary> Bind TCP sockets to the squid port. </summary> @@ -60373,7 +60419,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_squid_port" lineno="84816"> +<interface name="corenet_udp_bind_squid_port" lineno="80712"> <summary> Bind UDP sockets to the squid port. </summary> @@ -60384,7 +60430,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_squid_port" lineno="84835"> +<interface name="corenet_tcp_connect_squid_port" lineno="80731"> <summary> Make a TCP connection to the squid port. </summary> @@ -60394,7 +60440,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_squid_client_packets" lineno="84855"> +<interface name="corenet_send_squid_client_packets" lineno="80751"> <summary> Send squid_client packets. </summary> @@ -60405,7 +60451,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_squid_client_packets" lineno="84874"> +<interface name="corenet_dontaudit_send_squid_client_packets" lineno="80770"> <summary> Do not audit attempts to send squid_client packets. </summary> @@ -60416,7 +60462,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_squid_client_packets" lineno="84893"> +<interface name="corenet_receive_squid_client_packets" lineno="80789"> <summary> Receive squid_client packets. </summary> @@ -60427,7 +60473,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="84912"> +<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="80808"> <summary> Do not audit attempts to receive squid_client packets. </summary> @@ -60438,7 +60484,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_squid_client_packets" lineno="84931"> +<interface name="corenet_sendrecv_squid_client_packets" lineno="80827"> <summary> Send and receive squid_client packets. </summary> @@ -60449,7 +60495,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="84947"> +<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="80843"> <summary> Do not audit attempts to send and receive squid_client packets. </summary> @@ -60460,7 +60506,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_squid_client_packets" lineno="84962"> +<interface name="corenet_relabelto_squid_client_packets" lineno="80858"> <summary> Relabel packets to squid_client the packet type. </summary> @@ -60470,7 +60516,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_squid_server_packets" lineno="84982"> +<interface name="corenet_send_squid_server_packets" lineno="80878"> <summary> Send squid_server packets. </summary> @@ -60481,7 +60527,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_squid_server_packets" lineno="85001"> +<interface name="corenet_dontaudit_send_squid_server_packets" lineno="80897"> <summary> Do not audit attempts to send squid_server packets. </summary> @@ -60492,7 +60538,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_squid_server_packets" lineno="85020"> +<interface name="corenet_receive_squid_server_packets" lineno="80916"> <summary> Receive squid_server packets. </summary> @@ -60503,7 +60549,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="85039"> +<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="80935"> <summary> Do not audit attempts to receive squid_server packets. </summary> @@ -60514,7 +60560,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_squid_server_packets" lineno="85058"> +<interface name="corenet_sendrecv_squid_server_packets" lineno="80954"> <summary> Send and receive squid_server packets. </summary> @@ -60525,7 +60571,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="85074"> +<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="80970"> <summary> Do not audit attempts to send and receive squid_server packets. </summary> @@ -60536,7 +60582,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_squid_server_packets" lineno="85089"> +<interface name="corenet_relabelto_squid_server_packets" lineno="80985"> <summary> Relabel packets to squid_server the packet type. </summary> @@ -60546,7 +60592,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="85111"> +<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81007"> <summary> Send and receive TCP traffic on the ssdp port. </summary> @@ -60557,7 +60603,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ssdp_port" lineno="85130"> +<interface name="corenet_udp_send_ssdp_port" lineno="81022"> <summary> Send UDP traffic on the ssdp port. </summary> @@ -60568,7 +60614,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="85149"> +<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81037"> <summary> Do not audit attempts to send UDP traffic on the ssdp port. </summary> @@ -60579,7 +60625,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ssdp_port" lineno="85168"> +<interface name="corenet_udp_receive_ssdp_port" lineno="81052"> <summary> Receive UDP traffic on the ssdp port. </summary> @@ -60590,7 +60636,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="85187"> +<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81067"> <summary> Do not audit attempts to receive UDP traffic on the ssdp port. </summary> @@ -60601,7 +60647,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ssdp_port" lineno="85206"> +<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81082"> <summary> Send and receive UDP traffic on the ssdp port. </summary> @@ -60612,7 +60658,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="85223"> +<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81098"> <summary> Do not audit attempts to send and receive UDP traffic on the ssdp port. @@ -60624,7 +60670,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ssdp_port" lineno="85239"> +<interface name="corenet_tcp_bind_ssdp_port" lineno="81113"> <summary> Bind TCP sockets to the ssdp port. </summary> @@ -60635,7 +60681,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ssdp_port" lineno="85259"> +<interface name="corenet_udp_bind_ssdp_port" lineno="81133"> <summary> Bind UDP sockets to the ssdp port. </summary> @@ -60646,7 +60692,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ssdp_port" lineno="85278"> +<interface name="corenet_tcp_connect_ssdp_port" lineno="81152"> <summary> Make a TCP connection to the ssdp port. </summary> @@ -60656,7 +60702,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssdp_client_packets" lineno="85298"> +<interface name="corenet_send_ssdp_client_packets" lineno="81172"> <summary> Send ssdp_client packets. </summary> @@ -60667,7 +60713,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="85317"> +<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81191"> <summary> Do not audit attempts to send ssdp_client packets. </summary> @@ -60678,7 +60724,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssdp_client_packets" lineno="85336"> +<interface name="corenet_receive_ssdp_client_packets" lineno="81210"> <summary> Receive ssdp_client packets. </summary> @@ -60689,7 +60735,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="85355"> +<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81229"> <summary> Do not audit attempts to receive ssdp_client packets. </summary> @@ -60700,7 +60746,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssdp_client_packets" lineno="85374"> +<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81248"> <summary> Send and receive ssdp_client packets. </summary> @@ -60711,7 +60757,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="85390"> +<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81264"> <summary> Do not audit attempts to send and receive ssdp_client packets. </summary> @@ -60722,7 +60768,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssdp_client_packets" lineno="85405"> +<interface name="corenet_relabelto_ssdp_client_packets" lineno="81279"> <summary> Relabel packets to ssdp_client the packet type. </summary> @@ -60732,7 +60778,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssdp_server_packets" lineno="85425"> +<interface name="corenet_send_ssdp_server_packets" lineno="81299"> <summary> Send ssdp_server packets. </summary> @@ -60743,7 +60789,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="85444"> +<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81318"> <summary> Do not audit attempts to send ssdp_server packets. </summary> @@ -60754,7 +60800,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssdp_server_packets" lineno="85463"> +<interface name="corenet_receive_ssdp_server_packets" lineno="81337"> <summary> Receive ssdp_server packets. </summary> @@ -60765,7 +60811,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="85482"> +<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81356"> <summary> Do not audit attempts to receive ssdp_server packets. </summary> @@ -60776,7 +60822,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssdp_server_packets" lineno="85501"> +<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81375"> <summary> Send and receive ssdp_server packets. </summary> @@ -60787,7 +60833,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="85517"> +<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81391"> <summary> Do not audit attempts to send and receive ssdp_server packets. </summary> @@ -60798,7 +60844,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssdp_server_packets" lineno="85532"> +<interface name="corenet_relabelto_ssdp_server_packets" lineno="81406"> <summary> Relabel packets to ssdp_server the packet type. </summary> @@ -60808,7 +60854,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ssh_port" lineno="85554"> +<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81428"> <summary> Send and receive TCP traffic on the ssh port. </summary> @@ -60819,7 +60865,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ssh_port" lineno="85573"> +<interface name="corenet_udp_send_ssh_port" lineno="81443"> <summary> Send UDP traffic on the ssh port. </summary> @@ -60830,7 +60876,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="85592"> +<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="81458"> <summary> Do not audit attempts to send UDP traffic on the ssh port. </summary> @@ -60841,7 +60887,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ssh_port" lineno="85611"> +<interface name="corenet_udp_receive_ssh_port" lineno="81473"> <summary> Receive UDP traffic on the ssh port. </summary> @@ -60852,7 +60898,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="85630"> +<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="81488"> <summary> Do not audit attempts to receive UDP traffic on the ssh port. </summary> @@ -60863,7 +60909,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ssh_port" lineno="85649"> +<interface name="corenet_udp_sendrecv_ssh_port" lineno="81503"> <summary> Send and receive UDP traffic on the ssh port. </summary> @@ -60874,7 +60920,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="85666"> +<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="81519"> <summary> Do not audit attempts to send and receive UDP traffic on the ssh port. @@ -60886,7 +60932,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ssh_port" lineno="85682"> +<interface name="corenet_tcp_bind_ssh_port" lineno="81534"> <summary> Bind TCP sockets to the ssh port. </summary> @@ -60897,7 +60943,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ssh_port" lineno="85702"> +<interface name="corenet_udp_bind_ssh_port" lineno="81554"> <summary> Bind UDP sockets to the ssh port. </summary> @@ -60908,7 +60954,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ssh_port" lineno="85721"> +<interface name="corenet_tcp_connect_ssh_port" lineno="81573"> <summary> Make a TCP connection to the ssh port. </summary> @@ -60918,7 +60964,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssh_client_packets" lineno="85741"> +<interface name="corenet_send_ssh_client_packets" lineno="81593"> <summary> Send ssh_client packets. </summary> @@ -60929,7 +60975,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="85760"> +<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="81612"> <summary> Do not audit attempts to send ssh_client packets. </summary> @@ -60940,7 +60986,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssh_client_packets" lineno="85779"> +<interface name="corenet_receive_ssh_client_packets" lineno="81631"> <summary> Receive ssh_client packets. </summary> @@ -60951,7 +60997,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="85798"> +<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="81650"> <summary> Do not audit attempts to receive ssh_client packets. </summary> @@ -60962,7 +61008,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssh_client_packets" lineno="85817"> +<interface name="corenet_sendrecv_ssh_client_packets" lineno="81669"> <summary> Send and receive ssh_client packets. </summary> @@ -60973,7 +61019,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="85833"> +<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="81685"> <summary> Do not audit attempts to send and receive ssh_client packets. </summary> @@ -60984,7 +61030,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssh_client_packets" lineno="85848"> +<interface name="corenet_relabelto_ssh_client_packets" lineno="81700"> <summary> Relabel packets to ssh_client the packet type. </summary> @@ -60994,7 +61040,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssh_server_packets" lineno="85868"> +<interface name="corenet_send_ssh_server_packets" lineno="81720"> <summary> Send ssh_server packets. </summary> @@ -61005,7 +61051,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="85887"> +<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="81739"> <summary> Do not audit attempts to send ssh_server packets. </summary> @@ -61016,7 +61062,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssh_server_packets" lineno="85906"> +<interface name="corenet_receive_ssh_server_packets" lineno="81758"> <summary> Receive ssh_server packets. </summary> @@ -61027,7 +61073,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="85925"> +<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="81777"> <summary> Do not audit attempts to receive ssh_server packets. </summary> @@ -61038,7 +61084,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssh_server_packets" lineno="85944"> +<interface name="corenet_sendrecv_ssh_server_packets" lineno="81796"> <summary> Send and receive ssh_server packets. </summary> @@ -61049,7 +61095,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="85960"> +<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="81812"> <summary> Do not audit attempts to send and receive ssh_server packets. </summary> @@ -61060,7 +61106,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssh_server_packets" lineno="85975"> +<interface name="corenet_relabelto_ssh_server_packets" lineno="81827"> <summary> Relabel packets to ssh_server the packet type. </summary> @@ -61070,7 +61116,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="85997"> +<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="81849"> <summary> Send and receive TCP traffic on the stunnel port. </summary> @@ -61081,7 +61127,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_stunnel_port" lineno="86016"> +<interface name="corenet_udp_send_stunnel_port" lineno="81864"> <summary> Send UDP traffic on the stunnel port. </summary> @@ -61092,7 +61138,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="86035"> +<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="81879"> <summary> Do not audit attempts to send UDP traffic on the stunnel port. </summary> @@ -61103,7 +61149,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_stunnel_port" lineno="86054"> +<interface name="corenet_udp_receive_stunnel_port" lineno="81894"> <summary> Receive UDP traffic on the stunnel port. </summary> @@ -61114,7 +61160,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="86073"> +<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="81909"> <summary> Do not audit attempts to receive UDP traffic on the stunnel port. </summary> @@ -61125,7 +61171,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_stunnel_port" lineno="86092"> +<interface name="corenet_udp_sendrecv_stunnel_port" lineno="81924"> <summary> Send and receive UDP traffic on the stunnel port. </summary> @@ -61136,7 +61182,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="86109"> +<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="81940"> <summary> Do not audit attempts to send and receive UDP traffic on the stunnel port. @@ -61148,7 +61194,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_stunnel_port" lineno="86125"> +<interface name="corenet_tcp_bind_stunnel_port" lineno="81955"> <summary> Bind TCP sockets to the stunnel port. </summary> @@ -61159,7 +61205,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_stunnel_port" lineno="86145"> +<interface name="corenet_udp_bind_stunnel_port" lineno="81975"> <summary> Bind UDP sockets to the stunnel port. </summary> @@ -61170,7 +61216,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_stunnel_port" lineno="86164"> +<interface name="corenet_tcp_connect_stunnel_port" lineno="81994"> <summary> Make a TCP connection to the stunnel port. </summary> @@ -61180,7 +61226,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_stunnel_client_packets" lineno="86184"> +<interface name="corenet_send_stunnel_client_packets" lineno="82014"> <summary> Send stunnel_client packets. </summary> @@ -61191,7 +61237,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="86203"> +<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82033"> <summary> Do not audit attempts to send stunnel_client packets. </summary> @@ -61202,7 +61248,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_stunnel_client_packets" lineno="86222"> +<interface name="corenet_receive_stunnel_client_packets" lineno="82052"> <summary> Receive stunnel_client packets. </summary> @@ -61213,7 +61259,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="86241"> +<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82071"> <summary> Do not audit attempts to receive stunnel_client packets. </summary> @@ -61224,7 +61270,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_stunnel_client_packets" lineno="86260"> +<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82090"> <summary> Send and receive stunnel_client packets. </summary> @@ -61235,7 +61281,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="86276"> +<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82106"> <summary> Do not audit attempts to send and receive stunnel_client packets. </summary> @@ -61246,7 +61292,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_stunnel_client_packets" lineno="86291"> +<interface name="corenet_relabelto_stunnel_client_packets" lineno="82121"> <summary> Relabel packets to stunnel_client the packet type. </summary> @@ -61256,7 +61302,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_stunnel_server_packets" lineno="86311"> +<interface name="corenet_send_stunnel_server_packets" lineno="82141"> <summary> Send stunnel_server packets. </summary> @@ -61267,7 +61313,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="86330"> +<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82160"> <summary> Do not audit attempts to send stunnel_server packets. </summary> @@ -61278,7 +61324,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_stunnel_server_packets" lineno="86349"> +<interface name="corenet_receive_stunnel_server_packets" lineno="82179"> <summary> Receive stunnel_server packets. </summary> @@ -61289,7 +61335,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="86368"> +<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82198"> <summary> Do not audit attempts to receive stunnel_server packets. </summary> @@ -61300,7 +61346,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_stunnel_server_packets" lineno="86387"> +<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82217"> <summary> Send and receive stunnel_server packets. </summary> @@ -61311,7 +61357,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="86403"> +<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82233"> <summary> Do not audit attempts to send and receive stunnel_server packets. </summary> @@ -61322,7 +61368,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_stunnel_server_packets" lineno="86418"> +<interface name="corenet_relabelto_stunnel_server_packets" lineno="82248"> <summary> Relabel packets to stunnel_server the packet type. </summary> @@ -61332,7 +61378,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_svn_port" lineno="86440"> +<interface name="corenet_tcp_sendrecv_svn_port" lineno="82270"> <summary> Send and receive TCP traffic on the svn port. </summary> @@ -61343,7 +61389,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_svn_port" lineno="86459"> +<interface name="corenet_udp_send_svn_port" lineno="82285"> <summary> Send UDP traffic on the svn port. </summary> @@ -61354,7 +61400,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_svn_port" lineno="86478"> +<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82300"> <summary> Do not audit attempts to send UDP traffic on the svn port. </summary> @@ -61365,7 +61411,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_svn_port" lineno="86497"> +<interface name="corenet_udp_receive_svn_port" lineno="82315"> <summary> Receive UDP traffic on the svn port. </summary> @@ -61376,7 +61422,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="86516"> +<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82330"> <summary> Do not audit attempts to receive UDP traffic on the svn port. </summary> @@ -61387,7 +61433,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_svn_port" lineno="86535"> +<interface name="corenet_udp_sendrecv_svn_port" lineno="82345"> <summary> Send and receive UDP traffic on the svn port. </summary> @@ -61398,7 +61444,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="86552"> +<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82361"> <summary> Do not audit attempts to send and receive UDP traffic on the svn port. @@ -61410,7 +61456,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_svn_port" lineno="86568"> +<interface name="corenet_tcp_bind_svn_port" lineno="82376"> <summary> Bind TCP sockets to the svn port. </summary> @@ -61421,7 +61467,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_svn_port" lineno="86588"> +<interface name="corenet_udp_bind_svn_port" lineno="82396"> <summary> Bind UDP sockets to the svn port. </summary> @@ -61432,7 +61478,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_svn_port" lineno="86607"> +<interface name="corenet_tcp_connect_svn_port" lineno="82415"> <summary> Make a TCP connection to the svn port. </summary> @@ -61442,7 +61488,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svn_client_packets" lineno="86627"> +<interface name="corenet_send_svn_client_packets" lineno="82435"> <summary> Send svn_client packets. </summary> @@ -61453,7 +61499,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svn_client_packets" lineno="86646"> +<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82454"> <summary> Do not audit attempts to send svn_client packets. </summary> @@ -61464,7 +61510,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svn_client_packets" lineno="86665"> +<interface name="corenet_receive_svn_client_packets" lineno="82473"> <summary> Receive svn_client packets. </summary> @@ -61475,7 +61521,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="86684"> +<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="82492"> <summary> Do not audit attempts to receive svn_client packets. </summary> @@ -61486,7 +61532,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svn_client_packets" lineno="86703"> +<interface name="corenet_sendrecv_svn_client_packets" lineno="82511"> <summary> Send and receive svn_client packets. </summary> @@ -61497,7 +61543,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="86719"> +<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="82527"> <summary> Do not audit attempts to send and receive svn_client packets. </summary> @@ -61508,7 +61554,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svn_client_packets" lineno="86734"> +<interface name="corenet_relabelto_svn_client_packets" lineno="82542"> <summary> Relabel packets to svn_client the packet type. </summary> @@ -61518,7 +61564,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svn_server_packets" lineno="86754"> +<interface name="corenet_send_svn_server_packets" lineno="82562"> <summary> Send svn_server packets. </summary> @@ -61529,7 +61575,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svn_server_packets" lineno="86773"> +<interface name="corenet_dontaudit_send_svn_server_packets" lineno="82581"> <summary> Do not audit attempts to send svn_server packets. </summary> @@ -61540,7 +61586,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svn_server_packets" lineno="86792"> +<interface name="corenet_receive_svn_server_packets" lineno="82600"> <summary> Receive svn_server packets. </summary> @@ -61551,7 +61597,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="86811"> +<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="82619"> <summary> Do not audit attempts to receive svn_server packets. </summary> @@ -61562,7 +61608,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svn_server_packets" lineno="86830"> +<interface name="corenet_sendrecv_svn_server_packets" lineno="82638"> <summary> Send and receive svn_server packets. </summary> @@ -61573,7 +61619,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="86846"> +<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="82654"> <summary> Do not audit attempts to send and receive svn_server packets. </summary> @@ -61584,7 +61630,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svn_server_packets" lineno="86861"> +<interface name="corenet_relabelto_svn_server_packets" lineno="82669"> <summary> Relabel packets to svn_server the packet type. </summary> @@ -61594,7 +61640,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="86883"> +<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="82691"> <summary> Send and receive TCP traffic on the svrloc port. </summary> @@ -61605,7 +61651,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_svrloc_port" lineno="86902"> +<interface name="corenet_udp_send_svrloc_port" lineno="82706"> <summary> Send UDP traffic on the svrloc port. </summary> @@ -61616,7 +61662,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="86921"> +<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="82721"> <summary> Do not audit attempts to send UDP traffic on the svrloc port. </summary> @@ -61627,7 +61673,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_svrloc_port" lineno="86940"> +<interface name="corenet_udp_receive_svrloc_port" lineno="82736"> <summary> Receive UDP traffic on the svrloc port. </summary> @@ -61638,7 +61684,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="86959"> +<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="82751"> <summary> Do not audit attempts to receive UDP traffic on the svrloc port. </summary> @@ -61649,7 +61695,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_svrloc_port" lineno="86978"> +<interface name="corenet_udp_sendrecv_svrloc_port" lineno="82766"> <summary> Send and receive UDP traffic on the svrloc port. </summary> @@ -61660,7 +61706,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="86995"> +<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="82782"> <summary> Do not audit attempts to send and receive UDP traffic on the svrloc port. @@ -61672,7 +61718,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_svrloc_port" lineno="87011"> +<interface name="corenet_tcp_bind_svrloc_port" lineno="82797"> <summary> Bind TCP sockets to the svrloc port. </summary> @@ -61683,7 +61729,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_svrloc_port" lineno="87031"> +<interface name="corenet_udp_bind_svrloc_port" lineno="82817"> <summary> Bind UDP sockets to the svrloc port. </summary> @@ -61694,7 +61740,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_svrloc_port" lineno="87050"> +<interface name="corenet_tcp_connect_svrloc_port" lineno="82836"> <summary> Make a TCP connection to the svrloc port. </summary> @@ -61704,7 +61750,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svrloc_client_packets" lineno="87070"> +<interface name="corenet_send_svrloc_client_packets" lineno="82856"> <summary> Send svrloc_client packets. </summary> @@ -61715,7 +61761,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="87089"> +<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="82875"> <summary> Do not audit attempts to send svrloc_client packets. </summary> @@ -61726,7 +61772,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svrloc_client_packets" lineno="87108"> +<interface name="corenet_receive_svrloc_client_packets" lineno="82894"> <summary> Receive svrloc_client packets. </summary> @@ -61737,7 +61783,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="87127"> +<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="82913"> <summary> Do not audit attempts to receive svrloc_client packets. </summary> @@ -61748,7 +61794,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svrloc_client_packets" lineno="87146"> +<interface name="corenet_sendrecv_svrloc_client_packets" lineno="82932"> <summary> Send and receive svrloc_client packets. </summary> @@ -61759,7 +61805,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="87162"> +<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="82948"> <summary> Do not audit attempts to send and receive svrloc_client packets. </summary> @@ -61770,7 +61816,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svrloc_client_packets" lineno="87177"> +<interface name="corenet_relabelto_svrloc_client_packets" lineno="82963"> <summary> Relabel packets to svrloc_client the packet type. </summary> @@ -61780,7 +61826,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svrloc_server_packets" lineno="87197"> +<interface name="corenet_send_svrloc_server_packets" lineno="82983"> <summary> Send svrloc_server packets. </summary> @@ -61791,7 +61837,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="87216"> +<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83002"> <summary> Do not audit attempts to send svrloc_server packets. </summary> @@ -61802,7 +61848,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svrloc_server_packets" lineno="87235"> +<interface name="corenet_receive_svrloc_server_packets" lineno="83021"> <summary> Receive svrloc_server packets. </summary> @@ -61813,7 +61859,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="87254"> +<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83040"> <summary> Do not audit attempts to receive svrloc_server packets. </summary> @@ -61824,7 +61870,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svrloc_server_packets" lineno="87273"> +<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83059"> <summary> Send and receive svrloc_server packets. </summary> @@ -61835,7 +61881,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="87289"> +<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83075"> <summary> Do not audit attempts to send and receive svrloc_server packets. </summary> @@ -61846,7 +61892,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svrloc_server_packets" lineno="87304"> +<interface name="corenet_relabelto_svrloc_server_packets" lineno="83090"> <summary> Relabel packets to svrloc_server the packet type. </summary> @@ -61856,7 +61902,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_swat_port" lineno="87326"> +<interface name="corenet_tcp_sendrecv_swat_port" lineno="83112"> <summary> Send and receive TCP traffic on the swat port. </summary> @@ -61867,7 +61913,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_swat_port" lineno="87345"> +<interface name="corenet_udp_send_swat_port" lineno="83127"> <summary> Send UDP traffic on the swat port. </summary> @@ -61878,7 +61924,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_swat_port" lineno="87364"> +<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83142"> <summary> Do not audit attempts to send UDP traffic on the swat port. </summary> @@ -61889,7 +61935,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_swat_port" lineno="87383"> +<interface name="corenet_udp_receive_swat_port" lineno="83157"> <summary> Receive UDP traffic on the swat port. </summary> @@ -61900,7 +61946,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="87402"> +<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83172"> <summary> Do not audit attempts to receive UDP traffic on the swat port. </summary> @@ -61911,7 +61957,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_swat_port" lineno="87421"> +<interface name="corenet_udp_sendrecv_swat_port" lineno="83187"> <summary> Send and receive UDP traffic on the swat port. </summary> @@ -61922,7 +61968,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="87438"> +<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83203"> <summary> Do not audit attempts to send and receive UDP traffic on the swat port. @@ -61934,7 +61980,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_swat_port" lineno="87454"> +<interface name="corenet_tcp_bind_swat_port" lineno="83218"> <summary> Bind TCP sockets to the swat port. </summary> @@ -61945,7 +61991,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_swat_port" lineno="87474"> +<interface name="corenet_udp_bind_swat_port" lineno="83238"> <summary> Bind UDP sockets to the swat port. </summary> @@ -61956,7 +62002,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_swat_port" lineno="87493"> +<interface name="corenet_tcp_connect_swat_port" lineno="83257"> <summary> Make a TCP connection to the swat port. </summary> @@ -61966,7 +62012,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_swat_client_packets" lineno="87513"> +<interface name="corenet_send_swat_client_packets" lineno="83277"> <summary> Send swat_client packets. </summary> @@ -61977,7 +62023,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_swat_client_packets" lineno="87532"> +<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83296"> <summary> Do not audit attempts to send swat_client packets. </summary> @@ -61988,7 +62034,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_swat_client_packets" lineno="87551"> +<interface name="corenet_receive_swat_client_packets" lineno="83315"> <summary> Receive swat_client packets. </summary> @@ -61999,7 +62045,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="87570"> +<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83334"> <summary> Do not audit attempts to receive swat_client packets. </summary> @@ -62010,7 +62056,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_swat_client_packets" lineno="87589"> +<interface name="corenet_sendrecv_swat_client_packets" lineno="83353"> <summary> Send and receive swat_client packets. </summary> @@ -62021,7 +62067,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="87605"> +<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83369"> <summary> Do not audit attempts to send and receive swat_client packets. </summary> @@ -62032,7 +62078,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_swat_client_packets" lineno="87620"> +<interface name="corenet_relabelto_swat_client_packets" lineno="83384"> <summary> Relabel packets to swat_client the packet type. </summary> @@ -62042,7 +62088,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_swat_server_packets" lineno="87640"> +<interface name="corenet_send_swat_server_packets" lineno="83404"> <summary> Send swat_server packets. </summary> @@ -62053,7 +62099,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_swat_server_packets" lineno="87659"> +<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83423"> <summary> Do not audit attempts to send swat_server packets. </summary> @@ -62064,7 +62110,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_swat_server_packets" lineno="87678"> +<interface name="corenet_receive_swat_server_packets" lineno="83442"> <summary> Receive swat_server packets. </summary> @@ -62075,7 +62121,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="87697"> +<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="83461"> <summary> Do not audit attempts to receive swat_server packets. </summary> @@ -62086,7 +62132,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_swat_server_packets" lineno="87716"> +<interface name="corenet_sendrecv_swat_server_packets" lineno="83480"> <summary> Send and receive swat_server packets. </summary> @@ -62097,7 +62143,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="87732"> +<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="83496"> <summary> Do not audit attempts to send and receive swat_server packets. </summary> @@ -62108,7 +62154,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_swat_server_packets" lineno="87747"> +<interface name="corenet_relabelto_swat_server_packets" lineno="83511"> <summary> Relabel packets to swat_server the packet type. </summary> @@ -62118,7 +62164,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="87769"> +<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="83533"> <summary> Send and receive TCP traffic on the syncthing port. </summary> @@ -62129,7 +62175,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_syncthing_port" lineno="87788"> +<interface name="corenet_udp_send_syncthing_port" lineno="83548"> <summary> Send UDP traffic on the syncthing port. </summary> @@ -62140,7 +62186,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="87807"> +<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="83563"> <summary> Do not audit attempts to send UDP traffic on the syncthing port. </summary> @@ -62151,7 +62197,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_syncthing_port" lineno="87826"> +<interface name="corenet_udp_receive_syncthing_port" lineno="83578"> <summary> Receive UDP traffic on the syncthing port. </summary> @@ -62162,7 +62208,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="87845"> +<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="83593"> <summary> Do not audit attempts to receive UDP traffic on the syncthing port. </summary> @@ -62173,7 +62219,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_syncthing_port" lineno="87864"> +<interface name="corenet_udp_sendrecv_syncthing_port" lineno="83608"> <summary> Send and receive UDP traffic on the syncthing port. </summary> @@ -62184,7 +62230,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="87881"> +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="83624"> <summary> Do not audit attempts to send and receive UDP traffic on the syncthing port. @@ -62196,7 +62242,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_syncthing_port" lineno="87897"> +<interface name="corenet_tcp_bind_syncthing_port" lineno="83639"> <summary> Bind TCP sockets to the syncthing port. </summary> @@ -62207,7 +62253,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syncthing_port" lineno="87917"> +<interface name="corenet_udp_bind_syncthing_port" lineno="83659"> <summary> Bind UDP sockets to the syncthing port. </summary> @@ -62218,7 +62264,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syncthing_port" lineno="87936"> +<interface name="corenet_tcp_connect_syncthing_port" lineno="83678"> <summary> Make a TCP connection to the syncthing port. </summary> @@ -62228,7 +62274,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_client_packets" lineno="87956"> +<interface name="corenet_send_syncthing_client_packets" lineno="83698"> <summary> Send syncthing_client packets. </summary> @@ -62239,7 +62285,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="87975"> +<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="83717"> <summary> Do not audit attempts to send syncthing_client packets. </summary> @@ -62250,7 +62296,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_client_packets" lineno="87994"> +<interface name="corenet_receive_syncthing_client_packets" lineno="83736"> <summary> Receive syncthing_client packets. </summary> @@ -62261,7 +62307,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="88013"> +<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="83755"> <summary> Do not audit attempts to receive syncthing_client packets. </summary> @@ -62272,7 +62318,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_client_packets" lineno="88032"> +<interface name="corenet_sendrecv_syncthing_client_packets" lineno="83774"> <summary> Send and receive syncthing_client packets. </summary> @@ -62283,7 +62329,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="88048"> +<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="83790"> <summary> Do not audit attempts to send and receive syncthing_client packets. </summary> @@ -62294,7 +62340,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_client_packets" lineno="88063"> +<interface name="corenet_relabelto_syncthing_client_packets" lineno="83805"> <summary> Relabel packets to syncthing_client the packet type. </summary> @@ -62304,7 +62350,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_server_packets" lineno="88083"> +<interface name="corenet_send_syncthing_server_packets" lineno="83825"> <summary> Send syncthing_server packets. </summary> @@ -62315,7 +62361,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="88102"> +<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="83844"> <summary> Do not audit attempts to send syncthing_server packets. </summary> @@ -62326,7 +62372,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_server_packets" lineno="88121"> +<interface name="corenet_receive_syncthing_server_packets" lineno="83863"> <summary> Receive syncthing_server packets. </summary> @@ -62337,7 +62383,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="88140"> +<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="83882"> <summary> Do not audit attempts to receive syncthing_server packets. </summary> @@ -62348,7 +62394,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_server_packets" lineno="88159"> +<interface name="corenet_sendrecv_syncthing_server_packets" lineno="83901"> <summary> Send and receive syncthing_server packets. </summary> @@ -62359,7 +62405,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="88175"> +<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="83917"> <summary> Do not audit attempts to send and receive syncthing_server packets. </summary> @@ -62370,7 +62416,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_server_packets" lineno="88190"> +<interface name="corenet_relabelto_syncthing_server_packets" lineno="83932"> <summary> Relabel packets to syncthing_server the packet type. </summary> @@ -62380,7 +62426,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="88212"> +<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="83954"> <summary> Send and receive TCP traffic on the syncthing_admin port. </summary> @@ -62391,7 +62437,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_syncthing_admin_port" lineno="88231"> +<interface name="corenet_udp_send_syncthing_admin_port" lineno="83969"> <summary> Send UDP traffic on the syncthing_admin port. </summary> @@ -62402,7 +62448,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="88250"> +<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="83984"> <summary> Do not audit attempts to send UDP traffic on the syncthing_admin port. </summary> @@ -62413,7 +62459,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_syncthing_admin_port" lineno="88269"> +<interface name="corenet_udp_receive_syncthing_admin_port" lineno="83999"> <summary> Receive UDP traffic on the syncthing_admin port. </summary> @@ -62424,7 +62470,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="88288"> +<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84014"> <summary> Do not audit attempts to receive UDP traffic on the syncthing_admin port. </summary> @@ -62435,7 +62481,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="88307"> +<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84029"> <summary> Send and receive UDP traffic on the syncthing_admin port. </summary> @@ -62446,7 +62492,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="88324"> +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84045"> <summary> Do not audit attempts to send and receive UDP traffic on the syncthing_admin port. @@ -62458,7 +62504,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="88340"> +<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84060"> <summary> Bind TCP sockets to the syncthing_admin port. </summary> @@ -62469,7 +62515,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syncthing_admin_port" lineno="88360"> +<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84080"> <summary> Bind UDP sockets to the syncthing_admin port. </summary> @@ -62480,7 +62526,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="88379"> +<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84099"> <summary> Make a TCP connection to the syncthing_admin port. </summary> @@ -62490,7 +62536,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_admin_client_packets" lineno="88399"> +<interface name="corenet_send_syncthing_admin_client_packets" lineno="84119"> <summary> Send syncthing_admin_client packets. </summary> @@ -62501,7 +62547,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="88418"> +<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84138"> <summary> Do not audit attempts to send syncthing_admin_client packets. </summary> @@ -62512,7 +62558,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_admin_client_packets" lineno="88437"> +<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84157"> <summary> Receive syncthing_admin_client packets. </summary> @@ -62523,7 +62569,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="88456"> +<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84176"> <summary> Do not audit attempts to receive syncthing_admin_client packets. </summary> @@ -62534,7 +62580,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="88475"> +<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84195"> <summary> Send and receive syncthing_admin_client packets. </summary> @@ -62545,7 +62591,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="88491"> +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84211"> <summary> Do not audit attempts to send and receive syncthing_admin_client packets. </summary> @@ -62556,7 +62602,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="88506"> +<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84226"> <summary> Relabel packets to syncthing_admin_client the packet type. </summary> @@ -62566,7 +62612,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_admin_server_packets" lineno="88526"> +<interface name="corenet_send_syncthing_admin_server_packets" lineno="84246"> <summary> Send syncthing_admin_server packets. </summary> @@ -62577,7 +62623,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="88545"> +<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84265"> <summary> Do not audit attempts to send syncthing_admin_server packets. </summary> @@ -62588,7 +62634,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_admin_server_packets" lineno="88564"> +<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84284"> <summary> Receive syncthing_admin_server packets. </summary> @@ -62599,7 +62645,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="88583"> +<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84303"> <summary> Do not audit attempts to receive syncthing_admin_server packets. </summary> @@ -62610,7 +62656,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="88602"> +<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84322"> <summary> Send and receive syncthing_admin_server packets. </summary> @@ -62621,7 +62667,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="88618"> +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84338"> <summary> Do not audit attempts to send and receive syncthing_admin_server packets. </summary> @@ -62632,7 +62678,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="88633"> +<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84353"> <summary> Relabel packets to syncthing_admin_server the packet type. </summary> @@ -62642,7 +62688,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="88655"> +<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84375"> <summary> Send and receive TCP traffic on the syncthing_discovery port. </summary> @@ -62653,7 +62699,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_syncthing_discovery_port" lineno="88674"> +<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84390"> <summary> Send UDP traffic on the syncthing_discovery port. </summary> @@ -62664,7 +62710,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="88693"> +<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84405"> <summary> Do not audit attempts to send UDP traffic on the syncthing_discovery port. </summary> @@ -62675,7 +62721,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="88712"> +<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84420"> <summary> Receive UDP traffic on the syncthing_discovery port. </summary> @@ -62686,7 +62732,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="88731"> +<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84435"> <summary> Do not audit attempts to receive UDP traffic on the syncthing_discovery port. </summary> @@ -62697,7 +62743,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="88750"> +<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84450"> <summary> Send and receive UDP traffic on the syncthing_discovery port. </summary> @@ -62708,7 +62754,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="88767"> +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="84466"> <summary> Do not audit attempts to send and receive UDP traffic on the syncthing_discovery port. @@ -62720,7 +62766,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="88783"> +<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="84481"> <summary> Bind TCP sockets to the syncthing_discovery port. </summary> @@ -62731,7 +62777,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="88803"> +<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="84501"> <summary> Bind UDP sockets to the syncthing_discovery port. </summary> @@ -62742,7 +62788,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="88822"> +<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="84520"> <summary> Make a TCP connection to the syncthing_discovery port. </summary> @@ -62752,7 +62798,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_discovery_client_packets" lineno="88842"> +<interface name="corenet_send_syncthing_discovery_client_packets" lineno="84540"> <summary> Send syncthing_discovery_client packets. </summary> @@ -62763,7 +62809,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="88861"> +<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="84559"> <summary> Do not audit attempts to send syncthing_discovery_client packets. </summary> @@ -62774,7 +62820,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="88880"> +<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="84578"> <summary> Receive syncthing_discovery_client packets. </summary> @@ -62785,7 +62831,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="88899"> +<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="84597"> <summary> Do not audit attempts to receive syncthing_discovery_client packets. </summary> @@ -62796,7 +62842,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="88918"> +<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="84616"> <summary> Send and receive syncthing_discovery_client packets. </summary> @@ -62807,7 +62853,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="88934"> +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="84632"> <summary> Do not audit attempts to send and receive syncthing_discovery_client packets. </summary> @@ -62818,7 +62864,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="88949"> +<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="84647"> <summary> Relabel packets to syncthing_discovery_client the packet type. </summary> @@ -62828,7 +62874,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_discovery_server_packets" lineno="88969"> +<interface name="corenet_send_syncthing_discovery_server_packets" lineno="84667"> <summary> Send syncthing_discovery_server packets. </summary> @@ -62839,7 +62885,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="88988"> +<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="84686"> <summary> Do not audit attempts to send syncthing_discovery_server packets. </summary> @@ -62850,7 +62896,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="89007"> +<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="84705"> <summary> Receive syncthing_discovery_server packets. </summary> @@ -62861,7 +62907,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="89026"> +<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="84724"> <summary> Do not audit attempts to receive syncthing_discovery_server packets. </summary> @@ -62872,7 +62918,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="89045"> +<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="84743"> <summary> Send and receive syncthing_discovery_server packets. </summary> @@ -62883,7 +62929,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="89061"> +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="84759"> <summary> Do not audit attempts to send and receive syncthing_discovery_server packets. </summary> @@ -62894,7 +62940,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="89076"> +<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="84774"> <summary> Relabel packets to syncthing_discovery_server the packet type. </summary> @@ -62904,7 +62950,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="89098"> +<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="84796"> <summary> Send and receive TCP traffic on the sype_transport port. </summary> @@ -62915,7 +62961,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_sype_transport_port" lineno="89117"> +<interface name="corenet_udp_send_sype_transport_port" lineno="84811"> <summary> Send UDP traffic on the sype_transport port. </summary> @@ -62926,7 +62972,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="89136"> +<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="84826"> <summary> Do not audit attempts to send UDP traffic on the sype_transport port. </summary> @@ -62937,7 +62983,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_sype_transport_port" lineno="89155"> +<interface name="corenet_udp_receive_sype_transport_port" lineno="84841"> <summary> Receive UDP traffic on the sype_transport port. </summary> @@ -62948,7 +62994,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="89174"> +<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="84856"> <summary> Do not audit attempts to receive UDP traffic on the sype_transport port. </summary> @@ -62959,7 +63005,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="89193"> +<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="84871"> <summary> Send and receive UDP traffic on the sype_transport port. </summary> @@ -62970,7 +63016,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="89210"> +<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="84887"> <summary> Do not audit attempts to send and receive UDP traffic on the sype_transport port. @@ -62982,7 +63028,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_sype_transport_port" lineno="89226"> +<interface name="corenet_tcp_bind_sype_transport_port" lineno="84902"> <summary> Bind TCP sockets to the sype_transport port. </summary> @@ -62993,7 +63039,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sype_transport_port" lineno="89246"> +<interface name="corenet_udp_bind_sype_transport_port" lineno="84922"> <summary> Bind UDP sockets to the sype_transport port. </summary> @@ -63004,7 +63050,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sype_transport_port" lineno="89265"> +<interface name="corenet_tcp_connect_sype_transport_port" lineno="84941"> <summary> Make a TCP connection to the sype_transport port. </summary> @@ -63014,7 +63060,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sype_transport_client_packets" lineno="89285"> +<interface name="corenet_send_sype_transport_client_packets" lineno="84961"> <summary> Send sype_transport_client packets. </summary> @@ -63025,7 +63071,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="89304"> +<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="84980"> <summary> Do not audit attempts to send sype_transport_client packets. </summary> @@ -63036,7 +63082,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sype_transport_client_packets" lineno="89323"> +<interface name="corenet_receive_sype_transport_client_packets" lineno="84999"> <summary> Receive sype_transport_client packets. </summary> @@ -63047,7 +63093,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="89342"> +<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85018"> <summary> Do not audit attempts to receive sype_transport_client packets. </summary> @@ -63058,7 +63104,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="89361"> +<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85037"> <summary> Send and receive sype_transport_client packets. </summary> @@ -63069,7 +63115,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="89377"> +<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85053"> <summary> Do not audit attempts to send and receive sype_transport_client packets. </summary> @@ -63080,7 +63126,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sype_transport_client_packets" lineno="89392"> +<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85068"> <summary> Relabel packets to sype_transport_client the packet type. </summary> @@ -63090,7 +63136,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sype_transport_server_packets" lineno="89412"> +<interface name="corenet_send_sype_transport_server_packets" lineno="85088"> <summary> Send sype_transport_server packets. </summary> @@ -63101,7 +63147,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="89431"> +<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85107"> <summary> Do not audit attempts to send sype_transport_server packets. </summary> @@ -63112,7 +63158,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sype_transport_server_packets" lineno="89450"> +<interface name="corenet_receive_sype_transport_server_packets" lineno="85126"> <summary> Receive sype_transport_server packets. </summary> @@ -63123,7 +63169,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="89469"> +<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85145"> <summary> Do not audit attempts to receive sype_transport_server packets. </summary> @@ -63134,7 +63180,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="89488"> +<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85164"> <summary> Send and receive sype_transport_server packets. </summary> @@ -63145,7 +63191,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="89504"> +<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85180"> <summary> Do not audit attempts to send and receive sype_transport_server packets. </summary> @@ -63156,7 +63202,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sype_transport_server_packets" lineno="89519"> +<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85195"> <summary> Relabel packets to sype_transport_server the packet type. </summary> @@ -63166,7 +63212,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="89541"> +<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85217"> <summary> Send and receive TCP traffic on the syslogd port. </summary> @@ -63177,7 +63223,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_syslogd_port" lineno="89560"> +<interface name="corenet_udp_send_syslogd_port" lineno="85232"> <summary> Send UDP traffic on the syslogd port. </summary> @@ -63188,7 +63234,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="89579"> +<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85247"> <summary> Do not audit attempts to send UDP traffic on the syslogd port. </summary> @@ -63199,7 +63245,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_syslogd_port" lineno="89598"> +<interface name="corenet_udp_receive_syslogd_port" lineno="85262"> <summary> Receive UDP traffic on the syslogd port. </summary> @@ -63210,7 +63256,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="89617"> +<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85277"> <summary> Do not audit attempts to receive UDP traffic on the syslogd port. </summary> @@ -63221,7 +63267,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_syslogd_port" lineno="89636"> +<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85292"> <summary> Send and receive UDP traffic on the syslogd port. </summary> @@ -63232,7 +63278,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="89653"> +<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85308"> <summary> Do not audit attempts to send and receive UDP traffic on the syslogd port. @@ -63244,7 +63290,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_syslogd_port" lineno="89669"> +<interface name="corenet_tcp_bind_syslogd_port" lineno="85323"> <summary> Bind TCP sockets to the syslogd port. </summary> @@ -63255,7 +63301,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syslogd_port" lineno="89689"> +<interface name="corenet_udp_bind_syslogd_port" lineno="85343"> <summary> Bind UDP sockets to the syslogd port. </summary> @@ -63266,7 +63312,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syslogd_port" lineno="89708"> +<interface name="corenet_tcp_connect_syslogd_port" lineno="85362"> <summary> Make a TCP connection to the syslogd port. </summary> @@ -63276,7 +63322,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslogd_client_packets" lineno="89728"> +<interface name="corenet_send_syslogd_client_packets" lineno="85382"> <summary> Send syslogd_client packets. </summary> @@ -63287,7 +63333,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="89747"> +<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85401"> <summary> Do not audit attempts to send syslogd_client packets. </summary> @@ -63298,7 +63344,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslogd_client_packets" lineno="89766"> +<interface name="corenet_receive_syslogd_client_packets" lineno="85420"> <summary> Receive syslogd_client packets. </summary> @@ -63309,7 +63355,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="89785"> +<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85439"> <summary> Do not audit attempts to receive syslogd_client packets. </summary> @@ -63320,7 +63366,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslogd_client_packets" lineno="89804"> +<interface name="corenet_sendrecv_syslogd_client_packets" lineno="85458"> <summary> Send and receive syslogd_client packets. </summary> @@ -63331,7 +63377,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="89820"> +<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="85474"> <summary> Do not audit attempts to send and receive syslogd_client packets. </summary> @@ -63342,7 +63388,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslogd_client_packets" lineno="89835"> +<interface name="corenet_relabelto_syslogd_client_packets" lineno="85489"> <summary> Relabel packets to syslogd_client the packet type. </summary> @@ -63352,7 +63398,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslogd_server_packets" lineno="89855"> +<interface name="corenet_send_syslogd_server_packets" lineno="85509"> <summary> Send syslogd_server packets. </summary> @@ -63363,7 +63409,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="89874"> +<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="85528"> <summary> Do not audit attempts to send syslogd_server packets. </summary> @@ -63374,7 +63420,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslogd_server_packets" lineno="89893"> +<interface name="corenet_receive_syslogd_server_packets" lineno="85547"> <summary> Receive syslogd_server packets. </summary> @@ -63385,7 +63431,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="89912"> +<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="85566"> <summary> Do not audit attempts to receive syslogd_server packets. </summary> @@ -63396,7 +63442,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslogd_server_packets" lineno="89931"> +<interface name="corenet_sendrecv_syslogd_server_packets" lineno="85585"> <summary> Send and receive syslogd_server packets. </summary> @@ -63407,7 +63453,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="89947"> +<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="85601"> <summary> Do not audit attempts to send and receive syslogd_server packets. </summary> @@ -63418,7 +63464,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslogd_server_packets" lineno="89962"> +<interface name="corenet_relabelto_syslogd_server_packets" lineno="85616"> <summary> Relabel packets to syslogd_server the packet type. </summary> @@ -63428,7 +63474,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="89984"> +<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="85638"> <summary> Send and receive TCP traffic on the syslog_tls port. </summary> @@ -63439,7 +63485,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_syslog_tls_port" lineno="90003"> +<interface name="corenet_udp_send_syslog_tls_port" lineno="85653"> <summary> Send UDP traffic on the syslog_tls port. </summary> @@ -63450,7 +63496,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="90022"> +<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="85668"> <summary> Do not audit attempts to send UDP traffic on the syslog_tls port. </summary> @@ -63461,7 +63507,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_syslog_tls_port" lineno="90041"> +<interface name="corenet_udp_receive_syslog_tls_port" lineno="85683"> <summary> Receive UDP traffic on the syslog_tls port. </summary> @@ -63472,7 +63518,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="90060"> +<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="85698"> <summary> Do not audit attempts to receive UDP traffic on the syslog_tls port. </summary> @@ -63483,7 +63529,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="90079"> +<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="85713"> <summary> Send and receive UDP traffic on the syslog_tls port. </summary> @@ -63494,7 +63540,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="90096"> +<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="85729"> <summary> Do not audit attempts to send and receive UDP traffic on the syslog_tls port. @@ -63506,7 +63552,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_syslog_tls_port" lineno="90112"> +<interface name="corenet_tcp_bind_syslog_tls_port" lineno="85744"> <summary> Bind TCP sockets to the syslog_tls port. </summary> @@ -63517,7 +63563,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syslog_tls_port" lineno="90132"> +<interface name="corenet_udp_bind_syslog_tls_port" lineno="85764"> <summary> Bind UDP sockets to the syslog_tls port. </summary> @@ -63528,7 +63574,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syslog_tls_port" lineno="90151"> +<interface name="corenet_tcp_connect_syslog_tls_port" lineno="85783"> <summary> Make a TCP connection to the syslog_tls port. </summary> @@ -63538,7 +63584,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslog_tls_client_packets" lineno="90171"> +<interface name="corenet_send_syslog_tls_client_packets" lineno="85803"> <summary> Send syslog_tls_client packets. </summary> @@ -63549,7 +63595,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="90190"> +<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="85822"> <summary> Do not audit attempts to send syslog_tls_client packets. </summary> @@ -63560,7 +63606,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslog_tls_client_packets" lineno="90209"> +<interface name="corenet_receive_syslog_tls_client_packets" lineno="85841"> <summary> Receive syslog_tls_client packets. </summary> @@ -63571,7 +63617,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="90228"> +<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="85860"> <summary> Do not audit attempts to receive syslog_tls_client packets. </summary> @@ -63582,7 +63628,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="90247"> +<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="85879"> <summary> Send and receive syslog_tls_client packets. </summary> @@ -63593,7 +63639,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="90263"> +<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="85895"> <summary> Do not audit attempts to send and receive syslog_tls_client packets. </summary> @@ -63604,7 +63650,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="90278"> +<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="85910"> <summary> Relabel packets to syslog_tls_client the packet type. </summary> @@ -63614,7 +63660,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslog_tls_server_packets" lineno="90298"> +<interface name="corenet_send_syslog_tls_server_packets" lineno="85930"> <summary> Send syslog_tls_server packets. </summary> @@ -63625,7 +63671,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="90317"> +<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="85949"> <summary> Do not audit attempts to send syslog_tls_server packets. </summary> @@ -63636,7 +63682,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslog_tls_server_packets" lineno="90336"> +<interface name="corenet_receive_syslog_tls_server_packets" lineno="85968"> <summary> Receive syslog_tls_server packets. </summary> @@ -63647,7 +63693,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="90355"> +<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="85987"> <summary> Do not audit attempts to receive syslog_tls_server packets. </summary> @@ -63658,7 +63704,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="90374"> +<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86006"> <summary> Send and receive syslog_tls_server packets. </summary> @@ -63669,7 +63715,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="90390"> +<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86022"> <summary> Do not audit attempts to send and receive syslog_tls_server packets. </summary> @@ -63680,7 +63726,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="90405"> +<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86037"> <summary> Relabel packets to syslog_tls_server the packet type. </summary> @@ -63690,7 +63736,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_tcs_port" lineno="90427"> +<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86059"> <summary> Send and receive TCP traffic on the tcs port. </summary> @@ -63701,7 +63747,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_tcs_port" lineno="90446"> +<interface name="corenet_udp_send_tcs_port" lineno="86074"> <summary> Send UDP traffic on the tcs port. </summary> @@ -63712,7 +63758,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="90465"> +<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86089"> <summary> Do not audit attempts to send UDP traffic on the tcs port. </summary> @@ -63723,7 +63769,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_tcs_port" lineno="90484"> +<interface name="corenet_udp_receive_tcs_port" lineno="86104"> <summary> Receive UDP traffic on the tcs port. </summary> @@ -63734,7 +63780,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="90503"> +<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86119"> <summary> Do not audit attempts to receive UDP traffic on the tcs port. </summary> @@ -63745,7 +63791,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_tcs_port" lineno="90522"> +<interface name="corenet_udp_sendrecv_tcs_port" lineno="86134"> <summary> Send and receive UDP traffic on the tcs port. </summary> @@ -63756,7 +63802,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="90539"> +<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86150"> <summary> Do not audit attempts to send and receive UDP traffic on the tcs port. @@ -63768,7 +63814,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_tcs_port" lineno="90555"> +<interface name="corenet_tcp_bind_tcs_port" lineno="86165"> <summary> Bind TCP sockets to the tcs port. </summary> @@ -63779,7 +63825,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_tcs_port" lineno="90575"> +<interface name="corenet_udp_bind_tcs_port" lineno="86185"> <summary> Bind UDP sockets to the tcs port. </summary> @@ -63790,7 +63836,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_tcs_port" lineno="90594"> +<interface name="corenet_tcp_connect_tcs_port" lineno="86204"> <summary> Make a TCP connection to the tcs port. </summary> @@ -63800,7 +63846,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tcs_client_packets" lineno="90614"> +<interface name="corenet_send_tcs_client_packets" lineno="86224"> <summary> Send tcs_client packets. </summary> @@ -63811,7 +63857,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="90633"> +<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86243"> <summary> Do not audit attempts to send tcs_client packets. </summary> @@ -63822,7 +63868,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tcs_client_packets" lineno="90652"> +<interface name="corenet_receive_tcs_client_packets" lineno="86262"> <summary> Receive tcs_client packets. </summary> @@ -63833,7 +63879,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="90671"> +<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86281"> <summary> Do not audit attempts to receive tcs_client packets. </summary> @@ -63844,7 +63890,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tcs_client_packets" lineno="90690"> +<interface name="corenet_sendrecv_tcs_client_packets" lineno="86300"> <summary> Send and receive tcs_client packets. </summary> @@ -63855,7 +63901,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="90706"> +<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86316"> <summary> Do not audit attempts to send and receive tcs_client packets. </summary> @@ -63866,7 +63912,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tcs_client_packets" lineno="90721"> +<interface name="corenet_relabelto_tcs_client_packets" lineno="86331"> <summary> Relabel packets to tcs_client the packet type. </summary> @@ -63876,7 +63922,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tcs_server_packets" lineno="90741"> +<interface name="corenet_send_tcs_server_packets" lineno="86351"> <summary> Send tcs_server packets. </summary> @@ -63887,7 +63933,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="90760"> +<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86370"> <summary> Do not audit attempts to send tcs_server packets. </summary> @@ -63898,7 +63944,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tcs_server_packets" lineno="90779"> +<interface name="corenet_receive_tcs_server_packets" lineno="86389"> <summary> Receive tcs_server packets. </summary> @@ -63909,7 +63955,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="90798"> +<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86408"> <summary> Do not audit attempts to receive tcs_server packets. </summary> @@ -63920,7 +63966,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tcs_server_packets" lineno="90817"> +<interface name="corenet_sendrecv_tcs_server_packets" lineno="86427"> <summary> Send and receive tcs_server packets. </summary> @@ -63931,7 +63977,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="90833"> +<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86443"> <summary> Do not audit attempts to send and receive tcs_server packets. </summary> @@ -63942,7 +63988,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tcs_server_packets" lineno="90848"> +<interface name="corenet_relabelto_tcs_server_packets" lineno="86458"> <summary> Relabel packets to tcs_server the packet type. </summary> @@ -63952,7 +63998,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="90870"> +<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="86480"> <summary> Send and receive TCP traffic on the telnetd port. </summary> @@ -63963,7 +64009,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_telnetd_port" lineno="90889"> +<interface name="corenet_udp_send_telnetd_port" lineno="86495"> <summary> Send UDP traffic on the telnetd port. </summary> @@ -63974,7 +64020,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="90908"> +<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="86510"> <summary> Do not audit attempts to send UDP traffic on the telnetd port. </summary> @@ -63985,7 +64031,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_telnetd_port" lineno="90927"> +<interface name="corenet_udp_receive_telnetd_port" lineno="86525"> <summary> Receive UDP traffic on the telnetd port. </summary> @@ -63996,7 +64042,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="90946"> +<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="86540"> <summary> Do not audit attempts to receive UDP traffic on the telnetd port. </summary> @@ -64007,7 +64053,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_telnetd_port" lineno="90965"> +<interface name="corenet_udp_sendrecv_telnetd_port" lineno="86555"> <summary> Send and receive UDP traffic on the telnetd port. </summary> @@ -64018,7 +64064,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="90982"> +<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="86571"> <summary> Do not audit attempts to send and receive UDP traffic on the telnetd port. @@ -64030,7 +64076,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_telnetd_port" lineno="90998"> +<interface name="corenet_tcp_bind_telnetd_port" lineno="86586"> <summary> Bind TCP sockets to the telnetd port. </summary> @@ -64041,7 +64087,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_telnetd_port" lineno="91018"> +<interface name="corenet_udp_bind_telnetd_port" lineno="86606"> <summary> Bind UDP sockets to the telnetd port. </summary> @@ -64052,7 +64098,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_telnetd_port" lineno="91037"> +<interface name="corenet_tcp_connect_telnetd_port" lineno="86625"> <summary> Make a TCP connection to the telnetd port. </summary> @@ -64062,7 +64108,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_telnetd_client_packets" lineno="91057"> +<interface name="corenet_send_telnetd_client_packets" lineno="86645"> <summary> Send telnetd_client packets. </summary> @@ -64073,7 +64119,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="91076"> +<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="86664"> <summary> Do not audit attempts to send telnetd_client packets. </summary> @@ -64084,7 +64130,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_telnetd_client_packets" lineno="91095"> +<interface name="corenet_receive_telnetd_client_packets" lineno="86683"> <summary> Receive telnetd_client packets. </summary> @@ -64095,7 +64141,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="91114"> +<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="86702"> <summary> Do not audit attempts to receive telnetd_client packets. </summary> @@ -64106,7 +64152,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_telnetd_client_packets" lineno="91133"> +<interface name="corenet_sendrecv_telnetd_client_packets" lineno="86721"> <summary> Send and receive telnetd_client packets. </summary> @@ -64117,7 +64163,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="91149"> +<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="86737"> <summary> Do not audit attempts to send and receive telnetd_client packets. </summary> @@ -64128,7 +64174,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_telnetd_client_packets" lineno="91164"> +<interface name="corenet_relabelto_telnetd_client_packets" lineno="86752"> <summary> Relabel packets to telnetd_client the packet type. </summary> @@ -64138,7 +64184,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_telnetd_server_packets" lineno="91184"> +<interface name="corenet_send_telnetd_server_packets" lineno="86772"> <summary> Send telnetd_server packets. </summary> @@ -64149,7 +64195,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="91203"> +<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="86791"> <summary> Do not audit attempts to send telnetd_server packets. </summary> @@ -64160,7 +64206,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_telnetd_server_packets" lineno="91222"> +<interface name="corenet_receive_telnetd_server_packets" lineno="86810"> <summary> Receive telnetd_server packets. </summary> @@ -64171,7 +64217,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="91241"> +<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="86829"> <summary> Do not audit attempts to receive telnetd_server packets. </summary> @@ -64182,7 +64228,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_telnetd_server_packets" lineno="91260"> +<interface name="corenet_sendrecv_telnetd_server_packets" lineno="86848"> <summary> Send and receive telnetd_server packets. </summary> @@ -64193,7 +64239,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="91276"> +<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="86864"> <summary> Do not audit attempts to send and receive telnetd_server packets. </summary> @@ -64204,7 +64250,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_telnetd_server_packets" lineno="91291"> +<interface name="corenet_relabelto_telnetd_server_packets" lineno="86879"> <summary> Relabel packets to telnetd_server the packet type. </summary> @@ -64214,7 +64260,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_tftp_port" lineno="91313"> +<interface name="corenet_tcp_sendrecv_tftp_port" lineno="86901"> <summary> Send and receive TCP traffic on the tftp port. </summary> @@ -64225,7 +64271,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_tftp_port" lineno="91332"> +<interface name="corenet_udp_send_tftp_port" lineno="86916"> <summary> Send UDP traffic on the tftp port. </summary> @@ -64236,7 +64282,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="91351"> +<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="86931"> <summary> Do not audit attempts to send UDP traffic on the tftp port. </summary> @@ -64247,7 +64293,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_tftp_port" lineno="91370"> +<interface name="corenet_udp_receive_tftp_port" lineno="86946"> <summary> Receive UDP traffic on the tftp port. </summary> @@ -64258,7 +64304,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="91389"> +<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="86961"> <summary> Do not audit attempts to receive UDP traffic on the tftp port. </summary> @@ -64269,7 +64315,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_tftp_port" lineno="91408"> +<interface name="corenet_udp_sendrecv_tftp_port" lineno="86976"> <summary> Send and receive UDP traffic on the tftp port. </summary> @@ -64280,7 +64326,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="91425"> +<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="86992"> <summary> Do not audit attempts to send and receive UDP traffic on the tftp port. @@ -64292,7 +64338,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_tftp_port" lineno="91441"> +<interface name="corenet_tcp_bind_tftp_port" lineno="87007"> <summary> Bind TCP sockets to the tftp port. </summary> @@ -64303,7 +64349,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_tftp_port" lineno="91461"> +<interface name="corenet_udp_bind_tftp_port" lineno="87027"> <summary> Bind UDP sockets to the tftp port. </summary> @@ -64314,7 +64360,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_tftp_port" lineno="91480"> +<interface name="corenet_tcp_connect_tftp_port" lineno="87046"> <summary> Make a TCP connection to the tftp port. </summary> @@ -64324,7 +64370,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tftp_client_packets" lineno="91500"> +<interface name="corenet_send_tftp_client_packets" lineno="87066"> <summary> Send tftp_client packets. </summary> @@ -64335,7 +64381,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="91519"> +<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87085"> <summary> Do not audit attempts to send tftp_client packets. </summary> @@ -64346,7 +64392,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tftp_client_packets" lineno="91538"> +<interface name="corenet_receive_tftp_client_packets" lineno="87104"> <summary> Receive tftp_client packets. </summary> @@ -64357,7 +64403,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="91557"> +<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87123"> <summary> Do not audit attempts to receive tftp_client packets. </summary> @@ -64368,7 +64414,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tftp_client_packets" lineno="91576"> +<interface name="corenet_sendrecv_tftp_client_packets" lineno="87142"> <summary> Send and receive tftp_client packets. </summary> @@ -64379,7 +64425,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="91592"> +<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87158"> <summary> Do not audit attempts to send and receive tftp_client packets. </summary> @@ -64390,7 +64436,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tftp_client_packets" lineno="91607"> +<interface name="corenet_relabelto_tftp_client_packets" lineno="87173"> <summary> Relabel packets to tftp_client the packet type. </summary> @@ -64400,7 +64446,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tftp_server_packets" lineno="91627"> +<interface name="corenet_send_tftp_server_packets" lineno="87193"> <summary> Send tftp_server packets. </summary> @@ -64411,7 +64457,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="91646"> +<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87212"> <summary> Do not audit attempts to send tftp_server packets. </summary> @@ -64422,7 +64468,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tftp_server_packets" lineno="91665"> +<interface name="corenet_receive_tftp_server_packets" lineno="87231"> <summary> Receive tftp_server packets. </summary> @@ -64433,7 +64479,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="91684"> +<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87250"> <summary> Do not audit attempts to receive tftp_server packets. </summary> @@ -64444,7 +64490,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tftp_server_packets" lineno="91703"> +<interface name="corenet_sendrecv_tftp_server_packets" lineno="87269"> <summary> Send and receive tftp_server packets. </summary> @@ -64455,7 +64501,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="91719"> +<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87285"> <summary> Do not audit attempts to send and receive tftp_server packets. </summary> @@ -64466,7 +64512,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tftp_server_packets" lineno="91734"> +<interface name="corenet_relabelto_tftp_server_packets" lineno="87300"> <summary> Relabel packets to tftp_server the packet type. </summary> @@ -64476,7 +64522,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_tor_port" lineno="91756"> +<interface name="corenet_tcp_sendrecv_tor_port" lineno="87322"> <summary> Send and receive TCP traffic on the tor port. </summary> @@ -64487,7 +64533,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_tor_port" lineno="91775"> +<interface name="corenet_udp_send_tor_port" lineno="87337"> <summary> Send UDP traffic on the tor port. </summary> @@ -64498,7 +64544,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_tor_port" lineno="91794"> +<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87352"> <summary> Do not audit attempts to send UDP traffic on the tor port. </summary> @@ -64509,7 +64555,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_tor_port" lineno="91813"> +<interface name="corenet_udp_receive_tor_port" lineno="87367"> <summary> Receive UDP traffic on the tor port. </summary> @@ -64520,7 +64566,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="91832"> +<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87382"> <summary> Do not audit attempts to receive UDP traffic on the tor port. </summary> @@ -64531,7 +64577,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_tor_port" lineno="91851"> +<interface name="corenet_udp_sendrecv_tor_port" lineno="87397"> <summary> Send and receive UDP traffic on the tor port. </summary> @@ -64542,7 +64588,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="91868"> +<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87413"> <summary> Do not audit attempts to send and receive UDP traffic on the tor port. @@ -64554,7 +64600,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_tor_port" lineno="91884"> +<interface name="corenet_tcp_bind_tor_port" lineno="87428"> <summary> Bind TCP sockets to the tor port. </summary> @@ -64565,7 +64611,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_tor_port" lineno="91904"> +<interface name="corenet_udp_bind_tor_port" lineno="87448"> <summary> Bind UDP sockets to the tor port. </summary> @@ -64576,7 +64622,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_tor_port" lineno="91923"> +<interface name="corenet_tcp_connect_tor_port" lineno="87467"> <summary> Make a TCP connection to the tor port. </summary> @@ -64586,7 +64632,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tor_client_packets" lineno="91943"> +<interface name="corenet_send_tor_client_packets" lineno="87487"> <summary> Send tor_client packets. </summary> @@ -64597,7 +64643,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tor_client_packets" lineno="91962"> +<interface name="corenet_dontaudit_send_tor_client_packets" lineno="87506"> <summary> Do not audit attempts to send tor_client packets. </summary> @@ -64608,7 +64654,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tor_client_packets" lineno="91981"> +<interface name="corenet_receive_tor_client_packets" lineno="87525"> <summary> Receive tor_client packets. </summary> @@ -64619,7 +64665,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="92000"> +<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="87544"> <summary> Do not audit attempts to receive tor_client packets. </summary> @@ -64630,7 +64676,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tor_client_packets" lineno="92019"> +<interface name="corenet_sendrecv_tor_client_packets" lineno="87563"> <summary> Send and receive tor_client packets. </summary> @@ -64641,7 +64687,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="92035"> +<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="87579"> <summary> Do not audit attempts to send and receive tor_client packets. </summary> @@ -64652,7 +64698,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tor_client_packets" lineno="92050"> +<interface name="corenet_relabelto_tor_client_packets" lineno="87594"> <summary> Relabel packets to tor_client the packet type. </summary> @@ -64662,7 +64708,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tor_server_packets" lineno="92070"> +<interface name="corenet_send_tor_server_packets" lineno="87614"> <summary> Send tor_server packets. </summary> @@ -64673,7 +64719,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tor_server_packets" lineno="92089"> +<interface name="corenet_dontaudit_send_tor_server_packets" lineno="87633"> <summary> Do not audit attempts to send tor_server packets. </summary> @@ -64684,7 +64730,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tor_server_packets" lineno="92108"> +<interface name="corenet_receive_tor_server_packets" lineno="87652"> <summary> Receive tor_server packets. </summary> @@ -64695,7 +64741,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="92127"> +<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="87671"> <summary> Do not audit attempts to receive tor_server packets. </summary> @@ -64706,7 +64752,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tor_server_packets" lineno="92146"> +<interface name="corenet_sendrecv_tor_server_packets" lineno="87690"> <summary> Send and receive tor_server packets. </summary> @@ -64717,7 +64763,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="92162"> +<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="87706"> <summary> Do not audit attempts to send and receive tor_server packets. </summary> @@ -64728,7 +64774,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tor_server_packets" lineno="92177"> +<interface name="corenet_relabelto_tor_server_packets" lineno="87721"> <summary> Relabel packets to tor_server the packet type. </summary> @@ -64738,7 +64784,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="92199"> +<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="87743"> <summary> Send and receive TCP traffic on the traceroute port. </summary> @@ -64749,7 +64795,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_traceroute_port" lineno="92218"> +<interface name="corenet_udp_send_traceroute_port" lineno="87758"> <summary> Send UDP traffic on the traceroute port. </summary> @@ -64760,7 +64806,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="92237"> +<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="87773"> <summary> Do not audit attempts to send UDP traffic on the traceroute port. </summary> @@ -64771,7 +64817,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_traceroute_port" lineno="92256"> +<interface name="corenet_udp_receive_traceroute_port" lineno="87788"> <summary> Receive UDP traffic on the traceroute port. </summary> @@ -64782,7 +64828,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="92275"> +<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="87803"> <summary> Do not audit attempts to receive UDP traffic on the traceroute port. </summary> @@ -64793,7 +64839,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_traceroute_port" lineno="92294"> +<interface name="corenet_udp_sendrecv_traceroute_port" lineno="87818"> <summary> Send and receive UDP traffic on the traceroute port. </summary> @@ -64804,7 +64850,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="92311"> +<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="87834"> <summary> Do not audit attempts to send and receive UDP traffic on the traceroute port. @@ -64816,7 +64862,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_traceroute_port" lineno="92327"> +<interface name="corenet_tcp_bind_traceroute_port" lineno="87849"> <summary> Bind TCP sockets to the traceroute port. </summary> @@ -64827,7 +64873,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_traceroute_port" lineno="92347"> +<interface name="corenet_udp_bind_traceroute_port" lineno="87869"> <summary> Bind UDP sockets to the traceroute port. </summary> @@ -64838,7 +64884,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_traceroute_port" lineno="92366"> +<interface name="corenet_tcp_connect_traceroute_port" lineno="87888"> <summary> Make a TCP connection to the traceroute port. </summary> @@ -64848,7 +64894,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_traceroute_client_packets" lineno="92386"> +<interface name="corenet_send_traceroute_client_packets" lineno="87908"> <summary> Send traceroute_client packets. </summary> @@ -64859,7 +64905,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="92405"> +<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="87927"> <summary> Do not audit attempts to send traceroute_client packets. </summary> @@ -64870,7 +64916,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_traceroute_client_packets" lineno="92424"> +<interface name="corenet_receive_traceroute_client_packets" lineno="87946"> <summary> Receive traceroute_client packets. </summary> @@ -64881,7 +64927,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="92443"> +<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="87965"> <summary> Do not audit attempts to receive traceroute_client packets. </summary> @@ -64892,7 +64938,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_traceroute_client_packets" lineno="92462"> +<interface name="corenet_sendrecv_traceroute_client_packets" lineno="87984"> <summary> Send and receive traceroute_client packets. </summary> @@ -64903,7 +64949,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="92478"> +<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88000"> <summary> Do not audit attempts to send and receive traceroute_client packets. </summary> @@ -64914,7 +64960,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_traceroute_client_packets" lineno="92493"> +<interface name="corenet_relabelto_traceroute_client_packets" lineno="88015"> <summary> Relabel packets to traceroute_client the packet type. </summary> @@ -64924,7 +64970,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_traceroute_server_packets" lineno="92513"> +<interface name="corenet_send_traceroute_server_packets" lineno="88035"> <summary> Send traceroute_server packets. </summary> @@ -64935,7 +64981,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="92532"> +<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88054"> <summary> Do not audit attempts to send traceroute_server packets. </summary> @@ -64946,7 +64992,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_traceroute_server_packets" lineno="92551"> +<interface name="corenet_receive_traceroute_server_packets" lineno="88073"> <summary> Receive traceroute_server packets. </summary> @@ -64957,7 +65003,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="92570"> +<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88092"> <summary> Do not audit attempts to receive traceroute_server packets. </summary> @@ -64968,7 +65014,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_traceroute_server_packets" lineno="92589"> +<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88111"> <summary> Send and receive traceroute_server packets. </summary> @@ -64979,7 +65025,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="92605"> +<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88127"> <summary> Do not audit attempts to send and receive traceroute_server packets. </summary> @@ -64990,7 +65036,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_traceroute_server_packets" lineno="92620"> +<interface name="corenet_relabelto_traceroute_server_packets" lineno="88142"> <summary> Relabel packets to traceroute_server the packet type. </summary> @@ -65000,7 +65046,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="92642"> +<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88164"> <summary> Send and receive TCP traffic on the transproxy port. </summary> @@ -65011,7 +65057,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_transproxy_port" lineno="92661"> +<interface name="corenet_udp_send_transproxy_port" lineno="88179"> <summary> Send UDP traffic on the transproxy port. </summary> @@ -65022,7 +65068,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="92680"> +<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88194"> <summary> Do not audit attempts to send UDP traffic on the transproxy port. </summary> @@ -65033,7 +65079,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_transproxy_port" lineno="92699"> +<interface name="corenet_udp_receive_transproxy_port" lineno="88209"> <summary> Receive UDP traffic on the transproxy port. </summary> @@ -65044,7 +65090,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="92718"> +<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88224"> <summary> Do not audit attempts to receive UDP traffic on the transproxy port. </summary> @@ -65055,7 +65101,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_transproxy_port" lineno="92737"> +<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88239"> <summary> Send and receive UDP traffic on the transproxy port. </summary> @@ -65066,7 +65112,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="92754"> +<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88255"> <summary> Do not audit attempts to send and receive UDP traffic on the transproxy port. @@ -65078,7 +65124,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_transproxy_port" lineno="92770"> +<interface name="corenet_tcp_bind_transproxy_port" lineno="88270"> <summary> Bind TCP sockets to the transproxy port. </summary> @@ -65089,7 +65135,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_transproxy_port" lineno="92790"> +<interface name="corenet_udp_bind_transproxy_port" lineno="88290"> <summary> Bind UDP sockets to the transproxy port. </summary> @@ -65100,7 +65146,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_transproxy_port" lineno="92809"> +<interface name="corenet_tcp_connect_transproxy_port" lineno="88309"> <summary> Make a TCP connection to the transproxy port. </summary> @@ -65110,7 +65156,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_transproxy_client_packets" lineno="92829"> +<interface name="corenet_send_transproxy_client_packets" lineno="88329"> <summary> Send transproxy_client packets. </summary> @@ -65121,7 +65167,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="92848"> +<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88348"> <summary> Do not audit attempts to send transproxy_client packets. </summary> @@ -65132,7 +65178,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_transproxy_client_packets" lineno="92867"> +<interface name="corenet_receive_transproxy_client_packets" lineno="88367"> <summary> Receive transproxy_client packets. </summary> @@ -65143,7 +65189,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="92886"> +<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88386"> <summary> Do not audit attempts to receive transproxy_client packets. </summary> @@ -65154,7 +65200,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_transproxy_client_packets" lineno="92905"> +<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88405"> <summary> Send and receive transproxy_client packets. </summary> @@ -65165,7 +65211,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="92921"> +<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88421"> <summary> Do not audit attempts to send and receive transproxy_client packets. </summary> @@ -65176,7 +65222,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_transproxy_client_packets" lineno="92936"> +<interface name="corenet_relabelto_transproxy_client_packets" lineno="88436"> <summary> Relabel packets to transproxy_client the packet type. </summary> @@ -65186,7 +65232,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_transproxy_server_packets" lineno="92956"> +<interface name="corenet_send_transproxy_server_packets" lineno="88456"> <summary> Send transproxy_server packets. </summary> @@ -65197,7 +65243,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="92975"> +<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="88475"> <summary> Do not audit attempts to send transproxy_server packets. </summary> @@ -65208,7 +65254,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_transproxy_server_packets" lineno="92994"> +<interface name="corenet_receive_transproxy_server_packets" lineno="88494"> <summary> Receive transproxy_server packets. </summary> @@ -65219,7 +65265,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="93013"> +<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="88513"> <summary> Do not audit attempts to receive transproxy_server packets. </summary> @@ -65230,7 +65276,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_transproxy_server_packets" lineno="93032"> +<interface name="corenet_sendrecv_transproxy_server_packets" lineno="88532"> <summary> Send and receive transproxy_server packets. </summary> @@ -65241,7 +65287,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="93048"> +<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="88548"> <summary> Do not audit attempts to send and receive transproxy_server packets. </summary> @@ -65252,7 +65298,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_transproxy_server_packets" lineno="93063"> +<interface name="corenet_relabelto_transproxy_server_packets" lineno="88563"> <summary> Relabel packets to transproxy_server the packet type. </summary> @@ -65262,7 +65308,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="93085"> +<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="88585"> <summary> Send and receive TCP traffic on the trisoap port. </summary> @@ -65273,7 +65319,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_trisoap_port" lineno="93104"> +<interface name="corenet_udp_send_trisoap_port" lineno="88600"> <summary> Send UDP traffic on the trisoap port. </summary> @@ -65284,7 +65330,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="93123"> +<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="88615"> <summary> Do not audit attempts to send UDP traffic on the trisoap port. </summary> @@ -65295,7 +65341,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_trisoap_port" lineno="93142"> +<interface name="corenet_udp_receive_trisoap_port" lineno="88630"> <summary> Receive UDP traffic on the trisoap port. </summary> @@ -65306,7 +65352,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="93161"> +<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="88645"> <summary> Do not audit attempts to receive UDP traffic on the trisoap port. </summary> @@ -65317,7 +65363,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_trisoap_port" lineno="93180"> +<interface name="corenet_udp_sendrecv_trisoap_port" lineno="88660"> <summary> Send and receive UDP traffic on the trisoap port. </summary> @@ -65328,7 +65374,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="93197"> +<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="88676"> <summary> Do not audit attempts to send and receive UDP traffic on the trisoap port. @@ -65340,7 +65386,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_trisoap_port" lineno="93213"> +<interface name="corenet_tcp_bind_trisoap_port" lineno="88691"> <summary> Bind TCP sockets to the trisoap port. </summary> @@ -65351,7 +65397,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_trisoap_port" lineno="93233"> +<interface name="corenet_udp_bind_trisoap_port" lineno="88711"> <summary> Bind UDP sockets to the trisoap port. </summary> @@ -65362,7 +65408,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_trisoap_port" lineno="93252"> +<interface name="corenet_tcp_connect_trisoap_port" lineno="88730"> <summary> Make a TCP connection to the trisoap port. </summary> @@ -65372,7 +65418,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trisoap_client_packets" lineno="93272"> +<interface name="corenet_send_trisoap_client_packets" lineno="88750"> <summary> Send trisoap_client packets. </summary> @@ -65383,7 +65429,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="93291"> +<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="88769"> <summary> Do not audit attempts to send trisoap_client packets. </summary> @@ -65394,7 +65440,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trisoap_client_packets" lineno="93310"> +<interface name="corenet_receive_trisoap_client_packets" lineno="88788"> <summary> Receive trisoap_client packets. </summary> @@ -65405,7 +65451,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="93329"> +<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="88807"> <summary> Do not audit attempts to receive trisoap_client packets. </summary> @@ -65416,7 +65462,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trisoap_client_packets" lineno="93348"> +<interface name="corenet_sendrecv_trisoap_client_packets" lineno="88826"> <summary> Send and receive trisoap_client packets. </summary> @@ -65427,7 +65473,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="93364"> +<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="88842"> <summary> Do not audit attempts to send and receive trisoap_client packets. </summary> @@ -65438,7 +65484,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trisoap_client_packets" lineno="93379"> +<interface name="corenet_relabelto_trisoap_client_packets" lineno="88857"> <summary> Relabel packets to trisoap_client the packet type. </summary> @@ -65448,7 +65494,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trisoap_server_packets" lineno="93399"> +<interface name="corenet_send_trisoap_server_packets" lineno="88877"> <summary> Send trisoap_server packets. </summary> @@ -65459,7 +65505,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="93418"> +<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="88896"> <summary> Do not audit attempts to send trisoap_server packets. </summary> @@ -65470,7 +65516,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trisoap_server_packets" lineno="93437"> +<interface name="corenet_receive_trisoap_server_packets" lineno="88915"> <summary> Receive trisoap_server packets. </summary> @@ -65481,7 +65527,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="93456"> +<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="88934"> <summary> Do not audit attempts to receive trisoap_server packets. </summary> @@ -65492,7 +65538,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trisoap_server_packets" lineno="93475"> +<interface name="corenet_sendrecv_trisoap_server_packets" lineno="88953"> <summary> Send and receive trisoap_server packets. </summary> @@ -65503,7 +65549,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="93491"> +<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="88969"> <summary> Do not audit attempts to send and receive trisoap_server packets. </summary> @@ -65514,7 +65560,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trisoap_server_packets" lineno="93506"> +<interface name="corenet_relabelto_trisoap_server_packets" lineno="88984"> <summary> Relabel packets to trisoap_server the packet type. </summary> @@ -65524,7 +65570,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="93528"> +<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89006"> <summary> Send and receive TCP traffic on the trivnet1 port. </summary> @@ -65535,7 +65581,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_trivnet1_port" lineno="93547"> +<interface name="corenet_udp_send_trivnet1_port" lineno="89021"> <summary> Send UDP traffic on the trivnet1 port. </summary> @@ -65546,7 +65592,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="93566"> +<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89036"> <summary> Do not audit attempts to send UDP traffic on the trivnet1 port. </summary> @@ -65557,7 +65603,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_trivnet1_port" lineno="93585"> +<interface name="corenet_udp_receive_trivnet1_port" lineno="89051"> <summary> Receive UDP traffic on the trivnet1 port. </summary> @@ -65568,7 +65614,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="93604"> +<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89066"> <summary> Do not audit attempts to receive UDP traffic on the trivnet1 port. </summary> @@ -65579,7 +65625,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="93623"> +<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89081"> <summary> Send and receive UDP traffic on the trivnet1 port. </summary> @@ -65590,7 +65636,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="93640"> +<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89097"> <summary> Do not audit attempts to send and receive UDP traffic on the trivnet1 port. @@ -65602,7 +65648,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_trivnet1_port" lineno="93656"> +<interface name="corenet_tcp_bind_trivnet1_port" lineno="89112"> <summary> Bind TCP sockets to the trivnet1 port. </summary> @@ -65613,7 +65659,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_trivnet1_port" lineno="93676"> +<interface name="corenet_udp_bind_trivnet1_port" lineno="89132"> <summary> Bind UDP sockets to the trivnet1 port. </summary> @@ -65624,7 +65670,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_trivnet1_port" lineno="93695"> +<interface name="corenet_tcp_connect_trivnet1_port" lineno="89151"> <summary> Make a TCP connection to the trivnet1 port. </summary> @@ -65634,7 +65680,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trivnet1_client_packets" lineno="93715"> +<interface name="corenet_send_trivnet1_client_packets" lineno="89171"> <summary> Send trivnet1_client packets. </summary> @@ -65645,7 +65691,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="93734"> +<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89190"> <summary> Do not audit attempts to send trivnet1_client packets. </summary> @@ -65656,7 +65702,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trivnet1_client_packets" lineno="93753"> +<interface name="corenet_receive_trivnet1_client_packets" lineno="89209"> <summary> Receive trivnet1_client packets. </summary> @@ -65667,7 +65713,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="93772"> +<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89228"> <summary> Do not audit attempts to receive trivnet1_client packets. </summary> @@ -65678,7 +65724,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="93791"> +<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89247"> <summary> Send and receive trivnet1_client packets. </summary> @@ -65689,7 +65735,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="93807"> +<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89263"> <summary> Do not audit attempts to send and receive trivnet1_client packets. </summary> @@ -65700,7 +65746,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trivnet1_client_packets" lineno="93822"> +<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89278"> <summary> Relabel packets to trivnet1_client the packet type. </summary> @@ -65710,7 +65756,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trivnet1_server_packets" lineno="93842"> +<interface name="corenet_send_trivnet1_server_packets" lineno="89298"> <summary> Send trivnet1_server packets. </summary> @@ -65721,7 +65767,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="93861"> +<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89317"> <summary> Do not audit attempts to send trivnet1_server packets. </summary> @@ -65732,7 +65778,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trivnet1_server_packets" lineno="93880"> +<interface name="corenet_receive_trivnet1_server_packets" lineno="89336"> <summary> Receive trivnet1_server packets. </summary> @@ -65743,7 +65789,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="93899"> +<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89355"> <summary> Do not audit attempts to receive trivnet1_server packets. </summary> @@ -65754,7 +65800,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="93918"> +<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89374"> <summary> Send and receive trivnet1_server packets. </summary> @@ -65765,7 +65811,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="93934"> +<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89390"> <summary> Do not audit attempts to send and receive trivnet1_server packets. </summary> @@ -65776,7 +65822,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trivnet1_server_packets" lineno="93949"> +<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89405"> <summary> Relabel packets to trivnet1_server the packet type. </summary> @@ -65786,7 +65832,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ups_port" lineno="93971"> +<interface name="corenet_tcp_sendrecv_ups_port" lineno="89427"> <summary> Send and receive TCP traffic on the ups port. </summary> @@ -65797,7 +65843,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ups_port" lineno="93990"> +<interface name="corenet_udp_send_ups_port" lineno="89442"> <summary> Send UDP traffic on the ups port. </summary> @@ -65808,7 +65854,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ups_port" lineno="94009"> +<interface name="corenet_dontaudit_udp_send_ups_port" lineno="89457"> <summary> Do not audit attempts to send UDP traffic on the ups port. </summary> @@ -65819,7 +65865,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ups_port" lineno="94028"> +<interface name="corenet_udp_receive_ups_port" lineno="89472"> <summary> Receive UDP traffic on the ups port. </summary> @@ -65830,7 +65876,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="94047"> +<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="89487"> <summary> Do not audit attempts to receive UDP traffic on the ups port. </summary> @@ -65841,7 +65887,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ups_port" lineno="94066"> +<interface name="corenet_udp_sendrecv_ups_port" lineno="89502"> <summary> Send and receive UDP traffic on the ups port. </summary> @@ -65852,7 +65898,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="94083"> +<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="89518"> <summary> Do not audit attempts to send and receive UDP traffic on the ups port. @@ -65864,7 +65910,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ups_port" lineno="94099"> +<interface name="corenet_tcp_bind_ups_port" lineno="89533"> <summary> Bind TCP sockets to the ups port. </summary> @@ -65875,7 +65921,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ups_port" lineno="94119"> +<interface name="corenet_udp_bind_ups_port" lineno="89553"> <summary> Bind UDP sockets to the ups port. </summary> @@ -65886,7 +65932,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ups_port" lineno="94138"> +<interface name="corenet_tcp_connect_ups_port" lineno="89572"> <summary> Make a TCP connection to the ups port. </summary> @@ -65896,7 +65942,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ups_client_packets" lineno="94158"> +<interface name="corenet_send_ups_client_packets" lineno="89592"> <summary> Send ups_client packets. </summary> @@ -65907,7 +65953,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ups_client_packets" lineno="94177"> +<interface name="corenet_dontaudit_send_ups_client_packets" lineno="89611"> <summary> Do not audit attempts to send ups_client packets. </summary> @@ -65918,7 +65964,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ups_client_packets" lineno="94196"> +<interface name="corenet_receive_ups_client_packets" lineno="89630"> <summary> Receive ups_client packets. </summary> @@ -65929,7 +65975,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="94215"> +<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="89649"> <summary> Do not audit attempts to receive ups_client packets. </summary> @@ -65940,7 +65986,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ups_client_packets" lineno="94234"> +<interface name="corenet_sendrecv_ups_client_packets" lineno="89668"> <summary> Send and receive ups_client packets. </summary> @@ -65951,7 +65997,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="94250"> +<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="89684"> <summary> Do not audit attempts to send and receive ups_client packets. </summary> @@ -65962,7 +66008,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ups_client_packets" lineno="94265"> +<interface name="corenet_relabelto_ups_client_packets" lineno="89699"> <summary> Relabel packets to ups_client the packet type. </summary> @@ -65972,7 +66018,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ups_server_packets" lineno="94285"> +<interface name="corenet_send_ups_server_packets" lineno="89719"> <summary> Send ups_server packets. </summary> @@ -65983,7 +66029,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ups_server_packets" lineno="94304"> +<interface name="corenet_dontaudit_send_ups_server_packets" lineno="89738"> <summary> Do not audit attempts to send ups_server packets. </summary> @@ -65994,7 +66040,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ups_server_packets" lineno="94323"> +<interface name="corenet_receive_ups_server_packets" lineno="89757"> <summary> Receive ups_server packets. </summary> @@ -66005,7 +66051,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="94342"> +<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="89776"> <summary> Do not audit attempts to receive ups_server packets. </summary> @@ -66016,7 +66062,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ups_server_packets" lineno="94361"> +<interface name="corenet_sendrecv_ups_server_packets" lineno="89795"> <summary> Send and receive ups_server packets. </summary> @@ -66027,7 +66073,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="94377"> +<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="89811"> <summary> Do not audit attempts to send and receive ups_server packets. </summary> @@ -66038,7 +66084,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ups_server_packets" lineno="94392"> +<interface name="corenet_relabelto_ups_server_packets" lineno="89826"> <summary> Relabel packets to ups_server the packet type. </summary> @@ -66048,7 +66094,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="94414"> +<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="89848"> <summary> Send and receive TCP traffic on the utcpserver port. </summary> @@ -66059,7 +66105,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_utcpserver_port" lineno="94433"> +<interface name="corenet_udp_send_utcpserver_port" lineno="89863"> <summary> Send UDP traffic on the utcpserver port. </summary> @@ -66070,7 +66116,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="94452"> +<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="89878"> <summary> Do not audit attempts to send UDP traffic on the utcpserver port. </summary> @@ -66081,7 +66127,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_utcpserver_port" lineno="94471"> +<interface name="corenet_udp_receive_utcpserver_port" lineno="89893"> <summary> Receive UDP traffic on the utcpserver port. </summary> @@ -66092,7 +66138,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="94490"> +<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="89908"> <summary> Do not audit attempts to receive UDP traffic on the utcpserver port. </summary> @@ -66103,7 +66149,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="94509"> +<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="89923"> <summary> Send and receive UDP traffic on the utcpserver port. </summary> @@ -66114,7 +66160,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="94526"> +<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="89939"> <summary> Do not audit attempts to send and receive UDP traffic on the utcpserver port. @@ -66126,7 +66172,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_utcpserver_port" lineno="94542"> +<interface name="corenet_tcp_bind_utcpserver_port" lineno="89954"> <summary> Bind TCP sockets to the utcpserver port. </summary> @@ -66137,7 +66183,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_utcpserver_port" lineno="94562"> +<interface name="corenet_udp_bind_utcpserver_port" lineno="89974"> <summary> Bind UDP sockets to the utcpserver port. </summary> @@ -66148,7 +66194,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_utcpserver_port" lineno="94581"> +<interface name="corenet_tcp_connect_utcpserver_port" lineno="89993"> <summary> Make a TCP connection to the utcpserver port. </summary> @@ -66158,7 +66204,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_utcpserver_client_packets" lineno="94601"> +<interface name="corenet_send_utcpserver_client_packets" lineno="90013"> <summary> Send utcpserver_client packets. </summary> @@ -66169,7 +66215,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="94620"> +<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90032"> <summary> Do not audit attempts to send utcpserver_client packets. </summary> @@ -66180,7 +66226,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_utcpserver_client_packets" lineno="94639"> +<interface name="corenet_receive_utcpserver_client_packets" lineno="90051"> <summary> Receive utcpserver_client packets. </summary> @@ -66191,7 +66237,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="94658"> +<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90070"> <summary> Do not audit attempts to receive utcpserver_client packets. </summary> @@ -66202,7 +66248,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="94677"> +<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90089"> <summary> Send and receive utcpserver_client packets. </summary> @@ -66213,7 +66259,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="94693"> +<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90105"> <summary> Do not audit attempts to send and receive utcpserver_client packets. </summary> @@ -66224,7 +66270,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_utcpserver_client_packets" lineno="94708"> +<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90120"> <summary> Relabel packets to utcpserver_client the packet type. </summary> @@ -66234,7 +66280,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_utcpserver_server_packets" lineno="94728"> +<interface name="corenet_send_utcpserver_server_packets" lineno="90140"> <summary> Send utcpserver_server packets. </summary> @@ -66245,7 +66291,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="94747"> +<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90159"> <summary> Do not audit attempts to send utcpserver_server packets. </summary> @@ -66256,7 +66302,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_utcpserver_server_packets" lineno="94766"> +<interface name="corenet_receive_utcpserver_server_packets" lineno="90178"> <summary> Receive utcpserver_server packets. </summary> @@ -66267,7 +66313,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="94785"> +<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90197"> <summary> Do not audit attempts to receive utcpserver_server packets. </summary> @@ -66278,7 +66324,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="94804"> +<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90216"> <summary> Send and receive utcpserver_server packets. </summary> @@ -66289,7 +66335,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="94820"> +<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90232"> <summary> Do not audit attempts to send and receive utcpserver_server packets. </summary> @@ -66300,7 +66346,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_utcpserver_server_packets" lineno="94835"> +<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90247"> <summary> Relabel packets to utcpserver_server the packet type. </summary> @@ -66310,7 +66356,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="94857"> +<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90269"> <summary> Send and receive TCP traffic on the uucpd port. </summary> @@ -66321,7 +66367,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_uucpd_port" lineno="94876"> +<interface name="corenet_udp_send_uucpd_port" lineno="90284"> <summary> Send UDP traffic on the uucpd port. </summary> @@ -66332,7 +66378,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="94895"> +<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90299"> <summary> Do not audit attempts to send UDP traffic on the uucpd port. </summary> @@ -66343,7 +66389,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_uucpd_port" lineno="94914"> +<interface name="corenet_udp_receive_uucpd_port" lineno="90314"> <summary> Receive UDP traffic on the uucpd port. </summary> @@ -66354,7 +66400,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="94933"> +<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90329"> <summary> Do not audit attempts to receive UDP traffic on the uucpd port. </summary> @@ -66365,7 +66411,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_uucpd_port" lineno="94952"> +<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90344"> <summary> Send and receive UDP traffic on the uucpd port. </summary> @@ -66376,7 +66422,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="94969"> +<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90360"> <summary> Do not audit attempts to send and receive UDP traffic on the uucpd port. @@ -66388,7 +66434,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_uucpd_port" lineno="94985"> +<interface name="corenet_tcp_bind_uucpd_port" lineno="90375"> <summary> Bind TCP sockets to the uucpd port. </summary> @@ -66399,7 +66445,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_uucpd_port" lineno="95005"> +<interface name="corenet_udp_bind_uucpd_port" lineno="90395"> <summary> Bind UDP sockets to the uucpd port. </summary> @@ -66410,7 +66456,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_uucpd_port" lineno="95024"> +<interface name="corenet_tcp_connect_uucpd_port" lineno="90414"> <summary> Make a TCP connection to the uucpd port. </summary> @@ -66420,7 +66466,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_uucpd_client_packets" lineno="95044"> +<interface name="corenet_send_uucpd_client_packets" lineno="90434"> <summary> Send uucpd_client packets. </summary> @@ -66431,7 +66477,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="95063"> +<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90453"> <summary> Do not audit attempts to send uucpd_client packets. </summary> @@ -66442,7 +66488,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_uucpd_client_packets" lineno="95082"> +<interface name="corenet_receive_uucpd_client_packets" lineno="90472"> <summary> Receive uucpd_client packets. </summary> @@ -66453,7 +66499,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="95101"> +<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="90491"> <summary> Do not audit attempts to receive uucpd_client packets. </summary> @@ -66464,7 +66510,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_uucpd_client_packets" lineno="95120"> +<interface name="corenet_sendrecv_uucpd_client_packets" lineno="90510"> <summary> Send and receive uucpd_client packets. </summary> @@ -66475,7 +66521,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="95136"> +<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="90526"> <summary> Do not audit attempts to send and receive uucpd_client packets. </summary> @@ -66486,7 +66532,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_uucpd_client_packets" lineno="95151"> +<interface name="corenet_relabelto_uucpd_client_packets" lineno="90541"> <summary> Relabel packets to uucpd_client the packet type. </summary> @@ -66496,7 +66542,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_uucpd_server_packets" lineno="95171"> +<interface name="corenet_send_uucpd_server_packets" lineno="90561"> <summary> Send uucpd_server packets. </summary> @@ -66507,7 +66553,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="95190"> +<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="90580"> <summary> Do not audit attempts to send uucpd_server packets. </summary> @@ -66518,7 +66564,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_uucpd_server_packets" lineno="95209"> +<interface name="corenet_receive_uucpd_server_packets" lineno="90599"> <summary> Receive uucpd_server packets. </summary> @@ -66529,7 +66575,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="95228"> +<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="90618"> <summary> Do not audit attempts to receive uucpd_server packets. </summary> @@ -66540,7 +66586,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_uucpd_server_packets" lineno="95247"> +<interface name="corenet_sendrecv_uucpd_server_packets" lineno="90637"> <summary> Send and receive uucpd_server packets. </summary> @@ -66551,7 +66597,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="95263"> +<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="90653"> <summary> Do not audit attempts to send and receive uucpd_server packets. </summary> @@ -66562,7 +66608,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_uucpd_server_packets" lineno="95278"> +<interface name="corenet_relabelto_uucpd_server_packets" lineno="90668"> <summary> Relabel packets to uucpd_server the packet type. </summary> @@ -66572,7 +66618,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="95300"> +<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="90690"> <summary> Send and receive TCP traffic on the varnishd port. </summary> @@ -66583,7 +66629,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_varnishd_port" lineno="95319"> +<interface name="corenet_udp_send_varnishd_port" lineno="90705"> <summary> Send UDP traffic on the varnishd port. </summary> @@ -66594,7 +66640,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="95338"> +<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="90720"> <summary> Do not audit attempts to send UDP traffic on the varnishd port. </summary> @@ -66605,7 +66651,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_varnishd_port" lineno="95357"> +<interface name="corenet_udp_receive_varnishd_port" lineno="90735"> <summary> Receive UDP traffic on the varnishd port. </summary> @@ -66616,7 +66662,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="95376"> +<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="90750"> <summary> Do not audit attempts to receive UDP traffic on the varnishd port. </summary> @@ -66627,7 +66673,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_varnishd_port" lineno="95395"> +<interface name="corenet_udp_sendrecv_varnishd_port" lineno="90765"> <summary> Send and receive UDP traffic on the varnishd port. </summary> @@ -66638,7 +66684,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="95412"> +<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="90781"> <summary> Do not audit attempts to send and receive UDP traffic on the varnishd port. @@ -66650,7 +66696,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_varnishd_port" lineno="95428"> +<interface name="corenet_tcp_bind_varnishd_port" lineno="90796"> <summary> Bind TCP sockets to the varnishd port. </summary> @@ -66661,7 +66707,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_varnishd_port" lineno="95448"> +<interface name="corenet_udp_bind_varnishd_port" lineno="90816"> <summary> Bind UDP sockets to the varnishd port. </summary> @@ -66672,7 +66718,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_varnishd_port" lineno="95467"> +<interface name="corenet_tcp_connect_varnishd_port" lineno="90835"> <summary> Make a TCP connection to the varnishd port. </summary> @@ -66682,7 +66728,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_varnishd_client_packets" lineno="95487"> +<interface name="corenet_send_varnishd_client_packets" lineno="90855"> <summary> Send varnishd_client packets. </summary> @@ -66693,7 +66739,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="95506"> +<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="90874"> <summary> Do not audit attempts to send varnishd_client packets. </summary> @@ -66704,7 +66750,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_varnishd_client_packets" lineno="95525"> +<interface name="corenet_receive_varnishd_client_packets" lineno="90893"> <summary> Receive varnishd_client packets. </summary> @@ -66715,7 +66761,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="95544"> +<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="90912"> <summary> Do not audit attempts to receive varnishd_client packets. </summary> @@ -66726,7 +66772,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_varnishd_client_packets" lineno="95563"> +<interface name="corenet_sendrecv_varnishd_client_packets" lineno="90931"> <summary> Send and receive varnishd_client packets. </summary> @@ -66737,7 +66783,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="95579"> +<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="90947"> <summary> Do not audit attempts to send and receive varnishd_client packets. </summary> @@ -66748,7 +66794,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_varnishd_client_packets" lineno="95594"> +<interface name="corenet_relabelto_varnishd_client_packets" lineno="90962"> <summary> Relabel packets to varnishd_client the packet type. </summary> @@ -66758,7 +66804,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_varnishd_server_packets" lineno="95614"> +<interface name="corenet_send_varnishd_server_packets" lineno="90982"> <summary> Send varnishd_server packets. </summary> @@ -66769,7 +66815,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="95633"> +<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91001"> <summary> Do not audit attempts to send varnishd_server packets. </summary> @@ -66780,7 +66826,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_varnishd_server_packets" lineno="95652"> +<interface name="corenet_receive_varnishd_server_packets" lineno="91020"> <summary> Receive varnishd_server packets. </summary> @@ -66791,7 +66837,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="95671"> +<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91039"> <summary> Do not audit attempts to receive varnishd_server packets. </summary> @@ -66802,7 +66848,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_varnishd_server_packets" lineno="95690"> +<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91058"> <summary> Send and receive varnishd_server packets. </summary> @@ -66813,7 +66859,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="95706"> +<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91074"> <summary> Do not audit attempts to send and receive varnishd_server packets. </summary> @@ -66824,7 +66870,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_varnishd_server_packets" lineno="95721"> +<interface name="corenet_relabelto_varnishd_server_packets" lineno="91089"> <summary> Relabel packets to varnishd_server the packet type. </summary> @@ -66834,7 +66880,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_virt_port" lineno="95743"> +<interface name="corenet_tcp_sendrecv_virt_port" lineno="91111"> <summary> Send and receive TCP traffic on the virt port. </summary> @@ -66845,7 +66891,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_virt_port" lineno="95762"> +<interface name="corenet_udp_send_virt_port" lineno="91126"> <summary> Send UDP traffic on the virt port. </summary> @@ -66856,7 +66902,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_virt_port" lineno="95781"> +<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91141"> <summary> Do not audit attempts to send UDP traffic on the virt port. </summary> @@ -66867,7 +66913,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_virt_port" lineno="95800"> +<interface name="corenet_udp_receive_virt_port" lineno="91156"> <summary> Receive UDP traffic on the virt port. </summary> @@ -66878,7 +66924,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="95819"> +<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91171"> <summary> Do not audit attempts to receive UDP traffic on the virt port. </summary> @@ -66889,7 +66935,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_virt_port" lineno="95838"> +<interface name="corenet_udp_sendrecv_virt_port" lineno="91186"> <summary> Send and receive UDP traffic on the virt port. </summary> @@ -66900,7 +66946,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="95855"> +<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91202"> <summary> Do not audit attempts to send and receive UDP traffic on the virt port. @@ -66912,7 +66958,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_virt_port" lineno="95871"> +<interface name="corenet_tcp_bind_virt_port" lineno="91217"> <summary> Bind TCP sockets to the virt port. </summary> @@ -66923,7 +66969,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_virt_port" lineno="95891"> +<interface name="corenet_udp_bind_virt_port" lineno="91237"> <summary> Bind UDP sockets to the virt port. </summary> @@ -66934,7 +66980,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_virt_port" lineno="95910"> +<interface name="corenet_tcp_connect_virt_port" lineno="91256"> <summary> Make a TCP connection to the virt port. </summary> @@ -66944,7 +66990,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_client_packets" lineno="95930"> +<interface name="corenet_send_virt_client_packets" lineno="91276"> <summary> Send virt_client packets. </summary> @@ -66955,7 +67001,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_client_packets" lineno="95949"> +<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91295"> <summary> Do not audit attempts to send virt_client packets. </summary> @@ -66966,7 +67012,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_client_packets" lineno="95968"> +<interface name="corenet_receive_virt_client_packets" lineno="91314"> <summary> Receive virt_client packets. </summary> @@ -66977,7 +67023,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="95987"> +<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91333"> <summary> Do not audit attempts to receive virt_client packets. </summary> @@ -66988,7 +67034,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_client_packets" lineno="96006"> +<interface name="corenet_sendrecv_virt_client_packets" lineno="91352"> <summary> Send and receive virt_client packets. </summary> @@ -66999,7 +67045,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="96022"> +<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91368"> <summary> Do not audit attempts to send and receive virt_client packets. </summary> @@ -67010,7 +67056,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_client_packets" lineno="96037"> +<interface name="corenet_relabelto_virt_client_packets" lineno="91383"> <summary> Relabel packets to virt_client the packet type. </summary> @@ -67020,7 +67066,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_server_packets" lineno="96057"> +<interface name="corenet_send_virt_server_packets" lineno="91403"> <summary> Send virt_server packets. </summary> @@ -67031,7 +67077,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_server_packets" lineno="96076"> +<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91422"> <summary> Do not audit attempts to send virt_server packets. </summary> @@ -67042,7 +67088,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_server_packets" lineno="96095"> +<interface name="corenet_receive_virt_server_packets" lineno="91441"> <summary> Receive virt_server packets. </summary> @@ -67053,7 +67099,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="96114"> +<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="91460"> <summary> Do not audit attempts to receive virt_server packets. </summary> @@ -67064,7 +67110,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_server_packets" lineno="96133"> +<interface name="corenet_sendrecv_virt_server_packets" lineno="91479"> <summary> Send and receive virt_server packets. </summary> @@ -67075,7 +67121,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="96149"> +<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="91495"> <summary> Do not audit attempts to send and receive virt_server packets. </summary> @@ -67086,7 +67132,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_server_packets" lineno="96164"> +<interface name="corenet_relabelto_virt_server_packets" lineno="91510"> <summary> Relabel packets to virt_server the packet type. </summary> @@ -67096,7 +67142,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="96186"> +<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="91532"> <summary> Send and receive TCP traffic on the virtual_places port. </summary> @@ -67107,7 +67153,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_virtual_places_port" lineno="96205"> +<interface name="corenet_udp_send_virtual_places_port" lineno="91547"> <summary> Send UDP traffic on the virtual_places port. </summary> @@ -67118,7 +67164,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="96224"> +<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="91562"> <summary> Do not audit attempts to send UDP traffic on the virtual_places port. </summary> @@ -67129,7 +67175,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_virtual_places_port" lineno="96243"> +<interface name="corenet_udp_receive_virtual_places_port" lineno="91577"> <summary> Receive UDP traffic on the virtual_places port. </summary> @@ -67140,7 +67186,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="96262"> +<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="91592"> <summary> Do not audit attempts to receive UDP traffic on the virtual_places port. </summary> @@ -67151,7 +67197,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="96281"> +<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="91607"> <summary> Send and receive UDP traffic on the virtual_places port. </summary> @@ -67162,7 +67208,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="96298"> +<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="91623"> <summary> Do not audit attempts to send and receive UDP traffic on the virtual_places port. @@ -67174,7 +67220,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_virtual_places_port" lineno="96314"> +<interface name="corenet_tcp_bind_virtual_places_port" lineno="91638"> <summary> Bind TCP sockets to the virtual_places port. </summary> @@ -67185,7 +67231,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_virtual_places_port" lineno="96334"> +<interface name="corenet_udp_bind_virtual_places_port" lineno="91658"> <summary> Bind UDP sockets to the virtual_places port. </summary> @@ -67196,7 +67242,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_virtual_places_port" lineno="96353"> +<interface name="corenet_tcp_connect_virtual_places_port" lineno="91677"> <summary> Make a TCP connection to the virtual_places port. </summary> @@ -67206,7 +67252,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virtual_places_client_packets" lineno="96373"> +<interface name="corenet_send_virtual_places_client_packets" lineno="91697"> <summary> Send virtual_places_client packets. </summary> @@ -67217,7 +67263,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="96392"> +<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="91716"> <summary> Do not audit attempts to send virtual_places_client packets. </summary> @@ -67228,7 +67274,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virtual_places_client_packets" lineno="96411"> +<interface name="corenet_receive_virtual_places_client_packets" lineno="91735"> <summary> Receive virtual_places_client packets. </summary> @@ -67239,7 +67285,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="96430"> +<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="91754"> <summary> Do not audit attempts to receive virtual_places_client packets. </summary> @@ -67250,7 +67296,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="96449"> +<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="91773"> <summary> Send and receive virtual_places_client packets. </summary> @@ -67261,7 +67307,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="96465"> +<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="91789"> <summary> Do not audit attempts to send and receive virtual_places_client packets. </summary> @@ -67272,7 +67318,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virtual_places_client_packets" lineno="96480"> +<interface name="corenet_relabelto_virtual_places_client_packets" lineno="91804"> <summary> Relabel packets to virtual_places_client the packet type. </summary> @@ -67282,7 +67328,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virtual_places_server_packets" lineno="96500"> +<interface name="corenet_send_virtual_places_server_packets" lineno="91824"> <summary> Send virtual_places_server packets. </summary> @@ -67293,7 +67339,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="96519"> +<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="91843"> <summary> Do not audit attempts to send virtual_places_server packets. </summary> @@ -67304,7 +67350,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virtual_places_server_packets" lineno="96538"> +<interface name="corenet_receive_virtual_places_server_packets" lineno="91862"> <summary> Receive virtual_places_server packets. </summary> @@ -67315,7 +67361,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="96557"> +<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="91881"> <summary> Do not audit attempts to receive virtual_places_server packets. </summary> @@ -67326,7 +67372,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="96576"> +<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="91900"> <summary> Send and receive virtual_places_server packets. </summary> @@ -67337,7 +67383,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="96592"> +<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="91916"> <summary> Do not audit attempts to send and receive virtual_places_server packets. </summary> @@ -67348,7 +67394,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virtual_places_server_packets" lineno="96607"> +<interface name="corenet_relabelto_virtual_places_server_packets" lineno="91931"> <summary> Relabel packets to virtual_places_server the packet type. </summary> @@ -67358,7 +67404,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="96629"> +<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="91953"> <summary> Send and receive TCP traffic on the virt_migration port. </summary> @@ -67369,7 +67415,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_virt_migration_port" lineno="96648"> +<interface name="corenet_udp_send_virt_migration_port" lineno="91968"> <summary> Send UDP traffic on the virt_migration port. </summary> @@ -67380,7 +67426,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="96667"> +<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="91983"> <summary> Do not audit attempts to send UDP traffic on the virt_migration port. </summary> @@ -67391,7 +67437,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_virt_migration_port" lineno="96686"> +<interface name="corenet_udp_receive_virt_migration_port" lineno="91998"> <summary> Receive UDP traffic on the virt_migration port. </summary> @@ -67402,7 +67448,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="96705"> +<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92013"> <summary> Do not audit attempts to receive UDP traffic on the virt_migration port. </summary> @@ -67413,7 +67459,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="96724"> +<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92028"> <summary> Send and receive UDP traffic on the virt_migration port. </summary> @@ -67424,7 +67470,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="96741"> +<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92044"> <summary> Do not audit attempts to send and receive UDP traffic on the virt_migration port. @@ -67436,7 +67482,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_virt_migration_port" lineno="96757"> +<interface name="corenet_tcp_bind_virt_migration_port" lineno="92059"> <summary> Bind TCP sockets to the virt_migration port. </summary> @@ -67447,7 +67493,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_virt_migration_port" lineno="96777"> +<interface name="corenet_udp_bind_virt_migration_port" lineno="92079"> <summary> Bind UDP sockets to the virt_migration port. </summary> @@ -67458,7 +67504,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_virt_migration_port" lineno="96796"> +<interface name="corenet_tcp_connect_virt_migration_port" lineno="92098"> <summary> Make a TCP connection to the virt_migration port. </summary> @@ -67468,7 +67514,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_migration_client_packets" lineno="96816"> +<interface name="corenet_send_virt_migration_client_packets" lineno="92118"> <summary> Send virt_migration_client packets. </summary> @@ -67479,7 +67525,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="96835"> +<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92137"> <summary> Do not audit attempts to send virt_migration_client packets. </summary> @@ -67490,7 +67536,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_migration_client_packets" lineno="96854"> +<interface name="corenet_receive_virt_migration_client_packets" lineno="92156"> <summary> Receive virt_migration_client packets. </summary> @@ -67501,7 +67547,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="96873"> +<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92175"> <summary> Do not audit attempts to receive virt_migration_client packets. </summary> @@ -67512,7 +67558,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="96892"> +<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92194"> <summary> Send and receive virt_migration_client packets. </summary> @@ -67523,7 +67569,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="96908"> +<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92210"> <summary> Do not audit attempts to send and receive virt_migration_client packets. </summary> @@ -67534,7 +67580,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_migration_client_packets" lineno="96923"> +<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92225"> <summary> Relabel packets to virt_migration_client the packet type. </summary> @@ -67544,7 +67590,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_migration_server_packets" lineno="96943"> +<interface name="corenet_send_virt_migration_server_packets" lineno="92245"> <summary> Send virt_migration_server packets. </summary> @@ -67555,7 +67601,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="96962"> +<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92264"> <summary> Do not audit attempts to send virt_migration_server packets. </summary> @@ -67566,7 +67612,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_migration_server_packets" lineno="96981"> +<interface name="corenet_receive_virt_migration_server_packets" lineno="92283"> <summary> Receive virt_migration_server packets. </summary> @@ -67577,7 +67623,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="97000"> +<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92302"> <summary> Do not audit attempts to receive virt_migration_server packets. </summary> @@ -67588,7 +67634,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="97019"> +<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92321"> <summary> Send and receive virt_migration_server packets. </summary> @@ -67599,7 +67645,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="97035"> +<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92337"> <summary> Do not audit attempts to send and receive virt_migration_server packets. </summary> @@ -67610,7 +67656,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_migration_server_packets" lineno="97050"> +<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92352"> <summary> Relabel packets to virt_migration_server the packet type. </summary> @@ -67620,7 +67666,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_vnc_port" lineno="97072"> +<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92374"> <summary> Send and receive TCP traffic on the vnc port. </summary> @@ -67631,7 +67677,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_vnc_port" lineno="97091"> +<interface name="corenet_udp_send_vnc_port" lineno="92389"> <summary> Send UDP traffic on the vnc port. </summary> @@ -67642,7 +67688,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="97110"> +<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92404"> <summary> Do not audit attempts to send UDP traffic on the vnc port. </summary> @@ -67653,7 +67699,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_vnc_port" lineno="97129"> +<interface name="corenet_udp_receive_vnc_port" lineno="92419"> <summary> Receive UDP traffic on the vnc port. </summary> @@ -67664,7 +67710,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="97148"> +<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92434"> <summary> Do not audit attempts to receive UDP traffic on the vnc port. </summary> @@ -67675,7 +67721,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_vnc_port" lineno="97167"> +<interface name="corenet_udp_sendrecv_vnc_port" lineno="92449"> <summary> Send and receive UDP traffic on the vnc port. </summary> @@ -67686,7 +67732,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="97184"> +<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="92465"> <summary> Do not audit attempts to send and receive UDP traffic on the vnc port. @@ -67698,7 +67744,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_vnc_port" lineno="97200"> +<interface name="corenet_tcp_bind_vnc_port" lineno="92480"> <summary> Bind TCP sockets to the vnc port. </summary> @@ -67709,7 +67755,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_vnc_port" lineno="97220"> +<interface name="corenet_udp_bind_vnc_port" lineno="92500"> <summary> Bind UDP sockets to the vnc port. </summary> @@ -67720,7 +67766,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_vnc_port" lineno="97239"> +<interface name="corenet_tcp_connect_vnc_port" lineno="92519"> <summary> Make a TCP connection to the vnc port. </summary> @@ -67730,7 +67776,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_vnc_client_packets" lineno="97259"> +<interface name="corenet_send_vnc_client_packets" lineno="92539"> <summary> Send vnc_client packets. </summary> @@ -67741,7 +67787,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="97278"> +<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="92558"> <summary> Do not audit attempts to send vnc_client packets. </summary> @@ -67752,7 +67798,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_vnc_client_packets" lineno="97297"> +<interface name="corenet_receive_vnc_client_packets" lineno="92577"> <summary> Receive vnc_client packets. </summary> @@ -67763,7 +67809,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="97316"> +<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="92596"> <summary> Do not audit attempts to receive vnc_client packets. </summary> @@ -67774,7 +67820,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_vnc_client_packets" lineno="97335"> +<interface name="corenet_sendrecv_vnc_client_packets" lineno="92615"> <summary> Send and receive vnc_client packets. </summary> @@ -67785,7 +67831,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="97351"> +<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="92631"> <summary> Do not audit attempts to send and receive vnc_client packets. </summary> @@ -67796,7 +67842,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_vnc_client_packets" lineno="97366"> +<interface name="corenet_relabelto_vnc_client_packets" lineno="92646"> <summary> Relabel packets to vnc_client the packet type. </summary> @@ -67806,7 +67852,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_vnc_server_packets" lineno="97386"> +<interface name="corenet_send_vnc_server_packets" lineno="92666"> <summary> Send vnc_server packets. </summary> @@ -67817,7 +67863,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="97405"> +<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="92685"> <summary> Do not audit attempts to send vnc_server packets. </summary> @@ -67828,7 +67874,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_vnc_server_packets" lineno="97424"> +<interface name="corenet_receive_vnc_server_packets" lineno="92704"> <summary> Receive vnc_server packets. </summary> @@ -67839,7 +67885,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="97443"> +<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="92723"> <summary> Do not audit attempts to receive vnc_server packets. </summary> @@ -67850,7 +67896,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_vnc_server_packets" lineno="97462"> +<interface name="corenet_sendrecv_vnc_server_packets" lineno="92742"> <summary> Send and receive vnc_server packets. </summary> @@ -67861,7 +67907,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="97478"> +<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="92758"> <summary> Do not audit attempts to send and receive vnc_server packets. </summary> @@ -67872,7 +67918,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_vnc_server_packets" lineno="97493"> +<interface name="corenet_relabelto_vnc_server_packets" lineno="92773"> <summary> Relabel packets to vnc_server the packet type. </summary> @@ -67882,7 +67928,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_wccp_port" lineno="97515"> +<interface name="corenet_tcp_sendrecv_wccp_port" lineno="92795"> <summary> Send and receive TCP traffic on the wccp port. </summary> @@ -67893,7 +67939,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_wccp_port" lineno="97534"> +<interface name="corenet_udp_send_wccp_port" lineno="92810"> <summary> Send UDP traffic on the wccp port. </summary> @@ -67904,7 +67950,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="97553"> +<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="92825"> <summary> Do not audit attempts to send UDP traffic on the wccp port. </summary> @@ -67915,7 +67961,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_wccp_port" lineno="97572"> +<interface name="corenet_udp_receive_wccp_port" lineno="92840"> <summary> Receive UDP traffic on the wccp port. </summary> @@ -67926,7 +67972,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="97591"> +<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="92855"> <summary> Do not audit attempts to receive UDP traffic on the wccp port. </summary> @@ -67937,7 +67983,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_wccp_port" lineno="97610"> +<interface name="corenet_udp_sendrecv_wccp_port" lineno="92870"> <summary> Send and receive UDP traffic on the wccp port. </summary> @@ -67948,7 +67994,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="97627"> +<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="92886"> <summary> Do not audit attempts to send and receive UDP traffic on the wccp port. @@ -67960,7 +68006,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_wccp_port" lineno="97643"> +<interface name="corenet_tcp_bind_wccp_port" lineno="92901"> <summary> Bind TCP sockets to the wccp port. </summary> @@ -67971,7 +68017,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_wccp_port" lineno="97663"> +<interface name="corenet_udp_bind_wccp_port" lineno="92921"> <summary> Bind UDP sockets to the wccp port. </summary> @@ -67982,7 +68028,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_wccp_port" lineno="97682"> +<interface name="corenet_tcp_connect_wccp_port" lineno="92940"> <summary> Make a TCP connection to the wccp port. </summary> @@ -67992,7 +68038,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wccp_client_packets" lineno="97702"> +<interface name="corenet_send_wccp_client_packets" lineno="92960"> <summary> Send wccp_client packets. </summary> @@ -68003,7 +68049,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="97721"> +<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="92979"> <summary> Do not audit attempts to send wccp_client packets. </summary> @@ -68014,7 +68060,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wccp_client_packets" lineno="97740"> +<interface name="corenet_receive_wccp_client_packets" lineno="92998"> <summary> Receive wccp_client packets. </summary> @@ -68025,7 +68071,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="97759"> +<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93017"> <summary> Do not audit attempts to receive wccp_client packets. </summary> @@ -68036,7 +68082,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wccp_client_packets" lineno="97778"> +<interface name="corenet_sendrecv_wccp_client_packets" lineno="93036"> <summary> Send and receive wccp_client packets. </summary> @@ -68047,7 +68093,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="97794"> +<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93052"> <summary> Do not audit attempts to send and receive wccp_client packets. </summary> @@ -68058,7 +68104,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wccp_client_packets" lineno="97809"> +<interface name="corenet_relabelto_wccp_client_packets" lineno="93067"> <summary> Relabel packets to wccp_client the packet type. </summary> @@ -68068,7 +68114,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wccp_server_packets" lineno="97829"> +<interface name="corenet_send_wccp_server_packets" lineno="93087"> <summary> Send wccp_server packets. </summary> @@ -68079,7 +68125,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="97848"> +<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93106"> <summary> Do not audit attempts to send wccp_server packets. </summary> @@ -68090,7 +68136,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wccp_server_packets" lineno="97867"> +<interface name="corenet_receive_wccp_server_packets" lineno="93125"> <summary> Receive wccp_server packets. </summary> @@ -68101,7 +68147,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="97886"> +<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93144"> <summary> Do not audit attempts to receive wccp_server packets. </summary> @@ -68112,7 +68158,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wccp_server_packets" lineno="97905"> +<interface name="corenet_sendrecv_wccp_server_packets" lineno="93163"> <summary> Send and receive wccp_server packets. </summary> @@ -68123,7 +68169,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="97921"> +<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93179"> <summary> Do not audit attempts to send and receive wccp_server packets. </summary> @@ -68134,7 +68180,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wccp_server_packets" lineno="97936"> +<interface name="corenet_relabelto_wccp_server_packets" lineno="93194"> <summary> Relabel packets to wccp_server the packet type. </summary> @@ -68144,7 +68190,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_websm_port" lineno="97958"> +<interface name="corenet_tcp_sendrecv_websm_port" lineno="93216"> <summary> Send and receive TCP traffic on the websm port. </summary> @@ -68155,7 +68201,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_websm_port" lineno="97977"> +<interface name="corenet_udp_send_websm_port" lineno="93231"> <summary> Send UDP traffic on the websm port. </summary> @@ -68166,7 +68212,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_websm_port" lineno="97996"> +<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93246"> <summary> Do not audit attempts to send UDP traffic on the websm port. </summary> @@ -68177,7 +68223,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_websm_port" lineno="98015"> +<interface name="corenet_udp_receive_websm_port" lineno="93261"> <summary> Receive UDP traffic on the websm port. </summary> @@ -68188,7 +68234,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="98034"> +<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93276"> <summary> Do not audit attempts to receive UDP traffic on the websm port. </summary> @@ -68199,7 +68245,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_websm_port" lineno="98053"> +<interface name="corenet_udp_sendrecv_websm_port" lineno="93291"> <summary> Send and receive UDP traffic on the websm port. </summary> @@ -68210,7 +68256,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="98070"> +<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93307"> <summary> Do not audit attempts to send and receive UDP traffic on the websm port. @@ -68222,7 +68268,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_websm_port" lineno="98086"> +<interface name="corenet_tcp_bind_websm_port" lineno="93322"> <summary> Bind TCP sockets to the websm port. </summary> @@ -68233,7 +68279,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_websm_port" lineno="98106"> +<interface name="corenet_udp_bind_websm_port" lineno="93342"> <summary> Bind UDP sockets to the websm port. </summary> @@ -68244,7 +68290,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_websm_port" lineno="98125"> +<interface name="corenet_tcp_connect_websm_port" lineno="93361"> <summary> Make a TCP connection to the websm port. </summary> @@ -68254,7 +68300,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_websm_client_packets" lineno="98145"> +<interface name="corenet_send_websm_client_packets" lineno="93381"> <summary> Send websm_client packets. </summary> @@ -68265,7 +68311,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_websm_client_packets" lineno="98164"> +<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93400"> <summary> Do not audit attempts to send websm_client packets. </summary> @@ -68276,7 +68322,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_websm_client_packets" lineno="98183"> +<interface name="corenet_receive_websm_client_packets" lineno="93419"> <summary> Receive websm_client packets. </summary> @@ -68287,7 +68333,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="98202"> +<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93438"> <summary> Do not audit attempts to receive websm_client packets. </summary> @@ -68298,7 +68344,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_websm_client_packets" lineno="98221"> +<interface name="corenet_sendrecv_websm_client_packets" lineno="93457"> <summary> Send and receive websm_client packets. </summary> @@ -68309,7 +68355,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="98237"> +<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="93473"> <summary> Do not audit attempts to send and receive websm_client packets. </summary> @@ -68320,7 +68366,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_websm_client_packets" lineno="98252"> +<interface name="corenet_relabelto_websm_client_packets" lineno="93488"> <summary> Relabel packets to websm_client the packet type. </summary> @@ -68330,7 +68376,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_websm_server_packets" lineno="98272"> +<interface name="corenet_send_websm_server_packets" lineno="93508"> <summary> Send websm_server packets. </summary> @@ -68341,7 +68387,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_websm_server_packets" lineno="98291"> +<interface name="corenet_dontaudit_send_websm_server_packets" lineno="93527"> <summary> Do not audit attempts to send websm_server packets. </summary> @@ -68352,7 +68398,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_websm_server_packets" lineno="98310"> +<interface name="corenet_receive_websm_server_packets" lineno="93546"> <summary> Receive websm_server packets. </summary> @@ -68363,7 +68409,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="98329"> +<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="93565"> <summary> Do not audit attempts to receive websm_server packets. </summary> @@ -68374,7 +68420,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_websm_server_packets" lineno="98348"> +<interface name="corenet_sendrecv_websm_server_packets" lineno="93584"> <summary> Send and receive websm_server packets. </summary> @@ -68385,7 +68431,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="98364"> +<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="93600"> <summary> Do not audit attempts to send and receive websm_server packets. </summary> @@ -68396,7 +68442,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_websm_server_packets" lineno="98379"> +<interface name="corenet_relabelto_websm_server_packets" lineno="93615"> <summary> Relabel packets to websm_server the packet type. </summary> @@ -68406,7 +68452,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_whois_port" lineno="98401"> +<interface name="corenet_tcp_sendrecv_whois_port" lineno="93637"> <summary> Send and receive TCP traffic on the whois port. </summary> @@ -68417,7 +68463,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_whois_port" lineno="98420"> +<interface name="corenet_udp_send_whois_port" lineno="93652"> <summary> Send UDP traffic on the whois port. </summary> @@ -68428,7 +68474,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_whois_port" lineno="98439"> +<interface name="corenet_dontaudit_udp_send_whois_port" lineno="93667"> <summary> Do not audit attempts to send UDP traffic on the whois port. </summary> @@ -68439,7 +68485,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_whois_port" lineno="98458"> +<interface name="corenet_udp_receive_whois_port" lineno="93682"> <summary> Receive UDP traffic on the whois port. </summary> @@ -68450,7 +68496,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="98477"> +<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="93697"> <summary> Do not audit attempts to receive UDP traffic on the whois port. </summary> @@ -68461,7 +68507,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_whois_port" lineno="98496"> +<interface name="corenet_udp_sendrecv_whois_port" lineno="93712"> <summary> Send and receive UDP traffic on the whois port. </summary> @@ -68472,7 +68518,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="98513"> +<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="93728"> <summary> Do not audit attempts to send and receive UDP traffic on the whois port. @@ -68484,7 +68530,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_whois_port" lineno="98529"> +<interface name="corenet_tcp_bind_whois_port" lineno="93743"> <summary> Bind TCP sockets to the whois port. </summary> @@ -68495,7 +68541,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_whois_port" lineno="98549"> +<interface name="corenet_udp_bind_whois_port" lineno="93763"> <summary> Bind UDP sockets to the whois port. </summary> @@ -68506,7 +68552,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_whois_port" lineno="98568"> +<interface name="corenet_tcp_connect_whois_port" lineno="93782"> <summary> Make a TCP connection to the whois port. </summary> @@ -68516,7 +68562,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_whois_client_packets" lineno="98588"> +<interface name="corenet_send_whois_client_packets" lineno="93802"> <summary> Send whois_client packets. </summary> @@ -68527,7 +68573,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_whois_client_packets" lineno="98607"> +<interface name="corenet_dontaudit_send_whois_client_packets" lineno="93821"> <summary> Do not audit attempts to send whois_client packets. </summary> @@ -68538,7 +68584,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_whois_client_packets" lineno="98626"> +<interface name="corenet_receive_whois_client_packets" lineno="93840"> <summary> Receive whois_client packets. </summary> @@ -68549,7 +68595,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="98645"> +<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="93859"> <summary> Do not audit attempts to receive whois_client packets. </summary> @@ -68560,7 +68606,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_whois_client_packets" lineno="98664"> +<interface name="corenet_sendrecv_whois_client_packets" lineno="93878"> <summary> Send and receive whois_client packets. </summary> @@ -68571,7 +68617,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="98680"> +<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="93894"> <summary> Do not audit attempts to send and receive whois_client packets. </summary> @@ -68582,7 +68628,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_whois_client_packets" lineno="98695"> +<interface name="corenet_relabelto_whois_client_packets" lineno="93909"> <summary> Relabel packets to whois_client the packet type. </summary> @@ -68592,7 +68638,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_whois_server_packets" lineno="98715"> +<interface name="corenet_send_whois_server_packets" lineno="93929"> <summary> Send whois_server packets. </summary> @@ -68603,7 +68649,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_whois_server_packets" lineno="98734"> +<interface name="corenet_dontaudit_send_whois_server_packets" lineno="93948"> <summary> Do not audit attempts to send whois_server packets. </summary> @@ -68614,7 +68660,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_whois_server_packets" lineno="98753"> +<interface name="corenet_receive_whois_server_packets" lineno="93967"> <summary> Receive whois_server packets. </summary> @@ -68625,7 +68671,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="98772"> +<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="93986"> <summary> Do not audit attempts to receive whois_server packets. </summary> @@ -68636,7 +68682,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_whois_server_packets" lineno="98791"> +<interface name="corenet_sendrecv_whois_server_packets" lineno="94005"> <summary> Send and receive whois_server packets. </summary> @@ -68647,7 +68693,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="98807"> +<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94021"> <summary> Do not audit attempts to send and receive whois_server packets. </summary> @@ -68658,7 +68704,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_whois_server_packets" lineno="98822"> +<interface name="corenet_relabelto_whois_server_packets" lineno="94036"> <summary> Relabel packets to whois_server the packet type. </summary> @@ -68668,7 +68714,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="98844"> +<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94058"> <summary> Send and receive TCP traffic on the winshadow port. </summary> @@ -68679,7 +68725,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_winshadow_port" lineno="98863"> +<interface name="corenet_udp_send_winshadow_port" lineno="94073"> <summary> Send UDP traffic on the winshadow port. </summary> @@ -68690,7 +68736,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="98882"> +<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94088"> <summary> Do not audit attempts to send UDP traffic on the winshadow port. </summary> @@ -68701,7 +68747,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_winshadow_port" lineno="98901"> +<interface name="corenet_udp_receive_winshadow_port" lineno="94103"> <summary> Receive UDP traffic on the winshadow port. </summary> @@ -68712,7 +68758,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="98920"> +<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94118"> <summary> Do not audit attempts to receive UDP traffic on the winshadow port. </summary> @@ -68723,7 +68769,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_winshadow_port" lineno="98939"> +<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94133"> <summary> Send and receive UDP traffic on the winshadow port. </summary> @@ -68734,7 +68780,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="98956"> +<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94149"> <summary> Do not audit attempts to send and receive UDP traffic on the winshadow port. @@ -68746,7 +68792,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_winshadow_port" lineno="98972"> +<interface name="corenet_tcp_bind_winshadow_port" lineno="94164"> <summary> Bind TCP sockets to the winshadow port. </summary> @@ -68757,7 +68803,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_winshadow_port" lineno="98992"> +<interface name="corenet_udp_bind_winshadow_port" lineno="94184"> <summary> Bind UDP sockets to the winshadow port. </summary> @@ -68768,7 +68814,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_winshadow_port" lineno="99011"> +<interface name="corenet_tcp_connect_winshadow_port" lineno="94203"> <summary> Make a TCP connection to the winshadow port. </summary> @@ -68778,7 +68824,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_winshadow_client_packets" lineno="99031"> +<interface name="corenet_send_winshadow_client_packets" lineno="94223"> <summary> Send winshadow_client packets. </summary> @@ -68789,7 +68835,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="99050"> +<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94242"> <summary> Do not audit attempts to send winshadow_client packets. </summary> @@ -68800,7 +68846,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_winshadow_client_packets" lineno="99069"> +<interface name="corenet_receive_winshadow_client_packets" lineno="94261"> <summary> Receive winshadow_client packets. </summary> @@ -68811,7 +68857,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="99088"> +<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94280"> <summary> Do not audit attempts to receive winshadow_client packets. </summary> @@ -68822,7 +68868,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_winshadow_client_packets" lineno="99107"> +<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94299"> <summary> Send and receive winshadow_client packets. </summary> @@ -68833,7 +68879,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="99123"> +<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94315"> <summary> Do not audit attempts to send and receive winshadow_client packets. </summary> @@ -68844,7 +68890,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_winshadow_client_packets" lineno="99138"> +<interface name="corenet_relabelto_winshadow_client_packets" lineno="94330"> <summary> Relabel packets to winshadow_client the packet type. </summary> @@ -68854,7 +68900,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_winshadow_server_packets" lineno="99158"> +<interface name="corenet_send_winshadow_server_packets" lineno="94350"> <summary> Send winshadow_server packets. </summary> @@ -68865,7 +68911,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="99177"> +<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94369"> <summary> Do not audit attempts to send winshadow_server packets. </summary> @@ -68876,7 +68922,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_winshadow_server_packets" lineno="99196"> +<interface name="corenet_receive_winshadow_server_packets" lineno="94388"> <summary> Receive winshadow_server packets. </summary> @@ -68887,7 +68933,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="99215"> +<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94407"> <summary> Do not audit attempts to receive winshadow_server packets. </summary> @@ -68898,7 +68944,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_winshadow_server_packets" lineno="99234"> +<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94426"> <summary> Send and receive winshadow_server packets. </summary> @@ -68909,7 +68955,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="99250"> +<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94442"> <summary> Do not audit attempts to send and receive winshadow_server packets. </summary> @@ -68920,7 +68966,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_winshadow_server_packets" lineno="99265"> +<interface name="corenet_relabelto_winshadow_server_packets" lineno="94457"> <summary> Relabel packets to winshadow_server the packet type. </summary> @@ -68930,7 +68976,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="99287"> +<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="94479"> <summary> Send and receive TCP traffic on the wsdapi port. </summary> @@ -68941,7 +68987,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_wsdapi_port" lineno="99306"> +<interface name="corenet_udp_send_wsdapi_port" lineno="94494"> <summary> Send UDP traffic on the wsdapi port. </summary> @@ -68952,7 +68998,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="99325"> +<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="94509"> <summary> Do not audit attempts to send UDP traffic on the wsdapi port. </summary> @@ -68963,7 +69009,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_wsdapi_port" lineno="99344"> +<interface name="corenet_udp_receive_wsdapi_port" lineno="94524"> <summary> Receive UDP traffic on the wsdapi port. </summary> @@ -68974,7 +69020,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="99363"> +<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="94539"> <summary> Do not audit attempts to receive UDP traffic on the wsdapi port. </summary> @@ -68985,7 +69031,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="99382"> +<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="94554"> <summary> Send and receive UDP traffic on the wsdapi port. </summary> @@ -68996,7 +69042,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="99399"> +<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="94570"> <summary> Do not audit attempts to send and receive UDP traffic on the wsdapi port. @@ -69008,7 +69054,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_wsdapi_port" lineno="99415"> +<interface name="corenet_tcp_bind_wsdapi_port" lineno="94585"> <summary> Bind TCP sockets to the wsdapi port. </summary> @@ -69019,7 +69065,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_wsdapi_port" lineno="99435"> +<interface name="corenet_udp_bind_wsdapi_port" lineno="94605"> <summary> Bind UDP sockets to the wsdapi port. </summary> @@ -69030,7 +69076,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_wsdapi_port" lineno="99454"> +<interface name="corenet_tcp_connect_wsdapi_port" lineno="94624"> <summary> Make a TCP connection to the wsdapi port. </summary> @@ -69040,7 +69086,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsdapi_client_packets" lineno="99474"> +<interface name="corenet_send_wsdapi_client_packets" lineno="94644"> <summary> Send wsdapi_client packets. </summary> @@ -69051,7 +69097,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="99493"> +<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="94663"> <summary> Do not audit attempts to send wsdapi_client packets. </summary> @@ -69062,7 +69108,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsdapi_client_packets" lineno="99512"> +<interface name="corenet_receive_wsdapi_client_packets" lineno="94682"> <summary> Receive wsdapi_client packets. </summary> @@ -69073,7 +69119,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="99531"> +<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="94701"> <summary> Do not audit attempts to receive wsdapi_client packets. </summary> @@ -69084,7 +69130,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="99550"> +<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="94720"> <summary> Send and receive wsdapi_client packets. </summary> @@ -69095,7 +69141,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="99566"> +<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="94736"> <summary> Do not audit attempts to send and receive wsdapi_client packets. </summary> @@ -69106,7 +69152,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsdapi_client_packets" lineno="99581"> +<interface name="corenet_relabelto_wsdapi_client_packets" lineno="94751"> <summary> Relabel packets to wsdapi_client the packet type. </summary> @@ -69116,7 +69162,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsdapi_server_packets" lineno="99601"> +<interface name="corenet_send_wsdapi_server_packets" lineno="94771"> <summary> Send wsdapi_server packets. </summary> @@ -69127,7 +69173,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="99620"> +<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="94790"> <summary> Do not audit attempts to send wsdapi_server packets. </summary> @@ -69138,7 +69184,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsdapi_server_packets" lineno="99639"> +<interface name="corenet_receive_wsdapi_server_packets" lineno="94809"> <summary> Receive wsdapi_server packets. </summary> @@ -69149,7 +69195,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="99658"> +<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="94828"> <summary> Do not audit attempts to receive wsdapi_server packets. </summary> @@ -69160,7 +69206,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="99677"> +<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="94847"> <summary> Send and receive wsdapi_server packets. </summary> @@ -69171,7 +69217,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="99693"> +<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="94863"> <summary> Do not audit attempts to send and receive wsdapi_server packets. </summary> @@ -69182,7 +69228,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsdapi_server_packets" lineno="99708"> +<interface name="corenet_relabelto_wsdapi_server_packets" lineno="94878"> <summary> Relabel packets to wsdapi_server the packet type. </summary> @@ -69192,7 +69238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="99730"> +<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="94900"> <summary> Send and receive TCP traffic on the wsicopy port. </summary> @@ -69203,7 +69249,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_wsicopy_port" lineno="99749"> +<interface name="corenet_udp_send_wsicopy_port" lineno="94915"> <summary> Send UDP traffic on the wsicopy port. </summary> @@ -69214,7 +69260,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="99768"> +<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="94930"> <summary> Do not audit attempts to send UDP traffic on the wsicopy port. </summary> @@ -69225,7 +69271,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_wsicopy_port" lineno="99787"> +<interface name="corenet_udp_receive_wsicopy_port" lineno="94945"> <summary> Receive UDP traffic on the wsicopy port. </summary> @@ -69236,7 +69282,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="99806"> +<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="94960"> <summary> Do not audit attempts to receive UDP traffic on the wsicopy port. </summary> @@ -69247,7 +69293,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="99825"> +<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="94975"> <summary> Send and receive UDP traffic on the wsicopy port. </summary> @@ -69258,7 +69304,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="99842"> +<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="94991"> <summary> Do not audit attempts to send and receive UDP traffic on the wsicopy port. @@ -69270,7 +69316,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_wsicopy_port" lineno="99858"> +<interface name="corenet_tcp_bind_wsicopy_port" lineno="95006"> <summary> Bind TCP sockets to the wsicopy port. </summary> @@ -69281,7 +69327,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_wsicopy_port" lineno="99878"> +<interface name="corenet_udp_bind_wsicopy_port" lineno="95026"> <summary> Bind UDP sockets to the wsicopy port. </summary> @@ -69292,7 +69338,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_wsicopy_port" lineno="99897"> +<interface name="corenet_tcp_connect_wsicopy_port" lineno="95045"> <summary> Make a TCP connection to the wsicopy port. </summary> @@ -69302,7 +69348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsicopy_client_packets" lineno="99917"> +<interface name="corenet_send_wsicopy_client_packets" lineno="95065"> <summary> Send wsicopy_client packets. </summary> @@ -69313,7 +69359,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="99936"> +<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95084"> <summary> Do not audit attempts to send wsicopy_client packets. </summary> @@ -69324,7 +69370,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsicopy_client_packets" lineno="99955"> +<interface name="corenet_receive_wsicopy_client_packets" lineno="95103"> <summary> Receive wsicopy_client packets. </summary> @@ -69335,7 +69381,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="99974"> +<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95122"> <summary> Do not audit attempts to receive wsicopy_client packets. </summary> @@ -69346,7 +69392,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="99993"> +<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95141"> <summary> Send and receive wsicopy_client packets. </summary> @@ -69357,7 +69403,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="100009"> +<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95157"> <summary> Do not audit attempts to send and receive wsicopy_client packets. </summary> @@ -69368,7 +69414,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsicopy_client_packets" lineno="100024"> +<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95172"> <summary> Relabel packets to wsicopy_client the packet type. </summary> @@ -69378,7 +69424,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsicopy_server_packets" lineno="100044"> +<interface name="corenet_send_wsicopy_server_packets" lineno="95192"> <summary> Send wsicopy_server packets. </summary> @@ -69389,7 +69435,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="100063"> +<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95211"> <summary> Do not audit attempts to send wsicopy_server packets. </summary> @@ -69400,7 +69446,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsicopy_server_packets" lineno="100082"> +<interface name="corenet_receive_wsicopy_server_packets" lineno="95230"> <summary> Receive wsicopy_server packets. </summary> @@ -69411,7 +69457,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="100101"> +<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95249"> <summary> Do not audit attempts to receive wsicopy_server packets. </summary> @@ -69422,7 +69468,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="100120"> +<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95268"> <summary> Send and receive wsicopy_server packets. </summary> @@ -69433,7 +69479,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="100136"> +<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95284"> <summary> Do not audit attempts to send and receive wsicopy_server packets. </summary> @@ -69444,7 +69490,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsicopy_server_packets" lineno="100151"> +<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95299"> <summary> Relabel packets to wsicopy_server the packet type. </summary> @@ -69454,7 +69500,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="100173"> +<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95321"> <summary> Send and receive TCP traffic on the xdmcp port. </summary> @@ -69465,7 +69511,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_xdmcp_port" lineno="100192"> +<interface name="corenet_udp_send_xdmcp_port" lineno="95336"> <summary> Send UDP traffic on the xdmcp port. </summary> @@ -69476,7 +69522,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="100211"> +<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95351"> <summary> Do not audit attempts to send UDP traffic on the xdmcp port. </summary> @@ -69487,7 +69533,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_xdmcp_port" lineno="100230"> +<interface name="corenet_udp_receive_xdmcp_port" lineno="95366"> <summary> Receive UDP traffic on the xdmcp port. </summary> @@ -69498,7 +69544,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="100249"> +<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95381"> <summary> Do not audit attempts to receive UDP traffic on the xdmcp port. </summary> @@ -69509,7 +69555,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="100268"> +<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95396"> <summary> Send and receive UDP traffic on the xdmcp port. </summary> @@ -69520,7 +69566,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="100285"> +<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95412"> <summary> Do not audit attempts to send and receive UDP traffic on the xdmcp port. @@ -69532,7 +69578,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_xdmcp_port" lineno="100301"> +<interface name="corenet_tcp_bind_xdmcp_port" lineno="95427"> <summary> Bind TCP sockets to the xdmcp port. </summary> @@ -69543,7 +69589,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xdmcp_port" lineno="100321"> +<interface name="corenet_udp_bind_xdmcp_port" lineno="95447"> <summary> Bind UDP sockets to the xdmcp port. </summary> @@ -69554,7 +69600,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xdmcp_port" lineno="100340"> +<interface name="corenet_tcp_connect_xdmcp_port" lineno="95466"> <summary> Make a TCP connection to the xdmcp port. </summary> @@ -69564,7 +69610,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xdmcp_client_packets" lineno="100360"> +<interface name="corenet_send_xdmcp_client_packets" lineno="95486"> <summary> Send xdmcp_client packets. </summary> @@ -69575,7 +69621,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="100379"> +<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="95505"> <summary> Do not audit attempts to send xdmcp_client packets. </summary> @@ -69586,7 +69632,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xdmcp_client_packets" lineno="100398"> +<interface name="corenet_receive_xdmcp_client_packets" lineno="95524"> <summary> Receive xdmcp_client packets. </summary> @@ -69597,7 +69643,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="100417"> +<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="95543"> <summary> Do not audit attempts to receive xdmcp_client packets. </summary> @@ -69608,7 +69654,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="100436"> +<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="95562"> <summary> Send and receive xdmcp_client packets. </summary> @@ -69619,7 +69665,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="100452"> +<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="95578"> <summary> Do not audit attempts to send and receive xdmcp_client packets. </summary> @@ -69630,7 +69676,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xdmcp_client_packets" lineno="100467"> +<interface name="corenet_relabelto_xdmcp_client_packets" lineno="95593"> <summary> Relabel packets to xdmcp_client the packet type. </summary> @@ -69640,7 +69686,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xdmcp_server_packets" lineno="100487"> +<interface name="corenet_send_xdmcp_server_packets" lineno="95613"> <summary> Send xdmcp_server packets. </summary> @@ -69651,7 +69697,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="100506"> +<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="95632"> <summary> Do not audit attempts to send xdmcp_server packets. </summary> @@ -69662,7 +69708,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xdmcp_server_packets" lineno="100525"> +<interface name="corenet_receive_xdmcp_server_packets" lineno="95651"> <summary> Receive xdmcp_server packets. </summary> @@ -69673,7 +69719,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="100544"> +<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="95670"> <summary> Do not audit attempts to receive xdmcp_server packets. </summary> @@ -69684,7 +69730,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="100563"> +<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="95689"> <summary> Send and receive xdmcp_server packets. </summary> @@ -69695,7 +69741,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="100579"> +<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="95705"> <summary> Do not audit attempts to send and receive xdmcp_server packets. </summary> @@ -69706,7 +69752,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xdmcp_server_packets" lineno="100594"> +<interface name="corenet_relabelto_xdmcp_server_packets" lineno="95720"> <summary> Relabel packets to xdmcp_server the packet type. </summary> @@ -69716,7 +69762,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xen_port" lineno="100616"> +<interface name="corenet_tcp_sendrecv_xen_port" lineno="95742"> <summary> Send and receive TCP traffic on the xen port. </summary> @@ -69727,7 +69773,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_xen_port" lineno="100635"> +<interface name="corenet_udp_send_xen_port" lineno="95757"> <summary> Send UDP traffic on the xen port. </summary> @@ -69738,7 +69784,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_xen_port" lineno="100654"> +<interface name="corenet_dontaudit_udp_send_xen_port" lineno="95772"> <summary> Do not audit attempts to send UDP traffic on the xen port. </summary> @@ -69749,7 +69795,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_xen_port" lineno="100673"> +<interface name="corenet_udp_receive_xen_port" lineno="95787"> <summary> Receive UDP traffic on the xen port. </summary> @@ -69760,7 +69806,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="100692"> +<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="95802"> <summary> Do not audit attempts to receive UDP traffic on the xen port. </summary> @@ -69771,7 +69817,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_xen_port" lineno="100711"> +<interface name="corenet_udp_sendrecv_xen_port" lineno="95817"> <summary> Send and receive UDP traffic on the xen port. </summary> @@ -69782,7 +69828,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="100728"> +<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="95833"> <summary> Do not audit attempts to send and receive UDP traffic on the xen port. @@ -69794,7 +69840,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_xen_port" lineno="100744"> +<interface name="corenet_tcp_bind_xen_port" lineno="95848"> <summary> Bind TCP sockets to the xen port. </summary> @@ -69805,7 +69851,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xen_port" lineno="100764"> +<interface name="corenet_udp_bind_xen_port" lineno="95868"> <summary> Bind UDP sockets to the xen port. </summary> @@ -69816,7 +69862,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xen_port" lineno="100783"> +<interface name="corenet_tcp_connect_xen_port" lineno="95887"> <summary> Make a TCP connection to the xen port. </summary> @@ -69826,7 +69872,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xen_client_packets" lineno="100803"> +<interface name="corenet_send_xen_client_packets" lineno="95907"> <summary> Send xen_client packets. </summary> @@ -69837,7 +69883,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xen_client_packets" lineno="100822"> +<interface name="corenet_dontaudit_send_xen_client_packets" lineno="95926"> <summary> Do not audit attempts to send xen_client packets. </summary> @@ -69848,7 +69894,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xen_client_packets" lineno="100841"> +<interface name="corenet_receive_xen_client_packets" lineno="95945"> <summary> Receive xen_client packets. </summary> @@ -69859,7 +69905,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="100860"> +<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="95964"> <summary> Do not audit attempts to receive xen_client packets. </summary> @@ -69870,7 +69916,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xen_client_packets" lineno="100879"> +<interface name="corenet_sendrecv_xen_client_packets" lineno="95983"> <summary> Send and receive xen_client packets. </summary> @@ -69881,7 +69927,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="100895"> +<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="95999"> <summary> Do not audit attempts to send and receive xen_client packets. </summary> @@ -69892,7 +69938,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xen_client_packets" lineno="100910"> +<interface name="corenet_relabelto_xen_client_packets" lineno="96014"> <summary> Relabel packets to xen_client the packet type. </summary> @@ -69902,7 +69948,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xen_server_packets" lineno="100930"> +<interface name="corenet_send_xen_server_packets" lineno="96034"> <summary> Send xen_server packets. </summary> @@ -69913,7 +69959,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xen_server_packets" lineno="100949"> +<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96053"> <summary> Do not audit attempts to send xen_server packets. </summary> @@ -69924,7 +69970,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xen_server_packets" lineno="100968"> +<interface name="corenet_receive_xen_server_packets" lineno="96072"> <summary> Receive xen_server packets. </summary> @@ -69935,7 +69981,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="100987"> +<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96091"> <summary> Do not audit attempts to receive xen_server packets. </summary> @@ -69946,7 +69992,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xen_server_packets" lineno="101006"> +<interface name="corenet_sendrecv_xen_server_packets" lineno="96110"> <summary> Send and receive xen_server packets. </summary> @@ -69957,7 +70003,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="101022"> +<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96126"> <summary> Do not audit attempts to send and receive xen_server packets. </summary> @@ -69968,7 +70014,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xen_server_packets" lineno="101037"> +<interface name="corenet_relabelto_xen_server_packets" lineno="96141"> <summary> Relabel packets to xen_server the packet type. </summary> @@ -69978,7 +70024,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xfs_port" lineno="101059"> +<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96163"> <summary> Send and receive TCP traffic on the xfs port. </summary> @@ -69989,7 +70035,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_xfs_port" lineno="101078"> +<interface name="corenet_udp_send_xfs_port" lineno="96178"> <summary> Send UDP traffic on the xfs port. </summary> @@ -70000,7 +70046,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="101097"> +<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96193"> <summary> Do not audit attempts to send UDP traffic on the xfs port. </summary> @@ -70011,7 +70057,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_xfs_port" lineno="101116"> +<interface name="corenet_udp_receive_xfs_port" lineno="96208"> <summary> Receive UDP traffic on the xfs port. </summary> @@ -70022,7 +70068,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="101135"> +<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96223"> <summary> Do not audit attempts to receive UDP traffic on the xfs port. </summary> @@ -70033,7 +70079,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_xfs_port" lineno="101154"> +<interface name="corenet_udp_sendrecv_xfs_port" lineno="96238"> <summary> Send and receive UDP traffic on the xfs port. </summary> @@ -70044,7 +70090,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="101171"> +<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96254"> <summary> Do not audit attempts to send and receive UDP traffic on the xfs port. @@ -70056,7 +70102,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_xfs_port" lineno="101187"> +<interface name="corenet_tcp_bind_xfs_port" lineno="96269"> <summary> Bind TCP sockets to the xfs port. </summary> @@ -70067,7 +70113,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xfs_port" lineno="101207"> +<interface name="corenet_udp_bind_xfs_port" lineno="96289"> <summary> Bind UDP sockets to the xfs port. </summary> @@ -70078,7 +70124,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xfs_port" lineno="101226"> +<interface name="corenet_tcp_connect_xfs_port" lineno="96308"> <summary> Make a TCP connection to the xfs port. </summary> @@ -70088,7 +70134,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xfs_client_packets" lineno="101246"> +<interface name="corenet_send_xfs_client_packets" lineno="96328"> <summary> Send xfs_client packets. </summary> @@ -70099,7 +70145,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="101265"> +<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96347"> <summary> Do not audit attempts to send xfs_client packets. </summary> @@ -70110,7 +70156,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xfs_client_packets" lineno="101284"> +<interface name="corenet_receive_xfs_client_packets" lineno="96366"> <summary> Receive xfs_client packets. </summary> @@ -70121,7 +70167,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="101303"> +<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96385"> <summary> Do not audit attempts to receive xfs_client packets. </summary> @@ -70132,7 +70178,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xfs_client_packets" lineno="101322"> +<interface name="corenet_sendrecv_xfs_client_packets" lineno="96404"> <summary> Send and receive xfs_client packets. </summary> @@ -70143,7 +70189,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="101338"> +<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96420"> <summary> Do not audit attempts to send and receive xfs_client packets. </summary> @@ -70154,7 +70200,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xfs_client_packets" lineno="101353"> +<interface name="corenet_relabelto_xfs_client_packets" lineno="96435"> <summary> Relabel packets to xfs_client the packet type. </summary> @@ -70164,7 +70210,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xfs_server_packets" lineno="101373"> +<interface name="corenet_send_xfs_server_packets" lineno="96455"> <summary> Send xfs_server packets. </summary> @@ -70175,7 +70221,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="101392"> +<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="96474"> <summary> Do not audit attempts to send xfs_server packets. </summary> @@ -70186,7 +70232,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xfs_server_packets" lineno="101411"> +<interface name="corenet_receive_xfs_server_packets" lineno="96493"> <summary> Receive xfs_server packets. </summary> @@ -70197,7 +70243,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="101430"> +<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="96512"> <summary> Do not audit attempts to receive xfs_server packets. </summary> @@ -70208,7 +70254,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xfs_server_packets" lineno="101449"> +<interface name="corenet_sendrecv_xfs_server_packets" lineno="96531"> <summary> Send and receive xfs_server packets. </summary> @@ -70219,7 +70265,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="101465"> +<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="96547"> <summary> Do not audit attempts to send and receive xfs_server packets. </summary> @@ -70230,7 +70276,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xfs_server_packets" lineno="101480"> +<interface name="corenet_relabelto_xfs_server_packets" lineno="96562"> <summary> Relabel packets to xfs_server the packet type. </summary> @@ -70240,7 +70286,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xserver_port" lineno="101502"> +<interface name="corenet_tcp_sendrecv_xserver_port" lineno="96584"> <summary> Send and receive TCP traffic on the xserver port. </summary> @@ -70251,7 +70297,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_xserver_port" lineno="101521"> +<interface name="corenet_udp_send_xserver_port" lineno="96599"> <summary> Send UDP traffic on the xserver port. </summary> @@ -70262,7 +70308,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="101540"> +<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="96614"> <summary> Do not audit attempts to send UDP traffic on the xserver port. </summary> @@ -70273,7 +70319,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_xserver_port" lineno="101559"> +<interface name="corenet_udp_receive_xserver_port" lineno="96629"> <summary> Receive UDP traffic on the xserver port. </summary> @@ -70284,7 +70330,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="101578"> +<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="96644"> <summary> Do not audit attempts to receive UDP traffic on the xserver port. </summary> @@ -70295,7 +70341,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_xserver_port" lineno="101597"> +<interface name="corenet_udp_sendrecv_xserver_port" lineno="96659"> <summary> Send and receive UDP traffic on the xserver port. </summary> @@ -70306,7 +70352,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="101614"> +<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="96675"> <summary> Do not audit attempts to send and receive UDP traffic on the xserver port. @@ -70318,7 +70364,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_xserver_port" lineno="101630"> +<interface name="corenet_tcp_bind_xserver_port" lineno="96690"> <summary> Bind TCP sockets to the xserver port. </summary> @@ -70329,7 +70375,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xserver_port" lineno="101650"> +<interface name="corenet_udp_bind_xserver_port" lineno="96710"> <summary> Bind UDP sockets to the xserver port. </summary> @@ -70340,7 +70386,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xserver_port" lineno="101669"> +<interface name="corenet_tcp_connect_xserver_port" lineno="96729"> <summary> Make a TCP connection to the xserver port. </summary> @@ -70350,7 +70396,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xserver_client_packets" lineno="101689"> +<interface name="corenet_send_xserver_client_packets" lineno="96749"> <summary> Send xserver_client packets. </summary> @@ -70361,7 +70407,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="101708"> +<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="96768"> <summary> Do not audit attempts to send xserver_client packets. </summary> @@ -70372,7 +70418,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xserver_client_packets" lineno="101727"> +<interface name="corenet_receive_xserver_client_packets" lineno="96787"> <summary> Receive xserver_client packets. </summary> @@ -70383,7 +70429,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="101746"> +<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="96806"> <summary> Do not audit attempts to receive xserver_client packets. </summary> @@ -70394,7 +70440,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xserver_client_packets" lineno="101765"> +<interface name="corenet_sendrecv_xserver_client_packets" lineno="96825"> <summary> Send and receive xserver_client packets. </summary> @@ -70405,7 +70451,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="101781"> +<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="96841"> <summary> Do not audit attempts to send and receive xserver_client packets. </summary> @@ -70416,7 +70462,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xserver_client_packets" lineno="101796"> +<interface name="corenet_relabelto_xserver_client_packets" lineno="96856"> <summary> Relabel packets to xserver_client the packet type. </summary> @@ -70426,7 +70472,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xserver_server_packets" lineno="101816"> +<interface name="corenet_send_xserver_server_packets" lineno="96876"> <summary> Send xserver_server packets. </summary> @@ -70437,7 +70483,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="101835"> +<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="96895"> <summary> Do not audit attempts to send xserver_server packets. </summary> @@ -70448,7 +70494,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xserver_server_packets" lineno="101854"> +<interface name="corenet_receive_xserver_server_packets" lineno="96914"> <summary> Receive xserver_server packets. </summary> @@ -70459,7 +70505,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="101873"> +<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="96933"> <summary> Do not audit attempts to receive xserver_server packets. </summary> @@ -70470,7 +70516,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xserver_server_packets" lineno="101892"> +<interface name="corenet_sendrecv_xserver_server_packets" lineno="96952"> <summary> Send and receive xserver_server packets. </summary> @@ -70481,7 +70527,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="101908"> +<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="96968"> <summary> Do not audit attempts to send and receive xserver_server packets. </summary> @@ -70492,7 +70538,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xserver_server_packets" lineno="101923"> +<interface name="corenet_relabelto_xserver_server_packets" lineno="96983"> <summary> Relabel packets to xserver_server the packet type. </summary> @@ -70502,7 +70548,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="101945"> +<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97005"> <summary> Send and receive TCP traffic on the zarafa port. </summary> @@ -70513,7 +70559,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zarafa_port" lineno="101964"> +<interface name="corenet_udp_send_zarafa_port" lineno="97020"> <summary> Send UDP traffic on the zarafa port. </summary> @@ -70524,7 +70570,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="101983"> +<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97035"> <summary> Do not audit attempts to send UDP traffic on the zarafa port. </summary> @@ -70535,7 +70581,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zarafa_port" lineno="102002"> +<interface name="corenet_udp_receive_zarafa_port" lineno="97050"> <summary> Receive UDP traffic on the zarafa port. </summary> @@ -70546,7 +70592,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="102021"> +<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97065"> <summary> Do not audit attempts to receive UDP traffic on the zarafa port. </summary> @@ -70557,7 +70603,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zarafa_port" lineno="102040"> +<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97080"> <summary> Send and receive UDP traffic on the zarafa port. </summary> @@ -70568,7 +70614,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="102057"> +<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97096"> <summary> Do not audit attempts to send and receive UDP traffic on the zarafa port. @@ -70580,7 +70626,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zarafa_port" lineno="102073"> +<interface name="corenet_tcp_bind_zarafa_port" lineno="97111"> <summary> Bind TCP sockets to the zarafa port. </summary> @@ -70591,7 +70637,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zarafa_port" lineno="102093"> +<interface name="corenet_udp_bind_zarafa_port" lineno="97131"> <summary> Bind UDP sockets to the zarafa port. </summary> @@ -70602,7 +70648,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zarafa_port" lineno="102112"> +<interface name="corenet_tcp_connect_zarafa_port" lineno="97150"> <summary> Make a TCP connection to the zarafa port. </summary> @@ -70612,7 +70658,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zarafa_client_packets" lineno="102132"> +<interface name="corenet_send_zarafa_client_packets" lineno="97170"> <summary> Send zarafa_client packets. </summary> @@ -70623,7 +70669,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="102151"> +<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97189"> <summary> Do not audit attempts to send zarafa_client packets. </summary> @@ -70634,7 +70680,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zarafa_client_packets" lineno="102170"> +<interface name="corenet_receive_zarafa_client_packets" lineno="97208"> <summary> Receive zarafa_client packets. </summary> @@ -70645,7 +70691,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="102189"> +<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97227"> <summary> Do not audit attempts to receive zarafa_client packets. </summary> @@ -70656,7 +70702,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zarafa_client_packets" lineno="102208"> +<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97246"> <summary> Send and receive zarafa_client packets. </summary> @@ -70667,7 +70713,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="102224"> +<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97262"> <summary> Do not audit attempts to send and receive zarafa_client packets. </summary> @@ -70678,7 +70724,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zarafa_client_packets" lineno="102239"> +<interface name="corenet_relabelto_zarafa_client_packets" lineno="97277"> <summary> Relabel packets to zarafa_client the packet type. </summary> @@ -70688,7 +70734,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zarafa_server_packets" lineno="102259"> +<interface name="corenet_send_zarafa_server_packets" lineno="97297"> <summary> Send zarafa_server packets. </summary> @@ -70699,7 +70745,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="102278"> +<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97316"> <summary> Do not audit attempts to send zarafa_server packets. </summary> @@ -70710,7 +70756,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zarafa_server_packets" lineno="102297"> +<interface name="corenet_receive_zarafa_server_packets" lineno="97335"> <summary> Receive zarafa_server packets. </summary> @@ -70721,7 +70767,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="102316"> +<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97354"> <summary> Do not audit attempts to receive zarafa_server packets. </summary> @@ -70732,7 +70778,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zarafa_server_packets" lineno="102335"> +<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97373"> <summary> Send and receive zarafa_server packets. </summary> @@ -70743,7 +70789,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="102351"> +<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97389"> <summary> Do not audit attempts to send and receive zarafa_server packets. </summary> @@ -70754,7 +70800,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zarafa_server_packets" lineno="102366"> +<interface name="corenet_relabelto_zarafa_server_packets" lineno="97404"> <summary> Relabel packets to zarafa_server the packet type. </summary> @@ -70764,7 +70810,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="102388"> +<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97426"> <summary> Send and receive TCP traffic on the zabbix port. </summary> @@ -70775,7 +70821,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zabbix_port" lineno="102407"> +<interface name="corenet_udp_send_zabbix_port" lineno="97441"> <summary> Send UDP traffic on the zabbix port. </summary> @@ -70786,7 +70832,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="102426"> +<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="97456"> <summary> Do not audit attempts to send UDP traffic on the zabbix port. </summary> @@ -70797,7 +70843,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zabbix_port" lineno="102445"> +<interface name="corenet_udp_receive_zabbix_port" lineno="97471"> <summary> Receive UDP traffic on the zabbix port. </summary> @@ -70808,7 +70854,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="102464"> +<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="97486"> <summary> Do not audit attempts to receive UDP traffic on the zabbix port. </summary> @@ -70819,7 +70865,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zabbix_port" lineno="102483"> +<interface name="corenet_udp_sendrecv_zabbix_port" lineno="97501"> <summary> Send and receive UDP traffic on the zabbix port. </summary> @@ -70830,7 +70876,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="102500"> +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="97517"> <summary> Do not audit attempts to send and receive UDP traffic on the zabbix port. @@ -70842,7 +70888,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zabbix_port" lineno="102516"> +<interface name="corenet_tcp_bind_zabbix_port" lineno="97532"> <summary> Bind TCP sockets to the zabbix port. </summary> @@ -70853,7 +70899,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zabbix_port" lineno="102536"> +<interface name="corenet_udp_bind_zabbix_port" lineno="97552"> <summary> Bind UDP sockets to the zabbix port. </summary> @@ -70864,7 +70910,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zabbix_port" lineno="102555"> +<interface name="corenet_tcp_connect_zabbix_port" lineno="97571"> <summary> Make a TCP connection to the zabbix port. </summary> @@ -70874,7 +70920,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_client_packets" lineno="102575"> +<interface name="corenet_send_zabbix_client_packets" lineno="97591"> <summary> Send zabbix_client packets. </summary> @@ -70885,7 +70931,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="102594"> +<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="97610"> <summary> Do not audit attempts to send zabbix_client packets. </summary> @@ -70896,7 +70942,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_client_packets" lineno="102613"> +<interface name="corenet_receive_zabbix_client_packets" lineno="97629"> <summary> Receive zabbix_client packets. </summary> @@ -70907,7 +70953,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="102632"> +<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="97648"> <summary> Do not audit attempts to receive zabbix_client packets. </summary> @@ -70918,7 +70964,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_client_packets" lineno="102651"> +<interface name="corenet_sendrecv_zabbix_client_packets" lineno="97667"> <summary> Send and receive zabbix_client packets. </summary> @@ -70929,7 +70975,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="102667"> +<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="97683"> <summary> Do not audit attempts to send and receive zabbix_client packets. </summary> @@ -70940,7 +70986,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_client_packets" lineno="102682"> +<interface name="corenet_relabelto_zabbix_client_packets" lineno="97698"> <summary> Relabel packets to zabbix_client the packet type. </summary> @@ -70950,7 +70996,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_server_packets" lineno="102702"> +<interface name="corenet_send_zabbix_server_packets" lineno="97718"> <summary> Send zabbix_server packets. </summary> @@ -70961,7 +71007,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="102721"> +<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="97737"> <summary> Do not audit attempts to send zabbix_server packets. </summary> @@ -70972,7 +71018,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_server_packets" lineno="102740"> +<interface name="corenet_receive_zabbix_server_packets" lineno="97756"> <summary> Receive zabbix_server packets. </summary> @@ -70983,7 +71029,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="102759"> +<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="97775"> <summary> Do not audit attempts to receive zabbix_server packets. </summary> @@ -70994,7 +71040,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_server_packets" lineno="102778"> +<interface name="corenet_sendrecv_zabbix_server_packets" lineno="97794"> <summary> Send and receive zabbix_server packets. </summary> @@ -71005,7 +71051,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="102794"> +<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="97810"> <summary> Do not audit attempts to send and receive zabbix_server packets. </summary> @@ -71016,7 +71062,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_server_packets" lineno="102809"> +<interface name="corenet_relabelto_zabbix_server_packets" lineno="97825"> <summary> Relabel packets to zabbix_server the packet type. </summary> @@ -71026,7 +71072,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="102831"> +<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="97847"> <summary> Send and receive TCP traffic on the zabbix_agent port. </summary> @@ -71037,7 +71083,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zabbix_agent_port" lineno="102850"> +<interface name="corenet_udp_send_zabbix_agent_port" lineno="97862"> <summary> Send UDP traffic on the zabbix_agent port. </summary> @@ -71048,7 +71094,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="102869"> +<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="97877"> <summary> Do not audit attempts to send UDP traffic on the zabbix_agent port. </summary> @@ -71059,7 +71105,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zabbix_agent_port" lineno="102888"> +<interface name="corenet_udp_receive_zabbix_agent_port" lineno="97892"> <summary> Receive UDP traffic on the zabbix_agent port. </summary> @@ -71070,7 +71116,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="102907"> +<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="97907"> <summary> Do not audit attempts to receive UDP traffic on the zabbix_agent port. </summary> @@ -71081,7 +71127,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="102926"> +<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="97922"> <summary> Send and receive UDP traffic on the zabbix_agent port. </summary> @@ -71092,7 +71138,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="102943"> +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="97938"> <summary> Do not audit attempts to send and receive UDP traffic on the zabbix_agent port. @@ -71104,7 +71150,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="102959"> +<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="97953"> <summary> Bind TCP sockets to the zabbix_agent port. </summary> @@ -71115,7 +71161,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zabbix_agent_port" lineno="102979"> +<interface name="corenet_udp_bind_zabbix_agent_port" lineno="97973"> <summary> Bind UDP sockets to the zabbix_agent port. </summary> @@ -71126,7 +71172,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="102998"> +<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="97992"> <summary> Make a TCP connection to the zabbix_agent port. </summary> @@ -71136,7 +71182,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_agent_client_packets" lineno="103018"> +<interface name="corenet_send_zabbix_agent_client_packets" lineno="98012"> <summary> Send zabbix_agent_client packets. </summary> @@ -71147,7 +71193,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="103037"> +<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98031"> <summary> Do not audit attempts to send zabbix_agent_client packets. </summary> @@ -71158,7 +71204,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_agent_client_packets" lineno="103056"> +<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98050"> <summary> Receive zabbix_agent_client packets. </summary> @@ -71169,7 +71215,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="103075"> +<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98069"> <summary> Do not audit attempts to receive zabbix_agent_client packets. </summary> @@ -71180,7 +71226,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="103094"> +<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98088"> <summary> Send and receive zabbix_agent_client packets. </summary> @@ -71191,7 +71237,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="103110"> +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98104"> <summary> Do not audit attempts to send and receive zabbix_agent_client packets. </summary> @@ -71202,7 +71248,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="103125"> +<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98119"> <summary> Relabel packets to zabbix_agent_client the packet type. </summary> @@ -71212,7 +71258,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_agent_server_packets" lineno="103145"> +<interface name="corenet_send_zabbix_agent_server_packets" lineno="98139"> <summary> Send zabbix_agent_server packets. </summary> @@ -71223,7 +71269,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="103164"> +<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98158"> <summary> Do not audit attempts to send zabbix_agent_server packets. </summary> @@ -71234,7 +71280,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_agent_server_packets" lineno="103183"> +<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98177"> <summary> Receive zabbix_agent_server packets. </summary> @@ -71245,7 +71291,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="103202"> +<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98196"> <summary> Do not audit attempts to receive zabbix_agent_server packets. </summary> @@ -71256,7 +71302,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="103221"> +<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98215"> <summary> Send and receive zabbix_agent_server packets. </summary> @@ -71267,7 +71313,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="103237"> +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98231"> <summary> Do not audit attempts to send and receive zabbix_agent_server packets. </summary> @@ -71278,7 +71324,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="103252"> +<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98246"> <summary> Relabel packets to zabbix_agent_server the packet type. </summary> @@ -71288,7 +71334,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="103274"> +<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98268"> <summary> Send and receive TCP traffic on the zookeeper_client port. </summary> @@ -71299,7 +71345,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zookeeper_client_port" lineno="103293"> +<interface name="corenet_udp_send_zookeeper_client_port" lineno="98283"> <summary> Send UDP traffic on the zookeeper_client port. </summary> @@ -71310,7 +71356,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="103312"> +<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98298"> <summary> Do not audit attempts to send UDP traffic on the zookeeper_client port. </summary> @@ -71321,7 +71367,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zookeeper_client_port" lineno="103331"> +<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98313"> <summary> Receive UDP traffic on the zookeeper_client port. </summary> @@ -71332,7 +71378,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="103350"> +<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98328"> <summary> Do not audit attempts to receive UDP traffic on the zookeeper_client port. </summary> @@ -71343,7 +71389,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="103369"> +<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98343"> <summary> Send and receive UDP traffic on the zookeeper_client port. </summary> @@ -71354,7 +71400,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="103386"> +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98359"> <summary> Do not audit attempts to send and receive UDP traffic on the zookeeper_client port. @@ -71366,7 +71412,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="103402"> +<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98374"> <summary> Bind TCP sockets to the zookeeper_client port. </summary> @@ -71377,7 +71423,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zookeeper_client_port" lineno="103422"> +<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98394"> <summary> Bind UDP sockets to the zookeeper_client port. </summary> @@ -71388,7 +71434,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="103441"> +<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98413"> <summary> Make a TCP connection to the zookeeper_client port. </summary> @@ -71398,7 +71444,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_client_client_packets" lineno="103461"> +<interface name="corenet_send_zookeeper_client_client_packets" lineno="98433"> <summary> Send zookeeper_client_client packets. </summary> @@ -71409,7 +71455,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="103480"> +<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98452"> <summary> Do not audit attempts to send zookeeper_client_client packets. </summary> @@ -71420,7 +71466,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_client_client_packets" lineno="103499"> +<interface name="corenet_receive_zookeeper_client_client_packets" lineno="98471"> <summary> Receive zookeeper_client_client packets. </summary> @@ -71431,7 +71477,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="103518"> +<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="98490"> <summary> Do not audit attempts to receive zookeeper_client_client packets. </summary> @@ -71442,7 +71488,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="103537"> +<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="98509"> <summary> Send and receive zookeeper_client_client packets. </summary> @@ -71453,7 +71499,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="103553"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="98525"> <summary> Do not audit attempts to send and receive zookeeper_client_client packets. </summary> @@ -71464,7 +71510,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="103568"> +<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="98540"> <summary> Relabel packets to zookeeper_client_client the packet type. </summary> @@ -71474,7 +71520,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_client_server_packets" lineno="103588"> +<interface name="corenet_send_zookeeper_client_server_packets" lineno="98560"> <summary> Send zookeeper_client_server packets. </summary> @@ -71485,7 +71531,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="103607"> +<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="98579"> <summary> Do not audit attempts to send zookeeper_client_server packets. </summary> @@ -71496,7 +71542,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_client_server_packets" lineno="103626"> +<interface name="corenet_receive_zookeeper_client_server_packets" lineno="98598"> <summary> Receive zookeeper_client_server packets. </summary> @@ -71507,7 +71553,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="103645"> +<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="98617"> <summary> Do not audit attempts to receive zookeeper_client_server packets. </summary> @@ -71518,7 +71564,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="103664"> +<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="98636"> <summary> Send and receive zookeeper_client_server packets. </summary> @@ -71529,7 +71575,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="103680"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="98652"> <summary> Do not audit attempts to send and receive zookeeper_client_server packets. </summary> @@ -71540,7 +71586,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="103695"> +<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="98667"> <summary> Relabel packets to zookeeper_client_server the packet type. </summary> @@ -71550,7 +71596,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="103717"> +<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="98689"> <summary> Send and receive TCP traffic on the zookeeper_election port. </summary> @@ -71561,7 +71607,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zookeeper_election_port" lineno="103736"> +<interface name="corenet_udp_send_zookeeper_election_port" lineno="98704"> <summary> Send UDP traffic on the zookeeper_election port. </summary> @@ -71572,7 +71618,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="103755"> +<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="98719"> <summary> Do not audit attempts to send UDP traffic on the zookeeper_election port. </summary> @@ -71583,7 +71629,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zookeeper_election_port" lineno="103774"> +<interface name="corenet_udp_receive_zookeeper_election_port" lineno="98734"> <summary> Receive UDP traffic on the zookeeper_election port. </summary> @@ -71594,7 +71640,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="103793"> +<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="98749"> <summary> Do not audit attempts to receive UDP traffic on the zookeeper_election port. </summary> @@ -71605,7 +71651,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="103812"> +<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="98764"> <summary> Send and receive UDP traffic on the zookeeper_election port. </summary> @@ -71616,7 +71662,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="103829"> +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="98780"> <summary> Do not audit attempts to send and receive UDP traffic on the zookeeper_election port. @@ -71628,7 +71674,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="103845"> +<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="98795"> <summary> Bind TCP sockets to the zookeeper_election port. </summary> @@ -71639,7 +71685,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zookeeper_election_port" lineno="103865"> +<interface name="corenet_udp_bind_zookeeper_election_port" lineno="98815"> <summary> Bind UDP sockets to the zookeeper_election port. </summary> @@ -71650,7 +71696,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="103884"> +<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="98834"> <summary> Make a TCP connection to the zookeeper_election port. </summary> @@ -71660,7 +71706,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_election_client_packets" lineno="103904"> +<interface name="corenet_send_zookeeper_election_client_packets" lineno="98854"> <summary> Send zookeeper_election_client packets. </summary> @@ -71671,7 +71717,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="103923"> +<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="98873"> <summary> Do not audit attempts to send zookeeper_election_client packets. </summary> @@ -71682,7 +71728,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_election_client_packets" lineno="103942"> +<interface name="corenet_receive_zookeeper_election_client_packets" lineno="98892"> <summary> Receive zookeeper_election_client packets. </summary> @@ -71693,7 +71739,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="103961"> +<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="98911"> <summary> Do not audit attempts to receive zookeeper_election_client packets. </summary> @@ -71704,7 +71750,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="103980"> +<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="98930"> <summary> Send and receive zookeeper_election_client packets. </summary> @@ -71715,7 +71761,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="103996"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="98946"> <summary> Do not audit attempts to send and receive zookeeper_election_client packets. </summary> @@ -71726,7 +71772,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="104011"> +<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="98961"> <summary> Relabel packets to zookeeper_election_client the packet type. </summary> @@ -71736,7 +71782,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_election_server_packets" lineno="104031"> +<interface name="corenet_send_zookeeper_election_server_packets" lineno="98981"> <summary> Send zookeeper_election_server packets. </summary> @@ -71747,7 +71793,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="104050"> +<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99000"> <summary> Do not audit attempts to send zookeeper_election_server packets. </summary> @@ -71758,7 +71804,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_election_server_packets" lineno="104069"> +<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99019"> <summary> Receive zookeeper_election_server packets. </summary> @@ -71769,7 +71815,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="104088"> +<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99038"> <summary> Do not audit attempts to receive zookeeper_election_server packets. </summary> @@ -71780,7 +71826,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="104107"> +<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99057"> <summary> Send and receive zookeeper_election_server packets. </summary> @@ -71791,7 +71837,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="104123"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99073"> <summary> Do not audit attempts to send and receive zookeeper_election_server packets. </summary> @@ -71802,7 +71848,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="104138"> +<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99088"> <summary> Relabel packets to zookeeper_election_server the packet type. </summary> @@ -71812,7 +71858,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="104160"> +<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99110"> <summary> Send and receive TCP traffic on the zookeeper_leader port. </summary> @@ -71823,7 +71869,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zookeeper_leader_port" lineno="104179"> +<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99125"> <summary> Send UDP traffic on the zookeeper_leader port. </summary> @@ -71834,7 +71880,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="104198"> +<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99140"> <summary> Do not audit attempts to send UDP traffic on the zookeeper_leader port. </summary> @@ -71845,7 +71891,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="104217"> +<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99155"> <summary> Receive UDP traffic on the zookeeper_leader port. </summary> @@ -71856,7 +71902,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="104236"> +<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99170"> <summary> Do not audit attempts to receive UDP traffic on the zookeeper_leader port. </summary> @@ -71867,7 +71913,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="104255"> +<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99185"> <summary> Send and receive UDP traffic on the zookeeper_leader port. </summary> @@ -71878,7 +71924,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="104272"> +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99201"> <summary> Do not audit attempts to send and receive UDP traffic on the zookeeper_leader port. @@ -71890,7 +71936,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="104288"> +<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99216"> <summary> Bind TCP sockets to the zookeeper_leader port. </summary> @@ -71901,7 +71947,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="104308"> +<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99236"> <summary> Bind UDP sockets to the zookeeper_leader port. </summary> @@ -71912,7 +71958,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="104327"> +<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99255"> <summary> Make a TCP connection to the zookeeper_leader port. </summary> @@ -71922,7 +71968,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_leader_client_packets" lineno="104347"> +<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99275"> <summary> Send zookeeper_leader_client packets. </summary> @@ -71933,7 +71979,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="104366"> +<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99294"> <summary> Do not audit attempts to send zookeeper_leader_client packets. </summary> @@ -71944,7 +71990,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="104385"> +<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99313"> <summary> Receive zookeeper_leader_client packets. </summary> @@ -71955,7 +72001,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="104404"> +<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99332"> <summary> Do not audit attempts to receive zookeeper_leader_client packets. </summary> @@ -71966,7 +72012,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="104423"> +<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99351"> <summary> Send and receive zookeeper_leader_client packets. </summary> @@ -71977,7 +72023,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="104439"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99367"> <summary> Do not audit attempts to send and receive zookeeper_leader_client packets. </summary> @@ -71988,7 +72034,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="104454"> +<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99382"> <summary> Relabel packets to zookeeper_leader_client the packet type. </summary> @@ -71998,7 +72044,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_leader_server_packets" lineno="104474"> +<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99402"> <summary> Send zookeeper_leader_server packets. </summary> @@ -72009,7 +72055,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="104493"> +<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99421"> <summary> Do not audit attempts to send zookeeper_leader_server packets. </summary> @@ -72020,7 +72066,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="104512"> +<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99440"> <summary> Receive zookeeper_leader_server packets. </summary> @@ -72031,7 +72077,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="104531"> +<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="99459"> <summary> Do not audit attempts to receive zookeeper_leader_server packets. </summary> @@ -72042,7 +72088,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="104550"> +<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="99478"> <summary> Send and receive zookeeper_leader_server packets. </summary> @@ -72053,7 +72099,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="104566"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="99494"> <summary> Do not audit attempts to send and receive zookeeper_leader_server packets. </summary> @@ -72064,7 +72110,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="104581"> +<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="99509"> <summary> Relabel packets to zookeeper_leader_server the packet type. </summary> @@ -72074,7 +72120,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zebra_port" lineno="104603"> +<interface name="corenet_tcp_sendrecv_zebra_port" lineno="99531"> <summary> Send and receive TCP traffic on the zebra port. </summary> @@ -72085,7 +72131,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zebra_port" lineno="104622"> +<interface name="corenet_udp_send_zebra_port" lineno="99546"> <summary> Send UDP traffic on the zebra port. </summary> @@ -72096,7 +72142,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="104641"> +<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="99561"> <summary> Do not audit attempts to send UDP traffic on the zebra port. </summary> @@ -72107,7 +72153,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zebra_port" lineno="104660"> +<interface name="corenet_udp_receive_zebra_port" lineno="99576"> <summary> Receive UDP traffic on the zebra port. </summary> @@ -72118,7 +72164,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="104679"> +<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="99591"> <summary> Do not audit attempts to receive UDP traffic on the zebra port. </summary> @@ -72129,7 +72175,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zebra_port" lineno="104698"> +<interface name="corenet_udp_sendrecv_zebra_port" lineno="99606"> <summary> Send and receive UDP traffic on the zebra port. </summary> @@ -72140,7 +72186,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="104715"> +<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="99622"> <summary> Do not audit attempts to send and receive UDP traffic on the zebra port. @@ -72152,7 +72198,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zebra_port" lineno="104731"> +<interface name="corenet_tcp_bind_zebra_port" lineno="99637"> <summary> Bind TCP sockets to the zebra port. </summary> @@ -72163,7 +72209,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zebra_port" lineno="104751"> +<interface name="corenet_udp_bind_zebra_port" lineno="99657"> <summary> Bind UDP sockets to the zebra port. </summary> @@ -72174,7 +72220,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zebra_port" lineno="104770"> +<interface name="corenet_tcp_connect_zebra_port" lineno="99676"> <summary> Make a TCP connection to the zebra port. </summary> @@ -72184,7 +72230,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zebra_client_packets" lineno="104790"> +<interface name="corenet_send_zebra_client_packets" lineno="99696"> <summary> Send zebra_client packets. </summary> @@ -72195,7 +72241,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="104809"> +<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="99715"> <summary> Do not audit attempts to send zebra_client packets. </summary> @@ -72206,7 +72252,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zebra_client_packets" lineno="104828"> +<interface name="corenet_receive_zebra_client_packets" lineno="99734"> <summary> Receive zebra_client packets. </summary> @@ -72217,7 +72263,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="104847"> +<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="99753"> <summary> Do not audit attempts to receive zebra_client packets. </summary> @@ -72228,7 +72274,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zebra_client_packets" lineno="104866"> +<interface name="corenet_sendrecv_zebra_client_packets" lineno="99772"> <summary> Send and receive zebra_client packets. </summary> @@ -72239,7 +72285,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="104882"> +<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="99788"> <summary> Do not audit attempts to send and receive zebra_client packets. </summary> @@ -72250,7 +72296,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zebra_client_packets" lineno="104897"> +<interface name="corenet_relabelto_zebra_client_packets" lineno="99803"> <summary> Relabel packets to zebra_client the packet type. </summary> @@ -72260,7 +72306,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zebra_server_packets" lineno="104917"> +<interface name="corenet_send_zebra_server_packets" lineno="99823"> <summary> Send zebra_server packets. </summary> @@ -72271,7 +72317,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="104936"> +<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="99842"> <summary> Do not audit attempts to send zebra_server packets. </summary> @@ -72282,7 +72328,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zebra_server_packets" lineno="104955"> +<interface name="corenet_receive_zebra_server_packets" lineno="99861"> <summary> Receive zebra_server packets. </summary> @@ -72293,7 +72339,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="104974"> +<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="99880"> <summary> Do not audit attempts to receive zebra_server packets. </summary> @@ -72304,7 +72350,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zebra_server_packets" lineno="104993"> +<interface name="corenet_sendrecv_zebra_server_packets" lineno="99899"> <summary> Send and receive zebra_server packets. </summary> @@ -72315,7 +72361,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="105009"> +<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="99915"> <summary> Do not audit attempts to send and receive zebra_server packets. </summary> @@ -72326,7 +72372,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zebra_server_packets" lineno="105024"> +<interface name="corenet_relabelto_zebra_server_packets" lineno="99930"> <summary> Relabel packets to zebra_server the packet type. </summary> @@ -72336,7 +72382,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zented_port" lineno="105046"> +<interface name="corenet_tcp_sendrecv_zented_port" lineno="99952"> <summary> Send and receive TCP traffic on the zented port. </summary> @@ -72347,7 +72393,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zented_port" lineno="105065"> +<interface name="corenet_udp_send_zented_port" lineno="99967"> <summary> Send UDP traffic on the zented port. </summary> @@ -72358,7 +72404,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zented_port" lineno="105084"> +<interface name="corenet_dontaudit_udp_send_zented_port" lineno="99982"> <summary> Do not audit attempts to send UDP traffic on the zented port. </summary> @@ -72369,7 +72415,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zented_port" lineno="105103"> +<interface name="corenet_udp_receive_zented_port" lineno="99997"> <summary> Receive UDP traffic on the zented port. </summary> @@ -72380,7 +72426,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="105122"> +<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100012"> <summary> Do not audit attempts to receive UDP traffic on the zented port. </summary> @@ -72391,7 +72437,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zented_port" lineno="105141"> +<interface name="corenet_udp_sendrecv_zented_port" lineno="100027"> <summary> Send and receive UDP traffic on the zented port. </summary> @@ -72402,7 +72448,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="105158"> +<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100043"> <summary> Do not audit attempts to send and receive UDP traffic on the zented port. @@ -72414,7 +72460,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zented_port" lineno="105174"> +<interface name="corenet_tcp_bind_zented_port" lineno="100058"> <summary> Bind TCP sockets to the zented port. </summary> @@ -72425,7 +72471,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zented_port" lineno="105194"> +<interface name="corenet_udp_bind_zented_port" lineno="100078"> <summary> Bind UDP sockets to the zented port. </summary> @@ -72436,7 +72482,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zented_port" lineno="105213"> +<interface name="corenet_tcp_connect_zented_port" lineno="100097"> <summary> Make a TCP connection to the zented port. </summary> @@ -72446,7 +72492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zented_client_packets" lineno="105233"> +<interface name="corenet_send_zented_client_packets" lineno="100117"> <summary> Send zented_client packets. </summary> @@ -72457,7 +72503,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zented_client_packets" lineno="105252"> +<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100136"> <summary> Do not audit attempts to send zented_client packets. </summary> @@ -72468,7 +72514,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zented_client_packets" lineno="105271"> +<interface name="corenet_receive_zented_client_packets" lineno="100155"> <summary> Receive zented_client packets. </summary> @@ -72479,7 +72525,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="105290"> +<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100174"> <summary> Do not audit attempts to receive zented_client packets. </summary> @@ -72490,7 +72536,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zented_client_packets" lineno="105309"> +<interface name="corenet_sendrecv_zented_client_packets" lineno="100193"> <summary> Send and receive zented_client packets. </summary> @@ -72501,7 +72547,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="105325"> +<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100209"> <summary> Do not audit attempts to send and receive zented_client packets. </summary> @@ -72512,7 +72558,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zented_client_packets" lineno="105340"> +<interface name="corenet_relabelto_zented_client_packets" lineno="100224"> <summary> Relabel packets to zented_client the packet type. </summary> @@ -72522,7 +72568,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zented_server_packets" lineno="105360"> +<interface name="corenet_send_zented_server_packets" lineno="100244"> <summary> Send zented_server packets. </summary> @@ -72533,7 +72579,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zented_server_packets" lineno="105379"> +<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100263"> <summary> Do not audit attempts to send zented_server packets. </summary> @@ -72544,7 +72590,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zented_server_packets" lineno="105398"> +<interface name="corenet_receive_zented_server_packets" lineno="100282"> <summary> Receive zented_server packets. </summary> @@ -72555,7 +72601,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="105417"> +<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100301"> <summary> Do not audit attempts to receive zented_server packets. </summary> @@ -72566,7 +72612,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zented_server_packets" lineno="105436"> +<interface name="corenet_sendrecv_zented_server_packets" lineno="100320"> <summary> Send and receive zented_server packets. </summary> @@ -72577,7 +72623,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="105452"> +<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100336"> <summary> Do not audit attempts to send and receive zented_server packets. </summary> @@ -72588,7 +72634,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zented_server_packets" lineno="105467"> +<interface name="corenet_relabelto_zented_server_packets" lineno="100351"> <summary> Relabel packets to zented_server the packet type. </summary> @@ -72598,7 +72644,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zope_port" lineno="105489"> +<interface name="corenet_tcp_sendrecv_zope_port" lineno="100373"> <summary> Send and receive TCP traffic on the zope port. </summary> @@ -72609,7 +72655,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zope_port" lineno="105508"> +<interface name="corenet_udp_send_zope_port" lineno="100388"> <summary> Send UDP traffic on the zope port. </summary> @@ -72620,7 +72666,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zope_port" lineno="105527"> +<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100403"> <summary> Do not audit attempts to send UDP traffic on the zope port. </summary> @@ -72631,7 +72677,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zope_port" lineno="105546"> +<interface name="corenet_udp_receive_zope_port" lineno="100418"> <summary> Receive UDP traffic on the zope port. </summary> @@ -72642,7 +72688,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="105565"> +<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100433"> <summary> Do not audit attempts to receive UDP traffic on the zope port. </summary> @@ -72653,7 +72699,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zope_port" lineno="105584"> +<interface name="corenet_udp_sendrecv_zope_port" lineno="100448"> <summary> Send and receive UDP traffic on the zope port. </summary> @@ -72664,7 +72710,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="105601"> +<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="100464"> <summary> Do not audit attempts to send and receive UDP traffic on the zope port. @@ -72676,7 +72722,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zope_port" lineno="105617"> +<interface name="corenet_tcp_bind_zope_port" lineno="100479"> <summary> Bind TCP sockets to the zope port. </summary> @@ -72687,7 +72733,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zope_port" lineno="105637"> +<interface name="corenet_udp_bind_zope_port" lineno="100499"> <summary> Bind UDP sockets to the zope port. </summary> @@ -72698,7 +72744,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zope_port" lineno="105656"> +<interface name="corenet_tcp_connect_zope_port" lineno="100518"> <summary> Make a TCP connection to the zope port. </summary> @@ -72708,7 +72754,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zope_client_packets" lineno="105676"> +<interface name="corenet_send_zope_client_packets" lineno="100538"> <summary> Send zope_client packets. </summary> @@ -72719,7 +72765,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zope_client_packets" lineno="105695"> +<interface name="corenet_dontaudit_send_zope_client_packets" lineno="100557"> <summary> Do not audit attempts to send zope_client packets. </summary> @@ -72730,7 +72776,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zope_client_packets" lineno="105714"> +<interface name="corenet_receive_zope_client_packets" lineno="100576"> <summary> Receive zope_client packets. </summary> @@ -72741,7 +72787,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="105733"> +<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="100595"> <summary> Do not audit attempts to receive zope_client packets. </summary> @@ -72752,7 +72798,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zope_client_packets" lineno="105752"> +<interface name="corenet_sendrecv_zope_client_packets" lineno="100614"> <summary> Send and receive zope_client packets. </summary> @@ -72763,7 +72809,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="105768"> +<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="100630"> <summary> Do not audit attempts to send and receive zope_client packets. </summary> @@ -72774,7 +72820,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zope_client_packets" lineno="105783"> +<interface name="corenet_relabelto_zope_client_packets" lineno="100645"> <summary> Relabel packets to zope_client the packet type. </summary> @@ -72784,7 +72830,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zope_server_packets" lineno="105803"> +<interface name="corenet_send_zope_server_packets" lineno="100665"> <summary> Send zope_server packets. </summary> @@ -72795,7 +72841,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zope_server_packets" lineno="105822"> +<interface name="corenet_dontaudit_send_zope_server_packets" lineno="100684"> <summary> Do not audit attempts to send zope_server packets. </summary> @@ -72806,7 +72852,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zope_server_packets" lineno="105841"> +<interface name="corenet_receive_zope_server_packets" lineno="100703"> <summary> Receive zope_server packets. </summary> @@ -72817,7 +72863,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="105860"> +<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="100722"> <summary> Do not audit attempts to receive zope_server packets. </summary> @@ -72828,7 +72874,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zope_server_packets" lineno="105879"> +<interface name="corenet_sendrecv_zope_server_packets" lineno="100741"> <summary> Send and receive zope_server packets. </summary> @@ -72839,7 +72885,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="105895"> +<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="100757"> <summary> Do not audit attempts to send and receive zope_server packets. </summary> @@ -72850,7 +72896,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zope_server_packets" lineno="105910"> +<interface name="corenet_relabelto_zope_server_packets" lineno="100772"> <summary> Relabel packets to zope_server the packet type. </summary> @@ -72860,7 +72906,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lo_if" lineno="105933"> +<interface name="corenet_tcp_sendrecv_lo_if" lineno="100795"> <summary> Send and receive TCP network traffic on the lo interface. </summary> @@ -72871,7 +72917,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_lo_if" lineno="105952"> +<interface name="corenet_udp_send_lo_if" lineno="100814"> <summary> Send UDP network traffic on the lo interface. </summary> @@ -72882,7 +72928,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_udp_receive_lo_if" lineno="105971"> +<interface name="corenet_udp_receive_lo_if" lineno="100833"> <summary> Receive UDP network traffic on the lo interface. </summary> @@ -72893,7 +72939,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_udp_sendrecv_lo_if" lineno="105990"> +<interface name="corenet_udp_sendrecv_lo_if" lineno="100852"> <summary> Send and receive UDP network traffic on the lo interface. </summary> @@ -72904,7 +72950,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_raw_send_lo_if" lineno="106006"> +<interface name="corenet_raw_send_lo_if" lineno="100868"> <summary> Send raw IP packets on the lo interface. </summary> @@ -72915,7 +72961,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_raw_receive_lo_if" lineno="106025"> +<interface name="corenet_raw_receive_lo_if" lineno="100887"> <summary> Receive raw IP packets on the lo interface. </summary> @@ -72926,7 +72972,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_raw_sendrecv_lo_if" lineno="106044"> +<interface name="corenet_raw_sendrecv_lo_if" lineno="100906"> <summary> Send and receive raw IP packets on the lo interface. </summary> @@ -73023,7 +73069,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mounton" lineno="121"> +<interface name="dev_watch_dev_dirs" lineno="121"> +<summary> +Watch the directories in /dev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_mounton" lineno="139"> <summary> Mount a filesystem on /dev </summary> @@ -73033,7 +73089,7 @@ Domain allow access. </summary> </param> </interface> -<interface name="dev_relabel_all_dev_nodes" lineno="140"> +<interface name="dev_relabel_all_dev_nodes" lineno="158"> <summary> Allow full relabeling (to and from) of all device nodes. </summary> @@ -73044,7 +73100,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="dev_relabel_all_dev_files" lineno="166"> +<interface name="dev_relabel_all_dev_files" lineno="184"> <summary> Allow full relabeling (to and from) of all device files. </summary> @@ -73055,7 +73111,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="dev_list_all_dev_nodes" lineno="184"> +<interface name="dev_list_all_dev_nodes" lineno="202"> <summary> List all of the device nodes in a device directory. </summary> @@ -73065,7 +73121,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_generic_dirs" lineno="203"> +<interface name="dev_setattr_generic_dirs" lineno="221"> <summary> Set the attributes of /dev directories. </summary> @@ -73075,7 +73131,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_list_all_dev_nodes" lineno="221"> +<interface name="dev_dontaudit_list_all_dev_nodes" lineno="239"> <summary> Dontaudit attempts to list all device nodes. </summary> @@ -73085,7 +73141,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_add_entry_generic_dirs" lineno="239"> +<interface name="dev_add_entry_generic_dirs" lineno="257"> <summary> Add entries to directories in /dev. </summary> @@ -73095,7 +73151,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_remove_entry_generic_dirs" lineno="257"> +<interface name="dev_remove_entry_generic_dirs" lineno="275"> <summary> Remove entries from directories in /dev. </summary> @@ -73105,7 +73161,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_generic_dirs" lineno="275"> +<interface name="dev_create_generic_dirs" lineno="293"> <summary> Create a directory in the device directory. </summary> @@ -73115,7 +73171,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_delete_generic_dirs" lineno="294"> +<interface name="dev_delete_generic_dirs" lineno="312"> <summary> Delete a directory in the device directory. </summary> @@ -73125,7 +73181,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_generic_dirs" lineno="312"> +<interface name="dev_manage_generic_dirs" lineno="330"> <summary> Manage of directories in /dev. </summary> @@ -73135,7 +73191,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_generic_dev_dirs" lineno="330"> +<interface name="dev_relabel_generic_dev_dirs" lineno="348"> <summary> Allow full relabeling (to and from) of directories in /dev. </summary> @@ -73145,7 +73201,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_generic_files" lineno="348"> +<interface name="dev_dontaudit_getattr_generic_files" lineno="366"> <summary> dontaudit getattr generic files in /dev. </summary> @@ -73155,7 +73211,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_generic_files" lineno="366"> +<interface name="dev_read_generic_files" lineno="384"> <summary> Read generic files in /dev. </summary> @@ -73165,7 +73221,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_generic_files" lineno="384"> +<interface name="dev_rw_generic_files" lineno="402"> <summary> Read and write generic files in /dev. </summary> @@ -73175,7 +73231,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_delete_generic_files" lineno="402"> +<interface name="dev_delete_generic_files" lineno="420"> <summary> Delete generic files in /dev. </summary> @@ -73185,7 +73241,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_generic_files" lineno="420"> +<interface name="dev_manage_generic_files" lineno="438"> <summary> Create a file in the device directory. </summary> @@ -73195,7 +73251,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_generic_pipes" lineno="438"> +<interface name="dev_dontaudit_getattr_generic_pipes" lineno="456"> <summary> Dontaudit getattr on generic pipes. </summary> @@ -73205,7 +73261,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_generic_sockets" lineno="456"> +<interface name="dev_write_generic_sockets" lineno="474"> <summary> Write generic socket files in /dev. </summary> @@ -73215,7 +73271,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_getattr_generic_blk_files" lineno="474"> +<interface name="dev_getattr_generic_blk_files" lineno="492"> <summary> Allow getattr on generic block devices. </summary> @@ -73225,7 +73281,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_generic_blk_files" lineno="492"> +<interface name="dev_dontaudit_getattr_generic_blk_files" lineno="510"> <summary> Dontaudit getattr on generic block devices. </summary> @@ -73235,7 +73291,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_generic_blk_files" lineno="511"> +<interface name="dev_setattr_generic_blk_files" lineno="529"> <summary> Set the attributes on generic block devices. @@ -73246,7 +73302,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_generic_blk_files" lineno="529"> +<interface name="dev_dontaudit_setattr_generic_blk_files" lineno="547"> <summary> Dontaudit setattr on generic block devices. </summary> @@ -73256,7 +73312,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_create_generic_blk_files" lineno="547"> +<interface name="dev_create_generic_blk_files" lineno="565"> <summary> Create generic block device files. </summary> @@ -73266,7 +73322,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_delete_generic_blk_files" lineno="565"> +<interface name="dev_delete_generic_blk_files" lineno="583"> <summary> Delete generic block device files. </summary> @@ -73276,7 +73332,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_generic_chr_files" lineno="583"> +<interface name="dev_getattr_generic_chr_files" lineno="601"> <summary> Allow getattr for generic character device files. </summary> @@ -73286,7 +73342,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_generic_chr_files" lineno="601"> +<interface name="dev_dontaudit_getattr_generic_chr_files" lineno="619"> <summary> Dontaudit getattr for generic character device files. </summary> @@ -73296,7 +73352,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_generic_chr_files" lineno="620"> +<interface name="dev_setattr_generic_chr_files" lineno="638"> <summary> Set the attributes for generic character device files. @@ -73307,7 +73363,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_generic_chr_files" lineno="638"> +<interface name="dev_dontaudit_setattr_generic_chr_files" lineno="656"> <summary> Dontaudit setattr for generic character device files. </summary> @@ -73317,7 +73373,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_generic_chr_files" lineno="656"> +<interface name="dev_read_generic_chr_files" lineno="674"> <summary> Read generic character device files. </summary> @@ -73327,7 +73383,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_generic_chr_files" lineno="674"> +<interface name="dev_rw_generic_chr_files" lineno="692"> <summary> Read and write generic character device files. </summary> @@ -73337,7 +73393,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_generic_blk_files" lineno="692"> +<interface name="dev_rw_generic_blk_files" lineno="710"> <summary> Read and write generic block device files. </summary> @@ -73347,7 +73403,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_rw_generic_chr_files" lineno="710"> +<interface name="dev_dontaudit_rw_generic_chr_files" lineno="728"> <summary> Dontaudit attempts to read/write generic character device files. </summary> @@ -73357,7 +73413,7 @@ Domain to dontaudit access. </summary> </param> </interface> -<interface name="dev_create_generic_chr_files" lineno="728"> +<interface name="dev_create_generic_chr_files" lineno="746"> <summary> Create generic character device files. </summary> @@ -73367,7 +73423,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_delete_generic_chr_files" lineno="746"> +<interface name="dev_delete_generic_chr_files" lineno="764"> <summary> Delete generic character device files. </summary> @@ -73377,7 +73433,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabelfrom_generic_chr_files" lineno="764"> +<interface name="dev_relabelfrom_generic_chr_files" lineno="782"> <summary> Relabel from generic character device files. </summary> @@ -73387,7 +73443,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_generic_symlinks" lineno="783"> +<interface name="dev_dontaudit_setattr_generic_symlinks" lineno="801"> <summary> Do not audit attempts to set the attributes of symbolic links in device directories (/dev). @@ -73398,7 +73454,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_generic_symlinks" lineno="801"> +<interface name="dev_read_generic_symlinks" lineno="819"> <summary> Read symbolic links in device directories. </summary> @@ -73408,7 +73464,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_generic_symlinks" lineno="819"> +<interface name="dev_create_generic_symlinks" lineno="837"> <summary> Create symbolic links in device directories. </summary> @@ -73418,7 +73474,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_delete_generic_symlinks" lineno="837"> +<interface name="dev_delete_generic_symlinks" lineno="855"> <summary> Delete symbolic links in device directories. </summary> @@ -73428,7 +73484,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_generic_symlinks" lineno="855"> +<interface name="dev_manage_generic_symlinks" lineno="873"> <summary> Create, delete, read, and write symbolic links in device directories. </summary> @@ -73438,7 +73494,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_generic_symlinks" lineno="873"> +<interface name="dev_relabel_generic_symlinks" lineno="891"> <summary> Relabel symbolic links in device directories. </summary> @@ -73448,7 +73504,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_generic_sock_files" lineno="891"> +<interface name="dev_write_generic_sock_files" lineno="909"> <summary> Write generic sock files in /dev. </summary> @@ -73458,7 +73514,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_all_dev_nodes" lineno="909"> +<interface name="dev_manage_all_dev_nodes" lineno="927"> <summary> Create, delete, read, and write device nodes in device directories. </summary> @@ -73468,7 +73524,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_rw_generic_dev_nodes" lineno="945"> +<interface name="dev_dontaudit_rw_generic_dev_nodes" lineno="968"> <summary> Dontaudit getattr for generic device files. </summary> @@ -73478,7 +73534,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_manage_generic_blk_files" lineno="963"> +<interface name="dev_manage_generic_blk_files" lineno="986"> <summary> Create, delete, read, and write block device files. </summary> @@ -73488,7 +73544,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_generic_chr_files" lineno="981"> +<interface name="dev_manage_generic_chr_files" lineno="1004"> <summary> Create, delete, read, and write character device files. </summary> @@ -73498,7 +73554,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_filetrans" lineno="1016"> +<interface name="dev_filetrans" lineno="1039"> <summary> Create, read, and write device nodes. The node will be transitioned to the type provided. @@ -73525,7 +73581,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dev_tmpfs_filetrans_dev" lineno="1051"> +<interface name="dev_tmpfs_filetrans_dev" lineno="1074"> <summary> Create, read, and write device nodes. The node will be transitioned to the type provided. This is @@ -73549,7 +73605,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dev_getattr_all_blk_files" lineno="1070"> +<interface name="dev_getattr_all_blk_files" lineno="1093"> <summary> Getattr on all block file device nodes. </summary> @@ -73560,7 +73616,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="dev_dontaudit_getattr_all_blk_files" lineno="1089"> +<interface name="dev_dontaudit_getattr_all_blk_files" lineno="1112"> <summary> Dontaudit getattr on all block file device nodes. </summary> @@ -73570,7 +73626,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_getattr_all_chr_files" lineno="1109"> +<interface name="dev_getattr_all_chr_files" lineno="1132"> <summary> Getattr on all character file device nodes. </summary> @@ -73581,7 +73637,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="dev_dontaudit_getattr_all_chr_files" lineno="1127"> +<interface name="dev_dontaudit_getattr_all_chr_files" lineno="1151"> <summary> Dontaudit getattr on all character file device nodes. </summary> @@ -73591,7 +73647,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_all_blk_files" lineno="1147"> +<interface name="dev_setattr_all_blk_files" lineno="1171"> <summary> Setattr on all block file device nodes. </summary> @@ -73602,7 +73658,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="dev_setattr_all_chr_files" lineno="1166"> +<interface name="dev_setattr_all_chr_files" lineno="1191"> <summary> Setattr on all character file device nodes. </summary> @@ -73613,7 +73669,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="dev_dontaudit_read_all_blk_files" lineno="1184"> +<interface name="dev_dontaudit_read_all_blk_files" lineno="1210"> <summary> Dontaudit read on all block file device nodes. </summary> @@ -73623,7 +73679,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_dontaudit_write_all_blk_files" lineno="1202"> +<interface name="dev_dontaudit_write_all_blk_files" lineno="1228"> <summary> Dontaudit write on all block file device nodes. </summary> @@ -73633,7 +73689,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_dontaudit_read_all_chr_files" lineno="1220"> +<interface name="dev_dontaudit_read_all_chr_files" lineno="1246"> <summary> Dontaudit read on all character file device nodes. </summary> @@ -73643,7 +73699,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_dontaudit_write_all_chr_files" lineno="1238"> +<interface name="dev_dontaudit_write_all_chr_files" lineno="1264"> <summary> Dontaudit write on all character file device nodes. </summary> @@ -73653,7 +73709,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_create_all_blk_files" lineno="1256"> +<interface name="dev_create_all_blk_files" lineno="1282"> <summary> Create all block device files. </summary> @@ -73663,7 +73719,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_all_chr_files" lineno="1274"> +<interface name="dev_create_all_chr_files" lineno="1301"> <summary> Create all character device files. </summary> @@ -73673,7 +73729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_delete_all_blk_files" lineno="1292"> +<interface name="dev_delete_all_blk_files" lineno="1320"> <summary> Delete all block device files. </summary> @@ -73683,7 +73739,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_delete_all_chr_files" lineno="1310"> +<interface name="dev_delete_all_chr_files" lineno="1339"> <summary> Delete all character device files. </summary> @@ -73693,7 +73749,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rename_all_blk_files" lineno="1328"> +<interface name="dev_rename_all_blk_files" lineno="1358"> <summary> Rename all block device files. </summary> @@ -73703,7 +73759,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rename_all_chr_files" lineno="1346"> +<interface name="dev_rename_all_chr_files" lineno="1377"> <summary> Rename all character device files. </summary> @@ -73713,7 +73769,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_all_blk_files" lineno="1364"> +<interface name="dev_manage_all_blk_files" lineno="1396"> <summary> Read, write, create, and delete all block device files. </summary> @@ -73723,7 +73779,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_all_chr_files" lineno="1388"> +<interface name="dev_manage_all_chr_files" lineno="1421"> <summary> Read, write, create, and delete all character device files. </summary> @@ -73733,7 +73789,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_acpi_bios_dev" lineno="1408"> +<interface name="dev_getattr_acpi_bios_dev" lineno="1442"> <summary> Get the attributes of the apm bios device node. </summary> @@ -73743,7 +73799,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_acpi_bios_dev" lineno="1427"> +<interface name="dev_dontaudit_getattr_acpi_bios_dev" lineno="1461"> <summary> Do not audit attempts to get the attributes of the apm bios device node. @@ -73754,7 +73810,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_acpi_bios_dev" lineno="1445"> +<interface name="dev_setattr_acpi_bios_dev" lineno="1479"> <summary> Set the attributes of the apm bios device node. </summary> @@ -73764,7 +73820,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_acpi_bios_dev" lineno="1464"> +<interface name="dev_dontaudit_setattr_acpi_bios_dev" lineno="1498"> <summary> Do not audit attempts to set the attributes of the apm bios device node. @@ -73775,7 +73831,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_acpi_bios" lineno="1482"> +<interface name="dev_rw_acpi_bios" lineno="1516"> <summary> Read and write the apm bios. </summary> @@ -73785,7 +73841,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_agp_dev" lineno="1500"> +<interface name="dev_getattr_agp_dev" lineno="1534"> <summary> Getattr the agp devices. </summary> @@ -73795,7 +73851,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_agp" lineno="1518"> +<interface name="dev_rw_agp" lineno="1552"> <summary> Read and write the agp devices. </summary> @@ -73805,7 +73861,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_autofs_dev" lineno="1537"> +<interface name="dev_getattr_autofs_dev" lineno="1571"> <summary> Get the attributes of the autofs device node. </summary> @@ -73815,7 +73871,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_autofs_dev" lineno="1556"> +<interface name="dev_dontaudit_getattr_autofs_dev" lineno="1590"> <summary> Do not audit attempts to get the attributes of the autofs device node. @@ -73826,7 +73882,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_autofs_dev" lineno="1574"> +<interface name="dev_setattr_autofs_dev" lineno="1608"> <summary> Set the attributes of the autofs device node. </summary> @@ -73836,7 +73892,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_autofs_dev" lineno="1593"> +<interface name="dev_dontaudit_setattr_autofs_dev" lineno="1627"> <summary> Do not audit attempts to set the attributes of the autofs device node. @@ -73847,7 +73903,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_autofs" lineno="1611"> +<interface name="dev_rw_autofs" lineno="1645"> <summary> Read and write the autofs device. </summary> @@ -73857,7 +73913,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_autofs_dev" lineno="1629"> +<interface name="dev_relabel_autofs_dev" lineno="1663"> <summary> Relabel the autofs device node. </summary> @@ -73867,7 +73923,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_cachefiles" lineno="1648"> +<interface name="dev_rw_cachefiles" lineno="1682"> <summary> Read and write cachefiles character device nodes. @@ -73878,7 +73934,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_cardmgr" lineno="1666"> +<interface name="dev_rw_cardmgr" lineno="1700"> <summary> Read and write the PCMCIA card manager device. </summary> @@ -73888,7 +73944,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_rw_cardmgr" lineno="1685"> +<interface name="dev_dontaudit_rw_cardmgr" lineno="1719"> <summary> Do not audit attempts to read and write the PCMCIA card manager device. @@ -73899,7 +73955,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_create_cardmgr_dev" lineno="1705"> +<interface name="dev_create_cardmgr_dev" lineno="1739"> <summary> Create, read, write, and delete the PCMCIA card manager device @@ -73911,7 +73967,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_cardmgr_dev" lineno="1725"> +<interface name="dev_manage_cardmgr_dev" lineno="1759"> <summary> Create, read, write, and delete the PCMCIA card manager device. @@ -73922,7 +73978,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_filetrans_cardmgr" lineno="1751"> +<interface name="dev_filetrans_cardmgr" lineno="1785"> <summary> Automatic type transition to the type for PCMCIA card manager device nodes when @@ -73939,7 +73995,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dev_getattr_cpu_dev" lineno="1770"> +<interface name="dev_getattr_cpu_dev" lineno="1804"> <summary> Get the attributes of the CPU microcode and id interfaces. @@ -73950,7 +74006,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_cpu_dev" lineno="1789"> +<interface name="dev_setattr_cpu_dev" lineno="1823"> <summary> Set the attributes of the CPU microcode and id interfaces. @@ -73961,7 +74017,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_cpuid" lineno="1807"> +<interface name="dev_read_cpuid" lineno="1841"> <summary> Read the CPU identity. </summary> @@ -73971,7 +74027,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_cpu_microcode" lineno="1826"> +<interface name="dev_rw_cpu_microcode" lineno="1860"> <summary> Read and write the the CPU microcode device. This is required to load CPU microcode. @@ -73982,7 +74038,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_crash" lineno="1844"> +<interface name="dev_read_crash" lineno="1878"> <summary> Read the kernel crash device </summary> @@ -73992,7 +74048,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_crypto" lineno="1862"> +<interface name="dev_rw_crypto" lineno="1896"> <summary> Read and write the the hardware SSL accelerator. </summary> @@ -74002,7 +74058,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_dlm_control" lineno="1880"> +<interface name="dev_setattr_dlm_control" lineno="1914"> <summary> Set the attributes of the dlm control devices. </summary> @@ -74012,7 +74068,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_dlm_control" lineno="1898"> +<interface name="dev_rw_dlm_control" lineno="1932"> <summary> Read and write the the dlm control device </summary> @@ -74022,7 +74078,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_dri_dev" lineno="1916"> +<interface name="dev_getattr_dri_dev" lineno="1950"> <summary> getattr the dri devices. </summary> @@ -74032,7 +74088,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_dri_dev" lineno="1934"> +<interface name="dev_setattr_dri_dev" lineno="1968"> <summary> Setattr the dri devices. </summary> @@ -74042,7 +74098,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_dri" lineno="1952"> +<interface name="dev_ioctl_dri_dev" lineno="1986"> +<summary> +IOCTL the dri devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_dri" lineno="2004"> <summary> Read and write the dri devices. </summary> @@ -74052,7 +74118,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_rw_dri" lineno="1971"> +<interface name="dev_dontaudit_rw_dri" lineno="2023"> <summary> Dontaudit read and write on the dri devices. </summary> @@ -74062,7 +74128,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_manage_dri_dev" lineno="1989"> +<interface name="dev_manage_dri_dev" lineno="2041"> <summary> Create, read, write, and delete the dri devices. </summary> @@ -74072,7 +74138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_filetrans_dri" lineno="2014"> +<interface name="dev_filetrans_dri" lineno="2066"> <summary> Automatic type transition to the type for DRI device nodes when created in /dev. @@ -74088,7 +74154,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dev_filetrans_input_dev" lineno="2038"> +<interface name="dev_filetrans_input_dev" lineno="2090"> <summary> Automatic type transition to the type for event device nodes when created in /dev. @@ -74104,7 +74170,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dev_getattr_input_dev" lineno="2056"> +<interface name="dev_getattr_input_dev" lineno="2108"> <summary> Get the attributes of the event devices. </summary> @@ -74114,7 +74180,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_input_dev" lineno="2075"> +<interface name="dev_setattr_input_dev" lineno="2127"> <summary> Set the attributes of the event devices. </summary> @@ -74124,7 +74190,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_input" lineno="2094"> +<interface name="dev_read_input" lineno="2146"> <summary> Read input event devices (/dev/input). </summary> @@ -74134,7 +74200,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_input_dev" lineno="2112"> +<interface name="dev_rw_input_dev" lineno="2164"> <summary> Read and write input event devices (/dev/input). </summary> @@ -74144,7 +74210,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_input_dev" lineno="2130"> +<interface name="dev_manage_input_dev" lineno="2182"> <summary> Create, read, write, and delete input event devices (/dev/input). </summary> @@ -74154,7 +74220,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_framebuffer_dev" lineno="2148"> +<interface name="dev_getattr_framebuffer_dev" lineno="2200"> <summary> Get the attributes of the framebuffer device node. </summary> @@ -74164,7 +74230,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_framebuffer_dev" lineno="2166"> +<interface name="dev_setattr_framebuffer_dev" lineno="2218"> <summary> Set the attributes of the framebuffer device node. </summary> @@ -74174,7 +74240,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2185"> +<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2237"> <summary> Dot not audit attempts to set the attributes of the framebuffer device node. @@ -74185,7 +74251,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_framebuffer" lineno="2203"> +<interface name="dev_read_framebuffer" lineno="2255"> <summary> Read the framebuffer. </summary> @@ -74195,7 +74261,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_read_framebuffer" lineno="2221"> +<interface name="dev_dontaudit_read_framebuffer" lineno="2273"> <summary> Do not audit attempts to read the framebuffer. </summary> @@ -74205,7 +74271,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_framebuffer" lineno="2239"> +<interface name="dev_write_framebuffer" lineno="2291"> <summary> Write the framebuffer. </summary> @@ -74215,7 +74281,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_framebuffer" lineno="2257"> +<interface name="dev_rw_framebuffer" lineno="2309"> <summary> Read and write the framebuffer. </summary> @@ -74225,7 +74291,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_kmsg" lineno="2275"> +<interface name="dev_read_kmsg" lineno="2327"> <summary> Read the kernel messages </summary> @@ -74235,7 +74301,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_read_kmsg" lineno="2293"> +<interface name="dev_dontaudit_read_kmsg" lineno="2345"> <summary> Do not audit attempts to read the kernel messages </summary> @@ -74245,7 +74311,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_kmsg" lineno="2311"> +<interface name="dev_write_kmsg" lineno="2363"> <summary> Write to the kernel messages device </summary> @@ -74255,7 +74321,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_kmsg" lineno="2329"> +<interface name="dev_rw_kmsg" lineno="2381"> <summary> Read and write to the kernel messages device </summary> @@ -74265,7 +74331,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_ksm_dev" lineno="2347"> +<interface name="dev_mounton_kmsg" lineno="2399"> +<summary> +Mount on the kernel messages device +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_ksm_dev" lineno="2417"> <summary> Get the attributes of the ksm devices. </summary> @@ -74275,7 +74351,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_ksm_dev" lineno="2365"> +<interface name="dev_setattr_ksm_dev" lineno="2435"> <summary> Set the attributes of the ksm devices. </summary> @@ -74285,7 +74361,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_ksm" lineno="2383"> +<interface name="dev_read_ksm" lineno="2453"> <summary> Read the ksm devices. </summary> @@ -74295,7 +74371,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_ksm" lineno="2401"> +<interface name="dev_rw_ksm" lineno="2471"> <summary> Read and write to ksm devices. </summary> @@ -74305,7 +74381,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_kvm_dev" lineno="2419"> +<interface name="dev_getattr_kvm_dev" lineno="2489"> <summary> Get the attributes of the kvm devices. </summary> @@ -74315,7 +74391,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_kvm_dev" lineno="2437"> +<interface name="dev_setattr_kvm_dev" lineno="2507"> <summary> Set the attributes of the kvm devices. </summary> @@ -74325,7 +74401,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_kvm" lineno="2455"> +<interface name="dev_read_kvm" lineno="2525"> <summary> Read the kvm devices. </summary> @@ -74335,7 +74411,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_kvm" lineno="2473"> +<interface name="dev_rw_kvm" lineno="2543"> <summary> Read and write to kvm devices. </summary> @@ -74345,7 +74421,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_lirc" lineno="2491"> +<interface name="dev_read_lirc" lineno="2561"> <summary> Read the lirc device. </summary> @@ -74355,7 +74431,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_lirc" lineno="2509"> +<interface name="dev_rw_lirc" lineno="2579"> <summary> Read and write the lirc device. </summary> @@ -74365,7 +74441,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_filetrans_lirc" lineno="2533"> +<interface name="dev_filetrans_lirc" lineno="2603"> <summary> Automatic type transition to the type for lirc device nodes when created in /dev. @@ -74381,7 +74457,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dev_rw_loop_control" lineno="2551"> +<interface name="dev_rw_loop_control" lineno="2621"> <summary> Read and write the loop-control device. </summary> @@ -74391,7 +74467,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_lvm_control" lineno="2569"> +<interface name="dev_getattr_lvm_control" lineno="2639"> <summary> Get the attributes of the lvm comtrol device. </summary> @@ -74401,7 +74477,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_lvm_control" lineno="2587"> +<interface name="dev_read_lvm_control" lineno="2657"> <summary> Read the lvm comtrol device. </summary> @@ -74411,7 +74487,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_lvm_control" lineno="2605"> +<interface name="dev_rw_lvm_control" lineno="2675"> <summary> Read and write the lvm control device. </summary> @@ -74421,7 +74497,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_rw_lvm_control" lineno="2623"> +<interface name="dev_dontaudit_rw_lvm_control" lineno="2693"> <summary> Do not audit attempts to read and write lvm control device. </summary> @@ -74431,7 +74507,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_delete_lvm_control_dev" lineno="2641"> +<interface name="dev_delete_lvm_control_dev" lineno="2711"> <summary> Delete the lvm control device. </summary> @@ -74441,7 +74517,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_memory_dev" lineno="2659"> +<interface name="dev_dontaudit_getattr_memory_dev" lineno="2729"> <summary> dontaudit getattr raw memory devices (e.g. /dev/mem). </summary> @@ -74451,7 +74527,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_raw_memory" lineno="2677"> +<interface name="dev_read_raw_memory" lineno="2747"> <summary> Read raw memory devices (e.g. /dev/mem). </summary> @@ -74461,7 +74537,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_read_raw_memory" lineno="2700"> +<interface name="dev_dontaudit_read_raw_memory" lineno="2770"> <summary> Do not audit attempts to read raw memory devices (e.g. /dev/mem). @@ -74472,7 +74548,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_raw_memory" lineno="2718"> +<interface name="dev_write_raw_memory" lineno="2788"> <summary> Write raw memory devices (e.g. /dev/mem). </summary> @@ -74482,7 +74558,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rx_raw_memory" lineno="2740"> +<interface name="dev_rx_raw_memory" lineno="2810"> <summary> Read and execute raw memory devices (e.g. /dev/mem). </summary> @@ -74492,7 +74568,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_wx_raw_memory" lineno="2759"> +<interface name="dev_wx_raw_memory" lineno="2829"> <summary> Write and execute raw memory devices (e.g. /dev/mem). </summary> @@ -74502,7 +74578,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_misc_dev" lineno="2778"> +<interface name="dev_getattr_misc_dev" lineno="2848"> <summary> Get the attributes of miscellaneous devices. </summary> @@ -74512,7 +74588,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_misc_dev" lineno="2797"> +<interface name="dev_dontaudit_getattr_misc_dev" lineno="2867"> <summary> Do not audit attempts to get the attributes of miscellaneous devices. @@ -74523,7 +74599,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_misc_dev" lineno="2815"> +<interface name="dev_setattr_misc_dev" lineno="2885"> <summary> Set the attributes of miscellaneous devices. </summary> @@ -74533,7 +74609,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_misc_dev" lineno="2834"> +<interface name="dev_dontaudit_setattr_misc_dev" lineno="2904"> <summary> Do not audit attempts to set the attributes of miscellaneous devices. @@ -74544,7 +74620,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_misc" lineno="2852"> +<interface name="dev_read_misc" lineno="2922"> <summary> Read miscellaneous devices. </summary> @@ -74554,7 +74630,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_misc" lineno="2870"> +<interface name="dev_write_misc" lineno="2940"> <summary> Write miscellaneous devices. </summary> @@ -74564,7 +74640,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_rw_misc" lineno="2888"> +<interface name="dev_dontaudit_rw_misc" lineno="2958"> <summary> Do not audit attempts to read and write miscellaneous devices. </summary> @@ -74574,7 +74650,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_modem_dev" lineno="2906"> +<interface name="dev_getattr_modem_dev" lineno="2976"> <summary> Get the attributes of the modem devices. </summary> @@ -74584,7 +74660,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_modem_dev" lineno="2924"> +<interface name="dev_setattr_modem_dev" lineno="2994"> <summary> Set the attributes of the modem devices. </summary> @@ -74594,7 +74670,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_modem" lineno="2942"> +<interface name="dev_read_modem" lineno="3012"> <summary> Read the modem devices. </summary> @@ -74604,7 +74680,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_modem" lineno="2960"> +<interface name="dev_rw_modem" lineno="3030"> <summary> Read and write to modem devices. </summary> @@ -74614,7 +74690,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_mouse_dev" lineno="2978"> +<interface name="dev_getattr_mouse_dev" lineno="3048"> <summary> Get the attributes of the mouse devices. </summary> @@ -74624,7 +74700,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_mouse_dev" lineno="2996"> +<interface name="dev_setattr_mouse_dev" lineno="3066"> <summary> Set the attributes of the mouse devices. </summary> @@ -74634,7 +74710,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_mouse" lineno="3014"> +<interface name="dev_read_mouse" lineno="3084"> <summary> Read the mouse devices. </summary> @@ -74644,7 +74720,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_mouse" lineno="3032"> +<interface name="dev_rw_mouse" lineno="3102"> <summary> Read and write to mouse devices. </summary> @@ -74654,7 +74730,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_mtrr_dev" lineno="3051"> +<interface name="dev_getattr_mtrr_dev" lineno="3121"> <summary> Get the attributes of the memory type range registers (MTRR) device. @@ -74665,7 +74741,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_write_mtrr" lineno="3071"> +<interface name="dev_dontaudit_write_mtrr" lineno="3141"> <summary> Do not audit attempts to write the memory type range registers (MTRR). @@ -74676,7 +74752,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_mtrr" lineno="3090"> +<interface name="dev_rw_mtrr" lineno="3160"> <summary> Read and write the memory type range registers (MTRR). </summary> @@ -74686,9 +74762,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_netcontrol_dev" lineno="3109"> +<interface name="dev_getattr_netcontrol_dev" lineno="3179"> <summary> -Get the attributes of the network control device +Get the attributes of the network control device (Deprecated) </summary> <param name="domain"> <summary> @@ -74696,9 +74772,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_netcontrol" lineno="3127"> +<interface name="dev_read_netcontrol" lineno="3194"> <summary> -Read the network control identity. +Read the network control identity. (Deprecated) </summary> <param name="domain"> <summary> @@ -74706,9 +74782,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_netcontrol" lineno="3145"> +<interface name="dev_rw_netcontrol" lineno="3209"> <summary> -Read and write the the network control device. +Read and write the the network control device. (Deprecated) </summary> <param name="domain"> <summary> @@ -74716,7 +74792,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_null_dev" lineno="3163"> +<interface name="dev_getattr_null_dev" lineno="3224"> <summary> Get the attributes of the null device nodes. </summary> @@ -74726,7 +74802,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_null_dev" lineno="3181"> +<interface name="dev_setattr_null_dev" lineno="3242"> <summary> Set the attributes of the null device nodes. </summary> @@ -74736,7 +74812,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_delete_null" lineno="3199"> +<interface name="dev_delete_null" lineno="3260"> <summary> Delete the null device (/dev/null). </summary> @@ -74746,7 +74822,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_null" lineno="3217"> +<interface name="dev_rw_null" lineno="3278"> <summary> Read and write to the null device (/dev/null). </summary> @@ -74756,7 +74832,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_null_dev" lineno="3235"> +<interface name="dev_create_null_dev" lineno="3296"> <summary> Create the null device (/dev/null). </summary> @@ -74766,7 +74842,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_null_service" lineno="3254"> +<interface name="dev_manage_null_service" lineno="3315"> <summary> Manage services with script type null_device_t for when /lib/systemd/system/something.service is a link to /dev/null @@ -74777,7 +74853,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3274"> +<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3335"> <summary> Do not audit attempts to get the attributes of the BIOS non-volatile RAM device. @@ -74788,7 +74864,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_nvram" lineno="3292"> +<interface name="dev_rw_nvram" lineno="3353"> <summary> Read and write BIOS non-volatile RAM. </summary> @@ -74798,7 +74874,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_printer_dev" lineno="3310"> +<interface name="dev_getattr_printer_dev" lineno="3371"> <summary> Get the attributes of the printer device nodes. </summary> @@ -74808,7 +74884,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_printer_dev" lineno="3328"> +<interface name="dev_setattr_printer_dev" lineno="3389"> <summary> Set the attributes of the printer device nodes. </summary> @@ -74818,7 +74894,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_append_printer" lineno="3347"> +<interface name="dev_append_printer" lineno="3408"> <summary> Append the printer device. </summary> @@ -74828,7 +74904,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_printer" lineno="3365"> +<interface name="dev_rw_printer" lineno="3426"> <summary> Read and write the printer device. </summary> @@ -74838,7 +74914,37 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_printk" lineno="3383"> +<interface name="dev_getattr_pmqos_dev" lineno="3444"> +<summary> +Get the attributes of PM QoS devices +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_pmqos" lineno="3462"> +<summary> +Read the PM QoS devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_pmqos" lineno="3480"> +<summary> +Read and write the the PM QoS devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_printk" lineno="3498"> <summary> Read printk devices (e.g., /dev/kmsg /dev/mcelog) </summary> @@ -74848,7 +74954,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_qemu_dev" lineno="3398"> +<interface name="dev_getattr_qemu_dev" lineno="3513"> <summary> Get the attributes of the QEMU microcode and id interfaces. @@ -74859,7 +74965,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_qemu_dev" lineno="3417"> +<interface name="dev_setattr_qemu_dev" lineno="3532"> <summary> Set the attributes of the QEMU microcode and id interfaces. @@ -74870,7 +74976,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_qemu" lineno="3435"> +<interface name="dev_read_qemu" lineno="3550"> <summary> Read the QEMU device </summary> @@ -74880,7 +74986,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_qemu" lineno="3453"> +<interface name="dev_rw_qemu" lineno="3568"> <summary> Read and write the the QEMU device. </summary> @@ -74890,7 +74996,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_rand" lineno="3487"> +<interface name="dev_read_rand" lineno="3602"> <summary> Read from random number generator devices (e.g., /dev/random). @@ -74916,7 +75022,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="dev_dontaudit_read_rand" lineno="3506"> +<interface name="dev_dontaudit_read_rand" lineno="3621"> <summary> Do not audit attempts to read from random number generator devices (e.g., /dev/random) @@ -74927,7 +75033,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_dontaudit_append_rand" lineno="3525"> +<interface name="dev_dontaudit_append_rand" lineno="3640"> <summary> Do not audit attempts to append to random number generator devices (e.g., /dev/random) @@ -74938,7 +75044,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_rand" lineno="3545"> +<interface name="dev_write_rand" lineno="3660"> <summary> Write to the random device (e.g., /dev/random). This adds entropy used to generate the random data read from the @@ -74950,7 +75056,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_realtime_clock" lineno="3563"> +<interface name="dev_read_realtime_clock" lineno="3678"> <summary> Read the realtime clock (/dev/rtc). </summary> @@ -74960,7 +75066,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_realtime_clock" lineno="3581"> +<interface name="dev_write_realtime_clock" lineno="3696"> <summary> Set the realtime clock (/dev/rtc). </summary> @@ -74970,7 +75076,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_realtime_clock" lineno="3601"> +<interface name="dev_rw_realtime_clock" lineno="3716"> <summary> Read and set the realtime clock (/dev/rtc). </summary> @@ -74980,7 +75086,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_scanner_dev" lineno="3616"> +<interface name="dev_getattr_scanner_dev" lineno="3731"> <summary> Get the attributes of the scanner device. </summary> @@ -74990,7 +75096,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3635"> +<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3750"> <summary> Do not audit attempts to get the attributes of the scanner device. @@ -75001,7 +75107,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_scanner_dev" lineno="3653"> +<interface name="dev_setattr_scanner_dev" lineno="3768"> <summary> Set the attributes of the scanner device. </summary> @@ -75011,7 +75117,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3672"> +<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3787"> <summary> Do not audit attempts to set the attributes of the scanner device. @@ -75022,7 +75128,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_scanner" lineno="3690"> +<interface name="dev_rw_scanner" lineno="3805"> <summary> Read and write the scanner device. </summary> @@ -75032,7 +75138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_sound_dev" lineno="3708"> +<interface name="dev_getattr_sound_dev" lineno="3823"> <summary> Get the attributes of the sound devices. </summary> @@ -75042,7 +75148,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_sound_dev" lineno="3726"> +<interface name="dev_setattr_sound_dev" lineno="3841"> <summary> Set the attributes of the sound devices. </summary> @@ -75052,7 +75158,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_sound" lineno="3744"> +<interface name="dev_read_sound" lineno="3859"> <summary> Read the sound devices. </summary> @@ -75062,7 +75168,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_sound" lineno="3763"> +<interface name="dev_write_sound" lineno="3878"> <summary> Write the sound devices. </summary> @@ -75072,7 +75178,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_sound_mixer" lineno="3782"> +<interface name="dev_read_sound_mixer" lineno="3897"> <summary> Read the sound mixer devices. </summary> @@ -75082,7 +75188,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_sound_mixer" lineno="3801"> +<interface name="dev_write_sound_mixer" lineno="3916"> <summary> Write the sound mixer devices. </summary> @@ -75092,7 +75198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_power_mgmt_dev" lineno="3820"> +<interface name="dev_getattr_power_mgmt_dev" lineno="3935"> <summary> Get the attributes of the the power management device. </summary> @@ -75102,7 +75208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_power_mgmt_dev" lineno="3838"> +<interface name="dev_setattr_power_mgmt_dev" lineno="3953"> <summary> Set the attributes of the the power management device. </summary> @@ -75112,7 +75218,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_power_management" lineno="3856"> +<interface name="dev_rw_power_management" lineno="3971"> <summary> Read and write the the power management device. </summary> @@ -75122,7 +75228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_smartcard_dev" lineno="3874"> +<interface name="dev_getattr_smartcard_dev" lineno="3989"> <summary> Getattr on smartcard devices </summary> @@ -75132,7 +75238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="3893"> +<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4008"> <summary> dontaudit getattr on smartcard devices </summary> @@ -75142,7 +75248,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_smartcard" lineno="3912"> +<interface name="dev_rw_smartcard" lineno="4027"> <summary> Read and write smartcard devices. </summary> @@ -75152,7 +75258,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_smartcard" lineno="3930"> +<interface name="dev_manage_smartcard" lineno="4045"> <summary> Create, read, write, and delete smartcard devices. </summary> @@ -75162,7 +75268,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mounton_sysfs" lineno="3948"> +<interface name="dev_mounton_sysfs" lineno="4063"> <summary> Mount a filesystem on sysfs. </summary> @@ -75172,7 +75278,7 @@ Domain allow access. </summary> </param> </interface> -<interface name="dev_associate_sysfs" lineno="3966"> +<interface name="dev_associate_sysfs" lineno="4081"> <summary> Associate a file to a sysfs filesystem. </summary> @@ -75182,7 +75288,7 @@ The type of the file to be associated to sysfs. </summary> </param> </interface> -<interface name="dev_getattr_sysfs_dirs" lineno="3984"> +<interface name="dev_getattr_sysfs_dirs" lineno="4099"> <summary> Get the attributes of sysfs directories. </summary> @@ -75192,7 +75298,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_sysfs" lineno="4002"> +<interface name="dev_getattr_sysfs" lineno="4117"> <summary> Get the attributes of sysfs filesystem </summary> @@ -75202,7 +75308,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mount_sysfs" lineno="4020"> +<interface name="dev_mount_sysfs" lineno="4135"> <summary> mount a sysfs filesystem </summary> @@ -75212,7 +75318,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_sysfs" lineno="4038"> +<interface name="dev_dontaudit_getattr_sysfs" lineno="4153"> <summary> Do not audit getting the attributes of sysfs filesystem </summary> @@ -75222,7 +75328,7 @@ Domain to dontaudit access from </summary> </param> </interface> -<interface name="dev_dontaudit_read_sysfs" lineno="4056"> +<interface name="dev_dontaudit_read_sysfs" lineno="4171"> <summary> Dont audit attempts to read hardware state information </summary> @@ -75232,7 +75338,7 @@ Domain for which the attempts do not need to be audited </summary> </param> </interface> -<interface name="dev_mounton_sysfs_dirs" lineno="4076"> +<interface name="dev_mounton_sysfs_dirs" lineno="4191"> <summary> mounton sysfs directories. </summary> @@ -75242,7 +75348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_search_sysfs" lineno="4094"> +<interface name="dev_search_sysfs" lineno="4209"> <summary> Search the sysfs directories. </summary> @@ -75252,7 +75358,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_search_sysfs" lineno="4112"> +<interface name="dev_dontaudit_search_sysfs" lineno="4227"> <summary> Do not audit attempts to search sysfs. </summary> @@ -75262,7 +75368,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_list_sysfs" lineno="4130"> +<interface name="dev_list_sysfs" lineno="4245"> <summary> List the contents of the sysfs directories. </summary> @@ -75272,7 +75378,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_sysfs_dirs" lineno="4149"> +<interface name="dev_write_sysfs_dirs" lineno="4264"> <summary> Write in a sysfs directories. </summary> @@ -75282,7 +75388,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4167"> +<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4282"> <summary> Do not audit attempts to write in a sysfs directory. </summary> @@ -75292,7 +75398,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_manage_sysfs_dirs" lineno="4186"> +<interface name="dev_manage_sysfs_dirs" lineno="4301"> <summary> Create, read, write, and delete sysfs directories. @@ -75303,7 +75409,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_sysfs" lineno="4213"> +<interface name="dev_read_sysfs" lineno="4328"> <summary> Read hardware state information. </summary> @@ -75322,7 +75428,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="dev_rw_sysfs" lineno="4234"> +<interface name="dev_rw_sysfs" lineno="4349"> <summary> Allow caller to modify hardware state information. </summary> @@ -75332,7 +75438,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_sysfs_files" lineno="4255"> +<interface name="dev_create_sysfs_files" lineno="4370"> <summary> Add a sysfs file </summary> @@ -75342,7 +75448,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_sysfs_dirs" lineno="4273"> +<interface name="dev_relabel_sysfs_dirs" lineno="4388"> <summary> Relabel hardware state directories. </summary> @@ -75352,7 +75458,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_all_sysfs" lineno="4291"> +<interface name="dev_relabel_all_sysfs" lineno="4406"> <summary> Relabel from/to all sysfs types. </summary> @@ -75362,7 +75468,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_tpm" lineno="4311"> +<interface name="dev_setattr_all_sysfs" lineno="4426"> +<summary> +Set the attributes of sysfs files, directories and symlinks. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_tpm" lineno="4446"> <summary> Read and write the TPM device. </summary> @@ -75372,7 +75488,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_urand" lineno="4352"> +<interface name="dev_read_urand" lineno="4487"> <summary> Read from pseudo random number generator devices (e.g., /dev/urandom). </summary> @@ -75405,7 +75521,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="dev_dontaudit_read_urand" lineno="4371"> +<interface name="dev_dontaudit_read_urand" lineno="4506"> <summary> Do not audit attempts to read from pseudo random devices (e.g., /dev/urandom) @@ -75416,7 +75532,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_urand" lineno="4390"> +<interface name="dev_write_urand" lineno="4525"> <summary> Write to the pseudo random device (e.g., /dev/urandom). This sets the random number generator seed. @@ -75427,7 +75543,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_generic_usb_dev" lineno="4408"> +<interface name="dev_getattr_generic_usb_dev" lineno="4543"> <summary> Getattr generic the USB devices. </summary> @@ -75437,7 +75553,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_generic_usb_dev" lineno="4426"> +<interface name="dev_setattr_generic_usb_dev" lineno="4561"> <summary> Setattr generic the USB devices. </summary> @@ -75447,7 +75563,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_generic_usb_dev" lineno="4444"> +<interface name="dev_read_generic_usb_dev" lineno="4579"> <summary> Read generic the USB devices. </summary> @@ -75457,7 +75573,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_generic_usb_dev" lineno="4462"> +<interface name="dev_rw_generic_usb_dev" lineno="4597"> <summary> Read and write generic the USB devices. </summary> @@ -75467,7 +75583,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_generic_usb_dev" lineno="4480"> +<interface name="dev_relabel_generic_usb_dev" lineno="4615"> <summary> Relabel generic the USB devices. </summary> @@ -75477,7 +75593,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_usbmon_dev" lineno="4498"> +<interface name="dev_read_usbmon_dev" lineno="4633"> <summary> Read USB monitor devices. </summary> @@ -75487,7 +75603,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_usbmon_dev" lineno="4516"> +<interface name="dev_write_usbmon_dev" lineno="4651"> <summary> Write USB monitor devices. </summary> @@ -75497,7 +75613,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mount_usbfs" lineno="4534"> +<interface name="dev_mount_usbfs" lineno="4669"> <summary> Mount a usbfs filesystem. </summary> @@ -75507,7 +75623,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_associate_usbfs" lineno="4552"> +<interface name="dev_associate_usbfs" lineno="4687"> <summary> Associate a file to a usbfs filesystem. </summary> @@ -75517,7 +75633,7 @@ The type of the file to be associated to usbfs. </summary> </param> </interface> -<interface name="dev_getattr_usbfs_dirs" lineno="4570"> +<interface name="dev_getattr_usbfs_dirs" lineno="4705"> <summary> Get the attributes of a directory in the usb filesystem. </summary> @@ -75527,7 +75643,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4589"> +<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4724"> <summary> Do not audit attempts to get the attributes of a directory in the usb filesystem. @@ -75538,7 +75654,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_search_usbfs" lineno="4607"> +<interface name="dev_search_usbfs" lineno="4742"> <summary> Search the directory containing USB hardware information. </summary> @@ -75548,7 +75664,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_list_usbfs" lineno="4625"> +<interface name="dev_list_usbfs" lineno="4760"> <summary> Allow caller to get a list of usb hardware. </summary> @@ -75558,7 +75674,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_usbfs_files" lineno="4646"> +<interface name="dev_setattr_usbfs_files" lineno="4781"> <summary> Set the attributes of usbfs filesystem. </summary> @@ -75568,7 +75684,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_usbfs" lineno="4666"> +<interface name="dev_read_usbfs" lineno="4801"> <summary> Read USB hardware information using the usbfs filesystem interface. @@ -75579,7 +75695,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_usbfs" lineno="4686"> +<interface name="dev_rw_usbfs" lineno="4821"> <summary> Allow caller to modify usb hardware configuration files. </summary> @@ -75589,7 +75705,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_video_dev" lineno="4706"> +<interface name="dev_getattr_video_dev" lineno="4841"> <summary> Get the attributes of video4linux devices. </summary> @@ -75599,7 +75715,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_userio_dev" lineno="4724"> +<interface name="dev_rw_userio_dev" lineno="4859"> <summary> Read and write userio device. </summary> @@ -75609,7 +75725,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_video_dev" lineno="4743"> +<interface name="dev_dontaudit_getattr_video_dev" lineno="4878"> <summary> Do not audit attempts to get the attributes of video4linux device nodes. @@ -75620,7 +75736,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_video_dev" lineno="4761"> +<interface name="dev_setattr_video_dev" lineno="4896"> <summary> Set the attributes of video4linux device nodes. </summary> @@ -75630,7 +75746,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_video_dev" lineno="4780"> +<interface name="dev_dontaudit_setattr_video_dev" lineno="4915"> <summary> Do not audit attempts to set the attributes of video4linux device nodes. @@ -75641,7 +75757,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_video_dev" lineno="4798"> +<interface name="dev_read_video_dev" lineno="4933"> <summary> Read the video4linux devices. </summary> @@ -75651,7 +75767,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_video_dev" lineno="4816"> +<interface name="dev_write_video_dev" lineno="4951"> <summary> Write the video4linux devices. </summary> @@ -75661,7 +75777,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_vfio_dev" lineno="4834"> +<interface name="dev_rw_vfio_dev" lineno="4969"> <summary> Read and write vfio devices. </summary> @@ -75671,7 +75787,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabelfrom_vfio_dev" lineno="4852"> +<interface name="dev_relabelfrom_vfio_dev" lineno="4987"> <summary> Relabel vfio devices. </summary> @@ -75681,7 +75797,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_vhost" lineno="4870"> +<interface name="dev_rw_vhost" lineno="5005"> <summary> Allow read/write the vhost devices </summary> @@ -75691,7 +75807,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_vmware" lineno="4888"> +<interface name="dev_rw_vmware" lineno="5023"> <summary> Read and write VMWare devices. </summary> @@ -75701,7 +75817,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rwx_vmware" lineno="4906"> +<interface name="dev_rwx_vmware" lineno="5041"> <summary> Read, write, and mmap VMWare devices. </summary> @@ -75711,7 +75827,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_watchdog" lineno="4925"> +<interface name="dev_read_watchdog" lineno="5060"> <summary> Read from watchdog devices. </summary> @@ -75721,7 +75837,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_watchdog" lineno="4943"> +<interface name="dev_write_watchdog" lineno="5078"> <summary> Write to watchdog devices. </summary> @@ -75731,7 +75847,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_wireless" lineno="4961"> +<interface name="dev_rw_wireless" lineno="5096"> <summary> Read and write the the wireless device. </summary> @@ -75741,7 +75857,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_wireless" lineno="4979"> +<interface name="dev_manage_wireless" lineno="5114"> <summary> manage the wireless device. </summary> @@ -75751,7 +75867,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_xen" lineno="4997"> +<interface name="dev_rw_xen" lineno="5132"> <summary> Read and write Xen devices. </summary> @@ -75761,7 +75877,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_xen" lineno="5016"> +<interface name="dev_manage_xen" lineno="5151"> <summary> Create, read, write, and delete Xen devices. </summary> @@ -75771,7 +75887,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_filetrans_xen" lineno="5040"> +<interface name="dev_filetrans_xen" lineno="5175"> <summary> Automatic type transition to the type for xen device nodes when created in /dev. @@ -75787,7 +75903,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dev_getattr_xserver_misc_dev" lineno="5058"> +<interface name="dev_getattr_xserver_misc_dev" lineno="5193"> <summary> Get the attributes of X server miscellaneous devices. </summary> @@ -75797,7 +75913,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_xserver_misc_dev" lineno="5076"> +<interface name="dev_setattr_xserver_misc_dev" lineno="5211"> <summary> Set the attributes of X server miscellaneous devices. </summary> @@ -75807,7 +75923,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_xserver_misc" lineno="5094"> +<interface name="dev_rw_xserver_misc" lineno="5229"> <summary> Read and write X server miscellaneous devices. </summary> @@ -75817,7 +75933,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_map_xserver_misc" lineno="5112"> +<interface name="dev_map_xserver_misc" lineno="5247"> <summary> Map X server miscellaneous devices. </summary> @@ -75827,7 +75943,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_zero" lineno="5130"> +<interface name="dev_rw_zero" lineno="5265"> <summary> Read and write to the zero device (/dev/zero). </summary> @@ -75837,7 +75953,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rwx_zero" lineno="5148"> +<interface name="dev_rwx_zero" lineno="5283"> <summary> Read, write, and execute the zero device (/dev/zero). </summary> @@ -75847,7 +75963,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_execmod_zero" lineno="5167"> +<interface name="dev_execmod_zero" lineno="5302"> <summary> Execmod the zero device (/dev/zero). </summary> @@ -75857,7 +75973,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_zero_dev" lineno="5186"> +<interface name="dev_create_zero_dev" lineno="5321"> <summary> Create the zero device (/dev/zero). </summary> @@ -75867,7 +75983,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_cpu_online" lineno="5209"> +<interface name="dev_read_cpu_online" lineno="5344"> <summary> Read cpu online hardware state information </summary> @@ -75882,7 +75998,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_unconfined" lineno="5229"> +<interface name="dev_unconfined" lineno="5364"> <summary> Unconfined access to devices. </summary> @@ -75892,7 +76008,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_cpu_online" lineno="5249"> +<interface name="dev_relabel_cpu_online" lineno="5384"> <summary> Relabel cpu online hardware state information. </summary> @@ -75902,7 +76018,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_read_usbmon_dev" lineno="5268"> +<interface name="dev_dontaudit_read_usbmon_dev" lineno="5403"> <summary> Dont audit attempts to read usbmon devices </summary> @@ -76976,7 +77092,7 @@ Type to be used for mount points. </summary> </param> </interface> -<interface name="files_security_mountpoint" lineno="179"> +<interface name="files_security_mountpoint" lineno="183"> <summary> Make the specified type usable for security file filesystem mount points. @@ -76987,7 +77103,7 @@ Type to be used for mount points. </summary> </param> </interface> -<interface name="files_pid_file" lineno="227"> +<interface name="files_pid_file" lineno="231"> <summary> Make the specified type usable for runtime process ID files. @@ -77026,7 +77142,7 @@ Type to be used for PID files. </param> <infoflow type="none"/> </interface> -<interface name="files_config_file" lineno="267"> +<interface name="files_config_file" lineno="271"> <summary> Make the specified type a configuration file. @@ -77057,7 +77173,7 @@ Type to be used as a configuration file. </param> <infoflow type="none"/> </interface> -<interface name="files_poly" lineno="287"> +<interface name="files_poly" lineno="291"> <summary> Make the specified type a polyinstantiated directory. @@ -77069,7 +77185,7 @@ polyinstantiated directory. </summary> </param> </interface> -<interface name="files_poly_parent" lineno="308"> +<interface name="files_poly_parent" lineno="312"> <summary> Make the specified type a parent of a polyinstantiated directory. @@ -77081,7 +77197,7 @@ parent directory. </summary> </param> </interface> -<interface name="files_poly_member" lineno="329"> +<interface name="files_poly_member" lineno="333"> <summary> Make the specified type a polyinstantiation member directory. @@ -77093,7 +77209,7 @@ member directory. </summary> </param> </interface> -<interface name="files_poly_member_tmp" lineno="356"> +<interface name="files_poly_member_tmp" lineno="360"> <summary> Make the domain use the specified type of polyinstantiated directory. @@ -77111,7 +77227,7 @@ member directory. </summary> </param> </interface> -<interface name="files_tmp_file" lineno="403"> +<interface name="files_tmp_file" lineno="407"> <summary> Make the specified type a file used for temporary files. @@ -77150,7 +77266,7 @@ temporary file. </param> <infoflow type="none"/> </interface> -<interface name="files_tmpfs_file" lineno="425"> +<interface name="files_tmpfs_file" lineno="428"> <summary> Transform the type into a file, for use on a virtual memory filesystem (tmpfs). @@ -77161,7 +77277,7 @@ The type to be transformed. </summary> </param> </interface> -<interface name="files_getattr_all_dirs" lineno="444"> +<interface name="files_getattr_all_dirs" lineno="447"> <summary> Get the attributes of all directories. </summary> @@ -77171,7 +77287,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_dirs" lineno="463"> +<interface name="files_dontaudit_getattr_all_dirs" lineno="466"> <summary> Do not audit attempts to get the attributes of all directories. @@ -77182,7 +77298,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_non_security" lineno="481"> +<interface name="files_list_non_security" lineno="484"> <summary> List all non-security directories. </summary> @@ -77192,7 +77308,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_non_security" lineno="500"> +<interface name="files_dontaudit_list_non_security" lineno="503"> <summary> Do not audit attempts to list all non-security directories. @@ -77203,7 +77319,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_mounton_non_security" lineno="519"> +<interface name="files_mounton_non_security" lineno="522"> <summary> Mount a filesystem on all non-security directories and files. @@ -77214,7 +77330,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_non_security_dirs" lineno="538"> +<interface name="files_write_non_security_dirs" lineno="541"> <summary> Allow attempts to modify any directory </summary> @@ -77224,7 +77340,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_non_security_dirs" lineno="556"> +<interface name="files_manage_non_security_dirs" lineno="559"> <summary> Allow attempts to manage non-security directories </summary> @@ -77234,7 +77350,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_non_security_dirs" lineno="574"> +<interface name="files_relabel_non_security_dirs" lineno="577"> <summary> Relabel from/to non-security directories. </summary> @@ -77244,7 +77360,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_all_files" lineno="592"> +<interface name="files_getattr_all_files" lineno="595"> <summary> Get the attributes of all files. </summary> @@ -77254,7 +77370,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_files" lineno="612"> +<interface name="files_dontaudit_getattr_all_files" lineno="615"> <summary> Do not audit attempts to get the attributes of all files. @@ -77265,7 +77381,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_files" lineno="631"> +<interface name="files_dontaudit_getattr_non_security_files" lineno="634"> <summary> Do not audit attempts to get the attributes of non security files. @@ -77276,7 +77392,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_non_security_files" lineno="650"> +<interface name="files_manage_non_security_files" lineno="653"> <summary> Create, read, write, and delete all non-security files. </summary> @@ -77287,7 +77403,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_non_security_files" lineno="669"> +<interface name="files_relabel_non_security_files" lineno="672"> <summary> Relabel from/to all non-security files. </summary> @@ -77298,7 +77414,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_all_files" lineno="687"> +<interface name="files_read_all_files" lineno="690"> <summary> Read all files. </summary> @@ -77308,7 +77424,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_execmod_all_files" lineno="718"> +<interface name="files_execmod_all_files" lineno="721"> <summary> Allow shared library text relocations in all files. </summary> @@ -77326,7 +77442,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_non_security_files" lineno="737"> +<interface name="files_read_non_security_files" lineno="740"> <summary> Read all non-security files. </summary> @@ -77337,7 +77453,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_all_dirs_except" lineno="763"> +<interface name="files_read_all_dirs_except" lineno="766"> <summary> Read all directories on the filesystem, except the listed exceptions. @@ -77354,7 +77470,7 @@ must be negated by the caller. </summary> </param> </interface> -<interface name="files_read_all_files_except" lineno="788"> +<interface name="files_read_all_files_except" lineno="791"> <summary> Read all files on the filesystem, except the listed exceptions. @@ -77371,7 +77487,7 @@ must be negated by the caller. </summary> </param> </interface> -<interface name="files_read_all_symlinks_except" lineno="813"> +<interface name="files_read_all_symlinks_except" lineno="816"> <summary> Read all symbolic links on the filesystem, except the listed exceptions. @@ -77388,7 +77504,7 @@ must be negated by the caller. </summary> </param> </interface> -<interface name="files_getattr_all_symlinks" lineno="831"> +<interface name="files_getattr_all_symlinks" lineno="834"> <summary> Get the attributes of all symbolic links. </summary> @@ -77398,7 +77514,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_symlinks" lineno="850"> +<interface name="files_dontaudit_getattr_all_symlinks" lineno="853"> <summary> Do not audit attempts to get the attributes of all symbolic links. @@ -77409,7 +77525,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_read_all_symlinks" lineno="868"> +<interface name="files_dontaudit_read_all_symlinks" lineno="871"> <summary> Do not audit attempts to read all symbolic links. </summary> @@ -77419,7 +77535,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="887"> +<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="890"> <summary> Do not audit attempts to get the attributes of non security symbolic links. @@ -77430,7 +77546,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="906"> +<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="909"> <summary> Do not audit attempts to get the attributes of non security block devices. @@ -77441,7 +77557,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="925"> +<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="928"> <summary> Do not audit attempts to get the attributes of non security character devices. @@ -77452,7 +77568,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_all_symlinks" lineno="944"> +<interface name="files_read_all_symlinks" lineno="947"> <summary> Read all symbolic links. </summary> @@ -77463,7 +77579,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_all_pipes" lineno="963"> +<interface name="files_getattr_all_pipes" lineno="966"> <summary> Get the attributes of all named pipes. </summary> @@ -77473,7 +77589,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_pipes" lineno="983"> +<interface name="files_dontaudit_getattr_all_pipes" lineno="986"> <summary> Do not audit attempts to get the attributes of all named pipes. @@ -77484,7 +77600,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1002"> +<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1005"> <summary> Do not audit attempts to get the attributes of non security named pipes. @@ -77495,7 +77611,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_getattr_all_sockets" lineno="1020"> +<interface name="files_getattr_all_sockets" lineno="1023"> <summary> Get the attributes of all named sockets. </summary> @@ -77505,7 +77621,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_sockets" lineno="1040"> +<interface name="files_dontaudit_getattr_all_sockets" lineno="1043"> <summary> Do not audit attempts to get the attributes of all named sockets. @@ -77516,7 +77632,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1059"> +<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1062"> <summary> Do not audit attempts to get the attributes of non security named sockets. @@ -77527,7 +77643,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_all_blk_files" lineno="1077"> +<interface name="files_read_all_blk_files" lineno="1080"> <summary> Read all block nodes with file types. </summary> @@ -77537,7 +77653,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_all_chr_files" lineno="1095"> +<interface name="files_read_all_chr_files" lineno="1098"> <summary> Read all character nodes with file types. </summary> @@ -77547,7 +77663,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_files" lineno="1121"> +<interface name="files_relabel_all_files" lineno="1124"> <summary> Relabel all files on the filesystem, except the listed exceptions. @@ -77565,7 +77681,7 @@ must be negated by the caller. </param> <rolecap/> </interface> -<interface name="files_rw_all_files" lineno="1159"> +<interface name="files_rw_all_files" lineno="1162"> <summary> rw all files on the filesystem, except the listed exceptions. @@ -77583,7 +77699,7 @@ must be negated by the caller. </param> <rolecap/> </interface> -<interface name="files_manage_all_files" lineno="1185"> +<interface name="files_manage_all_files" lineno="1188"> <summary> Manage all files on the filesystem, except the listed exceptions. @@ -77601,7 +77717,7 @@ must be negated by the caller. </param> <rolecap/> </interface> -<interface name="files_search_all" lineno="1212"> +<interface name="files_search_all" lineno="1215"> <summary> Search the contents of all directories on extended attribute filesystems. @@ -77612,7 +77728,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_all" lineno="1231"> +<interface name="files_list_all" lineno="1234"> <summary> List the contents of all directories on extended attribute filesystems. @@ -77623,7 +77739,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_files_as" lineno="1249"> +<interface name="files_create_all_files_as" lineno="1252"> <summary> Create all files as is. </summary> @@ -77633,7 +77749,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_all_dirs" lineno="1269"> +<interface name="files_dontaudit_search_all_dirs" lineno="1272"> <summary> Do not audit attempts to search the contents of any directories on extended @@ -77645,7 +77761,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_getattr_all_file_type_fs" lineno="1292"> +<interface name="files_getattr_all_file_type_fs" lineno="1295"> <summary> Get the attributes of all filesystems with the type of a file. @@ -77656,7 +77772,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_all_file_type_fs" lineno="1310"> +<interface name="files_relabelto_all_file_type_fs" lineno="1313"> <summary> Relabel a filesystem to the type of a file. </summary> @@ -77666,7 +77782,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_file_type_fs" lineno="1328"> +<interface name="files_relabel_all_file_type_fs" lineno="1331"> <summary> Relabel a filesystem to and from the type of a file. </summary> @@ -77676,7 +77792,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mount_all_file_type_fs" lineno="1346"> +<interface name="files_mount_all_file_type_fs" lineno="1349"> <summary> Mount all filesystems with the type of a file. </summary> @@ -77686,7 +77802,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_unmount_all_file_type_fs" lineno="1364"> +<interface name="files_unmount_all_file_type_fs" lineno="1367"> <summary> Unmount all filesystems with the type of a file. </summary> @@ -77696,7 +77812,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_non_auth_dirs" lineno="1383"> +<interface name="files_list_non_auth_dirs" lineno="1386"> <summary> Read all non-authentication related directories. @@ -77707,7 +77823,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_non_auth_files" lineno="1402"> +<interface name="files_read_non_auth_files" lineno="1405"> <summary> Read all non-authentication related files. @@ -77718,7 +77834,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_non_auth_symlinks" lineno="1421"> +<interface name="files_read_non_auth_symlinks" lineno="1424"> <summary> Read all non-authentication related symbolic links. @@ -77729,7 +77845,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_non_auth_files" lineno="1439"> +<interface name="files_rw_non_auth_files" lineno="1442"> <summary> rw non-authentication related files. </summary> @@ -77739,7 +77855,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_non_auth_files" lineno="1459"> +<interface name="files_manage_non_auth_files" lineno="1462"> <summary> Manage non-authentication related files. @@ -77751,7 +77867,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_map_non_auth_files" lineno="1487"> +<interface name="files_map_non_auth_files" lineno="1490"> <summary> Mmap non-authentication related files. @@ -77763,7 +77879,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_non_auth_files" lineno="1507"> +<interface name="files_relabel_non_auth_files" lineno="1510"> <summary> Relabel all non-authentication related files. @@ -77775,7 +77891,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_config_dirs" lineno="1540"> +<interface name="files_manage_config_dirs" lineno="1543"> <summary> Manage all configuration directories on filesystem </summary> @@ -77786,7 +77902,7 @@ Domain allowed access. </param> </interface> -<interface name="files_relabel_config_dirs" lineno="1559"> +<interface name="files_relabel_config_dirs" lineno="1562"> <summary> Relabel configuration directories </summary> @@ -77797,7 +77913,7 @@ Domain allowed access. </param> </interface> -<interface name="files_read_config_files" lineno="1577"> +<interface name="files_read_config_files" lineno="1580"> <summary> Read config files in /etc. </summary> @@ -77807,7 +77923,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_config_files" lineno="1598"> +<interface name="files_manage_config_files" lineno="1601"> <summary> Manage all configuration files on filesystem </summary> @@ -77818,7 +77934,7 @@ Domain allowed access. </param> </interface> -<interface name="files_relabel_config_files" lineno="1617"> +<interface name="files_relabel_config_files" lineno="1620"> <summary> Relabel configuration files </summary> @@ -77829,7 +77945,7 @@ Domain allowed access. </param> </interface> -<interface name="files_mounton_all_mountpoints" lineno="1635"> +<interface name="files_mounton_all_mountpoints" lineno="1638"> <summary> Mount a filesystem on all mount points. </summary> @@ -77839,7 +77955,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_all_mountpoints" lineno="1654"> +<interface name="files_getattr_all_mountpoints" lineno="1657"> <summary> Get the attributes of all mount points. </summary> @@ -77849,7 +77965,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_all_mountpoints" lineno="1672"> +<interface name="files_setattr_all_mountpoints" lineno="1675"> <summary> Set the attributes of all mount points. </summary> @@ -77859,7 +77975,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1690"> +<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1693"> <summary> Do not audit attempts to set the attributes on all mount points. </summary> @@ -77869,7 +77985,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_all_mountpoints" lineno="1708"> +<interface name="files_search_all_mountpoints" lineno="1711"> <summary> Search all mount points. </summary> @@ -77879,7 +77995,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_all_mountpoints" lineno="1726"> +<interface name="files_dontaudit_search_all_mountpoints" lineno="1729"> <summary> Do not audit searching of all mount points. </summary> @@ -77889,7 +78005,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_all_mountpoints" lineno="1744"> +<interface name="files_list_all_mountpoints" lineno="1747"> <summary> List all mount points. </summary> @@ -77899,7 +78015,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_all_mountpoints" lineno="1762"> +<interface name="files_dontaudit_list_all_mountpoints" lineno="1765"> <summary> Do not audit listing of all mount points. </summary> @@ -77909,7 +78025,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_write_all_mountpoints" lineno="1780"> +<interface name="files_dontaudit_write_all_mountpoints" lineno="1783"> <summary> Do not audit attempts to write to mount points. </summary> @@ -77919,7 +78035,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_root" lineno="1798"> +<interface name="files_list_root" lineno="1801"> <summary> List the contents of the root directory. </summary> @@ -77929,7 +78045,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_symlinks" lineno="1818"> +<interface name="files_delete_root_symlinks" lineno="1821"> <summary> Delete symbolic links in the root directory. @@ -77940,7 +78056,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_root_dirs" lineno="1836"> +<interface name="files_dontaudit_write_root_dirs" lineno="1839"> <summary> Do not audit attempts to write to / dirs. </summary> @@ -77950,7 +78066,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_dir" lineno="1855"> +<interface name="files_dontaudit_rw_root_dir" lineno="1858"> <summary> Do not audit attempts to write files in the root directory. @@ -77961,7 +78077,17 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_root_filetrans" lineno="1889"> +<interface name="files_watch_root_dirs" lineno="1876"> +<summary> +Watch the root directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_root_filetrans" lineno="1910"> <summary> Create an object in the root directory, with a private type using a type transition. @@ -77987,7 +78113,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_dontaudit_read_root_files" lineno="1908"> +<interface name="files_dontaudit_read_root_files" lineno="1929"> <summary> Do not audit attempts to read files in the root directory. @@ -77998,7 +78124,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_files" lineno="1927"> +<interface name="files_dontaudit_rw_root_files" lineno="1948"> <summary> Do not audit attempts to read or write files in the root directory. @@ -78009,7 +78135,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_chr_files" lineno="1946"> +<interface name="files_dontaudit_rw_root_chr_files" lineno="1967"> <summary> Do not audit attempts to read or write character device nodes in the root directory. @@ -78020,7 +78146,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_delete_root_chr_files" lineno="1965"> +<interface name="files_delete_root_chr_files" lineno="1986"> <summary> Delete character device nodes in the root directory. @@ -78031,7 +78157,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_files" lineno="1983"> +<interface name="files_delete_root_files" lineno="2004"> <summary> Delete files in the root directory. </summary> @@ -78041,7 +78167,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_root_files" lineno="2001"> +<interface name="files_exec_root_files" lineno="2022"> <summary> Execute files in the root directory. </summary> @@ -78051,7 +78177,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_dir_entry" lineno="2019"> +<interface name="files_delete_root_dir_entry" lineno="2040"> <summary> Remove entries from the root directory. </summary> @@ -78061,7 +78187,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_root_dir" lineno="2037"> +<interface name="files_manage_root_dir" lineno="2058"> <summary> Manage the root directory. </summary> @@ -78071,7 +78197,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_rootfs" lineno="2056"> +<interface name="files_getattr_rootfs" lineno="2077"> <summary> Get the attributes of a rootfs file system. @@ -78082,7 +78208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_associate_rootfs" lineno="2074"> +<interface name="files_associate_rootfs" lineno="2095"> <summary> Associate to root file system. </summary> @@ -78092,7 +78218,7 @@ Type of the file to associate. </summary> </param> </interface> -<interface name="files_relabel_rootfs" lineno="2092"> +<interface name="files_relabel_rootfs" lineno="2113"> <summary> Relabel to and from rootfs file system. </summary> @@ -78102,7 +78228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_unmount_rootfs" lineno="2110"> +<interface name="files_unmount_rootfs" lineno="2131"> <summary> Unmount a rootfs filesystem. </summary> @@ -78112,7 +78238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_root" lineno="2128"> +<interface name="files_mounton_root" lineno="2149"> <summary> Mount on the root directory (/) </summary> @@ -78122,7 +78248,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_boot_dirs" lineno="2146"> +<interface name="files_getattr_boot_dirs" lineno="2167"> <summary> Get attributes of the /boot directory. </summary> @@ -78132,7 +78258,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_boot_dirs" lineno="2165"> +<interface name="files_dontaudit_getattr_boot_dirs" lineno="2186"> <summary> Do not audit attempts to get attributes of the /boot directory. @@ -78143,7 +78269,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_boot" lineno="2183"> +<interface name="files_search_boot" lineno="2204"> <summary> Search the /boot directory. </summary> @@ -78153,7 +78279,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_boot" lineno="2201"> +<interface name="files_dontaudit_search_boot" lineno="2222"> <summary> Do not audit attempts to search the /boot directory. </summary> @@ -78163,7 +78289,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_boot" lineno="2219"> +<interface name="files_list_boot" lineno="2240"> <summary> List the /boot directory. </summary> @@ -78173,7 +78299,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_boot" lineno="2237"> +<interface name="files_dontaudit_list_boot" lineno="2258"> <summary> Do not audit attempts to list the /boot directory. </summary> @@ -78183,7 +78309,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_boot_dirs" lineno="2255"> +<interface name="files_create_boot_dirs" lineno="2276"> <summary> Create directories in /boot </summary> @@ -78193,7 +78319,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_boot_dirs" lineno="2274"> +<interface name="files_manage_boot_dirs" lineno="2295"> <summary> Create, read, write, and delete directories in /boot. @@ -78204,7 +78330,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_boot_filetrans" lineno="2308"> +<interface name="files_boot_filetrans" lineno="2329"> <summary> Create a private type object in boot with an automatic type transition @@ -78230,7 +78356,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_read_boot_files" lineno="2327"> +<interface name="files_read_boot_files" lineno="2348"> <summary> read files in the /boot directory. </summary> @@ -78241,7 +78367,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_boot_files" lineno="2347"> +<interface name="files_manage_boot_files" lineno="2368"> <summary> Create, read, write, and delete files in the /boot directory. @@ -78253,7 +78379,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabelfrom_boot_files" lineno="2365"> +<interface name="files_relabelfrom_boot_files" lineno="2386"> <summary> Relabel from files in the /boot directory. </summary> @@ -78263,7 +78389,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_boot_symlinks" lineno="2383"> +<interface name="files_read_boot_symlinks" lineno="2404"> <summary> Read symbolic links in the /boot directory. </summary> @@ -78273,7 +78399,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_boot_symlinks" lineno="2402"> +<interface name="files_rw_boot_symlinks" lineno="2423"> <summary> Read and write symbolic links in the /boot directory. @@ -78284,7 +78410,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_boot_symlinks" lineno="2422"> +<interface name="files_manage_boot_symlinks" lineno="2443"> <summary> Create, read, write, and delete symbolic links in the /boot directory. @@ -78295,7 +78421,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_img" lineno="2440"> +<interface name="files_read_kernel_img" lineno="2461"> <summary> Read kernel files in the /boot directory. </summary> @@ -78305,7 +78431,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_kernel_img" lineno="2461"> +<interface name="files_create_kernel_img" lineno="2482"> <summary> Install a kernel into the /boot directory. </summary> @@ -78316,7 +78442,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_delete_kernel" lineno="2481"> +<interface name="files_delete_kernel" lineno="2502"> <summary> Delete a kernel from /boot. </summary> @@ -78327,7 +78453,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_default_dirs" lineno="2499"> +<interface name="files_getattr_default_dirs" lineno="2520"> <summary> Getattr of directories with the default file type. </summary> @@ -78337,7 +78463,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_default_dirs" lineno="2518"> +<interface name="files_dontaudit_getattr_default_dirs" lineno="2539"> <summary> Do not audit attempts to get the attributes of directories with the default file type. @@ -78348,7 +78474,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_default" lineno="2536"> +<interface name="files_search_default" lineno="2557"> <summary> Search the contents of directories with the default file type. </summary> @@ -78358,7 +78484,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_default" lineno="2554"> +<interface name="files_list_default" lineno="2575"> <summary> List contents of directories with the default file type. </summary> @@ -78368,7 +78494,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_default" lineno="2573"> +<interface name="files_dontaudit_list_default" lineno="2594"> <summary> Do not audit attempts to list contents of directories with the default file type. @@ -78379,7 +78505,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_default_dirs" lineno="2592"> +<interface name="files_manage_default_dirs" lineno="2613"> <summary> Create, read, write, and delete directories with the default file type. @@ -78390,7 +78516,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_default" lineno="2610"> +<interface name="files_mounton_default" lineno="2631"> <summary> Mount a filesystem on a directory with the default file type. </summary> @@ -78400,7 +78526,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_default_files" lineno="2629"> +<interface name="files_dontaudit_getattr_default_files" lineno="2650"> <summary> Do not audit attempts to get the attributes of files with the default file type. @@ -78411,7 +78537,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_default_files" lineno="2647"> +<interface name="files_read_default_files" lineno="2668"> <summary> Read files with the default file type. </summary> @@ -78421,7 +78547,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_read_default_files" lineno="2666"> +<interface name="files_dontaudit_read_default_files" lineno="2687"> <summary> Do not audit attempts to read files with the default file type. @@ -78432,7 +78558,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_default_files" lineno="2685"> +<interface name="files_manage_default_files" lineno="2706"> <summary> Create, read, write, and delete files with the default file type. @@ -78443,7 +78569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_symlinks" lineno="2703"> +<interface name="files_read_default_symlinks" lineno="2724"> <summary> Read symbolic links with the default file type. </summary> @@ -78453,7 +78579,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_sockets" lineno="2721"> +<interface name="files_read_default_sockets" lineno="2742"> <summary> Read sockets with the default file type. </summary> @@ -78463,7 +78589,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_pipes" lineno="2739"> +<interface name="files_read_default_pipes" lineno="2760"> <summary> Read named pipes with the default file type. </summary> @@ -78473,7 +78599,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_etc" lineno="2757"> +<interface name="files_search_etc" lineno="2778"> <summary> Search the contents of /etc directories. </summary> @@ -78483,7 +78609,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_etc_dirs" lineno="2775"> +<interface name="files_setattr_etc_dirs" lineno="2796"> <summary> Set the attributes of the /etc directories. </summary> @@ -78493,7 +78619,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_etc" lineno="2793"> +<interface name="files_list_etc" lineno="2814"> <summary> List the contents of /etc directories. </summary> @@ -78503,7 +78629,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_etc_dirs" lineno="2811"> +<interface name="files_dontaudit_write_etc_dirs" lineno="2832"> <summary> Do not audit attempts to write to /etc dirs. </summary> @@ -78513,7 +78639,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_etc_dirs" lineno="2829"> +<interface name="files_rw_etc_dirs" lineno="2850"> <summary> Add and remove entries from /etc directories. </summary> @@ -78523,7 +78649,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_dirs" lineno="2848"> +<interface name="files_manage_etc_dirs" lineno="2869"> <summary> Manage generic directories in /etc </summary> @@ -78534,7 +78660,7 @@ Domain allowed access </param> </interface> -<interface name="files_relabelto_etc_dirs" lineno="2866"> +<interface name="files_relabelto_etc_dirs" lineno="2887"> <summary> Relabel directories to etc_t. </summary> @@ -78544,7 +78670,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_etc_dirs" lineno="2885"> +<interface name="files_mounton_etc_dirs" lineno="2906"> <summary> Mount a filesystem on the etc directories. @@ -78555,7 +78681,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_etc_files" lineno="2937"> +<interface name="files_watch_etc_dirs" lineno="2924"> +<summary> +Watch /etc directories +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_etc_files" lineno="2976"> <summary> Read generic files in /etc. </summary> @@ -78599,7 +78735,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_map_etc_files" lineno="2969"> +<interface name="files_map_etc_files" lineno="3008"> <summary> Map generic files in /etc. </summary> @@ -78621,7 +78757,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_dontaudit_write_etc_files" lineno="2987"> +<interface name="files_dontaudit_write_etc_files" lineno="3026"> <summary> Do not audit attempts to write generic files in /etc. </summary> @@ -78631,7 +78767,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_etc_files" lineno="3006"> +<interface name="files_rw_etc_files" lineno="3045"> <summary> Read and write generic files in /etc. </summary> @@ -78642,7 +78778,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_etc_files" lineno="3028"> +<interface name="files_manage_etc_files" lineno="3067"> <summary> Create, read, write, and delete generic files in /etc. @@ -78654,7 +78790,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_delete_etc_files" lineno="3047"> +<interface name="files_delete_etc_files" lineno="3086"> <summary> Delete system configuration files in /etc. </summary> @@ -78664,7 +78800,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_etc_files" lineno="3065"> +<interface name="files_exec_etc_files" lineno="3104"> <summary> Execute generic files in /etc. </summary> @@ -78674,7 +78810,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_get_etc_unit_status" lineno="3085"> +<interface name="files_get_etc_unit_status" lineno="3124"> <summary> Get etc_t service status. </summary> @@ -78684,7 +78820,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_start_etc_service" lineno="3103"> +<interface name="files_start_etc_service" lineno="3142"> <summary> start etc_t service </summary> @@ -78694,7 +78830,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_stop_etc_service" lineno="3121"> +<interface name="files_stop_etc_service" lineno="3160"> <summary> stop etc_t service </summary> @@ -78704,7 +78840,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_etc_files" lineno="3139"> +<interface name="files_relabel_etc_files" lineno="3178"> <summary> Relabel from and to generic files in /etc. </summary> @@ -78714,7 +78850,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_etc_symlinks" lineno="3158"> +<interface name="files_read_etc_symlinks" lineno="3197"> <summary> Read symbolic links in /etc. </summary> @@ -78724,7 +78860,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_symlinks" lineno="3176"> +<interface name="files_manage_etc_symlinks" lineno="3215"> <summary> Create, read, write, and delete symbolic links in /etc. </summary> @@ -78734,7 +78870,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_etc_filetrans" lineno="3210"> +<interface name="files_etc_filetrans" lineno="3249"> <summary> Create objects in /etc with a private type using a type_transition. @@ -78760,7 +78896,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_create_boot_flag" lineno="3240"> +<interface name="files_create_boot_flag" lineno="3279"> <summary> Create a boot flag. </summary> @@ -78782,7 +78918,7 @@ The name of the object being created. </param> <rolecap/> </interface> -<interface name="files_delete_boot_flag" lineno="3266"> +<interface name="files_delete_boot_flag" lineno="3305"> <summary> Delete a boot flag. </summary> @@ -78799,7 +78935,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_etc_runtime_dirs" lineno="3285"> +<interface name="files_getattr_etc_runtime_dirs" lineno="3324"> <summary> Get the attributes of the etc_runtime directories. @@ -78810,7 +78946,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_etc_runtime_dirs" lineno="3304"> +<interface name="files_mounton_etc_runtime_dirs" lineno="3343"> <summary> Mount a filesystem on the etc_runtime directories. @@ -78821,7 +78957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_etc_runtime_dirs" lineno="3322"> +<interface name="files_relabelto_etc_runtime_dirs" lineno="3361"> <summary> Relabel to etc_runtime_t dirs. </summary> @@ -78831,7 +78967,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3340"> +<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3379"> <summary> Do not audit attempts to set the attributes of the etc_runtime files </summary> @@ -78841,7 +78977,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_etc_runtime_files" lineno="3378"> +<interface name="files_read_etc_runtime_files" lineno="3417"> <summary> Read files in /etc that are dynamically created on boot, such as mtab. @@ -78871,7 +79007,7 @@ Domain allowed access. <infoflow type="read" weight="10" /> <rolecap/> </interface> -<interface name="files_dontaudit_read_etc_runtime_files" lineno="3400"> +<interface name="files_dontaudit_read_etc_runtime_files" lineno="3439"> <summary> Do not audit attempts to read files in /etc that are dynamically @@ -78883,7 +79019,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_read_etc_files" lineno="3419"> +<interface name="files_dontaudit_read_etc_files" lineno="3458"> <summary> Do not audit attempts to read files in /etc @@ -78894,7 +79030,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_write_etc_runtime_files" lineno="3438"> +<interface name="files_dontaudit_write_etc_runtime_files" lineno="3477"> <summary> Do not audit attempts to write etc runtime files. @@ -78905,7 +79041,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_etc_runtime_files" lineno="3458"> +<interface name="files_rw_etc_runtime_files" lineno="3497"> <summary> Read and write files in /etc that are dynamically created on boot, such as mtab. @@ -78917,7 +79053,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_etc_runtime_files" lineno="3480"> +<interface name="files_manage_etc_runtime_files" lineno="3519"> <summary> Create, read, write, and delete files in /etc that are dynamically created on boot, @@ -78930,7 +79066,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabelto_etc_runtime_files" lineno="3498"> +<interface name="files_relabelto_etc_runtime_files" lineno="3537"> <summary> Relabel to etc_runtime_t files. </summary> @@ -78940,7 +79076,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_etc_filetrans_etc_runtime" lineno="3527"> +<interface name="files_etc_filetrans_etc_runtime" lineno="3566"> <summary> Create, etc runtime objects with an automatic type transition. @@ -78961,7 +79097,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_home_dir" lineno="3546"> +<interface name="files_getattr_home_dir" lineno="3585"> <summary> Get the attributes of the home directories root (/home). @@ -78972,7 +79108,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_home_dir" lineno="3567"> +<interface name="files_dontaudit_getattr_home_dir" lineno="3606"> <summary> Do not audit attempts to get the attributes of the home directories root @@ -78984,7 +79120,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_home" lineno="3586"> +<interface name="files_search_home" lineno="3625"> <summary> Search home directories root (/home). </summary> @@ -78994,7 +79130,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_home" lineno="3606"> +<interface name="files_dontaudit_search_home" lineno="3645"> <summary> Do not audit attempts to search home directories root (/home). @@ -79005,7 +79141,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_list_home" lineno="3626"> +<interface name="files_dontaudit_list_home" lineno="3665"> <summary> Do not audit attempts to list home directories root (/home). @@ -79016,7 +79152,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_home" lineno="3645"> +<interface name="files_list_home" lineno="3684"> <summary> Get listing of home directories. </summary> @@ -79026,7 +79162,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_home" lineno="3664"> +<interface name="files_relabelto_home" lineno="3703"> <summary> Relabel to user home root (/home). </summary> @@ -79036,7 +79172,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelfrom_home" lineno="3682"> +<interface name="files_relabelfrom_home" lineno="3721"> <summary> Relabel from user home root (/home). </summary> @@ -79046,7 +79182,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_home_filetrans" lineno="3715"> +<interface name="files_home_filetrans" lineno="3754"> <summary> Create objects in /home. </summary> @@ -79071,7 +79207,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_lost_found_dirs" lineno="3733"> +<interface name="files_getattr_lost_found_dirs" lineno="3772"> <summary> Get the attributes of lost+found directories. </summary> @@ -79081,7 +79217,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3752"> +<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3791"> <summary> Do not audit attempts to get the attributes of lost+found directories. @@ -79092,7 +79228,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_lost_found" lineno="3770"> +<interface name="files_list_lost_found" lineno="3809"> <summary> List the contents of lost+found directories. </summary> @@ -79102,7 +79238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_lost_found" lineno="3790"> +<interface name="files_manage_lost_found" lineno="3829"> <summary> Create, read, write, and delete objects in lost+found directories. @@ -79114,7 +79250,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_search_mnt" lineno="3812"> +<interface name="files_search_mnt" lineno="3851"> <summary> Search the contents of /mnt. </summary> @@ -79124,7 +79260,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_mnt" lineno="3830"> +<interface name="files_dontaudit_search_mnt" lineno="3869"> <summary> Do not audit attempts to search /mnt. </summary> @@ -79134,7 +79270,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_mnt" lineno="3848"> +<interface name="files_list_mnt" lineno="3887"> <summary> List the contents of /mnt. </summary> @@ -79144,7 +79280,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_mnt" lineno="3866"> +<interface name="files_dontaudit_list_mnt" lineno="3905"> <summary> Do not audit attempts to list the contents of /mnt. </summary> @@ -79154,7 +79290,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_mnt" lineno="3884"> +<interface name="files_mounton_mnt" lineno="3923"> <summary> Mount a filesystem on /mnt. </summary> @@ -79164,7 +79300,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mnt_dirs" lineno="3903"> +<interface name="files_manage_mnt_dirs" lineno="3942"> <summary> Create, read, write, and delete directories in /mnt. </summary> @@ -79175,7 +79311,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_mnt_files" lineno="3921"> +<interface name="files_manage_mnt_files" lineno="3960"> <summary> Create, read, write, and delete files in /mnt. </summary> @@ -79185,7 +79321,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_mnt_files" lineno="3939"> +<interface name="files_read_mnt_files" lineno="3978"> <summary> read files in /mnt. </summary> @@ -79195,7 +79331,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_mnt_symlinks" lineno="3957"> +<interface name="files_read_mnt_symlinks" lineno="3996"> <summary> Read symbolic links in /mnt. </summary> @@ -79205,7 +79341,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mnt_symlinks" lineno="3975"> +<interface name="files_manage_mnt_symlinks" lineno="4014"> <summary> Create, read, write, and delete symbolic links in /mnt. </summary> @@ -79215,7 +79351,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_kernel_modules" lineno="3993"> +<interface name="files_search_kernel_modules" lineno="4032"> <summary> Search the contents of the kernel module directories. </summary> @@ -79225,7 +79361,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_kernel_modules" lineno="4012"> +<interface name="files_list_kernel_modules" lineno="4051"> <summary> List the contents of the kernel module directories. </summary> @@ -79235,7 +79371,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_kernel_modules" lineno="4031"> +<interface name="files_getattr_kernel_modules" lineno="4070"> <summary> Get the attributes of kernel module files. </summary> @@ -79245,7 +79381,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_modules" lineno="4049"> +<interface name="files_read_kernel_modules" lineno="4088"> <summary> Read kernel module files. </summary> @@ -79255,7 +79391,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_kernel_modules" lineno="4069"> +<interface name="files_write_kernel_modules" lineno="4108"> <summary> Write kernel module files. </summary> @@ -79265,7 +79401,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_kernel_modules" lineno="4088"> +<interface name="files_delete_kernel_modules" lineno="4127"> <summary> Delete kernel module files. </summary> @@ -79275,7 +79411,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_kernel_modules" lineno="4108"> +<interface name="files_manage_kernel_modules" lineno="4147"> <summary> Create, read, write, and delete kernel module files. @@ -79287,7 +79423,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_kernel_modules" lineno="4127"> +<interface name="files_relabel_kernel_modules" lineno="4166"> <summary> Relabel from and to kernel module files. </summary> @@ -79297,7 +79433,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_kernel_modules_filetrans" lineno="4162"> +<interface name="files_kernel_modules_filetrans" lineno="4201"> <summary> Create objects in the kernel module directories with a private type via an automatic type transition. @@ -79323,7 +79459,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_load_kernel_modules" lineno="4180"> +<interface name="files_load_kernel_modules" lineno="4219"> <summary> Load kernel module files. </summary> @@ -79333,7 +79469,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_world_readable" lineno="4200"> +<interface name="files_list_world_readable" lineno="4239"> <summary> List world-readable directories. </summary> @@ -79344,7 +79480,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_files" lineno="4219"> +<interface name="files_read_world_readable_files" lineno="4258"> <summary> Read world-readable files. </summary> @@ -79355,7 +79491,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_symlinks" lineno="4238"> +<interface name="files_read_world_readable_symlinks" lineno="4277"> <summary> Read world-readable symbolic links. </summary> @@ -79366,7 +79502,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_pipes" lineno="4256"> +<interface name="files_read_world_readable_pipes" lineno="4295"> <summary> Read world-readable named pipes. </summary> @@ -79376,7 +79512,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_world_readable_sockets" lineno="4274"> +<interface name="files_read_world_readable_sockets" lineno="4313"> <summary> Read world-readable sockets. </summary> @@ -79386,7 +79522,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_associate_tmp" lineno="4294"> +<interface name="files_associate_tmp" lineno="4333"> <summary> Allow the specified type to associate to a filesystem with the type of the @@ -79398,7 +79534,7 @@ Type of the file to associate. </summary> </param> </interface> -<interface name="files_getattr_tmp_dirs" lineno="4312"> +<interface name="files_getattr_tmp_dirs" lineno="4351"> <summary> Get the attributes of the tmp directory (/tmp). </summary> @@ -79408,7 +79544,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4331"> +<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4370"> <summary> Do not audit attempts to get the attributes of the tmp directory (/tmp). @@ -79419,7 +79555,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_tmp" lineno="4349"> +<interface name="files_search_tmp" lineno="4388"> <summary> Search the tmp directory (/tmp). </summary> @@ -79429,7 +79565,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_tmp" lineno="4367"> +<interface name="files_dontaudit_search_tmp" lineno="4406"> <summary> Do not audit attempts to search the tmp directory (/tmp). </summary> @@ -79439,7 +79575,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_tmp" lineno="4385"> +<interface name="files_list_tmp" lineno="4424"> <summary> Read the tmp directory (/tmp). </summary> @@ -79449,7 +79585,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_tmp" lineno="4403"> +<interface name="files_dontaudit_list_tmp" lineno="4442"> <summary> Do not audit listing of the tmp directory (/tmp). </summary> @@ -79459,7 +79595,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_delete_tmp_dir_entry" lineno="4421"> +<interface name="files_delete_tmp_dir_entry" lineno="4460"> <summary> Remove entries from the tmp directory. </summary> @@ -79469,7 +79605,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_tmp_files" lineno="4439"> +<interface name="files_read_generic_tmp_files" lineno="4478"> <summary> Read files in the tmp directory (/tmp). </summary> @@ -79479,7 +79615,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_tmp_dirs" lineno="4457"> +<interface name="files_manage_generic_tmp_dirs" lineno="4496"> <summary> Manage temporary directories in /tmp. </summary> @@ -79489,7 +79625,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_tmp_files" lineno="4475"> +<interface name="files_manage_generic_tmp_files" lineno="4514"> <summary> Manage temporary files and directories in /tmp. </summary> @@ -79499,7 +79635,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_tmp_symlinks" lineno="4493"> +<interface name="files_read_generic_tmp_symlinks" lineno="4532"> <summary> Read symbolic links in the tmp directory (/tmp). </summary> @@ -79509,7 +79645,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_generic_tmp_sockets" lineno="4511"> +<interface name="files_rw_generic_tmp_sockets" lineno="4550"> <summary> Read and write generic named sockets in the tmp directory (/tmp). </summary> @@ -79519,7 +79655,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_tmp" lineno="4529"> +<interface name="files_mounton_tmp" lineno="4568"> <summary> Mount filesystems in the tmp directory (/tmp) </summary> @@ -79529,7 +79665,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_all_tmp_dirs" lineno="4547"> +<interface name="files_setattr_all_tmp_dirs" lineno="4586"> <summary> Set the attributes of all tmp directories. </summary> @@ -79539,7 +79675,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_all_tmp" lineno="4565"> +<interface name="files_list_all_tmp" lineno="4604"> <summary> List all tmp directories. </summary> @@ -79549,7 +79685,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_tmp_dirs" lineno="4585"> +<interface name="files_relabel_all_tmp_dirs" lineno="4624"> <summary> Relabel to and from all temporary directory types. @@ -79561,7 +79697,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4606"> +<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4645"> <summary> Do not audit attempts to get the attributes of all tmp files. @@ -79572,7 +79708,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_getattr_all_tmp_files" lineno="4625"> +<interface name="files_getattr_all_tmp_files" lineno="4664"> <summary> Allow attempts to get the attributes of all tmp files. @@ -79583,7 +79719,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_tmp_files" lineno="4645"> +<interface name="files_relabel_all_tmp_files" lineno="4684"> <summary> Relabel to and from all temporary file types. @@ -79595,7 +79731,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4666"> +<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4705"> <summary> Do not audit attempts to get the attributes of all tmp sock_file. @@ -79606,7 +79742,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_read_all_tmp_files" lineno="4684"> +<interface name="files_read_all_tmp_files" lineno="4723"> <summary> Read all tmp files. </summary> @@ -79616,7 +79752,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_tmp_filetrans" lineno="4718"> +<interface name="files_tmp_filetrans" lineno="4757"> <summary> Create an object in the tmp directories, with a private type using a type transition. @@ -79642,7 +79778,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_purge_tmp" lineno="4736"> +<interface name="files_purge_tmp" lineno="4775"> <summary> Delete the contents of /tmp. </summary> @@ -79652,7 +79788,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_usr_dirs" lineno="4759"> +<interface name="files_setattr_usr_dirs" lineno="4798"> <summary> Set the attributes of the /usr directory. </summary> @@ -79662,7 +79798,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_usr" lineno="4777"> +<interface name="files_search_usr" lineno="4816"> <summary> Search the content of /usr. </summary> @@ -79672,7 +79808,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_usr" lineno="4796"> +<interface name="files_list_usr" lineno="4835"> <summary> List the contents of generic directories in /usr. @@ -79683,7 +79819,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_usr_dirs" lineno="4814"> +<interface name="files_dontaudit_write_usr_dirs" lineno="4853"> <summary> Do not audit write of /usr dirs </summary> @@ -79693,7 +79829,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_usr_dirs" lineno="4832"> +<interface name="files_rw_usr_dirs" lineno="4871"> <summary> Add and remove entries from /usr directories. </summary> @@ -79703,7 +79839,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_rw_usr_dirs" lineno="4851"> +<interface name="files_dontaudit_rw_usr_dirs" lineno="4890"> <summary> Do not audit attempts to add and remove entries from /usr directories. @@ -79714,7 +79850,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_delete_usr_dirs" lineno="4869"> +<interface name="files_delete_usr_dirs" lineno="4908"> <summary> Delete generic directories in /usr in the caller domain. </summary> @@ -79724,7 +79860,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_usr_files" lineno="4887"> +<interface name="files_watch_usr_dirs" lineno="4926"> +<summary> +Watch generic directories in /usr. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_usr_files" lineno="4944"> <summary> Delete generic files in /usr in the caller domain. </summary> @@ -79734,7 +79880,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_usr_files" lineno="4905"> +<interface name="files_getattr_usr_files" lineno="4962"> <summary> Get the attributes of files in /usr. </summary> @@ -79744,7 +79890,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_map_usr_files" lineno="4924"> +<interface name="files_map_usr_files" lineno="4981"> <summary> Map generic files in /usr. </summary> @@ -79755,7 +79901,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_read_usr_files" lineno="4960"> +<interface name="files_read_usr_files" lineno="5017"> <summary> Read generic files in /usr. </summary> @@ -79783,7 +79929,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_exec_usr_files" lineno="4980"> +<interface name="files_exec_usr_files" lineno="5037"> <summary> Execute generic programs in /usr in the caller domain. </summary> @@ -79793,7 +79939,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_usr_files" lineno="5000"> +<interface name="files_dontaudit_write_usr_files" lineno="5057"> <summary> dontaudit write of /usr files </summary> @@ -79803,7 +79949,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_usr_files" lineno="5018"> +<interface name="files_manage_usr_files" lineno="5075"> <summary> Create, read, write, and delete files in the /usr directory. </summary> @@ -79813,7 +79959,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_usr_files" lineno="5036"> +<interface name="files_relabelto_usr_files" lineno="5093"> <summary> Relabel a file to the type used in /usr. </summary> @@ -79823,7 +79969,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelfrom_usr_files" lineno="5054"> +<interface name="files_relabelfrom_usr_files" lineno="5111"> <summary> Relabel a file from the type used in /usr. </summary> @@ -79833,7 +79979,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_usr_symlinks" lineno="5072"> +<interface name="files_read_usr_symlinks" lineno="5129"> <summary> Read symbolic links in /usr. </summary> @@ -79843,7 +79989,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_usr_filetrans" lineno="5105"> +<interface name="files_usr_filetrans" lineno="5162"> <summary> Create objects in the /usr directory </summary> @@ -79868,7 +80014,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_search_src" lineno="5123"> +<interface name="files_search_src" lineno="5180"> <summary> Search directories in /usr/src. </summary> @@ -79878,7 +80024,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_src" lineno="5141"> +<interface name="files_dontaudit_search_src" lineno="5198"> <summary> Do not audit attempts to search /usr/src. </summary> @@ -79888,7 +80034,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_getattr_usr_src_files" lineno="5159"> +<interface name="files_getattr_usr_src_files" lineno="5216"> <summary> Get the attributes of files in /usr/src. </summary> @@ -79898,7 +80044,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_usr_src_files" lineno="5180"> +<interface name="files_read_usr_src_files" lineno="5237"> <summary> Read files in /usr/src. </summary> @@ -79908,7 +80054,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_usr_src_files" lineno="5201"> +<interface name="files_exec_usr_src_files" lineno="5258"> <summary> Execute programs in /usr/src in the caller domain. </summary> @@ -79918,7 +80064,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_kernel_symbol_table" lineno="5221"> +<interface name="files_create_kernel_symbol_table" lineno="5278"> <summary> Install a system.map into the /boot directory. </summary> @@ -79928,7 +80074,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_symbol_table" lineno="5240"> +<interface name="files_read_kernel_symbol_table" lineno="5297"> <summary> Read system.map in the /boot directory. </summary> @@ -79938,7 +80084,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_kernel_symbol_table" lineno="5259"> +<interface name="files_delete_kernel_symbol_table" lineno="5316"> <summary> Delete a system.map in the /boot directory. </summary> @@ -79948,7 +80094,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_var" lineno="5278"> +<interface name="files_search_var" lineno="5335"> <summary> Search the contents of /var. </summary> @@ -79958,7 +80104,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_var_dirs" lineno="5296"> +<interface name="files_dontaudit_write_var_dirs" lineno="5353"> <summary> Do not audit attempts to write to /var. </summary> @@ -79968,7 +80114,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_write_var_dirs" lineno="5314"> +<interface name="files_write_var_dirs" lineno="5371"> <summary> Allow attempts to write to /var.dirs </summary> @@ -79978,7 +80124,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_var" lineno="5333"> +<interface name="files_dontaudit_search_var" lineno="5390"> <summary> Do not audit attempts to search the contents of /var. @@ -79989,7 +80135,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_var" lineno="5351"> +<interface name="files_list_var" lineno="5408"> <summary> List the contents of /var. </summary> @@ -79999,7 +80145,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_var" lineno="5370"> +<interface name="files_dontaudit_list_var" lineno="5427"> <summary> Do not audit attempts to list the contents of /var. @@ -80010,7 +80156,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_var_dirs" lineno="5389"> +<interface name="files_manage_var_dirs" lineno="5446"> <summary> Create, read, write, and delete directories in the /var directory. @@ -80021,7 +80167,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_var_dirs" lineno="5407"> +<interface name="files_relabel_var_dirs" lineno="5464"> <summary> relabelto/from var directories </summary> @@ -80031,7 +80177,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_files" lineno="5425"> +<interface name="files_read_var_files" lineno="5482"> <summary> Read files in the /var directory. </summary> @@ -80041,7 +80187,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_append_var_files" lineno="5443"> +<interface name="files_append_var_files" lineno="5500"> <summary> Append files in the /var directory. </summary> @@ -80051,7 +80197,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_var_files" lineno="5461"> +<interface name="files_rw_var_files" lineno="5518"> <summary> Read and write files in the /var directory. </summary> @@ -80061,7 +80207,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_rw_var_files" lineno="5480"> +<interface name="files_dontaudit_rw_var_files" lineno="5537"> <summary> Do not audit attempts to read and write files in the /var directory. @@ -80072,7 +80218,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_var_files" lineno="5498"> +<interface name="files_manage_var_files" lineno="5555"> <summary> Create, read, write, and delete files in the /var directory. </summary> @@ -80082,7 +80228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_symlinks" lineno="5516"> +<interface name="files_read_var_symlinks" lineno="5573"> <summary> Read symbolic links in the /var directory. </summary> @@ -80092,7 +80238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_var_symlinks" lineno="5535"> +<interface name="files_manage_var_symlinks" lineno="5592"> <summary> Create, read, write, and delete symbolic links in the /var directory. @@ -80103,7 +80249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_var_filetrans" lineno="5568"> +<interface name="files_var_filetrans" lineno="5625"> <summary> Create objects in the /var directory </summary> @@ -80128,7 +80274,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_var_lib_dirs" lineno="5586"> +<interface name="files_getattr_var_lib_dirs" lineno="5643"> <summary> Get the attributes of the /var/lib directory. </summary> @@ -80138,7 +80284,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_var_lib" lineno="5618"> +<interface name="files_search_var_lib" lineno="5675"> <summary> Search the /var/lib directory. </summary> @@ -80162,7 +80308,7 @@ Domain allowed access. </param> <infoflow type="read" weight="5"/> </interface> -<interface name="files_dontaudit_search_var_lib" lineno="5638"> +<interface name="files_dontaudit_search_var_lib" lineno="5695"> <summary> Do not audit attempts to search the contents of /var/lib. @@ -80174,7 +80320,7 @@ Domain to not audit. </param> <infoflow type="read" weight="5"/> </interface> -<interface name="files_list_var_lib" lineno="5656"> +<interface name="files_list_var_lib" lineno="5713"> <summary> List the contents of the /var/lib directory. </summary> @@ -80184,7 +80330,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_var_lib_dirs" lineno="5674"> +<interface name="files_rw_var_lib_dirs" lineno="5731"> <summary> Read-write /var/lib directories </summary> @@ -80194,7 +80340,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_var_lib_dirs" lineno="5692"> +<interface name="files_manage_var_lib_dirs" lineno="5749"> <summary> manage var_lib_t dirs </summary> @@ -80204,7 +80350,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_var_lib_dirs" lineno="5711"> +<interface name="files_relabel_var_lib_dirs" lineno="5768"> <summary> relabel var_lib_t dirs </summary> @@ -80214,7 +80360,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_var_lib_filetrans" lineno="5745"> +<interface name="files_var_lib_filetrans" lineno="5802"> <summary> Create objects in the /var/lib directory </summary> @@ -80239,7 +80385,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_read_var_lib_files" lineno="5764"> +<interface name="files_read_var_lib_files" lineno="5821"> <summary> Read generic files in /var/lib. </summary> @@ -80249,7 +80395,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_lib_symlinks" lineno="5783"> +<interface name="files_read_var_lib_symlinks" lineno="5840"> <summary> Read generic symbolic links in /var/lib </summary> @@ -80259,7 +80405,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_urandom_seed" lineno="5805"> +<interface name="files_manage_urandom_seed" lineno="5862"> <summary> Create, read, write, and delete the pseudorandom number generator seed. @@ -80270,7 +80416,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mounttab" lineno="5825"> +<interface name="files_manage_mounttab" lineno="5882"> <summary> Allow domain to manage mount tables necessary for rpcd, nfsd, etc. @@ -80281,7 +80427,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_lock_dirs" lineno="5844"> +<interface name="files_setattr_lock_dirs" lineno="5901"> <summary> Set the attributes of the generic lock directories. </summary> @@ -80291,7 +80437,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_locks" lineno="5862"> +<interface name="files_search_locks" lineno="5919"> <summary> Search the locks directory (/var/lock). </summary> @@ -80301,7 +80447,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_locks" lineno="5882"> +<interface name="files_dontaudit_search_locks" lineno="5939"> <summary> Do not audit attempts to search the locks directory (/var/lock). @@ -80312,7 +80458,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_locks" lineno="5901"> +<interface name="files_list_locks" lineno="5958"> <summary> List generic lock directories. </summary> @@ -80322,7 +80468,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_check_write_lock_dirs" lineno="5920"> +<interface name="files_check_write_lock_dirs" lineno="5977"> <summary> Test write access on lock directories. </summary> @@ -80332,7 +80478,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_add_entry_lock_dirs" lineno="5939"> +<interface name="files_add_entry_lock_dirs" lineno="5996"> <summary> Add entries in the /var/lock directories. </summary> @@ -80342,7 +80488,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_lock_dirs" lineno="5959"> +<interface name="files_rw_lock_dirs" lineno="6016"> <summary> Add and remove entries in the /var/lock directories. @@ -80353,7 +80499,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_lock_dirs" lineno="5978"> +<interface name="files_create_lock_dirs" lineno="6035"> <summary> Create lock directories </summary> @@ -80363,7 +80509,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_relabel_all_lock_dirs" lineno="5999"> +<interface name="files_relabel_all_lock_dirs" lineno="6056"> <summary> Relabel to and from all lock directory types. </summary> @@ -80374,7 +80520,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_generic_locks" lineno="6020"> +<interface name="files_getattr_generic_locks" lineno="6077"> <summary> Get the attributes of generic lock files. </summary> @@ -80384,7 +80530,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_generic_locks" lineno="6041"> +<interface name="files_delete_generic_locks" lineno="6098"> <summary> Delete generic lock files. </summary> @@ -80394,7 +80540,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_locks" lineno="6062"> +<interface name="files_manage_generic_locks" lineno="6119"> <summary> Create, read, write, and delete generic lock files. @@ -80405,7 +80551,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_locks" lineno="6084"> +<interface name="files_delete_all_locks" lineno="6141"> <summary> Delete all lock files. </summary> @@ -80416,7 +80562,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_all_locks" lineno="6105"> +<interface name="files_read_all_locks" lineno="6162"> <summary> Read all lock files. </summary> @@ -80426,7 +80572,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_all_locks" lineno="6128"> +<interface name="files_manage_all_locks" lineno="6185"> <summary> manage all lock files. </summary> @@ -80436,7 +80582,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_locks" lineno="6151"> +<interface name="files_relabel_all_locks" lineno="6208"> <summary> Relabel from/to all lock files. </summary> @@ -80446,7 +80592,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_lock_filetrans" lineno="6190"> +<interface name="files_lock_filetrans" lineno="6247"> <summary> Create an object in the locks directory, with a private type using a type transition. @@ -80472,7 +80618,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_pid_dirs" lineno="6211"> +<interface name="files_dontaudit_getattr_pid_dirs" lineno="6268"> <summary> Do not audit attempts to get the attributes of the /var/run directory. @@ -80483,7 +80629,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_mounton_pid_dirs" lineno="6230"> +<interface name="files_mounton_pid_dirs" lineno="6287"> <summary> mounton a /var/run directory. </summary> @@ -80493,7 +80639,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_pid_dirs" lineno="6248"> +<interface name="files_setattr_pid_dirs" lineno="6305"> <summary> Set the attributes of the /var/run directory. </summary> @@ -80503,7 +80649,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_pids" lineno="6268"> +<interface name="files_search_pids" lineno="6325"> <summary> Search the contents of runtime process ID directories (/var/run). @@ -80514,7 +80660,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_pids" lineno="6288"> +<interface name="files_dontaudit_search_pids" lineno="6345"> <summary> Do not audit attempts to search the /var/run directory. @@ -80525,7 +80671,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_pids" lineno="6308"> +<interface name="files_list_pids" lineno="6365"> <summary> List the contents of the runtime process ID directories (/var/run). @@ -80536,7 +80682,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_check_write_pid_dirs" lineno="6327"> +<interface name="files_check_write_pid_dirs" lineno="6384"> <summary> Check write access on /var/run directories. </summary> @@ -80546,7 +80692,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_pid_dirs" lineno="6345"> +<interface name="files_create_pid_dirs" lineno="6402"> <summary> Create a /var/run directory. </summary> @@ -80556,7 +80702,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_pids" lineno="6363"> +<interface name="files_watch_runtime_dirs" lineno="6420"> +<summary> +Watch /var/run directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_generic_pids" lineno="6438"> <summary> Read generic process ID files. </summary> @@ -80566,7 +80722,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_generic_pid_pipes" lineno="6383"> +<interface name="files_write_generic_pid_pipes" lineno="6458"> <summary> Write named generic process ID pipes </summary> @@ -80576,7 +80732,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_pid_filetrans" lineno="6444"> +<interface name="files_pid_filetrans" lineno="6519"> <summary> Create an object in the process ID directory, with a private type. </summary> @@ -80628,7 +80784,7 @@ The name of the object being created. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="files_pid_filetrans_lock_dir" lineno="6469"> +<interface name="files_pid_filetrans_lock_dir" lineno="6544"> <summary> Create a generic lock directory within the run directories </summary> @@ -80643,7 +80799,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_rw_generic_pids" lineno="6487"> +<interface name="files_rw_generic_pids" lineno="6562"> <summary> Read and write generic process ID files. </summary> @@ -80653,7 +80809,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_pids" lineno="6508"> +<interface name="files_dontaudit_getattr_all_pids" lineno="6583"> <summary> Do not audit attempts to get the attributes of daemon runtime data files. @@ -80664,7 +80820,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_write_all_pids" lineno="6528"> +<interface name="files_dontaudit_write_all_pids" lineno="6603"> <summary> Do not audit attempts to write to daemon runtime data files. </summary> @@ -80674,7 +80830,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_ioctl_all_pids" lineno="6547"> +<interface name="files_dontaudit_ioctl_all_pids" lineno="6623"> <summary> Do not audit attempts to ioctl daemon runtime data files. </summary> @@ -80684,7 +80840,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_all_pid_dirs" lineno="6568"> +<interface name="files_manage_all_pid_dirs" lineno="6644"> <summary> manage all pidfile directories in the /var/run directory. @@ -80695,7 +80851,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_all_pids" lineno="6587"> +<interface name="files_read_all_pids" lineno="6663"> <summary> Read all process ID files. </summary> @@ -80706,7 +80862,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_exec_generic_pid_files" lineno="6608"> +<interface name="files_exec_generic_pid_files" lineno="6684"> <summary> Execute generic programs in /var/run in the caller domain. </summary> @@ -80716,7 +80872,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_pid_files" lineno="6626"> +<interface name="files_relabel_all_pid_files" lineno="6702"> <summary> Relable all pid files </summary> @@ -80726,7 +80882,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_pids" lineno="6645"> +<interface name="files_delete_all_pids" lineno="6721"> <summary> Delete all process IDs. </summary> @@ -80737,7 +80893,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_create_all_pid_sockets" lineno="6670"> +<interface name="files_create_all_pid_sockets" lineno="6746"> <summary> Create all pid sockets </summary> @@ -80747,7 +80903,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_pid_pipes" lineno="6688"> +<interface name="files_create_all_pid_pipes" lineno="6764"> <summary> Create all pid named pipes </summary> @@ -80757,7 +80913,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_spool_sockets" lineno="6706"> +<interface name="files_create_all_spool_sockets" lineno="6782"> <summary> Create all spool sockets </summary> @@ -80767,7 +80923,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_spool_sockets" lineno="6724"> +<interface name="files_delete_all_spool_sockets" lineno="6800"> <summary> Delete all spool sockets </summary> @@ -80777,7 +80933,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_pid_dirs" lineno="6742"> +<interface name="files_delete_all_pid_dirs" lineno="6818"> <summary> Delete all process ID directories. </summary> @@ -80787,7 +80943,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_all_pids" lineno="6764"> +<interface name="files_manage_all_pids" lineno="6840"> <summary> Create, read, write and delete all var_run (pid) content @@ -80798,7 +80954,7 @@ Domain alloed access. </summary> </param> </interface> -<interface name="files_relabel_all_pid_dirs" lineno="6784"> +<interface name="files_relabel_all_pid_dirs" lineno="6860"> <summary> Relabel to/from all var_run (pid) directories </summary> @@ -80808,7 +80964,7 @@ Domain alloed access. </summary> </param> </interface> -<interface name="files_relabel_all_pid_sock_files" lineno="6802"> +<interface name="files_relabel_all_pid_sock_files" lineno="6878"> <summary> Relabel to/from all var_run (pid) socket files </summary> @@ -80818,7 +80974,7 @@ Domain alloed access. </summary> </param> </interface> -<interface name="files_relabel_all_pids" lineno="6820"> +<interface name="files_relabel_all_pids" lineno="6896"> <summary> Relabel to/from all var_run (pid) files and directories </summary> @@ -80828,7 +80984,7 @@ Domain alloed access. </summary> </param> </interface> -<interface name="files_mounton_all_poly_members" lineno="6841"> +<interface name="files_mounton_all_poly_members" lineno="6917"> <summary> Mount filesystems on all polyinstantiation member directories. @@ -80839,7 +80995,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_spool" lineno="6860"> +<interface name="files_search_spool" lineno="6936"> <summary> Search the contents of generic spool directories (/var/spool). @@ -80850,7 +81006,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_spool" lineno="6879"> +<interface name="files_dontaudit_search_spool" lineno="6955"> <summary> Do not audit attempts to search generic spool directories. @@ -80861,7 +81017,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_spool" lineno="6898"> +<interface name="files_list_spool" lineno="6974"> <summary> List the contents of generic spool (/var/spool) directories. @@ -80872,7 +81028,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_spool_dirs" lineno="6917"> +<interface name="files_manage_generic_spool_dirs" lineno="6993"> <summary> Create, read, write, and delete generic spool directories (/var/spool). @@ -80883,7 +81039,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_spool" lineno="6936"> +<interface name="files_read_generic_spool" lineno="7012"> <summary> Read generic spool files. </summary> @@ -80893,7 +81049,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_spool" lineno="6956"> +<interface name="files_manage_generic_spool" lineno="7032"> <summary> Create, read, write, and delete generic spool files. @@ -80904,7 +81060,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_spool_filetrans" lineno="6992"> +<interface name="files_spool_filetrans" lineno="7068"> <summary> Create objects in the spool directory with a private type with a type transition. @@ -80931,7 +81087,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_polyinstantiate_all" lineno="7012"> +<interface name="files_polyinstantiate_all" lineno="7088"> <summary> Allow access to manage all polyinstantiated directories on the system. @@ -80942,7 +81098,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_unconfined" lineno="7066"> +<interface name="files_unconfined" lineno="7142"> <summary> Unconfined access to files. </summary> @@ -80952,7 +81108,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_runtime_lnk_files" lineno="7088"> +<interface name="files_manage_etc_runtime_lnk_files" lineno="7164"> <summary> Create, read, write, and delete symbolic links in /etc that are dynamically created on boot. @@ -80964,7 +81120,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_read_etc_runtime" lineno="7106"> +<interface name="files_dontaudit_read_etc_runtime" lineno="7182"> <summary> Do not audit attempts to read etc_runtime resources </summary> @@ -80974,7 +81130,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_src" lineno="7124"> +<interface name="files_list_src" lineno="7200"> <summary> List usr/src files </summary> @@ -80984,7 +81140,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_read_src_files" lineno="7142"> +<interface name="files_read_src_files" lineno="7218"> <summary> Read usr/src files </summary> @@ -80994,7 +81150,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_manage_src_files" lineno="7160"> +<interface name="files_manage_src_files" lineno="7236"> <summary> Manage /usr/src files </summary> @@ -81004,7 +81160,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_lib_filetrans_kernel_modules" lineno="7191"> +<interface name="files_lib_filetrans_kernel_modules" lineno="7267"> <summary> Create a resource in the generic lib location with an automatic type transition towards the kernel modules @@ -81026,7 +81182,7 @@ Optional name of the resource </summary> </param> </interface> -<interface name="files_read_etc_runtime" lineno="7209"> +<interface name="files_read_etc_runtime" lineno="7285"> <summary> Read etc runtime resources </summary> @@ -81036,7 +81192,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_relabel_all_non_security_file_types" lineno="7231"> +<interface name="files_relabel_all_non_security_file_types" lineno="7307"> <summary> Allow relabel from and to non-security types </summary> @@ -81047,7 +81203,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_non_security_file_types" lineno="7261"> +<interface name="files_manage_all_non_security_file_types" lineno="7337"> <summary> Manage non-security-sensitive resource types </summary> @@ -81058,7 +81214,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_all_pidfiles" lineno="7283"> +<interface name="files_relabel_all_pidfiles" lineno="7359"> <summary> Allow relabeling from and to any pidfile associated type </summary> @@ -81564,7 +81720,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_create_cgroup_links" lineno="839"> +<interface name="fs_watch_cgroup_files" lineno="839"> +<summary> +Watch cgroup files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_create_cgroup_links" lineno="858"> <summary> Create cgroup lnk_files. </summary> @@ -81574,7 +81740,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_cgroup_files" lineno="859"> +<interface name="fs_write_cgroup_files" lineno="878"> <summary> Write cgroup files. </summary> @@ -81584,7 +81750,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_cgroup_files" lineno="878"> +<interface name="fs_rw_cgroup_files" lineno="897"> <summary> Read and write cgroup files. </summary> @@ -81594,7 +81760,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_rw_cgroup_files" lineno="899"> +<interface name="fs_dontaudit_rw_cgroup_files" lineno="919"> <summary> Do not audit attempts to open, get attributes, read and write @@ -81606,7 +81772,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cgroup_files" lineno="917"> +<interface name="fs_manage_cgroup_files" lineno="937"> <summary> Manage cgroup files. </summary> @@ -81616,7 +81782,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_cgroup_symlinks" lineno="937"> +<interface name="fs_relabel_cgroup_symlinks" lineno="957"> <summary> Relabel cgroup symbolic links. </summary> @@ -81626,7 +81792,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_cgroup" lineno="955"> +<interface name="fs_mounton_cgroup" lineno="975"> <summary> Mount on cgroup directories. </summary> @@ -81636,7 +81802,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_cgroup_filetrans" lineno="989"> +<interface name="fs_cgroup_filetrans" lineno="1009"> <summary> Create an object in a cgroup tmpfs filesystem, with a private type using a type transition. @@ -81662,7 +81828,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_dontaudit_list_cifs_dirs" lineno="1010"> +<interface name="fs_dontaudit_list_cifs_dirs" lineno="1030"> <summary> Do not audit attempts to read dirs on a CIFS or SMB filesystem. @@ -81673,7 +81839,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mount_cifs" lineno="1028"> +<interface name="fs_mount_cifs" lineno="1048"> <summary> Mount a CIFS or SMB network filesystem. </summary> @@ -81683,7 +81849,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_cifs" lineno="1047"> +<interface name="fs_remount_cifs" lineno="1067"> <summary> Remount a CIFS or SMB network filesystem. This allows some mount options to be changed. @@ -81694,7 +81860,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_cifs" lineno="1065"> +<interface name="fs_unmount_cifs" lineno="1085"> <summary> Unmount a CIFS or SMB network filesystem. </summary> @@ -81704,7 +81870,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_cifs" lineno="1085"> +<interface name="fs_getattr_cifs" lineno="1105"> <summary> Get the attributes of a CIFS or SMB network filesystem. @@ -81716,7 +81882,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_search_cifs" lineno="1103"> +<interface name="fs_search_cifs" lineno="1123"> <summary> Search directories on a CIFS or SMB filesystem. </summary> @@ -81726,7 +81892,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_cifs" lineno="1122"> +<interface name="fs_list_cifs" lineno="1142"> <summary> List the contents of directories on a CIFS or SMB filesystem. @@ -81737,7 +81903,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_cifs" lineno="1141"> +<interface name="fs_dontaudit_list_cifs" lineno="1161"> <summary> Do not audit attempts to list the contents of directories on a CIFS or SMB filesystem. @@ -81748,7 +81914,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mounton_cifs" lineno="1159"> +<interface name="fs_mounton_cifs" lineno="1179"> <summary> Mounton a CIFS filesystem. </summary> @@ -81758,7 +81924,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_files" lineno="1178"> +<interface name="fs_read_cifs_files" lineno="1198"> <summary> Read files on a CIFS or SMB filesystem. </summary> @@ -81769,7 +81935,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_noxattr_fs" lineno="1199"> +<interface name="fs_getattr_noxattr_fs" lineno="1219"> <summary> Get the attributes of filesystems that do not have extended attribute support. @@ -81781,7 +81947,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_list_noxattr_fs" lineno="1217"> +<interface name="fs_list_noxattr_fs" lineno="1237"> <summary> Read all noxattrfs directories. </summary> @@ -81791,7 +81957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_noxattr_fs" lineno="1236"> +<interface name="fs_dontaudit_list_noxattr_fs" lineno="1256"> <summary> Do not audit attempts to list all noxattrfs directories. @@ -81802,7 +81968,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_dirs" lineno="1254"> +<interface name="fs_manage_noxattr_fs_dirs" lineno="1274"> <summary> Create, read, write, and delete all noxattrfs directories. </summary> @@ -81812,7 +81978,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_noxattr_fs_files" lineno="1272"> +<interface name="fs_read_noxattr_fs_files" lineno="1292"> <summary> Read all noxattrfs files. </summary> @@ -81822,7 +81988,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1292"> +<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1312"> <summary> Do not audit attempts to read all noxattrfs files. @@ -81833,7 +81999,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1310"> +<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1330"> <summary> Dont audit attempts to write to noxattrfs files. </summary> @@ -81843,7 +82009,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_files" lineno="1328"> +<interface name="fs_manage_noxattr_fs_files" lineno="1348"> <summary> Create, read, write, and delete all noxattrfs files. </summary> @@ -81853,7 +82019,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_noxattr_fs_symlinks" lineno="1347"> +<interface name="fs_read_noxattr_fs_symlinks" lineno="1367"> <summary> Read all noxattrfs symbolic links. </summary> @@ -81863,7 +82029,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_symlinks" lineno="1366"> +<interface name="fs_manage_noxattr_fs_symlinks" lineno="1386"> <summary> Manage all noxattrfs symbolic links. </summary> @@ -81873,7 +82039,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_noxattr_fs" lineno="1386"> +<interface name="fs_relabelfrom_noxattr_fs" lineno="1406"> <summary> Relabel all objets from filesystems that do not support extended attributes. @@ -81884,7 +82050,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_cifs_files" lineno="1412"> +<interface name="fs_dontaudit_read_cifs_files" lineno="1432"> <summary> Do not audit attempts to read files on a CIFS or SMB filesystem. @@ -81895,7 +82061,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_append_cifs_files" lineno="1432"> +<interface name="fs_append_cifs_files" lineno="1452"> <summary> Append files on a CIFS filesystem. @@ -81907,7 +82073,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_append_cifs_files" lineno="1452"> +<interface name="fs_dontaudit_append_cifs_files" lineno="1472"> <summary> dontaudit Append files on a CIFS filesystem. @@ -81919,7 +82085,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_rw_cifs_files" lineno="1471"> +<interface name="fs_dontaudit_rw_cifs_files" lineno="1491"> <summary> Do not audit attempts to read or write files on a CIFS or SMB filesystem. @@ -81930,7 +82096,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_cifs_symlinks" lineno="1489"> +<interface name="fs_read_cifs_symlinks" lineno="1509"> <summary> Read symbolic links on a CIFS or SMB filesystem. </summary> @@ -81940,7 +82106,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_named_pipes" lineno="1509"> +<interface name="fs_read_cifs_named_pipes" lineno="1529"> <summary> Read named pipes on a CIFS or SMB network filesystem. @@ -81951,7 +82117,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_named_sockets" lineno="1528"> +<interface name="fs_read_cifs_named_sockets" lineno="1548"> <summary> Read named sockets on a CIFS or SMB network filesystem. @@ -81962,7 +82128,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_exec_cifs_files" lineno="1549"> +<interface name="fs_exec_cifs_files" lineno="1569"> <summary> Execute files on a CIFS or SMB network filesystem, in the caller @@ -81975,7 +82141,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_cifs_dirs" lineno="1570"> +<interface name="fs_manage_cifs_dirs" lineno="1590"> <summary> Create, read, write, and delete directories on a CIFS or SMB network filesystem. @@ -81987,7 +82153,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1590"> +<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1610"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -81999,7 +82165,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cifs_files" lineno="1610"> +<interface name="fs_manage_cifs_files" lineno="1630"> <summary> Create, read, write, and delete files on a CIFS or SMB network filesystem. @@ -82011,7 +82177,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_cifs_files" lineno="1630"> +<interface name="fs_dontaudit_manage_cifs_files" lineno="1650"> <summary> Do not audit attempts to create, read, write, and delete files @@ -82023,7 +82189,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cifs_symlinks" lineno="1649"> +<interface name="fs_manage_cifs_symlinks" lineno="1669"> <summary> Create, read, write, and delete symbolic links on a CIFS or SMB network filesystem. @@ -82034,7 +82200,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_cifs_named_pipes" lineno="1668"> +<interface name="fs_manage_cifs_named_pipes" lineno="1688"> <summary> Create, read, write, and delete named pipes on a CIFS or SMB network filesystem. @@ -82045,7 +82211,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_cifs_named_sockets" lineno="1687"> +<interface name="fs_manage_cifs_named_sockets" lineno="1707"> <summary> Create, read, write, and delete named sockets on a CIFS or SMB network filesystem. @@ -82056,7 +82222,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_cifs_domtrans" lineno="1730"> +<interface name="fs_cifs_domtrans" lineno="1750"> <summary> Execute a file on a CIFS or SMB filesystem in the specified domain. @@ -82091,7 +82257,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="fs_manage_configfs_dirs" lineno="1750"> +<interface name="fs_manage_configfs_dirs" lineno="1770"> <summary> Create, read, write, and delete dirs on a configfs filesystem. @@ -82102,7 +82268,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_configfs_files" lineno="1769"> +<interface name="fs_manage_configfs_files" lineno="1789"> <summary> Create, read, write, and delete files on a configfs filesystem. @@ -82113,7 +82279,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_dos_fs" lineno="1788"> +<interface name="fs_mount_dos_fs" lineno="1808"> <summary> Mount a DOS filesystem, such as FAT32 or NTFS. @@ -82124,7 +82290,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_dos_fs" lineno="1808"> +<interface name="fs_remount_dos_fs" lineno="1828"> <summary> Remount a DOS filesystem, such as FAT32 or NTFS. This allows @@ -82136,7 +82302,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_dos_fs" lineno="1827"> +<interface name="fs_unmount_dos_fs" lineno="1847"> <summary> Unmount a DOS filesystem, such as FAT32 or NTFS. @@ -82147,7 +82313,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_dos_fs" lineno="1847"> +<interface name="fs_getattr_dos_fs" lineno="1867"> <summary> Get the attributes of a DOS filesystem, such as FAT32 or NTFS. @@ -82159,7 +82325,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_relabelfrom_dos_fs" lineno="1866"> +<interface name="fs_relabelfrom_dos_fs" lineno="1886"> <summary> Allow changing of the label of a DOS filesystem using the context= mount option. @@ -82170,7 +82336,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_dos_dirs" lineno="1884"> +<interface name="fs_getattr_dos_dirs" lineno="1904"> <summary> Get attributes of directories on a dosfs filesystem. </summary> @@ -82180,7 +82346,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_dos" lineno="1902"> +<interface name="fs_search_dos" lineno="1922"> <summary> Search dosfs filesystem. </summary> @@ -82190,7 +82356,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_dos" lineno="1920"> +<interface name="fs_list_dos" lineno="1940"> <summary> List dirs DOS filesystem. </summary> @@ -82200,7 +82366,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_dos_dirs" lineno="1939"> +<interface name="fs_manage_dos_dirs" lineno="1959"> <summary> Create, read, write, and delete dirs on a DOS filesystem. @@ -82211,7 +82377,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_dos_files" lineno="1957"> +<interface name="fs_read_dos_files" lineno="1977"> <summary> Read files on a DOS filesystem. </summary> @@ -82221,7 +82387,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_dos_files" lineno="1976"> +<interface name="fs_manage_dos_files" lineno="1996"> <summary> Create, read, write, and delete files on a DOS filesystem. @@ -82232,7 +82398,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_efivarfs_files" lineno="1996"> +<interface name="fs_list_efivars" lineno="2014"> +<summary> +List dirs in efivarfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_efivarfs_files" lineno="2034"> <summary> Read files in efivarfs - contains Linux Kernel configuration options for UEFI systems @@ -82244,7 +82420,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_fusefs" lineno="2014"> +<interface name="fs_getattr_fusefs" lineno="2052"> <summary> stat a FUSE filesystem </summary> @@ -82254,7 +82430,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_fusefs" lineno="2032"> +<interface name="fs_mount_fusefs" lineno="2070"> <summary> Mount a FUSE filesystem. </summary> @@ -82264,7 +82440,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_fusefs" lineno="2050"> +<interface name="fs_unmount_fusefs" lineno="2088"> <summary> Unmount a FUSE filesystem. </summary> @@ -82274,7 +82450,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_fusefs" lineno="2068"> +<interface name="fs_mounton_fusefs" lineno="2106"> <summary> Mounton a FUSEFS filesystem. </summary> @@ -82284,7 +82460,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_fusefs" lineno="2088"> +<interface name="fs_search_fusefs" lineno="2126"> <summary> Search directories on a FUSEFS filesystem. @@ -82296,7 +82472,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_list_fusefs" lineno="2107"> +<interface name="fs_dontaudit_list_fusefs" lineno="2145"> <summary> Do not audit attempts to list the contents of directories on a FUSEFS filesystem. @@ -82307,7 +82483,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_fusefs_dirs" lineno="2127"> +<interface name="fs_manage_fusefs_dirs" lineno="2165"> <summary> Create, read, write, and delete directories on a FUSEFS filesystem. @@ -82319,7 +82495,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2147"> +<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2185"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -82331,7 +82507,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_fusefs_files" lineno="2166"> +<interface name="fs_read_fusefs_files" lineno="2204"> <summary> Read, a FUSEFS filesystem. </summary> @@ -82342,7 +82518,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_exec_fusefs_files" lineno="2185"> +<interface name="fs_exec_fusefs_files" lineno="2223"> <summary> Execute files on a FUSEFS filesystem. </summary> @@ -82353,7 +82529,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_fusefs_files" lineno="2205"> +<interface name="fs_manage_fusefs_files" lineno="2243"> <summary> Create, read, write, and delete files on a FUSEFS filesystem. @@ -82365,7 +82541,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_fusefs_files" lineno="2225"> +<interface name="fs_dontaudit_manage_fusefs_files" lineno="2263"> <summary> Do not audit attempts to create, read, write, and delete files @@ -82377,7 +82553,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_fusefs_symlinks" lineno="2243"> +<interface name="fs_read_fusefs_symlinks" lineno="2281"> <summary> Read symbolic links on a FUSEFS filesystem. </summary> @@ -82387,7 +82563,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_hugetlbfs" lineno="2263"> +<interface name="fs_getattr_hugetlbfs" lineno="2301"> <summary> Get the attributes of an hugetlbfs filesystem. @@ -82398,7 +82574,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_hugetlbfs" lineno="2281"> +<interface name="fs_list_hugetlbfs" lineno="2319"> <summary> List hugetlbfs. </summary> @@ -82408,7 +82584,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_hugetlbfs_dirs" lineno="2299"> +<interface name="fs_manage_hugetlbfs_dirs" lineno="2337"> <summary> Manage hugetlbfs dirs. </summary> @@ -82418,7 +82594,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2317"> +<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2355"> <summary> Read and write inherited hugetlbfs files. </summary> @@ -82428,7 +82604,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_hugetlbfs_files" lineno="2335"> +<interface name="fs_rw_hugetlbfs_files" lineno="2373"> <summary> Read and write hugetlbfs files. </summary> @@ -82438,7 +82614,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2353"> +<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2391"> <summary> Read, map and write hugetlbfs files. </summary> @@ -82448,7 +82624,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_associate_hugetlbfs" lineno="2372"> +<interface name="fs_associate_hugetlbfs" lineno="2410"> <summary> Allow the type to associate to hugetlbfs filesystems. </summary> @@ -82458,7 +82634,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_search_inotifyfs" lineno="2390"> +<interface name="fs_search_inotifyfs" lineno="2428"> <summary> Search inotifyfs filesystem. </summary> @@ -82468,7 +82644,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_inotifyfs" lineno="2408"> +<interface name="fs_list_inotifyfs" lineno="2446"> <summary> List inotifyfs filesystem. </summary> @@ -82478,7 +82654,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_inotifyfs" lineno="2426"> +<interface name="fs_dontaudit_list_inotifyfs" lineno="2464"> <summary> Dontaudit List inotifyfs filesystem. </summary> @@ -82488,7 +82664,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_hugetlbfs_filetrans" lineno="2460"> +<interface name="fs_hugetlbfs_filetrans" lineno="2498"> <summary> Create an object in a hugetlbfs filesystem, with a private type using a type transition. @@ -82514,7 +82690,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_mount_iso9660_fs" lineno="2480"> +<interface name="fs_mount_iso9660_fs" lineno="2518"> <summary> Mount an iso9660 filesystem, which is usually used on CDs. @@ -82525,7 +82701,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_iso9660_fs" lineno="2500"> +<interface name="fs_remount_iso9660_fs" lineno="2538"> <summary> Remount an iso9660 filesystem, which is usually used on CDs. This allows @@ -82537,7 +82713,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_iso9660_fs" lineno="2519"> +<interface name="fs_relabelfrom_iso9660_fs" lineno="2557"> <summary> Allow changing of the label of a filesystem with iso9660 type @@ -82548,7 +82724,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_iso9660_fs" lineno="2538"> +<interface name="fs_unmount_iso9660_fs" lineno="2576"> <summary> Unmount an iso9660 filesystem, which is usually used on CDs. @@ -82559,7 +82735,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_iso9660_fs" lineno="2558"> +<interface name="fs_getattr_iso9660_fs" lineno="2596"> <summary> Get the attributes of an iso9660 filesystem, which is usually used on CDs. @@ -82571,7 +82747,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_iso9660_files" lineno="2577"> +<interface name="fs_getattr_iso9660_files" lineno="2615"> <summary> Get the attributes of files on an iso9660 filesystem, which is usually used on CDs. @@ -82582,7 +82758,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_iso9660_files" lineno="2597"> +<interface name="fs_read_iso9660_files" lineno="2635"> <summary> Read files on an iso9660 filesystem, which is usually used on CDs. @@ -82593,7 +82769,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_nfs" lineno="2617"> +<interface name="fs_mount_nfs" lineno="2655"> <summary> Mount a NFS filesystem. </summary> @@ -82603,7 +82779,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_nfs" lineno="2636"> +<interface name="fs_remount_nfs" lineno="2674"> <summary> Remount a NFS filesystem. This allows some mount options to be changed. @@ -82614,7 +82790,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_nfs" lineno="2654"> +<interface name="fs_unmount_nfs" lineno="2692"> <summary> Unmount a NFS filesystem. </summary> @@ -82624,7 +82800,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfs" lineno="2673"> +<interface name="fs_getattr_nfs" lineno="2711"> <summary> Get the attributes of a NFS filesystem. </summary> @@ -82635,7 +82811,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_search_nfs" lineno="2691"> +<interface name="fs_search_nfs" lineno="2729"> <summary> Search directories on a NFS filesystem. </summary> @@ -82645,7 +82821,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_nfs" lineno="2709"> +<interface name="fs_list_nfs" lineno="2747"> <summary> List NFS filesystem. </summary> @@ -82655,7 +82831,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_nfs" lineno="2728"> +<interface name="fs_dontaudit_list_nfs" lineno="2766"> <summary> Do not audit attempts to list the contents of directories on a NFS filesystem. @@ -82666,7 +82842,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mounton_nfs" lineno="2746"> +<interface name="fs_mounton_nfs" lineno="2784"> <summary> Mounton a NFS filesystem. </summary> @@ -82676,7 +82852,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nfs_files" lineno="2765"> +<interface name="fs_read_nfs_files" lineno="2803"> <summary> Read files on a NFS filesystem. </summary> @@ -82687,7 +82863,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_read_nfs_files" lineno="2785"> +<interface name="fs_dontaudit_read_nfs_files" lineno="2823"> <summary> Do not audit attempts to read files on a NFS filesystem. @@ -82698,7 +82874,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_write_nfs_files" lineno="2803"> +<interface name="fs_write_nfs_files" lineno="2841"> <summary> Read files on a NFS filesystem. </summary> @@ -82708,7 +82884,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_exec_nfs_files" lineno="2823"> +<interface name="fs_exec_nfs_files" lineno="2861"> <summary> Execute files on a NFS filesystem. </summary> @@ -82719,7 +82895,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_append_nfs_files" lineno="2844"> +<interface name="fs_append_nfs_files" lineno="2882"> <summary> Append files on a NFS filesystem. @@ -82731,7 +82907,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_append_nfs_files" lineno="2864"> +<interface name="fs_dontaudit_append_nfs_files" lineno="2902"> <summary> dontaudit Append files on a NFS filesystem. @@ -82743,7 +82919,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_rw_nfs_files" lineno="2883"> +<interface name="fs_dontaudit_rw_nfs_files" lineno="2921"> <summary> Do not audit attempts to read or write files on a NFS filesystem. @@ -82754,7 +82930,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_nfs_symlinks" lineno="2901"> +<interface name="fs_read_nfs_symlinks" lineno="2939"> <summary> Read symbolic links on a NFS filesystem. </summary> @@ -82764,7 +82940,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_nfs_symlinks" lineno="2920"> +<interface name="fs_dontaudit_read_nfs_symlinks" lineno="2958"> <summary> Dontaudit read symbolic links on a NFS filesystem. </summary> @@ -82774,7 +82950,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_nfs_named_sockets" lineno="2938"> +<interface name="fs_read_nfs_named_sockets" lineno="2976"> <summary> Read named sockets on a NFS filesystem. </summary> @@ -82784,7 +82960,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nfs_named_pipes" lineno="2957"> +<interface name="fs_read_nfs_named_pipes" lineno="2995"> <summary> Read named pipes on a NFS network filesystem. </summary> @@ -82795,7 +82971,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_rpc_dirs" lineno="2976"> +<interface name="fs_getattr_rpc_dirs" lineno="3014"> <summary> Get the attributes of directories of RPC file system pipes. @@ -82806,7 +82982,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_rpc" lineno="2995"> +<interface name="fs_search_rpc" lineno="3033"> <summary> Search directories of RPC file system pipes. </summary> @@ -82816,7 +82992,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_removable" lineno="3013"> +<interface name="fs_search_removable" lineno="3051"> <summary> Search removable storage directories. </summary> @@ -82826,7 +83002,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_removable" lineno="3031"> +<interface name="fs_dontaudit_list_removable" lineno="3069"> <summary> Do not audit attempts to list removable storage directories. </summary> @@ -82836,7 +83012,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_read_removable_files" lineno="3049"> +<interface name="fs_read_removable_files" lineno="3087"> <summary> Read removable storage files. </summary> @@ -82846,7 +83022,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_removable_files" lineno="3067"> +<interface name="fs_dontaudit_read_removable_files" lineno="3105"> <summary> Do not audit attempts to read removable storage files. </summary> @@ -82856,7 +83032,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_dontaudit_write_removable_files" lineno="3085"> +<interface name="fs_dontaudit_write_removable_files" lineno="3123"> <summary> Do not audit attempts to write removable storage files. </summary> @@ -82866,7 +83042,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_read_removable_symlinks" lineno="3103"> +<interface name="fs_read_removable_symlinks" lineno="3141"> <summary> Read removable storage symbolic links. </summary> @@ -82876,7 +83052,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_removable_blk_files" lineno="3121"> +<interface name="fs_read_removable_blk_files" lineno="3159"> <summary> Read block nodes on removable filesystems. </summary> @@ -82886,7 +83062,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_removable_blk_files" lineno="3140"> +<interface name="fs_rw_removable_blk_files" lineno="3178"> <summary> Read and write block nodes on removable filesystems. </summary> @@ -82896,7 +83072,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_rpc" lineno="3159"> +<interface name="fs_list_rpc" lineno="3197"> <summary> Read directories of RPC file system pipes. </summary> @@ -82906,7 +83082,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_files" lineno="3177"> +<interface name="fs_read_rpc_files" lineno="3215"> <summary> Read files of RPC file system pipes. </summary> @@ -82916,7 +83092,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_symlinks" lineno="3195"> +<interface name="fs_read_rpc_symlinks" lineno="3233"> <summary> Read symbolic links of RPC file system pipes. </summary> @@ -82926,7 +83102,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_sockets" lineno="3213"> +<interface name="fs_read_rpc_sockets" lineno="3251"> <summary> Read sockets of RPC file system pipes. </summary> @@ -82936,7 +83112,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_rpc_sockets" lineno="3231"> +<interface name="fs_rw_rpc_sockets" lineno="3269"> <summary> Read and write sockets of RPC file system pipes. </summary> @@ -82946,7 +83122,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_nfs_dirs" lineno="3251"> +<interface name="fs_manage_nfs_dirs" lineno="3289"> <summary> Create, read, write, and delete directories on a NFS filesystem. @@ -82958,7 +83134,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3271"> +<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3309"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -82970,7 +83146,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_nfs_files" lineno="3291"> +<interface name="fs_manage_nfs_files" lineno="3329"> <summary> Create, read, write, and delete files on a NFS filesystem. @@ -82982,7 +83158,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_nfs_files" lineno="3311"> +<interface name="fs_dontaudit_manage_nfs_files" lineno="3349"> <summary> Do not audit attempts to create, read, write, and delete files @@ -82994,7 +83170,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_nfs_symlinks" lineno="3331"> +<interface name="fs_manage_nfs_symlinks" lineno="3369"> <summary> Create, read, write, and delete symbolic links on a NFS network filesystem. @@ -83006,7 +83182,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_nfs_named_pipes" lineno="3350"> +<interface name="fs_manage_nfs_named_pipes" lineno="3388"> <summary> Create, read, write, and delete named pipes on a NFS filesystem. @@ -83017,7 +83193,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_nfs_named_sockets" lineno="3369"> +<interface name="fs_manage_nfs_named_sockets" lineno="3407"> <summary> Create, read, write, and delete named sockets on a NFS filesystem. @@ -83028,7 +83204,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_nfs_domtrans" lineno="3412"> +<interface name="fs_nfs_domtrans" lineno="3450"> <summary> Execute a file on a NFS filesystem in the specified domain. @@ -83063,7 +83239,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="fs_mount_nfsd_fs" lineno="3431"> +<interface name="fs_mount_nfsd_fs" lineno="3469"> <summary> Mount a NFS server pseudo filesystem. </summary> @@ -83073,7 +83249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_nfsd_fs" lineno="3450"> +<interface name="fs_remount_nfsd_fs" lineno="3488"> <summary> Mount a NFS server pseudo filesystem. This allows some mount options to be changed. @@ -83084,7 +83260,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_nfsd_fs" lineno="3468"> +<interface name="fs_unmount_nfsd_fs" lineno="3506"> <summary> Unmount a NFS server pseudo filesystem. </summary> @@ -83094,7 +83270,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfsd_fs" lineno="3487"> +<interface name="fs_getattr_nfsd_fs" lineno="3525"> <summary> Get the attributes of a NFS server pseudo filesystem. @@ -83105,7 +83281,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_nfsd_fs" lineno="3505"> +<interface name="fs_search_nfsd_fs" lineno="3543"> <summary> Search NFS server directories. </summary> @@ -83115,7 +83291,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_nfsd_fs" lineno="3523"> +<interface name="fs_list_nfsd_fs" lineno="3561"> <summary> List NFS server directories. </summary> @@ -83125,7 +83301,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfsd_files" lineno="3541"> +<interface name="fs_getattr_nfsd_files" lineno="3579"> <summary> Getattr files on an nfsd filesystem </summary> @@ -83135,7 +83311,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_nfsd_fs" lineno="3559"> +<interface name="fs_rw_nfsd_fs" lineno="3597"> <summary> Read and write NFS server files. </summary> @@ -83145,7 +83321,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nsfs_files" lineno="3577"> +<interface name="fs_read_nsfs_files" lineno="3615"> <summary> Read nsfs inodes (e.g. /proc/pid/ns/uts) </summary> @@ -83155,7 +83331,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_pstorefs" lineno="3595"> +<interface name="fs_getattr_pstorefs" lineno="3633"> <summary> Get the attributes of a pstore filesystem. </summary> @@ -83165,7 +83341,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_pstore_dirs" lineno="3614"> +<interface name="fs_getattr_pstore_dirs" lineno="3652"> <summary> Get the attributes of directories of a pstore filesystem. @@ -83176,7 +83352,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_pstore_dirs" lineno="3633"> +<interface name="fs_relabel_pstore_dirs" lineno="3671"> <summary> Relabel to/from pstore_t directories. </summary> @@ -83186,7 +83362,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_associate_ramfs" lineno="3651"> +<interface name="fs_associate_ramfs" lineno="3689"> <summary> Allow the type to associate to ramfs filesystems. </summary> @@ -83196,7 +83372,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_mount_ramfs" lineno="3669"> +<interface name="fs_mount_ramfs" lineno="3707"> <summary> Mount a RAM filesystem. </summary> @@ -83206,7 +83382,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_ramfs" lineno="3688"> +<interface name="fs_remount_ramfs" lineno="3726"> <summary> Remount a RAM filesystem. This allows some mount options to be changed. @@ -83217,7 +83393,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_ramfs" lineno="3706"> +<interface name="fs_unmount_ramfs" lineno="3744"> <summary> Unmount a RAM filesystem. </summary> @@ -83227,7 +83403,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_ramfs" lineno="3724"> +<interface name="fs_getattr_ramfs" lineno="3762"> <summary> Get the attributes of a RAM filesystem. </summary> @@ -83237,7 +83413,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_ramfs" lineno="3742"> +<interface name="fs_search_ramfs" lineno="3780"> <summary> Search directories on a ramfs </summary> @@ -83247,7 +83423,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_search_ramfs" lineno="3760"> +<interface name="fs_dontaudit_search_ramfs" lineno="3798"> <summary> Dontaudit Search directories on a ramfs </summary> @@ -83257,7 +83433,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_ramfs_dirs" lineno="3779"> +<interface name="fs_manage_ramfs_dirs" lineno="3817"> <summary> Create, read, write, and delete directories on a ramfs. @@ -83268,7 +83444,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_ramfs_files" lineno="3797"> +<interface name="fs_dontaudit_read_ramfs_files" lineno="3835"> <summary> Dontaudit read on a ramfs files. </summary> @@ -83278,7 +83454,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_read_ramfs_pipes" lineno="3815"> +<interface name="fs_dontaudit_read_ramfs_pipes" lineno="3853"> <summary> Dontaudit read on a ramfs fifo_files. </summary> @@ -83288,7 +83464,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_ramfs_files" lineno="3834"> +<interface name="fs_manage_ramfs_files" lineno="3872"> <summary> Create, read, write, and delete files on a ramfs filesystem. @@ -83299,7 +83475,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_ramfs_pipes" lineno="3852"> +<interface name="fs_write_ramfs_pipes" lineno="3890"> <summary> Write to named pipe on a ramfs filesystem. </summary> @@ -83309,7 +83485,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_write_ramfs_pipes" lineno="3871"> +<interface name="fs_dontaudit_write_ramfs_pipes" lineno="3909"> <summary> Do not audit attempts to write to named pipes on a ramfs filesystem. @@ -83320,7 +83496,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_rw_ramfs_pipes" lineno="3889"> +<interface name="fs_rw_ramfs_pipes" lineno="3927"> <summary> Read and write a named pipe on a ramfs filesystem. </summary> @@ -83330,7 +83506,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_ramfs_pipes" lineno="3908"> +<interface name="fs_manage_ramfs_pipes" lineno="3946"> <summary> Create, read, write, and delete named pipes on a ramfs filesystem. @@ -83341,7 +83517,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_ramfs_sockets" lineno="3926"> +<interface name="fs_write_ramfs_sockets" lineno="3964"> <summary> Write to named socket on a ramfs filesystem. </summary> @@ -83351,7 +83527,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_ramfs_sockets" lineno="3945"> +<interface name="fs_manage_ramfs_sockets" lineno="3983"> <summary> Create, read, write, and delete named sockets on a ramfs filesystem. @@ -83362,7 +83538,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_romfs" lineno="3963"> +<interface name="fs_mount_romfs" lineno="4001"> <summary> Mount a ROM filesystem. </summary> @@ -83372,7 +83548,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_romfs" lineno="3982"> +<interface name="fs_remount_romfs" lineno="4020"> <summary> Remount a ROM filesystem. This allows some mount options to be changed. @@ -83383,7 +83559,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_romfs" lineno="4000"> +<interface name="fs_unmount_romfs" lineno="4038"> <summary> Unmount a ROM filesystem. </summary> @@ -83393,7 +83569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_romfs" lineno="4019"> +<interface name="fs_getattr_romfs" lineno="4057"> <summary> Get the attributes of a ROM filesystem. @@ -83404,7 +83580,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_rpc_pipefs" lineno="4037"> +<interface name="fs_mount_rpc_pipefs" lineno="4075"> <summary> Mount a RPC pipe filesystem. </summary> @@ -83414,7 +83590,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_rpc_pipefs" lineno="4056"> +<interface name="fs_remount_rpc_pipefs" lineno="4094"> <summary> Remount a RPC pipe filesystem. This allows some mount option to be changed. @@ -83425,7 +83601,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_rpc_pipefs" lineno="4074"> +<interface name="fs_unmount_rpc_pipefs" lineno="4112"> <summary> Unmount a RPC pipe filesystem. </summary> @@ -83435,7 +83611,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_rpc_pipefs" lineno="4093"> +<interface name="fs_getattr_rpc_pipefs" lineno="4131"> <summary> Get the attributes of a RPC pipe filesystem. @@ -83446,7 +83622,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_rpc_named_pipes" lineno="4111"> +<interface name="fs_rw_rpc_named_pipes" lineno="4149"> <summary> Read and write RPC pipe filesystem named pipes. </summary> @@ -83456,7 +83632,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_tmpfs" lineno="4129"> +<interface name="fs_mount_tmpfs" lineno="4167"> <summary> Mount a tmpfs filesystem. </summary> @@ -83466,7 +83642,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_tmpfs" lineno="4147"> +<interface name="fs_remount_tmpfs" lineno="4185"> <summary> Remount a tmpfs filesystem. </summary> @@ -83476,7 +83652,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_tmpfs" lineno="4165"> +<interface name="fs_unmount_tmpfs" lineno="4203"> <summary> Unmount a tmpfs filesystem. </summary> @@ -83486,7 +83662,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs" lineno="4183"> +<interface name="fs_dontaudit_getattr_tmpfs" lineno="4221"> <summary> Do not audit getting the attributes of a tmpfs filesystem </summary> @@ -83496,7 +83672,7 @@ Domain to not audit </summary> </param> </interface> -<interface name="fs_getattr_tmpfs" lineno="4203"> +<interface name="fs_getattr_tmpfs" lineno="4241"> <summary> Get the attributes of a tmpfs filesystem. @@ -83508,7 +83684,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_associate_tmpfs" lineno="4221"> +<interface name="fs_associate_tmpfs" lineno="4259"> <summary> Allow the type to associate to tmpfs filesystems. </summary> @@ -83518,7 +83694,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs" lineno="4239"> +<interface name="fs_relabelfrom_tmpfs" lineno="4277"> <summary> Relabel from tmpfs filesystem. </summary> @@ -83528,7 +83704,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tmpfs_dirs" lineno="4257"> +<interface name="fs_getattr_tmpfs_dirs" lineno="4295"> <summary> Get the attributes of tmpfs directories. </summary> @@ -83538,7 +83714,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4276"> +<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4314"> <summary> Do not audit attempts to get the attributes of tmpfs directories. @@ -83549,7 +83725,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mounton_tmpfs" lineno="4294"> +<interface name="fs_mounton_tmpfs" lineno="4332"> <summary> Mount on tmpfs directories. </summary> @@ -83559,7 +83735,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_tmpfs_files" lineno="4312"> +<interface name="fs_mounton_tmpfs_files" lineno="4350"> <summary> Mount on tmpfs files. </summary> @@ -83569,7 +83745,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_setattr_tmpfs_dirs" lineno="4330"> +<interface name="fs_setattr_tmpfs_dirs" lineno="4368"> <summary> Set the attributes of tmpfs directories. </summary> @@ -83579,7 +83755,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_tmpfs" lineno="4348"> +<interface name="fs_search_tmpfs" lineno="4386"> <summary> Search tmpfs directories. </summary> @@ -83589,7 +83765,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_tmpfs" lineno="4366"> +<interface name="fs_list_tmpfs" lineno="4404"> <summary> List the contents of generic tmpfs directories. </summary> @@ -83599,7 +83775,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_tmpfs" lineno="4385"> +<interface name="fs_dontaudit_list_tmpfs" lineno="4423"> <summary> Do not audit attempts to list the contents of generic tmpfs directories. @@ -83610,7 +83786,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_dirs" lineno="4404"> +<interface name="fs_manage_tmpfs_dirs" lineno="4442"> <summary> Create, read, write, and delete tmpfs directories @@ -83621,7 +83797,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4423"> +<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4461"> <summary> Do not audit attempts to write tmpfs directories @@ -83632,7 +83808,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4441"> +<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4479"> <summary> Relabel from tmpfs_t dir </summary> @@ -83642,7 +83818,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_dirs" lineno="4459"> +<interface name="fs_relabel_tmpfs_dirs" lineno="4497"> <summary> Relabel directory on tmpfs filesystems. </summary> @@ -83652,7 +83828,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_tmpfs_filetrans" lineno="4492"> +<interface name="fs_tmpfs_filetrans" lineno="4530"> <summary> Create an object in a tmpfs filesystem, with a private type using a type transition. @@ -83678,7 +83854,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4512"> +<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4550"> <summary> Do not audit attempts to getattr generic tmpfs files. @@ -83689,7 +83865,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4531"> +<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4569"> <summary> Do not audit attempts to read or write generic tmpfs files. @@ -83700,7 +83876,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_delete_tmpfs_symlinks" lineno="4549"> +<interface name="fs_delete_tmpfs_symlinks" lineno="4587"> <summary> Delete tmpfs symbolic links. </summary> @@ -83710,7 +83886,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_auto_mountpoints" lineno="4568"> +<interface name="fs_manage_auto_mountpoints" lineno="4606"> <summary> Create, read, write, and delete auto moutpoints. @@ -83721,7 +83897,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_tmpfs_files" lineno="4586"> +<interface name="fs_read_tmpfs_files" lineno="4624"> <summary> Read generic tmpfs files. </summary> @@ -83731,7 +83907,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_files" lineno="4604"> +<interface name="fs_rw_tmpfs_files" lineno="4642"> <summary> Read and write generic tmpfs files. </summary> @@ -83741,7 +83917,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_files" lineno="4622"> +<interface name="fs_relabel_tmpfs_files" lineno="4660"> <summary> Relabel files on tmpfs filesystems. </summary> @@ -83751,7 +83927,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_tmpfs_symlinks" lineno="4640"> +<interface name="fs_read_tmpfs_symlinks" lineno="4678"> <summary> Read tmpfs link files. </summary> @@ -83761,7 +83937,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_sockets" lineno="4658"> +<interface name="fs_relabelfrom_tmpfs_sockets" lineno="4696"> <summary> Relabelfrom socket files on tmpfs filesystems. </summary> @@ -83771,7 +83947,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="4676"> +<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="4714"> <summary> Relabelfrom tmpfs link files. </summary> @@ -83781,7 +83957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_chr_files" lineno="4694"> +<interface name="fs_rw_tmpfs_chr_files" lineno="4732"> <summary> Read and write character nodes on tmpfs filesystems. </summary> @@ -83791,7 +83967,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="4713"> +<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="4751"> <summary> dontaudit Read and write character nodes on tmpfs filesystems. </summary> @@ -83801,7 +83977,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_chr_file" lineno="4732"> +<interface name="fs_relabel_tmpfs_chr_file" lineno="4770"> <summary> Relabel character nodes on tmpfs filesystems. </summary> @@ -83811,7 +83987,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_blk_files" lineno="4751"> +<interface name="fs_rw_tmpfs_blk_files" lineno="4789"> <summary> Read and write block nodes on tmpfs filesystems. </summary> @@ -83821,7 +83997,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_blk_file" lineno="4770"> +<interface name="fs_relabel_tmpfs_blk_file" lineno="4808"> <summary> Relabel block nodes on tmpfs filesystems. </summary> @@ -83831,7 +84007,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_files" lineno="4790"> +<interface name="fs_manage_tmpfs_files" lineno="4828"> <summary> Read and write, create and delete generic files on tmpfs filesystems. @@ -83842,7 +84018,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_symlinks" lineno="4809"> +<interface name="fs_manage_tmpfs_symlinks" lineno="4847"> <summary> Read and write, create and delete symbolic links on tmpfs filesystems. @@ -83853,7 +84029,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_sockets" lineno="4828"> +<interface name="fs_manage_tmpfs_sockets" lineno="4866"> <summary> Read and write, create and delete socket files on tmpfs filesystems. @@ -83864,7 +84040,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_chr_files" lineno="4847"> +<interface name="fs_manage_tmpfs_chr_files" lineno="4885"> <summary> Read and write, create and delete character nodes on tmpfs filesystems. @@ -83875,7 +84051,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_blk_files" lineno="4866"> +<interface name="fs_manage_tmpfs_blk_files" lineno="4904"> <summary> Read and write, create and delete block nodes on tmpfs filesystems. @@ -83886,7 +84062,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs" lineno="4884"> +<interface name="fs_getattr_tracefs" lineno="4922"> <summary> Get the attributes of a trace filesystem. </summary> @@ -83896,7 +84072,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs_dirs" lineno="4902"> +<interface name="fs_getattr_tracefs_dirs" lineno="4940"> <summary> Get attributes of dirs on tracefs filesystem. </summary> @@ -83906,7 +84082,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_tracefs" lineno="4920"> +<interface name="fs_search_tracefs" lineno="4958"> <summary> search directories on a tracefs filesystem </summary> @@ -83916,7 +84092,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs_files" lineno="4939"> +<interface name="fs_getattr_tracefs_files" lineno="4977"> <summary> Get the attributes of files on a trace filesystem. @@ -83927,7 +84103,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_xenfs" lineno="4957"> +<interface name="fs_mount_xenfs" lineno="4995"> <summary> Mount a XENFS filesystem. </summary> @@ -83937,7 +84113,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_xenfs" lineno="4975"> +<interface name="fs_search_xenfs" lineno="5013"> <summary> Search the XENFS filesystem. </summary> @@ -83947,7 +84123,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_xenfs_dirs" lineno="4995"> +<interface name="fs_manage_xenfs_dirs" lineno="5033"> <summary> Create, read, write, and delete directories on a XENFS filesystem. @@ -83959,7 +84135,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5015"> +<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5053"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -83971,7 +84147,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_xenfs_files" lineno="5035"> +<interface name="fs_manage_xenfs_files" lineno="5073"> <summary> Create, read, write, and delete files on a XENFS filesystem. @@ -83983,7 +84159,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_xenfs_files" lineno="5055"> +<interface name="fs_dontaudit_manage_xenfs_files" lineno="5093"> <summary> Do not audit attempts to create, read, write, and delete files @@ -83995,7 +84171,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mount_all_fs" lineno="5073"> +<interface name="fs_mount_all_fs" lineno="5111"> <summary> Mount all filesystems. </summary> @@ -84005,7 +84181,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_all_fs" lineno="5092"> +<interface name="fs_remount_all_fs" lineno="5130"> <summary> Remount all filesystems. This allows some mount options to be changed. @@ -84016,7 +84192,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_all_fs" lineno="5110"> +<interface name="fs_unmount_all_fs" lineno="5148"> <summary> Unmount all filesystems. </summary> @@ -84026,7 +84202,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_fs" lineno="5142"> +<interface name="fs_getattr_all_fs" lineno="5180"> <summary> Get the attributes of all filesystems. </summary> @@ -84050,7 +84226,7 @@ Domain allowed access. <infoflow type="read" weight="5"/> <rolecap/> </interface> -<interface name="fs_dontaudit_getattr_all_fs" lineno="5162"> +<interface name="fs_dontaudit_getattr_all_fs" lineno="5200"> <summary> Do not audit attempts to get the attributes all filesystems. @@ -84061,7 +84237,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_get_all_fs_quotas" lineno="5181"> +<interface name="fs_get_all_fs_quotas" lineno="5219"> <summary> Get the quotas of all filesystems. </summary> @@ -84072,7 +84248,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_set_all_quotas" lineno="5200"> +<interface name="fs_set_all_quotas" lineno="5238"> <summary> Set the quotas of all filesystems. </summary> @@ -84083,7 +84259,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_relabelfrom_all_fs" lineno="5218"> +<interface name="fs_relabelfrom_all_fs" lineno="5256"> <summary> Relabelfrom all filesystems. </summary> @@ -84093,7 +84269,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_dirs" lineno="5237"> +<interface name="fs_getattr_all_dirs" lineno="5275"> <summary> Get the attributes of all directories with a filesystem type. @@ -84104,7 +84280,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_all" lineno="5255"> +<interface name="fs_search_all" lineno="5293"> <summary> Search all directories with a filesystem type. </summary> @@ -84114,7 +84290,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_all" lineno="5273"> +<interface name="fs_list_all" lineno="5311"> <summary> List all directories with a filesystem type. </summary> @@ -84124,7 +84300,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_files" lineno="5292"> +<interface name="fs_getattr_all_files" lineno="5330"> <summary> Get the attributes of all files with a filesystem type. @@ -84135,7 +84311,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_files" lineno="5311"> +<interface name="fs_dontaudit_getattr_all_files" lineno="5349"> <summary> Do not audit attempts to get the attributes of all files with a filesystem type. @@ -84146,7 +84322,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_symlinks" lineno="5330"> +<interface name="fs_getattr_all_symlinks" lineno="5368"> <summary> Get the attributes of all symbolic links with a filesystem type. @@ -84157,7 +84333,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5349"> +<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5387"> <summary> Do not audit attempts to get the attributes of all symbolic links with a filesystem type. @@ -84168,7 +84344,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_pipes" lineno="5368"> +<interface name="fs_getattr_all_pipes" lineno="5406"> <summary> Get the attributes of all named pipes with a filesystem type. @@ -84179,7 +84355,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_pipes" lineno="5387"> +<interface name="fs_dontaudit_getattr_all_pipes" lineno="5425"> <summary> Do not audit attempts to get the attributes of all named pipes with a filesystem type. @@ -84190,7 +84366,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_sockets" lineno="5406"> +<interface name="fs_getattr_all_sockets" lineno="5444"> <summary> Get the attributes of all named sockets with a filesystem type. @@ -84201,7 +84377,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_sockets" lineno="5425"> +<interface name="fs_dontaudit_getattr_all_sockets" lineno="5463"> <summary> Do not audit attempts to get the attributes of all named sockets with a filesystem type. @@ -84212,7 +84388,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_blk_files" lineno="5444"> +<interface name="fs_getattr_all_blk_files" lineno="5482"> <summary> Get the attributes of all block device nodes with a filesystem type. @@ -84223,7 +84399,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_chr_files" lineno="5463"> +<interface name="fs_getattr_all_chr_files" lineno="5501"> <summary> Get the attributes of all character device nodes with a filesystem type. @@ -84234,7 +84410,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unconfined" lineno="5481"> +<interface name="fs_unconfined" lineno="5519"> <summary> Unconfined access to filesystems </summary> @@ -85461,7 +85637,39 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_search_fs_sysctls" lineno="2164"> +<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2164"> +<summary> +Read kernel ns lastpid sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2184"> +<summary> +Do not audit attempts to write kernel ns lastpid sysctls. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2203"> +<summary> +Read and write kernel ns lastpid sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_search_fs_sysctls" lineno="2224"> <summary> Search filesystem sysctl directories. </summary> @@ -85472,7 +85680,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_fs_sysctls" lineno="2183"> +<interface name="kernel_read_fs_sysctls" lineno="2243"> <summary> Read filesystem sysctls. </summary> @@ -85483,7 +85691,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_fs_sysctls" lineno="2204"> +<interface name="kernel_rw_fs_sysctls" lineno="2264"> <summary> Read and write fileystem sysctls. </summary> @@ -85494,7 +85702,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_irq_sysctls" lineno="2225"> +<interface name="kernel_read_irq_sysctls" lineno="2285"> <summary> Read IRQ sysctls. </summary> @@ -85505,7 +85713,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_irq_sysctls" lineno="2246"> +<interface name="kernel_rw_irq_sysctls" lineno="2306"> <summary> Read and write IRQ sysctls. </summary> @@ -85516,7 +85724,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_rpc_sysctls" lineno="2267"> +<interface name="kernel_read_rpc_sysctls" lineno="2327"> <summary> Read RPC sysctls. </summary> @@ -85527,7 +85735,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_rpc_sysctls" lineno="2288"> +<interface name="kernel_rw_rpc_sysctls" lineno="2348"> <summary> Read and write RPC sysctls. </summary> @@ -85538,7 +85746,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_dontaudit_list_all_sysctls" lineno="2308"> +<interface name="kernel_dontaudit_list_all_sysctls" lineno="2368"> <summary> Do not audit attempts to list all sysctl directories. </summary> @@ -85548,7 +85756,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_read_all_sysctls" lineno="2328"> +<interface name="kernel_read_all_sysctls" lineno="2388"> <summary> Allow caller to read all sysctls. </summary> @@ -85559,7 +85767,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_all_sysctls" lineno="2351"> +<interface name="kernel_rw_all_sysctls" lineno="2411"> <summary> Read and write all sysctls. </summary> @@ -85570,7 +85778,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_kill_unlabeled" lineno="2375"> +<interface name="kernel_kill_unlabeled" lineno="2435"> <summary> Send a kill signal to unlabeled processes. </summary> @@ -85580,7 +85788,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_mount_unlabeled" lineno="2393"> +<interface name="kernel_mount_unlabeled" lineno="2453"> <summary> Mount a kernel unlabeled filesystem. </summary> @@ -85590,7 +85798,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_unmount_unlabeled" lineno="2411"> +<interface name="kernel_unmount_unlabeled" lineno="2471"> <summary> Unmount a kernel unlabeled filesystem. </summary> @@ -85600,7 +85808,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_signal_unlabeled" lineno="2429"> +<interface name="kernel_signal_unlabeled" lineno="2489"> <summary> Send general signals to unlabeled processes. </summary> @@ -85610,7 +85818,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_signull_unlabeled" lineno="2447"> +<interface name="kernel_signull_unlabeled" lineno="2507"> <summary> Send a null signal to unlabeled processes. </summary> @@ -85620,7 +85828,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_sigstop_unlabeled" lineno="2465"> +<interface name="kernel_sigstop_unlabeled" lineno="2525"> <summary> Send a stop signal to unlabeled processes. </summary> @@ -85630,7 +85838,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_sigchld_unlabeled" lineno="2483"> +<interface name="kernel_sigchld_unlabeled" lineno="2543"> <summary> Send a child terminated signal to unlabeled processes. </summary> @@ -85640,7 +85848,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_getattr_unlabeled_dirs" lineno="2501"> +<interface name="kernel_getattr_unlabeled_dirs" lineno="2561"> <summary> Get the attributes of unlabeled directories. </summary> @@ -85650,7 +85858,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_search_unlabeled" lineno="2519"> +<interface name="kernel_dontaudit_search_unlabeled" lineno="2579"> <summary> Do not audit attempts to search unlabeled directories. </summary> @@ -85660,7 +85868,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_list_unlabeled" lineno="2537"> +<interface name="kernel_list_unlabeled" lineno="2597"> <summary> List unlabeled directories. </summary> @@ -85670,7 +85878,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_read_unlabeled_state" lineno="2555"> +<interface name="kernel_read_unlabeled_state" lineno="2615"> <summary> Read the process state (/proc/pid) of all unlabeled_t. </summary> @@ -85680,7 +85888,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_list_unlabeled" lineno="2575"> +<interface name="kernel_dontaudit_list_unlabeled" lineno="2635"> <summary> Do not audit attempts to list unlabeled directories. </summary> @@ -85690,7 +85898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_rw_unlabeled_dirs" lineno="2593"> +<interface name="kernel_rw_unlabeled_dirs" lineno="2653"> <summary> Read and write unlabeled directories. </summary> @@ -85700,7 +85908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_dirs" lineno="2611"> +<interface name="kernel_delete_unlabeled_dirs" lineno="2671"> <summary> Delete unlabeled directories. </summary> @@ -85710,7 +85918,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_manage_unlabeled_dirs" lineno="2629"> +<interface name="kernel_manage_unlabeled_dirs" lineno="2689"> <summary> Create, read, write, and delete unlabeled directories. </summary> @@ -85720,7 +85928,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_mounton_unlabeled_dirs" lineno="2647"> +<interface name="kernel_mounton_unlabeled_dirs" lineno="2707"> <summary> Mount a filesystem on an unlabeled directory. </summary> @@ -85730,7 +85938,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_read_unlabeled_files" lineno="2665"> +<interface name="kernel_read_unlabeled_files" lineno="2725"> <summary> Read unlabeled files. </summary> @@ -85740,7 +85948,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_rw_unlabeled_files" lineno="2683"> +<interface name="kernel_rw_unlabeled_files" lineno="2743"> <summary> Read and write unlabeled files. </summary> @@ -85750,7 +85958,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_files" lineno="2701"> +<interface name="kernel_delete_unlabeled_files" lineno="2761"> <summary> Delete unlabeled files. </summary> @@ -85760,7 +85968,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_manage_unlabeled_files" lineno="2719"> +<interface name="kernel_manage_unlabeled_files" lineno="2779"> <summary> Create, read, write, and delete unlabeled files. </summary> @@ -85770,7 +85978,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2738"> +<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2798"> <summary> Do not audit attempts by caller to get the attributes of an unlabeled file. @@ -85781,7 +85989,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2757"> +<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2817"> <summary> Do not audit attempts by caller to read an unlabeled file. @@ -85792,7 +86000,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_symlinks" lineno="2775"> +<interface name="kernel_delete_unlabeled_symlinks" lineno="2835"> <summary> Delete unlabeled symbolic links. </summary> @@ -85802,7 +86010,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_manage_unlabeled_symlinks" lineno="2793"> +<interface name="kernel_manage_unlabeled_symlinks" lineno="2853"> <summary> Create, read, write, and delete unlabeled symbolic links. </summary> @@ -85812,7 +86020,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2812"> +<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2872"> <summary> Do not audit attempts by caller to get the attributes of unlabeled symbolic links. @@ -85823,7 +86031,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2831"> +<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2891"> <summary> Do not audit attempts by caller to get the attributes of unlabeled named pipes. @@ -85834,7 +86042,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2850"> +<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2910"> <summary> Do not audit attempts by caller to get the attributes of unlabeled named sockets. @@ -85845,7 +86053,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2869"> +<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2929"> <summary> Do not audit attempts by caller to get attributes for unlabeled block devices. @@ -85856,7 +86064,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_rw_unlabeled_blk_files" lineno="2887"> +<interface name="kernel_rw_unlabeled_blk_files" lineno="2947"> <summary> Read and write unlabeled block device nodes. </summary> @@ -85866,7 +86074,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_blk_files" lineno="2905"> +<interface name="kernel_delete_unlabeled_blk_files" lineno="2965"> <summary> Delete unlabeled block device nodes. </summary> @@ -85876,7 +86084,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_manage_unlabeled_blk_files" lineno="2923"> +<interface name="kernel_manage_unlabeled_blk_files" lineno="2983"> <summary> Create, read, write, and delete unlabeled block device nodes. </summary> @@ -85886,7 +86094,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="2942"> +<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3002"> <summary> Do not audit attempts by caller to get attributes for unlabeled character devices. @@ -85897,7 +86105,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="2961"> +<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3021"> <summary> Do not audit attempts to write unlabeled character devices. @@ -85908,7 +86116,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_chr_files" lineno="2979"> +<interface name="kernel_delete_unlabeled_chr_files" lineno="3039"> <summary> Delete unlabeled character device nodes. </summary> @@ -85918,7 +86126,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_manage_unlabeled_chr_files" lineno="2998"> +<interface name="kernel_manage_unlabeled_chr_files" lineno="3058"> <summary> Create, read, write, and delete unlabeled character device nodes. </summary> @@ -85928,7 +86136,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3016"> +<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3076"> <summary> Allow caller to relabel unlabeled directories. </summary> @@ -85938,7 +86146,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_files" lineno="3034"> +<interface name="kernel_relabelfrom_unlabeled_files" lineno="3094"> <summary> Allow caller to relabel unlabeled files. </summary> @@ -85948,7 +86156,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3053"> +<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3113"> <summary> Allow caller to relabel unlabeled symbolic links. </summary> @@ -85958,7 +86166,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3072"> +<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3132"> <summary> Allow caller to relabel unlabeled named pipes. </summary> @@ -85968,7 +86176,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_pipes" lineno="3091"> +<interface name="kernel_delete_unlabeled_pipes" lineno="3151"> <summary> Delete unlabeled named pipes </summary> @@ -85978,7 +86186,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3109"> +<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3169"> <summary> Allow caller to relabel unlabeled named sockets. </summary> @@ -85988,7 +86196,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_sockets" lineno="3128"> +<interface name="kernel_delete_unlabeled_sockets" lineno="3188"> <summary> Delete unlabeled named sockets. </summary> @@ -85998,7 +86206,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_sendrecv_unlabeled_association" lineno="3160"> +<interface name="kernel_sendrecv_unlabeled_association" lineno="3220"> <summary> Send and receive messages from an unlabeled IPSEC association. @@ -86023,7 +86231,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3193"> +<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3253"> <summary> Do not audit attempts to send and receive messages from an unlabeled IPSEC association. @@ -86048,7 +86256,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3220"> +<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3280"> <summary> Receive TCP packets from an unlabeled connection. </summary> @@ -86067,7 +86275,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3249"> +<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3309"> <summary> Do not audit attempts to receive TCP packets from an unlabeled connection. @@ -86088,7 +86296,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_udp_recvfrom_unlabeled" lineno="3276"> +<interface name="kernel_udp_recvfrom_unlabeled" lineno="3336"> <summary> Receive UDP packets from an unlabeled connection. </summary> @@ -86107,7 +86315,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3305"> +<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3365"> <summary> Do not audit attempts to receive UDP packets from an unlabeled connection. @@ -86128,7 +86336,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_raw_recvfrom_unlabeled" lineno="3332"> +<interface name="kernel_raw_recvfrom_unlabeled" lineno="3392"> <summary> Receive Raw IP packets from an unlabeled connection. </summary> @@ -86147,7 +86355,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3361"> +<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3421"> <summary> Do not audit attempts to receive Raw IP packets from an unlabeled connection. @@ -86168,7 +86376,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_sendrecv_unlabeled_packets" lineno="3391"> +<interface name="kernel_sendrecv_unlabeled_packets" lineno="3451"> <summary> Send and receive unlabeled packets. </summary> @@ -86190,7 +86398,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_recvfrom_unlabeled_peer" lineno="3419"> +<interface name="kernel_recvfrom_unlabeled_peer" lineno="3479"> <summary> Receive packets from an unlabeled peer. </summary> @@ -86210,7 +86418,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3447"> +<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3507"> <summary> Do not audit attempts to receive packets from an unlabeled peer. </summary> @@ -86230,7 +86438,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_database" lineno="3465"> +<interface name="kernel_relabelfrom_unlabeled_database" lineno="3525"> <summary> Relabel from unlabeled database objects. </summary> @@ -86240,7 +86448,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_unconfined" lineno="3502"> +<interface name="kernel_unconfined" lineno="3562"> <summary> Unconfined access to kernel module resources. </summary> @@ -86250,7 +86458,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_read_vm_overcommit_sysctl" lineno="3522"> +<interface name="kernel_read_vm_overcommit_sysctl" lineno="3582"> <summary> Read virtual memory overcommit sysctl. </summary> @@ -86261,7 +86469,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3542"> +<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3602"> <summary> Read and write virtual memory overcommit sysctl. </summary> @@ -86272,7 +86480,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3561"> +<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3621"> <summary> Access unlabeled infiniband pkeys. </summary> @@ -86282,7 +86490,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3579"> +<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3639"> <summary> Manage subnet on unlabeled Infiniband endports. </summary> @@ -87353,7 +87561,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="selinux_unconfined" lineno="648"> +<interface name="selinux_map_security_files" lineno="649"> +<summary> +Allows caller to map secuirty_t files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_unconfined" lineno="668"> <summary> Unconfined access to the SELinux kernel security server. </summary> @@ -87432,7 +87650,26 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_read_fixed_disk" lineno="118"> +<interface name="storage_raw_read_fixed_disk_cond" lineno="126"> +<summary> +Allow the caller to directly read from a fixed disk +if a tunable is set. +This is extremely dangerous as it can bypass the +SELinux protections for filesystem objects, and +should only be used by trusted domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="tunable"> +<summary> +Tunable to depend on +</summary> +</param> +</interface> +<interface name="storage_dontaudit_read_fixed_disk" lineno="151"> <summary> Do not audit attempts made by the caller to read fixed disk device nodes. @@ -87443,7 +87680,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_raw_write_fixed_disk" lineno="141"> +<interface name="storage_raw_write_fixed_disk" lineno="174"> <summary> Allow the caller to directly write to a fixed disk. This is extremely dangerous as it can bypass the @@ -87456,7 +87693,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_write_fixed_disk" lineno="164"> +<interface name="storage_dontaudit_write_fixed_disk" lineno="197"> <summary> Do not audit attempts made by the caller to write fixed disk device nodes. @@ -87467,7 +87704,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_raw_rw_fixed_disk" lineno="186"> +<interface name="storage_raw_rw_fixed_disk" lineno="219"> <summary> Allow the caller to directly read and write to a fixed disk. This is extremely dangerous as it can bypass the @@ -87480,7 +87717,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_create_fixed_disk_dev" lineno="201"> +<interface name="storage_create_fixed_disk_dev" lineno="234"> <summary> Allow the caller to create fixed disk device nodes. </summary> @@ -87490,7 +87727,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_delete_fixed_disk_dev" lineno="221"> +<interface name="storage_delete_fixed_disk_dev" lineno="254"> <summary> Allow the caller to delete fixed disk device nodes. </summary> @@ -87500,7 +87737,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_manage_fixed_disk" lineno="240"> +<interface name="storage_manage_fixed_disk" lineno="273"> <summary> Create, read, write, and delete fixed disk device nodes. </summary> @@ -87510,7 +87747,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dev_filetrans_fixed_disk" lineno="269"> +<interface name="storage_dev_filetrans_fixed_disk" lineno="302"> <summary> Create block devices in /dev with the fixed disk type via an automatic type transition. @@ -87526,7 +87763,7 @@ Optional filename of the block device to be created </summary> </param> </interface> -<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="288"> +<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="321"> <summary> Create block devices in on a tmpfs filesystem with the fixed disk type via an automatic type transition. @@ -87537,7 +87774,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_relabel_fixed_disk" lineno="306"> +<interface name="storage_relabel_fixed_disk" lineno="339"> <summary> Relabel fixed disk device nodes. </summary> @@ -87547,7 +87784,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_swapon_fixed_disk" lineno="325"> +<interface name="storage_swapon_fixed_disk" lineno="358"> <summary> Enable a fixed disk device as swap space </summary> @@ -87557,7 +87794,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_getattr_fuse_dev" lineno="345"> +<interface name="storage_getattr_fuse_dev" lineno="378"> <summary> Allow the caller to get the attributes of device nodes of fuse devices. @@ -87568,7 +87805,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_rw_fuse" lineno="364"> +<interface name="storage_rw_fuse" lineno="397"> <summary> read or write fuse device interfaces. </summary> @@ -87578,7 +87815,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_rw_fuse" lineno="383"> +<interface name="storage_dontaudit_rw_fuse" lineno="416"> <summary> Do not audit attempts to read or write fuse device interfaces. @@ -87589,7 +87826,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_getattr_scsi_generic_dev" lineno="402"> +<interface name="storage_getattr_scsi_generic_dev" lineno="435"> <summary> Allow the caller to get the attributes of the generic SCSI interface device nodes. @@ -87600,7 +87837,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_setattr_scsi_generic_dev" lineno="422"> +<interface name="storage_setattr_scsi_generic_dev" lineno="455"> <summary> Allow the caller to set the attributes of the generic SCSI interface device nodes. @@ -87611,7 +87848,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_read_scsi_generic" lineno="445"> +<interface name="storage_read_scsi_generic" lineno="478"> <summary> Allow the caller to directly read, in a generic fashion, from any SCSI device. @@ -87625,7 +87862,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_write_scsi_generic" lineno="470"> +<interface name="storage_write_scsi_generic" lineno="503"> <summary> Allow the caller to directly write, in a generic fashion, from any SCSI device. @@ -87639,7 +87876,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_setattr_scsi_generic_dev_dev" lineno="492"> +<interface name="storage_setattr_scsi_generic_dev_dev" lineno="525"> <summary> Set attributes of the device nodes for the SCSI generic inerface. @@ -87650,7 +87887,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_rw_scsi_generic" lineno="512"> +<interface name="storage_dontaudit_rw_scsi_generic" lineno="545"> <summary> Do not audit attempts to read or write SCSI generic device interfaces. @@ -87661,7 +87898,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_getattr_removable_dev" lineno="531"> +<interface name="storage_getattr_removable_dev" lineno="564"> <summary> Allow the caller to get the attributes of removable devices device nodes. @@ -87672,7 +87909,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_getattr_removable_dev" lineno="551"> +<interface name="storage_dontaudit_getattr_removable_dev" lineno="584"> <summary> Do not audit attempts made by the caller to get the attributes of removable devices device nodes. @@ -87683,7 +87920,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_dontaudit_read_removable_device" lineno="570"> +<interface name="storage_dontaudit_read_removable_device" lineno="603"> <summary> Do not audit attempts made by the caller to read removable devices device nodes. @@ -87694,7 +87931,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_dontaudit_write_removable_device" lineno="590"> +<interface name="storage_dontaudit_write_removable_device" lineno="623"> <summary> Do not audit attempts made by the caller to write removable devices device nodes. @@ -87705,7 +87942,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_setattr_removable_dev" lineno="609"> +<interface name="storage_setattr_removable_dev" lineno="642"> <summary> Allow the caller to set the attributes of removable devices device nodes. @@ -87716,7 +87953,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_setattr_removable_dev" lineno="629"> +<interface name="storage_dontaudit_setattr_removable_dev" lineno="662"> <summary> Do not audit attempts made by the caller to set the attributes of removable devices device nodes. @@ -87727,7 +87964,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_raw_read_removable_device" lineno="651"> +<interface name="storage_raw_read_removable_device" lineno="684"> <summary> Allow the caller to directly read from a removable device. @@ -87741,7 +87978,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_raw_read_removable_device" lineno="670"> +<interface name="storage_dontaudit_raw_read_removable_device" lineno="703"> <summary> Do not audit attempts to directly read removable devices. </summary> @@ -87751,7 +87988,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_raw_write_removable_device" lineno="692"> +<interface name="storage_raw_write_removable_device" lineno="725"> <summary> Allow the caller to directly write to a removable device. @@ -87765,7 +88002,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_raw_write_removable_device" lineno="711"> +<interface name="storage_dontaudit_raw_write_removable_device" lineno="744"> <summary> Do not audit attempts to directly write removable devices. </summary> @@ -87775,7 +88012,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_read_tape" lineno="730"> +<interface name="storage_read_tape" lineno="763"> <summary> Allow the caller to directly read a tape device. @@ -87786,7 +88023,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_write_tape" lineno="750"> +<interface name="storage_write_tape" lineno="783"> <summary> Allow the caller to directly write a tape device. @@ -87797,7 +88034,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_getattr_tape_dev" lineno="770"> +<interface name="storage_getattr_tape_dev" lineno="803"> <summary> Allow the caller to get the attributes of device nodes of tape devices. @@ -87808,7 +88045,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_setattr_tape_dev" lineno="790"> +<interface name="storage_setattr_tape_dev" lineno="823"> <summary> Allow the caller to set the attributes of device nodes of tape devices. @@ -87819,7 +88056,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_unconfined" lineno="809"> +<interface name="storage_unconfined" lineno="842"> <summary> Unconfined access to storage devices. </summary> @@ -87884,7 +88121,7 @@ An object type that will applied to a tty. </summary> </param> </interface> -<interface name="term_user_tty" lineno="110"> +<interface name="term_user_tty" lineno="109"> <summary> Transform specified type into a user tty type. </summary> @@ -87899,7 +88136,7 @@ An object type that will applied to a tty. </summary> </param> </interface> -<interface name="term_mount_devpts" lineno="144"> +<interface name="term_mount_devpts" lineno="143"> <summary> mount a devpts_t filesystem </summary> @@ -87909,7 +88146,7 @@ The type of the process to mount it </summary> </param> </interface> -<interface name="term_create_devpts_dirs" lineno="162"> +<interface name="term_create_devpts_dirs" lineno="161"> <summary> Create directory /dev/pts. </summary> @@ -87919,7 +88156,7 @@ The type of the process creating the directory. </summary> </param> </interface> -<interface name="term_create_pty" lineno="185"> +<interface name="term_create_pty" lineno="184"> <summary> Create a pty in the /dev/pts directory. </summary> @@ -87934,7 +88171,7 @@ The type of the pty. </summary> </param> </interface> -<interface name="term_write_all_terms" lineno="211"> +<interface name="term_write_all_terms" lineno="210"> <summary> Write the console, all ttys and all ptys. @@ -87946,7 +88183,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_use_all_terms" lineno="234"> +<interface name="term_use_all_terms" lineno="233"> <summary> Read and write the console, all ttys and all ptys. @@ -87958,7 +88195,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_write_console" lineno="256"> +<interface name="term_write_console" lineno="255"> <summary> Write to the console. </summary> @@ -87969,7 +88206,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_read_console" lineno="276"> +<interface name="term_read_console" lineno="275"> <summary> Read from the console. </summary> @@ -87980,7 +88217,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_dontaudit_read_console" lineno="296"> +<interface name="term_dontaudit_read_console" lineno="295"> <summary> Do not audit attempts to read from the console. </summary> @@ -87991,7 +88228,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="term_use_console" lineno="315"> +<interface name="term_use_console" lineno="314"> <summary> Read from and write to the console. </summary> @@ -88002,7 +88239,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_dontaudit_use_console" lineno="335"> +<interface name="term_dontaudit_use_console" lineno="334"> <summary> Do not audit attemtps to read from or write to the console. @@ -88013,7 +88250,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_setattr_console" lineno="355"> +<interface name="term_setattr_console" lineno="354"> <summary> Set the attributes of the console device node. @@ -88025,7 +88262,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_relabel_console" lineno="374"> +<interface name="term_relabel_console" lineno="373"> <summary> Relabel from and to the console type. </summary> @@ -88035,7 +88272,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_create_console_dev" lineno="393"> +<interface name="term_create_console_dev" lineno="392"> <summary> Create the console device (/dev/console). </summary> @@ -88045,7 +88282,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_getattr_pty_fs" lineno="413"> +<interface name="term_getattr_pty_fs" lineno="412"> <summary> Get the attributes of a pty filesystem </summary> @@ -88055,7 +88292,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_relabel_pty_fs" lineno="431"> +<interface name="term_relabel_pty_fs" lineno="430"> <summary> Relabel from and to pty filesystem. </summary> @@ -88065,7 +88302,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_getattr_pty_dirs" lineno="451"> +<interface name="term_getattr_pty_dirs" lineno="450"> <summary> Get the attributes of the /dev/pts directory. @@ -88076,7 +88313,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_dontaudit_getattr_pty_dirs" lineno="470"> +<interface name="term_dontaudit_getattr_pty_dirs" lineno="469"> <summary> Do not audit attempts to get the attributes of the /dev/pts directory. @@ -88087,7 +88324,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_search_ptys" lineno="488"> +<interface name="term_search_ptys" lineno="487"> <summary> Search the contents of the /dev/pts directory. </summary> @@ -88097,7 +88334,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_dontaudit_search_ptys" lineno="508"> +<interface name="term_dontaudit_search_ptys" lineno="507"> <summary> Do not audit attempts to search the contents of the /dev/pts directory. @@ -88108,7 +88345,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_list_ptys" lineno="528"> +<interface name="term_list_ptys" lineno="527"> <summary> Read the /dev/pts directory to list all ptys. @@ -88119,7 +88356,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_dontaudit_list_ptys" lineno="548"> +<interface name="term_dontaudit_list_ptys" lineno="547"> <summary> Do not audit attempts to read the /dev/pts directory. @@ -88130,7 +88367,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_dontaudit_manage_pty_dirs" lineno="567"> +<interface name="term_dontaudit_manage_pty_dirs" lineno="566"> <summary> Do not audit attempts to create, read, write, or delete the /dev/pts directory. @@ -88141,7 +88378,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_relabel_pty_dirs" lineno="585"> +<interface name="term_relabel_pty_dirs" lineno="584"> <summary> Relabel from and to pty directories. </summary> @@ -88151,7 +88388,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_getattr_generic_ptys" lineno="604"> +<interface name="term_getattr_generic_ptys" lineno="603"> <summary> Get the attributes of generic pty devices. </summary> @@ -88161,7 +88398,7 @@ Domain to allow </summary> </param> </interface> -<interface name="term_dontaudit_getattr_generic_ptys" lineno="623"> +<interface name="term_dontaudit_getattr_generic_ptys" lineno="622"> <summary> Do not audit attempts to get the attributes of generic pty devices. @@ -88172,7 +88409,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_ioctl_generic_ptys" lineno="641"> +<interface name="term_ioctl_generic_ptys" lineno="640"> <summary> ioctl of generic pty devices. </summary> @@ -88182,7 +88419,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_setattr_generic_ptys" lineno="663"> +<interface name="term_setattr_generic_ptys" lineno="662"> <summary> Allow setting the attributes of generic pty devices. @@ -88193,7 +88430,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_dontaudit_setattr_generic_ptys" lineno="683"> +<interface name="term_dontaudit_setattr_generic_ptys" lineno="682"> <summary> Dontaudit setting the attributes of generic pty devices. @@ -88204,7 +88441,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_use_generic_ptys" lineno="703"> +<interface name="term_use_generic_ptys" lineno="702"> <summary> Read and write the generic pty type. This is generally only used in @@ -88216,7 +88453,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_dontaudit_use_generic_ptys" lineno="725"> +<interface name="term_dontaudit_use_generic_ptys" lineno="724"> <summary> Dot not audit attempts to read and write the generic pty type. This is @@ -88228,7 +88465,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_setattr_controlling_term" lineno="743"> +<interface name="term_setattr_controlling_term" lineno="742"> <summary> Set the attributes of the tty device </summary> @@ -88238,7 +88475,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_use_controlling_term" lineno="763"> +<interface name="term_use_controlling_term" lineno="762"> <summary> Read and write the controlling terminal (/dev/tty). @@ -88249,7 +88486,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_getattr_ptmx" lineno="782"> +<interface name="term_getattr_ptmx" lineno="781"> <summary> Get the attributes of the pty multiplexor (/dev/ptmx). </summary> @@ -88259,7 +88496,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_dontaudit_getattr_ptmx" lineno="801"> +<interface name="term_dontaudit_getattr_ptmx" lineno="800"> <summary> Do not audit attempts to get attributes on the pty multiplexor (/dev/ptmx). @@ -88270,7 +88507,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_use_ptmx" lineno="819"> +<interface name="term_use_ptmx" lineno="818"> <summary> Read and write the pty multiplexor (/dev/ptmx). </summary> @@ -88280,7 +88517,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_dontaudit_use_ptmx" lineno="839"> +<interface name="term_dontaudit_use_ptmx" lineno="838"> <summary> Do not audit attempts to read and write the pty multiplexor (/dev/ptmx). @@ -88291,7 +88528,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_getattr_all_ptys" lineno="859"> +<interface name="term_getattr_all_ptys" lineno="858"> <summary> Get the attributes of all pty device nodes. @@ -88303,7 +88540,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_dontaudit_getattr_all_ptys" lineno="882"> +<interface name="term_dontaudit_getattr_all_ptys" lineno="881"> <summary> Do not audit attempts to get the attributes of any pty @@ -88315,7 +88552,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_setattr_all_ptys" lineno="902"> +<interface name="term_setattr_all_ptys" lineno="901"> <summary> Set the attributes of all pty device nodes. @@ -88327,7 +88564,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_relabelto_all_ptys" lineno="923"> +<interface name="term_relabelto_all_ptys" lineno="922"> <summary> Relabel to all ptys. </summary> @@ -88337,7 +88574,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_write_all_ptys" lineno="941"> +<interface name="term_write_all_ptys" lineno="940"> <summary> Write to all ptys. </summary> @@ -88347,7 +88584,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_use_all_ptys" lineno="961"> +<interface name="term_use_all_ptys" lineno="960"> <summary> Read and write all ptys. </summary> @@ -88358,7 +88595,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_dontaudit_use_all_ptys" lineno="982"> +<interface name="term_dontaudit_use_all_ptys" lineno="981"> <summary> Do not audit attempts to read or write any ptys. </summary> @@ -88368,7 +88605,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_relabel_all_ptys" lineno="1000"> +<interface name="term_relabel_all_ptys" lineno="999"> <summary> Relabel from and to all pty device nodes. </summary> @@ -88378,7 +88615,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_getattr_unallocated_ttys" lineno="1022"> +<interface name="term_getattr_unallocated_ttys" lineno="1021"> <summary> Get the attributes of all unallocated tty device nodes. @@ -88390,7 +88627,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_setattr_unlink_unallocated_ttys" lineno="1042"> +<interface name="term_setattr_unlink_unallocated_ttys" lineno="1041"> <summary> Setattr and unlink unallocated tty device nodes. </summary> @@ -88401,7 +88638,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1062"> +<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1061"> <summary> Do not audit attempts to get the attributes of all unallocated tty device nodes. @@ -88412,7 +88649,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_setattr_unallocated_ttys" lineno="1082"> +<interface name="term_setattr_unallocated_ttys" lineno="1081"> <summary> Set the attributes of all unallocated tty device nodes. @@ -88424,7 +88661,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1102"> +<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1101"> <summary> Do not audit attempts to set the attributes of unallocated tty device nodes. @@ -88435,7 +88672,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1121"> +<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1120"> <summary> Do not audit attempts to ioctl unallocated tty device nodes. @@ -88446,7 +88683,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_relabel_unallocated_ttys" lineno="1140"> +<interface name="term_relabel_unallocated_ttys" lineno="1139"> <summary> Relabel from and to the unallocated tty type. @@ -88457,7 +88694,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_reset_tty_labels" lineno="1160"> +<interface name="term_reset_tty_labels" lineno="1159"> <summary> Relabel from all user tty types to the unallocated tty type. @@ -88468,7 +88705,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_append_unallocated_ttys" lineno="1181"> +<interface name="term_append_unallocated_ttys" lineno="1180"> <summary> Append to unallocated ttys. </summary> @@ -88478,7 +88715,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_write_unallocated_ttys" lineno="1200"> +<interface name="term_write_unallocated_ttys" lineno="1199"> <summary> Write to unallocated ttys. </summary> @@ -88488,7 +88725,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_use_unallocated_ttys" lineno="1220"> +<interface name="term_use_unallocated_ttys" lineno="1219"> <summary> Read and write unallocated ttys. </summary> @@ -88499,7 +88736,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_dontaudit_use_unallocated_ttys" lineno="1240"> +<interface name="term_dontaudit_use_unallocated_ttys" lineno="1239"> <summary> Do not audit attempts to read or write unallocated ttys. @@ -88510,7 +88747,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_getattr_all_ttys" lineno="1259"> +<interface name="term_getattr_all_ttys" lineno="1258"> <summary> Get the attributes of all tty device nodes. </summary> @@ -88521,7 +88758,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_dontaudit_getattr_all_ttys" lineno="1279"> +<interface name="term_dontaudit_getattr_all_ttys" lineno="1278"> <summary> Do not audit attempts to get the attributes of any tty device nodes. @@ -88532,7 +88769,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_setattr_all_ttys" lineno="1299"> +<interface name="term_setattr_all_ttys" lineno="1298"> <summary> Set the attributes of all tty device nodes. </summary> @@ -88543,7 +88780,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_relabel_all_ttys" lineno="1318"> +<interface name="term_relabel_all_ttys" lineno="1317"> <summary> Relabel from and to all tty device nodes. </summary> @@ -88553,7 +88790,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_write_all_ttys" lineno="1337"> +<interface name="term_write_all_ttys" lineno="1336"> <summary> Write to all ttys. </summary> @@ -88563,7 +88800,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_use_all_ttys" lineno="1357"> +<interface name="term_use_all_ttys" lineno="1356"> <summary> Read and write all ttys. </summary> @@ -88574,7 +88811,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_dontaudit_use_all_ttys" lineno="1377"> +<interface name="term_dontaudit_use_all_ttys" lineno="1376"> <summary> Do not audit attempts to read or write any ttys. @@ -88585,7 +88822,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_use_virtio_console" lineno="1395"> +<interface name="term_use_virtio_console" lineno="1394"> <summary> Read from and write virtio console. </summary> @@ -89949,7 +90186,7 @@ The prefix to be used for deriving type names. </summary> </param> </template> -<interface name="apache_role" lineno="141"> +<interface name="apache_role" lineno="118"> <summary> Role access for apache. </summary> @@ -89964,7 +90201,7 @@ User domain for the role. </summary> </param> </interface> -<interface name="apache_read_user_scripts" lineno="196"> +<interface name="apache_read_user_scripts" lineno="173"> <summary> Read user httpd script executable files. </summary> @@ -89974,7 +90211,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_user_content" lineno="216"> +<interface name="apache_read_user_content" lineno="193"> <summary> Read user httpd content. </summary> @@ -89984,7 +90221,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_domtrans" lineno="236"> +<interface name="apache_domtrans" lineno="213"> <summary> Execute httpd with a domain transition. </summary> @@ -89994,7 +90231,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apache_initrc_domtrans" lineno="255"> +<interface name="apache_initrc_domtrans" lineno="232"> <summary> Execute httpd server in the httpd domain. </summary> @@ -90004,7 +90241,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apache_signal" lineno="273"> +<interface name="apache_signal" lineno="250"> <summary> Send generic signals to httpd. </summary> @@ -90014,7 +90251,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_signull" lineno="291"> +<interface name="apache_signull" lineno="268"> <summary> Send null signals to httpd. </summary> @@ -90024,7 +90261,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_sigchld" lineno="309"> +<interface name="apache_sigchld" lineno="286"> <summary> Send child terminated signals to httpd. </summary> @@ -90034,7 +90271,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_use_fds" lineno="328"> +<interface name="apache_use_fds" lineno="305"> <summary> Inherit and use file descriptors from httpd. @@ -90045,7 +90282,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_dontaudit_rw_fifo_file" lineno="347"> +<interface name="apache_dontaudit_rw_fifo_file" lineno="324"> <summary> Do not audit attempts to read and write httpd unnamed pipes. @@ -90056,7 +90293,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_dontaudit_rw_stream_sockets" lineno="366"> +<interface name="apache_dontaudit_rw_stream_sockets" lineno="343"> <summary> Do not audit attempts to read and write httpd unix domain stream sockets. @@ -90067,7 +90304,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_rw_stream_sockets" lineno="385"> +<interface name="apache_rw_stream_sockets" lineno="362"> <summary> Read and write httpd unix domain stream sockets. @@ -90078,7 +90315,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_dontaudit_rw_tcp_sockets" lineno="404"> +<interface name="apache_dontaudit_rw_tcp_sockets" lineno="381"> <summary> Do not audit attempts to read and write httpd TCP sockets. @@ -90089,7 +90326,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_reload" lineno="422"> +<interface name="apache_reload" lineno="399"> <summary> Reload the httpd service (systemd). </summary> @@ -90099,7 +90336,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_all_ra_content" lineno="441"> +<interface name="apache_read_all_ra_content" lineno="418"> <summary> Read all appendable content </summary> @@ -90109,7 +90346,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_append_all_ra_content" lineno="460"> +<interface name="apache_append_all_ra_content" lineno="437"> <summary> Append to all appendable web content </summary> @@ -90119,7 +90356,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_all_rw_content" lineno="478"> +<interface name="apache_read_all_rw_content" lineno="455"> <summary> Read all read/write content </summary> @@ -90129,7 +90366,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_manage_all_rw_content" lineno="497"> +<interface name="apache_manage_all_rw_content" lineno="474"> <summary> Manage all read/write content </summary> @@ -90139,7 +90376,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_all_content" lineno="516"> +<interface name="apache_read_all_content" lineno="493"> <summary> Read all web content. </summary> @@ -90149,7 +90386,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_search_all_content" lineno="538"> +<interface name="apache_search_all_content" lineno="515"> <summary> Search all apache content. </summary> @@ -90159,7 +90396,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_manage_all_content" lineno="558"> +<interface name="apache_manage_all_content" lineno="535"> <summary> Create, read, write, and delete all httpd content. @@ -90171,7 +90408,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="apache_setattr_cache_dirs" lineno="582"> +<interface name="apache_setattr_cache_dirs" lineno="559"> <summary> Set attributes httpd cache directories. </summary> @@ -90181,7 +90418,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_list_cache" lineno="600"> +<interface name="apache_list_cache" lineno="577"> <summary> List httpd cache directories. </summary> @@ -90191,7 +90428,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_rw_cache_files" lineno="618"> +<interface name="apache_rw_cache_files" lineno="595"> <summary> Read and write httpd cache files. </summary> @@ -90201,7 +90438,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_delete_cache_dirs" lineno="636"> +<interface name="apache_delete_cache_dirs" lineno="613"> <summary> Delete httpd cache directories. </summary> @@ -90211,7 +90448,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_delete_cache_files" lineno="654"> +<interface name="apache_delete_cache_files" lineno="631"> <summary> Delete httpd cache files. </summary> @@ -90221,7 +90458,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_config" lineno="673"> +<interface name="apache_read_config" lineno="650"> <summary> Read httpd configuration files. </summary> @@ -90232,7 +90469,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="apache_search_config" lineno="694"> +<interface name="apache_search_config" lineno="671"> <summary> Search httpd configuration directories. </summary> @@ -90242,7 +90479,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_manage_config" lineno="714"> +<interface name="apache_manage_config" lineno="691"> <summary> Create, read, write, and delete httpd configuration files. @@ -90253,7 +90490,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_domtrans_helper" lineno="736"> +<interface name="apache_domtrans_helper" lineno="713"> <summary> Execute the Apache helper program with a domain transition. @@ -90264,7 +90501,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_run_helper" lineno="763"> +<interface name="apache_run_helper" lineno="740"> <summary> Execute the Apache helper program with a domain transition, and allow the @@ -90282,7 +90519,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="apache_read_log" lineno="783"> +<interface name="apache_read_log" lineno="760"> <summary> Read httpd log files. </summary> @@ -90293,7 +90530,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="apache_append_log" lineno="804"> +<interface name="apache_append_log" lineno="781"> <summary> Append httpd log files. </summary> @@ -90303,7 +90540,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_dontaudit_append_log" lineno="825"> +<interface name="apache_dontaudit_append_log" lineno="802"> <summary> Do not audit attempts to append httpd log files. @@ -90314,7 +90551,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_manage_log" lineno="844"> +<interface name="apache_manage_log" lineno="821"> <summary> Create, read, write, and delete httpd log files. @@ -90325,7 +90562,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_write_log" lineno="865"> +<interface name="apache_write_log" lineno="842"> <summary> Write apache log files. </summary> @@ -90335,7 +90572,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_dontaudit_search_modules" lineno="885"> +<interface name="apache_dontaudit_search_modules" lineno="862"> <summary> Do not audit attempts to search httpd module directories. @@ -90346,7 +90583,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_list_modules" lineno="903"> +<interface name="apache_list_modules" lineno="880"> <summary> List httpd module directories. </summary> @@ -90356,7 +90593,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_exec_modules" lineno="921"> +<interface name="apache_exec_modules" lineno="898"> <summary> Execute httpd module files. </summary> @@ -90366,7 +90603,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_module_files" lineno="941"> +<interface name="apache_read_module_files" lineno="918"> <summary> Read httpd module files. </summary> @@ -90376,7 +90613,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_domtrans_rotatelogs" lineno="961"> +<interface name="apache_domtrans_rotatelogs" lineno="938"> <summary> Execute a domain transition to run httpd_rotatelogs. @@ -90387,7 +90624,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apache_list_sys_content" lineno="980"> +<interface name="apache_list_sys_content" lineno="957"> <summary> List httpd system content directories. </summary> @@ -90397,7 +90634,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_manage_sys_content" lineno="1001"> +<interface name="apache_manage_sys_content" lineno="978"> <summary> Create, read, write, and delete httpd system content files. @@ -90409,7 +90646,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="apache_manage_sys_rw_content" lineno="1023"> +<interface name="apache_manage_sys_rw_content" lineno="1000"> <summary> Create, read, write, and delete httpd system rw content. @@ -90420,7 +90657,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_domtrans_sys_script" lineno="1045"> +<interface name="apache_domtrans_sys_script" lineno="1022"> <summary> Execute all httpd scripts in the system script domain. @@ -90431,7 +90668,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1068"> +<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1045"> <summary> Do not audit attempts to read and write httpd system script unix @@ -90443,7 +90680,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_domtrans_all_scripts" lineno="1087"> +<interface name="apache_domtrans_all_scripts" lineno="1064"> <summary> Execute all user scripts in the user script domain. @@ -90454,7 +90691,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apache_run_all_scripts" lineno="1112"> +<interface name="apache_run_all_scripts" lineno="1089"> <summary> Execute all user scripts in the user script domain. Add user script domains @@ -90471,7 +90708,7 @@ Role allowed access. </summary> </param> </interface> -<interface name="apache_read_squirrelmail_data" lineno="1131"> +<interface name="apache_read_squirrelmail_data" lineno="1108"> <summary> Read httpd squirrelmail data files. </summary> @@ -90481,7 +90718,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_append_squirrelmail_data" lineno="1149"> +<interface name="apache_append_squirrelmail_data" lineno="1126"> <summary> Append httpd squirrelmail data files. </summary> @@ -90491,7 +90728,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_search_sys_content" lineno="1167"> +<interface name="apache_search_sys_content" lineno="1144"> <summary> Search httpd system content. </summary> @@ -90501,7 +90738,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_sys_content" lineno="1186"> +<interface name="apache_read_sys_content" lineno="1163"> <summary> Read httpd system content. </summary> @@ -90511,7 +90748,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_search_sys_scripts" lineno="1206"> +<interface name="apache_search_sys_scripts" lineno="1183"> <summary> Search httpd system CGI directories. </summary> @@ -90521,7 +90758,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_manage_all_user_content" lineno="1226"> +<interface name="apache_manage_all_user_content" lineno="1203"> <summary> Create, read, write, and delete all user httpd content. @@ -90533,7 +90770,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="apache_search_sys_script_state" lineno="1247"> +<interface name="apache_search_sys_script_state" lineno="1224"> <summary> Search system script state directories. </summary> @@ -90543,7 +90780,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_tmp_files" lineno="1265"> +<interface name="apache_read_tmp_files" lineno="1242"> <summary> Read httpd tmp files. </summary> @@ -90553,7 +90790,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_dontaudit_write_tmp_files" lineno="1285"> +<interface name="apache_dontaudit_write_tmp_files" lineno="1262"> <summary> Do not audit attempts to write httpd tmp files. @@ -90564,7 +90801,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_delete_lib_files" lineno="1303"> +<interface name="apache_delete_lib_files" lineno="1280"> <summary> Delete httpd_var_lib_t files </summary> @@ -90574,7 +90811,7 @@ Domain that can delete the files </summary> </param> </interface> -<interface name="apache_cgi_domain" lineno="1334"> +<interface name="apache_cgi_domain" lineno="1311"> <summary> Execute CGI in the specified domain. </summary> @@ -90596,7 +90833,7 @@ Type of the executable to enter the cgi domain. </summary> </param> </interface> -<interface name="apache_admin" lineno="1362"> +<interface name="apache_admin" lineno="1339"> <summary> All of the rules required to administrate an apache environment. @@ -93161,6 +93398,65 @@ Domain allowed access. </param> </interface> </module> +<module name="consolesetup" filename="policy/modules/services/consolesetup.if"> +<summary>console font and keymap setup program for debian</summary> +<interface name="consolesetup_domtrans" lineno="13"> +<summary> +Execute console-setup in the consolesetup domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="consolesetup_read_conf" lineno="33"> +<summary> +Read console-setup configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="consolesetup_exec_conf" lineno="55"> +<summary> +Execute console-setup configuration files +in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="consolesetup_manage_runtime" lineno="76"> +<summary> +Allow the caller to manage +consolesetup_runtime_t files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="consolesetup_pid_filetrans_runtime" lineno="98"> +<summary> +Create a console-setup directory in +the runtime directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> <module name="corosync" filename="policy/modules/services/corosync.if"> <summary>Corosync Cluster Engine.</summary> <interface name="corosync_domtrans" lineno="13"> @@ -94581,7 +94877,27 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dbus_unconfined" lineno="600"> +<interface name="dbus_watch_system_bus_runtime_dirs" lineno="600"> +<summary> +Watch system bus runtime directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="618"> +<summary> +Watch system bus runtime named sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_unconfined" lineno="636"> <summary> Unconfined access to DBUS. </summary> @@ -94591,9 +94907,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="630"> +<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="666"> <summary> -Create resources in /run or /var/run with the system_dbusd_var_run_t +Create resources in /run or /var/run with the system_dbusd_runtime_t label. This method is deprecated in favor of the init_daemon_run_dir call. </summary> @@ -94613,9 +94929,9 @@ Optional file name used for the resource </summary> </param> </interface> -<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="644"> +<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="680"> <summary> -Create directories with the system_dbusd_var_run_t label +Create directories with the system_dbusd_runtime_t label </summary> <param name="domain"> <summary> @@ -98005,7 +98321,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kerberos_read_config" lineno="112"> +<interface name="kerberos_read_config" lineno="109"> <summary> Read kerberos configuration files. </summary> @@ -98016,7 +98332,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kerberos_dontaudit_write_config" lineno="135"> +<interface name="kerberos_dontaudit_write_config" lineno="132"> <summary> Do not audit attempts to write kerberos configuration files. @@ -98027,7 +98343,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kerberos_rw_config" lineno="155"> +<interface name="kerberos_rw_config" lineno="152"> <summary> Read and write kerberos configuration files. @@ -98039,7 +98355,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kerberos_manage_krb5_home_files" lineno="175"> +<interface name="kerberos_manage_krb5_home_files" lineno="172"> <summary> Create, read, write, and delete kerberos home files. @@ -98050,7 +98366,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kerberos_relabel_krb5_home_files" lineno="194"> +<interface name="kerberos_relabel_krb5_home_files" lineno="191"> <summary> Relabel kerberos home files. </summary> @@ -98060,7 +98376,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kerberos_home_filetrans_krb5_home" lineno="224"> +<interface name="kerberos_home_filetrans_krb5_home" lineno="221"> <summary> Create objects in user home directories with the krb5 home type. @@ -98081,7 +98397,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="kerberos_read_keytab" lineno="243"> +<interface name="kerberos_read_keytab" lineno="240"> <summary> Read kerberos key table files. </summary> @@ -98092,7 +98408,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kerberos_rw_keytab" lineno="262"> +<interface name="kerberos_rw_keytab" lineno="259"> <summary> Read and write kerberos key table files. </summary> @@ -98102,7 +98418,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kerberos_manage_keytab_files" lineno="282"> +<interface name="kerberos_manage_keytab_files" lineno="279"> <summary> Create, read, write, and delete kerberos key table files. @@ -98113,7 +98429,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kerberos_etc_filetrans_keytab" lineno="313"> +<interface name="kerberos_etc_filetrans_keytab" lineno="310"> <summary> Create specified objects in generic etc directories with the kerberos @@ -98135,7 +98451,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="kerberos_read_kdc_config" lineno="332"> +<interface name="kerberos_read_kdc_config" lineno="329"> <summary> Read kerberos kdc configuration files. </summary> @@ -98146,7 +98462,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kerberos_manage_host_rcache" lineno="353"> +<interface name="kerberos_manage_host_rcache" lineno="350"> <summary> Create, read, write, and delete kerberos host rcache files. @@ -98158,7 +98474,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kerberos_tmp_filetrans_host_rcache" lineno="394"> +<interface name="kerberos_tmp_filetrans_host_rcache" lineno="391"> <summary> Create objects in generic temporary directories with the kerberos host @@ -98180,7 +98496,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="kerberos_connect_524" lineno="412"> +<interface name="kerberos_connect_524" lineno="409"> <summary> Connect to krb524 service. </summary> @@ -98190,7 +98506,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kerberos_admin" lineno="443"> +<interface name="kerberos_admin" lineno="439"> <summary> All of the rules required to administrate an kerberos environment. @@ -98312,6 +98628,63 @@ Role allowed access. <rolecap/> </interface> </module> +<module name="knot" filename="policy/modules/services/knot.if"> +<summary>high-performance authoritative-only DNS server.</summary> +<interface name="knot_domtrans_client" lineno="13"> +<summary> +Execute knotc in the knotc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="knot_run_client" lineno="39"> +<summary> +Execute knotc in the knotc domain, and +allow the specified role the knotc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="knot_read_config_files" lineno="58"> +<summary> +Read knot config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="knot_admin" lineno="84"> +<summary> +All of the rules required to +administrate an knot environment. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> <module name="ksmtuned" filename="policy/modules/services/ksmtuned.if"> <summary>Kernel Samepage Merging Tuning Daemon.</summary> <interface name="ksmtuned_domtrans" lineno="13"> @@ -98452,7 +98825,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ldap_admin" lineno="100"> +<interface name="ldap_admin" lineno="99"> <summary> All of the rules required to administrate an ldap environment. @@ -98469,7 +98842,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="ldap_run" lineno="148"> +<interface name="ldap_run" lineno="147"> <summary> Execute slapd in the slapd domain, and allow the given role the slapd_t type. @@ -99043,7 +99416,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="memcached_admin" lineno="119"> +<interface name="memcached_admin" lineno="118"> <summary> All of the rules required to administrate an memcached environment. @@ -100214,7 +100587,7 @@ Domain prefix to be used. </summary> </param> </template> -<interface name="munin_stream_connect" lineno="58"> +<interface name="munin_stream_connect" lineno="55"> <summary> Connect to munin over a unix domain stream socket. @@ -100225,7 +100598,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="munin_read_config" lineno="78"> +<interface name="munin_read_config" lineno="75"> <summary> Read munin configuration content. </summary> @@ -100236,7 +100609,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="munin_append_log" lineno="100"> +<interface name="munin_append_log" lineno="97"> <summary> Append munin log files. </summary> @@ -100247,7 +100620,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="munin_search_lib" lineno="120"> +<interface name="munin_search_lib" lineno="117"> <summary> Search munin library directories. </summary> @@ -100257,7 +100630,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="munin_dontaudit_search_lib" lineno="140"> +<interface name="munin_dontaudit_search_lib" lineno="137"> <summary> Do not audit attempts to search munin library directories. @@ -100268,7 +100641,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="munin_admin" lineno="165"> +<interface name="munin_admin" lineno="162"> <summary> All of the rules required to administrate an munin environment. @@ -100344,7 +100717,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mysql_stream_connect" lineno="98"> +<interface name="mysql_stream_connect" lineno="97"> <summary> Connect to mysqld with a unix </summary> @@ -100355,7 +100728,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="mysql_read_config" lineno="118"> +<interface name="mysql_read_config" lineno="117"> <summary> Read mysqld configuration content. </summary> @@ -100366,7 +100739,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="mysql_search_db" lineno="139"> +<interface name="mysql_search_db" lineno="138"> <summary> Search mysqld db directories. </summary> @@ -100376,7 +100749,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mysql_rw_db_dirs" lineno="158"> +<interface name="mysql_rw_db_dirs" lineno="157"> <summary> Read and write mysqld database directories. </summary> @@ -100386,7 +100759,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mysql_manage_db_dirs" lineno="178"> +<interface name="mysql_manage_db_dirs" lineno="177"> <summary> Create, read, write, and delete mysqld database directories. @@ -100397,7 +100770,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mysql_append_db_files" lineno="197"> +<interface name="mysql_append_db_files" lineno="196"> <summary> Append mysqld database files. </summary> @@ -100407,7 +100780,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mysql_rw_db_files" lineno="216"> +<interface name="mysql_rw_db_files" lineno="215"> <summary> Read and write mysqld database files. </summary> @@ -100417,7 +100790,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mysql_manage_db_files" lineno="236"> +<interface name="mysql_manage_db_files" lineno="235"> <summary> Create, read, write, and delete mysqld database files. @@ -100428,7 +100801,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mysql_manage_mysqld_home_files" lineno="256"> +<interface name="mysql_manage_mysqld_home_files" lineno="255"> <summary> Create, read, write, and delete mysqld home files. @@ -100439,7 +100812,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mysql_relabel_mysqld_home_files" lineno="275"> +<interface name="mysql_relabel_mysqld_home_files" lineno="274"> <summary> Relabel mysqld home files. </summary> @@ -100449,7 +100822,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mysql_home_filetrans_mysqld_home" lineno="305"> +<interface name="mysql_home_filetrans_mysqld_home" lineno="304"> <summary> Create objects in user home directories with the mysqld home type. @@ -100470,7 +100843,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="mysql_write_log" lineno="323"> +<interface name="mysql_write_log" lineno="322"> <summary> Write mysqld log files. </summary> @@ -100480,7 +100853,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mysql_domtrans_mysql_safe" lineno="343"> +<interface name="mysql_domtrans_mysql_safe" lineno="342"> <summary> Execute mysqld safe in the mysqld safe domain. @@ -100491,7 +100864,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="mysql_read_pid_files" lineno="362"> +<interface name="mysql_read_pid_files" lineno="361"> <summary> Read mysqld pid files. </summary> @@ -100501,7 +100874,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mysql_search_pid_files" lineno="382"> +<interface name="mysql_search_pid_files" lineno="381"> <summary> Search mysqld pid files. </summary> @@ -100512,7 +100885,7 @@ Domain allowed access. </param> </interface> -<interface name="mysql_admin" lineno="408"> +<interface name="mysql_admin" lineno="407"> <summary> All of the rules required to administrate an mysqld environment. @@ -100529,7 +100902,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="mysql_setattr_run_dirs" lineno="450"> +<interface name="mysql_setattr_run_dirs" lineno="449"> <summary> Set the attributes of the MySQL run directories </summary> @@ -100539,7 +100912,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="mysql_create_run_dirs" lineno="468"> +<interface name="mysql_create_run_dirs" lineno="467"> <summary> Create MySQL run directories </summary> @@ -100549,7 +100922,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="mysql_generic_run_filetrans_run" lineno="499"> +<interface name="mysql_generic_run_filetrans_run" lineno="498"> <summary> Automatically use the MySQL run label for created resources in generic run locations. This method is deprecated in favor of the @@ -100872,7 +101245,37 @@ Domain allowed access. </summary> </param> </interface> -<interface name="networkmanager_admin" lineno="313"> +<interface name="networkmanager_enabledisable" lineno="306"> +<summary> +Allow specified domain to enable/disable NetworkManager units +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="networkmanager_startstop" lineno="325"> +<summary> +Allow specified domain to start/stop NetworkManager units +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="networkmanager_status" lineno="344"> +<summary> +Allow specified domain to get status of NetworkManager +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="networkmanager_admin" lineno="370"> <summary> All of the rules required to administrate an networkmanager environment. @@ -100889,7 +101292,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="352"> +<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="409"> <summary> Do not audit use of wpa_cli file descriptors </summary> @@ -100899,7 +101302,7 @@ Domain to dontaudit access. </summary> </param> </interface> -<interface name="networkmanager_domtrans_wpa_cli" lineno="371"> +<interface name="networkmanager_domtrans_wpa_cli" lineno="428"> <summary> Execute wpa_cli in the wpa_cli domain. </summary> @@ -100909,7 +101312,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="networkmanager_run_wpa_cli" lineno="397"> +<interface name="networkmanager_run_wpa_cli" lineno="454"> <summary> Execute wpa cli in the wpa_cli domain, and allow the specified role the wpa_cli domain. @@ -100926,7 +101329,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="networkmanager_rw_rawip_sockets" lineno="418"> +<interface name="networkmanager_rw_rawip_sockets" lineno="475"> <summary> Read and write networkmanager rawip sockets. </summary> @@ -100962,7 +101365,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nis_use_ypbind" lineno="90"> +<interface name="nis_use_ypbind" lineno="88"> <summary> Use the ypbind service to access NIS services. </summary> @@ -100985,7 +101388,7 @@ Domain allowed access. <infoflow type="both" weight="10"/> <rolecap/> </interface> -<interface name="nis_authenticate" lineno="107"> +<interface name="nis_authenticate" lineno="105"> <summary> Use nis to authenticate passwords. </summary> @@ -100996,7 +101399,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="nis_domtrans_ypbind" lineno="125"> +<interface name="nis_domtrans_ypbind" lineno="123"> <summary> Execute ypbind in the ypbind domain. </summary> @@ -101006,7 +101409,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="nis_exec_ypbind" lineno="144"> +<interface name="nis_exec_ypbind" lineno="142"> <summary> Execute ypbind in the caller domain. </summary> @@ -101016,7 +101419,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nis_run_ypbind" lineno="170"> +<interface name="nis_run_ypbind" lineno="168"> <summary> Execute ypbind in the ypbind domain, and allow the specified role the ypbind domain. @@ -101033,7 +101436,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="nis_signal_ypbind" lineno="189"> +<interface name="nis_signal_ypbind" lineno="187"> <summary> Send generic signals to ypbind. </summary> @@ -101043,7 +101446,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nis_list_var_yp" lineno="207"> +<interface name="nis_list_var_yp" lineno="205"> <summary> List nis data directories. </summary> @@ -101053,7 +101456,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nis_read_ypbind_pid" lineno="226"> +<interface name="nis_read_ypbind_pid" lineno="224"> <summary> Read ypbind pid files. </summary> @@ -101063,7 +101466,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nis_delete_ypbind_pid" lineno="245"> +<interface name="nis_delete_ypbind_pid" lineno="243"> <summary> Delete ypbind pid files. </summary> @@ -101073,7 +101476,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nis_read_ypserv_config" lineno="263"> +<interface name="nis_read_ypserv_config" lineno="261"> <summary> Read ypserv configuration files. </summary> @@ -101083,7 +101486,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nis_domtrans_ypxfr" lineno="282"> +<interface name="nis_domtrans_ypxfr" lineno="280"> <summary> Execute ypxfr in the ypxfr domain. </summary> @@ -101093,7 +101496,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="nis_initrc_domtrans" lineno="303"> +<interface name="nis_initrc_domtrans" lineno="301"> <summary> Execute nis init scripts in the init script domain. @@ -101104,7 +101507,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="nis_initrc_domtrans_ypbind" lineno="322"> +<interface name="nis_initrc_domtrans_ypbind" lineno="320"> <summary> Execute ypbind init scripts in the init script domain. @@ -101115,7 +101518,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="nis_admin" lineno="347"> +<interface name="nis_admin" lineno="345"> <summary> All of the rules required to administrate an nis environment. @@ -102507,7 +102910,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="plymouthd_manage_lib_files" lineno="206"> +<interface name="plymouthd_rw_lib_files" lineno="205"> +<summary> +Read and write plymouthd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_manage_lib_files" lineno="225"> <summary> Create, read, write, and delete plymouthd lib files. @@ -102518,7 +102931,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="plymouthd_read_pid_files" lineno="225"> +<interface name="plymouthd_read_pid_files" lineno="244"> <summary> Read plymouthd pid files. </summary> @@ -102528,7 +102941,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="plymouthd_admin" lineno="252"> +<interface name="plymouthd_delete_pid_files" lineno="264"> +<summary> +Delete the plymouthd pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_admin" lineno="290"> <summary> All of the rules required to administrate an plymouthd environment. @@ -102944,7 +103367,7 @@ Domain prefix to be used. </summary> </param> </template> -<template name="postfix_user_domain_template" lineno="104"> +<template name="postfix_user_domain_template" lineno="105"> <summary> The template to define a postfix user domain. </summary> @@ -102954,7 +103377,7 @@ Domain prefix to be used. </summary> </param> </template> -<interface name="postfix_read_config" lineno="141"> +<interface name="postfix_read_config" lineno="142"> <summary> Read postfix configuration content. </summary> @@ -102965,7 +103388,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="postfix_config_filetrans" lineno="178"> +<interface name="postfix_config_filetrans" lineno="179"> <summary> Create specified object in postfix etc directories with a type transition. @@ -102991,7 +103414,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="postfix_dontaudit_rw_local_tcp_sockets" lineno="198"> +<interface name="postfix_dontaudit_rw_local_tcp_sockets" lineno="199"> <summary> Do not audit attempts to read and write postfix local delivery @@ -103003,7 +103426,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="postfix_rw_local_pipes" lineno="216"> +<interface name="postfix_rw_local_pipes" lineno="217"> <summary> Read and write postfix local pipes. </summary> @@ -103013,7 +103436,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_read_local_state" lineno="234"> +<interface name="postfix_read_local_state" lineno="235"> <summary> Read postfix local process state files. </summary> @@ -103023,7 +103446,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_rw_inherited_master_pipes" lineno="255"> +<interface name="postfix_rw_inherited_master_pipes" lineno="256"> <summary> Read and write inherited postfix master pipes. </summary> @@ -103033,7 +103456,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_read_master_state" lineno="274"> +<interface name="postfix_read_master_state" lineno="275"> <summary> Read postfix master process state files. </summary> @@ -103043,7 +103466,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_use_fds_master" lineno="295"> +<interface name="postfix_use_fds_master" lineno="296"> <summary> Use postfix master file descriptors. </summary> @@ -103053,7 +103476,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_dontaudit_use_fds" lineno="315"> +<interface name="postfix_dontaudit_use_fds" lineno="316"> <summary> Do not audit attempts to use postfix master process file @@ -103065,7 +103488,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="postfix_domtrans_map" lineno="333"> +<interface name="postfix_domtrans_map" lineno="334"> <summary> Execute postfix_map in the postfix_map domain. </summary> @@ -103075,7 +103498,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="postfix_run_map" lineno="360"> +<interface name="postfix_run_map" lineno="361"> <summary> Execute postfix map in the postfix map domain, and allow the specified @@ -103093,7 +103516,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="postfix_domtrans_master" lineno="380"> +<interface name="postfix_domtrans_master" lineno="381"> <summary> Execute the master postfix program in the postfix_master domain. @@ -103104,7 +103527,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="postfix_exec_master" lineno="400"> +<interface name="postfix_exec_master" lineno="401"> <summary> Execute the master postfix program in the caller domain. @@ -103115,7 +103538,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_stream_connect_master" lineno="421"> +<interface name="postfix_stream_connect_master" lineno="422"> <summary> Connect to postfix master process using a unix domain stream socket. @@ -103127,7 +103550,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="postfix_domtrans_postdrop" lineno="440"> +<interface name="postfix_domtrans_postdrop" lineno="441"> <summary> Execute the master postdrop in the postfix postdrop domain. @@ -103138,7 +103561,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="postfix_domtrans_postqueue" lineno="460"> +<interface name="postfix_domtrans_postqueue" lineno="461"> <summary> Execute the master postqueue in the postfix postqueue domain. @@ -103149,7 +103572,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="postfix_exec_postqueue" lineno="480"> +<interface name="postfix_exec_postqueue" lineno="481"> <summary> Execute postfix postqueue in the caller domain. @@ -103160,7 +103583,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_create_private_sockets" lineno="499"> +<interface name="postfix_create_private_sockets" lineno="500"> <summary> Create postfix private sock files. </summary> @@ -103170,7 +103593,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_manage_private_sockets" lineno="518"> +<interface name="postfix_manage_private_sockets" lineno="519"> <summary> Create, read, write, and delete postfix private sock files. @@ -103181,7 +103604,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_domtrans_smtp" lineno="537"> +<interface name="postfix_domtrans_smtp" lineno="538"> <summary> Execute the smtp postfix program in the postfix smtp domain. @@ -103192,7 +103615,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="postfix_getattr_all_spool_files" lineno="557"> +<interface name="postfix_getattr_all_spool_files" lineno="558"> <summary> Get attributes of all postfix mail spool files. @@ -103203,7 +103626,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_search_spool" lineno="576"> +<interface name="postfix_search_spool" lineno="577"> <summary> Search postfix mail spool directories. </summary> @@ -103213,7 +103636,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_list_spool" lineno="595"> +<interface name="postfix_list_spool" lineno="596"> <summary> List postfix mail spool directories. </summary> @@ -103223,7 +103646,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_read_spool_files" lineno="614"> +<interface name="postfix_read_spool_files" lineno="615"> <summary> Read postfix mail spool files. </summary> @@ -103233,7 +103656,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_manage_spool_files" lineno="634"> +<interface name="postfix_manage_spool_files" lineno="635"> <summary> Create, read, write, and delete postfix mail spool files. @@ -103244,7 +103667,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_domtrans_user_mail_handler" lineno="654"> +<interface name="postfix_domtrans_user_mail_handler" lineno="655"> <summary> Execute postfix user mail programs in their respective domains. @@ -103255,7 +103678,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postfix_admin" lineno="679"> +<interface name="postfix_admin" lineno="680"> <summary> All of the rules required to administrate an postfix environment. @@ -103527,7 +103950,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postgresql_stream_connect" lineno="444"> +<interface name="postgresql_stream_connect" lineno="443"> <summary> Allow the specified domain to connect to postgresql with a unix socket. </summary> @@ -103538,7 +103961,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="postgresql_unpriv_client" lineno="466"> +<interface name="postgresql_unpriv_client" lineno="465"> <summary> Allow the specified domain unprivileged accesses to unifined database objects managed by SE-PostgreSQL, @@ -103549,7 +103972,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postgresql_unconfined" lineno="558"> +<interface name="postgresql_unconfined" lineno="557"> <summary> Allow the specified domain unconfined accesses to any database objects managed by SE-PostgreSQL, @@ -103560,7 +103983,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="postgresql_admin" lineno="582"> +<interface name="postgresql_admin" lineno="581"> <summary> All of the rules required to administrate an postgresql environment </summary> @@ -107546,7 +107969,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="snmp_manage_var_lib_dirs" lineno="55"> +<interface name="snmp_manage_var_lib_dirs" lineno="54"> <summary> Create, read, write, and delete snmp lib directories. @@ -107557,7 +107980,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="snmp_manage_var_lib_files" lineno="75"> +<interface name="snmp_manage_var_lib_files" lineno="74"> <summary> Create, read, write, and delete snmp lib files. @@ -107568,7 +107991,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="snmp_read_snmp_var_lib_files" lineno="95"> +<interface name="snmp_read_snmp_var_lib_files" lineno="94"> <summary> Read snmpd lib content. </summary> @@ -107578,7 +108001,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="snmp_dontaudit_read_snmp_var_lib_files" lineno="116"> +<interface name="snmp_dontaudit_read_snmp_var_lib_files" lineno="115"> <summary> Do not audit attempts to read snmpd lib content. @@ -107589,7 +108012,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="snmp_dontaudit_write_snmp_var_lib_files" lineno="137"> +<interface name="snmp_dontaudit_write_snmp_var_lib_files" lineno="136"> <summary> Do not audit attempts to write snmpd lib files. @@ -107600,7 +108023,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="snmp_admin" lineno="162"> +<interface name="snmp_admin" lineno="161"> <summary> All of the rules required to administrate an snmp environment. @@ -107617,7 +108040,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="snmp_append_var_lib_files" lineno="195"> +<interface name="snmp_append_var_lib_files" lineno="194"> <summary> Append to the snmp variable lib data </summary> @@ -108122,7 +108545,7 @@ The role associated with the user domain. </summary> </param> </template> -<template name="ssh_server_template" lineno="171"> +<template name="ssh_server_template" lineno="169"> <summary> The template to define a ssh server. </summary> @@ -108142,7 +108565,7 @@ is the prefix for sshd_t). </summary> </param> </template> -<template name="ssh_role_template" lineno="301"> +<template name="ssh_role_template" lineno="300"> <summary> Role access for ssh </summary> @@ -108163,7 +108586,7 @@ User domain for the role </summary> </param> </template> -<interface name="ssh_sigchld" lineno="455"> +<interface name="ssh_sigchld" lineno="453"> <summary> Send a SIGCHLD signal to the ssh server. </summary> @@ -108173,7 +108596,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_signal" lineno="473"> +<interface name="ssh_signal" lineno="471"> <summary> Send a generic signal to the ssh server. </summary> @@ -108183,7 +108606,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_signull" lineno="491"> +<interface name="ssh_signull" lineno="489"> <summary> Send a null signal to sshd processes. </summary> @@ -108193,7 +108616,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_read_pipes" lineno="509"> +<interface name="ssh_read_pipes" lineno="507"> <summary> Read a ssh server unnamed pipe. </summary> @@ -108203,7 +108626,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_rw_pipes" lineno="526"> +<interface name="ssh_rw_pipes" lineno="524"> <summary> Read and write a ssh server unnamed pipe. </summary> @@ -108213,7 +108636,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_rw_stream_sockets" lineno="544"> +<interface name="ssh_rw_stream_sockets" lineno="542"> <summary> Read and write ssh server unix domain stream sockets. </summary> @@ -108223,7 +108646,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_rw_tcp_sockets" lineno="562"> +<interface name="ssh_rw_tcp_sockets" lineno="560"> <summary> Read and write ssh server TCP sockets. </summary> @@ -108233,7 +108656,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="581"> +<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="579"> <summary> Do not audit attempts to read and write ssh server TCP sockets. @@ -108244,7 +108667,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="ssh_exec_sshd" lineno="599"> +<interface name="ssh_exec_sshd" lineno="597"> <summary> Execute the ssh daemon in the caller domain. </summary> @@ -108254,7 +108677,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_domtrans" lineno="618"> +<interface name="ssh_domtrans" lineno="616"> <summary> Execute the ssh daemon sshd domain. </summary> @@ -108264,7 +108687,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="ssh_exec" lineno="636"> +<interface name="ssh_exec" lineno="634"> <summary> Execute the ssh client in the caller domain. </summary> @@ -108274,7 +108697,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_setattr_key_files" lineno="655"> +<interface name="ssh_setattr_key_files" lineno="653"> <summary> Set the attributes of sshd key files. </summary> @@ -108284,7 +108707,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_agent_exec" lineno="674"> +<interface name="ssh_agent_exec" lineno="672"> <summary> Execute the ssh agent client in the caller domain. </summary> @@ -108294,7 +108717,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_read_user_home_files" lineno="693"> +<interface name="ssh_read_user_home_files" lineno="691"> <summary> Read ssh home directory content </summary> @@ -108304,7 +108727,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_domtrans_keygen" lineno="714"> +<interface name="ssh_domtrans_keygen" lineno="712"> <summary> Execute the ssh key generator in the ssh keygen domain. </summary> @@ -108314,7 +108737,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="ssh_dontaudit_read_server_keys" lineno="732"> +<interface name="ssh_dontaudit_read_server_keys" lineno="730"> <summary> Read ssh server keys </summary> @@ -108324,7 +108747,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="ssh_manage_home_files" lineno="750"> +<interface name="ssh_manage_home_files" lineno="748"> <summary> Manage ssh home directory content </summary> @@ -108334,7 +108757,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_delete_tmp" lineno="769"> +<interface name="ssh_delete_tmp" lineno="767"> <summary> Delete from the ssh temp files. </summary> @@ -109002,6 +109425,39 @@ tcp sockets to all unreserved ports. </desc> </tunable> </module> +<module name="tpm2" filename="policy/modules/services/tpm2.if"> +<summary>Trusted Platform Module 2.0</summary> +<interface name="tpm2_enabledisable_abrmd" lineno="13"> +<summary> +Allow specified domain to enable/disable tpm2-abrmd unit +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tpm2_startstop_abrmd" lineno="32"> +<summary> +Allow specified domain to start/stop tpm2-abrmd unit +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tpm2_status_abrmd" lineno="51"> +<summary> +Allow specified domain to get status of tpm2-abrmd unit +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> <module name="transproxy" filename="policy/modules/services/transproxy.if"> <summary>Portable Transparent Proxy Solution.</summary> <interface name="transproxy_admin" lineno="20"> @@ -110223,7 +110679,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_rw_all_image_chr_files" lineno="1059"> +<interface name="virt_rw_all_image_chr_files" lineno="1058"> <summary> Read and write all virt image character files. @@ -110234,7 +110690,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_manage_virt_cache" lineno="1080"> +<interface name="virt_manage_virt_cache" lineno="1079"> <summary> Create, read, write, and delete virt cache content. @@ -110245,7 +110701,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_manage_images" lineno="1102"> +<interface name="virt_manage_images" lineno="1101"> <summary> Create, read, write, and delete virt image files. @@ -110256,7 +110712,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_admin" lineno="1145"> +<interface name="virt_admin" lineno="1143"> <summary> All of the rules required to administrate an virt environment. @@ -110510,6 +110966,54 @@ Role allowed access. <rolecap/> </interface> </module> +<module name="wireguard" filename="policy/modules/services/wireguard.if"> +<summary>WireGuard VPN.</summary> +<interface name="wireguard_domtrans" lineno="13"> +<summary> +Execute WireGuard in the wireguard domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="wireguard_run" lineno="39"> +<summary> +Execute WireGuard in the wireguard domain, and +allow the specified role the wireguard domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="wireguard_admin" lineno="66"> +<summary> +All of the rules required to +administrate a WireGuard +environment. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> <module name="xfs" filename="policy/modules/services/xfs.if"> <summary>X Windows Font Server.</summary> <interface name="xfs_read_sockets" lineno="13"> @@ -110592,7 +111096,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_role" lineno="138"> +<interface name="xserver_role" lineno="139"> <summary> Rules required for using the X Windows server and environment. @@ -110608,7 +111112,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_ro_session" lineno="232"> +<interface name="xserver_ro_session" lineno="236"> <summary> Create sessions on the X server, with read-only access to the X server shared @@ -110625,7 +111129,7 @@ The type of the domain SYSV tmpfs files. </summary> </param> </interface> -<interface name="xserver_rw_session" lineno="274"> +<interface name="xserver_rw_session" lineno="278"> <summary> Create sessions on the X server, with read and write access to the X server shared @@ -110642,7 +111146,7 @@ The type of the domain SYSV tmpfs files. </summary> </param> </interface> -<interface name="xserver_non_drawing_client" lineno="294"> +<interface name="xserver_non_drawing_client" lineno="298"> <summary> Create non-drawing client sessions on an X server. </summary> @@ -110652,7 +111156,7 @@ Domain allowed access. </summary> </param> </interface> -<template name="xserver_common_x_domain_template" lineno="333"> +<template name="xserver_common_x_domain_template" lineno="337"> <summary> Interface to provide X object permissions on a given X server to an X client domain. Provides the minimal set required by a basic @@ -110670,7 +111174,7 @@ Client domain allowed access. </summary> </param> </template> -<template name="xserver_object_types_template" lineno="393"> +<template name="xserver_object_types_template" lineno="396"> <summary> Template for creating the set of types used in an X windows domain. @@ -110682,7 +111186,7 @@ is the prefix for user_t). </summary> </param> </template> -<template name="xserver_user_x_domain_template" lineno="435"> +<template name="xserver_user_x_domain_template" lineno="438"> <summary> Interface to provide X object permissions on a given X server to an X client domain. Provides the minimal set required by a basic @@ -110705,7 +111209,7 @@ The type of the domain SYSV tmpfs files. </summary> </param> </template> -<interface name="xserver_use_user_fonts" lineno="502"> +<interface name="xserver_use_user_fonts" lineno="505"> <summary> Read user fonts, user font configuration, and manage the user font cache. @@ -110726,7 +111230,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_domtrans_xauth" lineno="534"> +<interface name="xserver_domtrans_xauth" lineno="537"> <summary> Transition to the Xauthority domain. </summary> @@ -110736,7 +111240,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="557"> +<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="560"> <summary> Create a Xauthority file in the user home directory. </summary> @@ -110751,7 +111255,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="581"> +<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="584"> <summary> Create a ICEauthority file in the user home directory. @@ -110767,7 +111271,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="600"> +<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="603"> <summary> Create a .xsession-errors log file in the user home directory. @@ -110778,7 +111282,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_user_xauth" lineno="618"> +<interface name="xserver_read_user_xauth" lineno="621"> <summary> Read all users .Xauthority. </summary> @@ -110788,7 +111292,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_user_dmrc" lineno="637"> +<interface name="xserver_read_user_dmrc" lineno="640"> <summary> Read all users .dmrc. </summary> @@ -110798,7 +111302,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_user_iceauth" lineno="656"> +<interface name="xserver_read_user_iceauth" lineno="659"> <summary> Read all users .ICEauthority. </summary> @@ -110808,7 +111312,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_setattr_console_pipes" lineno="675"> +<interface name="xserver_setattr_console_pipes" lineno="678"> <summary> Set the attributes of the X windows console named pipes. </summary> @@ -110818,7 +111322,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_rw_console" lineno="693"> +<interface name="xserver_rw_console" lineno="696"> <summary> Read and write the X windows console named pipe. </summary> @@ -110828,7 +111332,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_create_console_pipes" lineno="711"> +<interface name="xserver_create_console_pipes" lineno="714"> <summary> Create the X windows console named pipes. </summary> @@ -110838,7 +111342,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_relabel_console_pipes" lineno="729"> +<interface name="xserver_relabel_console_pipes" lineno="732"> <summary> relabel the X windows console named pipes. </summary> @@ -110848,7 +111352,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_use_xdm_fds" lineno="747"> +<interface name="xserver_use_xdm_fds" lineno="750"> <summary> Use file descriptors for xdm. </summary> @@ -110858,7 +111362,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dontaudit_use_xdm_fds" lineno="766"> +<interface name="xserver_dontaudit_use_xdm_fds" lineno="769"> <summary> Do not audit attempts to inherit XDM file descriptors. @@ -110869,7 +111373,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_sigchld_xdm" lineno="784"> +<interface name="xserver_sigchld_xdm" lineno="787"> <summary> Allow domain to send sigchld to xdm_t </summary> @@ -110879,7 +111383,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_rw_xdm_pipes" lineno="802"> +<interface name="xserver_rw_xdm_pipes" lineno="805"> <summary> Read and write XDM unnamed pipes. </summary> @@ -110889,7 +111393,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="821"> +<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="824"> <summary> Do not audit attempts to read and write XDM unnamed pipes. @@ -110900,7 +111404,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_dbus_chat_xdm" lineno="841"> +<interface name="xserver_dbus_chat_xdm" lineno="844"> <summary> Send and receive messages from xdm over dbus. @@ -110911,7 +111415,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_xdm_state" lineno="861"> +<interface name="xserver_read_xdm_state" lineno="864"> <summary> Read xdm process state files. </summary> @@ -110921,7 +111425,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_setsched_xdm" lineno="883"> +<interface name="xserver_setsched_xdm" lineno="886"> <summary> Set the priority of the X Display Manager (XDM). @@ -110932,7 +111436,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_manage_xdm_spool_files" lineno="902"> +<interface name="xserver_manage_xdm_spool_files" lineno="905"> <summary> Create, read, write, and delete xdm_spool files. @@ -110943,7 +111447,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_stream_connect_xdm" lineno="917"> +<interface name="xserver_stream_connect_xdm" lineno="920"> <summary> Connect to XDM over a unix domain stream socket. @@ -110954,7 +111458,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_xdm_rw_config" lineno="936"> +<interface name="xserver_read_xdm_rw_config" lineno="939"> <summary> Read xdm-writable configuration files. </summary> @@ -110964,7 +111468,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_setattr_xdm_tmp_dirs" lineno="955"> +<interface name="xserver_setattr_xdm_tmp_dirs" lineno="958"> <summary> Set the attributes of XDM temporary directories. </summary> @@ -110974,7 +111478,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_create_xdm_tmp_sockets" lineno="974"> +<interface name="xserver_create_xdm_tmp_sockets" lineno="977"> <summary> Create a named socket in a XDM temporary directory. @@ -110985,7 +111489,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_delete_xdm_tmp_sockets" lineno="995"> +<interface name="xserver_delete_xdm_tmp_sockets" lineno="998"> <summary> Delete a named socket in a XDM temporary directory. @@ -110996,7 +111500,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_xdm_pid" lineno="1014"> +<interface name="xserver_read_xdm_pid" lineno="1017"> <summary> Read XDM pid files. </summary> @@ -111006,7 +111510,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_xdm_lib_files" lineno="1033"> +<interface name="xserver_read_xdm_lib_files" lineno="1036"> <summary> Read XDM var lib files. </summary> @@ -111016,7 +111520,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_xsession_entry_type" lineno="1051"> +<interface name="xserver_xsession_entry_type" lineno="1054"> <summary> Make an X session script an entrypoint for the specified domain. </summary> @@ -111026,7 +111530,7 @@ The domain for which the shell is an entrypoint. </summary> </param> </interface> -<interface name="xserver_xsession_spec_domtrans" lineno="1088"> +<interface name="xserver_xsession_spec_domtrans" lineno="1091"> <summary> Execute an X session in the target domain. This is an explicit transition, requiring the @@ -111055,7 +111559,7 @@ The type of the shell process. </summary> </param> </interface> -<interface name="xserver_write_inherited_xsession_log" lineno="1107"> +<interface name="xserver_write_inherited_xsession_log" lineno="1110"> <summary> Write to inherited xsession log files such as .xsession-errors. @@ -111066,7 +111570,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_rw_xsession_log" lineno="1127"> +<interface name="xserver_rw_xsession_log" lineno="1130"> <summary> Read and write xsession log files such as .xsession-errors. @@ -111077,7 +111581,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_manage_xsession_log" lineno="1146"> +<interface name="xserver_manage_xsession_log" lineno="1149"> <summary> Manage xsession log files such as .xsession-errors. @@ -111088,7 +111592,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_write_inherited_log" lineno="1165"> +<interface name="xserver_write_inherited_log" lineno="1168"> <summary> Write to inherited X server log files like /var/log/lightdm/lightdm.log @@ -111099,7 +111603,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_getattr_log" lineno="1183"> +<interface name="xserver_getattr_log" lineno="1186"> <summary> Get the attributes of X server logs. </summary> @@ -111109,7 +111613,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dontaudit_write_log" lineno="1203"> +<interface name="xserver_dontaudit_write_log" lineno="1206"> <summary> Do not audit attempts to write the X server log files. @@ -111120,7 +111624,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_delete_log" lineno="1221"> +<interface name="xserver_delete_log" lineno="1224"> <summary> Delete X server log files. </summary> @@ -111130,7 +111634,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_xkb_libs" lineno="1242"> +<interface name="xserver_read_xkb_libs" lineno="1245"> <summary> Read X keyboard extension libraries. </summary> @@ -111140,7 +111644,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_create_xdm_tmp_dirs" lineno="1263"> +<interface name="xserver_create_xdm_tmp_dirs" lineno="1266"> <summary> Create xdm temporary directories. </summary> @@ -111150,7 +111654,7 @@ Domain to allow access. </summary> </param> </interface> -<interface name="xserver_read_xdm_tmp_files" lineno="1281"> +<interface name="xserver_read_xdm_tmp_files" lineno="1284"> <summary> Read xdm temporary files. </summary> @@ -111160,7 +111664,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1300"> +<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1303"> <summary> Do not audit attempts to read xdm temporary files. </summary> @@ -111170,7 +111674,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_rw_xdm_tmp_files" lineno="1319"> +<interface name="xserver_rw_xdm_tmp_files" lineno="1322"> <summary> Read write xdm temporary files. </summary> @@ -111180,7 +111684,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_manage_xdm_tmp_files" lineno="1338"> +<interface name="xserver_manage_xdm_tmp_files" lineno="1341"> <summary> Create, read, write, and delete xdm temporary files. </summary> @@ -111190,7 +111694,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1357"> +<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1360"> <summary> Do not audit attempts to get the attributes of xdm temporary named sockets. @@ -111201,7 +111705,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_list_xdm_tmp" lineno="1375"> +<interface name="xserver_list_xdm_tmp" lineno="1378"> <summary> list xdm_tmp_t directories </summary> @@ -111211,7 +111715,7 @@ Domain to allow </summary> </param> </interface> -<interface name="xserver_domtrans" lineno="1393"> +<interface name="xserver_domtrans" lineno="1396"> <summary> Execute the X server in the X server domain. </summary> @@ -111221,7 +111725,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="xserver_signal" lineno="1412"> +<interface name="xserver_signal" lineno="1415"> <summary> Signal X servers </summary> @@ -111231,7 +111735,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_kill" lineno="1430"> +<interface name="xserver_kill" lineno="1433"> <summary> Kill X servers </summary> @@ -111241,7 +111745,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_state" lineno="1448"> +<interface name="xserver_read_state" lineno="1451"> <summary> Allow reading xserver_t files to get cgroup and sessionid </summary> @@ -111251,7 +111755,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_rw_shm" lineno="1468"> +<interface name="xserver_rw_shm" lineno="1471"> <summary> Read and write X server Sys V Shared memory segments. @@ -111262,7 +111766,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1487"> +<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1490"> <summary> Do not audit attempts to read and write to X server sockets. @@ -111273,7 +111777,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1506"> +<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1509"> <summary> Do not audit attempts to read and write X server unix domain stream sockets. @@ -111284,7 +111788,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_stream_connect" lineno="1525"> +<interface name="xserver_stream_connect" lineno="1528"> <summary> Connect to the X server over a unix domain stream socket. @@ -111295,7 +111799,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_tmp_files" lineno="1544"> +<interface name="xserver_read_tmp_files" lineno="1547"> <summary> Read X server temporary files. </summary> @@ -111305,7 +111809,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dbus_chat" lineno="1563"> +<interface name="xserver_dbus_chat" lineno="1566"> <summary> talk to xserver_t by dbus </summary> @@ -111315,7 +111819,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_manage_core_devices" lineno="1584"> +<interface name="xserver_manage_core_devices" lineno="1587"> <summary> Interface to provide X object permissions on a given X server to an X client domain. Gives the domain permission to read the @@ -111327,7 +111831,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_unconfined" lineno="1607"> +<interface name="xserver_unconfined" lineno="1610"> <summary> Interface to provide X object permissions on a given X server to an X client domain. Gives the domain complete control over the @@ -111339,7 +111843,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_rw_xdm_keys" lineno="1627"> +<interface name="xserver_rw_xdm_keys" lineno="1630"> <summary> Manage keys for xdm. </summary> @@ -111349,7 +111853,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_link_xdm_keys" lineno="1645"> +<interface name="xserver_link_xdm_keys" lineno="1648"> <summary> Manage keys for xdm. </summary> @@ -111359,7 +111863,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_rw_mesa_shader_cache" lineno="1663"> +<interface name="xserver_rw_mesa_shader_cache" lineno="1666"> <summary> Read and write the mesa shader cache. </summary> @@ -111422,7 +111926,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="zabbix_read_log" lineno="54"> +<interface name="zabbix_read_log" lineno="53"> <summary> Read zabbix log files. </summary> @@ -111433,7 +111937,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="zabbix_append_log" lineno="73"> +<interface name="zabbix_append_log" lineno="72"> <summary> Append zabbix log files. </summary> @@ -111443,7 +111947,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="zabbix_read_pid_files" lineno="92"> +<interface name="zabbix_read_pid_files" lineno="91"> <summary> Read zabbix pid files. </summary> @@ -111453,7 +111957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="zabbix_agent_tcp_connect" lineno="111"> +<interface name="zabbix_agent_tcp_connect" lineno="110"> <summary> Connect to zabbix agent on the TCP network. </summary> @@ -111463,7 +111967,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="zabbix_admin" lineno="139"> +<interface name="zabbix_admin" lineno="137"> <summary> All of the rules required to administrate an zabbix environment. @@ -111807,7 +112311,19 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_login_pgm_domain" lineno="118"> +<interface name="auth_use_pam_motd_dynamic" lineno="120"> +<summary> +Use the pam module motd with dynamic support during authentication. +This module comes from Ubuntu (https://bugs.launchpad.net/ubuntu/+source/pam/+bug/399071) +and was added to Debian (https://sources.debian.org/src/pam/1.3.1-5/debian/patches-applied/update-motd/) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_login_pgm_domain" lineno="144"> <summary> Make the specified domain used for a login program. </summary> @@ -111817,7 +112333,7 @@ Domain type used for a login program domain. </summary> </param> </interface> -<interface name="auth_login_entry_type" lineno="205"> +<interface name="auth_login_entry_type" lineno="231"> <summary> Use the login program as an entry point program. </summary> @@ -111827,7 +112343,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_domtrans_login_program" lineno="228"> +<interface name="auth_domtrans_login_program" lineno="254"> <summary> Execute a login_program in the target domain. </summary> @@ -111842,7 +112358,7 @@ The type of the login_program process. </summary> </param> </interface> -<interface name="auth_ranged_domtrans_login_program" lineno="258"> +<interface name="auth_ranged_domtrans_login_program" lineno="284"> <summary> Execute a login_program in the target domain, with a range transition. @@ -111863,7 +112379,7 @@ Range of the login program. </summary> </param> </interface> -<interface name="auth_search_cache" lineno="284"> +<interface name="auth_search_cache" lineno="310"> <summary> Search authentication cache </summary> @@ -111873,7 +112389,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_read_cache" lineno="302"> +<interface name="auth_read_cache" lineno="328"> <summary> Read authentication cache </summary> @@ -111883,7 +112399,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_rw_cache" lineno="320"> +<interface name="auth_rw_cache" lineno="346"> <summary> Read/Write authentication cache </summary> @@ -111893,7 +112409,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_manage_cache" lineno="338"> +<interface name="auth_manage_cache" lineno="364"> <summary> Manage authentication cache </summary> @@ -111903,7 +112419,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_var_filetrans_cache" lineno="357"> +<interface name="auth_var_filetrans_cache" lineno="383"> <summary> Automatic transition from cache_t to cache. </summary> @@ -111913,7 +112429,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_domtrans_chk_passwd" lineno="375"> +<interface name="auth_domtrans_chk_passwd" lineno="401"> <summary> Run unix_chkpwd to check a password. </summary> @@ -111923,7 +112439,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="auth_domtrans_chkpwd" lineno="423"> +<interface name="auth_domtrans_chkpwd" lineno="449"> <summary> Run unix_chkpwd to check a password. Stripped down version to be called within boolean @@ -111934,7 +112450,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="auth_run_chk_passwd" lineno="449"> +<interface name="auth_run_chk_passwd" lineno="475"> <summary> Execute chkpwd programs in the chkpwd domain. </summary> @@ -111949,7 +112465,7 @@ The role to allow the chkpwd domain. </summary> </param> </interface> -<interface name="auth_domtrans_upd_passwd" lineno="468"> +<interface name="auth_domtrans_upd_passwd" lineno="494"> <summary> Execute a domain transition to run unix_update. </summary> @@ -111959,7 +112475,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="auth_run_upd_passwd" lineno="493"> +<interface name="auth_run_upd_passwd" lineno="519"> <summary> Execute updpwd programs in the updpwd domain. </summary> @@ -111974,7 +112490,7 @@ The role to allow the updpwd domain. </summary> </param> </interface> -<interface name="auth_getattr_shadow" lineno="512"> +<interface name="auth_getattr_shadow" lineno="538"> <summary> Get the attributes of the shadow passwords file. </summary> @@ -111984,7 +112500,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_dontaudit_getattr_shadow" lineno="532"> +<interface name="auth_dontaudit_getattr_shadow" lineno="558"> <summary> Do not audit attempts to get the attributes of the shadow passwords file. @@ -111995,7 +112511,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="auth_read_shadow" lineno="554"> +<interface name="auth_read_shadow" lineno="580"> <summary> Read the shadow passwords file (/etc/shadow) </summary> @@ -112005,7 +112521,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_can_read_shadow_passwords" lineno="578"> +<interface name="auth_can_read_shadow_passwords" lineno="604"> <summary> Pass shadow assertion for reading. </summary> @@ -112024,7 +112540,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_tunable_read_shadow" lineno="604"> +<interface name="auth_tunable_read_shadow" lineno="630"> <summary> Read the shadow password file. </summary> @@ -112042,7 +112558,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_dontaudit_read_shadow" lineno="624"> +<interface name="auth_dontaudit_read_shadow" lineno="650"> <summary> Do not audit attempts to read the shadow password file (/etc/shadow). @@ -112053,7 +112569,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="auth_rw_shadow" lineno="642"> +<interface name="auth_rw_shadow" lineno="668"> <summary> Read and write the shadow password file (/etc/shadow). </summary> @@ -112063,7 +112579,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_manage_shadow" lineno="664"> +<interface name="auth_manage_shadow" lineno="690"> <summary> Create, read, write, and delete the shadow password file. @@ -112074,7 +112590,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_etc_filetrans_shadow" lineno="684"> +<interface name="auth_etc_filetrans_shadow" lineno="710"> <summary> Automatic transition from etc to shadow. </summary> @@ -112084,7 +112600,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_relabelto_shadow" lineno="703"> +<interface name="auth_relabelto_shadow" lineno="729"> <summary> Relabel to the shadow password file type. @@ -112095,7 +112611,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_relabel_shadow" lineno="725"> +<interface name="auth_relabel_shadow" lineno="751"> <summary> Relabel from and to the shadow password file type. @@ -112106,7 +112622,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_append_faillog" lineno="746"> +<interface name="auth_append_faillog" lineno="772"> <summary> Append to the login failure log. </summary> @@ -112116,7 +112632,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_create_faillog_files" lineno="765"> +<interface name="auth_create_faillog_files" lineno="791"> <summary> Create fail log lock (in /run/faillock). </summary> @@ -112126,7 +112642,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_rw_faillog" lineno="783"> +<interface name="auth_rw_faillog" lineno="809"> <summary> Read and write the login failure log. </summary> @@ -112136,7 +112652,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_manage_faillog" lineno="802"> +<interface name="auth_manage_faillog" lineno="828"> <summary> Manage the login failure logs. </summary> @@ -112146,7 +112662,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_setattr_faillog_files" lineno="821"> +<interface name="auth_setattr_faillog_files" lineno="847"> <summary> Setattr the login failure logs. </summary> @@ -112156,7 +112672,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_read_lastlog" lineno="840"> +<interface name="auth_read_lastlog" lineno="866"> <summary> Read the last logins log. </summary> @@ -112167,7 +112683,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="auth_append_lastlog" lineno="859"> +<interface name="auth_append_lastlog" lineno="885"> <summary> Append only to the last logins log. </summary> @@ -112177,7 +112693,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_relabel_lastlog" lineno="878"> +<interface name="auth_relabel_lastlog" lineno="904"> <summary> relabel the last logins log. </summary> @@ -112187,7 +112703,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_rw_lastlog" lineno="897"> +<interface name="auth_rw_lastlog" lineno="923"> <summary> Read and write to the last logins log. </summary> @@ -112197,7 +112713,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_manage_lastlog" lineno="916"> +<interface name="auth_manage_lastlog" lineno="942"> <summary> Manage the last logins log. </summary> @@ -112207,7 +112723,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_domtrans_pam" lineno="935"> +<interface name="auth_domtrans_pam" lineno="961"> <summary> Execute pam programs in the pam domain. </summary> @@ -112217,7 +112733,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="auth_signal_pam" lineno="953"> +<interface name="auth_signal_pam" lineno="979"> <summary> Send generic signals to pam processes. </summary> @@ -112227,7 +112743,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_run_pam" lineno="976"> +<interface name="auth_run_pam" lineno="1002"> <summary> Execute pam programs in the PAM domain. </summary> @@ -112242,7 +112758,7 @@ The role to allow the PAM domain. </summary> </param> </interface> -<interface name="auth_exec_pam" lineno="995"> +<interface name="auth_exec_pam" lineno="1021"> <summary> Execute the pam program. </summary> @@ -112252,7 +112768,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_read_var_auth" lineno="1014"> +<interface name="auth_read_var_auth" lineno="1040"> <summary> Read var auth files. Used by various other applications and pam applets etc. @@ -112263,7 +112779,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_rw_var_auth" lineno="1034"> +<interface name="auth_rw_var_auth" lineno="1060"> <summary> Read and write var auth files. Used by various other applications and pam applets etc. @@ -112274,7 +112790,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_manage_var_auth" lineno="1054"> +<interface name="auth_manage_var_auth" lineno="1080"> <summary> Manage var auth files. Used by various other applications and pam applets etc. @@ -112285,7 +112801,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_read_pam_pid" lineno="1075"> +<interface name="auth_read_pam_pid" lineno="1101"> <summary> Read PAM PID files. </summary> @@ -112295,7 +112811,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_dontaudit_read_pam_pid" lineno="1095"> +<interface name="auth_dontaudit_read_pam_pid" lineno="1121"> <summary> Do not audit attemps to read PAM PID files. </summary> @@ -112305,7 +112821,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="auth_pid_filetrans_pam_var_run" lineno="1126"> +<interface name="auth_pid_filetrans_pam_var_run" lineno="1152"> <summary> Create specified objects in pid directories with the pam var @@ -112328,7 +112844,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="auth_delete_pam_pid" lineno="1144"> +<interface name="auth_delete_pam_pid" lineno="1170"> <summary> Delete pam PID files. </summary> @@ -112338,7 +112854,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_manage_pam_pid" lineno="1164"> +<interface name="auth_manage_pam_pid" lineno="1190"> <summary> Manage pam PID files. </summary> @@ -112348,7 +112864,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_domtrans_pam_console" lineno="1184"> +<interface name="auth_domtrans_pam_console" lineno="1210"> <summary> Execute pam_console with a domain transition. </summary> @@ -112358,7 +112874,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="auth_search_pam_console_data" lineno="1203"> +<interface name="auth_search_pam_console_data" lineno="1229"> <summary> Search the contents of the pam_console data directory. @@ -112369,7 +112885,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_list_pam_console_data" lineno="1223"> +<interface name="auth_list_pam_console_data" lineno="1249"> <summary> List the contents of the pam_console data directory. @@ -112380,7 +112896,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_create_pam_console_data_dirs" lineno="1242"> +<interface name="auth_create_pam_console_data_dirs" lineno="1268"> <summary> Create pam var console pid directories. </summary> @@ -112390,7 +112906,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_relabel_pam_console_data_dirs" lineno="1261"> +<interface name="auth_relabel_pam_console_data_dirs" lineno="1287"> <summary> Relabel pam_console data directories. </summary> @@ -112400,7 +112916,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_read_pam_console_data" lineno="1279"> +<interface name="auth_read_pam_console_data" lineno="1305"> <summary> Read pam_console data files. </summary> @@ -112410,7 +112926,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_manage_pam_console_data" lineno="1300"> +<interface name="auth_manage_pam_console_data" lineno="1326"> <summary> Create, read, write, and delete pam_console data files. @@ -112421,7 +112937,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_delete_pam_console_data" lineno="1320"> +<interface name="auth_delete_pam_console_data" lineno="1346"> <summary> Delete pam_console data. </summary> @@ -112431,7 +112947,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_pid_filetrans_pam_var_console" lineno="1353"> +<interface name="auth_pid_filetrans_pam_var_console" lineno="1379"> <summary> Create specified objects in pid directories with the pam var @@ -112454,7 +112970,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="auth_domtrans_utempter" lineno="1371"> +<interface name="auth_domtrans_utempter" lineno="1397"> <summary> Execute utempter programs in the utempter domain. </summary> @@ -112464,7 +112980,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="auth_run_utempter" lineno="1394"> +<interface name="auth_run_utempter" lineno="1420"> <summary> Execute utempter programs in the utempter domain. </summary> @@ -112479,7 +112995,7 @@ The role to allow the utempter domain. </summary> </param> </interface> -<interface name="auth_dontaudit_exec_utempter" lineno="1413"> +<interface name="auth_dontaudit_exec_utempter" lineno="1439"> <summary> Do not audit attemps to execute utempter executable. </summary> @@ -112489,7 +113005,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="auth_setattr_login_records" lineno="1431"> +<interface name="auth_setattr_login_records" lineno="1457"> <summary> Set the attributes of login record files. </summary> @@ -112499,7 +113015,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_read_login_records" lineno="1451"> +<interface name="auth_read_login_records" lineno="1477"> <summary> Read login records files (/var/log/wtmp). </summary> @@ -112510,7 +113026,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="auth_dontaudit_read_login_records" lineno="1472"> +<interface name="auth_dontaudit_read_login_records" lineno="1498"> <summary> Do not audit attempts to read login records files (/var/log/wtmp). @@ -112522,7 +113038,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="auth_dontaudit_write_login_records" lineno="1491"> +<interface name="auth_dontaudit_write_login_records" lineno="1517"> <summary> Do not audit attempts to write to login records files. @@ -112533,7 +113049,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="auth_append_login_records" lineno="1509"> +<interface name="auth_append_login_records" lineno="1535"> <summary> Append to login records (wtmp). </summary> @@ -112543,7 +113059,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_write_login_records" lineno="1528"> +<interface name="auth_write_login_records" lineno="1554"> <summary> Write to login records (wtmp). </summary> @@ -112553,7 +113069,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_rw_login_records" lineno="1546"> +<interface name="auth_rw_login_records" lineno="1572"> <summary> Read and write login records. </summary> @@ -112563,7 +113079,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_log_filetrans_login_records" lineno="1566"> +<interface name="auth_log_filetrans_login_records" lineno="1592"> <summary> Create a login records in the log directory using a type transition. @@ -112574,7 +113090,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_manage_login_records" lineno="1585"> +<interface name="auth_manage_login_records" lineno="1611"> <summary> Create, read, write, and delete login records files. @@ -112585,7 +113101,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_relabel_login_records" lineno="1604"> +<interface name="auth_relabel_login_records" lineno="1630"> <summary> Relabel login record files. </summary> @@ -112595,7 +113111,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_use_nsswitch" lineno="1632"> +<interface name="auth_use_nsswitch" lineno="1658"> <summary> Use nsswitch to look up user, password, group, or host information. @@ -112615,7 +113131,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="auth_unconfined" lineno="1660"> +<interface name="auth_unconfined" lineno="1686"> <summary> Unconfined access to the authlogin module. </summary> @@ -113197,7 +113713,31 @@ Domain allowed access. </module> <module name="init" filename="policy/modules/system/init.if"> <summary>System initialization programs (init and init scripts).</summary> -<interface name="init_script_file" lineno="32"> +<interface name="init_mountpoint" lineno="17"> +<summary> +Make the specified type usable as a mountpoint. +</summary> +<desc> +Make the specified type usable as a mountpoint. +This is normally used for systemd BindPaths options. +</desc> +<param name="file_type"> +<summary> +Type to be used as a mountpoint. +</summary> +</param> +</interface> +<interface name="init_path_unit_location_file" lineno="35"> +<summary> +Create a file type monitored by a systemd path unit. +</summary> +<param name="script_file"> +<summary> +Type to be used for a path unit monitored location. +</summary> +</param> +</interface> +<interface name="init_script_file" lineno="73"> <summary> Create a file type used for init scripts. </summary> @@ -113226,7 +113766,7 @@ Type to be used for a script file. </param> <infoflow type="none"/> </interface> -<interface name="init_unit_file" lineno="56"> +<interface name="init_unit_file" lineno="97"> <summary> Make the specified type usable for systemd unit files. @@ -113237,7 +113777,7 @@ Type to be used for systemd unit files. </summary> </param> </interface> -<interface name="init_script_domain" lineno="87"> +<interface name="init_script_domain" lineno="128"> <summary> Create a domain used for init scripts. </summary> @@ -113259,7 +113799,7 @@ Type of the script file used as an entry point to this domain. </summary> </param> </interface> -<interface name="init_domain" lineno="119"> +<interface name="init_domain" lineno="170"> <summary> Create a domain which can be started by init. </summary> @@ -113274,7 +113814,7 @@ Type of the program to be used as an entry point to this domain. </summary> </param> </interface> -<interface name="init_ranged_domain" lineno="162"> +<interface name="init_ranged_domain" lineno="213"> <summary> Create a domain which can be started by init, with a range transition. @@ -113295,7 +113835,7 @@ Range for the domain. </summary> </param> </interface> -<interface name="init_spec_daemon_domain" lineno="203"> +<interface name="init_spec_daemon_domain" lineno="254"> <summary> Setup a domain which can be manually transitioned to from init. </summary> @@ -113319,7 +113859,7 @@ Type of the program being executed when starting this domain. </summary> </param> </interface> -<interface name="init_daemon_domain" lineno="276"> +<interface name="init_daemon_domain" lineno="327"> <summary> Create a domain for long running processes (daemons/services) which are started by init scripts. @@ -113354,7 +113894,7 @@ Type of the program to be used as an entry point to this domain. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="init_ranged_daemon_domain" lineno="363"> +<interface name="init_ranged_daemon_domain" lineno="412"> <summary> Create a domain for long running processes (daemons/services) which are started by init scripts, @@ -113396,7 +113936,7 @@ MLS/MCS range for the domain. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="init_abstract_socket_activation" lineno="394"> +<interface name="init_abstract_socket_activation" lineno="443"> <summary> Abstract socket service activation (systemd). </summary> @@ -113406,7 +113946,7 @@ The domain to be started by systemd socket activation. </summary> </param> </interface> -<interface name="init_named_socket_activation" lineno="419"> +<interface name="init_named_socket_activation" lineno="468"> <summary> Named socket service activation (systemd). </summary> @@ -113421,7 +113961,7 @@ The domain socket file type. </summary> </param> </interface> -<interface name="init_system_domain" lineno="470"> +<interface name="init_system_domain" lineno="519"> <summary> Create a domain for short running processes which are started by init scripts. @@ -113458,7 +113998,7 @@ Type of the program to be used as an entry point to this domain. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="init_ranged_system_domain" lineno="532"> +<interface name="init_ranged_system_domain" lineno="581"> <summary> Create a domain for short running processes which are started by init scripts. @@ -113501,7 +114041,7 @@ Range for the domain. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="init_dyntrans" lineno="563"> +<interface name="init_dyntrans" lineno="612"> <summary> Allow domain dyntransition to init_t domain. </summary> @@ -113511,7 +114051,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_daemon_pid_file" lineno="592"> +<interface name="init_daemon_pid_file" lineno="641"> <summary> Mark the file type as a daemon pid file, allowing initrc_t to create it @@ -113532,7 +114072,7 @@ Filename of the file that the init script creates </summary> </param> </interface> -<interface name="init_daemon_lock_file" lineno="625"> +<interface name="init_daemon_lock_file" lineno="674"> <summary> Mark the file type as a daemon lock file, allowing initrc_t to create it @@ -113553,7 +114093,7 @@ Filename of the file that the init script creates </summary> </param> </interface> -<interface name="init_domtrans" lineno="647"> +<interface name="init_domtrans" lineno="696"> <summary> Execute init (/sbin/init) with a domain transition. </summary> @@ -113563,7 +114103,23 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_exec" lineno="666"> +<interface name="init_pgm_spec_user_daemon_domain" lineno="720"> +<summary> +Execute init (/sbin/init) with a domain transition +to the provided domain. +</summary> +<desc> +Execute init (/sbin/init) with a domain transition +to the provided domain. This is used by systemd +to execute the systemd user session. +</desc> +<param name="domain"> +<summary> +The type to be used as a systemd --user domain. +</summary> +</param> +</interface> +<interface name="init_exec" lineno="748"> <summary> Execute the init program in the caller domain. </summary> @@ -113574,7 +114130,19 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_exec_rc" lineno="696"> +<interface name="init_pgm_entrypoint" lineno="769"> +<summary> +Allow the init program to be an entrypoint +for the specified domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="init_exec_rc" lineno="798"> <summary> Execute the rc application in the caller domain. </summary> @@ -113595,7 +114163,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getpgid" lineno="715"> +<interface name="init_getpgid" lineno="817"> <summary> Get the process group of init. </summary> @@ -113605,7 +114173,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signal" lineno="733"> +<interface name="init_signal" lineno="835"> <summary> Send init a generic signal. </summary> @@ -113615,7 +114183,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signull" lineno="751"> +<interface name="init_signull" lineno="853"> <summary> Send init a null signal. </summary> @@ -113625,7 +114193,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_sigchld" lineno="769"> +<interface name="init_sigchld" lineno="871"> <summary> Send init a SIGCHLD signal. </summary> @@ -113635,7 +114203,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stream_connect" lineno="787"> +<interface name="init_stream_connect" lineno="889"> <summary> Connect to init with a unix socket. </summary> @@ -113645,7 +114213,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_fds" lineno="847"> +<interface name="init_use_fds" lineno="949"> <summary> Inherit and use file descriptors from init. </summary> @@ -113695,7 +114263,7 @@ Domain allowed access. </param> <infoflow type="read" weight="1"/> </interface> -<interface name="init_dontaudit_use_fds" lineno="866"> +<interface name="init_dontaudit_use_fds" lineno="968"> <summary> Do not audit attempts to inherit file descriptors from init. @@ -113706,7 +114274,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_dgram_send" lineno="885"> +<interface name="init_dgram_send" lineno="987"> <summary> Send messages to init unix datagram sockets. </summary> @@ -113717,7 +114285,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_rw_inherited_stream_socket" lineno="905"> +<interface name="init_rw_inherited_stream_socket" lineno="1007"> <summary> Read and write to inherited init unix streams. </summary> @@ -113727,7 +114295,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_stream_sockets" lineno="924"> +<interface name="init_rw_stream_sockets" lineno="1026"> <summary> Allow the specified domain to read/write to init with unix domain stream sockets. @@ -113738,7 +114306,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_start_system" lineno="942"> +<interface name="init_start_system" lineno="1044"> <summary> start service (systemd). </summary> @@ -113748,7 +114316,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stop_system" lineno="960"> +<interface name="init_stop_system" lineno="1062"> <summary> stop service (systemd). </summary> @@ -113758,7 +114326,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_get_system_status" lineno="978"> +<interface name="init_get_system_status" lineno="1080"> <summary> Get all service status (systemd). </summary> @@ -113768,7 +114336,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_enable" lineno="996"> +<interface name="init_enable" lineno="1098"> <summary> Enable all systemd services (systemd). </summary> @@ -113778,7 +114346,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_disable" lineno="1014"> +<interface name="init_disable" lineno="1116"> <summary> Disable all services (systemd). </summary> @@ -113788,7 +114356,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_reload" lineno="1032"> +<interface name="init_reload" lineno="1134"> <summary> Reload all services (systemd). </summary> @@ -113798,7 +114366,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_reboot_system" lineno="1050"> +<interface name="init_reboot_system" lineno="1152"> <summary> Reboot the system (systemd). </summary> @@ -113808,7 +114376,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_shutdown_system" lineno="1068"> +<interface name="init_shutdown_system" lineno="1170"> <summary> Shutdown (halt) the system (systemd). </summary> @@ -113818,7 +114386,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_service_status" lineno="1086"> +<interface name="init_service_status" lineno="1188"> <summary> Allow specified domain to get init status </summary> @@ -113828,7 +114396,7 @@ Domain to allow access. </summary> </param> </interface> -<interface name="init_service_start" lineno="1105"> +<interface name="init_service_start" lineno="1207"> <summary> Allow specified domain to get init start </summary> @@ -113838,7 +114406,7 @@ Domain to allow access. </summary> </param> </interface> -<interface name="init_dbus_chat" lineno="1125"> +<interface name="init_dbus_chat" lineno="1227"> <summary> Send and receive messages from systemd over dbus. @@ -113849,7 +114417,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_var_lib_links" lineno="1145"> +<interface name="init_read_var_lib_links" lineno="1247"> <summary> read/follow symlinks under /var/lib/systemd/ </summary> @@ -113859,7 +114427,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_list_var_lib_dirs" lineno="1164"> +<interface name="init_list_var_lib_dirs" lineno="1266"> <summary> List /var/lib/systemd/ dir </summary> @@ -113869,7 +114437,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_relabel_var_lib_dirs" lineno="1182"> +<interface name="init_relabel_var_lib_dirs" lineno="1284"> <summary> Relabel dirs in /var/lib/systemd/. </summary> @@ -113879,7 +114447,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_var_lib_files" lineno="1200"> +<interface name="init_manage_var_lib_files" lineno="1302"> <summary> Manage files in /var/lib/systemd/. </summary> @@ -113889,7 +114457,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_var_lib_filetrans" lineno="1235"> +<interface name="init_var_lib_filetrans" lineno="1337"> <summary> Create files in /var/lib/systemd with an automatic type transition. @@ -113915,7 +114483,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="init_search_pids" lineno="1254"> +<interface name="init_search_pids" lineno="1356"> <summary> Allow search directory in the /run/systemd directory. </summary> @@ -113925,7 +114493,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_list_pids" lineno="1272"> +<interface name="init_list_pids" lineno="1374"> <summary> Allow listing of the /run/systemd directory. </summary> @@ -113935,7 +114503,48 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_pid_filetrans" lineno="1306"> +<interface name="init_manage_pid_symlinks" lineno="1393"> +<summary> +Create symbolic links in the /run/systemd directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_create_pid_files" lineno="1411"> +<summary> +Create files in the /run/systemd directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_write_pid_files" lineno="1429"> +<summary> +Write files in the /run/systemd directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_manage_pid_dirs" lineno="1448"> +<summary> +Create, read, write, and delete +directories in the /run/systemd directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_pid_filetrans" lineno="1481"> <summary> Create files in an init PID directory. </summary> @@ -113960,7 +114569,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="init_getattr_initctl" lineno="1325"> +<interface name="init_getattr_initctl" lineno="1500"> <summary> Get the attributes of initctl. </summary> @@ -113970,7 +114579,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_getattr_initctl" lineno="1346"> +<interface name="init_dontaudit_getattr_initctl" lineno="1521"> <summary> Do not audit attempts to get the attributes of initctl. @@ -113981,7 +114590,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_write_initctl" lineno="1364"> +<interface name="init_write_initctl" lineno="1539"> <summary> Write to initctl. </summary> @@ -113991,7 +114600,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_telinit" lineno="1385"> +<interface name="init_telinit" lineno="1560"> <summary> Use telinit (Read and write initctl). </summary> @@ -114002,7 +114611,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_rw_initctl" lineno="1418"> +<interface name="init_rw_initctl" lineno="1593"> <summary> Read and write initctl. </summary> @@ -114012,7 +114621,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_rw_initctl" lineno="1439"> +<interface name="init_dontaudit_rw_initctl" lineno="1614"> <summary> Do not audit attempts to read and write initctl. @@ -114023,7 +114632,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_script_file_entry_type" lineno="1458"> +<interface name="init_script_file_entry_type" lineno="1633"> <summary> Make init scripts an entry point for the specified domain. @@ -114034,7 +114643,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_spec_domtrans_script" lineno="1481"> +<interface name="init_spec_domtrans_script" lineno="1656"> <summary> Execute init scripts with a specified domain transition. </summary> @@ -114044,7 +114653,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_domtrans_script" lineno="1508"> +<interface name="init_domtrans_script" lineno="1683"> <summary> Execute init scripts with an automatic domain transition. </summary> @@ -114054,7 +114663,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_domtrans_labeled_script" lineno="1543"> +<interface name="init_domtrans_labeled_script" lineno="1718"> <summary> Execute labelled init scripts with an automatic domain transition. </summary> @@ -114064,7 +114673,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_script_file_domtrans" lineno="1589"> +<interface name="init_script_file_domtrans" lineno="1764"> <summary> Execute a init script in a specified domain. </summary> @@ -114089,7 +114698,7 @@ Domain to transition to. </summary> </param> </interface> -<interface name="init_kill_scripts" lineno="1608"> +<interface name="init_kill_scripts" lineno="1783"> <summary> Send a kill signal to init scripts. </summary> @@ -114099,7 +114708,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_script_service" lineno="1626"> +<interface name="init_manage_script_service" lineno="1801"> <summary> Allow manage service for initrc_exec_t scripts </summary> @@ -114109,7 +114718,7 @@ Target domain </summary> </param> </interface> -<interface name="init_labeled_script_domtrans" lineno="1651"> +<interface name="init_labeled_script_domtrans" lineno="1826"> <summary> Transition to the init script domain on a specified labeled init script. @@ -114125,7 +114734,7 @@ Labeled init script file. </summary> </param> </interface> -<interface name="init_all_labeled_script_domtrans" lineno="1673"> +<interface name="init_all_labeled_script_domtrans" lineno="1848"> <summary> Transition to the init script domain for all labeled init script types @@ -114136,7 +114745,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_get_script_status" lineno="1691"> +<interface name="init_get_script_status" lineno="1866"> <summary> Allow getting service status of initrc_exec_t scripts </summary> @@ -114146,7 +114755,7 @@ Target domain </summary> </param> </interface> -<interface name="init_startstop_service" lineno="1731"> +<interface name="init_startstop_service" lineno="1906"> <summary> Allow the role to start and stop labeled services. @@ -114177,7 +114786,7 @@ Systemd unit file type. </summary> </param> </interface> -<interface name="init_run_daemon" lineno="1784"> +<interface name="init_run_daemon" lineno="1960"> <summary> Start and stop daemon programs directly. </summary> @@ -114199,7 +114808,7 @@ The role to be performing this action. </summary> </param> </interface> -<interface name="init_startstop_all_script_services" lineno="1806"> +<interface name="init_startstop_all_script_services" lineno="1982"> <summary> Start and stop init_script_file_type services </summary> @@ -114209,7 +114818,7 @@ domain that can start and stop the services </summary> </param> </interface> -<interface name="init_read_state" lineno="1825"> +<interface name="init_read_state" lineno="2001"> <summary> Read the process state (/proc/pid) of init. </summary> @@ -114219,7 +114828,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_read_state" lineno="1845"> +<interface name="init_dontaudit_read_state" lineno="2021"> <summary> Dontaudit read the process state (/proc/pid) of init. </summary> @@ -114229,7 +114838,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_ptrace" lineno="1866"> +<interface name="init_ptrace" lineno="2042"> <summary> Ptrace init </summary> @@ -114240,7 +114849,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_getattr" lineno="1885"> +<interface name="init_getattr" lineno="2061"> <summary> get init process stats </summary> @@ -114251,7 +114860,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_read_script_pipes" lineno="1903"> +<interface name="init_read_script_pipes" lineno="2079"> <summary> Read an init script unnamed pipe. </summary> @@ -114261,7 +114870,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_write_script_pipes" lineno="1921"> +<interface name="init_write_script_pipes" lineno="2097"> <summary> Write an init script unnamed pipe. </summary> @@ -114271,7 +114880,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getattr_script_files" lineno="1939"> +<interface name="init_getattr_script_files" lineno="2115"> <summary> Get the attribute of init script entrypoint files. </summary> @@ -114281,7 +114890,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_files" lineno="1958"> +<interface name="init_read_script_files" lineno="2134"> <summary> Read init scripts. </summary> @@ -114291,7 +114900,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_exec_script_files" lineno="1977"> +<interface name="init_exec_script_files" lineno="2153"> <summary> Execute init scripts in the caller domain. </summary> @@ -114301,7 +114910,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getattr_all_script_files" lineno="1996"> +<interface name="init_getattr_all_script_files" lineno="2172"> <summary> Get the attribute of all init script entrypoint files. </summary> @@ -114311,7 +114920,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_all_script_files" lineno="2015"> +<interface name="init_read_all_script_files" lineno="2191"> <summary> Read all init script files. </summary> @@ -114321,7 +114930,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_read_all_script_files" lineno="2039"> +<interface name="init_dontaudit_read_all_script_files" lineno="2215"> <summary> Dontaudit read all init script files. </summary> @@ -114331,7 +114940,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_exec_all_script_files" lineno="2057"> +<interface name="init_exec_all_script_files" lineno="2233"> <summary> Execute all init scripts in the caller domain. </summary> @@ -114341,7 +114950,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_state" lineno="2076"> +<interface name="init_read_script_state" lineno="2252"> <summary> Read the process state (/proc/pid) of the init scripts. </summary> @@ -114351,7 +114960,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_script_fds" lineno="2095"> +<interface name="init_use_script_fds" lineno="2271"> <summary> Inherit and use init script file descriptors. </summary> @@ -114361,7 +114970,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_use_script_fds" lineno="2114"> +<interface name="init_dontaudit_use_script_fds" lineno="2290"> <summary> Do not audit attempts to inherit init script file descriptors. @@ -114372,7 +114981,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_search_script_keys" lineno="2132"> +<interface name="init_search_script_keys" lineno="2308"> <summary> Search init script keys. </summary> @@ -114382,7 +114991,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getpgid_script" lineno="2150"> +<interface name="init_getpgid_script" lineno="2326"> <summary> Get the process group ID of init scripts. </summary> @@ -114392,7 +115001,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_sigchld_script" lineno="2168"> +<interface name="init_sigchld_script" lineno="2344"> <summary> Send SIGCHLD signals to init scripts. </summary> @@ -114402,7 +115011,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signal_script" lineno="2186"> +<interface name="init_signal_script" lineno="2362"> <summary> Send generic signals to init scripts. </summary> @@ -114412,7 +115021,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signull_script" lineno="2204"> +<interface name="init_signull_script" lineno="2380"> <summary> Send null signals to init scripts. </summary> @@ -114422,7 +115031,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_script_pipes" lineno="2222"> +<interface name="init_rw_script_pipes" lineno="2398"> <summary> Read and write init script unnamed pipes. </summary> @@ -114432,7 +115041,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stream_connect_script" lineno="2241"> +<interface name="init_stream_connect_script" lineno="2417"> <summary> Allow the specified domain to connect to init scripts with a unix socket. @@ -114443,7 +115052,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_script_stream_sockets" lineno="2260"> +<interface name="init_rw_script_stream_sockets" lineno="2436"> <summary> Allow the specified domain to read/write to init scripts with a unix domain stream sockets. @@ -114454,7 +115063,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_stream_connect_script" lineno="2279"> +<interface name="init_dontaudit_stream_connect_script" lineno="2455"> <summary> Dont audit the specified domain connecting to init scripts with a unix domain stream socket. @@ -114465,7 +115074,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_dbus_send_script" lineno="2296"> +<interface name="init_dbus_send_script" lineno="2472"> <summary> Send messages to init scripts over dbus. </summary> @@ -114475,7 +115084,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dbus_chat_script" lineno="2316"> +<interface name="init_dbus_chat_script" lineno="2492"> <summary> Send and receive messages from init scripts over dbus. @@ -114486,7 +115095,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_script_ptys" lineno="2345"> +<interface name="init_use_script_ptys" lineno="2521"> <summary> Read and write the init script pty. </summary> @@ -114505,7 +115114,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_inherited_script_ptys" lineno="2364"> +<interface name="init_use_inherited_script_ptys" lineno="2540"> <summary> Read and write inherited init script ptys. </summary> @@ -114515,7 +115124,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_use_script_ptys" lineno="2386"> +<interface name="init_dontaudit_use_script_ptys" lineno="2562"> <summary> Do not audit attempts to read and write the init script pty. @@ -114526,7 +115135,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_getattr_script_status_files" lineno="2405"> +<interface name="init_getattr_script_status_files" lineno="2581"> <summary> Get the attributes of init script status files. @@ -114537,7 +115146,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_read_script_status_files" lineno="2424"> +<interface name="init_dontaudit_read_script_status_files" lineno="2600"> <summary> Do not audit attempts to read init script status files. @@ -114548,7 +115157,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_search_run" lineno="2443"> +<interface name="init_search_run" lineno="2619"> <summary> Search the /run/systemd directory. </summary> @@ -114558,7 +115167,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_tmp_files" lineno="2462"> +<interface name="init_read_script_tmp_files" lineno="2638"> <summary> Read init script temporary data. </summary> @@ -114568,7 +115177,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_inherited_script_tmp_files" lineno="2481"> +<interface name="init_rw_inherited_script_tmp_files" lineno="2657"> <summary> Read and write init script inherited temporary data. </summary> @@ -114578,7 +115187,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_script_tmp_files" lineno="2499"> +<interface name="init_rw_script_tmp_files" lineno="2675"> <summary> Read and write init script temporary data. </summary> @@ -114588,7 +115197,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_script_tmp_filetrans" lineno="2534"> +<interface name="init_script_tmp_filetrans" lineno="2710"> <summary> Create files in a init script temporary data directory. @@ -114614,7 +115223,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="init_getattr_utmp" lineno="2553"> +<interface name="init_getattr_utmp" lineno="2729"> <summary> Get the attributes of init script process id files. </summary> @@ -114624,7 +115233,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_utmp" lineno="2571"> +<interface name="init_read_utmp" lineno="2747"> <summary> Read utmp. </summary> @@ -114634,7 +115243,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_write_utmp" lineno="2590"> +<interface name="init_dontaudit_write_utmp" lineno="2766"> <summary> Do not audit attempts to write utmp. </summary> @@ -114644,7 +115253,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_write_utmp" lineno="2608"> +<interface name="init_write_utmp" lineno="2784"> <summary> Write to utmp. </summary> @@ -114654,7 +115263,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_lock_utmp" lineno="2628"> +<interface name="init_dontaudit_lock_utmp" lineno="2804"> <summary> Do not audit attempts to lock init script pid files. @@ -114665,7 +115274,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_rw_utmp" lineno="2646"> +<interface name="init_rw_utmp" lineno="2822"> <summary> Read and write utmp. </summary> @@ -114675,7 +115284,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_rw_utmp" lineno="2665"> +<interface name="init_dontaudit_rw_utmp" lineno="2841"> <summary> Do not audit attempts to read and write utmp. </summary> @@ -114685,7 +115294,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_manage_utmp" lineno="2683"> +<interface name="init_manage_utmp" lineno="2859"> <summary> Create, read, write, and delete utmp. </summary> @@ -114695,7 +115304,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_relabel_utmp" lineno="2702"> +<interface name="init_relabel_utmp" lineno="2878"> <summary> Relabel utmp. </summary> @@ -114705,7 +115314,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_pid_filetrans_utmp" lineno="2721"> +<interface name="init_pid_filetrans_utmp" lineno="2897"> <summary> Create files in /var/run with the utmp file type. @@ -114716,7 +115325,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_runtime_filetrans_utmp" lineno="2737"> +<interface name="init_runtime_filetrans_utmp" lineno="2913"> <summary> Create files in /var/run with the utmp file type. @@ -114727,7 +115336,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_create_pid_dirs" lineno="2755"> +<interface name="init_create_pid_dirs" lineno="2931"> <summary> Create a directory in the /run/systemd directory. </summary> @@ -114737,7 +115346,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_create_runtime_dirs" lineno="2770"> +<interface name="init_create_runtime_dirs" lineno="2946"> <summary> Create a directory in the /run/systemd directory. </summary> @@ -114747,9 +115356,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rename_pid_files" lineno="2789"> +<interface name="init_rename_pid_files" lineno="2965"> <summary> -Rename init_var_run_t files +Rename init_runtime_t files </summary> <param name="domain"> <summary> @@ -114757,9 +115366,9 @@ domain </summary> </param> </interface> -<interface name="init_rename_runtime_files" lineno="2804"> +<interface name="init_rename_runtime_files" lineno="2980"> <summary> -Rename init_var_run_t files +Rename init_runtime_t files </summary> <param name="domain"> <summary> @@ -114767,9 +115376,9 @@ domain </summary> </param> </interface> -<interface name="init_delete_pid_files" lineno="2822"> +<interface name="init_delete_pid_files" lineno="2998"> <summary> -Delete init_var_run_t files +Delete init_runtime_t files </summary> <param name="domain"> <summary> @@ -114777,9 +115386,9 @@ domain </summary> </param> </interface> -<interface name="init_delete_runtime_files" lineno="2837"> +<interface name="init_delete_runtime_files" lineno="3013"> <summary> -Delete init_var_run_t files +Delete init_runtime_t files </summary> <param name="domain"> <summary> @@ -114787,7 +115396,7 @@ domain </summary> </param> </interface> -<interface name="init_write_pid_socket" lineno="2856"> +<interface name="init_write_pid_socket" lineno="3032"> <summary> Allow the specified domain to write to init sock file. @@ -114798,7 +115407,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_write_runtime_socket" lineno="2872"> +<interface name="init_write_runtime_socket" lineno="3048"> <summary> Allow the specified domain to write to init sock file. @@ -114809,7 +115418,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_pid_pipes" lineno="2890"> +<interface name="init_read_pid_pipes" lineno="3066"> <summary> Read init unnamed pipes. </summary> @@ -114819,7 +115428,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_runtime_pipes" lineno="2905"> +<interface name="init_read_runtime_pipes" lineno="3081"> <summary> Read init unnamed pipes. </summary> @@ -114829,7 +115438,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_runtime_symlinks" lineno="2923"> +<interface name="init_read_runtime_symlinks" lineno="3099"> <summary> read systemd unit symlinks (usually under /run/systemd/units/) </summary> @@ -114839,7 +115448,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_tcp_recvfrom_all_daemons" lineno="2941"> +<interface name="init_tcp_recvfrom_all_daemons" lineno="3117"> <summary> Allow the specified domain to connect to daemon with a tcp socket </summary> @@ -114849,7 +115458,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_udp_recvfrom_all_daemons" lineno="2959"> +<interface name="init_udp_recvfrom_all_daemons" lineno="3135"> <summary> Allow the specified domain to connect to daemon with a udp socket </summary> @@ -114859,7 +115468,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_status_files" lineno="2978"> +<interface name="init_read_script_status_files" lineno="3154"> <summary> Allow reading the init script state files </summary> @@ -114869,7 +115478,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="init_relabelto_script_state" lineno="2996"> +<interface name="init_relabelto_script_state" lineno="3172"> <summary> Label to init script status files </summary> @@ -114879,7 +115488,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="init_script_readable_type" lineno="3015"> +<interface name="init_script_readable_type" lineno="3191"> <summary> Mark as a readable type for the initrc_t domain </summary> @@ -114889,7 +115498,7 @@ Type that initrc_t needs read access to </summary> </param> </interface> -<interface name="init_search_units" lineno="3033"> +<interface name="init_search_units" lineno="3209"> <summary> Search systemd unit dirs. </summary> @@ -114899,7 +115508,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_generic_units_symlinks" lineno="3058"> +<interface name="init_list_unit_dirs" lineno="3234"> +<summary> +List systemd unit dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_read_generic_units_symlinks" lineno="3254"> <summary> Read systemd unit links </summary> @@ -114909,7 +115528,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_get_generic_units_status" lineno="3076"> +<interface name="init_get_generic_units_status" lineno="3272"> <summary> Get status of generic systemd units. </summary> @@ -114919,7 +115538,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_start_generic_units" lineno="3095"> +<interface name="init_start_generic_units" lineno="3291"> <summary> Start generic systemd units. </summary> @@ -114929,7 +115548,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stop_generic_units" lineno="3114"> +<interface name="init_stop_generic_units" lineno="3310"> <summary> Stop generic systemd units. </summary> @@ -114939,7 +115558,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_reload_generic_units" lineno="3133"> +<interface name="init_reload_generic_units" lineno="3329"> <summary> Reload generic systemd units. </summary> @@ -114949,7 +115568,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_get_all_units_status" lineno="3152"> +<interface name="init_get_all_units_status" lineno="3348"> <summary> Get status of all systemd units. </summary> @@ -114959,7 +115578,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_all_units" lineno="3171"> +<interface name="init_manage_all_units" lineno="3367"> <summary> All perms on all systemd units. </summary> @@ -114969,7 +115588,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_start_all_units" lineno="3191"> +<interface name="init_start_all_units" lineno="3387"> <summary> Start all systemd units. </summary> @@ -114979,7 +115598,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stop_all_units" lineno="3210"> +<interface name="init_stop_all_units" lineno="3406"> <summary> Stop all systemd units. </summary> @@ -114989,7 +115608,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_reload_all_units" lineno="3229"> +<interface name="init_reload_all_units" lineno="3425"> <summary> Reload all systemd units. </summary> @@ -114999,7 +115618,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_admin" lineno="3248"> +<interface name="init_admin" lineno="3444"> <summary> Allow unconfined access to send instructions to init </summary> @@ -115009,7 +115628,7 @@ Target domain </summary> </param> </interface> -<interface name="init_getrlimit" lineno="3285"> +<interface name="init_getrlimit" lineno="3476"> <summary> Allow getting init_t rlimit </summary> @@ -115033,6 +115652,13 @@ Allow all daemons the ability to read/write terminals </p> </desc> </tunable> +<tunable name="init_mounton_non_security" dftval="false"> +<desc> +<p> +Enable systemd to mount on all non-security files. +</p> +</desc> +</tunable> </module> <module name="ipsec" filename="policy/modules/system/ipsec.if"> <summary>TCP/IP encryption</summary> @@ -115171,7 +115797,7 @@ Domain allowed access. </interface> <interface name="ipsec_write_pid" lineno="259"> <summary> -write the ipsec_var_run_t files. +write the ipsec_runtime_t files. </summary> <param name="domain"> <summary> @@ -115357,7 +115983,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_dontaudit_read_pids" lineno="178"> +<interface name="iptables_dontaudit_read_pids" lineno="177"> <summary> dontaudit reading iptables_runtime_t </summary> @@ -115367,7 +115993,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="iptables_startstop" lineno="196"> +<interface name="iptables_startstop" lineno="195"> <summary> Allow specified domain to start and stop iptables service </summary> @@ -115377,7 +116003,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_status" lineno="215"> +<interface name="iptables_status" lineno="214"> <summary> Allow specified domain to get status of iptables service </summary> @@ -115387,7 +116013,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_admin" lineno="242"> +<interface name="iptables_admin" lineno="241"> <summary> All of the rules required to administrate an iptables @@ -116259,7 +116885,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_relabelto_devlog_sock_files" lineno="659"> +<interface name="logging_relabelto_devlog_sock_files" lineno="663"> <summary> Allow domain to relabelto devlog sock_files </summary> @@ -116270,7 +116896,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_create_devlog" lineno="677"> +<interface name="logging_create_devlog" lineno="681"> <summary> Connect to the syslog control unix stream socket. </summary> @@ -116280,7 +116906,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_read_audit_config" lineno="698"> +<interface name="logging_read_audit_config" lineno="702"> <summary> Read the auditd configuration files. </summary> @@ -116291,7 +116917,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_dontaudit_search_audit_config" lineno="721"> +<interface name="logging_dontaudit_search_audit_config" lineno="725"> <summary> dontaudit search of auditd configuration files. </summary> @@ -116302,7 +116928,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="logging_read_syslog_config" lineno="740"> +<interface name="logging_read_syslog_config" lineno="744"> <summary> Read syslog configuration files. </summary> @@ -116313,7 +116939,17 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_delete_devlog_socket" lineno="759"> +<interface name="logging_watch_runtime_dirs" lineno="762"> +<summary> +Watch syslog runtime dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_delete_devlog_socket" lineno="781"> <summary> Delete the syslog socket files </summary> @@ -116324,7 +116960,7 @@ Domain allowed access </param> <rolecap/> </interface> -<interface name="logging_manage_pid_sockets" lineno="777"> +<interface name="logging_manage_pid_sockets" lineno="799"> <summary> Create, read, write, and delete syslog PID sockets. </summary> @@ -116334,7 +116970,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_search_logs" lineno="798"> +<interface name="logging_search_logs" lineno="820"> <summary> Allows the domain to open a file in the log directory, but does not allow the listing @@ -116346,7 +116982,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_dontaudit_search_logs" lineno="818"> +<interface name="logging_dontaudit_search_logs" lineno="840"> <summary> Do not audit attempts to search the var log directory. </summary> @@ -116356,7 +116992,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="logging_list_logs" lineno="836"> +<interface name="logging_list_logs" lineno="858"> <summary> List the contents of the generic log directory (/var/log). </summary> @@ -116366,7 +117002,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_rw_generic_log_dirs" lineno="856"> +<interface name="logging_rw_generic_log_dirs" lineno="878"> <summary> Read and write the generic log directory (/var/log). </summary> @@ -116376,7 +117012,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_search_all_logs" lineno="877"> +<interface name="logging_search_all_logs" lineno="899"> <summary> Search through all log dirs. </summary> @@ -116387,7 +117023,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_setattr_all_log_dirs" lineno="896"> +<interface name="logging_setattr_all_log_dirs" lineno="918"> <summary> Set attributes on all log dirs. </summary> @@ -116398,7 +117034,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_dontaudit_getattr_all_logs" lineno="915"> +<interface name="logging_dontaudit_getattr_all_logs" lineno="937"> <summary> Do not audit attempts to get the attributes of any log files. @@ -116409,7 +117045,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="logging_getattr_all_logs" lineno="933"> +<interface name="logging_getattr_all_logs" lineno="955"> <summary> Read the atttributes of any log file </summary> @@ -116419,7 +117055,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="logging_append_all_logs" lineno="951"> +<interface name="logging_append_all_logs" lineno="973"> <summary> Append to all log files. </summary> @@ -116429,7 +117065,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_append_all_inherited_logs" lineno="972"> +<interface name="logging_append_all_inherited_logs" lineno="994"> <summary> Append to all log files. </summary> @@ -116439,7 +117075,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_read_all_logs" lineno="991"> +<interface name="logging_read_all_logs" lineno="1013"> <summary> Read all log files. </summary> @@ -116450,7 +117086,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_exec_all_logs" lineno="1013"> +<interface name="logging_exec_all_logs" lineno="1035"> <summary> Execute all log files in the caller domain. </summary> @@ -116460,7 +117096,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_rw_all_logs" lineno="1033"> +<interface name="logging_rw_all_logs" lineno="1055"> <summary> read/write to all log files. </summary> @@ -116470,7 +117106,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_manage_all_logs" lineno="1053"> +<interface name="logging_manage_all_logs" lineno="1075"> <summary> Create, read, write, and delete all log files. </summary> @@ -116481,7 +117117,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_manage_generic_log_dirs" lineno="1074"> +<interface name="logging_manage_generic_log_dirs" lineno="1096"> <summary> Create, read, write, and delete generic log directories. </summary> @@ -116492,7 +117128,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_relabel_generic_log_dirs" lineno="1094"> +<interface name="logging_relabel_generic_log_dirs" lineno="1116"> <summary> Relabel from and to generic log directory type. </summary> @@ -116503,7 +117139,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_read_generic_logs" lineno="1114"> +<interface name="logging_read_generic_logs" lineno="1136"> <summary> Read generic log files. </summary> @@ -116514,7 +117150,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_mmap_generic_logs" lineno="1135"> +<interface name="logging_mmap_generic_logs" lineno="1157"> <summary> Map generic log files. </summary> @@ -116525,7 +117161,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_write_generic_logs" lineno="1153"> +<interface name="logging_write_generic_logs" lineno="1175"> <summary> Write generic log files. </summary> @@ -116535,7 +117171,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_dontaudit_write_generic_logs" lineno="1174"> +<interface name="logging_dontaudit_write_generic_logs" lineno="1196"> <summary> Dontaudit Write generic log files. </summary> @@ -116545,7 +117181,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="logging_rw_generic_logs" lineno="1192"> +<interface name="logging_rw_generic_logs" lineno="1214"> <summary> Read and write generic log files. </summary> @@ -116555,7 +117191,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_manage_generic_logs" lineno="1215"> +<interface name="logging_manage_generic_logs" lineno="1237"> <summary> Create, read, write, and delete generic log files. @@ -116567,7 +117203,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_admin_audit" lineno="1241"> +<interface name="logging_admin_audit" lineno="1263"> <summary> All of the rules required to administrate the audit environment @@ -116584,7 +117220,7 @@ User role allowed access. </param> <rolecap/> </interface> -<interface name="logging_admin_syslog" lineno="1285"> +<interface name="logging_admin_syslog" lineno="1307"> <summary> All of the rules required to administrate the syslog environment @@ -116601,7 +117237,7 @@ User role allowed access. </param> <rolecap/> </interface> -<interface name="logging_admin" lineno="1341"> +<interface name="logging_admin" lineno="1363"> <summary> All of the rules required to administrate the logging environment @@ -116618,7 +117254,7 @@ User role allowed access. </param> <rolecap/> </interface> -<interface name="logging_syslog_managed_log_file" lineno="1364"> +<interface name="logging_syslog_managed_log_file" lineno="1386"> <summary> Mark the type as a syslog managed log file and introduce the proper file transition when @@ -116636,7 +117272,7 @@ Name to use for the file </summary> </param> </interface> -<interface name="logging_syslog_managed_log_dir" lineno="1403"> +<interface name="logging_syslog_managed_log_dir" lineno="1425"> <summary> Mark the type as a syslog managed log dir and introduce the proper file transition when @@ -116663,7 +117299,7 @@ Name to use for the directory </summary> </param> </interface> -<interface name="logging_mmap_journal" lineno="1425"> +<interface name="logging_mmap_journal" lineno="1447"> <summary> Map files in /run/log/journal/ directory. </summary> @@ -117134,7 +117770,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_search_man_pages" lineno="603"> +<interface name="miscfiles_watch_localization" lineno="603"> +<summary> +Watch time localization info +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_search_man_pages" lineno="621"> <summary> Search man pages. </summary> @@ -117144,7 +117790,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_dontaudit_search_man_pages" lineno="622"> +<interface name="miscfiles_dontaudit_search_man_pages" lineno="640"> <summary> Do not audit attempts to search man pages. </summary> @@ -117154,7 +117800,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="miscfiles_read_man_pages" lineno="641"> +<interface name="miscfiles_read_man_pages" lineno="659"> <summary> Read man pages </summary> @@ -117165,7 +117811,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_delete_man_pages" lineno="663"> +<interface name="miscfiles_delete_man_pages" lineno="681"> <summary> Delete man pages </summary> @@ -117175,7 +117821,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_manage_man_pages" lineno="685"> +<interface name="miscfiles_manage_man_pages" lineno="703"> <summary> Create, read, write, and delete man pages </summary> @@ -117185,7 +117831,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_read_man_cache" lineno="706"> +<interface name="miscfiles_read_man_cache" lineno="724"> <summary> Read man cache content. </summary> @@ -117195,7 +117841,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_map_man_cache" lineno="727"> +<interface name="miscfiles_map_man_cache" lineno="745"> <summary> Map man cache content. </summary> @@ -117205,7 +117851,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_manage_man_cache" lineno="746"> +<interface name="miscfiles_manage_man_cache" lineno="764"> <summary> Create, read, write, and delete man cache content. @@ -117216,7 +117862,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_relabel_man_cache" lineno="767"> +<interface name="miscfiles_relabel_man_cache" lineno="785"> <summary> Relabel from and to man cache. </summary> @@ -117226,7 +117872,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_read_public_files" lineno="788"> +<interface name="miscfiles_read_public_files" lineno="806"> <summary> Read public files used for file transfer services. @@ -117238,7 +117884,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_manage_public_files" lineno="810"> +<interface name="miscfiles_manage_public_files" lineno="828"> <summary> Create, read, write, and delete public files and directories used for file transfer services. @@ -117250,7 +117896,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_read_tetex_data" lineno="830"> +<interface name="miscfiles_read_tetex_data" lineno="848"> <summary> Read TeX data </summary> @@ -117260,7 +117906,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_exec_tetex_data" lineno="854"> +<interface name="miscfiles_exec_tetex_data" lineno="872"> <summary> Execute TeX data programs in the caller domain. </summary> @@ -117270,7 +117916,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_domain_entry_test_files" lineno="879"> +<interface name="miscfiles_domain_entry_test_files" lineno="896"> <summary> Let test files be an entry point for a specified domain. @@ -117281,7 +117927,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_read_test_files" lineno="897"> +<interface name="miscfiles_read_test_files" lineno="914"> <summary> Read test files and directories. </summary> @@ -117291,7 +117937,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_exec_test_files" lineno="916"> +<interface name="miscfiles_exec_test_files" lineno="933"> <summary> Execute test files. </summary> @@ -117301,7 +117947,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_etc_filetrans_localization" lineno="936"> +<interface name="miscfiles_etc_filetrans_localization" lineno="953"> <summary> Create files in etc directories with localization file type. @@ -117312,7 +117958,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_manage_localization" lineno="956"> +<interface name="miscfiles_manage_localization" lineno="973"> <summary> Create, read, write, and delete localization </summary> @@ -117589,7 +118235,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="mount_run" lineno="39"> +<interface name="mount_run" lineno="40"> <summary> Execute mount in the mount domain, and allow the specified role the mount domain, @@ -117607,7 +118253,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="mount_exec" lineno="58"> +<interface name="mount_exec" lineno="59"> <summary> Execute mount in the caller domain. </summary> @@ -117617,7 +118263,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_signal" lineno="80"> +<interface name="mount_signal" lineno="82"> <summary> Send a generic signal to mount. </summary> @@ -117627,7 +118273,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_use_fds" lineno="98"> +<interface name="mount_use_fds" lineno="100"> <summary> Use file descriptors for mount. </summary> @@ -117637,7 +118283,7 @@ The type of the process performing this action. </summary> </param> </interface> -<interface name="mount_domtrans_unconfined" lineno="116"> +<interface name="mount_domtrans_unconfined" lineno="118"> <summary> Execute mount in the unconfined mount domain. </summary> @@ -117647,7 +118293,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="mount_run_unconfined" lineno="142"> +<interface name="mount_run_unconfined" lineno="144"> <summary> Execute mount in the unconfined mount domain, and allow the specified role the unconfined mount domain, @@ -117665,7 +118311,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="mount_read_loopback_files" lineno="161"> +<interface name="mount_read_loopback_files" lineno="163"> <summary> Read loopback filesystem image files. </summary> @@ -117675,7 +118321,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_rw_loopback_files" lineno="179"> +<interface name="mount_rw_loopback_files" lineno="181"> <summary> Read and write loopback filesystem image files. </summary> @@ -117685,9 +118331,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_getattr_runtime_files" lineno="197"> +<interface name="mount_list_runtime" lineno="199"> <summary> -Getattr on mount_var_run_t files +List mount runtime files. </summary> <param name="domain"> <summary> @@ -117695,7 +118341,27 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_rw_runtime_files" lineno="215"> +<interface name="mount_watch_runtime_dirs" lineno="217"> +<summary> +Watch mount runtime dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mount_getattr_runtime_files" lineno="235"> +<summary> +Getattr on mount_runtime_t files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mount_rw_runtime_files" lineno="253"> <summary> Read and write mount runtime files. </summary> @@ -117705,7 +118371,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_rw_pipes" lineno="235"> +<interface name="mount_rw_pipes" lineno="273"> <summary> Read and write mount unnamed pipes </summary> @@ -118355,7 +119021,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_manage_default_contexts" lineno="753"> +<interface name="seutil_manage_default_contexts" lineno="752"> <summary> Create, read, write, and delete the default_contexts files. </summary> @@ -118365,7 +119031,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_read_file_contexts" lineno="774"> +<interface name="seutil_read_file_contexts" lineno="773"> <summary> Read the file_contexts files. </summary> @@ -118376,7 +119042,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_dontaudit_read_file_contexts" lineno="796"> +<interface name="seutil_dontaudit_read_file_contexts" lineno="795"> <summary> Do not audit attempts to read the file_contexts files. </summary> @@ -118387,7 +119053,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="seutil_rw_file_contexts" lineno="816"> +<interface name="seutil_rw_file_contexts" lineno="815"> <summary> Read and write the file_contexts files. </summary> @@ -118397,7 +119063,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_manage_file_contexts" lineno="838"> +<interface name="seutil_manage_file_contexts" lineno="837"> <summary> Create, read, write, and delete the file_contexts files. </summary> @@ -118408,7 +119074,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_read_bin_policy" lineno="859"> +<interface name="seutil_read_bin_policy" lineno="858"> <summary> Read the SELinux binary policy. </summary> @@ -118418,7 +119084,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_create_bin_policy" lineno="886"> +<interface name="seutil_create_bin_policy" lineno="885"> <summary> Create the SELinux binary policy. </summary> @@ -118428,7 +119094,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_relabelto_bin_policy" lineno="909"> +<interface name="seutil_relabelto_bin_policy" lineno="908"> <summary> Allow the caller to relabel a file to the binary policy type. </summary> @@ -118438,7 +119104,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_manage_bin_policy" lineno="930"> +<interface name="seutil_manage_bin_policy" lineno="929"> <summary> Create, read, write, and delete the SELinux binary policy. @@ -118449,7 +119115,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_read_src_policy" lineno="952"> +<interface name="seutil_read_src_policy" lineno="951"> <summary> Read SELinux policy source files. </summary> @@ -118459,7 +119125,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_manage_src_policy" lineno="974"> +<interface name="seutil_manage_src_policy" lineno="973"> <summary> Create, read, write, and delete SELinux policy source files. @@ -118471,7 +119137,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_domtrans_semanage" lineno="995"> +<interface name="seutil_domtrans_semanage" lineno="994"> <summary> Execute a domain transition to run semanage. </summary> @@ -118481,7 +119147,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="seutil_run_semanage" lineno="1023"> +<interface name="seutil_run_semanage" lineno="1022"> <summary> Execute semanage in the semanage domain, and allow the specified role the semanage domain, @@ -118499,7 +119165,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="seutil_read_module_store" lineno="1042"> +<interface name="seutil_read_module_store" lineno="1041"> <summary> Read the semanage module store. </summary> @@ -118509,7 +119175,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_manage_module_store" lineno="1067"> +<interface name="seutil_manage_module_store" lineno="1066"> <summary> Full management of the semanage module store. @@ -118520,7 +119186,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_get_semanage_read_lock" lineno="1091"> +<interface name="seutil_get_semanage_read_lock" lineno="1090"> <summary> Get read lock on module store </summary> @@ -118530,7 +119196,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_get_semanage_trans_lock" lineno="1110"> +<interface name="seutil_get_semanage_trans_lock" lineno="1109"> <summary> Get trans lock on module store </summary> @@ -118540,7 +119206,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_libselinux_linked" lineno="1138"> +<interface name="seutil_libselinux_linked" lineno="1137"> <summary> SELinux-enabled program access for libselinux-linked programs. @@ -118559,7 +119225,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_dontaudit_libselinux_linked" lineno="1168"> +<interface name="seutil_dontaudit_libselinux_linked" lineno="1167"> <summary> Do not audit SELinux-enabled program access for libselinux-linked programs. @@ -119043,7 +119709,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_use_ldap" lineno="785"> +<interface name="sysnet_use_ldap" lineno="780"> <summary> Connect and use a LDAP server. </summary> @@ -119053,7 +119719,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_use_portmap" lineno="817"> +<interface name="sysnet_use_portmap" lineno="808"> <summary> Connect and use remote port mappers. </summary> @@ -119063,7 +119729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_dhcpc_script_entry" lineno="857"> +<interface name="sysnet_dhcpc_script_entry" lineno="843"> <summary> Make the specified program domain accessable from the DHCP hooks/scripts. @@ -119082,7 +119748,27 @@ The type of the file used as an entrypoint to this domain. </module> <module name="systemd" filename="policy/modules/system/systemd.if"> <summary>Systemd components (not PID 1)</summary> -<interface name="systemd_log_parse_environment" lineno="14"> +<template name="systemd_role_template" lineno="23"> +<summary> +Template for systemd --user per-role domains. +</summary> +<param name="prefix"> +<summary> +Prefix for generated types +</summary> +</param> +<param name="role"> +<summary> +The user role. +</summary> +</param> +<param name="userdomain"> +<summary> +The user domain for the role. +</summary> +</param> +</template> +<interface name="systemd_log_parse_environment" lineno="74"> <summary> Make the specified type usable as an log parse environment type. @@ -119093,7 +119779,30 @@ Type to be used as a log parse environment type. </summary> </param> </interface> -<interface name="systemd_read_hwdb" lineno="32"> +<interface name="systemd_use_nss" lineno="94"> +<summary> +Allow domain to use systemd's Name Service Switch (NSS) module. +This module provides UNIX user and group name resolution for dynamic users +and groups allocated through the DynamicUser= option in systemd unit files +</summary> +<param name="domain"> +<summary> +Domain allowed access +</summary> +</param> +</interface> +<interface name="systemd_PrivateDevices" lineno="121"> +<summary> +Allow domain to be used as a systemd service with a unit +that uses PrivateDevices=yes in section [Service]. +</summary> +<param name="domain"> +<summary> +Domain allowed access +</summary> +</param> +</interface> +<interface name="systemd_read_hwdb" lineno="138"> <summary> Allow domain to read udev hwdb file </summary> @@ -119103,7 +119812,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_map_hwdb" lineno="50"> +<interface name="systemd_map_hwdb" lineno="156"> <summary> Allow domain to map udev hwdb file </summary> @@ -119113,7 +119822,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_read_logind_pids" lineno="68"> +<interface name="systemd_read_logind_pids" lineno="174"> <summary> Read systemd_login PID files. </summary> @@ -119123,7 +119832,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_logind_pid_pipes" lineno="88"> +<interface name="systemd_manage_logind_pid_pipes" lineno="194"> <summary> Manage systemd_login PID pipes. </summary> @@ -119133,7 +119842,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_logind_pid_pipes" lineno="107"> +<interface name="systemd_write_logind_pid_pipes" lineno="213"> <summary> Write systemd_login named pipe. </summary> @@ -119143,7 +119852,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_use_logind_fds" lineno="128"> +<interface name="systemd_use_logind_fds" lineno="234"> <summary> Use inherited systemd logind file descriptors. @@ -119154,7 +119863,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_logind_sessions_files" lineno="146"> +<interface name="systemd_read_logind_sessions_files" lineno="252"> <summary> Read logind sessions files. </summary> @@ -119164,7 +119873,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="167"> +<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="273"> <summary> Write inherited logind sessions pipes. </summary> @@ -119174,7 +119883,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="187"> +<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="293"> <summary> Write inherited logind inhibit pipes. </summary> @@ -119184,7 +119893,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_dbus_chat_logind" lineno="208"> +<interface name="systemd_dbus_chat_logind" lineno="314"> <summary> Send and receive messages from systemd logind over dbus. @@ -119195,7 +119904,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_kmod_files" lineno="229"> +<interface name="systemd_write_kmod_files" lineno="335"> <summary> Allow process to write to systemd_kmod_conf_t. </summary> @@ -119206,7 +119915,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="systemd_status_logind" lineno="243"> +<interface name="systemd_status_logind" lineno="349"> <summary> Get the system status information from systemd_login </summary> @@ -119216,7 +119925,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_signull_logind" lineno="262"> +<interface name="systemd_signull_logind" lineno="368"> <summary> Send systemd_login a null signal. </summary> @@ -119226,7 +119935,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_machines" lineno="280"> +<interface name="systemd_read_machines" lineno="386"> <summary> Allow reading /run/systemd/machines </summary> @@ -119236,7 +119945,7 @@ Domain that can access the machines files </summary> </param> </interface> -<interface name="systemd_dbus_chat_hostnamed" lineno="300"> +<interface name="systemd_dbus_chat_hostnamed" lineno="406"> <summary> Send and receive messages from systemd hostnamed over dbus. @@ -119247,7 +119956,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_use_passwd_agent_fds" lineno="320"> +<interface name="systemd_use_passwd_agent_fds" lineno="426"> <summary> allow systemd_passwd_agent to inherit fds </summary> @@ -119257,7 +119966,7 @@ Domain that owns the fds </summary> </param> </interface> -<interface name="systemd_use_passwd_agent" lineno="339"> +<interface name="systemd_use_passwd_agent" lineno="445"> <summary> Allow a systemd_passwd_agent_t process to interact with a daemon that needs a password from the sysadmin. @@ -119268,9 +119977,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="363"> +<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="469"> <summary> -Transition to systemd_passwd_var_run_t when creating dirs +Transition to systemd_passwd_runtime_t when creating dirs </summary> <param name="domain"> <summary> @@ -119278,7 +119987,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_passwd_runtime_symlinks" lineno="382"> +<interface name="systemd_manage_passwd_runtime_symlinks" lineno="488"> <summary> Allow to domain to create systemd-passwd symlink </summary> @@ -119288,7 +119997,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_all_units" lineno="400"> +<interface name="systemd_manage_all_units" lineno="506"> <summary> manage systemd unit dirs and the files in them </summary> @@ -119298,7 +120007,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_journal_files" lineno="420"> +<interface name="systemd_read_journal_files" lineno="526"> <summary> Allow domain to read systemd_journal_t files </summary> @@ -119308,7 +120017,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_journal_files" lineno="439"> +<interface name="systemd_manage_journal_files" lineno="545"> <summary> Allow domain to create/manage systemd_journal_t files </summary> @@ -119318,7 +120027,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_journal_dirs" lineno="459"> +<interface name="systemd_relabelto_journal_dirs" lineno="565"> <summary> Relabel to systemd-journald directory type. </summary> @@ -119328,7 +120037,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_journal_files" lineno="478"> +<interface name="systemd_relabelto_journal_files" lineno="584"> <summary> Relabel to systemd-journald file type. </summary> @@ -119338,7 +120047,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_networkd_units" lineno="498"> +<interface name="systemd_read_networkd_units" lineno="604"> <summary> Allow domain to read systemd_networkd_t unit files </summary> @@ -119348,7 +120057,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_networkd_units" lineno="518"> +<interface name="systemd_manage_networkd_units" lineno="624"> <summary> Allow domain to create/manage systemd_networkd_t unit files </summary> @@ -119358,7 +120067,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_enabledisable_networkd" lineno="538"> +<interface name="systemd_enabledisable_networkd" lineno="644"> <summary> Allow specified domain to enable systemd-networkd units </summary> @@ -119368,7 +120077,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_startstop_networkd" lineno="557"> +<interface name="systemd_startstop_networkd" lineno="663"> <summary> Allow specified domain to start systemd-networkd units </summary> @@ -119378,7 +120087,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_status_networkd" lineno="576"> +<interface name="systemd_status_networkd" lineno="682"> <summary> Allow specified domain to get status of systemd-networkd </summary> @@ -119388,7 +120097,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="595"> +<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="701"> <summary> Relabel systemd_networkd tun socket. </summary> @@ -119398,7 +120107,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="613"> +<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="719"> <summary> Read/Write from systemd_networkd netlink route socket. </summary> @@ -119408,7 +120117,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_list_networkd_runtime" lineno="631"> +<interface name="systemd_list_networkd_runtime" lineno="737"> <summary> Allow domain to list dirs under /run/systemd/netif </summary> @@ -119418,7 +120127,17 @@ domain permitted the access </summary> </param> </interface> -<interface name="systemd_read_networkd_runtime" lineno="651"> +<interface name="systemd_watch_networkd_runtime_dirs" lineno="756"> +<summary> +Watch directories under /run/systemd/netif +</summary> +<param name="domain"> +<summary> +Domain permitted the access +</summary> +</param> +</interface> +<interface name="systemd_read_networkd_runtime" lineno="775"> <summary> Allow domain to read files generated by systemd_networkd </summary> @@ -119428,7 +120147,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_read_logind_state" lineno="670"> +<interface name="systemd_read_logind_state" lineno="794"> <summary> Allow systemd_logind_t to read process state for cgroup file </summary> @@ -119438,7 +120157,7 @@ Domain systemd_logind_t may access. </summary> </param> </interface> -<interface name="systemd_start_power_units" lineno="689"> +<interface name="systemd_start_power_units" lineno="813"> <summary> Allow specified domain to start power units </summary> @@ -119448,7 +120167,17 @@ Domain to not audit. </summary> </param> </interface> -<interface name="systemd_tmpfiles_conf_file" lineno="709"> +<interface name="systemd_status_power_units" lineno="832"> +<summary> +Get the system status information about power units +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_tmpfiles_conf_file" lineno="852"> <summary> Make the specified type usable for systemd tmpfiles config files. @@ -119459,7 +120188,7 @@ Type to be used for systemd tmpfiles config files. </summary> </param> </interface> -<interface name="systemd_tmpfiles_creator" lineno="730"> +<interface name="systemd_tmpfiles_creator" lineno="873"> <summary> Allow the specified domain to create the tmpfiles config directory with @@ -119471,7 +120200,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_tmpfiles_conf_filetrans" lineno="766"> +<interface name="systemd_tmpfiles_conf_filetrans" lineno="909"> <summary> Create an object in the systemd tmpfiles config directory, with a private type @@ -119498,7 +120227,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="systemd_list_tmpfiles_conf" lineno="785"> +<interface name="systemd_list_tmpfiles_conf" lineno="928"> <summary> Allow domain to list systemd tmpfiles config directory </summary> @@ -119508,7 +120237,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="803"> +<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="946"> <summary> Allow domain to relabel to systemd tmpfiles config directory </summary> @@ -119518,7 +120247,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="821"> +<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="964"> <summary> Allow domain to relabel to systemd tmpfiles config files </summary> @@ -119528,7 +120257,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_tmpfilesd_managed" lineno="844"> +<interface name="systemd_tmpfilesd_managed" lineno="987"> <summary> Allow systemd_tmpfiles_t to manage filesystem objects </summary> @@ -119543,7 +120272,7 @@ object class to manage </summary> </param> </interface> -<interface name="systemd_dbus_chat_resolved" lineno="863"> +<interface name="systemd_dbus_chat_resolved" lineno="1006"> <summary> Send and receive messages from systemd resolved over dbus. @@ -119554,7 +120283,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_resolved_runtime" lineno="883"> +<interface name="systemd_read_resolved_runtime" lineno="1026"> <summary> Allow domain to read resolv.conf file generated by systemd_resolved </summary> @@ -119564,7 +120293,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_getattr_updated_runtime" lineno="901"> +<interface name="systemd_getattr_updated_runtime" lineno="1044"> <summary> Allow domain to getattr on .updated file (generated by systemd-update-done </summary> @@ -119574,6 +120303,36 @@ domain allowed access </summary> </param> </interface> +<interface name="systemd_search_all_user_keys" lineno="1062"> +<summary> +Search keys for the all systemd --user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_create_all_user_keys" lineno="1080"> +<summary> +Create keys for the all systemd --user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_write_all_user_keys" lineno="1098"> +<summary> +Write keys for the all systemd --user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> <tunable name="systemd_tmpfiles_manage_all" dftval="false"> <desc> <p> @@ -119589,10 +120348,19 @@ as parent environment </p> </desc> </tunable> +<tunable name="systemd_logind_get_bootloader" dftval="false"> +<desc> +<p> +Allow systemd-logind to interact with the bootloader (read which one is +installed on fixed disks, enumerate entries for dbus property +BootLoaderEntries, etc.) +</p> +</desc> +</tunable> </module> <module name="tmpfiles" filename="policy/modules/system/tmpfiles.if"> <summary>Policy for tmpfiles, a boot-time temporary file handler</summary> -<interface name="tmpfiles_read_var_run" lineno="13"> +<interface name="tmpfiles_read_runtime" lineno="13"> <summary> Read resources in /run/tmpfiles.d/. </summary> @@ -119602,7 +120370,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="tmpfiles_create_var_run_files" lineno="33"> +<interface name="tmpfiles_create_runtime_files" lineno="33"> <summary> Create files in /run/tmpfiles.d/. </summary> @@ -119612,7 +120380,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="tmpfiles_write_var_run_files" lineno="53"> +<interface name="tmpfiles_write_runtime_files" lineno="53"> <summary> Write to files in /run/tmpfiles.d/. </summary> @@ -119622,7 +120390,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="tmpfiles_manage_var_run_files" lineno="73"> +<interface name="tmpfiles_manage_runtime_files" lineno="73"> <summary> Manage files in /run/tmpfiles.d/. </summary> @@ -119960,7 +120728,7 @@ Domain allowed access. </interface> <interface name="udev_generic_pid_filetrans_run_dirs" lineno="517"> <summary> -Write dirs in /var/run with the udev_var_run file type. +Write dirs in /var/run with the udev_runtime file type. This method is deprecated in favor of the init_daemon_run_dir call. </summary> <param name="domain"> @@ -120297,7 +121065,17 @@ Domain to not audit. </summary> </param> </interface> -<interface name="unconfined_create_keys" lineno="501"> +<interface name="unconfined_search_keys" lineno="501"> +<summary> +Search keys for the unconfined domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_create_keys" lineno="519"> <summary> Create keys for the unconfined domain. </summary> @@ -120307,7 +121085,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="unconfined_dbus_send" lineno="519"> +<interface name="unconfined_write_keys" lineno="537"> +<summary> +Write keys for the unconfined domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_dbus_send" lineno="555"> <summary> Send messages to the unconfined domain over dbus. </summary> @@ -120317,7 +121105,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="unconfined_dbus_chat" lineno="539"> +<interface name="unconfined_dbus_chat" lineno="575"> <summary> Send and receive messages from unconfined_t over dbus. @@ -120328,7 +121116,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="unconfined_dbus_connect" lineno="560"> +<interface name="unconfined_dbus_connect" lineno="596"> <summary> Connect to the the unconfined DBUS for service (acquire_svc). @@ -120510,7 +121298,7 @@ is the prefix for user_t). </param> <rolebase/> </template> -<template name="userdom_change_password_template" lineno="549"> +<template name="userdom_change_password_template" lineno="547"> <summary> The template for allowing the user to change passwords. </summary> @@ -120522,7 +121310,7 @@ is the prefix for user_t). </param> <rolebase/> </template> -<template name="userdom_common_user_template" lineno="579"> +<template name="userdom_common_user_template" lineno="577"> <summary> The template containing rules common to unprivileged users and administrative users. @@ -120540,7 +121328,7 @@ is the prefix for user_t). </summary> </param> </template> -<template name="userdom_login_user_template" lineno="903"> +<template name="userdom_login_user_template" lineno="906"> <summary> The template for creating a login user. </summary> @@ -120558,7 +121346,7 @@ is the prefix for user_t). </summary> </param> </template> -<template name="userdom_restricted_user_template" lineno="1026"> +<template name="userdom_restricted_user_template" lineno="1029"> <summary> The template for creating a unprivileged login user. </summary> @@ -120576,7 +121364,7 @@ is the prefix for user_t). </summary> </param> </template> -<template name="userdom_restricted_xwindows_user_template" lineno="1067"> +<template name="userdom_restricted_xwindows_user_template" lineno="1070"> <summary> The template for creating a unprivileged xwindows login user. </summary> @@ -120597,7 +121385,7 @@ is the prefix for user_t). </summary> </param> </template> -<template name="userdom_unpriv_user_template" lineno="1154"> +<template name="userdom_unpriv_user_template" lineno="1157"> <summary> The template for creating a unprivileged user roughly equivalent to a regular linux user. @@ -120620,7 +121408,7 @@ is the prefix for user_t). </summary> </param> </template> -<template name="userdom_admin_user_template" lineno="1252"> +<template name="userdom_admin_user_template" lineno="1255"> <summary> The template for creating an administrative user. </summary> @@ -120649,7 +121437,7 @@ is the prefix for sysadm_t). </summary> </param> </template> -<template name="userdom_security_admin_template" lineno="1426"> +<template name="userdom_security_admin_template" lineno="1429"> <summary> Allow user to run as a secadm </summary> @@ -120675,7 +121463,7 @@ The role of the object to create. </summary> </param> </template> -<interface name="userdom_user_application_type" lineno="1506"> +<interface name="userdom_user_application_type" lineno="1509"> <summary> Make the specified type usable as a user application domain type. @@ -120686,7 +121474,7 @@ Type to be used as a user application domain. </summary> </param> </interface> -<interface name="userdom_user_application_domain" lineno="1527"> +<interface name="userdom_user_application_domain" lineno="1530"> <summary> Make the specified type usable as a user application domain. @@ -120702,7 +121490,7 @@ Type to be used as the domain entry point. </summary> </param> </interface> -<interface name="userdom_user_home_content" lineno="1544"> +<interface name="userdom_user_home_content" lineno="1547"> <summary> Make the specified type usable in a user home directory. @@ -120714,7 +121502,7 @@ user home directory. </summary> </param> </interface> -<interface name="userdom_user_tmp_file" lineno="1570"> +<interface name="userdom_user_tmp_file" lineno="1573"> <summary> Make the specified type usable as a user temporary file. @@ -120726,7 +121514,7 @@ temporary directories. </summary> </param> </interface> -<interface name="userdom_user_tmpfs_file" lineno="1587"> +<interface name="userdom_user_tmpfs_file" lineno="1590"> <summary> Make the specified type usable as a user tmpfs file. @@ -120738,7 +121526,7 @@ tmpfs directories. </summary> </param> </interface> -<interface name="userdom_attach_admin_tun_iface" lineno="1602"> +<interface name="userdom_attach_admin_tun_iface" lineno="1605"> <summary> Allow domain to attach to TUN devices created by administrative users. </summary> @@ -120748,7 +121536,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_setattr_user_ptys" lineno="1621"> +<interface name="userdom_setattr_user_ptys" lineno="1624"> <summary> Set the attributes of a user pty. </summary> @@ -120758,7 +121546,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_create_user_pty" lineno="1639"> +<interface name="userdom_create_user_pty" lineno="1642"> <summary> Create a user pty. </summary> @@ -120768,7 +121556,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_getattr_user_home_dirs" lineno="1657"> +<interface name="userdom_getattr_user_home_dirs" lineno="1660"> <summary> Get the attributes of user home directories. </summary> @@ -120778,7 +121566,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1676"> +<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1679"> <summary> Do not audit attempts to get the attributes of user home directories. </summary> @@ -120788,7 +121576,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_search_user_home_dirs" lineno="1694"> +<interface name="userdom_search_user_home_dirs" lineno="1697"> <summary> Search user home directories. </summary> @@ -120798,7 +121586,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1721"> +<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1724"> <summary> Do not audit attempts to search user home directories. </summary> @@ -120816,7 +121604,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="userdom_list_user_home_dirs" lineno="1739"> +<interface name="userdom_list_user_home_dirs" lineno="1742"> <summary> List user home directories. </summary> @@ -120826,7 +121614,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1758"> +<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1761"> <summary> Do not audit attempts to list user home subdirectories. </summary> @@ -120836,7 +121624,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_create_user_home_dirs" lineno="1776"> +<interface name="userdom_create_user_home_dirs" lineno="1779"> <summary> Create user home directories. </summary> @@ -120846,7 +121634,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_dirs" lineno="1794"> +<interface name="userdom_manage_user_home_dirs" lineno="1797"> <summary> Manage user home directories. </summary> @@ -120856,7 +121644,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabelto_user_home_dirs" lineno="1812"> +<interface name="userdom_relabelto_user_home_dirs" lineno="1815"> <summary> Relabel to user home directories. </summary> @@ -120866,7 +121654,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_home_filetrans_user_home_dir" lineno="1836"> +<interface name="userdom_home_filetrans_user_home_dir" lineno="1839"> <summary> Create directories in the home dir root with the user home directory type. @@ -120882,7 +121670,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_home_domtrans" lineno="1873"> +<interface name="userdom_user_home_domtrans" lineno="1876"> <summary> Do a domain transition to the specified domain when executing a program in the @@ -120911,7 +121699,7 @@ Domain to transition to. </summary> </param> </interface> -<interface name="userdom_dontaudit_search_user_home_content" lineno="1893"> +<interface name="userdom_dontaudit_search_user_home_content" lineno="1896"> <summary> Do not audit attempts to search user home content directories. </summary> @@ -120921,7 +121709,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_list_all_user_home_content" lineno="1911"> +<interface name="userdom_list_all_user_home_content" lineno="1914"> <summary> List all users home content directories. </summary> @@ -120931,7 +121719,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_list_user_home_content" lineno="1930"> +<interface name="userdom_list_user_home_content" lineno="1933"> <summary> List contents of users home directory. </summary> @@ -120941,7 +121729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_dirs" lineno="1949"> +<interface name="userdom_manage_user_home_content_dirs" lineno="1952"> <summary> Create, read, write, and delete directories in a user home subdirectory. @@ -120952,7 +121740,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_home_content_dirs" lineno="1968"> +<interface name="userdom_delete_all_user_home_content_dirs" lineno="1971"> <summary> Delete all user home content directories. </summary> @@ -120962,7 +121750,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_home_content_dirs" lineno="1988"> +<interface name="userdom_delete_user_home_content_dirs" lineno="1991"> <summary> Delete directories in a user home subdirectory. </summary> @@ -120972,7 +121760,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2006"> +<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2009"> <summary> Set attributes of all user home content directories. </summary> @@ -120982,7 +121770,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2026"> +<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2029"> <summary> Do not audit attempts to set the attributes of user home files. @@ -120993,7 +121781,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_map_user_home_content_files" lineno="2044"> +<interface name="userdom_map_user_home_content_files" lineno="2047"> <summary> Map user home files. </summary> @@ -121003,7 +121791,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_mmap_user_home_content_files" lineno="2062"> +<interface name="userdom_mmap_user_home_content_files" lineno="2065"> <summary> Mmap user home files. </summary> @@ -121013,7 +121801,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_read_user_home_content_files" lineno="2081"> +<interface name="userdom_read_user_home_content_files" lineno="2084"> <summary> Read user home files. </summary> @@ -121023,7 +121811,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2100"> +<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2103"> <summary> Do not audit attempts to read user home files. </summary> @@ -121033,7 +121821,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_all_user_home_content" lineno="2119"> +<interface name="userdom_read_all_user_home_content" lineno="2122"> <summary> Read all user home content, including application-specific resources. </summary> @@ -121043,7 +121831,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="userdom_manage_all_user_home_content" lineno="2141"> +<interface name="userdom_manage_all_user_home_content" lineno="2144"> <summary> Manage all user home content, including application-specific resources. </summary> @@ -121053,7 +121841,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2163"> +<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2166"> <summary> Do not audit attempts to append user home files. </summary> @@ -121063,7 +121851,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2181"> +<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2184"> <summary> Do not audit attempts to write user home files. </summary> @@ -121073,7 +121861,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_delete_all_user_home_content_files" lineno="2199"> +<interface name="userdom_delete_all_user_home_content_files" lineno="2202"> <summary> Delete all user home content files. </summary> @@ -121083,7 +121871,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_home_content_files" lineno="2219"> +<interface name="userdom_delete_user_home_content_files" lineno="2222"> <summary> Delete files in a user home subdirectory. </summary> @@ -121093,7 +121881,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2237"> +<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2240"> <summary> Do not audit attempts to relabel user home files. </summary> @@ -121103,7 +121891,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_user_home_content_symlinks" lineno="2255"> +<interface name="userdom_read_user_home_content_symlinks" lineno="2258"> <summary> Read user home subdirectory symbolic links. </summary> @@ -121113,7 +121901,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_exec_user_home_content_files" lineno="2275"> +<interface name="userdom_exec_user_home_content_files" lineno="2278"> <summary> Execute user home files. </summary> @@ -121124,7 +121912,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2302"> +<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2305"> <summary> Do not audit attempts to execute user home files. </summary> @@ -121134,7 +121922,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_files" lineno="2321"> +<interface name="userdom_manage_user_home_content_files" lineno="2324"> <summary> Create, read, write, and delete files in a user home subdirectory. @@ -121145,7 +121933,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2342"> +<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2345"> <summary> Do not audit attempts to create, read, write, and delete directories in a user home subdirectory. @@ -121156,7 +121944,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_symlinks" lineno="2361"> +<interface name="userdom_manage_user_home_content_symlinks" lineno="2364"> <summary> Create, read, write, and delete symbolic links in a user home subdirectory. @@ -121167,7 +121955,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2381"> +<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2384"> <summary> Delete all user home content symbolic links. </summary> @@ -121177,7 +121965,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_home_content_symlinks" lineno="2401"> +<interface name="userdom_delete_user_home_content_symlinks" lineno="2404"> <summary> Delete symbolic links in a user home directory. </summary> @@ -121187,7 +121975,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_pipes" lineno="2420"> +<interface name="userdom_manage_user_home_content_pipes" lineno="2423"> <summary> Create, read, write, and delete named pipes in a user home subdirectory. @@ -121198,7 +121986,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_sockets" lineno="2441"> +<interface name="userdom_manage_user_home_content_sockets" lineno="2444"> <summary> Create, read, write, and delete named sockets in a user home subdirectory. @@ -121209,7 +121997,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_user_home_dir_filetrans" lineno="2478"> +<interface name="userdom_user_home_dir_filetrans" lineno="2481"> <summary> Create objects in a user home directory with an automatic type transition to @@ -121236,7 +122024,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_home_content_filetrans" lineno="2515"> +<interface name="userdom_user_home_content_filetrans" lineno="2518"> <summary> Create objects in a directory located in a user home directory with an @@ -121264,7 +122052,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2546"> +<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2549"> <summary> Automatically use the user_cert_t label for selected resources created in a users home directory @@ -121285,7 +122073,7 @@ Name of the resource that is being created </summary> </param> </interface> -<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2576"> +<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2579"> <summary> Create objects in a user home directory with an automatic type transition to @@ -121307,7 +122095,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_read_user_certs" lineno="2596"> +<interface name="userdom_read_user_certs" lineno="2599"> <summary> Read user SSL certificates. </summary> @@ -121318,7 +122106,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="userdom_dontaudit_manage_user_certs" lineno="2619"> +<interface name="userdom_dontaudit_manage_user_certs" lineno="2622"> <summary> Do not audit attempts to manage the user SSL certificates. @@ -121330,7 +122118,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="userdom_manage_user_certs" lineno="2639"> +<interface name="userdom_manage_user_certs" lineno="2642"> <summary> Manage user SSL certificates. </summary> @@ -121340,7 +122128,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_write_user_tmp_sockets" lineno="2660"> +<interface name="userdom_write_user_tmp_sockets" lineno="2663"> <summary> Write to user temporary named sockets. </summary> @@ -121350,7 +122138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_list_user_tmp" lineno="2680"> +<interface name="userdom_list_user_tmp" lineno="2683"> <summary> List user temporary directories. </summary> @@ -121360,7 +122148,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_list_user_tmp" lineno="2702"> +<interface name="userdom_dontaudit_list_user_tmp" lineno="2705"> <summary> Do not audit attempts to list user temporary directories. @@ -121371,7 +122159,17 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2721"> +<interface name="userdom_delete_user_tmp_dirs" lineno="2723"> +<summary> +Delete users temporary directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2742"> <summary> Do not audit attempts to manage users temporary directories. @@ -121382,7 +122180,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_user_tmp_files" lineno="2739"> +<interface name="userdom_read_user_tmp_files" lineno="2760"> <summary> Read user temporary files. </summary> @@ -121392,7 +122190,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_map_user_tmp_files" lineno="2760"> +<interface name="userdom_map_user_tmp_files" lineno="2781"> <summary> Map user temporary files. </summary> @@ -121402,7 +122200,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2779"> +<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2800"> <summary> Do not audit attempts to read users temporary files. @@ -121413,7 +122211,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2798"> +<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2819"> <summary> Do not audit attempts to append users temporary files. @@ -121424,7 +122222,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_rw_user_tmp_files" lineno="2816"> +<interface name="userdom_rw_user_tmp_files" lineno="2837"> <summary> Read and write user temporary files. </summary> @@ -121434,7 +122232,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2838"> +<interface name="userdom_delete_user_tmp_files" lineno="2858"> +<summary> +Delete users temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2877"> <summary> Do not audit attempts to manage users temporary files. @@ -121445,7 +122253,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_user_tmp_symlinks" lineno="2856"> +<interface name="userdom_read_user_tmp_symlinks" lineno="2895"> <summary> Read user temporary symbolic links. </summary> @@ -121455,7 +122263,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_dirs" lineno="2878"> +<interface name="userdom_delete_user_tmp_symlinks" lineno="2916"> +<summary> +Delete users temporary symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_tmp_dirs" lineno="2935"> <summary> Create, read, write, and delete user temporary directories. @@ -121466,7 +122284,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_files" lineno="2899"> +<interface name="userdom_delete_user_tmp_named_pipes" lineno="2955"> +<summary> +Delete users temporary named pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_tmp_files" lineno="2974"> <summary> Create, read, write, and delete user temporary files. @@ -121477,7 +122305,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_symlinks" lineno="2920"> +<interface name="userdom_delete_user_tmp_named_sockets" lineno="2994"> +<summary> +Delete users temporary named sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_tmp_symlinks" lineno="3013"> <summary> Create, read, write, and delete user temporary symbolic links. @@ -121488,7 +122326,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_pipes" lineno="2941"> +<interface name="userdom_manage_user_tmp_pipes" lineno="3034"> <summary> Create, read, write, and delete user temporary named pipes. @@ -121499,7 +122337,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_sockets" lineno="2962"> +<interface name="userdom_manage_user_tmp_sockets" lineno="3055"> <summary> Create, read, write, and delete user temporary named sockets. @@ -121510,7 +122348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_user_tmp_filetrans" lineno="2999"> +<interface name="userdom_user_tmp_filetrans" lineno="3092"> <summary> Create objects in a user temporary directory with an automatic type transition to @@ -121537,7 +122375,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_tmp_filetrans_user_tmp" lineno="3031"> +<interface name="userdom_tmp_filetrans_user_tmp" lineno="3124"> <summary> Create objects in the temporary directory with an automatic type transition to @@ -121559,7 +122397,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_map_user_tmpfs_files" lineno="3049"> +<interface name="userdom_map_user_tmpfs_files" lineno="3142"> <summary> Map user tmpfs files. </summary> @@ -121569,7 +122407,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_read_user_tmpfs_files" lineno="3067"> +<interface name="userdom_read_user_tmpfs_files" lineno="3160"> <summary> Read user tmpfs files. </summary> @@ -121579,7 +122417,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3087"> +<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3180"> <summary> dontaudit Read attempts of user tmpfs files. </summary> @@ -121589,7 +122427,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3106"> +<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3199"> <summary> relabel to/from user tmpfs dirs </summary> @@ -121599,7 +122437,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_tmpfs_files" lineno="3125"> +<interface name="userdom_relabel_user_tmpfs_files" lineno="3218"> <summary> relabel to/from user tmpfs files </summary> @@ -121609,7 +122447,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_user_runtime_content" lineno="3147"> +<interface name="userdom_user_runtime_content" lineno="3240"> <summary> Make the specified type usable in the directory /run/user/%{USERID}/. @@ -121621,7 +122459,7 @@ user_runtime_content_dir_t. </summary> </param> </interface> -<interface name="userdom_search_user_runtime" lineno="3167"> +<interface name="userdom_search_user_runtime" lineno="3260"> <summary> Search users runtime directories. </summary> @@ -121631,7 +122469,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_search_user_runtime_root" lineno="3186"> +<interface name="userdom_search_user_runtime_root" lineno="3279"> <summary> Search user runtime root directories. </summary> @@ -121641,7 +122479,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_runtime_root_dirs" lineno="3206"> +<interface name="userdom_manage_user_runtime_root_dirs" lineno="3299"> <summary> Create, read, write, and delete user runtime root dirs. @@ -121652,7 +122490,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3225"> +<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3318"> <summary> Relabel to and from user runtime root dirs. </summary> @@ -121662,7 +122500,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_runtime_dirs" lineno="3244"> +<interface name="userdom_manage_user_runtime_dirs" lineno="3337"> <summary> Create, read, write, and delete user runtime dirs. @@ -121673,7 +122511,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_mounton_user_runtime_dirs" lineno="3264"> +<interface name="userdom_mounton_user_runtime_dirs" lineno="3357"> <summary> Mount a filesystem on user runtime dir directories. @@ -121684,7 +122522,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabelto_user_runtime_dirs" lineno="3282"> +<interface name="userdom_relabelto_user_runtime_dirs" lineno="3375"> <summary> Relabel to user runtime directories. </summary> @@ -121694,7 +122532,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3300"> +<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3393"> <summary> Relabel from user runtime directories. </summary> @@ -121704,7 +122542,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_runtime_files" lineno="3318"> +<interface name="userdom_delete_user_runtime_files" lineno="3411"> <summary> delete user runtime files </summary> @@ -121714,7 +122552,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_search_all_user_runtime" lineno="3337"> +<interface name="userdom_search_all_user_runtime" lineno="3430"> <summary> Search users runtime directories. </summary> @@ -121724,7 +122562,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_list_all_user_runtime" lineno="3356"> +<interface name="userdom_list_all_user_runtime" lineno="3449"> <summary> List user runtime directories. </summary> @@ -121734,7 +122572,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_dirs" lineno="3375"> +<interface name="userdom_delete_all_user_runtime_dirs" lineno="3468"> <summary> delete user runtime directories </summary> @@ -121744,7 +122582,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_files" lineno="3393"> +<interface name="userdom_delete_all_user_runtime_files" lineno="3486"> <summary> delete user runtime files </summary> @@ -121754,7 +122592,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3412"> +<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3505"> <summary> delete user runtime symlink files </summary> @@ -121764,7 +122602,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3431"> +<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3524"> <summary> delete user runtime fifo files </summary> @@ -121774,7 +122612,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3450"> +<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3543"> <summary> delete user runtime socket files </summary> @@ -121784,7 +122622,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3481"> +<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3574"> <summary> Create objects in the pid directory with an automatic type transition to @@ -121806,7 +122644,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_runtime_filetrans" lineno="3517"> +<interface name="userdom_user_runtime_filetrans" lineno="3610"> <summary> Create objects in a user runtime directory with an automatic type @@ -121834,7 +122672,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3548"> +<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3641"> <summary> Create objects in the user runtime directory with an automatic type transition to @@ -121856,7 +122694,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="3578"> +<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="3671"> <summary> Create objects in the user runtime root directory with an automatic type transition @@ -121878,7 +122716,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_run_filetrans_user_runtime" lineno="3609"> +<interface name="userdom_user_run_filetrans_user_runtime" lineno="3702"> <summary> Create objects in the user runtime root directory with an automatic type transition @@ -121900,7 +122738,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_rw_user_tmpfs_files" lineno="3627"> +<interface name="userdom_rw_user_tmpfs_files" lineno="3720"> <summary> Read and write user tmpfs files. </summary> @@ -121910,7 +122748,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_tmpfs_files" lineno="3648"> +<interface name="userdom_delete_user_tmpfs_files" lineno="3741"> <summary> Delete user tmpfs files. </summary> @@ -121920,7 +122758,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmpfs_files" lineno="3667"> +<interface name="userdom_manage_user_tmpfs_files" lineno="3760"> <summary> Create, read, write, and delete user tmpfs files. </summary> @@ -121930,7 +122768,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_getattr_user_ttys" lineno="3687"> +<interface name="userdom_getattr_user_ttys" lineno="3780"> <summary> Get the attributes of a user domain tty. </summary> @@ -121940,7 +122778,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_getattr_user_ttys" lineno="3705"> +<interface name="userdom_dontaudit_getattr_user_ttys" lineno="3798"> <summary> Do not audit attempts to get the attributes of a user domain tty. </summary> @@ -121950,7 +122788,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_setattr_user_ttys" lineno="3723"> +<interface name="userdom_setattr_user_ttys" lineno="3816"> <summary> Set the attributes of a user domain tty. </summary> @@ -121960,7 +122798,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_setattr_user_ttys" lineno="3741"> +<interface name="userdom_dontaudit_setattr_user_ttys" lineno="3834"> <summary> Do not audit attempts to set the attributes of a user domain tty. </summary> @@ -121970,7 +122808,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_use_user_ttys" lineno="3759"> +<interface name="userdom_use_user_ttys" lineno="3852"> <summary> Read and write a user domain tty. </summary> @@ -121980,7 +122818,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_user_ptys" lineno="3777"> +<interface name="userdom_use_user_ptys" lineno="3870"> <summary> Read and write a user domain pty. </summary> @@ -121990,7 +122828,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_inherited_user_terminals" lineno="3812"> +<interface name="userdom_use_inherited_user_terminals" lineno="3905"> <summary> Read and write a user TTYs and PTYs. </summary> @@ -122016,7 +122854,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="userdom_use_user_terminals" lineno="3853"> +<interface name="userdom_use_user_terminals" lineno="3946"> <summary> Read, write and open a user TTYs and PTYs. </summary> @@ -122048,7 +122886,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="userdom_dontaudit_use_user_terminals" lineno="3869"> +<interface name="userdom_dontaudit_use_user_terminals" lineno="3962"> <summary> Do not audit attempts to read and write a user domain tty and pty. @@ -122059,7 +122897,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_spec_domtrans_all_users" lineno="3890"> +<interface name="userdom_spec_domtrans_all_users" lineno="3983"> <summary> Execute a shell in all user domains. This is an explicit transition, requiring the @@ -122071,7 +122909,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_xsession_spec_domtrans_all_users" lineno="3913"> +<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4006"> <summary> Execute an Xserver session in all user domains. This is an explicit transition, requiring the @@ -122083,7 +122921,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_spec_domtrans_unpriv_users" lineno="3936"> +<interface name="userdom_spec_domtrans_unpriv_users" lineno="4029"> <summary> Execute a shell in all unprivileged user domains. This is an explicit transition, requiring the @@ -122095,7 +122933,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="3959"> +<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4052"> <summary> Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the @@ -122107,7 +122945,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_rw_unpriv_user_semaphores" lineno="3980"> +<interface name="userdom_rw_unpriv_user_semaphores" lineno="4073"> <summary> Read and write unpriviledged user SysV sempaphores. </summary> @@ -122117,7 +122955,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_unpriv_user_semaphores" lineno="3998"> +<interface name="userdom_manage_unpriv_user_semaphores" lineno="4091"> <summary> Manage unpriviledged user SysV sempaphores. </summary> @@ -122127,7 +122965,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4017"> +<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4110"> <summary> Read and write unpriviledged user SysV shared memory segments. @@ -122138,7 +122976,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4036"> +<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4129"> <summary> Manage unpriviledged user SysV shared memory segments. @@ -122149,7 +122987,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4056"> +<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4149"> <summary> Execute bin_t in the unprivileged user domains. This is an explicit transition, requiring the @@ -122161,7 +122999,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4079"> +<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4172"> <summary> Execute all entrypoint files in unprivileged user domains. This is an explicit transition, requiring the @@ -122173,7 +123011,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_search_user_home_content" lineno="4100"> +<interface name="userdom_search_user_home_content" lineno="4193"> <summary> Search users home directories. </summary> @@ -122183,7 +123021,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_signull_unpriv_users" lineno="4119"> +<interface name="userdom_signull_unpriv_users" lineno="4212"> <summary> Send signull to unprivileged user domains. </summary> @@ -122193,7 +123031,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_signal_unpriv_users" lineno="4137"> +<interface name="userdom_signal_unpriv_users" lineno="4230"> <summary> Send general signals to unprivileged user domains. </summary> @@ -122203,7 +123041,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_unpriv_users_fds" lineno="4155"> +<interface name="userdom_use_unpriv_users_fds" lineno="4248"> <summary> Inherit the file descriptors from unprivileged user domains. </summary> @@ -122213,7 +123051,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4183"> +<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4276"> <summary> Do not audit attempts to inherit the file descriptors from unprivileged user domains. @@ -122233,7 +123071,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="userdom_dontaudit_use_user_ptys" lineno="4201"> +<interface name="userdom_dontaudit_use_user_ptys" lineno="4294"> <summary> Do not audit attempts to use user ptys. </summary> @@ -122243,7 +123081,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_relabelto_user_ptys" lineno="4219"> +<interface name="userdom_relabelto_user_ptys" lineno="4312"> <summary> Relabel files to unprivileged user pty types. </summary> @@ -122253,7 +123091,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4238"> +<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4331"> <summary> Do not audit attempts to relabel files from user pty types. @@ -122264,7 +123102,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_write_user_tmp_files" lineno="4256"> +<interface name="userdom_write_user_tmp_files" lineno="4349"> <summary> Write all users files in /tmp </summary> @@ -122274,7 +123112,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4275"> +<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4368"> <summary> Do not audit attempts to write users temporary files. @@ -122285,7 +123123,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_dontaudit_use_user_ttys" lineno="4293"> +<interface name="userdom_dontaudit_use_user_ttys" lineno="4386"> <summary> Do not audit attempts to use user ttys. </summary> @@ -122295,7 +123133,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_all_users_state" lineno="4311"> +<interface name="userdom_read_all_users_state" lineno="4404"> <summary> Read the process state of all user domains. </summary> @@ -122305,7 +123143,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_getattr_all_users" lineno="4330"> +<interface name="userdom_getattr_all_users" lineno="4423"> <summary> Get the attributes of all user domains. </summary> @@ -122315,7 +123153,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_all_users_fds" lineno="4348"> +<interface name="userdom_use_all_users_fds" lineno="4441"> <summary> Inherit the file descriptors from all user domains </summary> @@ -122325,7 +123163,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_use_all_users_fds" lineno="4367"> +<interface name="userdom_dontaudit_use_all_users_fds" lineno="4460"> <summary> Do not audit attempts to inherit the file descriptors from any user domains. @@ -122336,7 +123174,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_signal_all_users" lineno="4385"> +<interface name="userdom_signal_all_users" lineno="4478"> <summary> Send general signals to all user domains. </summary> @@ -122346,7 +123184,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_sigchld_all_users" lineno="4403"> +<interface name="userdom_sigchld_all_users" lineno="4496"> <summary> Send a SIGCHLD signal to all user domains. </summary> @@ -122356,7 +123194,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_read_all_users_keys" lineno="4421"> +<interface name="userdom_read_all_users_keys" lineno="4514"> <summary> Read keys for all user domains. </summary> @@ -122366,7 +123204,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_write_all_users_keys" lineno="4439"> +<interface name="userdom_write_all_users_keys" lineno="4532"> <summary> Write keys for all user domains. </summary> @@ -122376,7 +123214,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_rw_all_users_keys" lineno="4457"> +<interface name="userdom_rw_all_users_keys" lineno="4550"> <summary> Read and write keys for all user domains. </summary> @@ -122386,7 +123224,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_create_all_users_keys" lineno="4475"> +<interface name="userdom_create_all_users_keys" lineno="4568"> <summary> Create keys for all user domains. </summary> @@ -122396,7 +123234,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_all_users_keys" lineno="4493"> +<interface name="userdom_manage_all_users_keys" lineno="4586"> <summary> Manage keys for all user domains. </summary> @@ -122406,7 +123244,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dbus_send_all_users" lineno="4511"> +<interface name="userdom_dbus_send_all_users" lineno="4604"> <summary> Send a dbus message to all user domains. </summary> @@ -122416,7 +123254,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_chr_files" lineno="4533"> +<interface name="userdom_manage_user_tmp_chr_files" lineno="4626"> <summary> Create, read, write, and delete user temporary character files. @@ -122427,7 +123265,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_certs" lineno="4554"> +<interface name="userdom_relabel_user_certs" lineno="4647"> <summary> Allow relabeling resources to user_cert_t </summary> @@ -122437,7 +123275,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="4577"> +<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="4670"> <summary> Do not audit attempts to read and write unserdomain stream. @@ -123827,7 +124665,7 @@ Domain allowed access. </interface> <interface name="xen_pid_filetrans" lineno="280"> <summary> -Create in a xend_var_run_t directory +Create in a xend_runtime_t directory </summary> <param name="domain"> <summary> |