diff options
author | Jason Zaman <perfinion@gentoo.org> | 2022-09-03 12:25:21 -0700 |
---|---|---|
committer | Jason Zaman <perfinion@gentoo.org> | 2022-09-03 12:25:21 -0700 |
commit | 7cd9bdfa316e15e20ac537746de9e17b1c740faa (patch) | |
tree | 6e38d848913cdcdb3e188fb81c6f83e5c5e4b975 /doc | |
parent | Merge upstream (diff) | |
download | hardened-refpolicy-7cd9bdfa316e15e20ac537746de9e17b1c740faa.tar.gz hardened-refpolicy-7cd9bdfa316e15e20ac537746de9e17b1c740faa.tar.bz2 hardened-refpolicy-7cd9bdfa316e15e20ac537746de9e17b1c740faa.zip |
Update generated policy and doc files
Signed-off-by: Jason Zaman <perfinion@gentoo.org>
Diffstat (limited to 'doc')
-rw-r--r-- | doc/policy.xml | 15408 |
1 files changed, 8142 insertions, 7266 deletions
diff --git a/doc/policy.xml b/doc/policy.xml index 35687d71..6dd4831a 100644 --- a/doc/policy.xml +++ b/doc/policy.xml @@ -940,6 +940,70 @@ Role allowed access. </param> </interface> </module> +<module name="cloudinit" filename="policy/modules/admin/cloudinit.if"> +<summary>Init scripts for cloud VMs</summary> +<interface name="cloudinit_create_runtime_dirs" lineno="13"> +<summary> +Create cloud-init runtime directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cloudinit_write_runtime_files" lineno="32"> +<summary> +Write cloud-init runtime files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cloudinit_create_runtime_files" lineno="51"> +<summary> +Create cloud-init runtime files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cloudinit_filetrans_runtime" lineno="81"> +<summary> +Create files in /run with the type used for +cloud-init runtime files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="object_class"> +<summary> +The class of the object to be created. +</summary> +</param> +<param name="name" optional="true"> +<summary> +The name of the object being created. +</summary> +</param> +</interface> +<interface name="cloudinit_getattr_state_files" lineno="99"> +<summary> +Get the attribute of cloud-init state files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> <module name="consoletype" filename="policy/modules/admin/consoletype.if"> <summary> Determine of the console connected to the controlling terminal. @@ -954,7 +1018,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="consoletype_run" lineno="44"> +<interface name="consoletype_run" lineno="42"> <summary> Execute consoletype in the consoletype domain, and allow the specified role the consoletype domain. @@ -970,7 +1034,7 @@ Role allowed access. </summary> </param> </interface> -<interface name="consoletype_exec" lineno="64"> +<interface name="consoletype_exec" lineno="62"> <summary> Execute consoletype in the caller domain. </summary> @@ -2482,7 +2546,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="prelink_exec" lineno="37"> +<interface name="prelink_exec" lineno="35"> <summary> Execute prelink in the caller domain. </summary> @@ -2492,7 +2556,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="prelink_run" lineno="64"> +<interface name="prelink_run" lineno="62"> <summary> Execute prelink in the prelink domain, and allow the specified role @@ -2510,7 +2574,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="prelink_object_file" lineno="83"> +<interface name="prelink_object_file" lineno="81"> <summary> Make the specified file type prelinkable. </summary> @@ -2520,7 +2584,7 @@ File type to be prelinked. </summary> </param> </interface> -<interface name="prelink_read_cache" lineno="101"> +<interface name="prelink_read_cache" lineno="99"> <summary> Read prelink cache files. </summary> @@ -2530,7 +2594,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="prelink_delete_cache" lineno="120"> +<interface name="prelink_delete_cache" lineno="118"> <summary> Delete prelink cache files. </summary> @@ -2540,7 +2604,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="prelink_manage_log" lineno="140"> +<interface name="prelink_manage_log" lineno="138"> <summary> Create, read, write, and delete prelink log files. @@ -2551,7 +2615,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="prelink_manage_lib" lineno="160"> +<interface name="prelink_manage_lib" lineno="158"> <summary> Create, read, write, and delete prelink var_lib files. @@ -2562,7 +2626,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="prelink_relabelfrom_lib" lineno="179"> +<interface name="prelink_relabelfrom_lib" lineno="177"> <summary> Relabel from prelink lib files. </summary> @@ -2572,7 +2636,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="prelink_relabel_lib" lineno="198"> +<interface name="prelink_relabel_lib" lineno="196"> <summary> Relabel prelink lib files. </summary> @@ -3753,7 +3817,7 @@ Role allowed access </summary> </param> </template> -<interface name="sudo_sigchld" lineno="215"> +<interface name="sudo_sigchld" lineno="220"> <summary> Send a SIGCHLD signal to the sudo domain. </summary> @@ -4068,7 +4132,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="usermanage_run_chfn" lineno="42"> +<interface name="usermanage_run_chfn" lineno="40"> <summary> Execute chfn in the chfn domain, and allow the specified role the chfn domain. @@ -4084,7 +4148,7 @@ Role allowed access. </summary> </param> </interface> -<interface name="usermanage_domtrans_groupadd" lineno="61"> +<interface name="usermanage_domtrans_groupadd" lineno="59"> <summary> Execute groupadd in the groupadd domain. </summary> @@ -4094,7 +4158,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="usermanage_run_groupadd" lineno="91"> +<interface name="usermanage_run_groupadd" lineno="87"> <summary> Execute groupadd in the groupadd domain, and allow the specified role the groupadd domain. @@ -4111,7 +4175,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="usermanage_domtrans_passwd" lineno="110"> +<interface name="usermanage_domtrans_passwd" lineno="106"> <summary> Execute passwd in the passwd domain. </summary> @@ -4121,7 +4185,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="usermanage_kill_passwd" lineno="133"> +<interface name="usermanage_kill_passwd" lineno="127"> <summary> Send sigkills to passwd. </summary> @@ -4131,7 +4195,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="usermanage_check_exec_passwd" lineno="151"> +<interface name="usermanage_check_exec_passwd" lineno="145"> <summary> Check if the passwd binary is executable. </summary> @@ -4141,7 +4205,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="usermanage_run_passwd" lineno="175"> +<interface name="usermanage_run_passwd" lineno="169"> <summary> Execute passwd in the passwd domain, and allow the specified role the passwd domain. @@ -4157,7 +4221,7 @@ Role allowed access. </summary> </param> </interface> -<interface name="usermanage_domtrans_admin_passwd" lineno="195"> +<interface name="usermanage_domtrans_admin_passwd" lineno="189"> <summary> Execute password admin functions in the admin passwd domain. @@ -4168,7 +4232,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="usermanage_run_admin_passwd" lineno="222"> +<interface name="usermanage_run_admin_passwd" lineno="216"> <summary> Execute passwd admin functions in the admin passwd domain, and allow the specified role @@ -4186,7 +4250,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="usermanage_dontaudit_use_useradd_fds" lineno="241"> +<interface name="usermanage_dontaudit_use_useradd_fds" lineno="235"> <summary> Do not audit attempts to use useradd fds. </summary> @@ -4196,7 +4260,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="usermanage_domtrans_useradd" lineno="259"> +<interface name="usermanage_domtrans_useradd" lineno="253"> <summary> Execute useradd in the useradd domain. </summary> @@ -4206,7 +4270,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="usermanage_check_exec_useradd" lineno="282"> +<interface name="usermanage_check_exec_useradd" lineno="274"> <summary> Check if the useradd binaries are executable. </summary> @@ -4216,7 +4280,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="usermanage_run_useradd" lineno="307"> +<interface name="usermanage_run_useradd" lineno="299"> <summary> Execute useradd in the useradd domain, and allow the specified role the useradd domain. @@ -4233,7 +4297,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="usermanage_read_crack_db" lineno="326"> +<interface name="usermanage_read_crack_db" lineno="318"> <summary> Read the crack database. </summary> @@ -7667,7 +7731,7 @@ Role allowed access. </summary> </param> </interface> -<interface name="seunshare_role" lineno="69"> +<interface name="seunshare_role" lineno="67"> <summary> Role access for seunshare </summary> @@ -9868,7 +9932,17 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corecmd_getattr_bin_files" lineno="155"> +<interface name="corecmd_watch_bin_dirs" lineno="155"> +<summary> +Watch bin directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_getattr_bin_files" lineno="173"> <summary> Get the attributes of files in bin directories. </summary> @@ -9878,7 +9952,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_dontaudit_getattr_bin_files" lineno="174"> +<interface name="corecmd_dontaudit_getattr_bin_files" lineno="192"> <summary> Do not audit attempts to get the attributes of files in bin directories. </summary> @@ -9888,7 +9962,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corecmd_check_exec_bin_files" lineno="193"> +<interface name="corecmd_check_exec_bin_files" lineno="211"> <summary> Check if files in bin directories are executable (DAC-wise) </summary> @@ -9898,7 +9972,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_read_bin_files" lineno="212"> +<interface name="corecmd_read_bin_files" lineno="230"> <summary> Read files in bin directories. </summary> @@ -9908,7 +9982,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_dontaudit_write_bin_files" lineno="231"> +<interface name="corecmd_dontaudit_write_bin_files" lineno="249"> <summary> Do not audit attempts to write bin files. </summary> @@ -9918,7 +9992,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corecmd_read_bin_pipes" lineno="249"> +<interface name="corecmd_read_bin_pipes" lineno="267"> <summary> Read pipes in bin directories. </summary> @@ -9928,7 +10002,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_read_bin_sockets" lineno="268"> +<interface name="corecmd_read_bin_sockets" lineno="286"> <summary> Read named sockets in bin directories. </summary> @@ -9938,7 +10012,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_exec_bin" lineno="308"> +<interface name="corecmd_exec_bin" lineno="326"> <summary> Execute generic programs in bin directories, in the caller domain. @@ -9969,7 +10043,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_manage_bin_files" lineno="327"> +<interface name="corecmd_manage_bin_files" lineno="345"> <summary> Create, read, write, and delete bin files. </summary> @@ -9979,7 +10053,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_manage_bin_symlinks" lineno="346"> +<interface name="corecmd_manage_bin_symlinks" lineno="364"> <summary> Manage symlinks for bin files. </summary> @@ -9989,7 +10063,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_relabel_bin_files" lineno="365"> +<interface name="corecmd_relabel_bin_files" lineno="383"> <summary> Relabel to and from the bin type. </summary> @@ -9999,7 +10073,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_mmap_bin_files" lineno="384"> +<interface name="corecmd_mmap_bin_files" lineno="402"> <summary> Mmap a bin file as executable. </summary> @@ -10009,7 +10083,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_bin_spec_domtrans" lineno="429"> +<interface name="corecmd_bin_spec_domtrans" lineno="447"> <summary> Execute a file in a bin directory in the specified domain but do not @@ -10045,7 +10119,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="corecmd_bin_domtrans" lineno="472"> +<interface name="corecmd_bin_domtrans" lineno="490"> <summary> Execute a file in a bin directory in the specified domain. @@ -10079,7 +10153,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="corecmd_check_exec_shell" lineno="491"> +<interface name="corecmd_check_exec_shell" lineno="509"> <summary> Check if a shell is executable (DAC-wise). </summary> @@ -10089,7 +10163,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_exec_shell" lineno="528"> +<interface name="corecmd_exec_shell" lineno="546"> <summary> Execute shells in the caller domain. </summary> @@ -10117,7 +10191,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_shell_spec_domtrans" lineno="566"> +<interface name="corecmd_shell_spec_domtrans" lineno="584"> <summary> Execute a shell in the target domain. This is an explicit transition, requiring the @@ -10146,7 +10220,7 @@ The type of the shell process. </summary> </param> </interface> -<interface name="corecmd_shell_domtrans" lineno="600"> +<interface name="corecmd_shell_domtrans" lineno="618"> <summary> Execute a shell in the specified domain. </summary> @@ -10171,7 +10245,7 @@ The type of the shell process. </summary> </param> </interface> -<interface name="corecmd_exec_chroot" lineno="619"> +<interface name="corecmd_exec_chroot" lineno="637"> <summary> Execute chroot in the caller domain. </summary> @@ -10181,7 +10255,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_getattr_all_executables" lineno="640"> +<interface name="corecmd_getattr_all_executables" lineno="658"> <summary> Get the attributes of all executable files. </summary> @@ -10192,7 +10266,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_read_all_executables" lineno="661"> +<interface name="corecmd_read_all_executables" lineno="679"> <summary> Read all executable files. </summary> @@ -10203,7 +10277,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_exec_all_executables" lineno="681"> +<interface name="corecmd_exec_all_executables" lineno="699"> <summary> Execute all executable files. </summary> @@ -10214,7 +10288,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_dontaudit_exec_all_executables" lineno="702"> +<interface name="corecmd_dontaudit_exec_all_executables" lineno="720"> <summary> Do not audit attempts to execute all executables. </summary> @@ -10224,7 +10298,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corecmd_manage_all_executables" lineno="721"> +<interface name="corecmd_manage_all_executables" lineno="739"> <summary> Create, read, write, and all executable files. </summary> @@ -10235,7 +10309,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_relabel_all_executables" lineno="743"> +<interface name="corecmd_relabel_all_executables" lineno="761"> <summary> Relabel to and from the bin type. </summary> @@ -10246,7 +10320,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_mmap_all_executables" lineno="763"> +<interface name="corecmd_mmap_all_executables" lineno="781"> <summary> Mmap all executables as executable. </summary> @@ -10256,7 +10330,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_relabel_bin_dirs" lineno="785"> +<interface name="corecmd_relabel_bin_dirs" lineno="803"> <summary> Relabel to and from the bin type. </summary> @@ -10266,7 +10340,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_relabel_bin_lnk_files" lineno="803"> +<interface name="corecmd_relabel_bin_lnk_files" lineno="821"> <summary> Relabel to and from the bin type. </summary> @@ -10893,7 +10967,17 @@ Domain allowed access. </param> <infoflow type="read" weight="1"/> </interface> -<interface name="corenet_udp_bind_generic_node" lineno="942"> +<interface name="corenet_dontaudit_tcp_bind_generic_node" lineno="927"> +<summary> +Do not audit denials on binding TCP sockets to generic nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_udp_bind_generic_node" lineno="960"> <summary> Bind UDP sockets to generic nodes. </summary> @@ -10918,7 +11002,7 @@ Domain allowed access. </param> <infoflow type="read" weight="1"/> </interface> -<interface name="corenet_raw_bind_generic_node" lineno="961"> +<interface name="corenet_raw_bind_generic_node" lineno="979"> <summary> Bind raw sockets to generic nodes. </summary> @@ -10928,7 +11012,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_out_generic_node" lineno="980"> +<interface name="corenet_out_generic_node" lineno="998"> <summary> Allow outgoing network traffic to generic nodes. </summary> @@ -10939,7 +11023,7 @@ The peer label of the outgoing network traffic. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_in_generic_node" lineno="999"> +<interface name="corenet_in_generic_node" lineno="1017"> <summary> Allow incoming network traffic from generic nodes. </summary> @@ -10950,7 +11034,7 @@ The peer label of the incoming network traffic. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_inout_generic_node" lineno="1018"> +<interface name="corenet_inout_generic_node" lineno="1036"> <summary> Allow incoming and outgoing network traffic with generic nodes. </summary> @@ -10961,7 +11045,7 @@ The peer label of the network traffic. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_tcp_sendrecv_all_nodes" lineno="1033"> +<interface name="corenet_tcp_sendrecv_all_nodes" lineno="1051"> <summary> Send and receive TCP network traffic on all nodes. </summary> @@ -10971,7 +11055,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_send_all_nodes" lineno="1051"> +<interface name="corenet_udp_send_all_nodes" lineno="1069"> <summary> Send UDP network traffic on all nodes. </summary> @@ -10981,7 +11065,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_send_all_nodes" lineno="1070"> +<interface name="corenet_dontaudit_udp_send_all_nodes" lineno="1088"> <summary> Do not audit attempts to send UDP network traffic on any nodes. @@ -10992,7 +11076,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_sctp_sendrecv_all_nodes" lineno="1088"> +<interface name="corenet_sctp_sendrecv_all_nodes" lineno="1106"> <summary> Send and receive SCTP network traffic on all nodes. </summary> @@ -11002,7 +11086,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_receive_all_nodes" lineno="1106"> +<interface name="corenet_udp_receive_all_nodes" lineno="1124"> <summary> Receive UDP network traffic on all nodes. </summary> @@ -11012,7 +11096,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_receive_all_nodes" lineno="1125"> +<interface name="corenet_dontaudit_udp_receive_all_nodes" lineno="1143"> <summary> Do not audit attempts to receive UDP network traffic on all nodes. @@ -11023,7 +11107,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_udp_sendrecv_all_nodes" lineno="1143"> +<interface name="corenet_udp_sendrecv_all_nodes" lineno="1161"> <summary> Send and receive UDP network traffic on all nodes. </summary> @@ -11033,7 +11117,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_all_nodes" lineno="1159"> +<interface name="corenet_dontaudit_udp_sendrecv_all_nodes" lineno="1177"> <summary> Do not audit attempts to send and receive UDP network traffic on any nodes nodes. @@ -11044,7 +11128,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_raw_send_all_nodes" lineno="1174"> +<interface name="corenet_raw_send_all_nodes" lineno="1192"> <summary> Send raw IP packets on all nodes. </summary> @@ -11054,7 +11138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_raw_receive_all_nodes" lineno="1192"> +<interface name="corenet_raw_receive_all_nodes" lineno="1210"> <summary> Receive raw IP packets on all nodes. </summary> @@ -11064,7 +11148,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_raw_sendrecv_all_nodes" lineno="1210"> +<interface name="corenet_raw_sendrecv_all_nodes" lineno="1228"> <summary> Send and receive raw IP packets on all nodes. </summary> @@ -11074,7 +11158,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_bind_all_nodes" lineno="1225"> +<interface name="corenet_tcp_bind_all_nodes" lineno="1243"> <summary> Bind TCP sockets to all nodes. </summary> @@ -11084,7 +11168,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_bind_all_nodes" lineno="1243"> +<interface name="corenet_udp_bind_all_nodes" lineno="1261"> <summary> Bind UDP sockets to all nodes. </summary> @@ -11094,7 +11178,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_raw_bind_all_nodes" lineno="1262"> +<interface name="corenet_raw_bind_all_nodes" lineno="1280"> <summary> Bind raw sockets to all nodes. </summary> @@ -11104,7 +11188,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_generic_port" lineno="1280"> +<interface name="corenet_tcp_sendrecv_generic_port" lineno="1298"> <summary> Send and receive TCP network traffic on generic ports. </summary> @@ -11114,7 +11198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_bind_all_nodes" lineno="1294"> +<interface name="corenet_sctp_bind_all_nodes" lineno="1312"> <summary> Bind SCTP sockets to all nodes. </summary> @@ -11124,7 +11208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1313"> +<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1331"> <summary> Do not audit send and receive TCP network traffic on generic ports. </summary> @@ -11134,7 +11218,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_send_generic_port" lineno="1327"> +<interface name="corenet_udp_send_generic_port" lineno="1345"> <summary> Send UDP network traffic on generic ports. </summary> @@ -11144,7 +11228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_receive_generic_port" lineno="1341"> +<interface name="corenet_udp_receive_generic_port" lineno="1359"> <summary> Receive UDP network traffic on generic ports. </summary> @@ -11154,7 +11238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_sendrecv_generic_port" lineno="1355"> +<interface name="corenet_udp_sendrecv_generic_port" lineno="1373"> <summary> Send and receive UDP network traffic on generic ports. </summary> @@ -11164,7 +11248,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_bind_generic_port" lineno="1369"> +<interface name="corenet_tcp_bind_generic_port" lineno="1387"> <summary> Bind TCP sockets to generic ports. </summary> @@ -11174,7 +11258,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1389"> +<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1407"> <summary> Do not audit bind TCP sockets to generic ports. </summary> @@ -11184,7 +11268,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_udp_bind_generic_port" lineno="1407"> +<interface name="corenet_udp_bind_generic_port" lineno="1425"> <summary> Bind UDP sockets to generic ports. </summary> @@ -11194,7 +11278,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_connect_generic_port" lineno="1427"> +<interface name="corenet_tcp_connect_generic_port" lineno="1445"> <summary> Connect TCP sockets to generic ports. </summary> @@ -11204,7 +11288,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_all_ports" lineno="1471"> +<interface name="corenet_tcp_sendrecv_all_ports" lineno="1489"> <summary> Send and receive TCP network traffic on all ports. </summary> @@ -11240,7 +11324,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_all_ports" lineno="1485"> +<interface name="corenet_udp_send_all_ports" lineno="1503"> <summary> Send UDP network traffic on all ports. </summary> @@ -11250,7 +11334,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_bind_generic_port" lineno="1499"> +<interface name="corenet_sctp_bind_generic_port" lineno="1517"> <summary> Bind SCTP sockets to generic ports. </summary> @@ -11260,7 +11344,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_receive_all_ports" lineno="1519"> +<interface name="corenet_udp_receive_all_ports" lineno="1537"> <summary> Receive UDP network traffic on all ports. </summary> @@ -11270,7 +11354,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_sendrecv_all_ports" lineno="1557"> +<interface name="corenet_udp_sendrecv_all_ports" lineno="1575"> <summary> Send and receive UDP network traffic on all ports. </summary> @@ -11304,7 +11388,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1572"> +<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1590"> <summary> Do not audit attempts to bind SCTP sockets to generic ports. @@ -11315,7 +11399,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_bind_all_ports" lineno="1590"> +<interface name="corenet_tcp_bind_all_ports" lineno="1608"> <summary> Bind TCP sockets to all ports. </summary> @@ -11325,7 +11409,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1609"> +<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1627"> <summary> Do not audit attepts to bind TCP sockets to any ports. </summary> @@ -11335,7 +11419,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_udp_bind_all_ports" lineno="1627"> +<interface name="corenet_udp_bind_all_ports" lineno="1645"> <summary> Bind UDP sockets to all ports. </summary> @@ -11345,7 +11429,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_connect_generic_port" lineno="1646"> +<interface name="corenet_sctp_connect_generic_port" lineno="1664"> <summary> Connect SCTP sockets to generic ports. </summary> @@ -11355,7 +11439,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1664"> +<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1682"> <summary> Do not audit attepts to bind UDP sockets to any ports. </summary> @@ -11365,7 +11449,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_connect_all_ports" lineno="1710"> +<interface name="corenet_tcp_connect_all_ports" lineno="1728"> <summary> Connect TCP sockets to all ports. </summary> @@ -11403,7 +11487,7 @@ Domain allowed access. </param> <infoflow type="write" weight="1"/> </interface> -<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1729"> +<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1747"> <summary> Do not audit attempts to connect TCP sockets to all ports. @@ -11414,7 +11498,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1747"> +<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1765"> <summary> Send and receive TCP network traffic on generic reserved ports. </summary> @@ -11424,7 +11508,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_send_reserved_port" lineno="1761"> +<interface name="corenet_udp_send_reserved_port" lineno="1779"> <summary> Send UDP network traffic on generic reserved ports. </summary> @@ -11434,7 +11518,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_receive_reserved_port" lineno="1775"> +<interface name="corenet_udp_receive_reserved_port" lineno="1793"> <summary> Receive UDP network traffic on generic reserved ports. </summary> @@ -11444,7 +11528,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_sendrecv_reserved_port" lineno="1789"> +<interface name="corenet_udp_sendrecv_reserved_port" lineno="1807"> <summary> Send and receive UDP network traffic on generic reserved ports. </summary> @@ -11454,7 +11538,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_bind_reserved_port" lineno="1803"> +<interface name="corenet_tcp_bind_reserved_port" lineno="1821"> <summary> Bind TCP sockets to generic reserved ports. </summary> @@ -11464,7 +11548,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_bind_all_ports" lineno="1822"> +<interface name="corenet_sctp_bind_all_ports" lineno="1840"> <summary> Bind SCTP sockets to all ports. </summary> @@ -11474,7 +11558,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_bind_reserved_port" lineno="1841"> +<interface name="corenet_udp_bind_reserved_port" lineno="1859"> <summary> Bind UDP sockets to generic reserved ports. </summary> @@ -11484,7 +11568,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_connect_reserved_port" lineno="1860"> +<interface name="corenet_tcp_connect_reserved_port" lineno="1878"> <summary> Connect TCP sockets to generic reserved ports. </summary> @@ -11494,7 +11578,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1878"> +<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1896"> <summary> Do not audit attempts to bind SCTP sockets to any ports. </summary> @@ -11504,7 +11588,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1896"> +<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1914"> <summary> Send and receive TCP network traffic on all reserved ports. </summary> @@ -11514,7 +11598,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_send_all_reserved_ports" lineno="1910"> +<interface name="corenet_udp_send_all_reserved_ports" lineno="1928"> <summary> Send UDP network traffic on all reserved ports. </summary> @@ -11524,7 +11608,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_receive_all_reserved_ports" lineno="1924"> +<interface name="corenet_udp_receive_all_reserved_ports" lineno="1942"> <summary> Receive UDP network traffic on all reserved ports. </summary> @@ -11534,7 +11618,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1938"> +<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1956"> <summary> Send and receive UDP network traffic on all reserved ports. </summary> @@ -11544,7 +11628,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_connect_all_ports" lineno="1952"> +<interface name="corenet_sctp_connect_all_ports" lineno="1970"> <summary> Connect SCTP sockets to all ports. </summary> @@ -11554,7 +11638,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_bind_all_reserved_ports" lineno="1970"> +<interface name="corenet_tcp_bind_all_reserved_ports" lineno="1988"> <summary> Bind TCP sockets to all reserved ports. </summary> @@ -11564,7 +11648,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="1989"> +<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="2007"> <summary> Do not audit attempts to bind TCP sockets to all reserved ports. </summary> @@ -11574,7 +11658,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_udp_bind_all_reserved_ports" lineno="2007"> +<interface name="corenet_udp_bind_all_reserved_ports" lineno="2025"> <summary> Bind UDP sockets to all reserved ports. </summary> @@ -11584,7 +11668,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2026"> +<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2044"> <summary> Do not audit attempts to bind UDP sockets to all reserved ports. </summary> @@ -11594,7 +11678,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2045"> +<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2063"> <summary> Do not audit attempts to connect SCTP sockets to all ports. @@ -11605,7 +11689,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2063"> +<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2081"> <summary> Bind TCP sockets to all ports > 1024. </summary> @@ -11615,7 +11699,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2081"> +<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2099"> <summary> Bind UDP sockets to all ports > 1024. </summary> @@ -11625,7 +11709,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2099"> +<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2117"> <summary> Connect TCP sockets to reserved ports. </summary> @@ -11635,7 +11719,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2117"> +<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2135"> <summary> Connect SCTP sockets to all ports > 1024. </summary> @@ -11645,7 +11729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2136"> +<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2154"> <summary> Do not audit connect attempts to TCP sockets on ports greater than 1024. @@ -11656,7 +11740,7 @@ Domain not to audit access to. </summary> </param> </interface> -<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2154"> +<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2172"> <summary> Connect TCP sockets to all ports > 1024. </summary> @@ -11666,7 +11750,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2173"> +<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2191"> <summary> Do not audit attempts to connect TCP sockets all reserved ports. @@ -11677,7 +11761,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2191"> +<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2209"> <summary> Connect TCP sockets to rpc ports. </summary> @@ -11687,7 +11771,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2210"> +<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2228"> <summary> Do not audit attempts to connect TCP sockets all rpc ports. @@ -11698,7 +11782,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_sctp_bind_reserved_port" lineno="2228"> +<interface name="corenet_sctp_bind_reserved_port" lineno="2246"> <summary> Bind SCTP sockets to generic reserved ports. </summary> @@ -11708,7 +11792,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_read_tun_tap_dev" lineno="2247"> +<interface name="corenet_read_tun_tap_dev" lineno="2265"> <summary> Read the TUN/TAP virtual network device. </summary> @@ -11718,7 +11802,7 @@ The domain read allowed access. </summary> </param> </interface> -<interface name="corenet_write_tun_tap_dev" lineno="2266"> +<interface name="corenet_write_tun_tap_dev" lineno="2284"> <summary> Write the TUN/TAP virtual network device. </summary> @@ -11728,7 +11812,7 @@ The domain allowed write access. </summary> </param> </interface> -<interface name="corenet_rw_tun_tap_dev" lineno="2285"> +<interface name="corenet_rw_tun_tap_dev" lineno="2303"> <summary> Read and write the TUN/TAP virtual network device. </summary> @@ -11738,7 +11822,7 @@ The domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_connect_reserved_port" lineno="2304"> +<interface name="corenet_sctp_connect_reserved_port" lineno="2322"> <summary> Connect SCTP sockets to generic reserved ports. </summary> @@ -11748,7 +11832,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2323"> +<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2341"> <summary> Do not audit attempts to read or write the TUN/TAP virtual network device. @@ -11759,7 +11843,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_getattr_ppp_dev" lineno="2341"> +<interface name="corenet_getattr_ppp_dev" lineno="2359"> <summary> Getattr the point-to-point device. </summary> @@ -11769,7 +11853,7 @@ The domain allowed access. </summary> </param> </interface> -<interface name="corenet_rw_ppp_dev" lineno="2359"> +<interface name="corenet_rw_ppp_dev" lineno="2377"> <summary> Read and write the point-to-point device. </summary> @@ -11779,7 +11863,7 @@ The domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2378"> +<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2396"> <summary> Bind TCP sockets to all RPC ports. </summary> @@ -11789,7 +11873,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2397"> +<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2415"> <summary> Do not audit attempts to bind TCP sockets to all RPC ports. </summary> @@ -11799,7 +11883,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_udp_bind_all_rpc_ports" lineno="2415"> +<interface name="corenet_udp_bind_all_rpc_ports" lineno="2433"> <summary> Bind UDP sockets to all RPC ports. </summary> @@ -11809,7 +11893,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2434"> +<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2452"> <summary> Do not audit attempts to bind UDP sockets to all RPC ports. </summary> @@ -11819,7 +11903,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2452"> +<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2470"> <summary> Bind SCTP sockets to all reserved ports. </summary> @@ -11829,7 +11913,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_recvfrom_netlabel" lineno="2471"> +<interface name="corenet_tcp_recvfrom_netlabel" lineno="2489"> <summary> Receive TCP packets from a NetLabel connection. </summary> @@ -11839,7 +11923,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2490"> +<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2508"> <summary> Receive TCP packets from an unlabled connection. </summary> @@ -11849,7 +11933,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2510"> +<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2528"> <summary> Do not audit attempts to bind SCTP sockets to all reserved ports. </summary> @@ -11859,7 +11943,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2529"> +<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2547"> <summary> Do not audit attempts to receive TCP packets from a NetLabel connection. @@ -11870,7 +11954,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2549"> +<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2567"> <summary> Do not audit attempts to receive TCP packets from an unlabeled connection. @@ -11881,7 +11965,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_udp_recvfrom_netlabel" lineno="2569"> +<interface name="corenet_udp_recvfrom_netlabel" lineno="2587"> <summary> Receive UDP packets from a NetLabel connection. </summary> @@ -11891,7 +11975,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_udp_recvfrom_unlabeled" lineno="2588"> +<interface name="corenet_udp_recvfrom_unlabeled" lineno="2606"> <summary> Receive UDP packets from an unlabeled connection. </summary> @@ -11901,7 +11985,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2608"> +<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2626"> <summary> Bind SCTP sockets to all ports > 1024. </summary> @@ -11911,7 +11995,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2627"> +<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2645"> <summary> Do not audit attempts to receive UDP packets from a NetLabel connection. @@ -11922,7 +12006,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2647"> +<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2665"> <summary> Do not audit attempts to receive UDP packets from an unlabeled connection. @@ -11933,7 +12017,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_raw_recvfrom_netlabel" lineno="2667"> +<interface name="corenet_raw_recvfrom_netlabel" lineno="2685"> <summary> Receive Raw IP packets from a NetLabel connection. </summary> @@ -11943,7 +12027,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_raw_recvfrom_unlabeled" lineno="2686"> +<interface name="corenet_raw_recvfrom_unlabeled" lineno="2704"> <summary> Receive Raw IP packets from an unlabeled connection. </summary> @@ -11953,7 +12037,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2707"> +<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2725"> <summary> Do not audit attempts to receive Raw IP packets from a NetLabel connection. @@ -11964,7 +12048,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2726"> +<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2744"> <summary> Connect SCTP sockets to reserved ports. </summary> @@ -11974,7 +12058,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2745"> +<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2763"> <summary> Do not audit attempts to receive Raw IP packets from an unlabeled connection. @@ -11985,7 +12069,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_all_recvfrom_unlabeled" lineno="2777"> +<interface name="corenet_all_recvfrom_unlabeled" lineno="2795"> <summary> Receive packets from an unlabeled connection. </summary> @@ -12007,7 +12091,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_all_recvfrom_netlabel" lineno="2810"> +<interface name="corenet_all_recvfrom_netlabel" lineno="2828"> <summary> Receive packets from a NetLabel connection. </summary> @@ -12028,7 +12112,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2829"> +<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2847"> <summary> Do not audit attempts to receive packets from an unlabeled connection. </summary> @@ -12038,7 +12122,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2852"> +<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2870"> <summary> Do not audit attempts to connect SCTP sockets all reserved ports. @@ -12049,7 +12133,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2871"> +<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2889"> <summary> Do not audit attempts to receive packets from a NetLabel connection. @@ -12060,7 +12144,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corenet_tcp_recvfrom_labeled" lineno="2903"> +<interface name="corenet_tcp_recvfrom_labeled" lineno="2921"> <summary> Rules for receiving labeled TCP packets. </summary> @@ -12083,7 +12167,7 @@ Peer domain. </summary> </param> </interface> -<interface name="corenet_udp_recvfrom_labeled" lineno="2931"> +<interface name="corenet_udp_recvfrom_labeled" lineno="2949"> <summary> Rules for receiving labeled UDP packets. </summary> @@ -12098,7 +12182,7 @@ Peer domain. </summary> </param> </interface> -<interface name="corenet_raw_recvfrom_labeled" lineno="2956"> +<interface name="corenet_raw_recvfrom_labeled" lineno="2974"> <summary> Rules for receiving labeled raw IP packets. </summary> @@ -12113,7 +12197,7 @@ Peer domain. </summary> </param> </interface> -<interface name="corenet_all_recvfrom_labeled" lineno="2990"> +<interface name="corenet_all_recvfrom_labeled" lineno="3008"> <summary> Rules for receiving labeled packets via TCP, UDP and raw IP. </summary> @@ -12137,7 +12221,7 @@ Peer domain. </summary> </param> </interface> -<interface name="corenet_setcontext_all_spds" lineno="3008"> +<interface name="corenet_setcontext_all_spds" lineno="3026"> <summary> Allow specified type to set the context of a SPD entry for labeled ipsec associations. @@ -12148,7 +12232,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_generic_client_packets" lineno="3026"> +<interface name="corenet_send_generic_client_packets" lineno="3044"> <summary> Send generic client packets. </summary> @@ -12158,7 +12242,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_receive_generic_client_packets" lineno="3044"> +<interface name="corenet_receive_generic_client_packets" lineno="3062"> <summary> Receive generic client packets. </summary> @@ -12168,7 +12252,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_generic_client_packets" lineno="3062"> +<interface name="corenet_sendrecv_generic_client_packets" lineno="3080"> <summary> Send and receive generic client packets. </summary> @@ -12178,7 +12262,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_relabelto_generic_client_packets" lineno="3077"> +<interface name="corenet_relabelto_generic_client_packets" lineno="3095"> <summary> Relabel packets to the generic client packet type. </summary> @@ -12188,7 +12272,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_generic_server_packets" lineno="3095"> +<interface name="corenet_send_generic_server_packets" lineno="3113"> <summary> Send generic server packets. </summary> @@ -12198,7 +12282,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_receive_generic_server_packets" lineno="3113"> +<interface name="corenet_receive_generic_server_packets" lineno="3131"> <summary> Receive generic server packets. </summary> @@ -12208,7 +12292,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_generic_server_packets" lineno="3131"> +<interface name="corenet_sendrecv_generic_server_packets" lineno="3149"> <summary> Send and receive generic server packets. </summary> @@ -12218,7 +12302,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_relabelto_generic_server_packets" lineno="3146"> +<interface name="corenet_relabelto_generic_server_packets" lineno="3164"> <summary> Relabel packets to the generic server packet type. </summary> @@ -12228,7 +12312,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_unlabeled_packets" lineno="3171"> +<interface name="corenet_sendrecv_unlabeled_packets" lineno="3189"> <summary> Send and receive unlabeled packets. </summary> @@ -12245,7 +12329,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_all_client_packets" lineno="3185"> +<interface name="corenet_send_all_client_packets" lineno="3203"> <summary> Send all client packets. </summary> @@ -12255,7 +12339,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_receive_all_client_packets" lineno="3203"> +<interface name="corenet_receive_all_client_packets" lineno="3221"> <summary> Receive all client packets. </summary> @@ -12265,7 +12349,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_all_client_packets" lineno="3221"> +<interface name="corenet_sendrecv_all_client_packets" lineno="3239"> <summary> Send and receive all client packets. </summary> @@ -12275,7 +12359,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_relabelto_all_client_packets" lineno="3236"> +<interface name="corenet_relabelto_all_client_packets" lineno="3254"> <summary> Relabel packets to any client packet type. </summary> @@ -12285,7 +12369,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_all_server_packets" lineno="3254"> +<interface name="corenet_send_all_server_packets" lineno="3272"> <summary> Send all server packets. </summary> @@ -12295,7 +12379,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_recvfrom_netlabel" lineno="3272"> +<interface name="corenet_sctp_recvfrom_netlabel" lineno="3290"> <summary> Receive SCTP packets from a NetLabel connection. </summary> @@ -12305,7 +12389,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_receive_all_server_packets" lineno="3290"> +<interface name="corenet_receive_all_server_packets" lineno="3308"> <summary> Receive all server packets. </summary> @@ -12315,7 +12399,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_all_server_packets" lineno="3308"> +<interface name="corenet_sendrecv_all_server_packets" lineno="3326"> <summary> Send and receive all server packets. </summary> @@ -12325,7 +12409,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_relabelto_all_server_packets" lineno="3323"> +<interface name="corenet_relabelto_all_server_packets" lineno="3341"> <summary> Relabel packets to any server packet type. </summary> @@ -12335,7 +12419,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3341"> +<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3359"> <summary> Receive SCTP packets from an unlabled connection. </summary> @@ -12345,7 +12429,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_all_packets" lineno="3356"> +<interface name="corenet_send_all_packets" lineno="3374"> <summary> Send all packets. </summary> @@ -12355,7 +12439,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_receive_all_packets" lineno="3374"> +<interface name="corenet_receive_all_packets" lineno="3392"> <summary> Receive all packets. </summary> @@ -12365,7 +12449,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sendrecv_all_packets" lineno="3392"> +<interface name="corenet_sendrecv_all_packets" lineno="3410"> <summary> Send and receive all packets. </summary> @@ -12375,7 +12459,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_relabelto_all_packets" lineno="3407"> +<interface name="corenet_relabelto_all_packets" lineno="3425"> <summary> Relabel packets to any packet type. </summary> @@ -12385,7 +12469,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3425"> +<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3443"> <summary> Access unlabeled infiniband pkeys. </summary> @@ -12395,7 +12479,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_ib_access_all_pkeys" lineno="3439"> +<interface name="corenet_ib_access_all_pkeys" lineno="3457"> <summary> Access all labeled infiniband pkeys. </summary> @@ -12405,7 +12489,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_ib_manage_subnet_all_endports" lineno="3457"> +<interface name="corenet_ib_manage_subnet_all_endports" lineno="3475"> <summary> Manage subnets on all labeled Infiniband endports </summary> @@ -12415,7 +12499,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3475"> +<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3493"> <summary> Manage subnet on all unlabeled Infiniband endports </summary> @@ -12425,7 +12509,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_sctp_recvfrom_labeled" lineno="3494"> +<interface name="corenet_sctp_recvfrom_labeled" lineno="3512"> <summary> Rules for receiving labeled SCTP packets. </summary> @@ -12440,7 +12524,7 @@ Peer domain. </summary> </param> </interface> -<interface name="corenet_unconfined" lineno="3517"> +<interface name="corenet_unconfined" lineno="3535"> <summary> Unconfined access to network objects. </summary> @@ -12450,7 +12534,7 @@ The domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_icmp_packets" lineno="3537"> +<interface name="corenet_send_icmp_packets" lineno="3555"> <summary> Send icmp packets. </summary> @@ -12461,7 +12545,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_icmp_packets" lineno="3556"> +<interface name="corenet_dontaudit_send_icmp_packets" lineno="3574"> <summary> Do not audit attempts to send icmp packets. </summary> @@ -12472,7 +12556,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_icmp_packets" lineno="3575"> +<interface name="corenet_receive_icmp_packets" lineno="3593"> <summary> Receive icmp packets. </summary> @@ -12483,7 +12567,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_icmp_packets" lineno="3594"> +<interface name="corenet_dontaudit_receive_icmp_packets" lineno="3612"> <summary> Do not audit attempts to receive icmp packets. </summary> @@ -12494,7 +12578,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_icmp_packets" lineno="3613"> +<interface name="corenet_sendrecv_icmp_packets" lineno="3631"> <summary> Send and receive icmp packets. </summary> @@ -12505,7 +12589,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_icmp_packets" lineno="3629"> +<interface name="corenet_dontaudit_sendrecv_icmp_packets" lineno="3647"> <summary> Do not audit attempts to send and receive icmp packets. </summary> @@ -12516,7 +12600,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_icmp_packets" lineno="3644"> +<interface name="corenet_relabelto_icmp_packets" lineno="3662"> <summary> Relabel packets to icmp the packet type. </summary> @@ -12526,7 +12610,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_adb_port" lineno="3666"> +<interface name="corenet_tcp_sendrecv_adb_port" lineno="3684"> <summary> Send and receive TCP traffic on the adb port. </summary> @@ -12537,7 +12621,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_adb_port" lineno="3681"> +<interface name="corenet_udp_send_adb_port" lineno="3699"> <summary> Send UDP traffic on the adb port. </summary> @@ -12548,7 +12632,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3696"> +<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3714"> <summary> Do not audit attempts to send UDP traffic on the adb port. </summary> @@ -12559,7 +12643,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_adb_port" lineno="3711"> +<interface name="corenet_udp_receive_adb_port" lineno="3729"> <summary> Receive UDP traffic on the adb port. </summary> @@ -12570,7 +12654,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3726"> +<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3744"> <summary> Do not audit attempts to receive UDP traffic on the adb port. </summary> @@ -12581,7 +12665,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_adb_port" lineno="3741"> +<interface name="corenet_udp_sendrecv_adb_port" lineno="3759"> <summary> Send and receive UDP traffic on the adb port. </summary> @@ -12592,7 +12676,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3757"> +<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3775"> <summary> Do not audit attempts to send and receive UDP traffic on the adb port. @@ -12604,7 +12688,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_adb_port" lineno="3772"> +<interface name="corenet_tcp_bind_adb_port" lineno="3790"> <summary> Bind TCP sockets to the adb port. </summary> @@ -12615,7 +12699,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_adb_port" lineno="3792"> +<interface name="corenet_udp_bind_adb_port" lineno="3810"> <summary> Bind UDP sockets to the adb port. </summary> @@ -12626,7 +12710,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_adb_port" lineno="3811"> +<interface name="corenet_tcp_connect_adb_port" lineno="3829"> <summary> Make a TCP connection to the adb port. </summary> @@ -12636,7 +12720,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_adb_client_packets" lineno="3831"> +<interface name="corenet_send_adb_client_packets" lineno="3849"> <summary> Send adb_client packets. </summary> @@ -12647,7 +12731,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3850"> +<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3868"> <summary> Do not audit attempts to send adb_client packets. </summary> @@ -12658,7 +12742,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_adb_client_packets" lineno="3869"> +<interface name="corenet_receive_adb_client_packets" lineno="3887"> <summary> Receive adb_client packets. </summary> @@ -12669,7 +12753,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3888"> +<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3906"> <summary> Do not audit attempts to receive adb_client packets. </summary> @@ -12680,7 +12764,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_adb_client_packets" lineno="3907"> +<interface name="corenet_sendrecv_adb_client_packets" lineno="3925"> <summary> Send and receive adb_client packets. </summary> @@ -12691,7 +12775,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3923"> +<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3941"> <summary> Do not audit attempts to send and receive adb_client packets. </summary> @@ -12702,7 +12786,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_adb_client_packets" lineno="3938"> +<interface name="corenet_relabelto_adb_client_packets" lineno="3956"> <summary> Relabel packets to adb_client the packet type. </summary> @@ -12712,7 +12796,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_adb_server_packets" lineno="3958"> +<interface name="corenet_send_adb_server_packets" lineno="3976"> <summary> Send adb_server packets. </summary> @@ -12723,7 +12807,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3977"> +<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3995"> <summary> Do not audit attempts to send adb_server packets. </summary> @@ -12734,7 +12818,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_adb_server_packets" lineno="3996"> +<interface name="corenet_receive_adb_server_packets" lineno="4014"> <summary> Receive adb_server packets. </summary> @@ -12745,7 +12829,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4015"> +<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4033"> <summary> Do not audit attempts to receive adb_server packets. </summary> @@ -12756,7 +12840,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_adb_server_packets" lineno="4034"> +<interface name="corenet_sendrecv_adb_server_packets" lineno="4052"> <summary> Send and receive adb_server packets. </summary> @@ -12767,7 +12851,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4050"> +<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4068"> <summary> Do not audit attempts to send and receive adb_server packets. </summary> @@ -12778,7 +12862,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_adb_server_packets" lineno="4065"> +<interface name="corenet_relabelto_adb_server_packets" lineno="4083"> <summary> Relabel packets to adb_server the packet type. </summary> @@ -12788,7 +12872,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4087"> +<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4105"> <summary> Send and receive TCP traffic on the afs_bos port. </summary> @@ -12799,7 +12883,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs_bos_port" lineno="4102"> +<interface name="corenet_udp_send_afs_bos_port" lineno="4120"> <summary> Send UDP traffic on the afs_bos port. </summary> @@ -12810,7 +12894,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4117"> +<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4135"> <summary> Do not audit attempts to send UDP traffic on the afs_bos port. </summary> @@ -12821,7 +12905,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs_bos_port" lineno="4132"> +<interface name="corenet_udp_receive_afs_bos_port" lineno="4150"> <summary> Receive UDP traffic on the afs_bos port. </summary> @@ -12832,7 +12916,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4147"> +<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4165"> <summary> Do not audit attempts to receive UDP traffic on the afs_bos port. </summary> @@ -12843,7 +12927,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4162"> +<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4180"> <summary> Send and receive UDP traffic on the afs_bos port. </summary> @@ -12854,7 +12938,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4178"> +<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4196"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_bos port. @@ -12866,7 +12950,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs_bos_port" lineno="4193"> +<interface name="corenet_tcp_bind_afs_bos_port" lineno="4211"> <summary> Bind TCP sockets to the afs_bos port. </summary> @@ -12877,7 +12961,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_bos_port" lineno="4213"> +<interface name="corenet_udp_bind_afs_bos_port" lineno="4231"> <summary> Bind UDP sockets to the afs_bos port. </summary> @@ -12888,7 +12972,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_bos_port" lineno="4232"> +<interface name="corenet_tcp_connect_afs_bos_port" lineno="4250"> <summary> Make a TCP connection to the afs_bos port. </summary> @@ -12898,7 +12982,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_bos_client_packets" lineno="4252"> +<interface name="corenet_send_afs_bos_client_packets" lineno="4270"> <summary> Send afs_bos_client packets. </summary> @@ -12909,7 +12993,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4271"> +<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4289"> <summary> Do not audit attempts to send afs_bos_client packets. </summary> @@ -12920,7 +13004,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_bos_client_packets" lineno="4290"> +<interface name="corenet_receive_afs_bos_client_packets" lineno="4308"> <summary> Receive afs_bos_client packets. </summary> @@ -12931,7 +13015,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4309"> +<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4327"> <summary> Do not audit attempts to receive afs_bos_client packets. </summary> @@ -12942,7 +13026,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4328"> +<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4346"> <summary> Send and receive afs_bos_client packets. </summary> @@ -12953,7 +13037,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4344"> +<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4362"> <summary> Do not audit attempts to send and receive afs_bos_client packets. </summary> @@ -12964,7 +13048,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4359"> +<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4377"> <summary> Relabel packets to afs_bos_client the packet type. </summary> @@ -12974,7 +13058,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_bos_server_packets" lineno="4379"> +<interface name="corenet_send_afs_bos_server_packets" lineno="4397"> <summary> Send afs_bos_server packets. </summary> @@ -12985,7 +13069,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4398"> +<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4416"> <summary> Do not audit attempts to send afs_bos_server packets. </summary> @@ -12996,7 +13080,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_bos_server_packets" lineno="4417"> +<interface name="corenet_receive_afs_bos_server_packets" lineno="4435"> <summary> Receive afs_bos_server packets. </summary> @@ -13007,7 +13091,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4436"> +<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4454"> <summary> Do not audit attempts to receive afs_bos_server packets. </summary> @@ -13018,7 +13102,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4455"> +<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4473"> <summary> Send and receive afs_bos_server packets. </summary> @@ -13029,7 +13113,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4471"> +<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4489"> <summary> Do not audit attempts to send and receive afs_bos_server packets. </summary> @@ -13040,7 +13124,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4486"> +<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4504"> <summary> Relabel packets to afs_bos_server the packet type. </summary> @@ -13050,7 +13134,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4508"> +<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4526"> <summary> Send and receive TCP traffic on the afs_fs port. </summary> @@ -13061,7 +13145,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs_fs_port" lineno="4523"> +<interface name="corenet_udp_send_afs_fs_port" lineno="4541"> <summary> Send UDP traffic on the afs_fs port. </summary> @@ -13072,7 +13156,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4538"> +<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4556"> <summary> Do not audit attempts to send UDP traffic on the afs_fs port. </summary> @@ -13083,7 +13167,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs_fs_port" lineno="4553"> +<interface name="corenet_udp_receive_afs_fs_port" lineno="4571"> <summary> Receive UDP traffic on the afs_fs port. </summary> @@ -13094,7 +13178,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4568"> +<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4586"> <summary> Do not audit attempts to receive UDP traffic on the afs_fs port. </summary> @@ -13105,7 +13189,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4583"> +<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4601"> <summary> Send and receive UDP traffic on the afs_fs port. </summary> @@ -13116,7 +13200,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4599"> +<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4617"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_fs port. @@ -13128,7 +13212,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs_fs_port" lineno="4614"> +<interface name="corenet_tcp_bind_afs_fs_port" lineno="4632"> <summary> Bind TCP sockets to the afs_fs port. </summary> @@ -13139,7 +13223,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_fs_port" lineno="4634"> +<interface name="corenet_udp_bind_afs_fs_port" lineno="4652"> <summary> Bind UDP sockets to the afs_fs port. </summary> @@ -13150,7 +13234,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_fs_port" lineno="4653"> +<interface name="corenet_tcp_connect_afs_fs_port" lineno="4671"> <summary> Make a TCP connection to the afs_fs port. </summary> @@ -13160,7 +13244,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_fs_client_packets" lineno="4673"> +<interface name="corenet_send_afs_fs_client_packets" lineno="4691"> <summary> Send afs_fs_client packets. </summary> @@ -13171,7 +13255,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4692"> +<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4710"> <summary> Do not audit attempts to send afs_fs_client packets. </summary> @@ -13182,7 +13266,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_fs_client_packets" lineno="4711"> +<interface name="corenet_receive_afs_fs_client_packets" lineno="4729"> <summary> Receive afs_fs_client packets. </summary> @@ -13193,7 +13277,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4730"> +<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4748"> <summary> Do not audit attempts to receive afs_fs_client packets. </summary> @@ -13204,7 +13288,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4749"> +<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4767"> <summary> Send and receive afs_fs_client packets. </summary> @@ -13215,7 +13299,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4765"> +<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4783"> <summary> Do not audit attempts to send and receive afs_fs_client packets. </summary> @@ -13226,7 +13310,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4780"> +<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4798"> <summary> Relabel packets to afs_fs_client the packet type. </summary> @@ -13236,7 +13320,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_fs_server_packets" lineno="4800"> +<interface name="corenet_send_afs_fs_server_packets" lineno="4818"> <summary> Send afs_fs_server packets. </summary> @@ -13247,7 +13331,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4819"> +<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4837"> <summary> Do not audit attempts to send afs_fs_server packets. </summary> @@ -13258,7 +13342,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_fs_server_packets" lineno="4838"> +<interface name="corenet_receive_afs_fs_server_packets" lineno="4856"> <summary> Receive afs_fs_server packets. </summary> @@ -13269,7 +13353,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4857"> +<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4875"> <summary> Do not audit attempts to receive afs_fs_server packets. </summary> @@ -13280,7 +13364,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4876"> +<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4894"> <summary> Send and receive afs_fs_server packets. </summary> @@ -13291,7 +13375,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4892"> +<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4910"> <summary> Do not audit attempts to send and receive afs_fs_server packets. </summary> @@ -13302,7 +13386,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4907"> +<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4925"> <summary> Relabel packets to afs_fs_server the packet type. </summary> @@ -13312,7 +13396,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4929"> +<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4947"> <summary> Send and receive TCP traffic on the afs_ka port. </summary> @@ -13323,7 +13407,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs_ka_port" lineno="4944"> +<interface name="corenet_udp_send_afs_ka_port" lineno="4962"> <summary> Send UDP traffic on the afs_ka port. </summary> @@ -13334,7 +13418,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4959"> +<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4977"> <summary> Do not audit attempts to send UDP traffic on the afs_ka port. </summary> @@ -13345,7 +13429,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs_ka_port" lineno="4974"> +<interface name="corenet_udp_receive_afs_ka_port" lineno="4992"> <summary> Receive UDP traffic on the afs_ka port. </summary> @@ -13356,7 +13440,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4989"> +<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="5007"> <summary> Do not audit attempts to receive UDP traffic on the afs_ka port. </summary> @@ -13367,7 +13451,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5004"> +<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5022"> <summary> Send and receive UDP traffic on the afs_ka port. </summary> @@ -13378,7 +13462,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5020"> +<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5038"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_ka port. @@ -13390,7 +13474,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs_ka_port" lineno="5035"> +<interface name="corenet_tcp_bind_afs_ka_port" lineno="5053"> <summary> Bind TCP sockets to the afs_ka port. </summary> @@ -13401,7 +13485,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_ka_port" lineno="5055"> +<interface name="corenet_udp_bind_afs_ka_port" lineno="5073"> <summary> Bind UDP sockets to the afs_ka port. </summary> @@ -13412,7 +13496,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_ka_port" lineno="5074"> +<interface name="corenet_tcp_connect_afs_ka_port" lineno="5092"> <summary> Make a TCP connection to the afs_ka port. </summary> @@ -13422,7 +13506,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_ka_client_packets" lineno="5094"> +<interface name="corenet_send_afs_ka_client_packets" lineno="5112"> <summary> Send afs_ka_client packets. </summary> @@ -13433,7 +13517,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5113"> +<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5131"> <summary> Do not audit attempts to send afs_ka_client packets. </summary> @@ -13444,7 +13528,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_ka_client_packets" lineno="5132"> +<interface name="corenet_receive_afs_ka_client_packets" lineno="5150"> <summary> Receive afs_ka_client packets. </summary> @@ -13455,7 +13539,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5151"> +<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5169"> <summary> Do not audit attempts to receive afs_ka_client packets. </summary> @@ -13466,7 +13550,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5170"> +<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5188"> <summary> Send and receive afs_ka_client packets. </summary> @@ -13477,7 +13561,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5186"> +<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5204"> <summary> Do not audit attempts to send and receive afs_ka_client packets. </summary> @@ -13488,7 +13572,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5201"> +<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5219"> <summary> Relabel packets to afs_ka_client the packet type. </summary> @@ -13498,7 +13582,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_ka_server_packets" lineno="5221"> +<interface name="corenet_send_afs_ka_server_packets" lineno="5239"> <summary> Send afs_ka_server packets. </summary> @@ -13509,7 +13593,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5240"> +<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5258"> <summary> Do not audit attempts to send afs_ka_server packets. </summary> @@ -13520,7 +13604,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_ka_server_packets" lineno="5259"> +<interface name="corenet_receive_afs_ka_server_packets" lineno="5277"> <summary> Receive afs_ka_server packets. </summary> @@ -13531,7 +13615,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5278"> +<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5296"> <summary> Do not audit attempts to receive afs_ka_server packets. </summary> @@ -13542,7 +13626,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5297"> +<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5315"> <summary> Send and receive afs_ka_server packets. </summary> @@ -13553,7 +13637,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5313"> +<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5331"> <summary> Do not audit attempts to send and receive afs_ka_server packets. </summary> @@ -13564,7 +13648,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5328"> +<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5346"> <summary> Relabel packets to afs_ka_server the packet type. </summary> @@ -13574,7 +13658,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5350"> +<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5368"> <summary> Send and receive TCP traffic on the afs_pt port. </summary> @@ -13585,7 +13669,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs_pt_port" lineno="5365"> +<interface name="corenet_udp_send_afs_pt_port" lineno="5383"> <summary> Send UDP traffic on the afs_pt port. </summary> @@ -13596,7 +13680,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5380"> +<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5398"> <summary> Do not audit attempts to send UDP traffic on the afs_pt port. </summary> @@ -13607,7 +13691,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs_pt_port" lineno="5395"> +<interface name="corenet_udp_receive_afs_pt_port" lineno="5413"> <summary> Receive UDP traffic on the afs_pt port. </summary> @@ -13618,7 +13702,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5410"> +<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5428"> <summary> Do not audit attempts to receive UDP traffic on the afs_pt port. </summary> @@ -13629,7 +13713,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5425"> +<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5443"> <summary> Send and receive UDP traffic on the afs_pt port. </summary> @@ -13640,7 +13724,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5441"> +<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5459"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_pt port. @@ -13652,7 +13736,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs_pt_port" lineno="5456"> +<interface name="corenet_tcp_bind_afs_pt_port" lineno="5474"> <summary> Bind TCP sockets to the afs_pt port. </summary> @@ -13663,7 +13747,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_pt_port" lineno="5476"> +<interface name="corenet_udp_bind_afs_pt_port" lineno="5494"> <summary> Bind UDP sockets to the afs_pt port. </summary> @@ -13674,7 +13758,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_pt_port" lineno="5495"> +<interface name="corenet_tcp_connect_afs_pt_port" lineno="5513"> <summary> Make a TCP connection to the afs_pt port. </summary> @@ -13684,7 +13768,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_pt_client_packets" lineno="5515"> +<interface name="corenet_send_afs_pt_client_packets" lineno="5533"> <summary> Send afs_pt_client packets. </summary> @@ -13695,7 +13779,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5534"> +<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5552"> <summary> Do not audit attempts to send afs_pt_client packets. </summary> @@ -13706,7 +13790,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_pt_client_packets" lineno="5553"> +<interface name="corenet_receive_afs_pt_client_packets" lineno="5571"> <summary> Receive afs_pt_client packets. </summary> @@ -13717,7 +13801,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5572"> +<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5590"> <summary> Do not audit attempts to receive afs_pt_client packets. </summary> @@ -13728,7 +13812,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5591"> +<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5609"> <summary> Send and receive afs_pt_client packets. </summary> @@ -13739,7 +13823,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5607"> +<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5625"> <summary> Do not audit attempts to send and receive afs_pt_client packets. </summary> @@ -13750,7 +13834,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5622"> +<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5640"> <summary> Relabel packets to afs_pt_client the packet type. </summary> @@ -13760,7 +13844,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_pt_server_packets" lineno="5642"> +<interface name="corenet_send_afs_pt_server_packets" lineno="5660"> <summary> Send afs_pt_server packets. </summary> @@ -13771,7 +13855,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5661"> +<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5679"> <summary> Do not audit attempts to send afs_pt_server packets. </summary> @@ -13782,7 +13866,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_pt_server_packets" lineno="5680"> +<interface name="corenet_receive_afs_pt_server_packets" lineno="5698"> <summary> Receive afs_pt_server packets. </summary> @@ -13793,7 +13877,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5699"> +<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5717"> <summary> Do not audit attempts to receive afs_pt_server packets. </summary> @@ -13804,7 +13888,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5718"> +<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5736"> <summary> Send and receive afs_pt_server packets. </summary> @@ -13815,7 +13899,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5734"> +<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5752"> <summary> Do not audit attempts to send and receive afs_pt_server packets. </summary> @@ -13826,7 +13910,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5749"> +<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5767"> <summary> Relabel packets to afs_pt_server the packet type. </summary> @@ -13836,7 +13920,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5771"> +<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5789"> <summary> Send and receive TCP traffic on the afs_vl port. </summary> @@ -13847,7 +13931,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs_vl_port" lineno="5786"> +<interface name="corenet_udp_send_afs_vl_port" lineno="5804"> <summary> Send UDP traffic on the afs_vl port. </summary> @@ -13858,7 +13942,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5801"> +<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5819"> <summary> Do not audit attempts to send UDP traffic on the afs_vl port. </summary> @@ -13869,7 +13953,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs_vl_port" lineno="5816"> +<interface name="corenet_udp_receive_afs_vl_port" lineno="5834"> <summary> Receive UDP traffic on the afs_vl port. </summary> @@ -13880,7 +13964,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5831"> +<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5849"> <summary> Do not audit attempts to receive UDP traffic on the afs_vl port. </summary> @@ -13891,7 +13975,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5846"> +<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5864"> <summary> Send and receive UDP traffic on the afs_vl port. </summary> @@ -13902,7 +13986,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5862"> +<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5880"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_vl port. @@ -13914,7 +13998,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs_vl_port" lineno="5877"> +<interface name="corenet_tcp_bind_afs_vl_port" lineno="5895"> <summary> Bind TCP sockets to the afs_vl port. </summary> @@ -13925,7 +14009,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_vl_port" lineno="5897"> +<interface name="corenet_udp_bind_afs_vl_port" lineno="5915"> <summary> Bind UDP sockets to the afs_vl port. </summary> @@ -13936,7 +14020,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_vl_port" lineno="5916"> +<interface name="corenet_tcp_connect_afs_vl_port" lineno="5934"> <summary> Make a TCP connection to the afs_vl port. </summary> @@ -13946,7 +14030,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_vl_client_packets" lineno="5936"> +<interface name="corenet_send_afs_vl_client_packets" lineno="5954"> <summary> Send afs_vl_client packets. </summary> @@ -13957,7 +14041,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5955"> +<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5973"> <summary> Do not audit attempts to send afs_vl_client packets. </summary> @@ -13968,7 +14052,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_vl_client_packets" lineno="5974"> +<interface name="corenet_receive_afs_vl_client_packets" lineno="5992"> <summary> Receive afs_vl_client packets. </summary> @@ -13979,7 +14063,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5993"> +<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="6011"> <summary> Do not audit attempts to receive afs_vl_client packets. </summary> @@ -13990,7 +14074,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6012"> +<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6030"> <summary> Send and receive afs_vl_client packets. </summary> @@ -14001,7 +14085,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6028"> +<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6046"> <summary> Do not audit attempts to send and receive afs_vl_client packets. </summary> @@ -14012,7 +14096,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6043"> +<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6061"> <summary> Relabel packets to afs_vl_client the packet type. </summary> @@ -14022,7 +14106,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_vl_server_packets" lineno="6063"> +<interface name="corenet_send_afs_vl_server_packets" lineno="6081"> <summary> Send afs_vl_server packets. </summary> @@ -14033,7 +14117,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6082"> +<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6100"> <summary> Do not audit attempts to send afs_vl_server packets. </summary> @@ -14044,7 +14128,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_vl_server_packets" lineno="6101"> +<interface name="corenet_receive_afs_vl_server_packets" lineno="6119"> <summary> Receive afs_vl_server packets. </summary> @@ -14055,7 +14139,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6120"> +<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6138"> <summary> Do not audit attempts to receive afs_vl_server packets. </summary> @@ -14066,7 +14150,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6139"> +<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6157"> <summary> Send and receive afs_vl_server packets. </summary> @@ -14077,7 +14161,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6155"> +<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6173"> <summary> Do not audit attempts to send and receive afs_vl_server packets. </summary> @@ -14088,7 +14172,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6170"> +<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6188"> <summary> Relabel packets to afs_vl_server the packet type. </summary> @@ -14098,7 +14182,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6192"> +<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6210"> <summary> Send and receive TCP traffic on the afs3_callback port. </summary> @@ -14109,7 +14193,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_afs3_callback_port" lineno="6207"> +<interface name="corenet_udp_send_afs3_callback_port" lineno="6225"> <summary> Send UDP traffic on the afs3_callback port. </summary> @@ -14120,7 +14204,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6222"> +<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6240"> <summary> Do not audit attempts to send UDP traffic on the afs3_callback port. </summary> @@ -14131,7 +14215,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_afs3_callback_port" lineno="6237"> +<interface name="corenet_udp_receive_afs3_callback_port" lineno="6255"> <summary> Receive UDP traffic on the afs3_callback port. </summary> @@ -14142,7 +14226,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6252"> +<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6270"> <summary> Do not audit attempts to receive UDP traffic on the afs3_callback port. </summary> @@ -14153,7 +14237,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6267"> +<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6285"> <summary> Send and receive UDP traffic on the afs3_callback port. </summary> @@ -14164,7 +14248,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6283"> +<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6301"> <summary> Do not audit attempts to send and receive UDP traffic on the afs3_callback port. @@ -14176,7 +14260,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6298"> +<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6316"> <summary> Bind TCP sockets to the afs3_callback port. </summary> @@ -14187,7 +14271,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs3_callback_port" lineno="6318"> +<interface name="corenet_udp_bind_afs3_callback_port" lineno="6336"> <summary> Bind UDP sockets to the afs3_callback port. </summary> @@ -14198,7 +14282,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6337"> +<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6355"> <summary> Make a TCP connection to the afs3_callback port. </summary> @@ -14208,7 +14292,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs3_callback_client_packets" lineno="6357"> +<interface name="corenet_send_afs3_callback_client_packets" lineno="6375"> <summary> Send afs3_callback_client packets. </summary> @@ -14219,7 +14303,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6376"> +<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6394"> <summary> Do not audit attempts to send afs3_callback_client packets. </summary> @@ -14230,7 +14314,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs3_callback_client_packets" lineno="6395"> +<interface name="corenet_receive_afs3_callback_client_packets" lineno="6413"> <summary> Receive afs3_callback_client packets. </summary> @@ -14241,7 +14325,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6414"> +<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6432"> <summary> Do not audit attempts to receive afs3_callback_client packets. </summary> @@ -14252,7 +14336,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6433"> +<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6451"> <summary> Send and receive afs3_callback_client packets. </summary> @@ -14263,7 +14347,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6449"> +<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6467"> <summary> Do not audit attempts to send and receive afs3_callback_client packets. </summary> @@ -14274,7 +14358,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6464"> +<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6482"> <summary> Relabel packets to afs3_callback_client the packet type. </summary> @@ -14284,7 +14368,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs3_callback_server_packets" lineno="6484"> +<interface name="corenet_send_afs3_callback_server_packets" lineno="6502"> <summary> Send afs3_callback_server packets. </summary> @@ -14295,7 +14379,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6503"> +<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6521"> <summary> Do not audit attempts to send afs3_callback_server packets. </summary> @@ -14306,7 +14390,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs3_callback_server_packets" lineno="6522"> +<interface name="corenet_receive_afs3_callback_server_packets" lineno="6540"> <summary> Receive afs3_callback_server packets. </summary> @@ -14317,7 +14401,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6541"> +<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6559"> <summary> Do not audit attempts to receive afs3_callback_server packets. </summary> @@ -14328,7 +14412,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6560"> +<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6578"> <summary> Send and receive afs3_callback_server packets. </summary> @@ -14339,7 +14423,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6576"> +<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6594"> <summary> Do not audit attempts to send and receive afs3_callback_server packets. </summary> @@ -14350,7 +14434,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6591"> +<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6609"> <summary> Relabel packets to afs3_callback_server the packet type. </summary> @@ -14360,7 +14444,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6613"> +<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6631"> <summary> Send and receive TCP traffic on the agentx port. </summary> @@ -14371,7 +14455,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_agentx_port" lineno="6628"> +<interface name="corenet_udp_send_agentx_port" lineno="6646"> <summary> Send UDP traffic on the agentx port. </summary> @@ -14382,7 +14466,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6643"> +<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6661"> <summary> Do not audit attempts to send UDP traffic on the agentx port. </summary> @@ -14393,7 +14477,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_agentx_port" lineno="6658"> +<interface name="corenet_udp_receive_agentx_port" lineno="6676"> <summary> Receive UDP traffic on the agentx port. </summary> @@ -14404,7 +14488,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6673"> +<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6691"> <summary> Do not audit attempts to receive UDP traffic on the agentx port. </summary> @@ -14415,7 +14499,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_agentx_port" lineno="6688"> +<interface name="corenet_udp_sendrecv_agentx_port" lineno="6706"> <summary> Send and receive UDP traffic on the agentx port. </summary> @@ -14426,7 +14510,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6704"> +<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6722"> <summary> Do not audit attempts to send and receive UDP traffic on the agentx port. @@ -14438,7 +14522,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_agentx_port" lineno="6719"> +<interface name="corenet_tcp_bind_agentx_port" lineno="6737"> <summary> Bind TCP sockets to the agentx port. </summary> @@ -14449,7 +14533,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_agentx_port" lineno="6739"> +<interface name="corenet_udp_bind_agentx_port" lineno="6757"> <summary> Bind UDP sockets to the agentx port. </summary> @@ -14460,7 +14544,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_agentx_port" lineno="6758"> +<interface name="corenet_tcp_connect_agentx_port" lineno="6776"> <summary> Make a TCP connection to the agentx port. </summary> @@ -14470,7 +14554,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_agentx_client_packets" lineno="6778"> +<interface name="corenet_send_agentx_client_packets" lineno="6796"> <summary> Send agentx_client packets. </summary> @@ -14481,7 +14565,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6797"> +<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6815"> <summary> Do not audit attempts to send agentx_client packets. </summary> @@ -14492,7 +14576,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_agentx_client_packets" lineno="6816"> +<interface name="corenet_receive_agentx_client_packets" lineno="6834"> <summary> Receive agentx_client packets. </summary> @@ -14503,7 +14587,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6835"> +<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6853"> <summary> Do not audit attempts to receive agentx_client packets. </summary> @@ -14514,7 +14598,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_agentx_client_packets" lineno="6854"> +<interface name="corenet_sendrecv_agentx_client_packets" lineno="6872"> <summary> Send and receive agentx_client packets. </summary> @@ -14525,7 +14609,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6870"> +<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6888"> <summary> Do not audit attempts to send and receive agentx_client packets. </summary> @@ -14536,7 +14620,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_agentx_client_packets" lineno="6885"> +<interface name="corenet_relabelto_agentx_client_packets" lineno="6903"> <summary> Relabel packets to agentx_client the packet type. </summary> @@ -14546,7 +14630,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_agentx_server_packets" lineno="6905"> +<interface name="corenet_send_agentx_server_packets" lineno="6923"> <summary> Send agentx_server packets. </summary> @@ -14557,7 +14641,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6924"> +<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6942"> <summary> Do not audit attempts to send agentx_server packets. </summary> @@ -14568,7 +14652,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_agentx_server_packets" lineno="6943"> +<interface name="corenet_receive_agentx_server_packets" lineno="6961"> <summary> Receive agentx_server packets. </summary> @@ -14579,7 +14663,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6962"> +<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6980"> <summary> Do not audit attempts to receive agentx_server packets. </summary> @@ -14590,7 +14674,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_agentx_server_packets" lineno="6981"> +<interface name="corenet_sendrecv_agentx_server_packets" lineno="6999"> <summary> Send and receive agentx_server packets. </summary> @@ -14601,7 +14685,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6997"> +<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="7015"> <summary> Do not audit attempts to send and receive agentx_server packets. </summary> @@ -14612,7 +14696,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_agentx_server_packets" lineno="7012"> +<interface name="corenet_relabelto_agentx_server_packets" lineno="7030"> <summary> Relabel packets to agentx_server the packet type. </summary> @@ -14622,7 +14706,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7034"> +<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7052"> <summary> Send and receive TCP traffic on the amanda port. </summary> @@ -14633,7 +14717,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_amanda_port" lineno="7049"> +<interface name="corenet_udp_send_amanda_port" lineno="7067"> <summary> Send UDP traffic on the amanda port. </summary> @@ -14644,7 +14728,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7064"> +<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7082"> <summary> Do not audit attempts to send UDP traffic on the amanda port. </summary> @@ -14655,7 +14739,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_amanda_port" lineno="7079"> +<interface name="corenet_udp_receive_amanda_port" lineno="7097"> <summary> Receive UDP traffic on the amanda port. </summary> @@ -14666,7 +14750,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7094"> +<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7112"> <summary> Do not audit attempts to receive UDP traffic on the amanda port. </summary> @@ -14677,7 +14761,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_amanda_port" lineno="7109"> +<interface name="corenet_udp_sendrecv_amanda_port" lineno="7127"> <summary> Send and receive UDP traffic on the amanda port. </summary> @@ -14688,7 +14772,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7125"> +<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7143"> <summary> Do not audit attempts to send and receive UDP traffic on the amanda port. @@ -14700,7 +14784,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_amanda_port" lineno="7140"> +<interface name="corenet_tcp_bind_amanda_port" lineno="7158"> <summary> Bind TCP sockets to the amanda port. </summary> @@ -14711,7 +14795,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amanda_port" lineno="7160"> +<interface name="corenet_udp_bind_amanda_port" lineno="7178"> <summary> Bind UDP sockets to the amanda port. </summary> @@ -14722,7 +14806,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amanda_port" lineno="7179"> +<interface name="corenet_tcp_connect_amanda_port" lineno="7197"> <summary> Make a TCP connection to the amanda port. </summary> @@ -14732,7 +14816,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amanda_client_packets" lineno="7199"> +<interface name="corenet_send_amanda_client_packets" lineno="7217"> <summary> Send amanda_client packets. </summary> @@ -14743,7 +14827,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7218"> +<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7236"> <summary> Do not audit attempts to send amanda_client packets. </summary> @@ -14754,7 +14838,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amanda_client_packets" lineno="7237"> +<interface name="corenet_receive_amanda_client_packets" lineno="7255"> <summary> Receive amanda_client packets. </summary> @@ -14765,7 +14849,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7256"> +<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7274"> <summary> Do not audit attempts to receive amanda_client packets. </summary> @@ -14776,7 +14860,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amanda_client_packets" lineno="7275"> +<interface name="corenet_sendrecv_amanda_client_packets" lineno="7293"> <summary> Send and receive amanda_client packets. </summary> @@ -14787,7 +14871,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7291"> +<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7309"> <summary> Do not audit attempts to send and receive amanda_client packets. </summary> @@ -14798,7 +14882,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amanda_client_packets" lineno="7306"> +<interface name="corenet_relabelto_amanda_client_packets" lineno="7324"> <summary> Relabel packets to amanda_client the packet type. </summary> @@ -14808,7 +14892,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amanda_server_packets" lineno="7326"> +<interface name="corenet_send_amanda_server_packets" lineno="7344"> <summary> Send amanda_server packets. </summary> @@ -14819,7 +14903,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7345"> +<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7363"> <summary> Do not audit attempts to send amanda_server packets. </summary> @@ -14830,7 +14914,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amanda_server_packets" lineno="7364"> +<interface name="corenet_receive_amanda_server_packets" lineno="7382"> <summary> Receive amanda_server packets. </summary> @@ -14841,7 +14925,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7383"> +<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7401"> <summary> Do not audit attempts to receive amanda_server packets. </summary> @@ -14852,7 +14936,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amanda_server_packets" lineno="7402"> +<interface name="corenet_sendrecv_amanda_server_packets" lineno="7420"> <summary> Send and receive amanda_server packets. </summary> @@ -14863,7 +14947,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7418"> +<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7436"> <summary> Do not audit attempts to send and receive amanda_server packets. </summary> @@ -14874,7 +14958,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amanda_server_packets" lineno="7433"> +<interface name="corenet_relabelto_amanda_server_packets" lineno="7451"> <summary> Relabel packets to amanda_server the packet type. </summary> @@ -14884,7 +14968,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7455"> +<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7473"> <summary> Send and receive TCP traffic on the amavisd_recv port. </summary> @@ -14895,7 +14979,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_amavisd_recv_port" lineno="7470"> +<interface name="corenet_udp_send_amavisd_recv_port" lineno="7488"> <summary> Send UDP traffic on the amavisd_recv port. </summary> @@ -14906,7 +14990,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7485"> +<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7503"> <summary> Do not audit attempts to send UDP traffic on the amavisd_recv port. </summary> @@ -14917,7 +15001,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7500"> +<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7518"> <summary> Receive UDP traffic on the amavisd_recv port. </summary> @@ -14928,7 +15012,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7515"> +<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7533"> <summary> Do not audit attempts to receive UDP traffic on the amavisd_recv port. </summary> @@ -14939,7 +15023,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7530"> +<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7548"> <summary> Send and receive UDP traffic on the amavisd_recv port. </summary> @@ -14950,7 +15034,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7546"> +<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7564"> <summary> Do not audit attempts to send and receive UDP traffic on the amavisd_recv port. @@ -14962,7 +15046,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7561"> +<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7579"> <summary> Bind TCP sockets to the amavisd_recv port. </summary> @@ -14973,7 +15057,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7581"> +<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7599"> <summary> Bind UDP sockets to the amavisd_recv port. </summary> @@ -14984,7 +15068,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7600"> +<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7618"> <summary> Make a TCP connection to the amavisd_recv port. </summary> @@ -14994,7 +15078,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_recv_client_packets" lineno="7620"> +<interface name="corenet_send_amavisd_recv_client_packets" lineno="7638"> <summary> Send amavisd_recv_client packets. </summary> @@ -15005,7 +15089,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7639"> +<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7657"> <summary> Do not audit attempts to send amavisd_recv_client packets. </summary> @@ -15016,7 +15100,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7658"> +<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7676"> <summary> Receive amavisd_recv_client packets. </summary> @@ -15027,7 +15111,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7677"> +<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7695"> <summary> Do not audit attempts to receive amavisd_recv_client packets. </summary> @@ -15038,7 +15122,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7696"> +<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7714"> <summary> Send and receive amavisd_recv_client packets. </summary> @@ -15049,7 +15133,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7712"> +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7730"> <summary> Do not audit attempts to send and receive amavisd_recv_client packets. </summary> @@ -15060,7 +15144,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7727"> +<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7745"> <summary> Relabel packets to amavisd_recv_client the packet type. </summary> @@ -15070,7 +15154,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_recv_server_packets" lineno="7747"> +<interface name="corenet_send_amavisd_recv_server_packets" lineno="7765"> <summary> Send amavisd_recv_server packets. </summary> @@ -15081,7 +15165,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7766"> +<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7784"> <summary> Do not audit attempts to send amavisd_recv_server packets. </summary> @@ -15092,7 +15176,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7785"> +<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7803"> <summary> Receive amavisd_recv_server packets. </summary> @@ -15103,7 +15187,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7804"> +<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7822"> <summary> Do not audit attempts to receive amavisd_recv_server packets. </summary> @@ -15114,7 +15198,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7823"> +<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7841"> <summary> Send and receive amavisd_recv_server packets. </summary> @@ -15125,7 +15209,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7839"> +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7857"> <summary> Do not audit attempts to send and receive amavisd_recv_server packets. </summary> @@ -15136,7 +15220,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7854"> +<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7872"> <summary> Relabel packets to amavisd_recv_server the packet type. </summary> @@ -15146,7 +15230,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7876"> +<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7894"> <summary> Send and receive TCP traffic on the amavisd_send port. </summary> @@ -15157,7 +15241,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_amavisd_send_port" lineno="7891"> +<interface name="corenet_udp_send_amavisd_send_port" lineno="7909"> <summary> Send UDP traffic on the amavisd_send port. </summary> @@ -15168,7 +15252,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7906"> +<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7924"> <summary> Do not audit attempts to send UDP traffic on the amavisd_send port. </summary> @@ -15179,7 +15263,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_amavisd_send_port" lineno="7921"> +<interface name="corenet_udp_receive_amavisd_send_port" lineno="7939"> <summary> Receive UDP traffic on the amavisd_send port. </summary> @@ -15190,7 +15274,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7936"> +<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7954"> <summary> Do not audit attempts to receive UDP traffic on the amavisd_send port. </summary> @@ -15201,7 +15285,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7951"> +<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7969"> <summary> Send and receive UDP traffic on the amavisd_send port. </summary> @@ -15212,7 +15296,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7967"> +<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7985"> <summary> Do not audit attempts to send and receive UDP traffic on the amavisd_send port. @@ -15224,7 +15308,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7982"> +<interface name="corenet_tcp_bind_amavisd_send_port" lineno="8000"> <summary> Bind TCP sockets to the amavisd_send port. </summary> @@ -15235,7 +15319,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amavisd_send_port" lineno="8002"> +<interface name="corenet_udp_bind_amavisd_send_port" lineno="8020"> <summary> Bind UDP sockets to the amavisd_send port. </summary> @@ -15246,7 +15330,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8021"> +<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8039"> <summary> Make a TCP connection to the amavisd_send port. </summary> @@ -15256,7 +15340,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_send_client_packets" lineno="8041"> +<interface name="corenet_send_amavisd_send_client_packets" lineno="8059"> <summary> Send amavisd_send_client packets. </summary> @@ -15267,7 +15351,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8060"> +<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8078"> <summary> Do not audit attempts to send amavisd_send_client packets. </summary> @@ -15278,7 +15362,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_send_client_packets" lineno="8079"> +<interface name="corenet_receive_amavisd_send_client_packets" lineno="8097"> <summary> Receive amavisd_send_client packets. </summary> @@ -15289,7 +15373,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8098"> +<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8116"> <summary> Do not audit attempts to receive amavisd_send_client packets. </summary> @@ -15300,7 +15384,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8117"> +<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8135"> <summary> Send and receive amavisd_send_client packets. </summary> @@ -15311,7 +15395,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8133"> +<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8151"> <summary> Do not audit attempts to send and receive amavisd_send_client packets. </summary> @@ -15322,7 +15406,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8148"> +<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8166"> <summary> Relabel packets to amavisd_send_client the packet type. </summary> @@ -15332,7 +15416,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_send_server_packets" lineno="8168"> +<interface name="corenet_send_amavisd_send_server_packets" lineno="8186"> <summary> Send amavisd_send_server packets. </summary> @@ -15343,7 +15427,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8187"> +<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8205"> <summary> Do not audit attempts to send amavisd_send_server packets. </summary> @@ -15354,7 +15438,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_send_server_packets" lineno="8206"> +<interface name="corenet_receive_amavisd_send_server_packets" lineno="8224"> <summary> Receive amavisd_send_server packets. </summary> @@ -15365,7 +15449,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8225"> +<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8243"> <summary> Do not audit attempts to receive amavisd_send_server packets. </summary> @@ -15376,7 +15460,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8244"> +<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8262"> <summary> Send and receive amavisd_send_server packets. </summary> @@ -15387,7 +15471,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8260"> +<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8278"> <summary> Do not audit attempts to send and receive amavisd_send_server packets. </summary> @@ -15398,7 +15482,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8275"> +<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8293"> <summary> Relabel packets to amavisd_send_server the packet type. </summary> @@ -15408,7 +15492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8297"> +<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8315"> <summary> Send and receive TCP traffic on the amqp port. </summary> @@ -15419,7 +15503,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_amqp_port" lineno="8312"> +<interface name="corenet_udp_send_amqp_port" lineno="8330"> <summary> Send UDP traffic on the amqp port. </summary> @@ -15430,7 +15514,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8327"> +<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8345"> <summary> Do not audit attempts to send UDP traffic on the amqp port. </summary> @@ -15441,7 +15525,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_amqp_port" lineno="8342"> +<interface name="corenet_udp_receive_amqp_port" lineno="8360"> <summary> Receive UDP traffic on the amqp port. </summary> @@ -15452,7 +15536,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8357"> +<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8375"> <summary> Do not audit attempts to receive UDP traffic on the amqp port. </summary> @@ -15463,7 +15547,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_amqp_port" lineno="8372"> +<interface name="corenet_udp_sendrecv_amqp_port" lineno="8390"> <summary> Send and receive UDP traffic on the amqp port. </summary> @@ -15474,7 +15558,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8388"> +<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8406"> <summary> Do not audit attempts to send and receive UDP traffic on the amqp port. @@ -15486,7 +15570,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_amqp_port" lineno="8403"> +<interface name="corenet_tcp_bind_amqp_port" lineno="8421"> <summary> Bind TCP sockets to the amqp port. </summary> @@ -15497,7 +15581,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amqp_port" lineno="8423"> +<interface name="corenet_udp_bind_amqp_port" lineno="8441"> <summary> Bind UDP sockets to the amqp port. </summary> @@ -15508,7 +15592,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amqp_port" lineno="8442"> +<interface name="corenet_tcp_connect_amqp_port" lineno="8460"> <summary> Make a TCP connection to the amqp port. </summary> @@ -15518,7 +15602,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amqp_client_packets" lineno="8462"> +<interface name="corenet_send_amqp_client_packets" lineno="8480"> <summary> Send amqp_client packets. </summary> @@ -15529,7 +15613,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8481"> +<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8499"> <summary> Do not audit attempts to send amqp_client packets. </summary> @@ -15540,7 +15624,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amqp_client_packets" lineno="8500"> +<interface name="corenet_receive_amqp_client_packets" lineno="8518"> <summary> Receive amqp_client packets. </summary> @@ -15551,7 +15635,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8519"> +<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8537"> <summary> Do not audit attempts to receive amqp_client packets. </summary> @@ -15562,7 +15646,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amqp_client_packets" lineno="8538"> +<interface name="corenet_sendrecv_amqp_client_packets" lineno="8556"> <summary> Send and receive amqp_client packets. </summary> @@ -15573,7 +15657,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8554"> +<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8572"> <summary> Do not audit attempts to send and receive amqp_client packets. </summary> @@ -15584,7 +15668,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amqp_client_packets" lineno="8569"> +<interface name="corenet_relabelto_amqp_client_packets" lineno="8587"> <summary> Relabel packets to amqp_client the packet type. </summary> @@ -15594,7 +15678,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amqp_server_packets" lineno="8589"> +<interface name="corenet_send_amqp_server_packets" lineno="8607"> <summary> Send amqp_server packets. </summary> @@ -15605,7 +15689,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8608"> +<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8626"> <summary> Do not audit attempts to send amqp_server packets. </summary> @@ -15616,7 +15700,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amqp_server_packets" lineno="8627"> +<interface name="corenet_receive_amqp_server_packets" lineno="8645"> <summary> Receive amqp_server packets. </summary> @@ -15627,7 +15711,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8646"> +<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8664"> <summary> Do not audit attempts to receive amqp_server packets. </summary> @@ -15638,7 +15722,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amqp_server_packets" lineno="8665"> +<interface name="corenet_sendrecv_amqp_server_packets" lineno="8683"> <summary> Send and receive amqp_server packets. </summary> @@ -15649,7 +15733,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8681"> +<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8699"> <summary> Do not audit attempts to send and receive amqp_server packets. </summary> @@ -15660,7 +15744,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amqp_server_packets" lineno="8696"> +<interface name="corenet_relabelto_amqp_server_packets" lineno="8714"> <summary> Relabel packets to amqp_server the packet type. </summary> @@ -15670,7 +15754,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_aol_port" lineno="8718"> +<interface name="corenet_tcp_sendrecv_aol_port" lineno="8736"> <summary> Send and receive TCP traffic on the aol port. </summary> @@ -15681,7 +15765,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_aol_port" lineno="8733"> +<interface name="corenet_udp_send_aol_port" lineno="8751"> <summary> Send UDP traffic on the aol port. </summary> @@ -15692,7 +15776,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8748"> +<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8766"> <summary> Do not audit attempts to send UDP traffic on the aol port. </summary> @@ -15703,7 +15787,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_aol_port" lineno="8763"> +<interface name="corenet_udp_receive_aol_port" lineno="8781"> <summary> Receive UDP traffic on the aol port. </summary> @@ -15714,7 +15798,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8778"> +<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8796"> <summary> Do not audit attempts to receive UDP traffic on the aol port. </summary> @@ -15725,7 +15809,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_aol_port" lineno="8793"> +<interface name="corenet_udp_sendrecv_aol_port" lineno="8811"> <summary> Send and receive UDP traffic on the aol port. </summary> @@ -15736,7 +15820,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8809"> +<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8827"> <summary> Do not audit attempts to send and receive UDP traffic on the aol port. @@ -15748,7 +15832,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_aol_port" lineno="8824"> +<interface name="corenet_tcp_bind_aol_port" lineno="8842"> <summary> Bind TCP sockets to the aol port. </summary> @@ -15759,7 +15843,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_aol_port" lineno="8844"> +<interface name="corenet_udp_bind_aol_port" lineno="8862"> <summary> Bind UDP sockets to the aol port. </summary> @@ -15770,7 +15854,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_aol_port" lineno="8863"> +<interface name="corenet_tcp_connect_aol_port" lineno="8881"> <summary> Make a TCP connection to the aol port. </summary> @@ -15780,7 +15864,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_aol_client_packets" lineno="8883"> +<interface name="corenet_send_aol_client_packets" lineno="8901"> <summary> Send aol_client packets. </summary> @@ -15791,7 +15875,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8902"> +<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8920"> <summary> Do not audit attempts to send aol_client packets. </summary> @@ -15802,7 +15886,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_aol_client_packets" lineno="8921"> +<interface name="corenet_receive_aol_client_packets" lineno="8939"> <summary> Receive aol_client packets. </summary> @@ -15813,7 +15897,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8940"> +<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8958"> <summary> Do not audit attempts to receive aol_client packets. </summary> @@ -15824,7 +15908,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_aol_client_packets" lineno="8959"> +<interface name="corenet_sendrecv_aol_client_packets" lineno="8977"> <summary> Send and receive aol_client packets. </summary> @@ -15835,7 +15919,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8975"> +<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8993"> <summary> Do not audit attempts to send and receive aol_client packets. </summary> @@ -15846,7 +15930,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_aol_client_packets" lineno="8990"> +<interface name="corenet_relabelto_aol_client_packets" lineno="9008"> <summary> Relabel packets to aol_client the packet type. </summary> @@ -15856,7 +15940,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_aol_server_packets" lineno="9010"> +<interface name="corenet_send_aol_server_packets" lineno="9028"> <summary> Send aol_server packets. </summary> @@ -15867,7 +15951,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9029"> +<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9047"> <summary> Do not audit attempts to send aol_server packets. </summary> @@ -15878,7 +15962,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_aol_server_packets" lineno="9048"> +<interface name="corenet_receive_aol_server_packets" lineno="9066"> <summary> Receive aol_server packets. </summary> @@ -15889,7 +15973,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9067"> +<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9085"> <summary> Do not audit attempts to receive aol_server packets. </summary> @@ -15900,7 +15984,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_aol_server_packets" lineno="9086"> +<interface name="corenet_sendrecv_aol_server_packets" lineno="9104"> <summary> Send and receive aol_server packets. </summary> @@ -15911,7 +15995,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9102"> +<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9120"> <summary> Do not audit attempts to send and receive aol_server packets. </summary> @@ -15922,7 +16006,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_aol_server_packets" lineno="9117"> +<interface name="corenet_relabelto_aol_server_packets" lineno="9135"> <summary> Relabel packets to aol_server the packet type. </summary> @@ -15932,7 +16016,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9139"> +<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9157"> <summary> Send and receive TCP traffic on the apcupsd port. </summary> @@ -15943,7 +16027,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_apcupsd_port" lineno="9154"> +<interface name="corenet_udp_send_apcupsd_port" lineno="9172"> <summary> Send UDP traffic on the apcupsd port. </summary> @@ -15954,7 +16038,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9169"> +<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9187"> <summary> Do not audit attempts to send UDP traffic on the apcupsd port. </summary> @@ -15965,7 +16049,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_apcupsd_port" lineno="9184"> +<interface name="corenet_udp_receive_apcupsd_port" lineno="9202"> <summary> Receive UDP traffic on the apcupsd port. </summary> @@ -15976,7 +16060,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9199"> +<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9217"> <summary> Do not audit attempts to receive UDP traffic on the apcupsd port. </summary> @@ -15987,7 +16071,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9214"> +<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9232"> <summary> Send and receive UDP traffic on the apcupsd port. </summary> @@ -15998,7 +16082,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9230"> +<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9248"> <summary> Do not audit attempts to send and receive UDP traffic on the apcupsd port. @@ -16010,7 +16094,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_apcupsd_port" lineno="9245"> +<interface name="corenet_tcp_bind_apcupsd_port" lineno="9263"> <summary> Bind TCP sockets to the apcupsd port. </summary> @@ -16021,7 +16105,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_apcupsd_port" lineno="9265"> +<interface name="corenet_udp_bind_apcupsd_port" lineno="9283"> <summary> Bind UDP sockets to the apcupsd port. </summary> @@ -16032,7 +16116,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_apcupsd_port" lineno="9284"> +<interface name="corenet_tcp_connect_apcupsd_port" lineno="9302"> <summary> Make a TCP connection to the apcupsd port. </summary> @@ -16042,7 +16126,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apcupsd_client_packets" lineno="9304"> +<interface name="corenet_send_apcupsd_client_packets" lineno="9322"> <summary> Send apcupsd_client packets. </summary> @@ -16053,7 +16137,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9323"> +<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9341"> <summary> Do not audit attempts to send apcupsd_client packets. </summary> @@ -16064,7 +16148,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apcupsd_client_packets" lineno="9342"> +<interface name="corenet_receive_apcupsd_client_packets" lineno="9360"> <summary> Receive apcupsd_client packets. </summary> @@ -16075,7 +16159,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9361"> +<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9379"> <summary> Do not audit attempts to receive apcupsd_client packets. </summary> @@ -16086,7 +16170,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9380"> +<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9398"> <summary> Send and receive apcupsd_client packets. </summary> @@ -16097,7 +16181,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9396"> +<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9414"> <summary> Do not audit attempts to send and receive apcupsd_client packets. </summary> @@ -16108,7 +16192,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9411"> +<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9429"> <summary> Relabel packets to apcupsd_client the packet type. </summary> @@ -16118,7 +16202,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apcupsd_server_packets" lineno="9431"> +<interface name="corenet_send_apcupsd_server_packets" lineno="9449"> <summary> Send apcupsd_server packets. </summary> @@ -16129,7 +16213,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9450"> +<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9468"> <summary> Do not audit attempts to send apcupsd_server packets. </summary> @@ -16140,7 +16224,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apcupsd_server_packets" lineno="9469"> +<interface name="corenet_receive_apcupsd_server_packets" lineno="9487"> <summary> Receive apcupsd_server packets. </summary> @@ -16151,7 +16235,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9488"> +<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9506"> <summary> Do not audit attempts to receive apcupsd_server packets. </summary> @@ -16162,7 +16246,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9507"> +<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9525"> <summary> Send and receive apcupsd_server packets. </summary> @@ -16173,7 +16257,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9523"> +<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9541"> <summary> Do not audit attempts to send and receive apcupsd_server packets. </summary> @@ -16184,7 +16268,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9538"> +<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9556"> <summary> Relabel packets to apcupsd_server the packet type. </summary> @@ -16194,7 +16278,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9560"> +<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9578"> <summary> Send and receive TCP traffic on the apertus_ldp port. </summary> @@ -16205,7 +16289,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_apertus_ldp_port" lineno="9575"> +<interface name="corenet_udp_send_apertus_ldp_port" lineno="9593"> <summary> Send UDP traffic on the apertus_ldp port. </summary> @@ -16216,7 +16300,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9590"> +<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9608"> <summary> Do not audit attempts to send UDP traffic on the apertus_ldp port. </summary> @@ -16227,7 +16311,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9605"> +<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9623"> <summary> Receive UDP traffic on the apertus_ldp port. </summary> @@ -16238,7 +16322,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9620"> +<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9638"> <summary> Do not audit attempts to receive UDP traffic on the apertus_ldp port. </summary> @@ -16249,7 +16333,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9635"> +<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9653"> <summary> Send and receive UDP traffic on the apertus_ldp port. </summary> @@ -16260,7 +16344,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9651"> +<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9669"> <summary> Do not audit attempts to send and receive UDP traffic on the apertus_ldp port. @@ -16272,7 +16356,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9666"> +<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9684"> <summary> Bind TCP sockets to the apertus_ldp port. </summary> @@ -16283,7 +16367,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9686"> +<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9704"> <summary> Bind UDP sockets to the apertus_ldp port. </summary> @@ -16294,7 +16378,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9705"> +<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9723"> <summary> Make a TCP connection to the apertus_ldp port. </summary> @@ -16304,7 +16388,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apertus_ldp_client_packets" lineno="9725"> +<interface name="corenet_send_apertus_ldp_client_packets" lineno="9743"> <summary> Send apertus_ldp_client packets. </summary> @@ -16315,7 +16399,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9744"> +<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9762"> <summary> Do not audit attempts to send apertus_ldp_client packets. </summary> @@ -16326,7 +16410,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9763"> +<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9781"> <summary> Receive apertus_ldp_client packets. </summary> @@ -16337,7 +16421,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9782"> +<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9800"> <summary> Do not audit attempts to receive apertus_ldp_client packets. </summary> @@ -16348,7 +16432,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9801"> +<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9819"> <summary> Send and receive apertus_ldp_client packets. </summary> @@ -16359,7 +16443,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9817"> +<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9835"> <summary> Do not audit attempts to send and receive apertus_ldp_client packets. </summary> @@ -16370,7 +16454,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9832"> +<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9850"> <summary> Relabel packets to apertus_ldp_client the packet type. </summary> @@ -16380,7 +16464,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apertus_ldp_server_packets" lineno="9852"> +<interface name="corenet_send_apertus_ldp_server_packets" lineno="9870"> <summary> Send apertus_ldp_server packets. </summary> @@ -16391,7 +16475,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9871"> +<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9889"> <summary> Do not audit attempts to send apertus_ldp_server packets. </summary> @@ -16402,7 +16486,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9890"> +<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9908"> <summary> Receive apertus_ldp_server packets. </summary> @@ -16413,7 +16497,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9909"> +<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9927"> <summary> Do not audit attempts to receive apertus_ldp_server packets. </summary> @@ -16424,7 +16508,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9928"> +<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9946"> <summary> Send and receive apertus_ldp_server packets. </summary> @@ -16435,7 +16519,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9944"> +<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9962"> <summary> Do not audit attempts to send and receive apertus_ldp_server packets. </summary> @@ -16446,7 +16530,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9959"> +<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9977"> <summary> Relabel packets to apertus_ldp_server the packet type. </summary> @@ -16456,7 +16540,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9981"> +<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9999"> <summary> Send and receive TCP traffic on the aptcacher port. </summary> @@ -16467,7 +16551,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_aptcacher_port" lineno="9996"> +<interface name="corenet_udp_send_aptcacher_port" lineno="10014"> <summary> Send UDP traffic on the aptcacher port. </summary> @@ -16478,7 +16562,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10011"> +<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10029"> <summary> Do not audit attempts to send UDP traffic on the aptcacher port. </summary> @@ -16489,7 +16573,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_aptcacher_port" lineno="10026"> +<interface name="corenet_udp_receive_aptcacher_port" lineno="10044"> <summary> Receive UDP traffic on the aptcacher port. </summary> @@ -16500,7 +16584,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10041"> +<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10059"> <summary> Do not audit attempts to receive UDP traffic on the aptcacher port. </summary> @@ -16511,7 +16595,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10056"> +<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10074"> <summary> Send and receive UDP traffic on the aptcacher port. </summary> @@ -16522,7 +16606,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10072"> +<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10090"> <summary> Do not audit attempts to send and receive UDP traffic on the aptcacher port. @@ -16534,7 +16618,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_aptcacher_port" lineno="10087"> +<interface name="corenet_tcp_bind_aptcacher_port" lineno="10105"> <summary> Bind TCP sockets to the aptcacher port. </summary> @@ -16545,7 +16629,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_aptcacher_port" lineno="10107"> +<interface name="corenet_udp_bind_aptcacher_port" lineno="10125"> <summary> Bind UDP sockets to the aptcacher port. </summary> @@ -16556,7 +16640,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_aptcacher_port" lineno="10126"> +<interface name="corenet_tcp_connect_aptcacher_port" lineno="10144"> <summary> Make a TCP connection to the aptcacher port. </summary> @@ -16566,7 +16650,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_aptcacher_client_packets" lineno="10146"> +<interface name="corenet_send_aptcacher_client_packets" lineno="10164"> <summary> Send aptcacher_client packets. </summary> @@ -16577,7 +16661,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10165"> +<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10183"> <summary> Do not audit attempts to send aptcacher_client packets. </summary> @@ -16588,7 +16672,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_aptcacher_client_packets" lineno="10184"> +<interface name="corenet_receive_aptcacher_client_packets" lineno="10202"> <summary> Receive aptcacher_client packets. </summary> @@ -16599,7 +16683,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10203"> +<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10221"> <summary> Do not audit attempts to receive aptcacher_client packets. </summary> @@ -16610,7 +16694,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10222"> +<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10240"> <summary> Send and receive aptcacher_client packets. </summary> @@ -16621,7 +16705,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10238"> +<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10256"> <summary> Do not audit attempts to send and receive aptcacher_client packets. </summary> @@ -16632,7 +16716,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10253"> +<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10271"> <summary> Relabel packets to aptcacher_client the packet type. </summary> @@ -16642,7 +16726,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_aptcacher_server_packets" lineno="10273"> +<interface name="corenet_send_aptcacher_server_packets" lineno="10291"> <summary> Send aptcacher_server packets. </summary> @@ -16653,7 +16737,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10292"> +<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10310"> <summary> Do not audit attempts to send aptcacher_server packets. </summary> @@ -16664,7 +16748,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_aptcacher_server_packets" lineno="10311"> +<interface name="corenet_receive_aptcacher_server_packets" lineno="10329"> <summary> Receive aptcacher_server packets. </summary> @@ -16675,7 +16759,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10330"> +<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10348"> <summary> Do not audit attempts to receive aptcacher_server packets. </summary> @@ -16686,7 +16770,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10349"> +<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10367"> <summary> Send and receive aptcacher_server packets. </summary> @@ -16697,7 +16781,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10365"> +<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10383"> <summary> Do not audit attempts to send and receive aptcacher_server packets. </summary> @@ -16708,7 +16792,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10380"> +<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10398"> <summary> Relabel packets to aptcacher_server the packet type. </summary> @@ -16718,7 +16802,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10402"> +<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10420"> <summary> Send and receive TCP traffic on the armtechdaemon port. </summary> @@ -16729,7 +16813,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_armtechdaemon_port" lineno="10417"> +<interface name="corenet_udp_send_armtechdaemon_port" lineno="10435"> <summary> Send UDP traffic on the armtechdaemon port. </summary> @@ -16740,7 +16824,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10432"> +<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10450"> <summary> Do not audit attempts to send UDP traffic on the armtechdaemon port. </summary> @@ -16751,7 +16835,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10447"> +<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10465"> <summary> Receive UDP traffic on the armtechdaemon port. </summary> @@ -16762,7 +16846,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10462"> +<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10480"> <summary> Do not audit attempts to receive UDP traffic on the armtechdaemon port. </summary> @@ -16773,7 +16857,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10477"> +<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10495"> <summary> Send and receive UDP traffic on the armtechdaemon port. </summary> @@ -16784,7 +16868,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10493"> +<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10511"> <summary> Do not audit attempts to send and receive UDP traffic on the armtechdaemon port. @@ -16796,7 +16880,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10508"> +<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10526"> <summary> Bind TCP sockets to the armtechdaemon port. </summary> @@ -16807,7 +16891,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10528"> +<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10546"> <summary> Bind UDP sockets to the armtechdaemon port. </summary> @@ -16818,7 +16902,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10547"> +<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10565"> <summary> Make a TCP connection to the armtechdaemon port. </summary> @@ -16828,7 +16912,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_armtechdaemon_client_packets" lineno="10567"> +<interface name="corenet_send_armtechdaemon_client_packets" lineno="10585"> <summary> Send armtechdaemon_client packets. </summary> @@ -16839,7 +16923,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10586"> +<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10604"> <summary> Do not audit attempts to send armtechdaemon_client packets. </summary> @@ -16850,7 +16934,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10605"> +<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10623"> <summary> Receive armtechdaemon_client packets. </summary> @@ -16861,7 +16945,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10624"> +<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10642"> <summary> Do not audit attempts to receive armtechdaemon_client packets. </summary> @@ -16872,7 +16956,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10643"> +<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10661"> <summary> Send and receive armtechdaemon_client packets. </summary> @@ -16883,7 +16967,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10659"> +<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10677"> <summary> Do not audit attempts to send and receive armtechdaemon_client packets. </summary> @@ -16894,7 +16978,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10674"> +<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10692"> <summary> Relabel packets to armtechdaemon_client the packet type. </summary> @@ -16904,7 +16988,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_armtechdaemon_server_packets" lineno="10694"> +<interface name="corenet_send_armtechdaemon_server_packets" lineno="10712"> <summary> Send armtechdaemon_server packets. </summary> @@ -16915,7 +16999,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10713"> +<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10731"> <summary> Do not audit attempts to send armtechdaemon_server packets. </summary> @@ -16926,7 +17010,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10732"> +<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10750"> <summary> Receive armtechdaemon_server packets. </summary> @@ -16937,7 +17021,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10751"> +<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10769"> <summary> Do not audit attempts to receive armtechdaemon_server packets. </summary> @@ -16948,7 +17032,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10770"> +<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10788"> <summary> Send and receive armtechdaemon_server packets. </summary> @@ -16959,7 +17043,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10786"> +<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10804"> <summary> Do not audit attempts to send and receive armtechdaemon_server packets. </summary> @@ -16970,7 +17054,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10801"> +<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10819"> <summary> Relabel packets to armtechdaemon_server the packet type. </summary> @@ -16980,7 +17064,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10823"> +<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10841"> <summary> Send and receive TCP traffic on the asterisk port. </summary> @@ -16991,7 +17075,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_asterisk_port" lineno="10838"> +<interface name="corenet_udp_send_asterisk_port" lineno="10856"> <summary> Send UDP traffic on the asterisk port. </summary> @@ -17002,7 +17086,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10853"> +<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10871"> <summary> Do not audit attempts to send UDP traffic on the asterisk port. </summary> @@ -17013,7 +17097,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_asterisk_port" lineno="10868"> +<interface name="corenet_udp_receive_asterisk_port" lineno="10886"> <summary> Receive UDP traffic on the asterisk port. </summary> @@ -17024,7 +17108,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10883"> +<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10901"> <summary> Do not audit attempts to receive UDP traffic on the asterisk port. </summary> @@ -17035,7 +17119,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10898"> +<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10916"> <summary> Send and receive UDP traffic on the asterisk port. </summary> @@ -17046,7 +17130,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10914"> +<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10932"> <summary> Do not audit attempts to send and receive UDP traffic on the asterisk port. @@ -17058,7 +17142,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_asterisk_port" lineno="10929"> +<interface name="corenet_tcp_bind_asterisk_port" lineno="10947"> <summary> Bind TCP sockets to the asterisk port. </summary> @@ -17069,7 +17153,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_asterisk_port" lineno="10949"> +<interface name="corenet_udp_bind_asterisk_port" lineno="10967"> <summary> Bind UDP sockets to the asterisk port. </summary> @@ -17080,7 +17164,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_asterisk_port" lineno="10968"> +<interface name="corenet_tcp_connect_asterisk_port" lineno="10986"> <summary> Make a TCP connection to the asterisk port. </summary> @@ -17090,7 +17174,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_asterisk_client_packets" lineno="10988"> +<interface name="corenet_send_asterisk_client_packets" lineno="11006"> <summary> Send asterisk_client packets. </summary> @@ -17101,7 +17185,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11007"> +<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11025"> <summary> Do not audit attempts to send asterisk_client packets. </summary> @@ -17112,7 +17196,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_asterisk_client_packets" lineno="11026"> +<interface name="corenet_receive_asterisk_client_packets" lineno="11044"> <summary> Receive asterisk_client packets. </summary> @@ -17123,7 +17207,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11045"> +<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11063"> <summary> Do not audit attempts to receive asterisk_client packets. </summary> @@ -17134,7 +17218,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11064"> +<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11082"> <summary> Send and receive asterisk_client packets. </summary> @@ -17145,7 +17229,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11080"> +<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11098"> <summary> Do not audit attempts to send and receive asterisk_client packets. </summary> @@ -17156,7 +17240,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_asterisk_client_packets" lineno="11095"> +<interface name="corenet_relabelto_asterisk_client_packets" lineno="11113"> <summary> Relabel packets to asterisk_client the packet type. </summary> @@ -17166,7 +17250,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_asterisk_server_packets" lineno="11115"> +<interface name="corenet_send_asterisk_server_packets" lineno="11133"> <summary> Send asterisk_server packets. </summary> @@ -17177,7 +17261,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11134"> +<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11152"> <summary> Do not audit attempts to send asterisk_server packets. </summary> @@ -17188,7 +17272,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_asterisk_server_packets" lineno="11153"> +<interface name="corenet_receive_asterisk_server_packets" lineno="11171"> <summary> Receive asterisk_server packets. </summary> @@ -17199,7 +17283,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11172"> +<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11190"> <summary> Do not audit attempts to receive asterisk_server packets. </summary> @@ -17210,7 +17294,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11191"> +<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11209"> <summary> Send and receive asterisk_server packets. </summary> @@ -17221,7 +17305,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11207"> +<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11225"> <summary> Do not audit attempts to send and receive asterisk_server packets. </summary> @@ -17232,7 +17316,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_asterisk_server_packets" lineno="11222"> +<interface name="corenet_relabelto_asterisk_server_packets" lineno="11240"> <summary> Relabel packets to asterisk_server the packet type. </summary> @@ -17242,7 +17326,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_audit_port" lineno="11244"> +<interface name="corenet_tcp_sendrecv_audit_port" lineno="11262"> <summary> Send and receive TCP traffic on the audit port. </summary> @@ -17253,7 +17337,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_audit_port" lineno="11259"> +<interface name="corenet_udp_send_audit_port" lineno="11277"> <summary> Send UDP traffic on the audit port. </summary> @@ -17264,7 +17348,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11274"> +<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11292"> <summary> Do not audit attempts to send UDP traffic on the audit port. </summary> @@ -17275,7 +17359,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_audit_port" lineno="11289"> +<interface name="corenet_udp_receive_audit_port" lineno="11307"> <summary> Receive UDP traffic on the audit port. </summary> @@ -17286,7 +17370,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11304"> +<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11322"> <summary> Do not audit attempts to receive UDP traffic on the audit port. </summary> @@ -17297,7 +17381,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_audit_port" lineno="11319"> +<interface name="corenet_udp_sendrecv_audit_port" lineno="11337"> <summary> Send and receive UDP traffic on the audit port. </summary> @@ -17308,7 +17392,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11335"> +<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11353"> <summary> Do not audit attempts to send and receive UDP traffic on the audit port. @@ -17320,7 +17404,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_audit_port" lineno="11350"> +<interface name="corenet_tcp_bind_audit_port" lineno="11368"> <summary> Bind TCP sockets to the audit port. </summary> @@ -17331,7 +17415,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_audit_port" lineno="11370"> +<interface name="corenet_udp_bind_audit_port" lineno="11388"> <summary> Bind UDP sockets to the audit port. </summary> @@ -17342,7 +17426,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_audit_port" lineno="11389"> +<interface name="corenet_tcp_connect_audit_port" lineno="11407"> <summary> Make a TCP connection to the audit port. </summary> @@ -17352,7 +17436,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_audit_client_packets" lineno="11409"> +<interface name="corenet_send_audit_client_packets" lineno="11427"> <summary> Send audit_client packets. </summary> @@ -17363,7 +17447,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11428"> +<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11446"> <summary> Do not audit attempts to send audit_client packets. </summary> @@ -17374,7 +17458,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_audit_client_packets" lineno="11447"> +<interface name="corenet_receive_audit_client_packets" lineno="11465"> <summary> Receive audit_client packets. </summary> @@ -17385,7 +17469,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11466"> +<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11484"> <summary> Do not audit attempts to receive audit_client packets. </summary> @@ -17396,7 +17480,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_audit_client_packets" lineno="11485"> +<interface name="corenet_sendrecv_audit_client_packets" lineno="11503"> <summary> Send and receive audit_client packets. </summary> @@ -17407,7 +17491,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11501"> +<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11519"> <summary> Do not audit attempts to send and receive audit_client packets. </summary> @@ -17418,7 +17502,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_audit_client_packets" lineno="11516"> +<interface name="corenet_relabelto_audit_client_packets" lineno="11534"> <summary> Relabel packets to audit_client the packet type. </summary> @@ -17428,7 +17512,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_audit_server_packets" lineno="11536"> +<interface name="corenet_send_audit_server_packets" lineno="11554"> <summary> Send audit_server packets. </summary> @@ -17439,7 +17523,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11555"> +<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11573"> <summary> Do not audit attempts to send audit_server packets. </summary> @@ -17450,7 +17534,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_audit_server_packets" lineno="11574"> +<interface name="corenet_receive_audit_server_packets" lineno="11592"> <summary> Receive audit_server packets. </summary> @@ -17461,7 +17545,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11593"> +<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11611"> <summary> Do not audit attempts to receive audit_server packets. </summary> @@ -17472,7 +17556,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_audit_server_packets" lineno="11612"> +<interface name="corenet_sendrecv_audit_server_packets" lineno="11630"> <summary> Send and receive audit_server packets. </summary> @@ -17483,7 +17567,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11628"> +<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11646"> <summary> Do not audit attempts to send and receive audit_server packets. </summary> @@ -17494,7 +17578,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_audit_server_packets" lineno="11643"> +<interface name="corenet_relabelto_audit_server_packets" lineno="11661"> <summary> Relabel packets to audit_server the packet type. </summary> @@ -17504,7 +17588,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_auth_port" lineno="11665"> +<interface name="corenet_tcp_sendrecv_auth_port" lineno="11683"> <summary> Send and receive TCP traffic on the auth port. </summary> @@ -17515,7 +17599,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_auth_port" lineno="11680"> +<interface name="corenet_udp_send_auth_port" lineno="11698"> <summary> Send UDP traffic on the auth port. </summary> @@ -17526,7 +17610,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11695"> +<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11713"> <summary> Do not audit attempts to send UDP traffic on the auth port. </summary> @@ -17537,7 +17621,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_auth_port" lineno="11710"> +<interface name="corenet_udp_receive_auth_port" lineno="11728"> <summary> Receive UDP traffic on the auth port. </summary> @@ -17548,7 +17632,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11725"> +<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11743"> <summary> Do not audit attempts to receive UDP traffic on the auth port. </summary> @@ -17559,7 +17643,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_auth_port" lineno="11740"> +<interface name="corenet_udp_sendrecv_auth_port" lineno="11758"> <summary> Send and receive UDP traffic on the auth port. </summary> @@ -17570,7 +17654,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11756"> +<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11774"> <summary> Do not audit attempts to send and receive UDP traffic on the auth port. @@ -17582,7 +17666,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_auth_port" lineno="11771"> +<interface name="corenet_tcp_bind_auth_port" lineno="11789"> <summary> Bind TCP sockets to the auth port. </summary> @@ -17593,7 +17677,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_auth_port" lineno="11791"> +<interface name="corenet_udp_bind_auth_port" lineno="11809"> <summary> Bind UDP sockets to the auth port. </summary> @@ -17604,7 +17688,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_auth_port" lineno="11810"> +<interface name="corenet_tcp_connect_auth_port" lineno="11828"> <summary> Make a TCP connection to the auth port. </summary> @@ -17614,7 +17698,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_auth_client_packets" lineno="11830"> +<interface name="corenet_send_auth_client_packets" lineno="11848"> <summary> Send auth_client packets. </summary> @@ -17625,7 +17709,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11849"> +<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11867"> <summary> Do not audit attempts to send auth_client packets. </summary> @@ -17636,7 +17720,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_auth_client_packets" lineno="11868"> +<interface name="corenet_receive_auth_client_packets" lineno="11886"> <summary> Receive auth_client packets. </summary> @@ -17647,7 +17731,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11887"> +<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11905"> <summary> Do not audit attempts to receive auth_client packets. </summary> @@ -17658,7 +17742,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_auth_client_packets" lineno="11906"> +<interface name="corenet_sendrecv_auth_client_packets" lineno="11924"> <summary> Send and receive auth_client packets. </summary> @@ -17669,7 +17753,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11922"> +<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11940"> <summary> Do not audit attempts to send and receive auth_client packets. </summary> @@ -17680,7 +17764,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_auth_client_packets" lineno="11937"> +<interface name="corenet_relabelto_auth_client_packets" lineno="11955"> <summary> Relabel packets to auth_client the packet type. </summary> @@ -17690,7 +17774,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_auth_server_packets" lineno="11957"> +<interface name="corenet_send_auth_server_packets" lineno="11975"> <summary> Send auth_server packets. </summary> @@ -17701,7 +17785,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11976"> +<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11994"> <summary> Do not audit attempts to send auth_server packets. </summary> @@ -17712,7 +17796,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_auth_server_packets" lineno="11995"> +<interface name="corenet_receive_auth_server_packets" lineno="12013"> <summary> Receive auth_server packets. </summary> @@ -17723,7 +17807,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12014"> +<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12032"> <summary> Do not audit attempts to receive auth_server packets. </summary> @@ -17734,7 +17818,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_auth_server_packets" lineno="12033"> +<interface name="corenet_sendrecv_auth_server_packets" lineno="12051"> <summary> Send and receive auth_server packets. </summary> @@ -17745,7 +17829,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12049"> +<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12067"> <summary> Do not audit attempts to send and receive auth_server packets. </summary> @@ -17756,7 +17840,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_auth_server_packets" lineno="12064"> +<interface name="corenet_relabelto_auth_server_packets" lineno="12082"> <summary> Relabel packets to auth_server the packet type. </summary> @@ -17766,7 +17850,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12086"> +<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12104"> <summary> Send and receive TCP traffic on the bgp port. </summary> @@ -17777,7 +17861,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_bgp_port" lineno="12101"> +<interface name="corenet_udp_send_bgp_port" lineno="12119"> <summary> Send UDP traffic on the bgp port. </summary> @@ -17788,7 +17872,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12116"> +<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12134"> <summary> Do not audit attempts to send UDP traffic on the bgp port. </summary> @@ -17799,7 +17883,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_bgp_port" lineno="12131"> +<interface name="corenet_udp_receive_bgp_port" lineno="12149"> <summary> Receive UDP traffic on the bgp port. </summary> @@ -17810,7 +17894,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12146"> +<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12164"> <summary> Do not audit attempts to receive UDP traffic on the bgp port. </summary> @@ -17821,7 +17905,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_bgp_port" lineno="12161"> +<interface name="corenet_udp_sendrecv_bgp_port" lineno="12179"> <summary> Send and receive UDP traffic on the bgp port. </summary> @@ -17832,7 +17916,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12177"> +<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12195"> <summary> Do not audit attempts to send and receive UDP traffic on the bgp port. @@ -17844,7 +17928,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_bgp_port" lineno="12192"> +<interface name="corenet_tcp_bind_bgp_port" lineno="12210"> <summary> Bind TCP sockets to the bgp port. </summary> @@ -17855,7 +17939,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_bgp_port" lineno="12212"> +<interface name="corenet_udp_bind_bgp_port" lineno="12230"> <summary> Bind UDP sockets to the bgp port. </summary> @@ -17866,7 +17950,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_bgp_port" lineno="12231"> +<interface name="corenet_tcp_connect_bgp_port" lineno="12249"> <summary> Make a TCP connection to the bgp port. </summary> @@ -17876,7 +17960,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bgp_client_packets" lineno="12251"> +<interface name="corenet_send_bgp_client_packets" lineno="12269"> <summary> Send bgp_client packets. </summary> @@ -17887,7 +17971,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12270"> +<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12288"> <summary> Do not audit attempts to send bgp_client packets. </summary> @@ -17898,7 +17982,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bgp_client_packets" lineno="12289"> +<interface name="corenet_receive_bgp_client_packets" lineno="12307"> <summary> Receive bgp_client packets. </summary> @@ -17909,7 +17993,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12308"> +<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12326"> <summary> Do not audit attempts to receive bgp_client packets. </summary> @@ -17920,7 +18004,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bgp_client_packets" lineno="12327"> +<interface name="corenet_sendrecv_bgp_client_packets" lineno="12345"> <summary> Send and receive bgp_client packets. </summary> @@ -17931,7 +18015,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12343"> +<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12361"> <summary> Do not audit attempts to send and receive bgp_client packets. </summary> @@ -17942,7 +18026,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bgp_client_packets" lineno="12358"> +<interface name="corenet_relabelto_bgp_client_packets" lineno="12376"> <summary> Relabel packets to bgp_client the packet type. </summary> @@ -17952,7 +18036,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bgp_server_packets" lineno="12378"> +<interface name="corenet_send_bgp_server_packets" lineno="12396"> <summary> Send bgp_server packets. </summary> @@ -17963,7 +18047,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12397"> +<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12415"> <summary> Do not audit attempts to send bgp_server packets. </summary> @@ -17974,7 +18058,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bgp_server_packets" lineno="12416"> +<interface name="corenet_receive_bgp_server_packets" lineno="12434"> <summary> Receive bgp_server packets. </summary> @@ -17985,7 +18069,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12435"> +<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12453"> <summary> Do not audit attempts to receive bgp_server packets. </summary> @@ -17996,7 +18080,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bgp_server_packets" lineno="12454"> +<interface name="corenet_sendrecv_bgp_server_packets" lineno="12472"> <summary> Send and receive bgp_server packets. </summary> @@ -18007,7 +18091,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12470"> +<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12488"> <summary> Do not audit attempts to send and receive bgp_server packets. </summary> @@ -18018,7 +18102,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bgp_server_packets" lineno="12485"> +<interface name="corenet_relabelto_bgp_server_packets" lineno="12503"> <summary> Relabel packets to bgp_server the packet type. </summary> @@ -18028,7 +18112,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12507"> +<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12525"> <summary> Send and receive TCP traffic on the bitcoin port. </summary> @@ -18039,7 +18123,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_bitcoin_port" lineno="12522"> +<interface name="corenet_udp_send_bitcoin_port" lineno="12540"> <summary> Send UDP traffic on the bitcoin port. </summary> @@ -18050,7 +18134,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12537"> +<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12555"> <summary> Do not audit attempts to send UDP traffic on the bitcoin port. </summary> @@ -18061,7 +18145,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_bitcoin_port" lineno="12552"> +<interface name="corenet_udp_receive_bitcoin_port" lineno="12570"> <summary> Receive UDP traffic on the bitcoin port. </summary> @@ -18072,7 +18156,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12567"> +<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12585"> <summary> Do not audit attempts to receive UDP traffic on the bitcoin port. </summary> @@ -18083,7 +18167,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12582"> +<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12600"> <summary> Send and receive UDP traffic on the bitcoin port. </summary> @@ -18094,7 +18178,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12598"> +<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12616"> <summary> Do not audit attempts to send and receive UDP traffic on the bitcoin port. @@ -18106,7 +18190,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_bitcoin_port" lineno="12613"> +<interface name="corenet_tcp_bind_bitcoin_port" lineno="12631"> <summary> Bind TCP sockets to the bitcoin port. </summary> @@ -18117,7 +18201,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_bitcoin_port" lineno="12633"> +<interface name="corenet_udp_bind_bitcoin_port" lineno="12651"> <summary> Bind UDP sockets to the bitcoin port. </summary> @@ -18128,7 +18212,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_bitcoin_port" lineno="12652"> +<interface name="corenet_tcp_connect_bitcoin_port" lineno="12670"> <summary> Make a TCP connection to the bitcoin port. </summary> @@ -18138,7 +18222,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bitcoin_client_packets" lineno="12672"> +<interface name="corenet_send_bitcoin_client_packets" lineno="12690"> <summary> Send bitcoin_client packets. </summary> @@ -18149,7 +18233,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12691"> +<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12709"> <summary> Do not audit attempts to send bitcoin_client packets. </summary> @@ -18160,7 +18244,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bitcoin_client_packets" lineno="12710"> +<interface name="corenet_receive_bitcoin_client_packets" lineno="12728"> <summary> Receive bitcoin_client packets. </summary> @@ -18171,7 +18255,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12729"> +<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12747"> <summary> Do not audit attempts to receive bitcoin_client packets. </summary> @@ -18182,7 +18266,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12748"> +<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12766"> <summary> Send and receive bitcoin_client packets. </summary> @@ -18193,7 +18277,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12764"> +<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12782"> <summary> Do not audit attempts to send and receive bitcoin_client packets. </summary> @@ -18204,7 +18288,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12779"> +<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12797"> <summary> Relabel packets to bitcoin_client the packet type. </summary> @@ -18214,7 +18298,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bitcoin_server_packets" lineno="12799"> +<interface name="corenet_send_bitcoin_server_packets" lineno="12817"> <summary> Send bitcoin_server packets. </summary> @@ -18225,7 +18309,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12818"> +<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12836"> <summary> Do not audit attempts to send bitcoin_server packets. </summary> @@ -18236,7 +18320,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bitcoin_server_packets" lineno="12837"> +<interface name="corenet_receive_bitcoin_server_packets" lineno="12855"> <summary> Receive bitcoin_server packets. </summary> @@ -18247,7 +18331,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12856"> +<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12874"> <summary> Do not audit attempts to receive bitcoin_server packets. </summary> @@ -18258,7 +18342,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12875"> +<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12893"> <summary> Send and receive bitcoin_server packets. </summary> @@ -18269,7 +18353,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12891"> +<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12909"> <summary> Do not audit attempts to send and receive bitcoin_server packets. </summary> @@ -18280,7 +18364,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12906"> +<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12924"> <summary> Relabel packets to bitcoin_server the packet type. </summary> @@ -18290,7 +18374,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12928"> +<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12946"> <summary> Send and receive TCP traffic on the boinc port. </summary> @@ -18301,7 +18385,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_boinc_port" lineno="12943"> +<interface name="corenet_udp_send_boinc_port" lineno="12961"> <summary> Send UDP traffic on the boinc port. </summary> @@ -18312,7 +18396,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12958"> +<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12976"> <summary> Do not audit attempts to send UDP traffic on the boinc port. </summary> @@ -18323,7 +18407,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_boinc_port" lineno="12973"> +<interface name="corenet_udp_receive_boinc_port" lineno="12991"> <summary> Receive UDP traffic on the boinc port. </summary> @@ -18334,7 +18418,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12988"> +<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="13006"> <summary> Do not audit attempts to receive UDP traffic on the boinc port. </summary> @@ -18345,7 +18429,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_boinc_port" lineno="13003"> +<interface name="corenet_udp_sendrecv_boinc_port" lineno="13021"> <summary> Send and receive UDP traffic on the boinc port. </summary> @@ -18356,7 +18440,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13019"> +<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13037"> <summary> Do not audit attempts to send and receive UDP traffic on the boinc port. @@ -18368,7 +18452,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_boinc_port" lineno="13034"> +<interface name="corenet_tcp_bind_boinc_port" lineno="13052"> <summary> Bind TCP sockets to the boinc port. </summary> @@ -18379,7 +18463,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_boinc_port" lineno="13054"> +<interface name="corenet_udp_bind_boinc_port" lineno="13072"> <summary> Bind UDP sockets to the boinc port. </summary> @@ -18390,7 +18474,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_boinc_port" lineno="13073"> +<interface name="corenet_tcp_connect_boinc_port" lineno="13091"> <summary> Make a TCP connection to the boinc port. </summary> @@ -18400,7 +18484,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_client_packets" lineno="13093"> +<interface name="corenet_send_boinc_client_packets" lineno="13111"> <summary> Send boinc_client packets. </summary> @@ -18411,7 +18495,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13112"> +<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13130"> <summary> Do not audit attempts to send boinc_client packets. </summary> @@ -18422,7 +18506,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_client_packets" lineno="13131"> +<interface name="corenet_receive_boinc_client_packets" lineno="13149"> <summary> Receive boinc_client packets. </summary> @@ -18433,7 +18517,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13150"> +<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13168"> <summary> Do not audit attempts to receive boinc_client packets. </summary> @@ -18444,7 +18528,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_client_packets" lineno="13169"> +<interface name="corenet_sendrecv_boinc_client_packets" lineno="13187"> <summary> Send and receive boinc_client packets. </summary> @@ -18455,7 +18539,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13185"> +<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13203"> <summary> Do not audit attempts to send and receive boinc_client packets. </summary> @@ -18466,7 +18550,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_client_packets" lineno="13200"> +<interface name="corenet_relabelto_boinc_client_packets" lineno="13218"> <summary> Relabel packets to boinc_client the packet type. </summary> @@ -18476,7 +18560,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_server_packets" lineno="13220"> +<interface name="corenet_send_boinc_server_packets" lineno="13238"> <summary> Send boinc_server packets. </summary> @@ -18487,7 +18571,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13239"> +<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13257"> <summary> Do not audit attempts to send boinc_server packets. </summary> @@ -18498,7 +18582,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_server_packets" lineno="13258"> +<interface name="corenet_receive_boinc_server_packets" lineno="13276"> <summary> Receive boinc_server packets. </summary> @@ -18509,7 +18593,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13277"> +<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13295"> <summary> Do not audit attempts to receive boinc_server packets. </summary> @@ -18520,7 +18604,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_server_packets" lineno="13296"> +<interface name="corenet_sendrecv_boinc_server_packets" lineno="13314"> <summary> Send and receive boinc_server packets. </summary> @@ -18531,7 +18615,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13312"> +<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13330"> <summary> Do not audit attempts to send and receive boinc_server packets. </summary> @@ -18542,7 +18626,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_server_packets" lineno="13327"> +<interface name="corenet_relabelto_boinc_server_packets" lineno="13345"> <summary> Relabel packets to boinc_server the packet type. </summary> @@ -18552,7 +18636,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13349"> +<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13367"> <summary> Send and receive TCP traffic on the boinc_client port. </summary> @@ -18563,7 +18647,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_boinc_client_port" lineno="13364"> +<interface name="corenet_udp_send_boinc_client_port" lineno="13382"> <summary> Send UDP traffic on the boinc_client port. </summary> @@ -18574,7 +18658,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13379"> +<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13397"> <summary> Do not audit attempts to send UDP traffic on the boinc_client port. </summary> @@ -18585,7 +18669,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_boinc_client_port" lineno="13394"> +<interface name="corenet_udp_receive_boinc_client_port" lineno="13412"> <summary> Receive UDP traffic on the boinc_client port. </summary> @@ -18596,7 +18680,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13409"> +<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13427"> <summary> Do not audit attempts to receive UDP traffic on the boinc_client port. </summary> @@ -18607,7 +18691,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13424"> +<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13442"> <summary> Send and receive UDP traffic on the boinc_client port. </summary> @@ -18618,7 +18702,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13440"> +<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13458"> <summary> Do not audit attempts to send and receive UDP traffic on the boinc_client port. @@ -18630,7 +18714,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_boinc_client_port" lineno="13455"> +<interface name="corenet_tcp_bind_boinc_client_port" lineno="13473"> <summary> Bind TCP sockets to the boinc_client port. </summary> @@ -18641,7 +18725,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_boinc_client_port" lineno="13475"> +<interface name="corenet_udp_bind_boinc_client_port" lineno="13493"> <summary> Bind UDP sockets to the boinc_client port. </summary> @@ -18652,7 +18736,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_boinc_client_port" lineno="13494"> +<interface name="corenet_tcp_connect_boinc_client_port" lineno="13512"> <summary> Make a TCP connection to the boinc_client port. </summary> @@ -18662,7 +18746,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_client_client_packets" lineno="13514"> +<interface name="corenet_send_boinc_client_client_packets" lineno="13532"> <summary> Send boinc_client_client packets. </summary> @@ -18673,7 +18757,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13533"> +<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13551"> <summary> Do not audit attempts to send boinc_client_client packets. </summary> @@ -18684,7 +18768,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_client_client_packets" lineno="13552"> +<interface name="corenet_receive_boinc_client_client_packets" lineno="13570"> <summary> Receive boinc_client_client packets. </summary> @@ -18695,7 +18779,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13571"> +<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13589"> <summary> Do not audit attempts to receive boinc_client_client packets. </summary> @@ -18706,7 +18790,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13590"> +<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13608"> <summary> Send and receive boinc_client_client packets. </summary> @@ -18717,7 +18801,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13606"> +<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13624"> <summary> Do not audit attempts to send and receive boinc_client_client packets. </summary> @@ -18728,7 +18812,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13621"> +<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13639"> <summary> Relabel packets to boinc_client_client the packet type. </summary> @@ -18738,7 +18822,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_client_server_packets" lineno="13641"> +<interface name="corenet_send_boinc_client_server_packets" lineno="13659"> <summary> Send boinc_client_server packets. </summary> @@ -18749,7 +18833,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13660"> +<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13678"> <summary> Do not audit attempts to send boinc_client_server packets. </summary> @@ -18760,7 +18844,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_client_server_packets" lineno="13679"> +<interface name="corenet_receive_boinc_client_server_packets" lineno="13697"> <summary> Receive boinc_client_server packets. </summary> @@ -18771,7 +18855,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13698"> +<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13716"> <summary> Do not audit attempts to receive boinc_client_server packets. </summary> @@ -18782,7 +18866,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13717"> +<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13735"> <summary> Send and receive boinc_client_server packets. </summary> @@ -18793,7 +18877,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13733"> +<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13751"> <summary> Do not audit attempts to send and receive boinc_client_server packets. </summary> @@ -18804,7 +18888,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13748"> +<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13766"> <summary> Relabel packets to boinc_client_server the packet type. </summary> @@ -18814,7 +18898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_biff_port" lineno="13770"> +<interface name="corenet_tcp_sendrecv_biff_port" lineno="13788"> <summary> Send and receive TCP traffic on the biff port. </summary> @@ -18825,7 +18909,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_biff_port" lineno="13785"> +<interface name="corenet_udp_send_biff_port" lineno="13803"> <summary> Send UDP traffic on the biff port. </summary> @@ -18836,7 +18920,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13800"> +<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13818"> <summary> Do not audit attempts to send UDP traffic on the biff port. </summary> @@ -18847,7 +18931,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_biff_port" lineno="13815"> +<interface name="corenet_udp_receive_biff_port" lineno="13833"> <summary> Receive UDP traffic on the biff port. </summary> @@ -18858,7 +18942,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13830"> +<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13848"> <summary> Do not audit attempts to receive UDP traffic on the biff port. </summary> @@ -18869,7 +18953,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_biff_port" lineno="13845"> +<interface name="corenet_udp_sendrecv_biff_port" lineno="13863"> <summary> Send and receive UDP traffic on the biff port. </summary> @@ -18880,7 +18964,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13861"> +<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13879"> <summary> Do not audit attempts to send and receive UDP traffic on the biff port. @@ -18892,7 +18976,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_biff_port" lineno="13876"> +<interface name="corenet_tcp_bind_biff_port" lineno="13894"> <summary> Bind TCP sockets to the biff port. </summary> @@ -18903,7 +18987,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_biff_port" lineno="13896"> +<interface name="corenet_udp_bind_biff_port" lineno="13914"> <summary> Bind UDP sockets to the biff port. </summary> @@ -18914,7 +18998,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_biff_port" lineno="13915"> +<interface name="corenet_tcp_connect_biff_port" lineno="13933"> <summary> Make a TCP connection to the biff port. </summary> @@ -18924,7 +19008,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_biff_client_packets" lineno="13935"> +<interface name="corenet_send_biff_client_packets" lineno="13953"> <summary> Send biff_client packets. </summary> @@ -18935,7 +19019,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13954"> +<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13972"> <summary> Do not audit attempts to send biff_client packets. </summary> @@ -18946,7 +19030,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_biff_client_packets" lineno="13973"> +<interface name="corenet_receive_biff_client_packets" lineno="13991"> <summary> Receive biff_client packets. </summary> @@ -18957,7 +19041,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13992"> +<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="14010"> <summary> Do not audit attempts to receive biff_client packets. </summary> @@ -18968,7 +19052,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_biff_client_packets" lineno="14011"> +<interface name="corenet_sendrecv_biff_client_packets" lineno="14029"> <summary> Send and receive biff_client packets. </summary> @@ -18979,7 +19063,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14027"> +<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14045"> <summary> Do not audit attempts to send and receive biff_client packets. </summary> @@ -18990,7 +19074,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_biff_client_packets" lineno="14042"> +<interface name="corenet_relabelto_biff_client_packets" lineno="14060"> <summary> Relabel packets to biff_client the packet type. </summary> @@ -19000,7 +19084,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_biff_server_packets" lineno="14062"> +<interface name="corenet_send_biff_server_packets" lineno="14080"> <summary> Send biff_server packets. </summary> @@ -19011,7 +19095,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14081"> +<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14099"> <summary> Do not audit attempts to send biff_server packets. </summary> @@ -19022,7 +19106,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_biff_server_packets" lineno="14100"> +<interface name="corenet_receive_biff_server_packets" lineno="14118"> <summary> Receive biff_server packets. </summary> @@ -19033,7 +19117,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14119"> +<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14137"> <summary> Do not audit attempts to receive biff_server packets. </summary> @@ -19044,7 +19128,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_biff_server_packets" lineno="14138"> +<interface name="corenet_sendrecv_biff_server_packets" lineno="14156"> <summary> Send and receive biff_server packets. </summary> @@ -19055,7 +19139,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14154"> +<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14172"> <summary> Do not audit attempts to send and receive biff_server packets. </summary> @@ -19066,7 +19150,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_biff_server_packets" lineno="14169"> +<interface name="corenet_relabelto_biff_server_packets" lineno="14187"> <summary> Relabel packets to biff_server the packet type. </summary> @@ -19076,7 +19160,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14191"> +<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14209"> <summary> Send and receive TCP traffic on the certmaster port. </summary> @@ -19087,7 +19171,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_certmaster_port" lineno="14206"> +<interface name="corenet_udp_send_certmaster_port" lineno="14224"> <summary> Send UDP traffic on the certmaster port. </summary> @@ -19098,7 +19182,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14221"> +<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14239"> <summary> Do not audit attempts to send UDP traffic on the certmaster port. </summary> @@ -19109,7 +19193,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_certmaster_port" lineno="14236"> +<interface name="corenet_udp_receive_certmaster_port" lineno="14254"> <summary> Receive UDP traffic on the certmaster port. </summary> @@ -19120,7 +19204,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14251"> +<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14269"> <summary> Do not audit attempts to receive UDP traffic on the certmaster port. </summary> @@ -19131,7 +19215,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14266"> +<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14284"> <summary> Send and receive UDP traffic on the certmaster port. </summary> @@ -19142,7 +19226,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14282"> +<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14300"> <summary> Do not audit attempts to send and receive UDP traffic on the certmaster port. @@ -19154,7 +19238,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_certmaster_port" lineno="14297"> +<interface name="corenet_tcp_bind_certmaster_port" lineno="14315"> <summary> Bind TCP sockets to the certmaster port. </summary> @@ -19165,7 +19249,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_certmaster_port" lineno="14317"> +<interface name="corenet_udp_bind_certmaster_port" lineno="14335"> <summary> Bind UDP sockets to the certmaster port. </summary> @@ -19176,7 +19260,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_certmaster_port" lineno="14336"> +<interface name="corenet_tcp_connect_certmaster_port" lineno="14354"> <summary> Make a TCP connection to the certmaster port. </summary> @@ -19186,7 +19270,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_certmaster_client_packets" lineno="14356"> +<interface name="corenet_send_certmaster_client_packets" lineno="14374"> <summary> Send certmaster_client packets. </summary> @@ -19197,7 +19281,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14375"> +<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14393"> <summary> Do not audit attempts to send certmaster_client packets. </summary> @@ -19208,7 +19292,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_certmaster_client_packets" lineno="14394"> +<interface name="corenet_receive_certmaster_client_packets" lineno="14412"> <summary> Receive certmaster_client packets. </summary> @@ -19219,7 +19303,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14413"> +<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14431"> <summary> Do not audit attempts to receive certmaster_client packets. </summary> @@ -19230,7 +19314,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14432"> +<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14450"> <summary> Send and receive certmaster_client packets. </summary> @@ -19241,7 +19325,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14448"> +<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14466"> <summary> Do not audit attempts to send and receive certmaster_client packets. </summary> @@ -19252,7 +19336,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_certmaster_client_packets" lineno="14463"> +<interface name="corenet_relabelto_certmaster_client_packets" lineno="14481"> <summary> Relabel packets to certmaster_client the packet type. </summary> @@ -19262,7 +19346,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_certmaster_server_packets" lineno="14483"> +<interface name="corenet_send_certmaster_server_packets" lineno="14501"> <summary> Send certmaster_server packets. </summary> @@ -19273,7 +19357,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14502"> +<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14520"> <summary> Do not audit attempts to send certmaster_server packets. </summary> @@ -19284,7 +19368,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_certmaster_server_packets" lineno="14521"> +<interface name="corenet_receive_certmaster_server_packets" lineno="14539"> <summary> Receive certmaster_server packets. </summary> @@ -19295,7 +19379,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14540"> +<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14558"> <summary> Do not audit attempts to receive certmaster_server packets. </summary> @@ -19306,7 +19390,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14559"> +<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14577"> <summary> Send and receive certmaster_server packets. </summary> @@ -19317,7 +19401,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14575"> +<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14593"> <summary> Do not audit attempts to send and receive certmaster_server packets. </summary> @@ -19328,7 +19412,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_certmaster_server_packets" lineno="14590"> +<interface name="corenet_relabelto_certmaster_server_packets" lineno="14608"> <summary> Relabel packets to certmaster_server the packet type. </summary> @@ -19338,7 +19422,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14612"> +<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14630"> <summary> Send and receive TCP traffic on the chronyd port. </summary> @@ -19349,7 +19433,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_chronyd_port" lineno="14627"> +<interface name="corenet_udp_send_chronyd_port" lineno="14645"> <summary> Send UDP traffic on the chronyd port. </summary> @@ -19360,7 +19444,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14642"> +<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14660"> <summary> Do not audit attempts to send UDP traffic on the chronyd port. </summary> @@ -19371,7 +19455,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_chronyd_port" lineno="14657"> +<interface name="corenet_udp_receive_chronyd_port" lineno="14675"> <summary> Receive UDP traffic on the chronyd port. </summary> @@ -19382,7 +19466,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14672"> +<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14690"> <summary> Do not audit attempts to receive UDP traffic on the chronyd port. </summary> @@ -19393,7 +19477,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14687"> +<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14705"> <summary> Send and receive UDP traffic on the chronyd port. </summary> @@ -19404,7 +19488,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14703"> +<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14721"> <summary> Do not audit attempts to send and receive UDP traffic on the chronyd port. @@ -19416,7 +19500,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_chronyd_port" lineno="14718"> +<interface name="corenet_tcp_bind_chronyd_port" lineno="14736"> <summary> Bind TCP sockets to the chronyd port. </summary> @@ -19427,7 +19511,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_chronyd_port" lineno="14738"> +<interface name="corenet_udp_bind_chronyd_port" lineno="14756"> <summary> Bind UDP sockets to the chronyd port. </summary> @@ -19438,7 +19522,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_chronyd_port" lineno="14757"> +<interface name="corenet_tcp_connect_chronyd_port" lineno="14775"> <summary> Make a TCP connection to the chronyd port. </summary> @@ -19448,7 +19532,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_chronyd_client_packets" lineno="14777"> +<interface name="corenet_send_chronyd_client_packets" lineno="14795"> <summary> Send chronyd_client packets. </summary> @@ -19459,7 +19543,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14796"> +<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14814"> <summary> Do not audit attempts to send chronyd_client packets. </summary> @@ -19470,7 +19554,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_chronyd_client_packets" lineno="14815"> +<interface name="corenet_receive_chronyd_client_packets" lineno="14833"> <summary> Receive chronyd_client packets. </summary> @@ -19481,7 +19565,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14834"> +<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14852"> <summary> Do not audit attempts to receive chronyd_client packets. </summary> @@ -19492,7 +19576,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14853"> +<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14871"> <summary> Send and receive chronyd_client packets. </summary> @@ -19503,7 +19587,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14869"> +<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14887"> <summary> Do not audit attempts to send and receive chronyd_client packets. </summary> @@ -19514,7 +19598,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_chronyd_client_packets" lineno="14884"> +<interface name="corenet_relabelto_chronyd_client_packets" lineno="14902"> <summary> Relabel packets to chronyd_client the packet type. </summary> @@ -19524,7 +19608,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_chronyd_server_packets" lineno="14904"> +<interface name="corenet_send_chronyd_server_packets" lineno="14922"> <summary> Send chronyd_server packets. </summary> @@ -19535,7 +19619,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14923"> +<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14941"> <summary> Do not audit attempts to send chronyd_server packets. </summary> @@ -19546,7 +19630,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_chronyd_server_packets" lineno="14942"> +<interface name="corenet_receive_chronyd_server_packets" lineno="14960"> <summary> Receive chronyd_server packets. </summary> @@ -19557,7 +19641,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14961"> +<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14979"> <summary> Do not audit attempts to receive chronyd_server packets. </summary> @@ -19568,7 +19652,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14980"> +<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14998"> <summary> Send and receive chronyd_server packets. </summary> @@ -19579,7 +19663,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14996"> +<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="15014"> <summary> Do not audit attempts to send and receive chronyd_server packets. </summary> @@ -19590,7 +19674,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_chronyd_server_packets" lineno="15011"> +<interface name="corenet_relabelto_chronyd_server_packets" lineno="15029"> <summary> Relabel packets to chronyd_server the packet type. </summary> @@ -19600,7 +19684,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15033"> +<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15051"> <summary> Send and receive TCP traffic on the clamd port. </summary> @@ -19611,7 +19695,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_clamd_port" lineno="15048"> +<interface name="corenet_udp_send_clamd_port" lineno="15066"> <summary> Send UDP traffic on the clamd port. </summary> @@ -19622,7 +19706,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15063"> +<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15081"> <summary> Do not audit attempts to send UDP traffic on the clamd port. </summary> @@ -19633,7 +19717,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_clamd_port" lineno="15078"> +<interface name="corenet_udp_receive_clamd_port" lineno="15096"> <summary> Receive UDP traffic on the clamd port. </summary> @@ -19644,7 +19728,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15093"> +<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15111"> <summary> Do not audit attempts to receive UDP traffic on the clamd port. </summary> @@ -19655,7 +19739,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_clamd_port" lineno="15108"> +<interface name="corenet_udp_sendrecv_clamd_port" lineno="15126"> <summary> Send and receive UDP traffic on the clamd port. </summary> @@ -19666,7 +19750,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15124"> +<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15142"> <summary> Do not audit attempts to send and receive UDP traffic on the clamd port. @@ -19678,7 +19762,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_clamd_port" lineno="15139"> +<interface name="corenet_tcp_bind_clamd_port" lineno="15157"> <summary> Bind TCP sockets to the clamd port. </summary> @@ -19689,7 +19773,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_clamd_port" lineno="15159"> +<interface name="corenet_udp_bind_clamd_port" lineno="15177"> <summary> Bind UDP sockets to the clamd port. </summary> @@ -19700,7 +19784,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_clamd_port" lineno="15178"> +<interface name="corenet_tcp_connect_clamd_port" lineno="15196"> <summary> Make a TCP connection to the clamd port. </summary> @@ -19710,7 +19794,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clamd_client_packets" lineno="15198"> +<interface name="corenet_send_clamd_client_packets" lineno="15216"> <summary> Send clamd_client packets. </summary> @@ -19721,7 +19805,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15217"> +<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15235"> <summary> Do not audit attempts to send clamd_client packets. </summary> @@ -19732,7 +19816,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clamd_client_packets" lineno="15236"> +<interface name="corenet_receive_clamd_client_packets" lineno="15254"> <summary> Receive clamd_client packets. </summary> @@ -19743,7 +19827,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15255"> +<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15273"> <summary> Do not audit attempts to receive clamd_client packets. </summary> @@ -19754,7 +19838,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clamd_client_packets" lineno="15274"> +<interface name="corenet_sendrecv_clamd_client_packets" lineno="15292"> <summary> Send and receive clamd_client packets. </summary> @@ -19765,7 +19849,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15290"> +<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15308"> <summary> Do not audit attempts to send and receive clamd_client packets. </summary> @@ -19776,7 +19860,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clamd_client_packets" lineno="15305"> +<interface name="corenet_relabelto_clamd_client_packets" lineno="15323"> <summary> Relabel packets to clamd_client the packet type. </summary> @@ -19786,7 +19870,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clamd_server_packets" lineno="15325"> +<interface name="corenet_send_clamd_server_packets" lineno="15343"> <summary> Send clamd_server packets. </summary> @@ -19797,7 +19881,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15344"> +<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15362"> <summary> Do not audit attempts to send clamd_server packets. </summary> @@ -19808,7 +19892,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clamd_server_packets" lineno="15363"> +<interface name="corenet_receive_clamd_server_packets" lineno="15381"> <summary> Receive clamd_server packets. </summary> @@ -19819,7 +19903,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15382"> +<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15400"> <summary> Do not audit attempts to receive clamd_server packets. </summary> @@ -19830,7 +19914,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clamd_server_packets" lineno="15401"> +<interface name="corenet_sendrecv_clamd_server_packets" lineno="15419"> <summary> Send and receive clamd_server packets. </summary> @@ -19841,7 +19925,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15417"> +<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15435"> <summary> Do not audit attempts to send and receive clamd_server packets. </summary> @@ -19852,7 +19936,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clamd_server_packets" lineno="15432"> +<interface name="corenet_relabelto_clamd_server_packets" lineno="15450"> <summary> Relabel packets to clamd_server the packet type. </summary> @@ -19862,7 +19946,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15454"> +<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15472"> <summary> Send and receive TCP traffic on the clockspeed port. </summary> @@ -19873,7 +19957,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_clockspeed_port" lineno="15469"> +<interface name="corenet_udp_send_clockspeed_port" lineno="15487"> <summary> Send UDP traffic on the clockspeed port. </summary> @@ -19884,7 +19968,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15484"> +<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15502"> <summary> Do not audit attempts to send UDP traffic on the clockspeed port. </summary> @@ -19895,7 +19979,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_clockspeed_port" lineno="15499"> +<interface name="corenet_udp_receive_clockspeed_port" lineno="15517"> <summary> Receive UDP traffic on the clockspeed port. </summary> @@ -19906,7 +19990,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15514"> +<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15532"> <summary> Do not audit attempts to receive UDP traffic on the clockspeed port. </summary> @@ -19917,7 +20001,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15529"> +<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15547"> <summary> Send and receive UDP traffic on the clockspeed port. </summary> @@ -19928,7 +20012,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15545"> +<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15563"> <summary> Do not audit attempts to send and receive UDP traffic on the clockspeed port. @@ -19940,7 +20024,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_clockspeed_port" lineno="15560"> +<interface name="corenet_tcp_bind_clockspeed_port" lineno="15578"> <summary> Bind TCP sockets to the clockspeed port. </summary> @@ -19951,7 +20035,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_clockspeed_port" lineno="15580"> +<interface name="corenet_udp_bind_clockspeed_port" lineno="15598"> <summary> Bind UDP sockets to the clockspeed port. </summary> @@ -19962,7 +20046,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_clockspeed_port" lineno="15599"> +<interface name="corenet_tcp_connect_clockspeed_port" lineno="15617"> <summary> Make a TCP connection to the clockspeed port. </summary> @@ -19972,7 +20056,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clockspeed_client_packets" lineno="15619"> +<interface name="corenet_send_clockspeed_client_packets" lineno="15637"> <summary> Send clockspeed_client packets. </summary> @@ -19983,7 +20067,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15638"> +<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15656"> <summary> Do not audit attempts to send clockspeed_client packets. </summary> @@ -19994,7 +20078,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clockspeed_client_packets" lineno="15657"> +<interface name="corenet_receive_clockspeed_client_packets" lineno="15675"> <summary> Receive clockspeed_client packets. </summary> @@ -20005,7 +20089,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15676"> +<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15694"> <summary> Do not audit attempts to receive clockspeed_client packets. </summary> @@ -20016,7 +20100,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15695"> +<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15713"> <summary> Send and receive clockspeed_client packets. </summary> @@ -20027,7 +20111,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15711"> +<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15729"> <summary> Do not audit attempts to send and receive clockspeed_client packets. </summary> @@ -20038,7 +20122,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15726"> +<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15744"> <summary> Relabel packets to clockspeed_client the packet type. </summary> @@ -20048,7 +20132,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clockspeed_server_packets" lineno="15746"> +<interface name="corenet_send_clockspeed_server_packets" lineno="15764"> <summary> Send clockspeed_server packets. </summary> @@ -20059,7 +20143,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15765"> +<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15783"> <summary> Do not audit attempts to send clockspeed_server packets. </summary> @@ -20070,7 +20154,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clockspeed_server_packets" lineno="15784"> +<interface name="corenet_receive_clockspeed_server_packets" lineno="15802"> <summary> Receive clockspeed_server packets. </summary> @@ -20081,7 +20165,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15803"> +<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15821"> <summary> Do not audit attempts to receive clockspeed_server packets. </summary> @@ -20092,7 +20176,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15822"> +<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15840"> <summary> Send and receive clockspeed_server packets. </summary> @@ -20103,7 +20187,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15838"> +<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15856"> <summary> Do not audit attempts to send and receive clockspeed_server packets. </summary> @@ -20114,7 +20198,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15853"> +<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15871"> <summary> Relabel packets to clockspeed_server the packet type. </summary> @@ -20124,7 +20208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15875"> +<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15893"> <summary> Send and receive TCP traffic on the cluster port. </summary> @@ -20135,7 +20219,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cluster_port" lineno="15890"> +<interface name="corenet_udp_send_cluster_port" lineno="15908"> <summary> Send UDP traffic on the cluster port. </summary> @@ -20146,7 +20230,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15905"> +<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15923"> <summary> Do not audit attempts to send UDP traffic on the cluster port. </summary> @@ -20157,7 +20241,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cluster_port" lineno="15920"> +<interface name="corenet_udp_receive_cluster_port" lineno="15938"> <summary> Receive UDP traffic on the cluster port. </summary> @@ -20168,7 +20252,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15935"> +<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15953"> <summary> Do not audit attempts to receive UDP traffic on the cluster port. </summary> @@ -20179,7 +20263,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cluster_port" lineno="15950"> +<interface name="corenet_udp_sendrecv_cluster_port" lineno="15968"> <summary> Send and receive UDP traffic on the cluster port. </summary> @@ -20190,7 +20274,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15966"> +<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15984"> <summary> Do not audit attempts to send and receive UDP traffic on the cluster port. @@ -20202,7 +20286,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cluster_port" lineno="15981"> +<interface name="corenet_tcp_bind_cluster_port" lineno="15999"> <summary> Bind TCP sockets to the cluster port. </summary> @@ -20213,7 +20297,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cluster_port" lineno="16001"> +<interface name="corenet_udp_bind_cluster_port" lineno="16019"> <summary> Bind UDP sockets to the cluster port. </summary> @@ -20224,7 +20308,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cluster_port" lineno="16020"> +<interface name="corenet_tcp_connect_cluster_port" lineno="16038"> <summary> Make a TCP connection to the cluster port. </summary> @@ -20234,7 +20318,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cluster_client_packets" lineno="16040"> +<interface name="corenet_send_cluster_client_packets" lineno="16058"> <summary> Send cluster_client packets. </summary> @@ -20245,7 +20329,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16059"> +<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16077"> <summary> Do not audit attempts to send cluster_client packets. </summary> @@ -20256,7 +20340,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cluster_client_packets" lineno="16078"> +<interface name="corenet_receive_cluster_client_packets" lineno="16096"> <summary> Receive cluster_client packets. </summary> @@ -20267,7 +20351,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16097"> +<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16115"> <summary> Do not audit attempts to receive cluster_client packets. </summary> @@ -20278,7 +20362,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cluster_client_packets" lineno="16116"> +<interface name="corenet_sendrecv_cluster_client_packets" lineno="16134"> <summary> Send and receive cluster_client packets. </summary> @@ -20289,7 +20373,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16132"> +<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16150"> <summary> Do not audit attempts to send and receive cluster_client packets. </summary> @@ -20300,7 +20384,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cluster_client_packets" lineno="16147"> +<interface name="corenet_relabelto_cluster_client_packets" lineno="16165"> <summary> Relabel packets to cluster_client the packet type. </summary> @@ -20310,7 +20394,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cluster_server_packets" lineno="16167"> +<interface name="corenet_send_cluster_server_packets" lineno="16185"> <summary> Send cluster_server packets. </summary> @@ -20321,7 +20405,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16186"> +<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16204"> <summary> Do not audit attempts to send cluster_server packets. </summary> @@ -20332,7 +20416,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cluster_server_packets" lineno="16205"> +<interface name="corenet_receive_cluster_server_packets" lineno="16223"> <summary> Receive cluster_server packets. </summary> @@ -20343,7 +20427,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16224"> +<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16242"> <summary> Do not audit attempts to receive cluster_server packets. </summary> @@ -20354,7 +20438,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cluster_server_packets" lineno="16243"> +<interface name="corenet_sendrecv_cluster_server_packets" lineno="16261"> <summary> Send and receive cluster_server packets. </summary> @@ -20365,7 +20449,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16259"> +<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16277"> <summary> Do not audit attempts to send and receive cluster_server packets. </summary> @@ -20376,7 +20460,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cluster_server_packets" lineno="16274"> +<interface name="corenet_relabelto_cluster_server_packets" lineno="16292"> <summary> Relabel packets to cluster_server the packet type. </summary> @@ -20386,7 +20470,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cma_port" lineno="16296"> +<interface name="corenet_tcp_sendrecv_cma_port" lineno="16314"> <summary> Send and receive TCP traffic on the cma port. </summary> @@ -20397,7 +20481,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cma_port" lineno="16311"> +<interface name="corenet_udp_send_cma_port" lineno="16329"> <summary> Send UDP traffic on the cma port. </summary> @@ -20408,7 +20492,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16326"> +<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16344"> <summary> Do not audit attempts to send UDP traffic on the cma port. </summary> @@ -20419,7 +20503,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cma_port" lineno="16341"> +<interface name="corenet_udp_receive_cma_port" lineno="16359"> <summary> Receive UDP traffic on the cma port. </summary> @@ -20430,7 +20514,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16356"> +<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16374"> <summary> Do not audit attempts to receive UDP traffic on the cma port. </summary> @@ -20441,7 +20525,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cma_port" lineno="16371"> +<interface name="corenet_udp_sendrecv_cma_port" lineno="16389"> <summary> Send and receive UDP traffic on the cma port. </summary> @@ -20452,7 +20536,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16387"> +<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16405"> <summary> Do not audit attempts to send and receive UDP traffic on the cma port. @@ -20464,7 +20548,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cma_port" lineno="16402"> +<interface name="corenet_tcp_bind_cma_port" lineno="16420"> <summary> Bind TCP sockets to the cma port. </summary> @@ -20475,7 +20559,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cma_port" lineno="16422"> +<interface name="corenet_udp_bind_cma_port" lineno="16440"> <summary> Bind UDP sockets to the cma port. </summary> @@ -20486,7 +20570,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cma_port" lineno="16441"> +<interface name="corenet_tcp_connect_cma_port" lineno="16459"> <summary> Make a TCP connection to the cma port. </summary> @@ -20496,7 +20580,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cma_client_packets" lineno="16461"> +<interface name="corenet_send_cma_client_packets" lineno="16479"> <summary> Send cma_client packets. </summary> @@ -20507,7 +20591,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16480"> +<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16498"> <summary> Do not audit attempts to send cma_client packets. </summary> @@ -20518,7 +20602,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cma_client_packets" lineno="16499"> +<interface name="corenet_receive_cma_client_packets" lineno="16517"> <summary> Receive cma_client packets. </summary> @@ -20529,7 +20613,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16518"> +<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16536"> <summary> Do not audit attempts to receive cma_client packets. </summary> @@ -20540,7 +20624,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cma_client_packets" lineno="16537"> +<interface name="corenet_sendrecv_cma_client_packets" lineno="16555"> <summary> Send and receive cma_client packets. </summary> @@ -20551,7 +20635,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16553"> +<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16571"> <summary> Do not audit attempts to send and receive cma_client packets. </summary> @@ -20562,7 +20646,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cma_client_packets" lineno="16568"> +<interface name="corenet_relabelto_cma_client_packets" lineno="16586"> <summary> Relabel packets to cma_client the packet type. </summary> @@ -20572,7 +20656,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cma_server_packets" lineno="16588"> +<interface name="corenet_send_cma_server_packets" lineno="16606"> <summary> Send cma_server packets. </summary> @@ -20583,7 +20667,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16607"> +<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16625"> <summary> Do not audit attempts to send cma_server packets. </summary> @@ -20594,7 +20678,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cma_server_packets" lineno="16626"> +<interface name="corenet_receive_cma_server_packets" lineno="16644"> <summary> Receive cma_server packets. </summary> @@ -20605,7 +20689,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16645"> +<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16663"> <summary> Do not audit attempts to receive cma_server packets. </summary> @@ -20616,7 +20700,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cma_server_packets" lineno="16664"> +<interface name="corenet_sendrecv_cma_server_packets" lineno="16682"> <summary> Send and receive cma_server packets. </summary> @@ -20627,7 +20711,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16680"> +<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16698"> <summary> Do not audit attempts to send and receive cma_server packets. </summary> @@ -20638,7 +20722,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cma_server_packets" lineno="16695"> +<interface name="corenet_relabelto_cma_server_packets" lineno="16713"> <summary> Relabel packets to cma_server the packet type. </summary> @@ -20648,7 +20732,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16717"> +<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16735"> <summary> Send and receive TCP traffic on the cobbler port. </summary> @@ -20659,7 +20743,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cobbler_port" lineno="16732"> +<interface name="corenet_udp_send_cobbler_port" lineno="16750"> <summary> Send UDP traffic on the cobbler port. </summary> @@ -20670,7 +20754,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16747"> +<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16765"> <summary> Do not audit attempts to send UDP traffic on the cobbler port. </summary> @@ -20681,7 +20765,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cobbler_port" lineno="16762"> +<interface name="corenet_udp_receive_cobbler_port" lineno="16780"> <summary> Receive UDP traffic on the cobbler port. </summary> @@ -20692,7 +20776,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16777"> +<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16795"> <summary> Do not audit attempts to receive UDP traffic on the cobbler port. </summary> @@ -20703,7 +20787,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16792"> +<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16810"> <summary> Send and receive UDP traffic on the cobbler port. </summary> @@ -20714,7 +20798,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16808"> +<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16826"> <summary> Do not audit attempts to send and receive UDP traffic on the cobbler port. @@ -20726,7 +20810,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cobbler_port" lineno="16823"> +<interface name="corenet_tcp_bind_cobbler_port" lineno="16841"> <summary> Bind TCP sockets to the cobbler port. </summary> @@ -20737,7 +20821,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cobbler_port" lineno="16843"> +<interface name="corenet_udp_bind_cobbler_port" lineno="16861"> <summary> Bind UDP sockets to the cobbler port. </summary> @@ -20748,7 +20832,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cobbler_port" lineno="16862"> +<interface name="corenet_tcp_connect_cobbler_port" lineno="16880"> <summary> Make a TCP connection to the cobbler port. </summary> @@ -20758,7 +20842,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cobbler_client_packets" lineno="16882"> +<interface name="corenet_send_cobbler_client_packets" lineno="16900"> <summary> Send cobbler_client packets. </summary> @@ -20769,7 +20853,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16901"> +<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16919"> <summary> Do not audit attempts to send cobbler_client packets. </summary> @@ -20780,7 +20864,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cobbler_client_packets" lineno="16920"> +<interface name="corenet_receive_cobbler_client_packets" lineno="16938"> <summary> Receive cobbler_client packets. </summary> @@ -20791,7 +20875,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16939"> +<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16957"> <summary> Do not audit attempts to receive cobbler_client packets. </summary> @@ -20802,7 +20886,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16958"> +<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16976"> <summary> Send and receive cobbler_client packets. </summary> @@ -20813,7 +20897,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16974"> +<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16992"> <summary> Do not audit attempts to send and receive cobbler_client packets. </summary> @@ -20824,7 +20908,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cobbler_client_packets" lineno="16989"> +<interface name="corenet_relabelto_cobbler_client_packets" lineno="17007"> <summary> Relabel packets to cobbler_client the packet type. </summary> @@ -20834,7 +20918,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cobbler_server_packets" lineno="17009"> +<interface name="corenet_send_cobbler_server_packets" lineno="17027"> <summary> Send cobbler_server packets. </summary> @@ -20845,7 +20929,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17028"> +<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17046"> <summary> Do not audit attempts to send cobbler_server packets. </summary> @@ -20856,7 +20940,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cobbler_server_packets" lineno="17047"> +<interface name="corenet_receive_cobbler_server_packets" lineno="17065"> <summary> Receive cobbler_server packets. </summary> @@ -20867,7 +20951,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17066"> +<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17084"> <summary> Do not audit attempts to receive cobbler_server packets. </summary> @@ -20878,7 +20962,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17085"> +<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17103"> <summary> Send and receive cobbler_server packets. </summary> @@ -20889,7 +20973,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17101"> +<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17119"> <summary> Do not audit attempts to send and receive cobbler_server packets. </summary> @@ -20900,7 +20984,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cobbler_server_packets" lineno="17116"> +<interface name="corenet_relabelto_cobbler_server_packets" lineno="17134"> <summary> Relabel packets to cobbler_server the packet type. </summary> @@ -20910,7 +20994,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17138"> +<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17156"> <summary> Send and receive TCP traffic on the commplex_link port. </summary> @@ -20921,7 +21005,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_commplex_link_port" lineno="17153"> +<interface name="corenet_udp_send_commplex_link_port" lineno="17171"> <summary> Send UDP traffic on the commplex_link port. </summary> @@ -20932,7 +21016,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17168"> +<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17186"> <summary> Do not audit attempts to send UDP traffic on the commplex_link port. </summary> @@ -20943,7 +21027,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_commplex_link_port" lineno="17183"> +<interface name="corenet_udp_receive_commplex_link_port" lineno="17201"> <summary> Receive UDP traffic on the commplex_link port. </summary> @@ -20954,7 +21038,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17198"> +<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17216"> <summary> Do not audit attempts to receive UDP traffic on the commplex_link port. </summary> @@ -20965,7 +21049,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17213"> +<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17231"> <summary> Send and receive UDP traffic on the commplex_link port. </summary> @@ -20976,7 +21060,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17229"> +<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17247"> <summary> Do not audit attempts to send and receive UDP traffic on the commplex_link port. @@ -20988,7 +21072,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_commplex_link_port" lineno="17244"> +<interface name="corenet_tcp_bind_commplex_link_port" lineno="17262"> <summary> Bind TCP sockets to the commplex_link port. </summary> @@ -20999,7 +21083,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_commplex_link_port" lineno="17264"> +<interface name="corenet_udp_bind_commplex_link_port" lineno="17282"> <summary> Bind UDP sockets to the commplex_link port. </summary> @@ -21010,7 +21094,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_commplex_link_port" lineno="17283"> +<interface name="corenet_tcp_connect_commplex_link_port" lineno="17301"> <summary> Make a TCP connection to the commplex_link port. </summary> @@ -21020,7 +21104,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_link_client_packets" lineno="17303"> +<interface name="corenet_send_commplex_link_client_packets" lineno="17321"> <summary> Send commplex_link_client packets. </summary> @@ -21031,7 +21115,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17322"> +<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17340"> <summary> Do not audit attempts to send commplex_link_client packets. </summary> @@ -21042,7 +21126,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_link_client_packets" lineno="17341"> +<interface name="corenet_receive_commplex_link_client_packets" lineno="17359"> <summary> Receive commplex_link_client packets. </summary> @@ -21053,7 +21137,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17360"> +<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17378"> <summary> Do not audit attempts to receive commplex_link_client packets. </summary> @@ -21064,7 +21148,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17379"> +<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17397"> <summary> Send and receive commplex_link_client packets. </summary> @@ -21075,7 +21159,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17395"> +<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17413"> <summary> Do not audit attempts to send and receive commplex_link_client packets. </summary> @@ -21086,7 +21170,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17410"> +<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17428"> <summary> Relabel packets to commplex_link_client the packet type. </summary> @@ -21096,7 +21180,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_link_server_packets" lineno="17430"> +<interface name="corenet_send_commplex_link_server_packets" lineno="17448"> <summary> Send commplex_link_server packets. </summary> @@ -21107,7 +21191,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17449"> +<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17467"> <summary> Do not audit attempts to send commplex_link_server packets. </summary> @@ -21118,7 +21202,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_link_server_packets" lineno="17468"> +<interface name="corenet_receive_commplex_link_server_packets" lineno="17486"> <summary> Receive commplex_link_server packets. </summary> @@ -21129,7 +21213,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17487"> +<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17505"> <summary> Do not audit attempts to receive commplex_link_server packets. </summary> @@ -21140,7 +21224,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17506"> +<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17524"> <summary> Send and receive commplex_link_server packets. </summary> @@ -21151,7 +21235,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17522"> +<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17540"> <summary> Do not audit attempts to send and receive commplex_link_server packets. </summary> @@ -21162,7 +21246,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17537"> +<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17555"> <summary> Relabel packets to commplex_link_server the packet type. </summary> @@ -21172,7 +21256,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17559"> +<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17577"> <summary> Send and receive TCP traffic on the commplex_main port. </summary> @@ -21183,7 +21267,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_commplex_main_port" lineno="17574"> +<interface name="corenet_udp_send_commplex_main_port" lineno="17592"> <summary> Send UDP traffic on the commplex_main port. </summary> @@ -21194,7 +21278,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17589"> +<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17607"> <summary> Do not audit attempts to send UDP traffic on the commplex_main port. </summary> @@ -21205,7 +21289,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_commplex_main_port" lineno="17604"> +<interface name="corenet_udp_receive_commplex_main_port" lineno="17622"> <summary> Receive UDP traffic on the commplex_main port. </summary> @@ -21216,7 +21300,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17619"> +<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17637"> <summary> Do not audit attempts to receive UDP traffic on the commplex_main port. </summary> @@ -21227,7 +21311,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17634"> +<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17652"> <summary> Send and receive UDP traffic on the commplex_main port. </summary> @@ -21238,7 +21322,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17650"> +<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17668"> <summary> Do not audit attempts to send and receive UDP traffic on the commplex_main port. @@ -21250,7 +21334,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_commplex_main_port" lineno="17665"> +<interface name="corenet_tcp_bind_commplex_main_port" lineno="17683"> <summary> Bind TCP sockets to the commplex_main port. </summary> @@ -21261,7 +21345,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_commplex_main_port" lineno="17685"> +<interface name="corenet_udp_bind_commplex_main_port" lineno="17703"> <summary> Bind UDP sockets to the commplex_main port. </summary> @@ -21272,7 +21356,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_commplex_main_port" lineno="17704"> +<interface name="corenet_tcp_connect_commplex_main_port" lineno="17722"> <summary> Make a TCP connection to the commplex_main port. </summary> @@ -21282,7 +21366,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_main_client_packets" lineno="17724"> +<interface name="corenet_send_commplex_main_client_packets" lineno="17742"> <summary> Send commplex_main_client packets. </summary> @@ -21293,7 +21377,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17743"> +<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17761"> <summary> Do not audit attempts to send commplex_main_client packets. </summary> @@ -21304,7 +21388,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_main_client_packets" lineno="17762"> +<interface name="corenet_receive_commplex_main_client_packets" lineno="17780"> <summary> Receive commplex_main_client packets. </summary> @@ -21315,7 +21399,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17781"> +<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17799"> <summary> Do not audit attempts to receive commplex_main_client packets. </summary> @@ -21326,7 +21410,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17800"> +<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17818"> <summary> Send and receive commplex_main_client packets. </summary> @@ -21337,7 +21421,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17816"> +<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17834"> <summary> Do not audit attempts to send and receive commplex_main_client packets. </summary> @@ -21348,7 +21432,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17831"> +<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17849"> <summary> Relabel packets to commplex_main_client the packet type. </summary> @@ -21358,7 +21442,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_main_server_packets" lineno="17851"> +<interface name="corenet_send_commplex_main_server_packets" lineno="17869"> <summary> Send commplex_main_server packets. </summary> @@ -21369,7 +21453,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17870"> +<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17888"> <summary> Do not audit attempts to send commplex_main_server packets. </summary> @@ -21380,7 +21464,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_main_server_packets" lineno="17889"> +<interface name="corenet_receive_commplex_main_server_packets" lineno="17907"> <summary> Receive commplex_main_server packets. </summary> @@ -21391,7 +21475,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17908"> +<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17926"> <summary> Do not audit attempts to receive commplex_main_server packets. </summary> @@ -21402,7 +21486,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17927"> +<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17945"> <summary> Send and receive commplex_main_server packets. </summary> @@ -21413,7 +21497,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17943"> +<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17961"> <summary> Do not audit attempts to send and receive commplex_main_server packets. </summary> @@ -21424,7 +21508,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17958"> +<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17976"> <summary> Relabel packets to commplex_main_server the packet type. </summary> @@ -21434,7 +21518,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17980"> +<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17998"> <summary> Send and receive TCP traffic on the comsat port. </summary> @@ -21445,7 +21529,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_comsat_port" lineno="17995"> +<interface name="corenet_udp_send_comsat_port" lineno="18013"> <summary> Send UDP traffic on the comsat port. </summary> @@ -21456,7 +21540,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18010"> +<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18028"> <summary> Do not audit attempts to send UDP traffic on the comsat port. </summary> @@ -21467,7 +21551,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_comsat_port" lineno="18025"> +<interface name="corenet_udp_receive_comsat_port" lineno="18043"> <summary> Receive UDP traffic on the comsat port. </summary> @@ -21478,7 +21562,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18040"> +<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18058"> <summary> Do not audit attempts to receive UDP traffic on the comsat port. </summary> @@ -21489,7 +21573,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_comsat_port" lineno="18055"> +<interface name="corenet_udp_sendrecv_comsat_port" lineno="18073"> <summary> Send and receive UDP traffic on the comsat port. </summary> @@ -21500,7 +21584,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18071"> +<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18089"> <summary> Do not audit attempts to send and receive UDP traffic on the comsat port. @@ -21512,7 +21596,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_comsat_port" lineno="18086"> +<interface name="corenet_tcp_bind_comsat_port" lineno="18104"> <summary> Bind TCP sockets to the comsat port. </summary> @@ -21523,7 +21607,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_comsat_port" lineno="18106"> +<interface name="corenet_udp_bind_comsat_port" lineno="18124"> <summary> Bind UDP sockets to the comsat port. </summary> @@ -21534,7 +21618,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_comsat_port" lineno="18125"> +<interface name="corenet_tcp_connect_comsat_port" lineno="18143"> <summary> Make a TCP connection to the comsat port. </summary> @@ -21544,7 +21628,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_comsat_client_packets" lineno="18145"> +<interface name="corenet_send_comsat_client_packets" lineno="18163"> <summary> Send comsat_client packets. </summary> @@ -21555,7 +21639,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18164"> +<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18182"> <summary> Do not audit attempts to send comsat_client packets. </summary> @@ -21566,7 +21650,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_comsat_client_packets" lineno="18183"> +<interface name="corenet_receive_comsat_client_packets" lineno="18201"> <summary> Receive comsat_client packets. </summary> @@ -21577,7 +21661,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18202"> +<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18220"> <summary> Do not audit attempts to receive comsat_client packets. </summary> @@ -21588,7 +21672,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_comsat_client_packets" lineno="18221"> +<interface name="corenet_sendrecv_comsat_client_packets" lineno="18239"> <summary> Send and receive comsat_client packets. </summary> @@ -21599,7 +21683,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18237"> +<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18255"> <summary> Do not audit attempts to send and receive comsat_client packets. </summary> @@ -21610,7 +21694,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_comsat_client_packets" lineno="18252"> +<interface name="corenet_relabelto_comsat_client_packets" lineno="18270"> <summary> Relabel packets to comsat_client the packet type. </summary> @@ -21620,7 +21704,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_comsat_server_packets" lineno="18272"> +<interface name="corenet_send_comsat_server_packets" lineno="18290"> <summary> Send comsat_server packets. </summary> @@ -21631,7 +21715,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18291"> +<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18309"> <summary> Do not audit attempts to send comsat_server packets. </summary> @@ -21642,7 +21726,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_comsat_server_packets" lineno="18310"> +<interface name="corenet_receive_comsat_server_packets" lineno="18328"> <summary> Receive comsat_server packets. </summary> @@ -21653,7 +21737,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18329"> +<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18347"> <summary> Do not audit attempts to receive comsat_server packets. </summary> @@ -21664,7 +21748,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_comsat_server_packets" lineno="18348"> +<interface name="corenet_sendrecv_comsat_server_packets" lineno="18366"> <summary> Send and receive comsat_server packets. </summary> @@ -21675,7 +21759,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18364"> +<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18382"> <summary> Do not audit attempts to send and receive comsat_server packets. </summary> @@ -21686,7 +21770,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_comsat_server_packets" lineno="18379"> +<interface name="corenet_relabelto_comsat_server_packets" lineno="18397"> <summary> Relabel packets to comsat_server the packet type. </summary> @@ -21696,7 +21780,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_condor_port" lineno="18401"> +<interface name="corenet_tcp_sendrecv_condor_port" lineno="18419"> <summary> Send and receive TCP traffic on the condor port. </summary> @@ -21707,7 +21791,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_condor_port" lineno="18416"> +<interface name="corenet_udp_send_condor_port" lineno="18434"> <summary> Send UDP traffic on the condor port. </summary> @@ -21718,7 +21802,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18431"> +<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18449"> <summary> Do not audit attempts to send UDP traffic on the condor port. </summary> @@ -21729,7 +21813,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_condor_port" lineno="18446"> +<interface name="corenet_udp_receive_condor_port" lineno="18464"> <summary> Receive UDP traffic on the condor port. </summary> @@ -21740,7 +21824,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18461"> +<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18479"> <summary> Do not audit attempts to receive UDP traffic on the condor port. </summary> @@ -21751,7 +21835,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_condor_port" lineno="18476"> +<interface name="corenet_udp_sendrecv_condor_port" lineno="18494"> <summary> Send and receive UDP traffic on the condor port. </summary> @@ -21762,7 +21846,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18492"> +<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18510"> <summary> Do not audit attempts to send and receive UDP traffic on the condor port. @@ -21774,7 +21858,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_condor_port" lineno="18507"> +<interface name="corenet_tcp_bind_condor_port" lineno="18525"> <summary> Bind TCP sockets to the condor port. </summary> @@ -21785,7 +21869,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_condor_port" lineno="18527"> +<interface name="corenet_udp_bind_condor_port" lineno="18545"> <summary> Bind UDP sockets to the condor port. </summary> @@ -21796,7 +21880,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_condor_port" lineno="18546"> +<interface name="corenet_tcp_connect_condor_port" lineno="18564"> <summary> Make a TCP connection to the condor port. </summary> @@ -21806,7 +21890,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_condor_client_packets" lineno="18566"> +<interface name="corenet_send_condor_client_packets" lineno="18584"> <summary> Send condor_client packets. </summary> @@ -21817,7 +21901,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18585"> +<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18603"> <summary> Do not audit attempts to send condor_client packets. </summary> @@ -21828,7 +21912,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_condor_client_packets" lineno="18604"> +<interface name="corenet_receive_condor_client_packets" lineno="18622"> <summary> Receive condor_client packets. </summary> @@ -21839,7 +21923,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18623"> +<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18641"> <summary> Do not audit attempts to receive condor_client packets. </summary> @@ -21850,7 +21934,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_condor_client_packets" lineno="18642"> +<interface name="corenet_sendrecv_condor_client_packets" lineno="18660"> <summary> Send and receive condor_client packets. </summary> @@ -21861,7 +21945,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18658"> +<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18676"> <summary> Do not audit attempts to send and receive condor_client packets. </summary> @@ -21872,7 +21956,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_condor_client_packets" lineno="18673"> +<interface name="corenet_relabelto_condor_client_packets" lineno="18691"> <summary> Relabel packets to condor_client the packet type. </summary> @@ -21882,7 +21966,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_condor_server_packets" lineno="18693"> +<interface name="corenet_send_condor_server_packets" lineno="18711"> <summary> Send condor_server packets. </summary> @@ -21893,7 +21977,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18712"> +<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18730"> <summary> Do not audit attempts to send condor_server packets. </summary> @@ -21904,7 +21988,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_condor_server_packets" lineno="18731"> +<interface name="corenet_receive_condor_server_packets" lineno="18749"> <summary> Receive condor_server packets. </summary> @@ -21915,7 +21999,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18750"> +<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18768"> <summary> Do not audit attempts to receive condor_server packets. </summary> @@ -21926,7 +22010,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_condor_server_packets" lineno="18769"> +<interface name="corenet_sendrecv_condor_server_packets" lineno="18787"> <summary> Send and receive condor_server packets. </summary> @@ -21937,7 +22021,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18785"> +<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18803"> <summary> Do not audit attempts to send and receive condor_server packets. </summary> @@ -21948,7 +22032,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_condor_server_packets" lineno="18800"> +<interface name="corenet_relabelto_condor_server_packets" lineno="18818"> <summary> Relabel packets to condor_server the packet type. </summary> @@ -21958,7 +22042,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18822"> +<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18840"> <summary> Send and receive TCP traffic on the couchdb port. </summary> @@ -21969,7 +22053,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_couchdb_port" lineno="18837"> +<interface name="corenet_udp_send_couchdb_port" lineno="18855"> <summary> Send UDP traffic on the couchdb port. </summary> @@ -21980,7 +22064,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18852"> +<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18870"> <summary> Do not audit attempts to send UDP traffic on the couchdb port. </summary> @@ -21991,7 +22075,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_couchdb_port" lineno="18867"> +<interface name="corenet_udp_receive_couchdb_port" lineno="18885"> <summary> Receive UDP traffic on the couchdb port. </summary> @@ -22002,7 +22086,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18882"> +<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18900"> <summary> Do not audit attempts to receive UDP traffic on the couchdb port. </summary> @@ -22013,7 +22097,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18897"> +<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18915"> <summary> Send and receive UDP traffic on the couchdb port. </summary> @@ -22024,7 +22108,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18913"> +<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18931"> <summary> Do not audit attempts to send and receive UDP traffic on the couchdb port. @@ -22036,7 +22120,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_couchdb_port" lineno="18928"> +<interface name="corenet_tcp_bind_couchdb_port" lineno="18946"> <summary> Bind TCP sockets to the couchdb port. </summary> @@ -22047,7 +22131,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_couchdb_port" lineno="18948"> +<interface name="corenet_udp_bind_couchdb_port" lineno="18966"> <summary> Bind UDP sockets to the couchdb port. </summary> @@ -22058,7 +22142,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_couchdb_port" lineno="18967"> +<interface name="corenet_tcp_connect_couchdb_port" lineno="18985"> <summary> Make a TCP connection to the couchdb port. </summary> @@ -22068,7 +22152,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_couchdb_client_packets" lineno="18987"> +<interface name="corenet_send_couchdb_client_packets" lineno="19005"> <summary> Send couchdb_client packets. </summary> @@ -22079,7 +22163,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19006"> +<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19024"> <summary> Do not audit attempts to send couchdb_client packets. </summary> @@ -22090,7 +22174,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_couchdb_client_packets" lineno="19025"> +<interface name="corenet_receive_couchdb_client_packets" lineno="19043"> <summary> Receive couchdb_client packets. </summary> @@ -22101,7 +22185,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19044"> +<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19062"> <summary> Do not audit attempts to receive couchdb_client packets. </summary> @@ -22112,7 +22196,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19063"> +<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19081"> <summary> Send and receive couchdb_client packets. </summary> @@ -22123,7 +22207,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19079"> +<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19097"> <summary> Do not audit attempts to send and receive couchdb_client packets. </summary> @@ -22134,7 +22218,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_couchdb_client_packets" lineno="19094"> +<interface name="corenet_relabelto_couchdb_client_packets" lineno="19112"> <summary> Relabel packets to couchdb_client the packet type. </summary> @@ -22144,7 +22228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_couchdb_server_packets" lineno="19114"> +<interface name="corenet_send_couchdb_server_packets" lineno="19132"> <summary> Send couchdb_server packets. </summary> @@ -22155,7 +22239,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19133"> +<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19151"> <summary> Do not audit attempts to send couchdb_server packets. </summary> @@ -22166,7 +22250,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_couchdb_server_packets" lineno="19152"> +<interface name="corenet_receive_couchdb_server_packets" lineno="19170"> <summary> Receive couchdb_server packets. </summary> @@ -22177,7 +22261,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19171"> +<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19189"> <summary> Do not audit attempts to receive couchdb_server packets. </summary> @@ -22188,7 +22272,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19190"> +<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19208"> <summary> Send and receive couchdb_server packets. </summary> @@ -22199,7 +22283,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19206"> +<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19224"> <summary> Do not audit attempts to send and receive couchdb_server packets. </summary> @@ -22210,7 +22294,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_couchdb_server_packets" lineno="19221"> +<interface name="corenet_relabelto_couchdb_server_packets" lineno="19239"> <summary> Relabel packets to couchdb_server the packet type. </summary> @@ -22220,7 +22304,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19243"> +<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19261"> <summary> Send and receive TCP traffic on the cslistener port. </summary> @@ -22231,7 +22315,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cslistener_port" lineno="19258"> +<interface name="corenet_udp_send_cslistener_port" lineno="19276"> <summary> Send UDP traffic on the cslistener port. </summary> @@ -22242,7 +22326,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19273"> +<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19291"> <summary> Do not audit attempts to send UDP traffic on the cslistener port. </summary> @@ -22253,7 +22337,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cslistener_port" lineno="19288"> +<interface name="corenet_udp_receive_cslistener_port" lineno="19306"> <summary> Receive UDP traffic on the cslistener port. </summary> @@ -22264,7 +22348,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19303"> +<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19321"> <summary> Do not audit attempts to receive UDP traffic on the cslistener port. </summary> @@ -22275,7 +22359,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19318"> +<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19336"> <summary> Send and receive UDP traffic on the cslistener port. </summary> @@ -22286,7 +22370,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19334"> +<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19352"> <summary> Do not audit attempts to send and receive UDP traffic on the cslistener port. @@ -22298,7 +22382,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cslistener_port" lineno="19349"> +<interface name="corenet_tcp_bind_cslistener_port" lineno="19367"> <summary> Bind TCP sockets to the cslistener port. </summary> @@ -22309,7 +22393,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cslistener_port" lineno="19369"> +<interface name="corenet_udp_bind_cslistener_port" lineno="19387"> <summary> Bind UDP sockets to the cslistener port. </summary> @@ -22320,7 +22404,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cslistener_port" lineno="19388"> +<interface name="corenet_tcp_connect_cslistener_port" lineno="19406"> <summary> Make a TCP connection to the cslistener port. </summary> @@ -22330,7 +22414,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cslistener_client_packets" lineno="19408"> +<interface name="corenet_send_cslistener_client_packets" lineno="19426"> <summary> Send cslistener_client packets. </summary> @@ -22341,7 +22425,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19427"> +<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19445"> <summary> Do not audit attempts to send cslistener_client packets. </summary> @@ -22352,7 +22436,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cslistener_client_packets" lineno="19446"> +<interface name="corenet_receive_cslistener_client_packets" lineno="19464"> <summary> Receive cslistener_client packets. </summary> @@ -22363,7 +22447,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19465"> +<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19483"> <summary> Do not audit attempts to receive cslistener_client packets. </summary> @@ -22374,7 +22458,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19484"> +<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19502"> <summary> Send and receive cslistener_client packets. </summary> @@ -22385,7 +22469,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19500"> +<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19518"> <summary> Do not audit attempts to send and receive cslistener_client packets. </summary> @@ -22396,7 +22480,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cslistener_client_packets" lineno="19515"> +<interface name="corenet_relabelto_cslistener_client_packets" lineno="19533"> <summary> Relabel packets to cslistener_client the packet type. </summary> @@ -22406,7 +22490,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cslistener_server_packets" lineno="19535"> +<interface name="corenet_send_cslistener_server_packets" lineno="19553"> <summary> Send cslistener_server packets. </summary> @@ -22417,7 +22501,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19554"> +<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19572"> <summary> Do not audit attempts to send cslistener_server packets. </summary> @@ -22428,7 +22512,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cslistener_server_packets" lineno="19573"> +<interface name="corenet_receive_cslistener_server_packets" lineno="19591"> <summary> Receive cslistener_server packets. </summary> @@ -22439,7 +22523,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19592"> +<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19610"> <summary> Do not audit attempts to receive cslistener_server packets. </summary> @@ -22450,7 +22534,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19611"> +<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19629"> <summary> Send and receive cslistener_server packets. </summary> @@ -22461,7 +22545,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19627"> +<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19645"> <summary> Do not audit attempts to send and receive cslistener_server packets. </summary> @@ -22472,7 +22556,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cslistener_server_packets" lineno="19642"> +<interface name="corenet_relabelto_cslistener_server_packets" lineno="19660"> <summary> Relabel packets to cslistener_server the packet type. </summary> @@ -22482,7 +22566,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19664"> +<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19682"> <summary> Send and receive TCP traffic on the ctdb port. </summary> @@ -22493,7 +22577,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ctdb_port" lineno="19679"> +<interface name="corenet_udp_send_ctdb_port" lineno="19697"> <summary> Send UDP traffic on the ctdb port. </summary> @@ -22504,7 +22588,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19694"> +<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19712"> <summary> Do not audit attempts to send UDP traffic on the ctdb port. </summary> @@ -22515,7 +22599,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ctdb_port" lineno="19709"> +<interface name="corenet_udp_receive_ctdb_port" lineno="19727"> <summary> Receive UDP traffic on the ctdb port. </summary> @@ -22526,7 +22610,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19724"> +<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19742"> <summary> Do not audit attempts to receive UDP traffic on the ctdb port. </summary> @@ -22537,7 +22621,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19739"> +<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19757"> <summary> Send and receive UDP traffic on the ctdb port. </summary> @@ -22548,7 +22632,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19755"> +<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19773"> <summary> Do not audit attempts to send and receive UDP traffic on the ctdb port. @@ -22560,7 +22644,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ctdb_port" lineno="19770"> +<interface name="corenet_tcp_bind_ctdb_port" lineno="19788"> <summary> Bind TCP sockets to the ctdb port. </summary> @@ -22571,7 +22655,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ctdb_port" lineno="19790"> +<interface name="corenet_udp_bind_ctdb_port" lineno="19808"> <summary> Bind UDP sockets to the ctdb port. </summary> @@ -22582,7 +22666,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ctdb_port" lineno="19809"> +<interface name="corenet_tcp_connect_ctdb_port" lineno="19827"> <summary> Make a TCP connection to the ctdb port. </summary> @@ -22592,7 +22676,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ctdb_client_packets" lineno="19829"> +<interface name="corenet_send_ctdb_client_packets" lineno="19847"> <summary> Send ctdb_client packets. </summary> @@ -22603,7 +22687,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19848"> +<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19866"> <summary> Do not audit attempts to send ctdb_client packets. </summary> @@ -22614,7 +22698,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ctdb_client_packets" lineno="19867"> +<interface name="corenet_receive_ctdb_client_packets" lineno="19885"> <summary> Receive ctdb_client packets. </summary> @@ -22625,7 +22709,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19886"> +<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19904"> <summary> Do not audit attempts to receive ctdb_client packets. </summary> @@ -22636,7 +22720,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19905"> +<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19923"> <summary> Send and receive ctdb_client packets. </summary> @@ -22647,7 +22731,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19921"> +<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19939"> <summary> Do not audit attempts to send and receive ctdb_client packets. </summary> @@ -22658,7 +22742,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ctdb_client_packets" lineno="19936"> +<interface name="corenet_relabelto_ctdb_client_packets" lineno="19954"> <summary> Relabel packets to ctdb_client the packet type. </summary> @@ -22668,7 +22752,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ctdb_server_packets" lineno="19956"> +<interface name="corenet_send_ctdb_server_packets" lineno="19974"> <summary> Send ctdb_server packets. </summary> @@ -22679,7 +22763,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19975"> +<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19993"> <summary> Do not audit attempts to send ctdb_server packets. </summary> @@ -22690,7 +22774,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ctdb_server_packets" lineno="19994"> +<interface name="corenet_receive_ctdb_server_packets" lineno="20012"> <summary> Receive ctdb_server packets. </summary> @@ -22701,7 +22785,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20013"> +<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20031"> <summary> Do not audit attempts to receive ctdb_server packets. </summary> @@ -22712,7 +22796,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20032"> +<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20050"> <summary> Send and receive ctdb_server packets. </summary> @@ -22723,7 +22807,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20048"> +<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20066"> <summary> Do not audit attempts to send and receive ctdb_server packets. </summary> @@ -22734,7 +22818,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ctdb_server_packets" lineno="20063"> +<interface name="corenet_relabelto_ctdb_server_packets" lineno="20081"> <summary> Relabel packets to ctdb_server the packet type. </summary> @@ -22744,7 +22828,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20085"> +<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20103"> <summary> Send and receive TCP traffic on the cvs port. </summary> @@ -22755,7 +22839,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cvs_port" lineno="20100"> +<interface name="corenet_udp_send_cvs_port" lineno="20118"> <summary> Send UDP traffic on the cvs port. </summary> @@ -22766,7 +22850,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20115"> +<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20133"> <summary> Do not audit attempts to send UDP traffic on the cvs port. </summary> @@ -22777,7 +22861,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cvs_port" lineno="20130"> +<interface name="corenet_udp_receive_cvs_port" lineno="20148"> <summary> Receive UDP traffic on the cvs port. </summary> @@ -22788,7 +22872,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20145"> +<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20163"> <summary> Do not audit attempts to receive UDP traffic on the cvs port. </summary> @@ -22799,7 +22883,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cvs_port" lineno="20160"> +<interface name="corenet_udp_sendrecv_cvs_port" lineno="20178"> <summary> Send and receive UDP traffic on the cvs port. </summary> @@ -22810,7 +22894,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20176"> +<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20194"> <summary> Do not audit attempts to send and receive UDP traffic on the cvs port. @@ -22822,7 +22906,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cvs_port" lineno="20191"> +<interface name="corenet_tcp_bind_cvs_port" lineno="20209"> <summary> Bind TCP sockets to the cvs port. </summary> @@ -22833,7 +22917,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cvs_port" lineno="20211"> +<interface name="corenet_udp_bind_cvs_port" lineno="20229"> <summary> Bind UDP sockets to the cvs port. </summary> @@ -22844,7 +22928,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cvs_port" lineno="20230"> +<interface name="corenet_tcp_connect_cvs_port" lineno="20248"> <summary> Make a TCP connection to the cvs port. </summary> @@ -22854,7 +22938,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cvs_client_packets" lineno="20250"> +<interface name="corenet_send_cvs_client_packets" lineno="20268"> <summary> Send cvs_client packets. </summary> @@ -22865,7 +22949,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20269"> +<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20287"> <summary> Do not audit attempts to send cvs_client packets. </summary> @@ -22876,7 +22960,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cvs_client_packets" lineno="20288"> +<interface name="corenet_receive_cvs_client_packets" lineno="20306"> <summary> Receive cvs_client packets. </summary> @@ -22887,7 +22971,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20307"> +<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20325"> <summary> Do not audit attempts to receive cvs_client packets. </summary> @@ -22898,7 +22982,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cvs_client_packets" lineno="20326"> +<interface name="corenet_sendrecv_cvs_client_packets" lineno="20344"> <summary> Send and receive cvs_client packets. </summary> @@ -22909,7 +22993,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20342"> +<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20360"> <summary> Do not audit attempts to send and receive cvs_client packets. </summary> @@ -22920,7 +23004,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cvs_client_packets" lineno="20357"> +<interface name="corenet_relabelto_cvs_client_packets" lineno="20375"> <summary> Relabel packets to cvs_client the packet type. </summary> @@ -22930,7 +23014,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cvs_server_packets" lineno="20377"> +<interface name="corenet_send_cvs_server_packets" lineno="20395"> <summary> Send cvs_server packets. </summary> @@ -22941,7 +23025,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20396"> +<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20414"> <summary> Do not audit attempts to send cvs_server packets. </summary> @@ -22952,7 +23036,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cvs_server_packets" lineno="20415"> +<interface name="corenet_receive_cvs_server_packets" lineno="20433"> <summary> Receive cvs_server packets. </summary> @@ -22963,7 +23047,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20434"> +<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20452"> <summary> Do not audit attempts to receive cvs_server packets. </summary> @@ -22974,7 +23058,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cvs_server_packets" lineno="20453"> +<interface name="corenet_sendrecv_cvs_server_packets" lineno="20471"> <summary> Send and receive cvs_server packets. </summary> @@ -22985,7 +23069,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20469"> +<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20487"> <summary> Do not audit attempts to send and receive cvs_server packets. </summary> @@ -22996,7 +23080,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cvs_server_packets" lineno="20484"> +<interface name="corenet_relabelto_cvs_server_packets" lineno="20502"> <summary> Relabel packets to cvs_server the packet type. </summary> @@ -23006,7 +23090,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20506"> +<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20524"> <summary> Send and receive TCP traffic on the cyphesis port. </summary> @@ -23017,7 +23101,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_cyphesis_port" lineno="20521"> +<interface name="corenet_udp_send_cyphesis_port" lineno="20539"> <summary> Send UDP traffic on the cyphesis port. </summary> @@ -23028,7 +23112,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20536"> +<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20554"> <summary> Do not audit attempts to send UDP traffic on the cyphesis port. </summary> @@ -23039,7 +23123,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_cyphesis_port" lineno="20551"> +<interface name="corenet_udp_receive_cyphesis_port" lineno="20569"> <summary> Receive UDP traffic on the cyphesis port. </summary> @@ -23050,7 +23134,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20566"> +<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20584"> <summary> Do not audit attempts to receive UDP traffic on the cyphesis port. </summary> @@ -23061,7 +23145,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20581"> +<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20599"> <summary> Send and receive UDP traffic on the cyphesis port. </summary> @@ -23072,7 +23156,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20597"> +<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20615"> <summary> Do not audit attempts to send and receive UDP traffic on the cyphesis port. @@ -23084,7 +23168,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_cyphesis_port" lineno="20612"> +<interface name="corenet_tcp_bind_cyphesis_port" lineno="20630"> <summary> Bind TCP sockets to the cyphesis port. </summary> @@ -23095,7 +23179,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cyphesis_port" lineno="20632"> +<interface name="corenet_udp_bind_cyphesis_port" lineno="20650"> <summary> Bind UDP sockets to the cyphesis port. </summary> @@ -23106,7 +23190,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cyphesis_port" lineno="20651"> +<interface name="corenet_tcp_connect_cyphesis_port" lineno="20669"> <summary> Make a TCP connection to the cyphesis port. </summary> @@ -23116,7 +23200,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cyphesis_client_packets" lineno="20671"> +<interface name="corenet_send_cyphesis_client_packets" lineno="20689"> <summary> Send cyphesis_client packets. </summary> @@ -23127,7 +23211,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20690"> +<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20708"> <summary> Do not audit attempts to send cyphesis_client packets. </summary> @@ -23138,7 +23222,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cyphesis_client_packets" lineno="20709"> +<interface name="corenet_receive_cyphesis_client_packets" lineno="20727"> <summary> Receive cyphesis_client packets. </summary> @@ -23149,7 +23233,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20728"> +<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20746"> <summary> Do not audit attempts to receive cyphesis_client packets. </summary> @@ -23160,7 +23244,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20747"> +<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20765"> <summary> Send and receive cyphesis_client packets. </summary> @@ -23171,7 +23255,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20763"> +<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20781"> <summary> Do not audit attempts to send and receive cyphesis_client packets. </summary> @@ -23182,7 +23266,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20778"> +<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20796"> <summary> Relabel packets to cyphesis_client the packet type. </summary> @@ -23192,7 +23276,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cyphesis_server_packets" lineno="20798"> +<interface name="corenet_send_cyphesis_server_packets" lineno="20816"> <summary> Send cyphesis_server packets. </summary> @@ -23203,7 +23287,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20817"> +<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20835"> <summary> Do not audit attempts to send cyphesis_server packets. </summary> @@ -23214,7 +23298,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cyphesis_server_packets" lineno="20836"> +<interface name="corenet_receive_cyphesis_server_packets" lineno="20854"> <summary> Receive cyphesis_server packets. </summary> @@ -23225,7 +23309,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20855"> +<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20873"> <summary> Do not audit attempts to receive cyphesis_server packets. </summary> @@ -23236,7 +23320,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20874"> +<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20892"> <summary> Send and receive cyphesis_server packets. </summary> @@ -23247,7 +23331,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20890"> +<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20908"> <summary> Do not audit attempts to send and receive cyphesis_server packets. </summary> @@ -23258,7 +23342,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20905"> +<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20923"> <summary> Relabel packets to cyphesis_server the packet type. </summary> @@ -23268,7 +23352,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_daap_port" lineno="20927"> +<interface name="corenet_tcp_sendrecv_daap_port" lineno="20945"> <summary> Send and receive TCP traffic on the daap port. </summary> @@ -23279,7 +23363,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_daap_port" lineno="20942"> +<interface name="corenet_udp_send_daap_port" lineno="20960"> <summary> Send UDP traffic on the daap port. </summary> @@ -23290,7 +23374,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20957"> +<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20975"> <summary> Do not audit attempts to send UDP traffic on the daap port. </summary> @@ -23301,7 +23385,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_daap_port" lineno="20972"> +<interface name="corenet_udp_receive_daap_port" lineno="20990"> <summary> Receive UDP traffic on the daap port. </summary> @@ -23312,7 +23396,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20987"> +<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="21005"> <summary> Do not audit attempts to receive UDP traffic on the daap port. </summary> @@ -23323,7 +23407,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_daap_port" lineno="21002"> +<interface name="corenet_udp_sendrecv_daap_port" lineno="21020"> <summary> Send and receive UDP traffic on the daap port. </summary> @@ -23334,7 +23418,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21018"> +<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21036"> <summary> Do not audit attempts to send and receive UDP traffic on the daap port. @@ -23346,7 +23430,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_daap_port" lineno="21033"> +<interface name="corenet_tcp_bind_daap_port" lineno="21051"> <summary> Bind TCP sockets to the daap port. </summary> @@ -23357,7 +23441,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_daap_port" lineno="21053"> +<interface name="corenet_udp_bind_daap_port" lineno="21071"> <summary> Bind UDP sockets to the daap port. </summary> @@ -23368,7 +23452,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_daap_port" lineno="21072"> +<interface name="corenet_tcp_connect_daap_port" lineno="21090"> <summary> Make a TCP connection to the daap port. </summary> @@ -23378,7 +23462,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_daap_client_packets" lineno="21092"> +<interface name="corenet_send_daap_client_packets" lineno="21110"> <summary> Send daap_client packets. </summary> @@ -23389,7 +23473,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21111"> +<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21129"> <summary> Do not audit attempts to send daap_client packets. </summary> @@ -23400,7 +23484,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_daap_client_packets" lineno="21130"> +<interface name="corenet_receive_daap_client_packets" lineno="21148"> <summary> Receive daap_client packets. </summary> @@ -23411,7 +23495,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21149"> +<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21167"> <summary> Do not audit attempts to receive daap_client packets. </summary> @@ -23422,7 +23506,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_daap_client_packets" lineno="21168"> +<interface name="corenet_sendrecv_daap_client_packets" lineno="21186"> <summary> Send and receive daap_client packets. </summary> @@ -23433,7 +23517,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21184"> +<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21202"> <summary> Do not audit attempts to send and receive daap_client packets. </summary> @@ -23444,7 +23528,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_daap_client_packets" lineno="21199"> +<interface name="corenet_relabelto_daap_client_packets" lineno="21217"> <summary> Relabel packets to daap_client the packet type. </summary> @@ -23454,7 +23538,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_daap_server_packets" lineno="21219"> +<interface name="corenet_send_daap_server_packets" lineno="21237"> <summary> Send daap_server packets. </summary> @@ -23465,7 +23549,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21238"> +<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21256"> <summary> Do not audit attempts to send daap_server packets. </summary> @@ -23476,7 +23560,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_daap_server_packets" lineno="21257"> +<interface name="corenet_receive_daap_server_packets" lineno="21275"> <summary> Receive daap_server packets. </summary> @@ -23487,7 +23571,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21276"> +<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21294"> <summary> Do not audit attempts to receive daap_server packets. </summary> @@ -23498,7 +23582,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_daap_server_packets" lineno="21295"> +<interface name="corenet_sendrecv_daap_server_packets" lineno="21313"> <summary> Send and receive daap_server packets. </summary> @@ -23509,7 +23593,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21311"> +<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21329"> <summary> Do not audit attempts to send and receive daap_server packets. </summary> @@ -23520,7 +23604,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_daap_server_packets" lineno="21326"> +<interface name="corenet_relabelto_daap_server_packets" lineno="21344"> <summary> Relabel packets to daap_server the packet type. </summary> @@ -23530,7 +23614,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21348"> +<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21366"> <summary> Send and receive TCP traffic on the dbskkd port. </summary> @@ -23541,7 +23625,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dbskkd_port" lineno="21363"> +<interface name="corenet_udp_send_dbskkd_port" lineno="21381"> <summary> Send UDP traffic on the dbskkd port. </summary> @@ -23552,7 +23636,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21378"> +<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21396"> <summary> Do not audit attempts to send UDP traffic on the dbskkd port. </summary> @@ -23563,7 +23647,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dbskkd_port" lineno="21393"> +<interface name="corenet_udp_receive_dbskkd_port" lineno="21411"> <summary> Receive UDP traffic on the dbskkd port. </summary> @@ -23574,7 +23658,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21408"> +<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21426"> <summary> Do not audit attempts to receive UDP traffic on the dbskkd port. </summary> @@ -23585,7 +23669,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21423"> +<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21441"> <summary> Send and receive UDP traffic on the dbskkd port. </summary> @@ -23596,7 +23680,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21439"> +<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21457"> <summary> Do not audit attempts to send and receive UDP traffic on the dbskkd port. @@ -23608,7 +23692,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dbskkd_port" lineno="21454"> +<interface name="corenet_tcp_bind_dbskkd_port" lineno="21472"> <summary> Bind TCP sockets to the dbskkd port. </summary> @@ -23619,7 +23703,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dbskkd_port" lineno="21474"> +<interface name="corenet_udp_bind_dbskkd_port" lineno="21492"> <summary> Bind UDP sockets to the dbskkd port. </summary> @@ -23630,7 +23714,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dbskkd_port" lineno="21493"> +<interface name="corenet_tcp_connect_dbskkd_port" lineno="21511"> <summary> Make a TCP connection to the dbskkd port. </summary> @@ -23640,7 +23724,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dbskkd_client_packets" lineno="21513"> +<interface name="corenet_send_dbskkd_client_packets" lineno="21531"> <summary> Send dbskkd_client packets. </summary> @@ -23651,7 +23735,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21532"> +<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21550"> <summary> Do not audit attempts to send dbskkd_client packets. </summary> @@ -23662,7 +23746,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dbskkd_client_packets" lineno="21551"> +<interface name="corenet_receive_dbskkd_client_packets" lineno="21569"> <summary> Receive dbskkd_client packets. </summary> @@ -23673,7 +23757,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21570"> +<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21588"> <summary> Do not audit attempts to receive dbskkd_client packets. </summary> @@ -23684,7 +23768,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21589"> +<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21607"> <summary> Send and receive dbskkd_client packets. </summary> @@ -23695,7 +23779,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21605"> +<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21623"> <summary> Do not audit attempts to send and receive dbskkd_client packets. </summary> @@ -23706,7 +23790,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21620"> +<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21638"> <summary> Relabel packets to dbskkd_client the packet type. </summary> @@ -23716,7 +23800,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dbskkd_server_packets" lineno="21640"> +<interface name="corenet_send_dbskkd_server_packets" lineno="21658"> <summary> Send dbskkd_server packets. </summary> @@ -23727,7 +23811,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21659"> +<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21677"> <summary> Do not audit attempts to send dbskkd_server packets. </summary> @@ -23738,7 +23822,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dbskkd_server_packets" lineno="21678"> +<interface name="corenet_receive_dbskkd_server_packets" lineno="21696"> <summary> Receive dbskkd_server packets. </summary> @@ -23749,7 +23833,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21697"> +<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21715"> <summary> Do not audit attempts to receive dbskkd_server packets. </summary> @@ -23760,7 +23844,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21716"> +<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21734"> <summary> Send and receive dbskkd_server packets. </summary> @@ -23771,7 +23855,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21732"> +<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21750"> <summary> Do not audit attempts to send and receive dbskkd_server packets. </summary> @@ -23782,7 +23866,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21747"> +<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21765"> <summary> Relabel packets to dbskkd_server the packet type. </summary> @@ -23792,7 +23876,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21769"> +<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21787"> <summary> Send and receive TCP traffic on the dcc port. </summary> @@ -23803,7 +23887,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dcc_port" lineno="21784"> +<interface name="corenet_udp_send_dcc_port" lineno="21802"> <summary> Send UDP traffic on the dcc port. </summary> @@ -23814,7 +23898,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21799"> +<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21817"> <summary> Do not audit attempts to send UDP traffic on the dcc port. </summary> @@ -23825,7 +23909,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dcc_port" lineno="21814"> +<interface name="corenet_udp_receive_dcc_port" lineno="21832"> <summary> Receive UDP traffic on the dcc port. </summary> @@ -23836,7 +23920,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21829"> +<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21847"> <summary> Do not audit attempts to receive UDP traffic on the dcc port. </summary> @@ -23847,7 +23931,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dcc_port" lineno="21844"> +<interface name="corenet_udp_sendrecv_dcc_port" lineno="21862"> <summary> Send and receive UDP traffic on the dcc port. </summary> @@ -23858,7 +23942,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21860"> +<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21878"> <summary> Do not audit attempts to send and receive UDP traffic on the dcc port. @@ -23870,7 +23954,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dcc_port" lineno="21875"> +<interface name="corenet_tcp_bind_dcc_port" lineno="21893"> <summary> Bind TCP sockets to the dcc port. </summary> @@ -23881,7 +23965,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dcc_port" lineno="21895"> +<interface name="corenet_udp_bind_dcc_port" lineno="21913"> <summary> Bind UDP sockets to the dcc port. </summary> @@ -23892,7 +23976,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dcc_port" lineno="21914"> +<interface name="corenet_tcp_connect_dcc_port" lineno="21932"> <summary> Make a TCP connection to the dcc port. </summary> @@ -23902,7 +23986,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dcc_client_packets" lineno="21934"> +<interface name="corenet_send_dcc_client_packets" lineno="21952"> <summary> Send dcc_client packets. </summary> @@ -23913,7 +23997,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21953"> +<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21971"> <summary> Do not audit attempts to send dcc_client packets. </summary> @@ -23924,7 +24008,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dcc_client_packets" lineno="21972"> +<interface name="corenet_receive_dcc_client_packets" lineno="21990"> <summary> Receive dcc_client packets. </summary> @@ -23935,7 +24019,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21991"> +<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="22009"> <summary> Do not audit attempts to receive dcc_client packets. </summary> @@ -23946,7 +24030,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dcc_client_packets" lineno="22010"> +<interface name="corenet_sendrecv_dcc_client_packets" lineno="22028"> <summary> Send and receive dcc_client packets. </summary> @@ -23957,7 +24041,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22026"> +<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22044"> <summary> Do not audit attempts to send and receive dcc_client packets. </summary> @@ -23968,7 +24052,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dcc_client_packets" lineno="22041"> +<interface name="corenet_relabelto_dcc_client_packets" lineno="22059"> <summary> Relabel packets to dcc_client the packet type. </summary> @@ -23978,7 +24062,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dcc_server_packets" lineno="22061"> +<interface name="corenet_send_dcc_server_packets" lineno="22079"> <summary> Send dcc_server packets. </summary> @@ -23989,7 +24073,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22080"> +<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22098"> <summary> Do not audit attempts to send dcc_server packets. </summary> @@ -24000,7 +24084,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dcc_server_packets" lineno="22099"> +<interface name="corenet_receive_dcc_server_packets" lineno="22117"> <summary> Receive dcc_server packets. </summary> @@ -24011,7 +24095,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22118"> +<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22136"> <summary> Do not audit attempts to receive dcc_server packets. </summary> @@ -24022,7 +24106,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dcc_server_packets" lineno="22137"> +<interface name="corenet_sendrecv_dcc_server_packets" lineno="22155"> <summary> Send and receive dcc_server packets. </summary> @@ -24033,7 +24117,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22153"> +<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22171"> <summary> Do not audit attempts to send and receive dcc_server packets. </summary> @@ -24044,7 +24128,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dcc_server_packets" lineno="22168"> +<interface name="corenet_relabelto_dcc_server_packets" lineno="22186"> <summary> Relabel packets to dcc_server the packet type. </summary> @@ -24054,7 +24138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22190"> +<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22208"> <summary> Send and receive TCP traffic on the dccm port. </summary> @@ -24065,7 +24149,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dccm_port" lineno="22205"> +<interface name="corenet_udp_send_dccm_port" lineno="22223"> <summary> Send UDP traffic on the dccm port. </summary> @@ -24076,7 +24160,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22220"> +<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22238"> <summary> Do not audit attempts to send UDP traffic on the dccm port. </summary> @@ -24087,7 +24171,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dccm_port" lineno="22235"> +<interface name="corenet_udp_receive_dccm_port" lineno="22253"> <summary> Receive UDP traffic on the dccm port. </summary> @@ -24098,7 +24182,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22250"> +<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22268"> <summary> Do not audit attempts to receive UDP traffic on the dccm port. </summary> @@ -24109,7 +24193,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dccm_port" lineno="22265"> +<interface name="corenet_udp_sendrecv_dccm_port" lineno="22283"> <summary> Send and receive UDP traffic on the dccm port. </summary> @@ -24120,7 +24204,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22281"> +<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22299"> <summary> Do not audit attempts to send and receive UDP traffic on the dccm port. @@ -24132,7 +24216,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dccm_port" lineno="22296"> +<interface name="corenet_tcp_bind_dccm_port" lineno="22314"> <summary> Bind TCP sockets to the dccm port. </summary> @@ -24143,7 +24227,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dccm_port" lineno="22316"> +<interface name="corenet_udp_bind_dccm_port" lineno="22334"> <summary> Bind UDP sockets to the dccm port. </summary> @@ -24154,7 +24238,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dccm_port" lineno="22335"> +<interface name="corenet_tcp_connect_dccm_port" lineno="22353"> <summary> Make a TCP connection to the dccm port. </summary> @@ -24164,7 +24248,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dccm_client_packets" lineno="22355"> +<interface name="corenet_send_dccm_client_packets" lineno="22373"> <summary> Send dccm_client packets. </summary> @@ -24175,7 +24259,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22374"> +<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22392"> <summary> Do not audit attempts to send dccm_client packets. </summary> @@ -24186,7 +24270,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dccm_client_packets" lineno="22393"> +<interface name="corenet_receive_dccm_client_packets" lineno="22411"> <summary> Receive dccm_client packets. </summary> @@ -24197,7 +24281,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22412"> +<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22430"> <summary> Do not audit attempts to receive dccm_client packets. </summary> @@ -24208,7 +24292,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dccm_client_packets" lineno="22431"> +<interface name="corenet_sendrecv_dccm_client_packets" lineno="22449"> <summary> Send and receive dccm_client packets. </summary> @@ -24219,7 +24303,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22447"> +<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22465"> <summary> Do not audit attempts to send and receive dccm_client packets. </summary> @@ -24230,7 +24314,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dccm_client_packets" lineno="22462"> +<interface name="corenet_relabelto_dccm_client_packets" lineno="22480"> <summary> Relabel packets to dccm_client the packet type. </summary> @@ -24240,7 +24324,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dccm_server_packets" lineno="22482"> +<interface name="corenet_send_dccm_server_packets" lineno="22500"> <summary> Send dccm_server packets. </summary> @@ -24251,7 +24335,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22501"> +<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22519"> <summary> Do not audit attempts to send dccm_server packets. </summary> @@ -24262,7 +24346,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dccm_server_packets" lineno="22520"> +<interface name="corenet_receive_dccm_server_packets" lineno="22538"> <summary> Receive dccm_server packets. </summary> @@ -24273,7 +24357,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22539"> +<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22557"> <summary> Do not audit attempts to receive dccm_server packets. </summary> @@ -24284,7 +24368,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dccm_server_packets" lineno="22558"> +<interface name="corenet_sendrecv_dccm_server_packets" lineno="22576"> <summary> Send and receive dccm_server packets. </summary> @@ -24295,7 +24379,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22574"> +<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22592"> <summary> Do not audit attempts to send and receive dccm_server packets. </summary> @@ -24306,7 +24390,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dccm_server_packets" lineno="22589"> +<interface name="corenet_relabelto_dccm_server_packets" lineno="22607"> <summary> Relabel packets to dccm_server the packet type. </summary> @@ -24316,7 +24400,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22611"> +<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22629"> <summary> Send and receive TCP traffic on the dhcpc port. </summary> @@ -24327,7 +24411,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dhcpc_port" lineno="22626"> +<interface name="corenet_udp_send_dhcpc_port" lineno="22644"> <summary> Send UDP traffic on the dhcpc port. </summary> @@ -24338,7 +24422,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22641"> +<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22659"> <summary> Do not audit attempts to send UDP traffic on the dhcpc port. </summary> @@ -24349,7 +24433,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dhcpc_port" lineno="22656"> +<interface name="corenet_udp_receive_dhcpc_port" lineno="22674"> <summary> Receive UDP traffic on the dhcpc port. </summary> @@ -24360,7 +24444,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22671"> +<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22689"> <summary> Do not audit attempts to receive UDP traffic on the dhcpc port. </summary> @@ -24371,7 +24455,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22686"> +<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22704"> <summary> Send and receive UDP traffic on the dhcpc port. </summary> @@ -24382,7 +24466,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22702"> +<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22720"> <summary> Do not audit attempts to send and receive UDP traffic on the dhcpc port. @@ -24394,7 +24478,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dhcpc_port" lineno="22717"> +<interface name="corenet_tcp_bind_dhcpc_port" lineno="22735"> <summary> Bind TCP sockets to the dhcpc port. </summary> @@ -24405,7 +24489,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dhcpc_port" lineno="22737"> +<interface name="corenet_udp_bind_dhcpc_port" lineno="22755"> <summary> Bind UDP sockets to the dhcpc port. </summary> @@ -24416,7 +24500,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dhcpc_port" lineno="22756"> +<interface name="corenet_tcp_connect_dhcpc_port" lineno="22774"> <summary> Make a TCP connection to the dhcpc port. </summary> @@ -24426,7 +24510,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpc_client_packets" lineno="22776"> +<interface name="corenet_send_dhcpc_client_packets" lineno="22794"> <summary> Send dhcpc_client packets. </summary> @@ -24437,7 +24521,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22795"> +<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22813"> <summary> Do not audit attempts to send dhcpc_client packets. </summary> @@ -24448,7 +24532,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpc_client_packets" lineno="22814"> +<interface name="corenet_receive_dhcpc_client_packets" lineno="22832"> <summary> Receive dhcpc_client packets. </summary> @@ -24459,7 +24543,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22833"> +<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22851"> <summary> Do not audit attempts to receive dhcpc_client packets. </summary> @@ -24470,7 +24554,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22852"> +<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22870"> <summary> Send and receive dhcpc_client packets. </summary> @@ -24481,7 +24565,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22868"> +<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22886"> <summary> Do not audit attempts to send and receive dhcpc_client packets. </summary> @@ -24492,7 +24576,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22883"> +<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22901"> <summary> Relabel packets to dhcpc_client the packet type. </summary> @@ -24502,7 +24586,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpc_server_packets" lineno="22903"> +<interface name="corenet_send_dhcpc_server_packets" lineno="22921"> <summary> Send dhcpc_server packets. </summary> @@ -24513,7 +24597,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22922"> +<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22940"> <summary> Do not audit attempts to send dhcpc_server packets. </summary> @@ -24524,7 +24608,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpc_server_packets" lineno="22941"> +<interface name="corenet_receive_dhcpc_server_packets" lineno="22959"> <summary> Receive dhcpc_server packets. </summary> @@ -24535,7 +24619,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22960"> +<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22978"> <summary> Do not audit attempts to receive dhcpc_server packets. </summary> @@ -24546,7 +24630,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22979"> +<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22997"> <summary> Send and receive dhcpc_server packets. </summary> @@ -24557,7 +24641,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22995"> +<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="23013"> <summary> Do not audit attempts to send and receive dhcpc_server packets. </summary> @@ -24568,7 +24652,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23010"> +<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23028"> <summary> Relabel packets to dhcpc_server the packet type. </summary> @@ -24578,7 +24662,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23032"> +<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23050"> <summary> Send and receive TCP traffic on the dhcpd port. </summary> @@ -24589,7 +24673,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dhcpd_port" lineno="23047"> +<interface name="corenet_udp_send_dhcpd_port" lineno="23065"> <summary> Send UDP traffic on the dhcpd port. </summary> @@ -24600,7 +24684,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23062"> +<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23080"> <summary> Do not audit attempts to send UDP traffic on the dhcpd port. </summary> @@ -24611,7 +24695,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dhcpd_port" lineno="23077"> +<interface name="corenet_udp_receive_dhcpd_port" lineno="23095"> <summary> Receive UDP traffic on the dhcpd port. </summary> @@ -24622,7 +24706,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23092"> +<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23110"> <summary> Do not audit attempts to receive UDP traffic on the dhcpd port. </summary> @@ -24633,7 +24717,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23107"> +<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23125"> <summary> Send and receive UDP traffic on the dhcpd port. </summary> @@ -24644,7 +24728,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23123"> +<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23141"> <summary> Do not audit attempts to send and receive UDP traffic on the dhcpd port. @@ -24656,7 +24740,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dhcpd_port" lineno="23138"> +<interface name="corenet_tcp_bind_dhcpd_port" lineno="23156"> <summary> Bind TCP sockets to the dhcpd port. </summary> @@ -24667,7 +24751,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dhcpd_port" lineno="23158"> +<interface name="corenet_udp_bind_dhcpd_port" lineno="23176"> <summary> Bind UDP sockets to the dhcpd port. </summary> @@ -24678,7 +24762,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dhcpd_port" lineno="23177"> +<interface name="corenet_tcp_connect_dhcpd_port" lineno="23195"> <summary> Make a TCP connection to the dhcpd port. </summary> @@ -24688,7 +24772,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpd_client_packets" lineno="23197"> +<interface name="corenet_send_dhcpd_client_packets" lineno="23215"> <summary> Send dhcpd_client packets. </summary> @@ -24699,7 +24783,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23216"> +<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23234"> <summary> Do not audit attempts to send dhcpd_client packets. </summary> @@ -24710,7 +24794,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpd_client_packets" lineno="23235"> +<interface name="corenet_receive_dhcpd_client_packets" lineno="23253"> <summary> Receive dhcpd_client packets. </summary> @@ -24721,7 +24805,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23254"> +<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23272"> <summary> Do not audit attempts to receive dhcpd_client packets. </summary> @@ -24732,7 +24816,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23273"> +<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23291"> <summary> Send and receive dhcpd_client packets. </summary> @@ -24743,7 +24827,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23289"> +<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23307"> <summary> Do not audit attempts to send and receive dhcpd_client packets. </summary> @@ -24754,7 +24838,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23304"> +<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23322"> <summary> Relabel packets to dhcpd_client the packet type. </summary> @@ -24764,7 +24848,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpd_server_packets" lineno="23324"> +<interface name="corenet_send_dhcpd_server_packets" lineno="23342"> <summary> Send dhcpd_server packets. </summary> @@ -24775,7 +24859,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23343"> +<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23361"> <summary> Do not audit attempts to send dhcpd_server packets. </summary> @@ -24786,7 +24870,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpd_server_packets" lineno="23362"> +<interface name="corenet_receive_dhcpd_server_packets" lineno="23380"> <summary> Receive dhcpd_server packets. </summary> @@ -24797,7 +24881,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23381"> +<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23399"> <summary> Do not audit attempts to receive dhcpd_server packets. </summary> @@ -24808,7 +24892,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23400"> +<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23418"> <summary> Send and receive dhcpd_server packets. </summary> @@ -24819,7 +24903,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23416"> +<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23434"> <summary> Do not audit attempts to send and receive dhcpd_server packets. </summary> @@ -24830,7 +24914,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23431"> +<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23449"> <summary> Relabel packets to dhcpd_server the packet type. </summary> @@ -24840,7 +24924,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dict_port" lineno="23453"> +<interface name="corenet_tcp_sendrecv_dict_port" lineno="23471"> <summary> Send and receive TCP traffic on the dict port. </summary> @@ -24851,7 +24935,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dict_port" lineno="23468"> +<interface name="corenet_udp_send_dict_port" lineno="23486"> <summary> Send UDP traffic on the dict port. </summary> @@ -24862,7 +24946,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23483"> +<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23501"> <summary> Do not audit attempts to send UDP traffic on the dict port. </summary> @@ -24873,7 +24957,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dict_port" lineno="23498"> +<interface name="corenet_udp_receive_dict_port" lineno="23516"> <summary> Receive UDP traffic on the dict port. </summary> @@ -24884,7 +24968,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23513"> +<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23531"> <summary> Do not audit attempts to receive UDP traffic on the dict port. </summary> @@ -24895,7 +24979,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dict_port" lineno="23528"> +<interface name="corenet_udp_sendrecv_dict_port" lineno="23546"> <summary> Send and receive UDP traffic on the dict port. </summary> @@ -24906,7 +24990,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23544"> +<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23562"> <summary> Do not audit attempts to send and receive UDP traffic on the dict port. @@ -24918,7 +25002,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dict_port" lineno="23559"> +<interface name="corenet_tcp_bind_dict_port" lineno="23577"> <summary> Bind TCP sockets to the dict port. </summary> @@ -24929,7 +25013,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dict_port" lineno="23579"> +<interface name="corenet_udp_bind_dict_port" lineno="23597"> <summary> Bind UDP sockets to the dict port. </summary> @@ -24940,7 +25024,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dict_port" lineno="23598"> +<interface name="corenet_tcp_connect_dict_port" lineno="23616"> <summary> Make a TCP connection to the dict port. </summary> @@ -24950,7 +25034,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dict_client_packets" lineno="23618"> +<interface name="corenet_send_dict_client_packets" lineno="23636"> <summary> Send dict_client packets. </summary> @@ -24961,7 +25045,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23637"> +<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23655"> <summary> Do not audit attempts to send dict_client packets. </summary> @@ -24972,7 +25056,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dict_client_packets" lineno="23656"> +<interface name="corenet_receive_dict_client_packets" lineno="23674"> <summary> Receive dict_client packets. </summary> @@ -24983,7 +25067,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23675"> +<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23693"> <summary> Do not audit attempts to receive dict_client packets. </summary> @@ -24994,7 +25078,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dict_client_packets" lineno="23694"> +<interface name="corenet_sendrecv_dict_client_packets" lineno="23712"> <summary> Send and receive dict_client packets. </summary> @@ -25005,7 +25089,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23710"> +<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23728"> <summary> Do not audit attempts to send and receive dict_client packets. </summary> @@ -25016,7 +25100,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dict_client_packets" lineno="23725"> +<interface name="corenet_relabelto_dict_client_packets" lineno="23743"> <summary> Relabel packets to dict_client the packet type. </summary> @@ -25026,7 +25110,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dict_server_packets" lineno="23745"> +<interface name="corenet_send_dict_server_packets" lineno="23763"> <summary> Send dict_server packets. </summary> @@ -25037,7 +25121,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23764"> +<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23782"> <summary> Do not audit attempts to send dict_server packets. </summary> @@ -25048,7 +25132,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dict_server_packets" lineno="23783"> +<interface name="corenet_receive_dict_server_packets" lineno="23801"> <summary> Receive dict_server packets. </summary> @@ -25059,7 +25143,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23802"> +<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23820"> <summary> Do not audit attempts to receive dict_server packets. </summary> @@ -25070,7 +25154,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dict_server_packets" lineno="23821"> +<interface name="corenet_sendrecv_dict_server_packets" lineno="23839"> <summary> Send and receive dict_server packets. </summary> @@ -25081,7 +25165,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23837"> +<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23855"> <summary> Do not audit attempts to send and receive dict_server packets. </summary> @@ -25092,7 +25176,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dict_server_packets" lineno="23852"> +<interface name="corenet_relabelto_dict_server_packets" lineno="23870"> <summary> Relabel packets to dict_server the packet type. </summary> @@ -25102,7 +25186,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23874"> +<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23892"> <summary> Send and receive TCP traffic on the distccd port. </summary> @@ -25113,7 +25197,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_distccd_port" lineno="23889"> +<interface name="corenet_udp_send_distccd_port" lineno="23907"> <summary> Send UDP traffic on the distccd port. </summary> @@ -25124,7 +25208,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23904"> +<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23922"> <summary> Do not audit attempts to send UDP traffic on the distccd port. </summary> @@ -25135,7 +25219,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_distccd_port" lineno="23919"> +<interface name="corenet_udp_receive_distccd_port" lineno="23937"> <summary> Receive UDP traffic on the distccd port. </summary> @@ -25146,7 +25230,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23934"> +<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23952"> <summary> Do not audit attempts to receive UDP traffic on the distccd port. </summary> @@ -25157,7 +25241,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_distccd_port" lineno="23949"> +<interface name="corenet_udp_sendrecv_distccd_port" lineno="23967"> <summary> Send and receive UDP traffic on the distccd port. </summary> @@ -25168,7 +25252,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23965"> +<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23983"> <summary> Do not audit attempts to send and receive UDP traffic on the distccd port. @@ -25180,7 +25264,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_distccd_port" lineno="23980"> +<interface name="corenet_tcp_bind_distccd_port" lineno="23998"> <summary> Bind TCP sockets to the distccd port. </summary> @@ -25191,7 +25275,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_distccd_port" lineno="24000"> +<interface name="corenet_udp_bind_distccd_port" lineno="24018"> <summary> Bind UDP sockets to the distccd port. </summary> @@ -25202,7 +25286,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_distccd_port" lineno="24019"> +<interface name="corenet_tcp_connect_distccd_port" lineno="24037"> <summary> Make a TCP connection to the distccd port. </summary> @@ -25212,7 +25296,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_distccd_client_packets" lineno="24039"> +<interface name="corenet_send_distccd_client_packets" lineno="24057"> <summary> Send distccd_client packets. </summary> @@ -25223,7 +25307,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24058"> +<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24076"> <summary> Do not audit attempts to send distccd_client packets. </summary> @@ -25234,7 +25318,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_distccd_client_packets" lineno="24077"> +<interface name="corenet_receive_distccd_client_packets" lineno="24095"> <summary> Receive distccd_client packets. </summary> @@ -25245,7 +25329,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24096"> +<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24114"> <summary> Do not audit attempts to receive distccd_client packets. </summary> @@ -25256,7 +25340,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_distccd_client_packets" lineno="24115"> +<interface name="corenet_sendrecv_distccd_client_packets" lineno="24133"> <summary> Send and receive distccd_client packets. </summary> @@ -25267,7 +25351,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24131"> +<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24149"> <summary> Do not audit attempts to send and receive distccd_client packets. </summary> @@ -25278,7 +25362,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_distccd_client_packets" lineno="24146"> +<interface name="corenet_relabelto_distccd_client_packets" lineno="24164"> <summary> Relabel packets to distccd_client the packet type. </summary> @@ -25288,7 +25372,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_distccd_server_packets" lineno="24166"> +<interface name="corenet_send_distccd_server_packets" lineno="24184"> <summary> Send distccd_server packets. </summary> @@ -25299,7 +25383,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24185"> +<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24203"> <summary> Do not audit attempts to send distccd_server packets. </summary> @@ -25310,7 +25394,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_distccd_server_packets" lineno="24204"> +<interface name="corenet_receive_distccd_server_packets" lineno="24222"> <summary> Receive distccd_server packets. </summary> @@ -25321,7 +25405,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24223"> +<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24241"> <summary> Do not audit attempts to receive distccd_server packets. </summary> @@ -25332,7 +25416,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_distccd_server_packets" lineno="24242"> +<interface name="corenet_sendrecv_distccd_server_packets" lineno="24260"> <summary> Send and receive distccd_server packets. </summary> @@ -25343,7 +25427,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24258"> +<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24276"> <summary> Do not audit attempts to send and receive distccd_server packets. </summary> @@ -25354,7 +25438,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_distccd_server_packets" lineno="24273"> +<interface name="corenet_relabelto_distccd_server_packets" lineno="24291"> <summary> Relabel packets to distccd_server the packet type. </summary> @@ -25364,7 +25448,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dns_port" lineno="24295"> +<interface name="corenet_tcp_sendrecv_dns_port" lineno="24313"> <summary> Send and receive TCP traffic on the dns port. </summary> @@ -25375,7 +25459,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dns_port" lineno="24310"> +<interface name="corenet_udp_send_dns_port" lineno="24328"> <summary> Send UDP traffic on the dns port. </summary> @@ -25386,7 +25470,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24325"> +<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24343"> <summary> Do not audit attempts to send UDP traffic on the dns port. </summary> @@ -25397,7 +25481,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dns_port" lineno="24340"> +<interface name="corenet_udp_receive_dns_port" lineno="24358"> <summary> Receive UDP traffic on the dns port. </summary> @@ -25408,7 +25492,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24355"> +<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24373"> <summary> Do not audit attempts to receive UDP traffic on the dns port. </summary> @@ -25419,7 +25503,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dns_port" lineno="24370"> +<interface name="corenet_udp_sendrecv_dns_port" lineno="24388"> <summary> Send and receive UDP traffic on the dns port. </summary> @@ -25430,7 +25514,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24386"> +<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24404"> <summary> Do not audit attempts to send and receive UDP traffic on the dns port. @@ -25442,7 +25526,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dns_port" lineno="24401"> +<interface name="corenet_tcp_bind_dns_port" lineno="24419"> <summary> Bind TCP sockets to the dns port. </summary> @@ -25453,7 +25537,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dns_port" lineno="24421"> +<interface name="corenet_udp_bind_dns_port" lineno="24439"> <summary> Bind UDP sockets to the dns port. </summary> @@ -25464,7 +25548,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dns_port" lineno="24440"> +<interface name="corenet_tcp_connect_dns_port" lineno="24458"> <summary> Make a TCP connection to the dns port. </summary> @@ -25474,7 +25558,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dns_client_packets" lineno="24460"> +<interface name="corenet_send_dns_client_packets" lineno="24478"> <summary> Send dns_client packets. </summary> @@ -25485,7 +25569,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24479"> +<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24497"> <summary> Do not audit attempts to send dns_client packets. </summary> @@ -25496,7 +25580,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dns_client_packets" lineno="24498"> +<interface name="corenet_receive_dns_client_packets" lineno="24516"> <summary> Receive dns_client packets. </summary> @@ -25507,7 +25591,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24517"> +<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24535"> <summary> Do not audit attempts to receive dns_client packets. </summary> @@ -25518,7 +25602,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dns_client_packets" lineno="24536"> +<interface name="corenet_sendrecv_dns_client_packets" lineno="24554"> <summary> Send and receive dns_client packets. </summary> @@ -25529,7 +25613,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24552"> +<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24570"> <summary> Do not audit attempts to send and receive dns_client packets. </summary> @@ -25540,7 +25624,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dns_client_packets" lineno="24567"> +<interface name="corenet_relabelto_dns_client_packets" lineno="24585"> <summary> Relabel packets to dns_client the packet type. </summary> @@ -25550,7 +25634,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dns_server_packets" lineno="24587"> +<interface name="corenet_send_dns_server_packets" lineno="24605"> <summary> Send dns_server packets. </summary> @@ -25561,7 +25645,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24606"> +<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24624"> <summary> Do not audit attempts to send dns_server packets. </summary> @@ -25572,7 +25656,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dns_server_packets" lineno="24625"> +<interface name="corenet_receive_dns_server_packets" lineno="24643"> <summary> Receive dns_server packets. </summary> @@ -25583,7 +25667,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24644"> +<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24662"> <summary> Do not audit attempts to receive dns_server packets. </summary> @@ -25594,7 +25678,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dns_server_packets" lineno="24663"> +<interface name="corenet_sendrecv_dns_server_packets" lineno="24681"> <summary> Send and receive dns_server packets. </summary> @@ -25605,7 +25689,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24679"> +<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24697"> <summary> Do not audit attempts to send and receive dns_server packets. </summary> @@ -25616,7 +25700,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dns_server_packets" lineno="24694"> +<interface name="corenet_relabelto_dns_server_packets" lineno="24712"> <summary> Relabel packets to dns_server the packet type. </summary> @@ -25626,7 +25710,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24716"> +<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24734"> <summary> Send and receive TCP traffic on the dropbox port. </summary> @@ -25637,7 +25721,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_dropbox_port" lineno="24731"> +<interface name="corenet_udp_send_dropbox_port" lineno="24749"> <summary> Send UDP traffic on the dropbox port. </summary> @@ -25648,7 +25732,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24746"> +<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24764"> <summary> Do not audit attempts to send UDP traffic on the dropbox port. </summary> @@ -25659,7 +25743,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_dropbox_port" lineno="24761"> +<interface name="corenet_udp_receive_dropbox_port" lineno="24779"> <summary> Receive UDP traffic on the dropbox port. </summary> @@ -25670,7 +25754,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24776"> +<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24794"> <summary> Do not audit attempts to receive UDP traffic on the dropbox port. </summary> @@ -25681,7 +25765,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24791"> +<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24809"> <summary> Send and receive UDP traffic on the dropbox port. </summary> @@ -25692,7 +25776,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24807"> +<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24825"> <summary> Do not audit attempts to send and receive UDP traffic on the dropbox port. @@ -25704,7 +25788,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_dropbox_port" lineno="24822"> +<interface name="corenet_tcp_bind_dropbox_port" lineno="24840"> <summary> Bind TCP sockets to the dropbox port. </summary> @@ -25715,7 +25799,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dropbox_port" lineno="24842"> +<interface name="corenet_udp_bind_dropbox_port" lineno="24860"> <summary> Bind UDP sockets to the dropbox port. </summary> @@ -25726,7 +25810,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dropbox_port" lineno="24861"> +<interface name="corenet_tcp_connect_dropbox_port" lineno="24879"> <summary> Make a TCP connection to the dropbox port. </summary> @@ -25736,7 +25820,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dropbox_client_packets" lineno="24881"> +<interface name="corenet_send_dropbox_client_packets" lineno="24899"> <summary> Send dropbox_client packets. </summary> @@ -25747,7 +25831,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24900"> +<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24918"> <summary> Do not audit attempts to send dropbox_client packets. </summary> @@ -25758,7 +25842,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dropbox_client_packets" lineno="24919"> +<interface name="corenet_receive_dropbox_client_packets" lineno="24937"> <summary> Receive dropbox_client packets. </summary> @@ -25769,7 +25853,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24938"> +<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24956"> <summary> Do not audit attempts to receive dropbox_client packets. </summary> @@ -25780,7 +25864,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24957"> +<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24975"> <summary> Send and receive dropbox_client packets. </summary> @@ -25791,7 +25875,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24973"> +<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24991"> <summary> Do not audit attempts to send and receive dropbox_client packets. </summary> @@ -25802,7 +25886,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dropbox_client_packets" lineno="24988"> +<interface name="corenet_relabelto_dropbox_client_packets" lineno="25006"> <summary> Relabel packets to dropbox_client the packet type. </summary> @@ -25812,7 +25896,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dropbox_server_packets" lineno="25008"> +<interface name="corenet_send_dropbox_server_packets" lineno="25026"> <summary> Send dropbox_server packets. </summary> @@ -25823,7 +25907,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25027"> +<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25045"> <summary> Do not audit attempts to send dropbox_server packets. </summary> @@ -25834,7 +25918,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dropbox_server_packets" lineno="25046"> +<interface name="corenet_receive_dropbox_server_packets" lineno="25064"> <summary> Receive dropbox_server packets. </summary> @@ -25845,7 +25929,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25065"> +<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25083"> <summary> Do not audit attempts to receive dropbox_server packets. </summary> @@ -25856,7 +25940,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25084"> +<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25102"> <summary> Send and receive dropbox_server packets. </summary> @@ -25867,7 +25951,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25100"> +<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25118"> <summary> Do not audit attempts to send and receive dropbox_server packets. </summary> @@ -25878,7 +25962,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dropbox_server_packets" lineno="25115"> +<interface name="corenet_relabelto_dropbox_server_packets" lineno="25133"> <summary> Relabel packets to dropbox_server the packet type. </summary> @@ -25888,7 +25972,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_efs_port" lineno="25137"> +<interface name="corenet_tcp_sendrecv_efs_port" lineno="25155"> <summary> Send and receive TCP traffic on the efs port. </summary> @@ -25899,7 +25983,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_efs_port" lineno="25152"> +<interface name="corenet_udp_send_efs_port" lineno="25170"> <summary> Send UDP traffic on the efs port. </summary> @@ -25910,7 +25994,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25167"> +<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25185"> <summary> Do not audit attempts to send UDP traffic on the efs port. </summary> @@ -25921,7 +26005,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_efs_port" lineno="25182"> +<interface name="corenet_udp_receive_efs_port" lineno="25200"> <summary> Receive UDP traffic on the efs port. </summary> @@ -25932,7 +26016,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25197"> +<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25215"> <summary> Do not audit attempts to receive UDP traffic on the efs port. </summary> @@ -25943,7 +26027,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_efs_port" lineno="25212"> +<interface name="corenet_udp_sendrecv_efs_port" lineno="25230"> <summary> Send and receive UDP traffic on the efs port. </summary> @@ -25954,7 +26038,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25228"> +<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25246"> <summary> Do not audit attempts to send and receive UDP traffic on the efs port. @@ -25966,7 +26050,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_efs_port" lineno="25243"> +<interface name="corenet_tcp_bind_efs_port" lineno="25261"> <summary> Bind TCP sockets to the efs port. </summary> @@ -25977,7 +26061,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_efs_port" lineno="25263"> +<interface name="corenet_udp_bind_efs_port" lineno="25281"> <summary> Bind UDP sockets to the efs port. </summary> @@ -25988,7 +26072,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_efs_port" lineno="25282"> +<interface name="corenet_tcp_connect_efs_port" lineno="25300"> <summary> Make a TCP connection to the efs port. </summary> @@ -25998,7 +26082,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_efs_client_packets" lineno="25302"> +<interface name="corenet_send_efs_client_packets" lineno="25320"> <summary> Send efs_client packets. </summary> @@ -26009,7 +26093,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25321"> +<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25339"> <summary> Do not audit attempts to send efs_client packets. </summary> @@ -26020,7 +26104,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_efs_client_packets" lineno="25340"> +<interface name="corenet_receive_efs_client_packets" lineno="25358"> <summary> Receive efs_client packets. </summary> @@ -26031,7 +26115,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25359"> +<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25377"> <summary> Do not audit attempts to receive efs_client packets. </summary> @@ -26042,7 +26126,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_efs_client_packets" lineno="25378"> +<interface name="corenet_sendrecv_efs_client_packets" lineno="25396"> <summary> Send and receive efs_client packets. </summary> @@ -26053,7 +26137,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25394"> +<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25412"> <summary> Do not audit attempts to send and receive efs_client packets. </summary> @@ -26064,7 +26148,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_efs_client_packets" lineno="25409"> +<interface name="corenet_relabelto_efs_client_packets" lineno="25427"> <summary> Relabel packets to efs_client the packet type. </summary> @@ -26074,7 +26158,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_efs_server_packets" lineno="25429"> +<interface name="corenet_send_efs_server_packets" lineno="25447"> <summary> Send efs_server packets. </summary> @@ -26085,7 +26169,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25448"> +<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25466"> <summary> Do not audit attempts to send efs_server packets. </summary> @@ -26096,7 +26180,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_efs_server_packets" lineno="25467"> +<interface name="corenet_receive_efs_server_packets" lineno="25485"> <summary> Receive efs_server packets. </summary> @@ -26107,7 +26191,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25486"> +<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25504"> <summary> Do not audit attempts to receive efs_server packets. </summary> @@ -26118,7 +26202,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_efs_server_packets" lineno="25505"> +<interface name="corenet_sendrecv_efs_server_packets" lineno="25523"> <summary> Send and receive efs_server packets. </summary> @@ -26129,7 +26213,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25521"> +<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25539"> <summary> Do not audit attempts to send and receive efs_server packets. </summary> @@ -26140,7 +26224,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_efs_server_packets" lineno="25536"> +<interface name="corenet_relabelto_efs_server_packets" lineno="25554"> <summary> Relabel packets to efs_server the packet type. </summary> @@ -26150,7 +26234,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25558"> +<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25576"> <summary> Send and receive TCP traffic on the embrace_dp_c port. </summary> @@ -26161,7 +26245,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25573"> +<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25591"> <summary> Send UDP traffic on the embrace_dp_c port. </summary> @@ -26172,7 +26256,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25588"> +<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25606"> <summary> Do not audit attempts to send UDP traffic on the embrace_dp_c port. </summary> @@ -26183,7 +26267,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25603"> +<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25621"> <summary> Receive UDP traffic on the embrace_dp_c port. </summary> @@ -26194,7 +26278,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25618"> +<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25636"> <summary> Do not audit attempts to receive UDP traffic on the embrace_dp_c port. </summary> @@ -26205,7 +26289,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25633"> +<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25651"> <summary> Send and receive UDP traffic on the embrace_dp_c port. </summary> @@ -26216,7 +26300,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25649"> +<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25667"> <summary> Do not audit attempts to send and receive UDP traffic on the embrace_dp_c port. @@ -26228,7 +26312,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25664"> +<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25682"> <summary> Bind TCP sockets to the embrace_dp_c port. </summary> @@ -26239,7 +26323,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25684"> +<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25702"> <summary> Bind UDP sockets to the embrace_dp_c port. </summary> @@ -26250,7 +26334,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25703"> +<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25721"> <summary> Make a TCP connection to the embrace_dp_c port. </summary> @@ -26260,7 +26344,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25723"> +<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25741"> <summary> Send embrace_dp_c_client packets. </summary> @@ -26271,7 +26355,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25742"> +<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25760"> <summary> Do not audit attempts to send embrace_dp_c_client packets. </summary> @@ -26282,7 +26366,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25761"> +<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25779"> <summary> Receive embrace_dp_c_client packets. </summary> @@ -26293,7 +26377,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25780"> +<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25798"> <summary> Do not audit attempts to receive embrace_dp_c_client packets. </summary> @@ -26304,7 +26388,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25799"> +<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25817"> <summary> Send and receive embrace_dp_c_client packets. </summary> @@ -26315,7 +26399,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25815"> +<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25833"> <summary> Do not audit attempts to send and receive embrace_dp_c_client packets. </summary> @@ -26326,7 +26410,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25830"> +<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25848"> <summary> Relabel packets to embrace_dp_c_client the packet type. </summary> @@ -26336,7 +26420,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25850"> +<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25868"> <summary> Send embrace_dp_c_server packets. </summary> @@ -26347,7 +26431,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25869"> +<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25887"> <summary> Do not audit attempts to send embrace_dp_c_server packets. </summary> @@ -26358,7 +26442,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25888"> +<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25906"> <summary> Receive embrace_dp_c_server packets. </summary> @@ -26369,7 +26453,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25907"> +<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25925"> <summary> Do not audit attempts to receive embrace_dp_c_server packets. </summary> @@ -26380,7 +26464,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25926"> +<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25944"> <summary> Send and receive embrace_dp_c_server packets. </summary> @@ -26391,7 +26475,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25942"> +<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25960"> <summary> Do not audit attempts to send and receive embrace_dp_c_server packets. </summary> @@ -26402,7 +26486,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25957"> +<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25975"> <summary> Relabel packets to embrace_dp_c_server the packet type. </summary> @@ -26412,7 +26496,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25979"> +<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25997"> <summary> Send and receive TCP traffic on the epmap port. </summary> @@ -26423,7 +26507,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_epmap_port" lineno="25994"> +<interface name="corenet_udp_send_epmap_port" lineno="26012"> <summary> Send UDP traffic on the epmap port. </summary> @@ -26434,7 +26518,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26009"> +<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26027"> <summary> Do not audit attempts to send UDP traffic on the epmap port. </summary> @@ -26445,7 +26529,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_epmap_port" lineno="26024"> +<interface name="corenet_udp_receive_epmap_port" lineno="26042"> <summary> Receive UDP traffic on the epmap port. </summary> @@ -26456,7 +26540,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26039"> +<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26057"> <summary> Do not audit attempts to receive UDP traffic on the epmap port. </summary> @@ -26467,7 +26551,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_epmap_port" lineno="26054"> +<interface name="corenet_udp_sendrecv_epmap_port" lineno="26072"> <summary> Send and receive UDP traffic on the epmap port. </summary> @@ -26478,7 +26562,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26070"> +<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26088"> <summary> Do not audit attempts to send and receive UDP traffic on the epmap port. @@ -26490,7 +26574,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_epmap_port" lineno="26085"> +<interface name="corenet_tcp_bind_epmap_port" lineno="26103"> <summary> Bind TCP sockets to the epmap port. </summary> @@ -26501,7 +26585,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_epmap_port" lineno="26105"> +<interface name="corenet_udp_bind_epmap_port" lineno="26123"> <summary> Bind UDP sockets to the epmap port. </summary> @@ -26512,7 +26596,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_epmap_port" lineno="26124"> +<interface name="corenet_tcp_connect_epmap_port" lineno="26142"> <summary> Make a TCP connection to the epmap port. </summary> @@ -26522,7 +26606,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmap_client_packets" lineno="26144"> +<interface name="corenet_send_epmap_client_packets" lineno="26162"> <summary> Send epmap_client packets. </summary> @@ -26533,7 +26617,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26163"> +<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26181"> <summary> Do not audit attempts to send epmap_client packets. </summary> @@ -26544,7 +26628,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmap_client_packets" lineno="26182"> +<interface name="corenet_receive_epmap_client_packets" lineno="26200"> <summary> Receive epmap_client packets. </summary> @@ -26555,7 +26639,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26201"> +<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26219"> <summary> Do not audit attempts to receive epmap_client packets. </summary> @@ -26566,7 +26650,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmap_client_packets" lineno="26220"> +<interface name="corenet_sendrecv_epmap_client_packets" lineno="26238"> <summary> Send and receive epmap_client packets. </summary> @@ -26577,7 +26661,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26236"> +<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26254"> <summary> Do not audit attempts to send and receive epmap_client packets. </summary> @@ -26588,7 +26672,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmap_client_packets" lineno="26251"> +<interface name="corenet_relabelto_epmap_client_packets" lineno="26269"> <summary> Relabel packets to epmap_client the packet type. </summary> @@ -26598,7 +26682,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmap_server_packets" lineno="26271"> +<interface name="corenet_send_epmap_server_packets" lineno="26289"> <summary> Send epmap_server packets. </summary> @@ -26609,7 +26693,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26290"> +<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26308"> <summary> Do not audit attempts to send epmap_server packets. </summary> @@ -26620,7 +26704,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmap_server_packets" lineno="26309"> +<interface name="corenet_receive_epmap_server_packets" lineno="26327"> <summary> Receive epmap_server packets. </summary> @@ -26631,7 +26715,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26328"> +<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26346"> <summary> Do not audit attempts to receive epmap_server packets. </summary> @@ -26642,7 +26726,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmap_server_packets" lineno="26347"> +<interface name="corenet_sendrecv_epmap_server_packets" lineno="26365"> <summary> Send and receive epmap_server packets. </summary> @@ -26653,7 +26737,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26363"> +<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26381"> <summary> Do not audit attempts to send and receive epmap_server packets. </summary> @@ -26664,7 +26748,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmap_server_packets" lineno="26378"> +<interface name="corenet_relabelto_epmap_server_packets" lineno="26396"> <summary> Relabel packets to epmap_server the packet type. </summary> @@ -26674,7 +26758,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26400"> +<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26418"> <summary> Send and receive TCP traffic on the epmd port. </summary> @@ -26685,7 +26769,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_epmd_port" lineno="26415"> +<interface name="corenet_udp_send_epmd_port" lineno="26433"> <summary> Send UDP traffic on the epmd port. </summary> @@ -26696,7 +26780,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26430"> +<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26448"> <summary> Do not audit attempts to send UDP traffic on the epmd port. </summary> @@ -26707,7 +26791,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_epmd_port" lineno="26445"> +<interface name="corenet_udp_receive_epmd_port" lineno="26463"> <summary> Receive UDP traffic on the epmd port. </summary> @@ -26718,7 +26802,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26460"> +<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26478"> <summary> Do not audit attempts to receive UDP traffic on the epmd port. </summary> @@ -26729,7 +26813,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_epmd_port" lineno="26475"> +<interface name="corenet_udp_sendrecv_epmd_port" lineno="26493"> <summary> Send and receive UDP traffic on the epmd port. </summary> @@ -26740,7 +26824,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26491"> +<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26509"> <summary> Do not audit attempts to send and receive UDP traffic on the epmd port. @@ -26752,7 +26836,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_epmd_port" lineno="26506"> +<interface name="corenet_tcp_bind_epmd_port" lineno="26524"> <summary> Bind TCP sockets to the epmd port. </summary> @@ -26763,7 +26847,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_epmd_port" lineno="26526"> +<interface name="corenet_udp_bind_epmd_port" lineno="26544"> <summary> Bind UDP sockets to the epmd port. </summary> @@ -26774,7 +26858,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_epmd_port" lineno="26545"> +<interface name="corenet_tcp_connect_epmd_port" lineno="26563"> <summary> Make a TCP connection to the epmd port. </summary> @@ -26784,7 +26868,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmd_client_packets" lineno="26565"> +<interface name="corenet_send_epmd_client_packets" lineno="26583"> <summary> Send epmd_client packets. </summary> @@ -26795,7 +26879,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26584"> +<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26602"> <summary> Do not audit attempts to send epmd_client packets. </summary> @@ -26806,7 +26890,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmd_client_packets" lineno="26603"> +<interface name="corenet_receive_epmd_client_packets" lineno="26621"> <summary> Receive epmd_client packets. </summary> @@ -26817,7 +26901,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26622"> +<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26640"> <summary> Do not audit attempts to receive epmd_client packets. </summary> @@ -26828,7 +26912,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmd_client_packets" lineno="26641"> +<interface name="corenet_sendrecv_epmd_client_packets" lineno="26659"> <summary> Send and receive epmd_client packets. </summary> @@ -26839,7 +26923,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26657"> +<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26675"> <summary> Do not audit attempts to send and receive epmd_client packets. </summary> @@ -26850,7 +26934,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmd_client_packets" lineno="26672"> +<interface name="corenet_relabelto_epmd_client_packets" lineno="26690"> <summary> Relabel packets to epmd_client the packet type. </summary> @@ -26860,7 +26944,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmd_server_packets" lineno="26692"> +<interface name="corenet_send_epmd_server_packets" lineno="26710"> <summary> Send epmd_server packets. </summary> @@ -26871,7 +26955,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26711"> +<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26729"> <summary> Do not audit attempts to send epmd_server packets. </summary> @@ -26882,7 +26966,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmd_server_packets" lineno="26730"> +<interface name="corenet_receive_epmd_server_packets" lineno="26748"> <summary> Receive epmd_server packets. </summary> @@ -26893,7 +26977,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26749"> +<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26767"> <summary> Do not audit attempts to receive epmd_server packets. </summary> @@ -26904,7 +26988,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmd_server_packets" lineno="26768"> +<interface name="corenet_sendrecv_epmd_server_packets" lineno="26786"> <summary> Send and receive epmd_server packets. </summary> @@ -26915,7 +26999,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26784"> +<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26802"> <summary> Do not audit attempts to send and receive epmd_server packets. </summary> @@ -26926,7 +27010,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmd_server_packets" lineno="26799"> +<interface name="corenet_relabelto_epmd_server_packets" lineno="26817"> <summary> Relabel packets to epmd_server the packet type. </summary> @@ -26936,7 +27020,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26821"> +<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26839"> <summary> Send and receive TCP traffic on the fingerd port. </summary> @@ -26947,7 +27031,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_fingerd_port" lineno="26836"> +<interface name="corenet_udp_send_fingerd_port" lineno="26854"> <summary> Send UDP traffic on the fingerd port. </summary> @@ -26958,7 +27042,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26851"> +<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26869"> <summary> Do not audit attempts to send UDP traffic on the fingerd port. </summary> @@ -26969,7 +27053,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_fingerd_port" lineno="26866"> +<interface name="corenet_udp_receive_fingerd_port" lineno="26884"> <summary> Receive UDP traffic on the fingerd port. </summary> @@ -26980,7 +27064,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26881"> +<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26899"> <summary> Do not audit attempts to receive UDP traffic on the fingerd port. </summary> @@ -26991,7 +27075,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26896"> +<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26914"> <summary> Send and receive UDP traffic on the fingerd port. </summary> @@ -27002,7 +27086,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26912"> +<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26930"> <summary> Do not audit attempts to send and receive UDP traffic on the fingerd port. @@ -27014,7 +27098,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_fingerd_port" lineno="26927"> +<interface name="corenet_tcp_bind_fingerd_port" lineno="26945"> <summary> Bind TCP sockets to the fingerd port. </summary> @@ -27025,7 +27109,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_fingerd_port" lineno="26947"> +<interface name="corenet_udp_bind_fingerd_port" lineno="26965"> <summary> Bind UDP sockets to the fingerd port. </summary> @@ -27036,7 +27120,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_fingerd_port" lineno="26966"> +<interface name="corenet_tcp_connect_fingerd_port" lineno="26984"> <summary> Make a TCP connection to the fingerd port. </summary> @@ -27046,7 +27130,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_fingerd_client_packets" lineno="26986"> +<interface name="corenet_send_fingerd_client_packets" lineno="27004"> <summary> Send fingerd_client packets. </summary> @@ -27057,7 +27141,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27005"> +<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27023"> <summary> Do not audit attempts to send fingerd_client packets. </summary> @@ -27068,7 +27152,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_fingerd_client_packets" lineno="27024"> +<interface name="corenet_receive_fingerd_client_packets" lineno="27042"> <summary> Receive fingerd_client packets. </summary> @@ -27079,7 +27163,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27043"> +<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27061"> <summary> Do not audit attempts to receive fingerd_client packets. </summary> @@ -27090,7 +27174,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27062"> +<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27080"> <summary> Send and receive fingerd_client packets. </summary> @@ -27101,7 +27185,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27078"> +<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27096"> <summary> Do not audit attempts to send and receive fingerd_client packets. </summary> @@ -27112,7 +27196,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_fingerd_client_packets" lineno="27093"> +<interface name="corenet_relabelto_fingerd_client_packets" lineno="27111"> <summary> Relabel packets to fingerd_client the packet type. </summary> @@ -27122,7 +27206,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_fingerd_server_packets" lineno="27113"> +<interface name="corenet_send_fingerd_server_packets" lineno="27131"> <summary> Send fingerd_server packets. </summary> @@ -27133,7 +27217,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27132"> +<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27150"> <summary> Do not audit attempts to send fingerd_server packets. </summary> @@ -27144,7 +27228,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_fingerd_server_packets" lineno="27151"> +<interface name="corenet_receive_fingerd_server_packets" lineno="27169"> <summary> Receive fingerd_server packets. </summary> @@ -27155,7 +27239,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27170"> +<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27188"> <summary> Do not audit attempts to receive fingerd_server packets. </summary> @@ -27166,7 +27250,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27189"> +<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27207"> <summary> Send and receive fingerd_server packets. </summary> @@ -27177,7 +27261,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27205"> +<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27223"> <summary> Do not audit attempts to send and receive fingerd_server packets. </summary> @@ -27188,7 +27272,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_fingerd_server_packets" lineno="27220"> +<interface name="corenet_relabelto_fingerd_server_packets" lineno="27238"> <summary> Relabel packets to fingerd_server the packet type. </summary> @@ -27198,7 +27282,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27242"> +<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27260"> <summary> Send and receive TCP traffic on the ftp port. </summary> @@ -27209,7 +27293,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ftp_port" lineno="27257"> +<interface name="corenet_udp_send_ftp_port" lineno="27275"> <summary> Send UDP traffic on the ftp port. </summary> @@ -27220,7 +27304,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27272"> +<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27290"> <summary> Do not audit attempts to send UDP traffic on the ftp port. </summary> @@ -27231,7 +27315,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ftp_port" lineno="27287"> +<interface name="corenet_udp_receive_ftp_port" lineno="27305"> <summary> Receive UDP traffic on the ftp port. </summary> @@ -27242,7 +27326,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27302"> +<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27320"> <summary> Do not audit attempts to receive UDP traffic on the ftp port. </summary> @@ -27253,7 +27337,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ftp_port" lineno="27317"> +<interface name="corenet_udp_sendrecv_ftp_port" lineno="27335"> <summary> Send and receive UDP traffic on the ftp port. </summary> @@ -27264,7 +27348,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27333"> +<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27351"> <summary> Do not audit attempts to send and receive UDP traffic on the ftp port. @@ -27276,7 +27360,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ftp_port" lineno="27348"> +<interface name="corenet_tcp_bind_ftp_port" lineno="27366"> <summary> Bind TCP sockets to the ftp port. </summary> @@ -27287,7 +27371,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ftp_port" lineno="27368"> +<interface name="corenet_udp_bind_ftp_port" lineno="27386"> <summary> Bind UDP sockets to the ftp port. </summary> @@ -27298,7 +27382,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ftp_port" lineno="27387"> +<interface name="corenet_tcp_connect_ftp_port" lineno="27405"> <summary> Make a TCP connection to the ftp port. </summary> @@ -27308,7 +27392,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_client_packets" lineno="27407"> +<interface name="corenet_send_ftp_client_packets" lineno="27425"> <summary> Send ftp_client packets. </summary> @@ -27319,7 +27403,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27426"> +<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27444"> <summary> Do not audit attempts to send ftp_client packets. </summary> @@ -27330,7 +27414,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_client_packets" lineno="27445"> +<interface name="corenet_receive_ftp_client_packets" lineno="27463"> <summary> Receive ftp_client packets. </summary> @@ -27341,7 +27425,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27464"> +<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27482"> <summary> Do not audit attempts to receive ftp_client packets. </summary> @@ -27352,7 +27436,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_client_packets" lineno="27483"> +<interface name="corenet_sendrecv_ftp_client_packets" lineno="27501"> <summary> Send and receive ftp_client packets. </summary> @@ -27363,7 +27447,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27499"> +<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27517"> <summary> Do not audit attempts to send and receive ftp_client packets. </summary> @@ -27374,7 +27458,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_client_packets" lineno="27514"> +<interface name="corenet_relabelto_ftp_client_packets" lineno="27532"> <summary> Relabel packets to ftp_client the packet type. </summary> @@ -27384,7 +27468,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_server_packets" lineno="27534"> +<interface name="corenet_send_ftp_server_packets" lineno="27552"> <summary> Send ftp_server packets. </summary> @@ -27395,7 +27479,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27553"> +<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27571"> <summary> Do not audit attempts to send ftp_server packets. </summary> @@ -27406,7 +27490,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_server_packets" lineno="27572"> +<interface name="corenet_receive_ftp_server_packets" lineno="27590"> <summary> Receive ftp_server packets. </summary> @@ -27417,7 +27501,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27591"> +<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27609"> <summary> Do not audit attempts to receive ftp_server packets. </summary> @@ -27428,7 +27512,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_server_packets" lineno="27610"> +<interface name="corenet_sendrecv_ftp_server_packets" lineno="27628"> <summary> Send and receive ftp_server packets. </summary> @@ -27439,7 +27523,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27626"> +<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27644"> <summary> Do not audit attempts to send and receive ftp_server packets. </summary> @@ -27450,7 +27534,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_server_packets" lineno="27641"> +<interface name="corenet_relabelto_ftp_server_packets" lineno="27659"> <summary> Relabel packets to ftp_server the packet type. </summary> @@ -27460,7 +27544,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27663"> +<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27681"> <summary> Send and receive TCP traffic on the ftp_data port. </summary> @@ -27471,7 +27555,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ftp_data_port" lineno="27678"> +<interface name="corenet_udp_send_ftp_data_port" lineno="27696"> <summary> Send UDP traffic on the ftp_data port. </summary> @@ -27482,7 +27566,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27693"> +<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27711"> <summary> Do not audit attempts to send UDP traffic on the ftp_data port. </summary> @@ -27493,7 +27577,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ftp_data_port" lineno="27708"> +<interface name="corenet_udp_receive_ftp_data_port" lineno="27726"> <summary> Receive UDP traffic on the ftp_data port. </summary> @@ -27504,7 +27588,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27723"> +<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27741"> <summary> Do not audit attempts to receive UDP traffic on the ftp_data port. </summary> @@ -27515,7 +27599,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27738"> +<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27756"> <summary> Send and receive UDP traffic on the ftp_data port. </summary> @@ -27526,7 +27610,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27754"> +<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27772"> <summary> Do not audit attempts to send and receive UDP traffic on the ftp_data port. @@ -27538,7 +27622,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ftp_data_port" lineno="27769"> +<interface name="corenet_tcp_bind_ftp_data_port" lineno="27787"> <summary> Bind TCP sockets to the ftp_data port. </summary> @@ -27549,7 +27633,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ftp_data_port" lineno="27789"> +<interface name="corenet_udp_bind_ftp_data_port" lineno="27807"> <summary> Bind UDP sockets to the ftp_data port. </summary> @@ -27560,7 +27644,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ftp_data_port" lineno="27808"> +<interface name="corenet_tcp_connect_ftp_data_port" lineno="27826"> <summary> Make a TCP connection to the ftp_data port. </summary> @@ -27570,7 +27654,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_data_client_packets" lineno="27828"> +<interface name="corenet_send_ftp_data_client_packets" lineno="27846"> <summary> Send ftp_data_client packets. </summary> @@ -27581,7 +27665,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27847"> +<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27865"> <summary> Do not audit attempts to send ftp_data_client packets. </summary> @@ -27592,7 +27676,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_data_client_packets" lineno="27866"> +<interface name="corenet_receive_ftp_data_client_packets" lineno="27884"> <summary> Receive ftp_data_client packets. </summary> @@ -27603,7 +27687,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27885"> +<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27903"> <summary> Do not audit attempts to receive ftp_data_client packets. </summary> @@ -27614,7 +27698,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27904"> +<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27922"> <summary> Send and receive ftp_data_client packets. </summary> @@ -27625,7 +27709,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27920"> +<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27938"> <summary> Do not audit attempts to send and receive ftp_data_client packets. </summary> @@ -27636,7 +27720,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27935"> +<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27953"> <summary> Relabel packets to ftp_data_client the packet type. </summary> @@ -27646,7 +27730,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_data_server_packets" lineno="27955"> +<interface name="corenet_send_ftp_data_server_packets" lineno="27973"> <summary> Send ftp_data_server packets. </summary> @@ -27657,7 +27741,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27974"> +<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27992"> <summary> Do not audit attempts to send ftp_data_server packets. </summary> @@ -27668,7 +27752,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_data_server_packets" lineno="27993"> +<interface name="corenet_receive_ftp_data_server_packets" lineno="28011"> <summary> Receive ftp_data_server packets. </summary> @@ -27679,7 +27763,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28012"> +<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28030"> <summary> Do not audit attempts to receive ftp_data_server packets. </summary> @@ -27690,7 +27774,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28031"> +<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28049"> <summary> Send and receive ftp_data_server packets. </summary> @@ -27701,7 +27785,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28047"> +<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28065"> <summary> Do not audit attempts to send and receive ftp_data_server packets. </summary> @@ -27712,7 +27796,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28062"> +<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28080"> <summary> Relabel packets to ftp_data_server the packet type. </summary> @@ -27722,7 +27806,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28084"> +<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28102"> <summary> Send and receive TCP traffic on the gatekeeper port. </summary> @@ -27733,7 +27817,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_gatekeeper_port" lineno="28099"> +<interface name="corenet_udp_send_gatekeeper_port" lineno="28117"> <summary> Send UDP traffic on the gatekeeper port. </summary> @@ -27744,7 +27828,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28114"> +<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28132"> <summary> Do not audit attempts to send UDP traffic on the gatekeeper port. </summary> @@ -27755,7 +27839,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gatekeeper_port" lineno="28129"> +<interface name="corenet_udp_receive_gatekeeper_port" lineno="28147"> <summary> Receive UDP traffic on the gatekeeper port. </summary> @@ -27766,7 +27850,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28144"> +<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28162"> <summary> Do not audit attempts to receive UDP traffic on the gatekeeper port. </summary> @@ -27777,7 +27861,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28159"> +<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28177"> <summary> Send and receive UDP traffic on the gatekeeper port. </summary> @@ -27788,7 +27872,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28175"> +<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28193"> <summary> Do not audit attempts to send and receive UDP traffic on the gatekeeper port. @@ -27800,7 +27884,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28190"> +<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28208"> <summary> Bind TCP sockets to the gatekeeper port. </summary> @@ -27811,7 +27895,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gatekeeper_port" lineno="28210"> +<interface name="corenet_udp_bind_gatekeeper_port" lineno="28228"> <summary> Bind UDP sockets to the gatekeeper port. </summary> @@ -27822,7 +27906,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28229"> +<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28247"> <summary> Make a TCP connection to the gatekeeper port. </summary> @@ -27832,7 +27916,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gatekeeper_client_packets" lineno="28249"> +<interface name="corenet_send_gatekeeper_client_packets" lineno="28267"> <summary> Send gatekeeper_client packets. </summary> @@ -27843,7 +27927,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28268"> +<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28286"> <summary> Do not audit attempts to send gatekeeper_client packets. </summary> @@ -27854,7 +27938,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gatekeeper_client_packets" lineno="28287"> +<interface name="corenet_receive_gatekeeper_client_packets" lineno="28305"> <summary> Receive gatekeeper_client packets. </summary> @@ -27865,7 +27949,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28306"> +<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28324"> <summary> Do not audit attempts to receive gatekeeper_client packets. </summary> @@ -27876,7 +27960,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28325"> +<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28343"> <summary> Send and receive gatekeeper_client packets. </summary> @@ -27887,7 +27971,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28341"> +<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28359"> <summary> Do not audit attempts to send and receive gatekeeper_client packets. </summary> @@ -27898,7 +27982,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28356"> +<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28374"> <summary> Relabel packets to gatekeeper_client the packet type. </summary> @@ -27908,7 +27992,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gatekeeper_server_packets" lineno="28376"> +<interface name="corenet_send_gatekeeper_server_packets" lineno="28394"> <summary> Send gatekeeper_server packets. </summary> @@ -27919,7 +28003,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28395"> +<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28413"> <summary> Do not audit attempts to send gatekeeper_server packets. </summary> @@ -27930,7 +28014,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gatekeeper_server_packets" lineno="28414"> +<interface name="corenet_receive_gatekeeper_server_packets" lineno="28432"> <summary> Receive gatekeeper_server packets. </summary> @@ -27941,7 +28025,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28433"> +<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28451"> <summary> Do not audit attempts to receive gatekeeper_server packets. </summary> @@ -27952,7 +28036,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28452"> +<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28470"> <summary> Send and receive gatekeeper_server packets. </summary> @@ -27963,7 +28047,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28468"> +<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28486"> <summary> Do not audit attempts to send and receive gatekeeper_server packets. </summary> @@ -27974,7 +28058,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28483"> +<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28501"> <summary> Relabel packets to gatekeeper_server the packet type. </summary> @@ -27984,7 +28068,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28505"> +<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28523"> <summary> Send and receive TCP traffic on the gdomap port. </summary> @@ -27995,7 +28079,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_gdomap_port" lineno="28520"> +<interface name="corenet_udp_send_gdomap_port" lineno="28538"> <summary> Send UDP traffic on the gdomap port. </summary> @@ -28006,7 +28090,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28535"> +<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28553"> <summary> Do not audit attempts to send UDP traffic on the gdomap port. </summary> @@ -28017,7 +28101,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gdomap_port" lineno="28550"> +<interface name="corenet_udp_receive_gdomap_port" lineno="28568"> <summary> Receive UDP traffic on the gdomap port. </summary> @@ -28028,7 +28112,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28565"> +<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28583"> <summary> Do not audit attempts to receive UDP traffic on the gdomap port. </summary> @@ -28039,7 +28123,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28580"> +<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28598"> <summary> Send and receive UDP traffic on the gdomap port. </summary> @@ -28050,7 +28134,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28596"> +<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28614"> <summary> Do not audit attempts to send and receive UDP traffic on the gdomap port. @@ -28062,7 +28146,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gdomap_port" lineno="28611"> +<interface name="corenet_tcp_bind_gdomap_port" lineno="28629"> <summary> Bind TCP sockets to the gdomap port. </summary> @@ -28073,7 +28157,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gdomap_port" lineno="28631"> +<interface name="corenet_udp_bind_gdomap_port" lineno="28649"> <summary> Bind UDP sockets to the gdomap port. </summary> @@ -28084,7 +28168,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gdomap_port" lineno="28650"> +<interface name="corenet_tcp_connect_gdomap_port" lineno="28668"> <summary> Make a TCP connection to the gdomap port. </summary> @@ -28094,7 +28178,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gdomap_client_packets" lineno="28670"> +<interface name="corenet_send_gdomap_client_packets" lineno="28688"> <summary> Send gdomap_client packets. </summary> @@ -28105,7 +28189,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28689"> +<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28707"> <summary> Do not audit attempts to send gdomap_client packets. </summary> @@ -28116,7 +28200,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gdomap_client_packets" lineno="28708"> +<interface name="corenet_receive_gdomap_client_packets" lineno="28726"> <summary> Receive gdomap_client packets. </summary> @@ -28127,7 +28211,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28727"> +<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28745"> <summary> Do not audit attempts to receive gdomap_client packets. </summary> @@ -28138,7 +28222,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28746"> +<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28764"> <summary> Send and receive gdomap_client packets. </summary> @@ -28149,7 +28233,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28762"> +<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28780"> <summary> Do not audit attempts to send and receive gdomap_client packets. </summary> @@ -28160,7 +28244,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gdomap_client_packets" lineno="28777"> +<interface name="corenet_relabelto_gdomap_client_packets" lineno="28795"> <summary> Relabel packets to gdomap_client the packet type. </summary> @@ -28170,7 +28254,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gdomap_server_packets" lineno="28797"> +<interface name="corenet_send_gdomap_server_packets" lineno="28815"> <summary> Send gdomap_server packets. </summary> @@ -28181,7 +28265,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28816"> +<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28834"> <summary> Do not audit attempts to send gdomap_server packets. </summary> @@ -28192,7 +28276,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gdomap_server_packets" lineno="28835"> +<interface name="corenet_receive_gdomap_server_packets" lineno="28853"> <summary> Receive gdomap_server packets. </summary> @@ -28203,7 +28287,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28854"> +<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28872"> <summary> Do not audit attempts to receive gdomap_server packets. </summary> @@ -28214,7 +28298,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28873"> +<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28891"> <summary> Send and receive gdomap_server packets. </summary> @@ -28225,7 +28309,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28889"> +<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28907"> <summary> Do not audit attempts to send and receive gdomap_server packets. </summary> @@ -28236,7 +28320,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gdomap_server_packets" lineno="28904"> +<interface name="corenet_relabelto_gdomap_server_packets" lineno="28922"> <summary> Relabel packets to gdomap_server the packet type. </summary> @@ -28246,7 +28330,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28926"> +<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28944"> <summary> Send and receive TCP traffic on the gds_db port. </summary> @@ -28257,7 +28341,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_gds_db_port" lineno="28941"> +<interface name="corenet_udp_send_gds_db_port" lineno="28959"> <summary> Send UDP traffic on the gds_db port. </summary> @@ -28268,7 +28352,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28956"> +<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28974"> <summary> Do not audit attempts to send UDP traffic on the gds_db port. </summary> @@ -28279,7 +28363,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gds_db_port" lineno="28971"> +<interface name="corenet_udp_receive_gds_db_port" lineno="28989"> <summary> Receive UDP traffic on the gds_db port. </summary> @@ -28290,7 +28374,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28986"> +<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="29004"> <summary> Do not audit attempts to receive UDP traffic on the gds_db port. </summary> @@ -28301,7 +28385,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29001"> +<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29019"> <summary> Send and receive UDP traffic on the gds_db port. </summary> @@ -28312,7 +28396,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29017"> +<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29035"> <summary> Do not audit attempts to send and receive UDP traffic on the gds_db port. @@ -28324,7 +28408,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gds_db_port" lineno="29032"> +<interface name="corenet_tcp_bind_gds_db_port" lineno="29050"> <summary> Bind TCP sockets to the gds_db port. </summary> @@ -28335,7 +28419,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gds_db_port" lineno="29052"> +<interface name="corenet_udp_bind_gds_db_port" lineno="29070"> <summary> Bind UDP sockets to the gds_db port. </summary> @@ -28346,7 +28430,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gds_db_port" lineno="29071"> +<interface name="corenet_tcp_connect_gds_db_port" lineno="29089"> <summary> Make a TCP connection to the gds_db port. </summary> @@ -28356,7 +28440,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gds_db_client_packets" lineno="29091"> +<interface name="corenet_send_gds_db_client_packets" lineno="29109"> <summary> Send gds_db_client packets. </summary> @@ -28367,7 +28451,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29110"> +<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29128"> <summary> Do not audit attempts to send gds_db_client packets. </summary> @@ -28378,7 +28462,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gds_db_client_packets" lineno="29129"> +<interface name="corenet_receive_gds_db_client_packets" lineno="29147"> <summary> Receive gds_db_client packets. </summary> @@ -28389,7 +28473,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29148"> +<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29166"> <summary> Do not audit attempts to receive gds_db_client packets. </summary> @@ -28400,7 +28484,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29167"> +<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29185"> <summary> Send and receive gds_db_client packets. </summary> @@ -28411,7 +28495,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29183"> +<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29201"> <summary> Do not audit attempts to send and receive gds_db_client packets. </summary> @@ -28422,7 +28506,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gds_db_client_packets" lineno="29198"> +<interface name="corenet_relabelto_gds_db_client_packets" lineno="29216"> <summary> Relabel packets to gds_db_client the packet type. </summary> @@ -28432,7 +28516,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gds_db_server_packets" lineno="29218"> +<interface name="corenet_send_gds_db_server_packets" lineno="29236"> <summary> Send gds_db_server packets. </summary> @@ -28443,7 +28527,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29237"> +<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29255"> <summary> Do not audit attempts to send gds_db_server packets. </summary> @@ -28454,7 +28538,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gds_db_server_packets" lineno="29256"> +<interface name="corenet_receive_gds_db_server_packets" lineno="29274"> <summary> Receive gds_db_server packets. </summary> @@ -28465,7 +28549,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29275"> +<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29293"> <summary> Do not audit attempts to receive gds_db_server packets. </summary> @@ -28476,7 +28560,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29294"> +<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29312"> <summary> Send and receive gds_db_server packets. </summary> @@ -28487,7 +28571,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29310"> +<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29328"> <summary> Do not audit attempts to send and receive gds_db_server packets. </summary> @@ -28498,7 +28582,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gds_db_server_packets" lineno="29325"> +<interface name="corenet_relabelto_gds_db_server_packets" lineno="29343"> <summary> Relabel packets to gds_db_server the packet type. </summary> @@ -28508,7 +28592,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_git_port" lineno="29347"> +<interface name="corenet_tcp_sendrecv_git_port" lineno="29365"> <summary> Send and receive TCP traffic on the git port. </summary> @@ -28519,7 +28603,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_git_port" lineno="29362"> +<interface name="corenet_udp_send_git_port" lineno="29380"> <summary> Send UDP traffic on the git port. </summary> @@ -28530,7 +28614,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_git_port" lineno="29377"> +<interface name="corenet_dontaudit_udp_send_git_port" lineno="29395"> <summary> Do not audit attempts to send UDP traffic on the git port. </summary> @@ -28541,7 +28625,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_git_port" lineno="29392"> +<interface name="corenet_udp_receive_git_port" lineno="29410"> <summary> Receive UDP traffic on the git port. </summary> @@ -28552,7 +28636,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29407"> +<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29425"> <summary> Do not audit attempts to receive UDP traffic on the git port. </summary> @@ -28563,7 +28647,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_git_port" lineno="29422"> +<interface name="corenet_udp_sendrecv_git_port" lineno="29440"> <summary> Send and receive UDP traffic on the git port. </summary> @@ -28574,7 +28658,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29438"> +<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29456"> <summary> Do not audit attempts to send and receive UDP traffic on the git port. @@ -28586,7 +28670,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_git_port" lineno="29453"> +<interface name="corenet_tcp_bind_git_port" lineno="29471"> <summary> Bind TCP sockets to the git port. </summary> @@ -28597,7 +28681,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_git_port" lineno="29473"> +<interface name="corenet_udp_bind_git_port" lineno="29491"> <summary> Bind UDP sockets to the git port. </summary> @@ -28608,7 +28692,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_git_port" lineno="29492"> +<interface name="corenet_tcp_connect_git_port" lineno="29510"> <summary> Make a TCP connection to the git port. </summary> @@ -28618,7 +28702,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_git_client_packets" lineno="29512"> +<interface name="corenet_send_git_client_packets" lineno="29530"> <summary> Send git_client packets. </summary> @@ -28629,7 +28713,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_git_client_packets" lineno="29531"> +<interface name="corenet_dontaudit_send_git_client_packets" lineno="29549"> <summary> Do not audit attempts to send git_client packets. </summary> @@ -28640,7 +28724,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_git_client_packets" lineno="29550"> +<interface name="corenet_receive_git_client_packets" lineno="29568"> <summary> Receive git_client packets. </summary> @@ -28651,7 +28735,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29569"> +<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29587"> <summary> Do not audit attempts to receive git_client packets. </summary> @@ -28662,7 +28746,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_git_client_packets" lineno="29588"> +<interface name="corenet_sendrecv_git_client_packets" lineno="29606"> <summary> Send and receive git_client packets. </summary> @@ -28673,7 +28757,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29604"> +<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29622"> <summary> Do not audit attempts to send and receive git_client packets. </summary> @@ -28684,7 +28768,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_git_client_packets" lineno="29619"> +<interface name="corenet_relabelto_git_client_packets" lineno="29637"> <summary> Relabel packets to git_client the packet type. </summary> @@ -28694,7 +28778,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_git_server_packets" lineno="29639"> +<interface name="corenet_send_git_server_packets" lineno="29657"> <summary> Send git_server packets. </summary> @@ -28705,7 +28789,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_git_server_packets" lineno="29658"> +<interface name="corenet_dontaudit_send_git_server_packets" lineno="29676"> <summary> Do not audit attempts to send git_server packets. </summary> @@ -28716,7 +28800,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_git_server_packets" lineno="29677"> +<interface name="corenet_receive_git_server_packets" lineno="29695"> <summary> Receive git_server packets. </summary> @@ -28727,7 +28811,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29696"> +<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29714"> <summary> Do not audit attempts to receive git_server packets. </summary> @@ -28738,7 +28822,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_git_server_packets" lineno="29715"> +<interface name="corenet_sendrecv_git_server_packets" lineno="29733"> <summary> Send and receive git_server packets. </summary> @@ -28749,7 +28833,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29731"> +<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29749"> <summary> Do not audit attempts to send and receive git_server packets. </summary> @@ -28760,7 +28844,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_git_server_packets" lineno="29746"> +<interface name="corenet_relabelto_git_server_packets" lineno="29764"> <summary> Relabel packets to git_server the packet type. </summary> @@ -28770,7 +28854,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29768"> +<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29786"> <summary> Send and receive TCP traffic on the glance_registry port. </summary> @@ -28781,7 +28865,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_glance_registry_port" lineno="29783"> +<interface name="corenet_udp_send_glance_registry_port" lineno="29801"> <summary> Send UDP traffic on the glance_registry port. </summary> @@ -28792,7 +28876,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29798"> +<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29816"> <summary> Do not audit attempts to send UDP traffic on the glance_registry port. </summary> @@ -28803,7 +28887,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_glance_registry_port" lineno="29813"> +<interface name="corenet_udp_receive_glance_registry_port" lineno="29831"> <summary> Receive UDP traffic on the glance_registry port. </summary> @@ -28814,7 +28898,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29828"> +<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29846"> <summary> Do not audit attempts to receive UDP traffic on the glance_registry port. </summary> @@ -28825,7 +28909,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29843"> +<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29861"> <summary> Send and receive UDP traffic on the glance_registry port. </summary> @@ -28836,7 +28920,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29859"> +<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29877"> <summary> Do not audit attempts to send and receive UDP traffic on the glance_registry port. @@ -28848,7 +28932,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_glance_registry_port" lineno="29874"> +<interface name="corenet_tcp_bind_glance_registry_port" lineno="29892"> <summary> Bind TCP sockets to the glance_registry port. </summary> @@ -28859,7 +28943,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_glance_registry_port" lineno="29894"> +<interface name="corenet_udp_bind_glance_registry_port" lineno="29912"> <summary> Bind UDP sockets to the glance_registry port. </summary> @@ -28870,7 +28954,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_glance_registry_port" lineno="29913"> +<interface name="corenet_tcp_connect_glance_registry_port" lineno="29931"> <summary> Make a TCP connection to the glance_registry port. </summary> @@ -28880,7 +28964,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_glance_registry_client_packets" lineno="29933"> +<interface name="corenet_send_glance_registry_client_packets" lineno="29951"> <summary> Send glance_registry_client packets. </summary> @@ -28891,7 +28975,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29952"> +<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29970"> <summary> Do not audit attempts to send glance_registry_client packets. </summary> @@ -28902,7 +28986,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_glance_registry_client_packets" lineno="29971"> +<interface name="corenet_receive_glance_registry_client_packets" lineno="29989"> <summary> Receive glance_registry_client packets. </summary> @@ -28913,7 +28997,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29990"> +<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="30008"> <summary> Do not audit attempts to receive glance_registry_client packets. </summary> @@ -28924,7 +29008,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30009"> +<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30027"> <summary> Send and receive glance_registry_client packets. </summary> @@ -28935,7 +29019,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30025"> +<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30043"> <summary> Do not audit attempts to send and receive glance_registry_client packets. </summary> @@ -28946,7 +29030,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30040"> +<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30058"> <summary> Relabel packets to glance_registry_client the packet type. </summary> @@ -28956,7 +29040,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_glance_registry_server_packets" lineno="30060"> +<interface name="corenet_send_glance_registry_server_packets" lineno="30078"> <summary> Send glance_registry_server packets. </summary> @@ -28967,7 +29051,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30079"> +<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30097"> <summary> Do not audit attempts to send glance_registry_server packets. </summary> @@ -28978,7 +29062,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_glance_registry_server_packets" lineno="30098"> +<interface name="corenet_receive_glance_registry_server_packets" lineno="30116"> <summary> Receive glance_registry_server packets. </summary> @@ -28989,7 +29073,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30117"> +<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30135"> <summary> Do not audit attempts to receive glance_registry_server packets. </summary> @@ -29000,7 +29084,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30136"> +<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30154"> <summary> Send and receive glance_registry_server packets. </summary> @@ -29011,7 +29095,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30152"> +<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30170"> <summary> Do not audit attempts to send and receive glance_registry_server packets. </summary> @@ -29022,7 +29106,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30167"> +<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30185"> <summary> Relabel packets to glance_registry_server the packet type. </summary> @@ -29032,7 +29116,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30189"> +<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30207"> <summary> Send and receive TCP traffic on the gopher port. </summary> @@ -29043,7 +29127,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_gopher_port" lineno="30204"> +<interface name="corenet_udp_send_gopher_port" lineno="30222"> <summary> Send UDP traffic on the gopher port. </summary> @@ -29054,7 +29138,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30219"> +<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30237"> <summary> Do not audit attempts to send UDP traffic on the gopher port. </summary> @@ -29065,7 +29149,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gopher_port" lineno="30234"> +<interface name="corenet_udp_receive_gopher_port" lineno="30252"> <summary> Receive UDP traffic on the gopher port. </summary> @@ -29076,7 +29160,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30249"> +<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30267"> <summary> Do not audit attempts to receive UDP traffic on the gopher port. </summary> @@ -29087,7 +29171,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gopher_port" lineno="30264"> +<interface name="corenet_udp_sendrecv_gopher_port" lineno="30282"> <summary> Send and receive UDP traffic on the gopher port. </summary> @@ -29098,7 +29182,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30280"> +<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30298"> <summary> Do not audit attempts to send and receive UDP traffic on the gopher port. @@ -29110,7 +29194,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gopher_port" lineno="30295"> +<interface name="corenet_tcp_bind_gopher_port" lineno="30313"> <summary> Bind TCP sockets to the gopher port. </summary> @@ -29121,7 +29205,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gopher_port" lineno="30315"> +<interface name="corenet_udp_bind_gopher_port" lineno="30333"> <summary> Bind UDP sockets to the gopher port. </summary> @@ -29132,7 +29216,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gopher_port" lineno="30334"> +<interface name="corenet_tcp_connect_gopher_port" lineno="30352"> <summary> Make a TCP connection to the gopher port. </summary> @@ -29142,7 +29226,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gopher_client_packets" lineno="30354"> +<interface name="corenet_send_gopher_client_packets" lineno="30372"> <summary> Send gopher_client packets. </summary> @@ -29153,7 +29237,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30373"> +<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30391"> <summary> Do not audit attempts to send gopher_client packets. </summary> @@ -29164,7 +29248,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gopher_client_packets" lineno="30392"> +<interface name="corenet_receive_gopher_client_packets" lineno="30410"> <summary> Receive gopher_client packets. </summary> @@ -29175,7 +29259,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30411"> +<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30429"> <summary> Do not audit attempts to receive gopher_client packets. </summary> @@ -29186,7 +29270,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gopher_client_packets" lineno="30430"> +<interface name="corenet_sendrecv_gopher_client_packets" lineno="30448"> <summary> Send and receive gopher_client packets. </summary> @@ -29197,7 +29281,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30446"> +<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30464"> <summary> Do not audit attempts to send and receive gopher_client packets. </summary> @@ -29208,7 +29292,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gopher_client_packets" lineno="30461"> +<interface name="corenet_relabelto_gopher_client_packets" lineno="30479"> <summary> Relabel packets to gopher_client the packet type. </summary> @@ -29218,7 +29302,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gopher_server_packets" lineno="30481"> +<interface name="corenet_send_gopher_server_packets" lineno="30499"> <summary> Send gopher_server packets. </summary> @@ -29229,7 +29313,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30500"> +<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30518"> <summary> Do not audit attempts to send gopher_server packets. </summary> @@ -29240,7 +29324,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gopher_server_packets" lineno="30519"> +<interface name="corenet_receive_gopher_server_packets" lineno="30537"> <summary> Receive gopher_server packets. </summary> @@ -29251,7 +29335,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30538"> +<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30556"> <summary> Do not audit attempts to receive gopher_server packets. </summary> @@ -29262,7 +29346,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gopher_server_packets" lineno="30557"> +<interface name="corenet_sendrecv_gopher_server_packets" lineno="30575"> <summary> Send and receive gopher_server packets. </summary> @@ -29273,7 +29357,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30573"> +<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30591"> <summary> Do not audit attempts to send and receive gopher_server packets. </summary> @@ -29284,7 +29368,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gopher_server_packets" lineno="30588"> +<interface name="corenet_relabelto_gopher_server_packets" lineno="30606"> <summary> Relabel packets to gopher_server the packet type. </summary> @@ -29294,7 +29378,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30610"> +<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30628"> <summary> Send and receive TCP traffic on the gpsd port. </summary> @@ -29305,7 +29389,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_gpsd_port" lineno="30625"> +<interface name="corenet_udp_send_gpsd_port" lineno="30643"> <summary> Send UDP traffic on the gpsd port. </summary> @@ -29316,7 +29400,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30640"> +<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30658"> <summary> Do not audit attempts to send UDP traffic on the gpsd port. </summary> @@ -29327,7 +29411,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gpsd_port" lineno="30655"> +<interface name="corenet_udp_receive_gpsd_port" lineno="30673"> <summary> Receive UDP traffic on the gpsd port. </summary> @@ -29338,7 +29422,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30670"> +<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30688"> <summary> Do not audit attempts to receive UDP traffic on the gpsd port. </summary> @@ -29349,7 +29433,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30685"> +<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30703"> <summary> Send and receive UDP traffic on the gpsd port. </summary> @@ -29360,7 +29444,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30701"> +<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30719"> <summary> Do not audit attempts to send and receive UDP traffic on the gpsd port. @@ -29372,7 +29456,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gpsd_port" lineno="30716"> +<interface name="corenet_tcp_bind_gpsd_port" lineno="30734"> <summary> Bind TCP sockets to the gpsd port. </summary> @@ -29383,7 +29467,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gpsd_port" lineno="30736"> +<interface name="corenet_udp_bind_gpsd_port" lineno="30754"> <summary> Bind UDP sockets to the gpsd port. </summary> @@ -29394,7 +29478,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gpsd_port" lineno="30755"> +<interface name="corenet_tcp_connect_gpsd_port" lineno="30773"> <summary> Make a TCP connection to the gpsd port. </summary> @@ -29404,7 +29488,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gpsd_client_packets" lineno="30775"> +<interface name="corenet_send_gpsd_client_packets" lineno="30793"> <summary> Send gpsd_client packets. </summary> @@ -29415,7 +29499,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30794"> +<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30812"> <summary> Do not audit attempts to send gpsd_client packets. </summary> @@ -29426,7 +29510,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gpsd_client_packets" lineno="30813"> +<interface name="corenet_receive_gpsd_client_packets" lineno="30831"> <summary> Receive gpsd_client packets. </summary> @@ -29437,7 +29521,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30832"> +<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30850"> <summary> Do not audit attempts to receive gpsd_client packets. </summary> @@ -29448,7 +29532,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30851"> +<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30869"> <summary> Send and receive gpsd_client packets. </summary> @@ -29459,7 +29543,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30867"> +<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30885"> <summary> Do not audit attempts to send and receive gpsd_client packets. </summary> @@ -29470,7 +29554,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gpsd_client_packets" lineno="30882"> +<interface name="corenet_relabelto_gpsd_client_packets" lineno="30900"> <summary> Relabel packets to gpsd_client the packet type. </summary> @@ -29480,7 +29564,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gpsd_server_packets" lineno="30902"> +<interface name="corenet_send_gpsd_server_packets" lineno="30920"> <summary> Send gpsd_server packets. </summary> @@ -29491,7 +29575,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30921"> +<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30939"> <summary> Do not audit attempts to send gpsd_server packets. </summary> @@ -29502,7 +29586,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gpsd_server_packets" lineno="30940"> +<interface name="corenet_receive_gpsd_server_packets" lineno="30958"> <summary> Receive gpsd_server packets. </summary> @@ -29513,7 +29597,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30959"> +<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30977"> <summary> Do not audit attempts to receive gpsd_server packets. </summary> @@ -29524,7 +29608,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30978"> +<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30996"> <summary> Send and receive gpsd_server packets. </summary> @@ -29535,7 +29619,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30994"> +<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="31012"> <summary> Do not audit attempts to send and receive gpsd_server packets. </summary> @@ -29546,7 +29630,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gpsd_server_packets" lineno="31009"> +<interface name="corenet_relabelto_gpsd_server_packets" lineno="31027"> <summary> Relabel packets to gpsd_server the packet type. </summary> @@ -29556,7 +29640,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31031"> +<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31049"> <summary> Send and receive TCP traffic on the hadoop_datanode port. </summary> @@ -29567,7 +29651,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31046"> +<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31064"> <summary> Send UDP traffic on the hadoop_datanode port. </summary> @@ -29578,7 +29662,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31061"> +<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31079"> <summary> Do not audit attempts to send UDP traffic on the hadoop_datanode port. </summary> @@ -29589,7 +29673,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31076"> +<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31094"> <summary> Receive UDP traffic on the hadoop_datanode port. </summary> @@ -29600,7 +29684,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31091"> +<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31109"> <summary> Do not audit attempts to receive UDP traffic on the hadoop_datanode port. </summary> @@ -29611,7 +29695,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31106"> +<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31124"> <summary> Send and receive UDP traffic on the hadoop_datanode port. </summary> @@ -29622,7 +29706,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31122"> +<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31140"> <summary> Do not audit attempts to send and receive UDP traffic on the hadoop_datanode port. @@ -29634,7 +29718,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31137"> +<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31155"> <summary> Bind TCP sockets to the hadoop_datanode port. </summary> @@ -29645,7 +29729,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31157"> +<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31175"> <summary> Bind UDP sockets to the hadoop_datanode port. </summary> @@ -29656,7 +29740,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31176"> +<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31194"> <summary> Make a TCP connection to the hadoop_datanode port. </summary> @@ -29666,7 +29750,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31196"> +<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31214"> <summary> Send hadoop_datanode_client packets. </summary> @@ -29677,7 +29761,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31215"> +<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31233"> <summary> Do not audit attempts to send hadoop_datanode_client packets. </summary> @@ -29688,7 +29772,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31234"> +<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31252"> <summary> Receive hadoop_datanode_client packets. </summary> @@ -29699,7 +29783,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31253"> +<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31271"> <summary> Do not audit attempts to receive hadoop_datanode_client packets. </summary> @@ -29710,7 +29794,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31272"> +<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31290"> <summary> Send and receive hadoop_datanode_client packets. </summary> @@ -29721,7 +29805,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31288"> +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31306"> <summary> Do not audit attempts to send and receive hadoop_datanode_client packets. </summary> @@ -29732,7 +29816,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31303"> +<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31321"> <summary> Relabel packets to hadoop_datanode_client the packet type. </summary> @@ -29742,7 +29826,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31323"> +<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31341"> <summary> Send hadoop_datanode_server packets. </summary> @@ -29753,7 +29837,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31342"> +<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31360"> <summary> Do not audit attempts to send hadoop_datanode_server packets. </summary> @@ -29764,7 +29848,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31361"> +<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31379"> <summary> Receive hadoop_datanode_server packets. </summary> @@ -29775,7 +29859,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31380"> +<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31398"> <summary> Do not audit attempts to receive hadoop_datanode_server packets. </summary> @@ -29786,7 +29870,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31399"> +<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31417"> <summary> Send and receive hadoop_datanode_server packets. </summary> @@ -29797,7 +29881,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31415"> +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31433"> <summary> Do not audit attempts to send and receive hadoop_datanode_server packets. </summary> @@ -29808,7 +29892,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31430"> +<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31448"> <summary> Relabel packets to hadoop_datanode_server the packet type. </summary> @@ -29818,7 +29902,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31452"> +<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31470"> <summary> Send and receive TCP traffic on the hadoop_namenode port. </summary> @@ -29829,7 +29913,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31467"> +<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31485"> <summary> Send UDP traffic on the hadoop_namenode port. </summary> @@ -29840,7 +29924,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31482"> +<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31500"> <summary> Do not audit attempts to send UDP traffic on the hadoop_namenode port. </summary> @@ -29851,7 +29935,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31497"> +<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31515"> <summary> Receive UDP traffic on the hadoop_namenode port. </summary> @@ -29862,7 +29946,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31512"> +<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31530"> <summary> Do not audit attempts to receive UDP traffic on the hadoop_namenode port. </summary> @@ -29873,7 +29957,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31527"> +<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31545"> <summary> Send and receive UDP traffic on the hadoop_namenode port. </summary> @@ -29884,7 +29968,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31543"> +<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31561"> <summary> Do not audit attempts to send and receive UDP traffic on the hadoop_namenode port. @@ -29896,7 +29980,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31558"> +<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31576"> <summary> Bind TCP sockets to the hadoop_namenode port. </summary> @@ -29907,7 +29991,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31578"> +<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31596"> <summary> Bind UDP sockets to the hadoop_namenode port. </summary> @@ -29918,7 +30002,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31597"> +<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31615"> <summary> Make a TCP connection to the hadoop_namenode port. </summary> @@ -29928,7 +30012,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31617"> +<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31635"> <summary> Send hadoop_namenode_client packets. </summary> @@ -29939,7 +30023,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31636"> +<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31654"> <summary> Do not audit attempts to send hadoop_namenode_client packets. </summary> @@ -29950,7 +30034,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31655"> +<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31673"> <summary> Receive hadoop_namenode_client packets. </summary> @@ -29961,7 +30045,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31674"> +<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31692"> <summary> Do not audit attempts to receive hadoop_namenode_client packets. </summary> @@ -29972,7 +30056,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31693"> +<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31711"> <summary> Send and receive hadoop_namenode_client packets. </summary> @@ -29983,7 +30067,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31709"> +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31727"> <summary> Do not audit attempts to send and receive hadoop_namenode_client packets. </summary> @@ -29994,7 +30078,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31724"> +<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31742"> <summary> Relabel packets to hadoop_namenode_client the packet type. </summary> @@ -30004,7 +30088,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31744"> +<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31762"> <summary> Send hadoop_namenode_server packets. </summary> @@ -30015,7 +30099,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31763"> +<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31781"> <summary> Do not audit attempts to send hadoop_namenode_server packets. </summary> @@ -30026,7 +30110,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31782"> +<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31800"> <summary> Receive hadoop_namenode_server packets. </summary> @@ -30037,7 +30121,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31801"> +<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31819"> <summary> Do not audit attempts to receive hadoop_namenode_server packets. </summary> @@ -30048,7 +30132,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31820"> +<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31838"> <summary> Send and receive hadoop_namenode_server packets. </summary> @@ -30059,7 +30143,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31836"> +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31854"> <summary> Do not audit attempts to send and receive hadoop_namenode_server packets. </summary> @@ -30070,7 +30154,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31851"> +<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31869"> <summary> Relabel packets to hadoop_namenode_server the packet type. </summary> @@ -30080,7 +30164,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31873"> +<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31891"> <summary> Send and receive TCP traffic on the hddtemp port. </summary> @@ -30091,7 +30175,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_hddtemp_port" lineno="31888"> +<interface name="corenet_udp_send_hddtemp_port" lineno="31906"> <summary> Send UDP traffic on the hddtemp port. </summary> @@ -30102,7 +30186,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31903"> +<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31921"> <summary> Do not audit attempts to send UDP traffic on the hddtemp port. </summary> @@ -30113,7 +30197,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_hddtemp_port" lineno="31918"> +<interface name="corenet_udp_receive_hddtemp_port" lineno="31936"> <summary> Receive UDP traffic on the hddtemp port. </summary> @@ -30124,7 +30208,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31933"> +<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31951"> <summary> Do not audit attempts to receive UDP traffic on the hddtemp port. </summary> @@ -30135,7 +30219,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31948"> +<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31966"> <summary> Send and receive UDP traffic on the hddtemp port. </summary> @@ -30146,7 +30230,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31964"> +<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31982"> <summary> Do not audit attempts to send and receive UDP traffic on the hddtemp port. @@ -30158,7 +30242,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_hddtemp_port" lineno="31979"> +<interface name="corenet_tcp_bind_hddtemp_port" lineno="31997"> <summary> Bind TCP sockets to the hddtemp port. </summary> @@ -30169,7 +30253,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hddtemp_port" lineno="31999"> +<interface name="corenet_udp_bind_hddtemp_port" lineno="32017"> <summary> Bind UDP sockets to the hddtemp port. </summary> @@ -30180,7 +30264,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hddtemp_port" lineno="32018"> +<interface name="corenet_tcp_connect_hddtemp_port" lineno="32036"> <summary> Make a TCP connection to the hddtemp port. </summary> @@ -30190,7 +30274,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hddtemp_client_packets" lineno="32038"> +<interface name="corenet_send_hddtemp_client_packets" lineno="32056"> <summary> Send hddtemp_client packets. </summary> @@ -30201,7 +30285,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32057"> +<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32075"> <summary> Do not audit attempts to send hddtemp_client packets. </summary> @@ -30212,7 +30296,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hddtemp_client_packets" lineno="32076"> +<interface name="corenet_receive_hddtemp_client_packets" lineno="32094"> <summary> Receive hddtemp_client packets. </summary> @@ -30223,7 +30307,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32095"> +<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32113"> <summary> Do not audit attempts to receive hddtemp_client packets. </summary> @@ -30234,7 +30318,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32114"> +<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32132"> <summary> Send and receive hddtemp_client packets. </summary> @@ -30245,7 +30329,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32130"> +<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32148"> <summary> Do not audit attempts to send and receive hddtemp_client packets. </summary> @@ -30256,7 +30340,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32145"> +<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32163"> <summary> Relabel packets to hddtemp_client the packet type. </summary> @@ -30266,7 +30350,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hddtemp_server_packets" lineno="32165"> +<interface name="corenet_send_hddtemp_server_packets" lineno="32183"> <summary> Send hddtemp_server packets. </summary> @@ -30277,7 +30361,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32184"> +<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32202"> <summary> Do not audit attempts to send hddtemp_server packets. </summary> @@ -30288,7 +30372,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hddtemp_server_packets" lineno="32203"> +<interface name="corenet_receive_hddtemp_server_packets" lineno="32221"> <summary> Receive hddtemp_server packets. </summary> @@ -30299,7 +30383,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32222"> +<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32240"> <summary> Do not audit attempts to receive hddtemp_server packets. </summary> @@ -30310,7 +30394,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32241"> +<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32259"> <summary> Send and receive hddtemp_server packets. </summary> @@ -30321,7 +30405,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32257"> +<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32275"> <summary> Do not audit attempts to send and receive hddtemp_server packets. </summary> @@ -30332,7 +30416,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32272"> +<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32290"> <summary> Relabel packets to hddtemp_server the packet type. </summary> @@ -30342,7 +30426,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_howl_port" lineno="32294"> +<interface name="corenet_tcp_sendrecv_howl_port" lineno="32312"> <summary> Send and receive TCP traffic on the howl port. </summary> @@ -30353,7 +30437,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_howl_port" lineno="32309"> +<interface name="corenet_udp_send_howl_port" lineno="32327"> <summary> Send UDP traffic on the howl port. </summary> @@ -30364,7 +30448,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32324"> +<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32342"> <summary> Do not audit attempts to send UDP traffic on the howl port. </summary> @@ -30375,7 +30459,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_howl_port" lineno="32339"> +<interface name="corenet_udp_receive_howl_port" lineno="32357"> <summary> Receive UDP traffic on the howl port. </summary> @@ -30386,7 +30470,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32354"> +<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32372"> <summary> Do not audit attempts to receive UDP traffic on the howl port. </summary> @@ -30397,7 +30481,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_howl_port" lineno="32369"> +<interface name="corenet_udp_sendrecv_howl_port" lineno="32387"> <summary> Send and receive UDP traffic on the howl port. </summary> @@ -30408,7 +30492,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32385"> +<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32403"> <summary> Do not audit attempts to send and receive UDP traffic on the howl port. @@ -30420,7 +30504,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_howl_port" lineno="32400"> +<interface name="corenet_tcp_bind_howl_port" lineno="32418"> <summary> Bind TCP sockets to the howl port. </summary> @@ -30431,7 +30515,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_howl_port" lineno="32420"> +<interface name="corenet_udp_bind_howl_port" lineno="32438"> <summary> Bind UDP sockets to the howl port. </summary> @@ -30442,7 +30526,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_howl_port" lineno="32439"> +<interface name="corenet_tcp_connect_howl_port" lineno="32457"> <summary> Make a TCP connection to the howl port. </summary> @@ -30452,7 +30536,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_howl_client_packets" lineno="32459"> +<interface name="corenet_send_howl_client_packets" lineno="32477"> <summary> Send howl_client packets. </summary> @@ -30463,7 +30547,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32478"> +<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32496"> <summary> Do not audit attempts to send howl_client packets. </summary> @@ -30474,7 +30558,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_howl_client_packets" lineno="32497"> +<interface name="corenet_receive_howl_client_packets" lineno="32515"> <summary> Receive howl_client packets. </summary> @@ -30485,7 +30569,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32516"> +<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32534"> <summary> Do not audit attempts to receive howl_client packets. </summary> @@ -30496,7 +30580,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_howl_client_packets" lineno="32535"> +<interface name="corenet_sendrecv_howl_client_packets" lineno="32553"> <summary> Send and receive howl_client packets. </summary> @@ -30507,7 +30591,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32551"> +<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32569"> <summary> Do not audit attempts to send and receive howl_client packets. </summary> @@ -30518,7 +30602,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_howl_client_packets" lineno="32566"> +<interface name="corenet_relabelto_howl_client_packets" lineno="32584"> <summary> Relabel packets to howl_client the packet type. </summary> @@ -30528,7 +30612,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_howl_server_packets" lineno="32586"> +<interface name="corenet_send_howl_server_packets" lineno="32604"> <summary> Send howl_server packets. </summary> @@ -30539,7 +30623,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32605"> +<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32623"> <summary> Do not audit attempts to send howl_server packets. </summary> @@ -30550,7 +30634,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_howl_server_packets" lineno="32624"> +<interface name="corenet_receive_howl_server_packets" lineno="32642"> <summary> Receive howl_server packets. </summary> @@ -30561,7 +30645,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32643"> +<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32661"> <summary> Do not audit attempts to receive howl_server packets. </summary> @@ -30572,7 +30656,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_howl_server_packets" lineno="32662"> +<interface name="corenet_sendrecv_howl_server_packets" lineno="32680"> <summary> Send and receive howl_server packets. </summary> @@ -30583,7 +30667,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32678"> +<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32696"> <summary> Do not audit attempts to send and receive howl_server packets. </summary> @@ -30594,7 +30678,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_howl_server_packets" lineno="32693"> +<interface name="corenet_relabelto_howl_server_packets" lineno="32711"> <summary> Relabel packets to howl_server the packet type. </summary> @@ -30604,7 +30688,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32715"> +<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32733"> <summary> Send and receive TCP traffic on the hplip port. </summary> @@ -30615,7 +30699,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_hplip_port" lineno="32730"> +<interface name="corenet_udp_send_hplip_port" lineno="32748"> <summary> Send UDP traffic on the hplip port. </summary> @@ -30626,7 +30710,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32745"> +<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32763"> <summary> Do not audit attempts to send UDP traffic on the hplip port. </summary> @@ -30637,7 +30721,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_hplip_port" lineno="32760"> +<interface name="corenet_udp_receive_hplip_port" lineno="32778"> <summary> Receive UDP traffic on the hplip port. </summary> @@ -30648,7 +30732,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32775"> +<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32793"> <summary> Do not audit attempts to receive UDP traffic on the hplip port. </summary> @@ -30659,7 +30743,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_hplip_port" lineno="32790"> +<interface name="corenet_udp_sendrecv_hplip_port" lineno="32808"> <summary> Send and receive UDP traffic on the hplip port. </summary> @@ -30670,7 +30754,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32806"> +<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32824"> <summary> Do not audit attempts to send and receive UDP traffic on the hplip port. @@ -30682,7 +30766,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_hplip_port" lineno="32821"> +<interface name="corenet_tcp_bind_hplip_port" lineno="32839"> <summary> Bind TCP sockets to the hplip port. </summary> @@ -30693,7 +30777,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hplip_port" lineno="32841"> +<interface name="corenet_udp_bind_hplip_port" lineno="32859"> <summary> Bind UDP sockets to the hplip port. </summary> @@ -30704,7 +30788,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hplip_port" lineno="32860"> +<interface name="corenet_tcp_connect_hplip_port" lineno="32878"> <summary> Make a TCP connection to the hplip port. </summary> @@ -30714,7 +30798,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hplip_client_packets" lineno="32880"> +<interface name="corenet_send_hplip_client_packets" lineno="32898"> <summary> Send hplip_client packets. </summary> @@ -30725,7 +30809,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32899"> +<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32917"> <summary> Do not audit attempts to send hplip_client packets. </summary> @@ -30736,7 +30820,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hplip_client_packets" lineno="32918"> +<interface name="corenet_receive_hplip_client_packets" lineno="32936"> <summary> Receive hplip_client packets. </summary> @@ -30747,7 +30831,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32937"> +<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32955"> <summary> Do not audit attempts to receive hplip_client packets. </summary> @@ -30758,7 +30842,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hplip_client_packets" lineno="32956"> +<interface name="corenet_sendrecv_hplip_client_packets" lineno="32974"> <summary> Send and receive hplip_client packets. </summary> @@ -30769,7 +30853,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32972"> +<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32990"> <summary> Do not audit attempts to send and receive hplip_client packets. </summary> @@ -30780,7 +30864,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hplip_client_packets" lineno="32987"> +<interface name="corenet_relabelto_hplip_client_packets" lineno="33005"> <summary> Relabel packets to hplip_client the packet type. </summary> @@ -30790,7 +30874,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hplip_server_packets" lineno="33007"> +<interface name="corenet_send_hplip_server_packets" lineno="33025"> <summary> Send hplip_server packets. </summary> @@ -30801,7 +30885,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33026"> +<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33044"> <summary> Do not audit attempts to send hplip_server packets. </summary> @@ -30812,7 +30896,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hplip_server_packets" lineno="33045"> +<interface name="corenet_receive_hplip_server_packets" lineno="33063"> <summary> Receive hplip_server packets. </summary> @@ -30823,7 +30907,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33064"> +<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33082"> <summary> Do not audit attempts to receive hplip_server packets. </summary> @@ -30834,7 +30918,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hplip_server_packets" lineno="33083"> +<interface name="corenet_sendrecv_hplip_server_packets" lineno="33101"> <summary> Send and receive hplip_server packets. </summary> @@ -30845,7 +30929,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33099"> +<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33117"> <summary> Do not audit attempts to send and receive hplip_server packets. </summary> @@ -30856,7 +30940,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hplip_server_packets" lineno="33114"> +<interface name="corenet_relabelto_hplip_server_packets" lineno="33132"> <summary> Relabel packets to hplip_server the packet type. </summary> @@ -30866,7 +30950,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_http_port" lineno="33136"> +<interface name="corenet_tcp_sendrecv_http_port" lineno="33154"> <summary> Send and receive TCP traffic on the http port. </summary> @@ -30877,7 +30961,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_http_port" lineno="33151"> +<interface name="corenet_udp_send_http_port" lineno="33169"> <summary> Send UDP traffic on the http port. </summary> @@ -30888,7 +30972,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_http_port" lineno="33166"> +<interface name="corenet_dontaudit_udp_send_http_port" lineno="33184"> <summary> Do not audit attempts to send UDP traffic on the http port. </summary> @@ -30899,7 +30983,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_http_port" lineno="33181"> +<interface name="corenet_udp_receive_http_port" lineno="33199"> <summary> Receive UDP traffic on the http port. </summary> @@ -30910,7 +30994,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33196"> +<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33214"> <summary> Do not audit attempts to receive UDP traffic on the http port. </summary> @@ -30921,7 +31005,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_http_port" lineno="33211"> +<interface name="corenet_udp_sendrecv_http_port" lineno="33229"> <summary> Send and receive UDP traffic on the http port. </summary> @@ -30932,7 +31016,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33227"> +<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33245"> <summary> Do not audit attempts to send and receive UDP traffic on the http port. @@ -30944,7 +31028,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_http_port" lineno="33242"> +<interface name="corenet_tcp_bind_http_port" lineno="33260"> <summary> Bind TCP sockets to the http port. </summary> @@ -30955,7 +31039,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_http_port" lineno="33262"> +<interface name="corenet_udp_bind_http_port" lineno="33280"> <summary> Bind UDP sockets to the http port. </summary> @@ -30966,7 +31050,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_http_port" lineno="33281"> +<interface name="corenet_tcp_connect_http_port" lineno="33299"> <summary> Make a TCP connection to the http port. </summary> @@ -30976,7 +31060,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_client_packets" lineno="33301"> +<interface name="corenet_send_http_client_packets" lineno="33319"> <summary> Send http_client packets. </summary> @@ -30987,7 +31071,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_client_packets" lineno="33320"> +<interface name="corenet_dontaudit_send_http_client_packets" lineno="33338"> <summary> Do not audit attempts to send http_client packets. </summary> @@ -30998,7 +31082,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_client_packets" lineno="33339"> +<interface name="corenet_receive_http_client_packets" lineno="33357"> <summary> Receive http_client packets. </summary> @@ -31009,7 +31093,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33358"> +<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33376"> <summary> Do not audit attempts to receive http_client packets. </summary> @@ -31020,7 +31104,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_client_packets" lineno="33377"> +<interface name="corenet_sendrecv_http_client_packets" lineno="33395"> <summary> Send and receive http_client packets. </summary> @@ -31031,7 +31115,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33393"> +<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33411"> <summary> Do not audit attempts to send and receive http_client packets. </summary> @@ -31042,7 +31126,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_client_packets" lineno="33408"> +<interface name="corenet_relabelto_http_client_packets" lineno="33426"> <summary> Relabel packets to http_client the packet type. </summary> @@ -31052,7 +31136,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_server_packets" lineno="33428"> +<interface name="corenet_send_http_server_packets" lineno="33446"> <summary> Send http_server packets. </summary> @@ -31063,7 +31147,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_server_packets" lineno="33447"> +<interface name="corenet_dontaudit_send_http_server_packets" lineno="33465"> <summary> Do not audit attempts to send http_server packets. </summary> @@ -31074,7 +31158,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_server_packets" lineno="33466"> +<interface name="corenet_receive_http_server_packets" lineno="33484"> <summary> Receive http_server packets. </summary> @@ -31085,7 +31169,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33485"> +<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33503"> <summary> Do not audit attempts to receive http_server packets. </summary> @@ -31096,7 +31180,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_server_packets" lineno="33504"> +<interface name="corenet_sendrecv_http_server_packets" lineno="33522"> <summary> Send and receive http_server packets. </summary> @@ -31107,7 +31191,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33520"> +<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33538"> <summary> Do not audit attempts to send and receive http_server packets. </summary> @@ -31118,7 +31202,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_server_packets" lineno="33535"> +<interface name="corenet_relabelto_http_server_packets" lineno="33553"> <summary> Relabel packets to http_server the packet type. </summary> @@ -31128,7 +31212,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33557"> +<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33575"> <summary> Send and receive TCP traffic on the http_cache port. </summary> @@ -31139,7 +31223,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_http_cache_port" lineno="33572"> +<interface name="corenet_udp_send_http_cache_port" lineno="33590"> <summary> Send UDP traffic on the http_cache port. </summary> @@ -31150,7 +31234,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33587"> +<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33605"> <summary> Do not audit attempts to send UDP traffic on the http_cache port. </summary> @@ -31161,7 +31245,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_http_cache_port" lineno="33602"> +<interface name="corenet_udp_receive_http_cache_port" lineno="33620"> <summary> Receive UDP traffic on the http_cache port. </summary> @@ -31172,7 +31256,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33617"> +<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33635"> <summary> Do not audit attempts to receive UDP traffic on the http_cache port. </summary> @@ -31183,7 +31267,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33632"> +<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33650"> <summary> Send and receive UDP traffic on the http_cache port. </summary> @@ -31194,7 +31278,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33648"> +<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33666"> <summary> Do not audit attempts to send and receive UDP traffic on the http_cache port. @@ -31206,7 +31290,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_http_cache_port" lineno="33663"> +<interface name="corenet_tcp_bind_http_cache_port" lineno="33681"> <summary> Bind TCP sockets to the http_cache port. </summary> @@ -31217,7 +31301,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_http_cache_port" lineno="33683"> +<interface name="corenet_udp_bind_http_cache_port" lineno="33701"> <summary> Bind UDP sockets to the http_cache port. </summary> @@ -31228,7 +31312,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_http_cache_port" lineno="33702"> +<interface name="corenet_tcp_connect_http_cache_port" lineno="33720"> <summary> Make a TCP connection to the http_cache port. </summary> @@ -31238,7 +31322,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_cache_client_packets" lineno="33722"> +<interface name="corenet_send_http_cache_client_packets" lineno="33740"> <summary> Send http_cache_client packets. </summary> @@ -31249,7 +31333,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33741"> +<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33759"> <summary> Do not audit attempts to send http_cache_client packets. </summary> @@ -31260,7 +31344,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_cache_client_packets" lineno="33760"> +<interface name="corenet_receive_http_cache_client_packets" lineno="33778"> <summary> Receive http_cache_client packets. </summary> @@ -31271,7 +31355,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33779"> +<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33797"> <summary> Do not audit attempts to receive http_cache_client packets. </summary> @@ -31282,7 +31366,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33798"> +<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33816"> <summary> Send and receive http_cache_client packets. </summary> @@ -31293,7 +31377,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33814"> +<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33832"> <summary> Do not audit attempts to send and receive http_cache_client packets. </summary> @@ -31304,7 +31388,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_cache_client_packets" lineno="33829"> +<interface name="corenet_relabelto_http_cache_client_packets" lineno="33847"> <summary> Relabel packets to http_cache_client the packet type. </summary> @@ -31314,7 +31398,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_cache_server_packets" lineno="33849"> +<interface name="corenet_send_http_cache_server_packets" lineno="33867"> <summary> Send http_cache_server packets. </summary> @@ -31325,7 +31409,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33868"> +<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33886"> <summary> Do not audit attempts to send http_cache_server packets. </summary> @@ -31336,7 +31420,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_cache_server_packets" lineno="33887"> +<interface name="corenet_receive_http_cache_server_packets" lineno="33905"> <summary> Receive http_cache_server packets. </summary> @@ -31347,7 +31431,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33906"> +<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33924"> <summary> Do not audit attempts to receive http_cache_server packets. </summary> @@ -31358,7 +31442,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33925"> +<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33943"> <summary> Send and receive http_cache_server packets. </summary> @@ -31369,7 +31453,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33941"> +<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33959"> <summary> Do not audit attempts to send and receive http_cache_server packets. </summary> @@ -31380,7 +31464,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_cache_server_packets" lineno="33956"> +<interface name="corenet_relabelto_http_cache_server_packets" lineno="33974"> <summary> Relabel packets to http_cache_server the packet type. </summary> @@ -31390,7 +31474,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33978"> +<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33996"> <summary> Send and receive TCP traffic on the i18n_input port. </summary> @@ -31401,7 +31485,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_i18n_input_port" lineno="33993"> +<interface name="corenet_udp_send_i18n_input_port" lineno="34011"> <summary> Send UDP traffic on the i18n_input port. </summary> @@ -31412,7 +31496,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34008"> +<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34026"> <summary> Do not audit attempts to send UDP traffic on the i18n_input port. </summary> @@ -31423,7 +31507,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_i18n_input_port" lineno="34023"> +<interface name="corenet_udp_receive_i18n_input_port" lineno="34041"> <summary> Receive UDP traffic on the i18n_input port. </summary> @@ -31434,7 +31518,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34038"> +<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34056"> <summary> Do not audit attempts to receive UDP traffic on the i18n_input port. </summary> @@ -31445,7 +31529,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34053"> +<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34071"> <summary> Send and receive UDP traffic on the i18n_input port. </summary> @@ -31456,7 +31540,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34069"> +<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34087"> <summary> Do not audit attempts to send and receive UDP traffic on the i18n_input port. @@ -31468,7 +31552,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_i18n_input_port" lineno="34084"> +<interface name="corenet_tcp_bind_i18n_input_port" lineno="34102"> <summary> Bind TCP sockets to the i18n_input port. </summary> @@ -31479,7 +31563,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_i18n_input_port" lineno="34104"> +<interface name="corenet_udp_bind_i18n_input_port" lineno="34122"> <summary> Bind UDP sockets to the i18n_input port. </summary> @@ -31490,7 +31574,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_i18n_input_port" lineno="34123"> +<interface name="corenet_tcp_connect_i18n_input_port" lineno="34141"> <summary> Make a TCP connection to the i18n_input port. </summary> @@ -31500,7 +31584,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_i18n_input_client_packets" lineno="34143"> +<interface name="corenet_send_i18n_input_client_packets" lineno="34161"> <summary> Send i18n_input_client packets. </summary> @@ -31511,7 +31595,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34162"> +<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34180"> <summary> Do not audit attempts to send i18n_input_client packets. </summary> @@ -31522,7 +31606,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_i18n_input_client_packets" lineno="34181"> +<interface name="corenet_receive_i18n_input_client_packets" lineno="34199"> <summary> Receive i18n_input_client packets. </summary> @@ -31533,7 +31617,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34200"> +<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34218"> <summary> Do not audit attempts to receive i18n_input_client packets. </summary> @@ -31544,7 +31628,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34219"> +<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34237"> <summary> Send and receive i18n_input_client packets. </summary> @@ -31555,7 +31639,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34235"> +<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34253"> <summary> Do not audit attempts to send and receive i18n_input_client packets. </summary> @@ -31566,7 +31650,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34250"> +<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34268"> <summary> Relabel packets to i18n_input_client the packet type. </summary> @@ -31576,7 +31660,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_i18n_input_server_packets" lineno="34270"> +<interface name="corenet_send_i18n_input_server_packets" lineno="34288"> <summary> Send i18n_input_server packets. </summary> @@ -31587,7 +31671,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34289"> +<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34307"> <summary> Do not audit attempts to send i18n_input_server packets. </summary> @@ -31598,7 +31682,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_i18n_input_server_packets" lineno="34308"> +<interface name="corenet_receive_i18n_input_server_packets" lineno="34326"> <summary> Receive i18n_input_server packets. </summary> @@ -31609,7 +31693,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34327"> +<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34345"> <summary> Do not audit attempts to receive i18n_input_server packets. </summary> @@ -31620,7 +31704,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34346"> +<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34364"> <summary> Send and receive i18n_input_server packets. </summary> @@ -31631,7 +31715,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34362"> +<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34380"> <summary> Do not audit attempts to send and receive i18n_input_server packets. </summary> @@ -31642,7 +31726,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34377"> +<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34395"> <summary> Relabel packets to i18n_input_server the packet type. </summary> @@ -31652,7 +31736,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34399"> +<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34417"> <summary> Send and receive TCP traffic on the imaze port. </summary> @@ -31663,7 +31747,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_imaze_port" lineno="34414"> +<interface name="corenet_udp_send_imaze_port" lineno="34432"> <summary> Send UDP traffic on the imaze port. </summary> @@ -31674,7 +31758,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34429"> +<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34447"> <summary> Do not audit attempts to send UDP traffic on the imaze port. </summary> @@ -31685,7 +31769,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_imaze_port" lineno="34444"> +<interface name="corenet_udp_receive_imaze_port" lineno="34462"> <summary> Receive UDP traffic on the imaze port. </summary> @@ -31696,7 +31780,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34459"> +<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34477"> <summary> Do not audit attempts to receive UDP traffic on the imaze port. </summary> @@ -31707,7 +31791,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_imaze_port" lineno="34474"> +<interface name="corenet_udp_sendrecv_imaze_port" lineno="34492"> <summary> Send and receive UDP traffic on the imaze port. </summary> @@ -31718,7 +31802,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34490"> +<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34508"> <summary> Do not audit attempts to send and receive UDP traffic on the imaze port. @@ -31730,7 +31814,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_imaze_port" lineno="34505"> +<interface name="corenet_tcp_bind_imaze_port" lineno="34523"> <summary> Bind TCP sockets to the imaze port. </summary> @@ -31741,7 +31825,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_imaze_port" lineno="34525"> +<interface name="corenet_udp_bind_imaze_port" lineno="34543"> <summary> Bind UDP sockets to the imaze port. </summary> @@ -31752,7 +31836,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_imaze_port" lineno="34544"> +<interface name="corenet_tcp_connect_imaze_port" lineno="34562"> <summary> Make a TCP connection to the imaze port. </summary> @@ -31762,7 +31846,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_imaze_client_packets" lineno="34564"> +<interface name="corenet_send_imaze_client_packets" lineno="34582"> <summary> Send imaze_client packets. </summary> @@ -31773,7 +31857,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34583"> +<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34601"> <summary> Do not audit attempts to send imaze_client packets. </summary> @@ -31784,7 +31868,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_imaze_client_packets" lineno="34602"> +<interface name="corenet_receive_imaze_client_packets" lineno="34620"> <summary> Receive imaze_client packets. </summary> @@ -31795,7 +31879,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34621"> +<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34639"> <summary> Do not audit attempts to receive imaze_client packets. </summary> @@ -31806,7 +31890,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_imaze_client_packets" lineno="34640"> +<interface name="corenet_sendrecv_imaze_client_packets" lineno="34658"> <summary> Send and receive imaze_client packets. </summary> @@ -31817,7 +31901,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34656"> +<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34674"> <summary> Do not audit attempts to send and receive imaze_client packets. </summary> @@ -31828,7 +31912,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_imaze_client_packets" lineno="34671"> +<interface name="corenet_relabelto_imaze_client_packets" lineno="34689"> <summary> Relabel packets to imaze_client the packet type. </summary> @@ -31838,7 +31922,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_imaze_server_packets" lineno="34691"> +<interface name="corenet_send_imaze_server_packets" lineno="34709"> <summary> Send imaze_server packets. </summary> @@ -31849,7 +31933,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34710"> +<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34728"> <summary> Do not audit attempts to send imaze_server packets. </summary> @@ -31860,7 +31944,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_imaze_server_packets" lineno="34729"> +<interface name="corenet_receive_imaze_server_packets" lineno="34747"> <summary> Receive imaze_server packets. </summary> @@ -31871,7 +31955,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34748"> +<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34766"> <summary> Do not audit attempts to receive imaze_server packets. </summary> @@ -31882,7 +31966,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_imaze_server_packets" lineno="34767"> +<interface name="corenet_sendrecv_imaze_server_packets" lineno="34785"> <summary> Send and receive imaze_server packets. </summary> @@ -31893,7 +31977,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34783"> +<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34801"> <summary> Do not audit attempts to send and receive imaze_server packets. </summary> @@ -31904,7 +31988,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_imaze_server_packets" lineno="34798"> +<interface name="corenet_relabelto_imaze_server_packets" lineno="34816"> <summary> Relabel packets to imaze_server the packet type. </summary> @@ -31914,7 +31998,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34820"> +<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34838"> <summary> Send and receive TCP traffic on the inetd_child port. </summary> @@ -31925,7 +32009,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_inetd_child_port" lineno="34835"> +<interface name="corenet_udp_send_inetd_child_port" lineno="34853"> <summary> Send UDP traffic on the inetd_child port. </summary> @@ -31936,7 +32020,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34850"> +<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34868"> <summary> Do not audit attempts to send UDP traffic on the inetd_child port. </summary> @@ -31947,7 +32031,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_inetd_child_port" lineno="34865"> +<interface name="corenet_udp_receive_inetd_child_port" lineno="34883"> <summary> Receive UDP traffic on the inetd_child port. </summary> @@ -31958,7 +32042,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34880"> +<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34898"> <summary> Do not audit attempts to receive UDP traffic on the inetd_child port. </summary> @@ -31969,7 +32053,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34895"> +<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34913"> <summary> Send and receive UDP traffic on the inetd_child port. </summary> @@ -31980,7 +32064,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34911"> +<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34929"> <summary> Do not audit attempts to send and receive UDP traffic on the inetd_child port. @@ -31992,7 +32076,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_inetd_child_port" lineno="34926"> +<interface name="corenet_tcp_bind_inetd_child_port" lineno="34944"> <summary> Bind TCP sockets to the inetd_child port. </summary> @@ -32003,7 +32087,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_inetd_child_port" lineno="34946"> +<interface name="corenet_udp_bind_inetd_child_port" lineno="34964"> <summary> Bind UDP sockets to the inetd_child port. </summary> @@ -32014,7 +32098,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_inetd_child_port" lineno="34965"> +<interface name="corenet_tcp_connect_inetd_child_port" lineno="34983"> <summary> Make a TCP connection to the inetd_child port. </summary> @@ -32024,7 +32108,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_inetd_child_client_packets" lineno="34985"> +<interface name="corenet_send_inetd_child_client_packets" lineno="35003"> <summary> Send inetd_child_client packets. </summary> @@ -32035,7 +32119,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35004"> +<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35022"> <summary> Do not audit attempts to send inetd_child_client packets. </summary> @@ -32046,7 +32130,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_inetd_child_client_packets" lineno="35023"> +<interface name="corenet_receive_inetd_child_client_packets" lineno="35041"> <summary> Receive inetd_child_client packets. </summary> @@ -32057,7 +32141,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35042"> +<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35060"> <summary> Do not audit attempts to receive inetd_child_client packets. </summary> @@ -32068,7 +32152,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35061"> +<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35079"> <summary> Send and receive inetd_child_client packets. </summary> @@ -32079,7 +32163,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35077"> +<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35095"> <summary> Do not audit attempts to send and receive inetd_child_client packets. </summary> @@ -32090,7 +32174,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35092"> +<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35110"> <summary> Relabel packets to inetd_child_client the packet type. </summary> @@ -32100,7 +32184,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_inetd_child_server_packets" lineno="35112"> +<interface name="corenet_send_inetd_child_server_packets" lineno="35130"> <summary> Send inetd_child_server packets. </summary> @@ -32111,7 +32195,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35131"> +<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35149"> <summary> Do not audit attempts to send inetd_child_server packets. </summary> @@ -32122,7 +32206,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_inetd_child_server_packets" lineno="35150"> +<interface name="corenet_receive_inetd_child_server_packets" lineno="35168"> <summary> Receive inetd_child_server packets. </summary> @@ -32133,7 +32217,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35169"> +<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35187"> <summary> Do not audit attempts to receive inetd_child_server packets. </summary> @@ -32144,7 +32228,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35188"> +<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35206"> <summary> Send and receive inetd_child_server packets. </summary> @@ -32155,7 +32239,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35204"> +<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35222"> <summary> Do not audit attempts to send and receive inetd_child_server packets. </summary> @@ -32166,7 +32250,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35219"> +<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35237"> <summary> Relabel packets to inetd_child_server the packet type. </summary> @@ -32176,7 +32260,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_innd_port" lineno="35241"> +<interface name="corenet_tcp_sendrecv_innd_port" lineno="35259"> <summary> Send and receive TCP traffic on the innd port. </summary> @@ -32187,7 +32271,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_innd_port" lineno="35256"> +<interface name="corenet_udp_send_innd_port" lineno="35274"> <summary> Send UDP traffic on the innd port. </summary> @@ -32198,7 +32282,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35271"> +<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35289"> <summary> Do not audit attempts to send UDP traffic on the innd port. </summary> @@ -32209,7 +32293,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_innd_port" lineno="35286"> +<interface name="corenet_udp_receive_innd_port" lineno="35304"> <summary> Receive UDP traffic on the innd port. </summary> @@ -32220,7 +32304,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35301"> +<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35319"> <summary> Do not audit attempts to receive UDP traffic on the innd port. </summary> @@ -32231,7 +32315,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_innd_port" lineno="35316"> +<interface name="corenet_udp_sendrecv_innd_port" lineno="35334"> <summary> Send and receive UDP traffic on the innd port. </summary> @@ -32242,7 +32326,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35332"> +<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35350"> <summary> Do not audit attempts to send and receive UDP traffic on the innd port. @@ -32254,7 +32338,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_innd_port" lineno="35347"> +<interface name="corenet_tcp_bind_innd_port" lineno="35365"> <summary> Bind TCP sockets to the innd port. </summary> @@ -32265,7 +32349,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_innd_port" lineno="35367"> +<interface name="corenet_udp_bind_innd_port" lineno="35385"> <summary> Bind UDP sockets to the innd port. </summary> @@ -32276,7 +32360,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_innd_port" lineno="35386"> +<interface name="corenet_tcp_connect_innd_port" lineno="35404"> <summary> Make a TCP connection to the innd port. </summary> @@ -32286,7 +32370,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_innd_client_packets" lineno="35406"> +<interface name="corenet_send_innd_client_packets" lineno="35424"> <summary> Send innd_client packets. </summary> @@ -32297,7 +32381,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35425"> +<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35443"> <summary> Do not audit attempts to send innd_client packets. </summary> @@ -32308,7 +32392,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_innd_client_packets" lineno="35444"> +<interface name="corenet_receive_innd_client_packets" lineno="35462"> <summary> Receive innd_client packets. </summary> @@ -32319,7 +32403,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35463"> +<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35481"> <summary> Do not audit attempts to receive innd_client packets. </summary> @@ -32330,7 +32414,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_innd_client_packets" lineno="35482"> +<interface name="corenet_sendrecv_innd_client_packets" lineno="35500"> <summary> Send and receive innd_client packets. </summary> @@ -32341,7 +32425,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35498"> +<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35516"> <summary> Do not audit attempts to send and receive innd_client packets. </summary> @@ -32352,7 +32436,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_innd_client_packets" lineno="35513"> +<interface name="corenet_relabelto_innd_client_packets" lineno="35531"> <summary> Relabel packets to innd_client the packet type. </summary> @@ -32362,7 +32446,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_innd_server_packets" lineno="35533"> +<interface name="corenet_send_innd_server_packets" lineno="35551"> <summary> Send innd_server packets. </summary> @@ -32373,7 +32457,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35552"> +<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35570"> <summary> Do not audit attempts to send innd_server packets. </summary> @@ -32384,7 +32468,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_innd_server_packets" lineno="35571"> +<interface name="corenet_receive_innd_server_packets" lineno="35589"> <summary> Receive innd_server packets. </summary> @@ -32395,7 +32479,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35590"> +<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35608"> <summary> Do not audit attempts to receive innd_server packets. </summary> @@ -32406,7 +32490,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_innd_server_packets" lineno="35609"> +<interface name="corenet_sendrecv_innd_server_packets" lineno="35627"> <summary> Send and receive innd_server packets. </summary> @@ -32417,7 +32501,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35625"> +<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35643"> <summary> Do not audit attempts to send and receive innd_server packets. </summary> @@ -32428,7 +32512,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_innd_server_packets" lineno="35640"> +<interface name="corenet_relabelto_innd_server_packets" lineno="35658"> <summary> Relabel packets to innd_server the packet type. </summary> @@ -32438,7 +32522,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35662"> +<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35680"> <summary> Send and receive TCP traffic on the interwise port. </summary> @@ -32449,7 +32533,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_interwise_port" lineno="35677"> +<interface name="corenet_udp_send_interwise_port" lineno="35695"> <summary> Send UDP traffic on the interwise port. </summary> @@ -32460,7 +32544,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35692"> +<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35710"> <summary> Do not audit attempts to send UDP traffic on the interwise port. </summary> @@ -32471,7 +32555,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_interwise_port" lineno="35707"> +<interface name="corenet_udp_receive_interwise_port" lineno="35725"> <summary> Receive UDP traffic on the interwise port. </summary> @@ -32482,7 +32566,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35722"> +<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35740"> <summary> Do not audit attempts to receive UDP traffic on the interwise port. </summary> @@ -32493,7 +32577,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_interwise_port" lineno="35737"> +<interface name="corenet_udp_sendrecv_interwise_port" lineno="35755"> <summary> Send and receive UDP traffic on the interwise port. </summary> @@ -32504,7 +32588,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35753"> +<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35771"> <summary> Do not audit attempts to send and receive UDP traffic on the interwise port. @@ -32516,7 +32600,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_interwise_port" lineno="35768"> +<interface name="corenet_tcp_bind_interwise_port" lineno="35786"> <summary> Bind TCP sockets to the interwise port. </summary> @@ -32527,7 +32611,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_interwise_port" lineno="35788"> +<interface name="corenet_udp_bind_interwise_port" lineno="35806"> <summary> Bind UDP sockets to the interwise port. </summary> @@ -32538,7 +32622,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_interwise_port" lineno="35807"> +<interface name="corenet_tcp_connect_interwise_port" lineno="35825"> <summary> Make a TCP connection to the interwise port. </summary> @@ -32548,7 +32632,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_interwise_client_packets" lineno="35827"> +<interface name="corenet_send_interwise_client_packets" lineno="35845"> <summary> Send interwise_client packets. </summary> @@ -32559,7 +32643,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35846"> +<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35864"> <summary> Do not audit attempts to send interwise_client packets. </summary> @@ -32570,7 +32654,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_interwise_client_packets" lineno="35865"> +<interface name="corenet_receive_interwise_client_packets" lineno="35883"> <summary> Receive interwise_client packets. </summary> @@ -32581,7 +32665,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35884"> +<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35902"> <summary> Do not audit attempts to receive interwise_client packets. </summary> @@ -32592,7 +32676,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_interwise_client_packets" lineno="35903"> +<interface name="corenet_sendrecv_interwise_client_packets" lineno="35921"> <summary> Send and receive interwise_client packets. </summary> @@ -32603,7 +32687,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35919"> +<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35937"> <summary> Do not audit attempts to send and receive interwise_client packets. </summary> @@ -32614,7 +32698,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_interwise_client_packets" lineno="35934"> +<interface name="corenet_relabelto_interwise_client_packets" lineno="35952"> <summary> Relabel packets to interwise_client the packet type. </summary> @@ -32624,7 +32708,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_interwise_server_packets" lineno="35954"> +<interface name="corenet_send_interwise_server_packets" lineno="35972"> <summary> Send interwise_server packets. </summary> @@ -32635,7 +32719,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35973"> +<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35991"> <summary> Do not audit attempts to send interwise_server packets. </summary> @@ -32646,7 +32730,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_interwise_server_packets" lineno="35992"> +<interface name="corenet_receive_interwise_server_packets" lineno="36010"> <summary> Receive interwise_server packets. </summary> @@ -32657,7 +32741,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36011"> +<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36029"> <summary> Do not audit attempts to receive interwise_server packets. </summary> @@ -32668,7 +32752,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_interwise_server_packets" lineno="36030"> +<interface name="corenet_sendrecv_interwise_server_packets" lineno="36048"> <summary> Send and receive interwise_server packets. </summary> @@ -32679,7 +32763,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36046"> +<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36064"> <summary> Do not audit attempts to send and receive interwise_server packets. </summary> @@ -32690,7 +32774,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_interwise_server_packets" lineno="36061"> +<interface name="corenet_relabelto_interwise_server_packets" lineno="36079"> <summary> Relabel packets to interwise_server the packet type. </summary> @@ -32700,7 +32784,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36083"> +<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36101"> <summary> Send and receive TCP traffic on the ionixnetmon port. </summary> @@ -32711,7 +32795,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ionixnetmon_port" lineno="36098"> +<interface name="corenet_udp_send_ionixnetmon_port" lineno="36116"> <summary> Send UDP traffic on the ionixnetmon port. </summary> @@ -32722,7 +32806,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36113"> +<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36131"> <summary> Do not audit attempts to send UDP traffic on the ionixnetmon port. </summary> @@ -32733,7 +32817,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36128"> +<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36146"> <summary> Receive UDP traffic on the ionixnetmon port. </summary> @@ -32744,7 +32828,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36143"> +<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36161"> <summary> Do not audit attempts to receive UDP traffic on the ionixnetmon port. </summary> @@ -32755,7 +32839,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36158"> +<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36176"> <summary> Send and receive UDP traffic on the ionixnetmon port. </summary> @@ -32766,7 +32850,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36174"> +<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36192"> <summary> Do not audit attempts to send and receive UDP traffic on the ionixnetmon port. @@ -32778,7 +32862,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36189"> +<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36207"> <summary> Bind TCP sockets to the ionixnetmon port. </summary> @@ -32789,7 +32873,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36209"> +<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36227"> <summary> Bind UDP sockets to the ionixnetmon port. </summary> @@ -32800,7 +32884,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36228"> +<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36246"> <summary> Make a TCP connection to the ionixnetmon port. </summary> @@ -32810,7 +32894,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ionixnetmon_client_packets" lineno="36248"> +<interface name="corenet_send_ionixnetmon_client_packets" lineno="36266"> <summary> Send ionixnetmon_client packets. </summary> @@ -32821,7 +32905,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36267"> +<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36285"> <summary> Do not audit attempts to send ionixnetmon_client packets. </summary> @@ -32832,7 +32916,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36286"> +<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36304"> <summary> Receive ionixnetmon_client packets. </summary> @@ -32843,7 +32927,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36305"> +<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36323"> <summary> Do not audit attempts to receive ionixnetmon_client packets. </summary> @@ -32854,7 +32938,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36324"> +<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36342"> <summary> Send and receive ionixnetmon_client packets. </summary> @@ -32865,7 +32949,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36340"> +<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36358"> <summary> Do not audit attempts to send and receive ionixnetmon_client packets. </summary> @@ -32876,7 +32960,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36355"> +<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36373"> <summary> Relabel packets to ionixnetmon_client the packet type. </summary> @@ -32886,7 +32970,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ionixnetmon_server_packets" lineno="36375"> +<interface name="corenet_send_ionixnetmon_server_packets" lineno="36393"> <summary> Send ionixnetmon_server packets. </summary> @@ -32897,7 +32981,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36394"> +<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36412"> <summary> Do not audit attempts to send ionixnetmon_server packets. </summary> @@ -32908,7 +32992,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36413"> +<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36431"> <summary> Receive ionixnetmon_server packets. </summary> @@ -32919,7 +33003,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36432"> +<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36450"> <summary> Do not audit attempts to receive ionixnetmon_server packets. </summary> @@ -32930,7 +33014,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36451"> +<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36469"> <summary> Send and receive ionixnetmon_server packets. </summary> @@ -32941,7 +33025,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36467"> +<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36485"> <summary> Do not audit attempts to send and receive ionixnetmon_server packets. </summary> @@ -32952,7 +33036,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36482"> +<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36500"> <summary> Relabel packets to ionixnetmon_server the packet type. </summary> @@ -32962,7 +33046,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36504"> +<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36522"> <summary> Send and receive TCP traffic on the ipmi port. </summary> @@ -32973,7 +33057,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ipmi_port" lineno="36519"> +<interface name="corenet_udp_send_ipmi_port" lineno="36537"> <summary> Send UDP traffic on the ipmi port. </summary> @@ -32984,7 +33068,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36534"> +<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36552"> <summary> Do not audit attempts to send UDP traffic on the ipmi port. </summary> @@ -32995,7 +33079,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ipmi_port" lineno="36549"> +<interface name="corenet_udp_receive_ipmi_port" lineno="36567"> <summary> Receive UDP traffic on the ipmi port. </summary> @@ -33006,7 +33090,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36564"> +<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36582"> <summary> Do not audit attempts to receive UDP traffic on the ipmi port. </summary> @@ -33017,7 +33101,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36579"> +<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36597"> <summary> Send and receive UDP traffic on the ipmi port. </summary> @@ -33028,7 +33112,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36595"> +<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36613"> <summary> Do not audit attempts to send and receive UDP traffic on the ipmi port. @@ -33040,7 +33124,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ipmi_port" lineno="36610"> +<interface name="corenet_tcp_bind_ipmi_port" lineno="36628"> <summary> Bind TCP sockets to the ipmi port. </summary> @@ -33051,7 +33135,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ipmi_port" lineno="36630"> +<interface name="corenet_udp_bind_ipmi_port" lineno="36648"> <summary> Bind UDP sockets to the ipmi port. </summary> @@ -33062,7 +33146,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ipmi_port" lineno="36649"> +<interface name="corenet_tcp_connect_ipmi_port" lineno="36667"> <summary> Make a TCP connection to the ipmi port. </summary> @@ -33072,7 +33156,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipmi_client_packets" lineno="36669"> +<interface name="corenet_send_ipmi_client_packets" lineno="36687"> <summary> Send ipmi_client packets. </summary> @@ -33083,7 +33167,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36688"> +<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36706"> <summary> Do not audit attempts to send ipmi_client packets. </summary> @@ -33094,7 +33178,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipmi_client_packets" lineno="36707"> +<interface name="corenet_receive_ipmi_client_packets" lineno="36725"> <summary> Receive ipmi_client packets. </summary> @@ -33105,7 +33189,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36726"> +<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36744"> <summary> Do not audit attempts to receive ipmi_client packets. </summary> @@ -33116,7 +33200,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36745"> +<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36763"> <summary> Send and receive ipmi_client packets. </summary> @@ -33127,7 +33211,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36761"> +<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36779"> <summary> Do not audit attempts to send and receive ipmi_client packets. </summary> @@ -33138,7 +33222,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipmi_client_packets" lineno="36776"> +<interface name="corenet_relabelto_ipmi_client_packets" lineno="36794"> <summary> Relabel packets to ipmi_client the packet type. </summary> @@ -33148,7 +33232,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipmi_server_packets" lineno="36796"> +<interface name="corenet_send_ipmi_server_packets" lineno="36814"> <summary> Send ipmi_server packets. </summary> @@ -33159,7 +33243,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36815"> +<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36833"> <summary> Do not audit attempts to send ipmi_server packets. </summary> @@ -33170,7 +33254,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipmi_server_packets" lineno="36834"> +<interface name="corenet_receive_ipmi_server_packets" lineno="36852"> <summary> Receive ipmi_server packets. </summary> @@ -33181,7 +33265,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36853"> +<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36871"> <summary> Do not audit attempts to receive ipmi_server packets. </summary> @@ -33192,7 +33276,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36872"> +<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36890"> <summary> Send and receive ipmi_server packets. </summary> @@ -33203,7 +33287,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36888"> +<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36906"> <summary> Do not audit attempts to send and receive ipmi_server packets. </summary> @@ -33214,7 +33298,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipmi_server_packets" lineno="36903"> +<interface name="corenet_relabelto_ipmi_server_packets" lineno="36921"> <summary> Relabel packets to ipmi_server the packet type. </summary> @@ -33224,7 +33308,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36925"> +<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36943"> <summary> Send and receive TCP traffic on the ipp port. </summary> @@ -33235,7 +33319,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ipp_port" lineno="36940"> +<interface name="corenet_udp_send_ipp_port" lineno="36958"> <summary> Send UDP traffic on the ipp port. </summary> @@ -33246,7 +33330,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36955"> +<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36973"> <summary> Do not audit attempts to send UDP traffic on the ipp port. </summary> @@ -33257,7 +33341,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ipp_port" lineno="36970"> +<interface name="corenet_udp_receive_ipp_port" lineno="36988"> <summary> Receive UDP traffic on the ipp port. </summary> @@ -33268,7 +33352,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36985"> +<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="37003"> <summary> Do not audit attempts to receive UDP traffic on the ipp port. </summary> @@ -33279,7 +33363,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ipp_port" lineno="37000"> +<interface name="corenet_udp_sendrecv_ipp_port" lineno="37018"> <summary> Send and receive UDP traffic on the ipp port. </summary> @@ -33290,7 +33374,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37016"> +<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37034"> <summary> Do not audit attempts to send and receive UDP traffic on the ipp port. @@ -33302,7 +33386,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ipp_port" lineno="37031"> +<interface name="corenet_tcp_bind_ipp_port" lineno="37049"> <summary> Bind TCP sockets to the ipp port. </summary> @@ -33313,7 +33397,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ipp_port" lineno="37051"> +<interface name="corenet_udp_bind_ipp_port" lineno="37069"> <summary> Bind UDP sockets to the ipp port. </summary> @@ -33324,7 +33408,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ipp_port" lineno="37070"> +<interface name="corenet_tcp_connect_ipp_port" lineno="37088"> <summary> Make a TCP connection to the ipp port. </summary> @@ -33334,7 +33418,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipp_client_packets" lineno="37090"> +<interface name="corenet_send_ipp_client_packets" lineno="37108"> <summary> Send ipp_client packets. </summary> @@ -33345,7 +33429,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37109"> +<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37127"> <summary> Do not audit attempts to send ipp_client packets. </summary> @@ -33356,7 +33440,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipp_client_packets" lineno="37128"> +<interface name="corenet_receive_ipp_client_packets" lineno="37146"> <summary> Receive ipp_client packets. </summary> @@ -33367,7 +33451,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37147"> +<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37165"> <summary> Do not audit attempts to receive ipp_client packets. </summary> @@ -33378,7 +33462,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipp_client_packets" lineno="37166"> +<interface name="corenet_sendrecv_ipp_client_packets" lineno="37184"> <summary> Send and receive ipp_client packets. </summary> @@ -33389,7 +33473,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37182"> +<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37200"> <summary> Do not audit attempts to send and receive ipp_client packets. </summary> @@ -33400,7 +33484,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipp_client_packets" lineno="37197"> +<interface name="corenet_relabelto_ipp_client_packets" lineno="37215"> <summary> Relabel packets to ipp_client the packet type. </summary> @@ -33410,7 +33494,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipp_server_packets" lineno="37217"> +<interface name="corenet_send_ipp_server_packets" lineno="37235"> <summary> Send ipp_server packets. </summary> @@ -33421,7 +33505,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37236"> +<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37254"> <summary> Do not audit attempts to send ipp_server packets. </summary> @@ -33432,7 +33516,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipp_server_packets" lineno="37255"> +<interface name="corenet_receive_ipp_server_packets" lineno="37273"> <summary> Receive ipp_server packets. </summary> @@ -33443,7 +33527,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37274"> +<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37292"> <summary> Do not audit attempts to receive ipp_server packets. </summary> @@ -33454,7 +33538,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipp_server_packets" lineno="37293"> +<interface name="corenet_sendrecv_ipp_server_packets" lineno="37311"> <summary> Send and receive ipp_server packets. </summary> @@ -33465,7 +33549,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37309"> +<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37327"> <summary> Do not audit attempts to send and receive ipp_server packets. </summary> @@ -33476,7 +33560,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipp_server_packets" lineno="37324"> +<interface name="corenet_relabelto_ipp_server_packets" lineno="37342"> <summary> Relabel packets to ipp_server the packet type. </summary> @@ -33486,7 +33570,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37346"> +<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37364"> <summary> Send and receive TCP traffic on the ipsecnat port. </summary> @@ -33497,7 +33581,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ipsecnat_port" lineno="37361"> +<interface name="corenet_udp_send_ipsecnat_port" lineno="37379"> <summary> Send UDP traffic on the ipsecnat port. </summary> @@ -33508,7 +33592,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37376"> +<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37394"> <summary> Do not audit attempts to send UDP traffic on the ipsecnat port. </summary> @@ -33519,7 +33603,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ipsecnat_port" lineno="37391"> +<interface name="corenet_udp_receive_ipsecnat_port" lineno="37409"> <summary> Receive UDP traffic on the ipsecnat port. </summary> @@ -33530,7 +33614,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37406"> +<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37424"> <summary> Do not audit attempts to receive UDP traffic on the ipsecnat port. </summary> @@ -33541,7 +33625,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37421"> +<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37439"> <summary> Send and receive UDP traffic on the ipsecnat port. </summary> @@ -33552,7 +33636,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37437"> +<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37455"> <summary> Do not audit attempts to send and receive UDP traffic on the ipsecnat port. @@ -33564,7 +33648,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37452"> +<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37470"> <summary> Bind TCP sockets to the ipsecnat port. </summary> @@ -33575,7 +33659,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ipsecnat_port" lineno="37472"> +<interface name="corenet_udp_bind_ipsecnat_port" lineno="37490"> <summary> Bind UDP sockets to the ipsecnat port. </summary> @@ -33586,7 +33670,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37491"> +<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37509"> <summary> Make a TCP connection to the ipsecnat port. </summary> @@ -33596,7 +33680,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipsecnat_client_packets" lineno="37511"> +<interface name="corenet_send_ipsecnat_client_packets" lineno="37529"> <summary> Send ipsecnat_client packets. </summary> @@ -33607,7 +33691,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37530"> +<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37548"> <summary> Do not audit attempts to send ipsecnat_client packets. </summary> @@ -33618,7 +33702,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipsecnat_client_packets" lineno="37549"> +<interface name="corenet_receive_ipsecnat_client_packets" lineno="37567"> <summary> Receive ipsecnat_client packets. </summary> @@ -33629,7 +33713,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37568"> +<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37586"> <summary> Do not audit attempts to receive ipsecnat_client packets. </summary> @@ -33640,7 +33724,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37587"> +<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37605"> <summary> Send and receive ipsecnat_client packets. </summary> @@ -33651,7 +33735,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37603"> +<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37621"> <summary> Do not audit attempts to send and receive ipsecnat_client packets. </summary> @@ -33662,7 +33746,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37618"> +<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37636"> <summary> Relabel packets to ipsecnat_client the packet type. </summary> @@ -33672,7 +33756,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipsecnat_server_packets" lineno="37638"> +<interface name="corenet_send_ipsecnat_server_packets" lineno="37656"> <summary> Send ipsecnat_server packets. </summary> @@ -33683,7 +33767,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37657"> +<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37675"> <summary> Do not audit attempts to send ipsecnat_server packets. </summary> @@ -33694,7 +33778,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipsecnat_server_packets" lineno="37676"> +<interface name="corenet_receive_ipsecnat_server_packets" lineno="37694"> <summary> Receive ipsecnat_server packets. </summary> @@ -33705,7 +33789,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37695"> +<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37713"> <summary> Do not audit attempts to receive ipsecnat_server packets. </summary> @@ -33716,7 +33800,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37714"> +<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37732"> <summary> Send and receive ipsecnat_server packets. </summary> @@ -33727,7 +33811,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37730"> +<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37748"> <summary> Do not audit attempts to send and receive ipsecnat_server packets. </summary> @@ -33738,7 +33822,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37745"> +<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37763"> <summary> Relabel packets to ipsecnat_server the packet type. </summary> @@ -33748,7 +33832,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37767"> +<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37785"> <summary> Send and receive TCP traffic on the ircd port. </summary> @@ -33759,7 +33843,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ircd_port" lineno="37782"> +<interface name="corenet_udp_send_ircd_port" lineno="37800"> <summary> Send UDP traffic on the ircd port. </summary> @@ -33770,7 +33854,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37797"> +<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37815"> <summary> Do not audit attempts to send UDP traffic on the ircd port. </summary> @@ -33781,7 +33865,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ircd_port" lineno="37812"> +<interface name="corenet_udp_receive_ircd_port" lineno="37830"> <summary> Receive UDP traffic on the ircd port. </summary> @@ -33792,7 +33876,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37827"> +<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37845"> <summary> Do not audit attempts to receive UDP traffic on the ircd port. </summary> @@ -33803,7 +33887,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ircd_port" lineno="37842"> +<interface name="corenet_udp_sendrecv_ircd_port" lineno="37860"> <summary> Send and receive UDP traffic on the ircd port. </summary> @@ -33814,7 +33898,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37858"> +<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37876"> <summary> Do not audit attempts to send and receive UDP traffic on the ircd port. @@ -33826,7 +33910,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ircd_port" lineno="37873"> +<interface name="corenet_tcp_bind_ircd_port" lineno="37891"> <summary> Bind TCP sockets to the ircd port. </summary> @@ -33837,7 +33921,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ircd_port" lineno="37893"> +<interface name="corenet_udp_bind_ircd_port" lineno="37911"> <summary> Bind UDP sockets to the ircd port. </summary> @@ -33848,7 +33932,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ircd_port" lineno="37912"> +<interface name="corenet_tcp_connect_ircd_port" lineno="37930"> <summary> Make a TCP connection to the ircd port. </summary> @@ -33858,7 +33942,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ircd_client_packets" lineno="37932"> +<interface name="corenet_send_ircd_client_packets" lineno="37950"> <summary> Send ircd_client packets. </summary> @@ -33869,7 +33953,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37951"> +<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37969"> <summary> Do not audit attempts to send ircd_client packets. </summary> @@ -33880,7 +33964,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ircd_client_packets" lineno="37970"> +<interface name="corenet_receive_ircd_client_packets" lineno="37988"> <summary> Receive ircd_client packets. </summary> @@ -33891,7 +33975,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37989"> +<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="38007"> <summary> Do not audit attempts to receive ircd_client packets. </summary> @@ -33902,7 +33986,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ircd_client_packets" lineno="38008"> +<interface name="corenet_sendrecv_ircd_client_packets" lineno="38026"> <summary> Send and receive ircd_client packets. </summary> @@ -33913,7 +33997,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38024"> +<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38042"> <summary> Do not audit attempts to send and receive ircd_client packets. </summary> @@ -33924,7 +34008,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ircd_client_packets" lineno="38039"> +<interface name="corenet_relabelto_ircd_client_packets" lineno="38057"> <summary> Relabel packets to ircd_client the packet type. </summary> @@ -33934,7 +34018,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ircd_server_packets" lineno="38059"> +<interface name="corenet_send_ircd_server_packets" lineno="38077"> <summary> Send ircd_server packets. </summary> @@ -33945,7 +34029,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38078"> +<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38096"> <summary> Do not audit attempts to send ircd_server packets. </summary> @@ -33956,7 +34040,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ircd_server_packets" lineno="38097"> +<interface name="corenet_receive_ircd_server_packets" lineno="38115"> <summary> Receive ircd_server packets. </summary> @@ -33967,7 +34051,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38116"> +<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38134"> <summary> Do not audit attempts to receive ircd_server packets. </summary> @@ -33978,7 +34062,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ircd_server_packets" lineno="38135"> +<interface name="corenet_sendrecv_ircd_server_packets" lineno="38153"> <summary> Send and receive ircd_server packets. </summary> @@ -33989,7 +34073,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38151"> +<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38169"> <summary> Do not audit attempts to send and receive ircd_server packets. </summary> @@ -34000,7 +34084,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ircd_server_packets" lineno="38166"> +<interface name="corenet_relabelto_ircd_server_packets" lineno="38184"> <summary> Relabel packets to ircd_server the packet type. </summary> @@ -34010,7 +34094,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38188"> +<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38206"> <summary> Send and receive TCP traffic on the isakmp port. </summary> @@ -34021,7 +34105,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_isakmp_port" lineno="38203"> +<interface name="corenet_udp_send_isakmp_port" lineno="38221"> <summary> Send UDP traffic on the isakmp port. </summary> @@ -34032,7 +34116,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38218"> +<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38236"> <summary> Do not audit attempts to send UDP traffic on the isakmp port. </summary> @@ -34043,7 +34127,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_isakmp_port" lineno="38233"> +<interface name="corenet_udp_receive_isakmp_port" lineno="38251"> <summary> Receive UDP traffic on the isakmp port. </summary> @@ -34054,7 +34138,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38248"> +<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38266"> <summary> Do not audit attempts to receive UDP traffic on the isakmp port. </summary> @@ -34065,7 +34149,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38263"> +<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38281"> <summary> Send and receive UDP traffic on the isakmp port. </summary> @@ -34076,7 +34160,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38279"> +<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38297"> <summary> Do not audit attempts to send and receive UDP traffic on the isakmp port. @@ -34088,7 +34172,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_isakmp_port" lineno="38294"> +<interface name="corenet_tcp_bind_isakmp_port" lineno="38312"> <summary> Bind TCP sockets to the isakmp port. </summary> @@ -34099,7 +34183,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_isakmp_port" lineno="38314"> +<interface name="corenet_udp_bind_isakmp_port" lineno="38332"> <summary> Bind UDP sockets to the isakmp port. </summary> @@ -34110,7 +34194,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_isakmp_port" lineno="38333"> +<interface name="corenet_tcp_connect_isakmp_port" lineno="38351"> <summary> Make a TCP connection to the isakmp port. </summary> @@ -34120,7 +34204,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isakmp_client_packets" lineno="38353"> +<interface name="corenet_send_isakmp_client_packets" lineno="38371"> <summary> Send isakmp_client packets. </summary> @@ -34131,7 +34215,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38372"> +<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38390"> <summary> Do not audit attempts to send isakmp_client packets. </summary> @@ -34142,7 +34226,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isakmp_client_packets" lineno="38391"> +<interface name="corenet_receive_isakmp_client_packets" lineno="38409"> <summary> Receive isakmp_client packets. </summary> @@ -34153,7 +34237,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38410"> +<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38428"> <summary> Do not audit attempts to receive isakmp_client packets. </summary> @@ -34164,7 +34248,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38429"> +<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38447"> <summary> Send and receive isakmp_client packets. </summary> @@ -34175,7 +34259,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38445"> +<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38463"> <summary> Do not audit attempts to send and receive isakmp_client packets. </summary> @@ -34186,7 +34270,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isakmp_client_packets" lineno="38460"> +<interface name="corenet_relabelto_isakmp_client_packets" lineno="38478"> <summary> Relabel packets to isakmp_client the packet type. </summary> @@ -34196,7 +34280,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isakmp_server_packets" lineno="38480"> +<interface name="corenet_send_isakmp_server_packets" lineno="38498"> <summary> Send isakmp_server packets. </summary> @@ -34207,7 +34291,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38499"> +<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38517"> <summary> Do not audit attempts to send isakmp_server packets. </summary> @@ -34218,7 +34302,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isakmp_server_packets" lineno="38518"> +<interface name="corenet_receive_isakmp_server_packets" lineno="38536"> <summary> Receive isakmp_server packets. </summary> @@ -34229,7 +34313,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38537"> +<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38555"> <summary> Do not audit attempts to receive isakmp_server packets. </summary> @@ -34240,7 +34324,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38556"> +<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38574"> <summary> Send and receive isakmp_server packets. </summary> @@ -34251,7 +34335,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38572"> +<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38590"> <summary> Do not audit attempts to send and receive isakmp_server packets. </summary> @@ -34262,7 +34346,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isakmp_server_packets" lineno="38587"> +<interface name="corenet_relabelto_isakmp_server_packets" lineno="38605"> <summary> Relabel packets to isakmp_server the packet type. </summary> @@ -34272,7 +34356,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38609"> +<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38627"> <summary> Send and receive TCP traffic on the iscsi port. </summary> @@ -34283,7 +34367,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_iscsi_port" lineno="38624"> +<interface name="corenet_udp_send_iscsi_port" lineno="38642"> <summary> Send UDP traffic on the iscsi port. </summary> @@ -34294,7 +34378,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38639"> +<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38657"> <summary> Do not audit attempts to send UDP traffic on the iscsi port. </summary> @@ -34305,7 +34389,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_iscsi_port" lineno="38654"> +<interface name="corenet_udp_receive_iscsi_port" lineno="38672"> <summary> Receive UDP traffic on the iscsi port. </summary> @@ -34316,7 +34400,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38669"> +<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38687"> <summary> Do not audit attempts to receive UDP traffic on the iscsi port. </summary> @@ -34327,7 +34411,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38684"> +<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38702"> <summary> Send and receive UDP traffic on the iscsi port. </summary> @@ -34338,7 +34422,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38700"> +<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38718"> <summary> Do not audit attempts to send and receive UDP traffic on the iscsi port. @@ -34350,7 +34434,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_iscsi_port" lineno="38715"> +<interface name="corenet_tcp_bind_iscsi_port" lineno="38733"> <summary> Bind TCP sockets to the iscsi port. </summary> @@ -34361,7 +34445,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_iscsi_port" lineno="38735"> +<interface name="corenet_udp_bind_iscsi_port" lineno="38753"> <summary> Bind UDP sockets to the iscsi port. </summary> @@ -34372,7 +34456,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_iscsi_port" lineno="38754"> +<interface name="corenet_tcp_connect_iscsi_port" lineno="38772"> <summary> Make a TCP connection to the iscsi port. </summary> @@ -34382,7 +34466,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_iscsi_client_packets" lineno="38774"> +<interface name="corenet_send_iscsi_client_packets" lineno="38792"> <summary> Send iscsi_client packets. </summary> @@ -34393,7 +34477,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38793"> +<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38811"> <summary> Do not audit attempts to send iscsi_client packets. </summary> @@ -34404,7 +34488,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_iscsi_client_packets" lineno="38812"> +<interface name="corenet_receive_iscsi_client_packets" lineno="38830"> <summary> Receive iscsi_client packets. </summary> @@ -34415,7 +34499,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38831"> +<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38849"> <summary> Do not audit attempts to receive iscsi_client packets. </summary> @@ -34426,7 +34510,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38850"> +<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38868"> <summary> Send and receive iscsi_client packets. </summary> @@ -34437,7 +34521,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38866"> +<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38884"> <summary> Do not audit attempts to send and receive iscsi_client packets. </summary> @@ -34448,7 +34532,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_iscsi_client_packets" lineno="38881"> +<interface name="corenet_relabelto_iscsi_client_packets" lineno="38899"> <summary> Relabel packets to iscsi_client the packet type. </summary> @@ -34458,7 +34542,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_iscsi_server_packets" lineno="38901"> +<interface name="corenet_send_iscsi_server_packets" lineno="38919"> <summary> Send iscsi_server packets. </summary> @@ -34469,7 +34553,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38920"> +<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38938"> <summary> Do not audit attempts to send iscsi_server packets. </summary> @@ -34480,7 +34564,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_iscsi_server_packets" lineno="38939"> +<interface name="corenet_receive_iscsi_server_packets" lineno="38957"> <summary> Receive iscsi_server packets. </summary> @@ -34491,7 +34575,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38958"> +<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38976"> <summary> Do not audit attempts to receive iscsi_server packets. </summary> @@ -34502,7 +34586,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38977"> +<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38995"> <summary> Send and receive iscsi_server packets. </summary> @@ -34513,7 +34597,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38993"> +<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="39011"> <summary> Do not audit attempts to send and receive iscsi_server packets. </summary> @@ -34524,7 +34608,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_iscsi_server_packets" lineno="39008"> +<interface name="corenet_relabelto_iscsi_server_packets" lineno="39026"> <summary> Relabel packets to iscsi_server the packet type. </summary> @@ -34534,7 +34618,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_isns_port" lineno="39030"> +<interface name="corenet_tcp_sendrecv_isns_port" lineno="39048"> <summary> Send and receive TCP traffic on the isns port. </summary> @@ -34545,7 +34629,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_isns_port" lineno="39045"> +<interface name="corenet_udp_send_isns_port" lineno="39063"> <summary> Send UDP traffic on the isns port. </summary> @@ -34556,7 +34640,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39060"> +<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39078"> <summary> Do not audit attempts to send UDP traffic on the isns port. </summary> @@ -34567,7 +34651,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_isns_port" lineno="39075"> +<interface name="corenet_udp_receive_isns_port" lineno="39093"> <summary> Receive UDP traffic on the isns port. </summary> @@ -34578,7 +34662,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39090"> +<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39108"> <summary> Do not audit attempts to receive UDP traffic on the isns port. </summary> @@ -34589,7 +34673,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_isns_port" lineno="39105"> +<interface name="corenet_udp_sendrecv_isns_port" lineno="39123"> <summary> Send and receive UDP traffic on the isns port. </summary> @@ -34600,7 +34684,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39121"> +<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39139"> <summary> Do not audit attempts to send and receive UDP traffic on the isns port. @@ -34612,7 +34696,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_isns_port" lineno="39136"> +<interface name="corenet_tcp_bind_isns_port" lineno="39154"> <summary> Bind TCP sockets to the isns port. </summary> @@ -34623,7 +34707,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_isns_port" lineno="39156"> +<interface name="corenet_udp_bind_isns_port" lineno="39174"> <summary> Bind UDP sockets to the isns port. </summary> @@ -34634,7 +34718,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_isns_port" lineno="39175"> +<interface name="corenet_tcp_connect_isns_port" lineno="39193"> <summary> Make a TCP connection to the isns port. </summary> @@ -34644,7 +34728,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isns_client_packets" lineno="39195"> +<interface name="corenet_send_isns_client_packets" lineno="39213"> <summary> Send isns_client packets. </summary> @@ -34655,7 +34739,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39214"> +<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39232"> <summary> Do not audit attempts to send isns_client packets. </summary> @@ -34666,7 +34750,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isns_client_packets" lineno="39233"> +<interface name="corenet_receive_isns_client_packets" lineno="39251"> <summary> Receive isns_client packets. </summary> @@ -34677,7 +34761,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39252"> +<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39270"> <summary> Do not audit attempts to receive isns_client packets. </summary> @@ -34688,7 +34772,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isns_client_packets" lineno="39271"> +<interface name="corenet_sendrecv_isns_client_packets" lineno="39289"> <summary> Send and receive isns_client packets. </summary> @@ -34699,7 +34783,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39287"> +<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39305"> <summary> Do not audit attempts to send and receive isns_client packets. </summary> @@ -34710,7 +34794,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isns_client_packets" lineno="39302"> +<interface name="corenet_relabelto_isns_client_packets" lineno="39320"> <summary> Relabel packets to isns_client the packet type. </summary> @@ -34720,7 +34804,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isns_server_packets" lineno="39322"> +<interface name="corenet_send_isns_server_packets" lineno="39340"> <summary> Send isns_server packets. </summary> @@ -34731,7 +34815,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39341"> +<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39359"> <summary> Do not audit attempts to send isns_server packets. </summary> @@ -34742,7 +34826,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isns_server_packets" lineno="39360"> +<interface name="corenet_receive_isns_server_packets" lineno="39378"> <summary> Receive isns_server packets. </summary> @@ -34753,7 +34837,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39379"> +<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39397"> <summary> Do not audit attempts to receive isns_server packets. </summary> @@ -34764,7 +34848,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isns_server_packets" lineno="39398"> +<interface name="corenet_sendrecv_isns_server_packets" lineno="39416"> <summary> Send and receive isns_server packets. </summary> @@ -34775,7 +34859,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39414"> +<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39432"> <summary> Do not audit attempts to send and receive isns_server packets. </summary> @@ -34786,7 +34870,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isns_server_packets" lineno="39429"> +<interface name="corenet_relabelto_isns_server_packets" lineno="39447"> <summary> Relabel packets to isns_server the packet type. </summary> @@ -34796,7 +34880,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39451"> +<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39469"> <summary> Send and receive TCP traffic on the jabber_client port. </summary> @@ -34807,7 +34891,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_jabber_client_port" lineno="39466"> +<interface name="corenet_udp_send_jabber_client_port" lineno="39484"> <summary> Send UDP traffic on the jabber_client port. </summary> @@ -34818,7 +34902,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39481"> +<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39499"> <summary> Do not audit attempts to send UDP traffic on the jabber_client port. </summary> @@ -34829,7 +34913,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_jabber_client_port" lineno="39496"> +<interface name="corenet_udp_receive_jabber_client_port" lineno="39514"> <summary> Receive UDP traffic on the jabber_client port. </summary> @@ -34840,7 +34924,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39511"> +<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39529"> <summary> Do not audit attempts to receive UDP traffic on the jabber_client port. </summary> @@ -34851,7 +34935,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39526"> +<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39544"> <summary> Send and receive UDP traffic on the jabber_client port. </summary> @@ -34862,7 +34946,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39542"> +<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39560"> <summary> Do not audit attempts to send and receive UDP traffic on the jabber_client port. @@ -34874,7 +34958,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_jabber_client_port" lineno="39557"> +<interface name="corenet_tcp_bind_jabber_client_port" lineno="39575"> <summary> Bind TCP sockets to the jabber_client port. </summary> @@ -34885,7 +34969,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_jabber_client_port" lineno="39577"> +<interface name="corenet_udp_bind_jabber_client_port" lineno="39595"> <summary> Bind UDP sockets to the jabber_client port. </summary> @@ -34896,7 +34980,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_jabber_client_port" lineno="39596"> +<interface name="corenet_tcp_connect_jabber_client_port" lineno="39614"> <summary> Make a TCP connection to the jabber_client port. </summary> @@ -34906,7 +34990,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_client_client_packets" lineno="39616"> +<interface name="corenet_send_jabber_client_client_packets" lineno="39634"> <summary> Send jabber_client_client packets. </summary> @@ -34917,7 +35001,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39635"> +<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39653"> <summary> Do not audit attempts to send jabber_client_client packets. </summary> @@ -34928,7 +35012,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_client_client_packets" lineno="39654"> +<interface name="corenet_receive_jabber_client_client_packets" lineno="39672"> <summary> Receive jabber_client_client packets. </summary> @@ -34939,7 +35023,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39673"> +<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39691"> <summary> Do not audit attempts to receive jabber_client_client packets. </summary> @@ -34950,7 +35034,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39692"> +<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39710"> <summary> Send and receive jabber_client_client packets. </summary> @@ -34961,7 +35045,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39708"> +<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39726"> <summary> Do not audit attempts to send and receive jabber_client_client packets. </summary> @@ -34972,7 +35056,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39723"> +<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39741"> <summary> Relabel packets to jabber_client_client the packet type. </summary> @@ -34982,7 +35066,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_client_server_packets" lineno="39743"> +<interface name="corenet_send_jabber_client_server_packets" lineno="39761"> <summary> Send jabber_client_server packets. </summary> @@ -34993,7 +35077,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39762"> +<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39780"> <summary> Do not audit attempts to send jabber_client_server packets. </summary> @@ -35004,7 +35088,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_client_server_packets" lineno="39781"> +<interface name="corenet_receive_jabber_client_server_packets" lineno="39799"> <summary> Receive jabber_client_server packets. </summary> @@ -35015,7 +35099,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39800"> +<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39818"> <summary> Do not audit attempts to receive jabber_client_server packets. </summary> @@ -35026,7 +35110,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39819"> +<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39837"> <summary> Send and receive jabber_client_server packets. </summary> @@ -35037,7 +35121,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39835"> +<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39853"> <summary> Do not audit attempts to send and receive jabber_client_server packets. </summary> @@ -35048,7 +35132,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39850"> +<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39868"> <summary> Relabel packets to jabber_client_server the packet type. </summary> @@ -35058,7 +35142,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39872"> +<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39890"> <summary> Send and receive TCP traffic on the jabber_interserver port. </summary> @@ -35069,7 +35153,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_jabber_interserver_port" lineno="39887"> +<interface name="corenet_udp_send_jabber_interserver_port" lineno="39905"> <summary> Send UDP traffic on the jabber_interserver port. </summary> @@ -35080,7 +35164,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39902"> +<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39920"> <summary> Do not audit attempts to send UDP traffic on the jabber_interserver port. </summary> @@ -35091,7 +35175,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39917"> +<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39935"> <summary> Receive UDP traffic on the jabber_interserver port. </summary> @@ -35102,7 +35186,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39932"> +<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39950"> <summary> Do not audit attempts to receive UDP traffic on the jabber_interserver port. </summary> @@ -35113,7 +35197,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39947"> +<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39965"> <summary> Send and receive UDP traffic on the jabber_interserver port. </summary> @@ -35124,7 +35208,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39963"> +<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39981"> <summary> Do not audit attempts to send and receive UDP traffic on the jabber_interserver port. @@ -35136,7 +35220,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39978"> +<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39996"> <summary> Bind TCP sockets to the jabber_interserver port. </summary> @@ -35147,7 +35231,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39998"> +<interface name="corenet_udp_bind_jabber_interserver_port" lineno="40016"> <summary> Bind UDP sockets to the jabber_interserver port. </summary> @@ -35158,7 +35242,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40017"> +<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40035"> <summary> Make a TCP connection to the jabber_interserver port. </summary> @@ -35168,7 +35252,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_interserver_client_packets" lineno="40037"> +<interface name="corenet_send_jabber_interserver_client_packets" lineno="40055"> <summary> Send jabber_interserver_client packets. </summary> @@ -35179,7 +35263,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40056"> +<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40074"> <summary> Do not audit attempts to send jabber_interserver_client packets. </summary> @@ -35190,7 +35274,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40075"> +<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40093"> <summary> Receive jabber_interserver_client packets. </summary> @@ -35201,7 +35285,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40094"> +<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40112"> <summary> Do not audit attempts to receive jabber_interserver_client packets. </summary> @@ -35212,7 +35296,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40113"> +<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40131"> <summary> Send and receive jabber_interserver_client packets. </summary> @@ -35223,7 +35307,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40129"> +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40147"> <summary> Do not audit attempts to send and receive jabber_interserver_client packets. </summary> @@ -35234,7 +35318,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40144"> +<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40162"> <summary> Relabel packets to jabber_interserver_client the packet type. </summary> @@ -35244,7 +35328,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_interserver_server_packets" lineno="40164"> +<interface name="corenet_send_jabber_interserver_server_packets" lineno="40182"> <summary> Send jabber_interserver_server packets. </summary> @@ -35255,7 +35339,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40183"> +<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40201"> <summary> Do not audit attempts to send jabber_interserver_server packets. </summary> @@ -35266,7 +35350,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40202"> +<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40220"> <summary> Receive jabber_interserver_server packets. </summary> @@ -35277,7 +35361,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40221"> +<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40239"> <summary> Do not audit attempts to receive jabber_interserver_server packets. </summary> @@ -35288,7 +35372,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40240"> +<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40258"> <summary> Send and receive jabber_interserver_server packets. </summary> @@ -35299,7 +35383,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40256"> +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40274"> <summary> Do not audit attempts to send and receive jabber_interserver_server packets. </summary> @@ -35310,7 +35394,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40271"> +<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40289"> <summary> Relabel packets to jabber_interserver_server the packet type. </summary> @@ -35320,7 +35404,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40293"> +<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40311"> <summary> Send and receive TCP traffic on the jboss_iiop port. </summary> @@ -35331,7 +35415,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_jboss_iiop_port" lineno="40308"> +<interface name="corenet_udp_send_jboss_iiop_port" lineno="40326"> <summary> Send UDP traffic on the jboss_iiop port. </summary> @@ -35342,7 +35426,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40323"> +<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40341"> <summary> Do not audit attempts to send UDP traffic on the jboss_iiop port. </summary> @@ -35353,7 +35437,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40338"> +<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40356"> <summary> Receive UDP traffic on the jboss_iiop port. </summary> @@ -35364,7 +35448,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40353"> +<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40371"> <summary> Do not audit attempts to receive UDP traffic on the jboss_iiop port. </summary> @@ -35375,7 +35459,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40368"> +<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40386"> <summary> Send and receive UDP traffic on the jboss_iiop port. </summary> @@ -35386,7 +35470,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40384"> +<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40402"> <summary> Do not audit attempts to send and receive UDP traffic on the jboss_iiop port. @@ -35398,7 +35482,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40399"> +<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40417"> <summary> Bind TCP sockets to the jboss_iiop port. </summary> @@ -35409,7 +35493,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40419"> +<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40437"> <summary> Bind UDP sockets to the jboss_iiop port. </summary> @@ -35420,7 +35504,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40438"> +<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40456"> <summary> Make a TCP connection to the jboss_iiop port. </summary> @@ -35430,7 +35514,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jboss_iiop_client_packets" lineno="40458"> +<interface name="corenet_send_jboss_iiop_client_packets" lineno="40476"> <summary> Send jboss_iiop_client packets. </summary> @@ -35441,7 +35525,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40477"> +<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40495"> <summary> Do not audit attempts to send jboss_iiop_client packets. </summary> @@ -35452,7 +35536,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40496"> +<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40514"> <summary> Receive jboss_iiop_client packets. </summary> @@ -35463,7 +35547,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40515"> +<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40533"> <summary> Do not audit attempts to receive jboss_iiop_client packets. </summary> @@ -35474,7 +35558,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40534"> +<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40552"> <summary> Send and receive jboss_iiop_client packets. </summary> @@ -35485,7 +35569,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40550"> +<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40568"> <summary> Do not audit attempts to send and receive jboss_iiop_client packets. </summary> @@ -35496,7 +35580,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40565"> +<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40583"> <summary> Relabel packets to jboss_iiop_client the packet type. </summary> @@ -35506,7 +35590,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jboss_iiop_server_packets" lineno="40585"> +<interface name="corenet_send_jboss_iiop_server_packets" lineno="40603"> <summary> Send jboss_iiop_server packets. </summary> @@ -35517,7 +35601,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40604"> +<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40622"> <summary> Do not audit attempts to send jboss_iiop_server packets. </summary> @@ -35528,7 +35612,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40623"> +<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40641"> <summary> Receive jboss_iiop_server packets. </summary> @@ -35539,7 +35623,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40642"> +<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40660"> <summary> Do not audit attempts to receive jboss_iiop_server packets. </summary> @@ -35550,7 +35634,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40661"> +<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40679"> <summary> Send and receive jboss_iiop_server packets. </summary> @@ -35561,7 +35645,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40677"> +<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40695"> <summary> Do not audit attempts to send and receive jboss_iiop_server packets. </summary> @@ -35572,7 +35656,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40692"> +<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40710"> <summary> Relabel packets to jboss_iiop_server the packet type. </summary> @@ -35582,7 +35666,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40714"> +<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40732"> <summary> Send and receive TCP traffic on the kerberos port. </summary> @@ -35593,7 +35677,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kerberos_port" lineno="40729"> +<interface name="corenet_udp_send_kerberos_port" lineno="40747"> <summary> Send UDP traffic on the kerberos port. </summary> @@ -35604,7 +35688,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40744"> +<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40762"> <summary> Do not audit attempts to send UDP traffic on the kerberos port. </summary> @@ -35615,7 +35699,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kerberos_port" lineno="40759"> +<interface name="corenet_udp_receive_kerberos_port" lineno="40777"> <summary> Receive UDP traffic on the kerberos port. </summary> @@ -35626,7 +35710,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40774"> +<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40792"> <summary> Do not audit attempts to receive UDP traffic on the kerberos port. </summary> @@ -35637,7 +35721,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40789"> +<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40807"> <summary> Send and receive UDP traffic on the kerberos port. </summary> @@ -35648,7 +35732,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40805"> +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40823"> <summary> Do not audit attempts to send and receive UDP traffic on the kerberos port. @@ -35660,7 +35744,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kerberos_port" lineno="40820"> +<interface name="corenet_tcp_bind_kerberos_port" lineno="40838"> <summary> Bind TCP sockets to the kerberos port. </summary> @@ -35671,7 +35755,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kerberos_port" lineno="40840"> +<interface name="corenet_udp_bind_kerberos_port" lineno="40858"> <summary> Bind UDP sockets to the kerberos port. </summary> @@ -35682,7 +35766,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kerberos_port" lineno="40859"> +<interface name="corenet_tcp_connect_kerberos_port" lineno="40877"> <summary> Make a TCP connection to the kerberos port. </summary> @@ -35692,7 +35776,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_client_packets" lineno="40879"> +<interface name="corenet_send_kerberos_client_packets" lineno="40897"> <summary> Send kerberos_client packets. </summary> @@ -35703,7 +35787,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40898"> +<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40916"> <summary> Do not audit attempts to send kerberos_client packets. </summary> @@ -35714,7 +35798,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_client_packets" lineno="40917"> +<interface name="corenet_receive_kerberos_client_packets" lineno="40935"> <summary> Receive kerberos_client packets. </summary> @@ -35725,7 +35809,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40936"> +<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40954"> <summary> Do not audit attempts to receive kerberos_client packets. </summary> @@ -35736,7 +35820,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40955"> +<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40973"> <summary> Send and receive kerberos_client packets. </summary> @@ -35747,7 +35831,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40971"> +<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40989"> <summary> Do not audit attempts to send and receive kerberos_client packets. </summary> @@ -35758,7 +35842,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_client_packets" lineno="40986"> +<interface name="corenet_relabelto_kerberos_client_packets" lineno="41004"> <summary> Relabel packets to kerberos_client the packet type. </summary> @@ -35768,7 +35852,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_server_packets" lineno="41006"> +<interface name="corenet_send_kerberos_server_packets" lineno="41024"> <summary> Send kerberos_server packets. </summary> @@ -35779,7 +35863,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41025"> +<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41043"> <summary> Do not audit attempts to send kerberos_server packets. </summary> @@ -35790,7 +35874,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_server_packets" lineno="41044"> +<interface name="corenet_receive_kerberos_server_packets" lineno="41062"> <summary> Receive kerberos_server packets. </summary> @@ -35801,7 +35885,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41063"> +<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41081"> <summary> Do not audit attempts to receive kerberos_server packets. </summary> @@ -35812,7 +35896,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41082"> +<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41100"> <summary> Send and receive kerberos_server packets. </summary> @@ -35823,7 +35907,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41098"> +<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41116"> <summary> Do not audit attempts to send and receive kerberos_server packets. </summary> @@ -35834,7 +35918,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_server_packets" lineno="41113"> +<interface name="corenet_relabelto_kerberos_server_packets" lineno="41131"> <summary> Relabel packets to kerberos_server the packet type. </summary> @@ -35844,7 +35928,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41135"> +<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41153"> <summary> Send and receive TCP traffic on the kerberos_admin port. </summary> @@ -35855,7 +35939,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kerberos_admin_port" lineno="41150"> +<interface name="corenet_udp_send_kerberos_admin_port" lineno="41168"> <summary> Send UDP traffic on the kerberos_admin port. </summary> @@ -35866,7 +35950,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41165"> +<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41183"> <summary> Do not audit attempts to send UDP traffic on the kerberos_admin port. </summary> @@ -35877,7 +35961,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41180"> +<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41198"> <summary> Receive UDP traffic on the kerberos_admin port. </summary> @@ -35888,7 +35972,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41195"> +<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41213"> <summary> Do not audit attempts to receive UDP traffic on the kerberos_admin port. </summary> @@ -35899,7 +35983,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41210"> +<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41228"> <summary> Send and receive UDP traffic on the kerberos_admin port. </summary> @@ -35910,7 +35994,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41226"> +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41244"> <summary> Do not audit attempts to send and receive UDP traffic on the kerberos_admin port. @@ -35922,7 +36006,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41241"> +<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41259"> <summary> Bind TCP sockets to the kerberos_admin port. </summary> @@ -35933,7 +36017,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41261"> +<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41279"> <summary> Bind UDP sockets to the kerberos_admin port. </summary> @@ -35944,7 +36028,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41280"> +<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41298"> <summary> Make a TCP connection to the kerberos_admin port. </summary> @@ -35954,7 +36038,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_admin_client_packets" lineno="41300"> +<interface name="corenet_send_kerberos_admin_client_packets" lineno="41318"> <summary> Send kerberos_admin_client packets. </summary> @@ -35965,7 +36049,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41319"> +<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41337"> <summary> Do not audit attempts to send kerberos_admin_client packets. </summary> @@ -35976,7 +36060,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41338"> +<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41356"> <summary> Receive kerberos_admin_client packets. </summary> @@ -35987,7 +36071,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41357"> +<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41375"> <summary> Do not audit attempts to receive kerberos_admin_client packets. </summary> @@ -35998,7 +36082,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41376"> +<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41394"> <summary> Send and receive kerberos_admin_client packets. </summary> @@ -36009,7 +36093,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41392"> +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41410"> <summary> Do not audit attempts to send and receive kerberos_admin_client packets. </summary> @@ -36020,7 +36104,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41407"> +<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41425"> <summary> Relabel packets to kerberos_admin_client the packet type. </summary> @@ -36030,7 +36114,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_admin_server_packets" lineno="41427"> +<interface name="corenet_send_kerberos_admin_server_packets" lineno="41445"> <summary> Send kerberos_admin_server packets. </summary> @@ -36041,7 +36125,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41446"> +<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41464"> <summary> Do not audit attempts to send kerberos_admin_server packets. </summary> @@ -36052,7 +36136,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41465"> +<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41483"> <summary> Receive kerberos_admin_server packets. </summary> @@ -36063,7 +36147,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41484"> +<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41502"> <summary> Do not audit attempts to receive kerberos_admin_server packets. </summary> @@ -36074,7 +36158,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41503"> +<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41521"> <summary> Send and receive kerberos_admin_server packets. </summary> @@ -36085,7 +36169,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41519"> +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41537"> <summary> Do not audit attempts to send and receive kerberos_admin_server packets. </summary> @@ -36096,7 +36180,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41534"> +<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41552"> <summary> Relabel packets to kerberos_admin_server the packet type. </summary> @@ -36106,7 +36190,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41556"> +<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41574"> <summary> Send and receive TCP traffic on the kerberos_master port. </summary> @@ -36117,7 +36201,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kerberos_master_port" lineno="41571"> +<interface name="corenet_udp_send_kerberos_master_port" lineno="41589"> <summary> Send UDP traffic on the kerberos_master port. </summary> @@ -36128,7 +36212,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41586"> +<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41604"> <summary> Do not audit attempts to send UDP traffic on the kerberos_master port. </summary> @@ -36139,7 +36223,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kerberos_master_port" lineno="41601"> +<interface name="corenet_udp_receive_kerberos_master_port" lineno="41619"> <summary> Receive UDP traffic on the kerberos_master port. </summary> @@ -36150,7 +36234,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41616"> +<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41634"> <summary> Do not audit attempts to receive UDP traffic on the kerberos_master port. </summary> @@ -36161,7 +36245,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41631"> +<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41649"> <summary> Send and receive UDP traffic on the kerberos_master port. </summary> @@ -36172,7 +36256,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41647"> +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41665"> <summary> Do not audit attempts to send and receive UDP traffic on the kerberos_master port. @@ -36184,7 +36268,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41662"> +<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41680"> <summary> Bind TCP sockets to the kerberos_master port. </summary> @@ -36195,7 +36279,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kerberos_master_port" lineno="41682"> +<interface name="corenet_udp_bind_kerberos_master_port" lineno="41700"> <summary> Bind UDP sockets to the kerberos_master port. </summary> @@ -36206,7 +36290,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41701"> +<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41719"> <summary> Make a TCP connection to the kerberos_master port. </summary> @@ -36216,7 +36300,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_master_client_packets" lineno="41721"> +<interface name="corenet_send_kerberos_master_client_packets" lineno="41739"> <summary> Send kerberos_master_client packets. </summary> @@ -36227,7 +36311,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41740"> +<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41758"> <summary> Do not audit attempts to send kerberos_master_client packets. </summary> @@ -36238,7 +36322,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_master_client_packets" lineno="41759"> +<interface name="corenet_receive_kerberos_master_client_packets" lineno="41777"> <summary> Receive kerberos_master_client packets. </summary> @@ -36249,7 +36333,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41778"> +<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41796"> <summary> Do not audit attempts to receive kerberos_master_client packets. </summary> @@ -36260,7 +36344,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41797"> +<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41815"> <summary> Send and receive kerberos_master_client packets. </summary> @@ -36271,7 +36355,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41813"> +<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41831"> <summary> Do not audit attempts to send and receive kerberos_master_client packets. </summary> @@ -36282,7 +36366,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41828"> +<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41846"> <summary> Relabel packets to kerberos_master_client the packet type. </summary> @@ -36292,7 +36376,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_master_server_packets" lineno="41848"> +<interface name="corenet_send_kerberos_master_server_packets" lineno="41866"> <summary> Send kerberos_master_server packets. </summary> @@ -36303,7 +36387,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41867"> +<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41885"> <summary> Do not audit attempts to send kerberos_master_server packets. </summary> @@ -36314,7 +36398,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_master_server_packets" lineno="41886"> +<interface name="corenet_receive_kerberos_master_server_packets" lineno="41904"> <summary> Receive kerberos_master_server packets. </summary> @@ -36325,7 +36409,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41905"> +<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41923"> <summary> Do not audit attempts to receive kerberos_master_server packets. </summary> @@ -36336,7 +36420,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41924"> +<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41942"> <summary> Send and receive kerberos_master_server packets. </summary> @@ -36347,7 +36431,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41940"> +<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41958"> <summary> Do not audit attempts to send and receive kerberos_master_server packets. </summary> @@ -36358,7 +36442,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41955"> +<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41973"> <summary> Relabel packets to kerberos_master_server the packet type. </summary> @@ -36368,7 +36452,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41977"> +<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41995"> <summary> Send and receive TCP traffic on the kismet port. </summary> @@ -36379,7 +36463,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kismet_port" lineno="41992"> +<interface name="corenet_udp_send_kismet_port" lineno="42010"> <summary> Send UDP traffic on the kismet port. </summary> @@ -36390,7 +36474,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42007"> +<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42025"> <summary> Do not audit attempts to send UDP traffic on the kismet port. </summary> @@ -36401,7 +36485,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kismet_port" lineno="42022"> +<interface name="corenet_udp_receive_kismet_port" lineno="42040"> <summary> Receive UDP traffic on the kismet port. </summary> @@ -36412,7 +36496,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42037"> +<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42055"> <summary> Do not audit attempts to receive UDP traffic on the kismet port. </summary> @@ -36423,7 +36507,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kismet_port" lineno="42052"> +<interface name="corenet_udp_sendrecv_kismet_port" lineno="42070"> <summary> Send and receive UDP traffic on the kismet port. </summary> @@ -36434,7 +36518,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42068"> +<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42086"> <summary> Do not audit attempts to send and receive UDP traffic on the kismet port. @@ -36446,7 +36530,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kismet_port" lineno="42083"> +<interface name="corenet_tcp_bind_kismet_port" lineno="42101"> <summary> Bind TCP sockets to the kismet port. </summary> @@ -36457,7 +36541,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kismet_port" lineno="42103"> +<interface name="corenet_udp_bind_kismet_port" lineno="42121"> <summary> Bind UDP sockets to the kismet port. </summary> @@ -36468,7 +36552,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kismet_port" lineno="42122"> +<interface name="corenet_tcp_connect_kismet_port" lineno="42140"> <summary> Make a TCP connection to the kismet port. </summary> @@ -36478,7 +36562,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kismet_client_packets" lineno="42142"> +<interface name="corenet_send_kismet_client_packets" lineno="42160"> <summary> Send kismet_client packets. </summary> @@ -36489,7 +36573,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42161"> +<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42179"> <summary> Do not audit attempts to send kismet_client packets. </summary> @@ -36500,7 +36584,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kismet_client_packets" lineno="42180"> +<interface name="corenet_receive_kismet_client_packets" lineno="42198"> <summary> Receive kismet_client packets. </summary> @@ -36511,7 +36595,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42199"> +<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42217"> <summary> Do not audit attempts to receive kismet_client packets. </summary> @@ -36522,7 +36606,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kismet_client_packets" lineno="42218"> +<interface name="corenet_sendrecv_kismet_client_packets" lineno="42236"> <summary> Send and receive kismet_client packets. </summary> @@ -36533,7 +36617,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42234"> +<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42252"> <summary> Do not audit attempts to send and receive kismet_client packets. </summary> @@ -36544,7 +36628,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kismet_client_packets" lineno="42249"> +<interface name="corenet_relabelto_kismet_client_packets" lineno="42267"> <summary> Relabel packets to kismet_client the packet type. </summary> @@ -36554,7 +36638,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kismet_server_packets" lineno="42269"> +<interface name="corenet_send_kismet_server_packets" lineno="42287"> <summary> Send kismet_server packets. </summary> @@ -36565,7 +36649,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42288"> +<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42306"> <summary> Do not audit attempts to send kismet_server packets. </summary> @@ -36576,7 +36660,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kismet_server_packets" lineno="42307"> +<interface name="corenet_receive_kismet_server_packets" lineno="42325"> <summary> Receive kismet_server packets. </summary> @@ -36587,7 +36671,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42326"> +<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42344"> <summary> Do not audit attempts to receive kismet_server packets. </summary> @@ -36598,7 +36682,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kismet_server_packets" lineno="42345"> +<interface name="corenet_sendrecv_kismet_server_packets" lineno="42363"> <summary> Send and receive kismet_server packets. </summary> @@ -36609,7 +36693,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42361"> +<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42379"> <summary> Do not audit attempts to send and receive kismet_server packets. </summary> @@ -36620,7 +36704,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kismet_server_packets" lineno="42376"> +<interface name="corenet_relabelto_kismet_server_packets" lineno="42394"> <summary> Relabel packets to kismet_server the packet type. </summary> @@ -36630,7 +36714,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42398"> +<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42416"> <summary> Send and receive TCP traffic on the kdeconnect port. </summary> @@ -36641,7 +36725,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kdeconnect_port" lineno="42413"> +<interface name="corenet_udp_send_kdeconnect_port" lineno="42431"> <summary> Send UDP traffic on the kdeconnect port. </summary> @@ -36652,7 +36736,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42428"> +<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42446"> <summary> Do not audit attempts to send UDP traffic on the kdeconnect port. </summary> @@ -36663,7 +36747,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kdeconnect_port" lineno="42443"> +<interface name="corenet_udp_receive_kdeconnect_port" lineno="42461"> <summary> Receive UDP traffic on the kdeconnect port. </summary> @@ -36674,7 +36758,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42458"> +<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42476"> <summary> Do not audit attempts to receive UDP traffic on the kdeconnect port. </summary> @@ -36685,7 +36769,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42473"> +<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42491"> <summary> Send and receive UDP traffic on the kdeconnect port. </summary> @@ -36696,7 +36780,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42489"> +<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42507"> <summary> Do not audit attempts to send and receive UDP traffic on the kdeconnect port. @@ -36708,7 +36792,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42504"> +<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42522"> <summary> Bind TCP sockets to the kdeconnect port. </summary> @@ -36719,7 +36803,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kdeconnect_port" lineno="42524"> +<interface name="corenet_udp_bind_kdeconnect_port" lineno="42542"> <summary> Bind UDP sockets to the kdeconnect port. </summary> @@ -36730,7 +36814,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42543"> +<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42561"> <summary> Make a TCP connection to the kdeconnect port. </summary> @@ -36740,7 +36824,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kdeconnect_client_packets" lineno="42563"> +<interface name="corenet_send_kdeconnect_client_packets" lineno="42581"> <summary> Send kdeconnect_client packets. </summary> @@ -36751,7 +36835,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42582"> +<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42600"> <summary> Do not audit attempts to send kdeconnect_client packets. </summary> @@ -36762,7 +36846,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kdeconnect_client_packets" lineno="42601"> +<interface name="corenet_receive_kdeconnect_client_packets" lineno="42619"> <summary> Receive kdeconnect_client packets. </summary> @@ -36773,7 +36857,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42620"> +<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42638"> <summary> Do not audit attempts to receive kdeconnect_client packets. </summary> @@ -36784,7 +36868,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42639"> +<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42657"> <summary> Send and receive kdeconnect_client packets. </summary> @@ -36795,7 +36879,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42655"> +<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42673"> <summary> Do not audit attempts to send and receive kdeconnect_client packets. </summary> @@ -36806,7 +36890,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42670"> +<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42688"> <summary> Relabel packets to kdeconnect_client the packet type. </summary> @@ -36816,7 +36900,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kdeconnect_server_packets" lineno="42690"> +<interface name="corenet_send_kdeconnect_server_packets" lineno="42708"> <summary> Send kdeconnect_server packets. </summary> @@ -36827,7 +36911,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42709"> +<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42727"> <summary> Do not audit attempts to send kdeconnect_server packets. </summary> @@ -36838,7 +36922,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kdeconnect_server_packets" lineno="42728"> +<interface name="corenet_receive_kdeconnect_server_packets" lineno="42746"> <summary> Receive kdeconnect_server packets. </summary> @@ -36849,7 +36933,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42747"> +<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42765"> <summary> Do not audit attempts to receive kdeconnect_server packets. </summary> @@ -36860,7 +36944,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42766"> +<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42784"> <summary> Send and receive kdeconnect_server packets. </summary> @@ -36871,7 +36955,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42782"> +<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42800"> <summary> Do not audit attempts to send and receive kdeconnect_server packets. </summary> @@ -36882,7 +36966,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42797"> +<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42815"> <summary> Relabel packets to kdeconnect_server the packet type. </summary> @@ -36892,7 +36976,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42819"> +<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42837"> <summary> Send and receive TCP traffic on the kprop port. </summary> @@ -36903,7 +36987,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_kprop_port" lineno="42834"> +<interface name="corenet_udp_send_kprop_port" lineno="42852"> <summary> Send UDP traffic on the kprop port. </summary> @@ -36914,7 +36998,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42849"> +<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42867"> <summary> Do not audit attempts to send UDP traffic on the kprop port. </summary> @@ -36925,7 +37009,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_kprop_port" lineno="42864"> +<interface name="corenet_udp_receive_kprop_port" lineno="42882"> <summary> Receive UDP traffic on the kprop port. </summary> @@ -36936,7 +37020,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42879"> +<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42897"> <summary> Do not audit attempts to receive UDP traffic on the kprop port. </summary> @@ -36947,7 +37031,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_kprop_port" lineno="42894"> +<interface name="corenet_udp_sendrecv_kprop_port" lineno="42912"> <summary> Send and receive UDP traffic on the kprop port. </summary> @@ -36958,7 +37042,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42910"> +<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42928"> <summary> Do not audit attempts to send and receive UDP traffic on the kprop port. @@ -36970,7 +37054,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_kprop_port" lineno="42925"> +<interface name="corenet_tcp_bind_kprop_port" lineno="42943"> <summary> Bind TCP sockets to the kprop port. </summary> @@ -36981,7 +37065,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kprop_port" lineno="42945"> +<interface name="corenet_udp_bind_kprop_port" lineno="42963"> <summary> Bind UDP sockets to the kprop port. </summary> @@ -36992,7 +37076,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kprop_port" lineno="42964"> +<interface name="corenet_tcp_connect_kprop_port" lineno="42982"> <summary> Make a TCP connection to the kprop port. </summary> @@ -37002,7 +37086,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kprop_client_packets" lineno="42984"> +<interface name="corenet_send_kprop_client_packets" lineno="43002"> <summary> Send kprop_client packets. </summary> @@ -37013,7 +37097,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43003"> +<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43021"> <summary> Do not audit attempts to send kprop_client packets. </summary> @@ -37024,7 +37108,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kprop_client_packets" lineno="43022"> +<interface name="corenet_receive_kprop_client_packets" lineno="43040"> <summary> Receive kprop_client packets. </summary> @@ -37035,7 +37119,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43041"> +<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43059"> <summary> Do not audit attempts to receive kprop_client packets. </summary> @@ -37046,7 +37130,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kprop_client_packets" lineno="43060"> +<interface name="corenet_sendrecv_kprop_client_packets" lineno="43078"> <summary> Send and receive kprop_client packets. </summary> @@ -37057,7 +37141,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43076"> +<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43094"> <summary> Do not audit attempts to send and receive kprop_client packets. </summary> @@ -37068,7 +37152,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kprop_client_packets" lineno="43091"> +<interface name="corenet_relabelto_kprop_client_packets" lineno="43109"> <summary> Relabel packets to kprop_client the packet type. </summary> @@ -37078,7 +37162,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kprop_server_packets" lineno="43111"> +<interface name="corenet_send_kprop_server_packets" lineno="43129"> <summary> Send kprop_server packets. </summary> @@ -37089,7 +37173,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43130"> +<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43148"> <summary> Do not audit attempts to send kprop_server packets. </summary> @@ -37100,7 +37184,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kprop_server_packets" lineno="43149"> +<interface name="corenet_receive_kprop_server_packets" lineno="43167"> <summary> Receive kprop_server packets. </summary> @@ -37111,7 +37195,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43168"> +<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43186"> <summary> Do not audit attempts to receive kprop_server packets. </summary> @@ -37122,7 +37206,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kprop_server_packets" lineno="43187"> +<interface name="corenet_sendrecv_kprop_server_packets" lineno="43205"> <summary> Send and receive kprop_server packets. </summary> @@ -37133,7 +37217,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43203"> +<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43221"> <summary> Do not audit attempts to send and receive kprop_server packets. </summary> @@ -37144,7 +37228,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kprop_server_packets" lineno="43218"> +<interface name="corenet_relabelto_kprop_server_packets" lineno="43236"> <summary> Relabel packets to kprop_server the packet type. </summary> @@ -37154,7 +37238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43240"> +<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43258"> <summary> Send and receive TCP traffic on the ktalkd port. </summary> @@ -37165,7 +37249,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ktalkd_port" lineno="43255"> +<interface name="corenet_udp_send_ktalkd_port" lineno="43273"> <summary> Send UDP traffic on the ktalkd port. </summary> @@ -37176,7 +37260,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43270"> +<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43288"> <summary> Do not audit attempts to send UDP traffic on the ktalkd port. </summary> @@ -37187,7 +37271,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ktalkd_port" lineno="43285"> +<interface name="corenet_udp_receive_ktalkd_port" lineno="43303"> <summary> Receive UDP traffic on the ktalkd port. </summary> @@ -37198,7 +37282,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43300"> +<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43318"> <summary> Do not audit attempts to receive UDP traffic on the ktalkd port. </summary> @@ -37209,7 +37293,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43315"> +<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43333"> <summary> Send and receive UDP traffic on the ktalkd port. </summary> @@ -37220,7 +37304,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43331"> +<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43349"> <summary> Do not audit attempts to send and receive UDP traffic on the ktalkd port. @@ -37232,7 +37316,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ktalkd_port" lineno="43346"> +<interface name="corenet_tcp_bind_ktalkd_port" lineno="43364"> <summary> Bind TCP sockets to the ktalkd port. </summary> @@ -37243,7 +37327,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ktalkd_port" lineno="43366"> +<interface name="corenet_udp_bind_ktalkd_port" lineno="43384"> <summary> Bind UDP sockets to the ktalkd port. </summary> @@ -37254,7 +37338,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ktalkd_port" lineno="43385"> +<interface name="corenet_tcp_connect_ktalkd_port" lineno="43403"> <summary> Make a TCP connection to the ktalkd port. </summary> @@ -37264,7 +37348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ktalkd_client_packets" lineno="43405"> +<interface name="corenet_send_ktalkd_client_packets" lineno="43423"> <summary> Send ktalkd_client packets. </summary> @@ -37275,7 +37359,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43424"> +<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43442"> <summary> Do not audit attempts to send ktalkd_client packets. </summary> @@ -37286,7 +37370,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ktalkd_client_packets" lineno="43443"> +<interface name="corenet_receive_ktalkd_client_packets" lineno="43461"> <summary> Receive ktalkd_client packets. </summary> @@ -37297,7 +37381,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43462"> +<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43480"> <summary> Do not audit attempts to receive ktalkd_client packets. </summary> @@ -37308,7 +37392,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43481"> +<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43499"> <summary> Send and receive ktalkd_client packets. </summary> @@ -37319,7 +37403,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43497"> +<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43515"> <summary> Do not audit attempts to send and receive ktalkd_client packets. </summary> @@ -37330,7 +37414,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43512"> +<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43530"> <summary> Relabel packets to ktalkd_client the packet type. </summary> @@ -37340,7 +37424,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ktalkd_server_packets" lineno="43532"> +<interface name="corenet_send_ktalkd_server_packets" lineno="43550"> <summary> Send ktalkd_server packets. </summary> @@ -37351,7 +37435,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43551"> +<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43569"> <summary> Do not audit attempts to send ktalkd_server packets. </summary> @@ -37362,7 +37446,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ktalkd_server_packets" lineno="43570"> +<interface name="corenet_receive_ktalkd_server_packets" lineno="43588"> <summary> Receive ktalkd_server packets. </summary> @@ -37373,7 +37457,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43589"> +<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43607"> <summary> Do not audit attempts to receive ktalkd_server packets. </summary> @@ -37384,7 +37468,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43608"> +<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43626"> <summary> Send and receive ktalkd_server packets. </summary> @@ -37395,7 +37479,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43624"> +<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43642"> <summary> Do not audit attempts to send and receive ktalkd_server packets. </summary> @@ -37406,7 +37490,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43639"> +<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43657"> <summary> Relabel packets to ktalkd_server the packet type. </summary> @@ -37416,7 +37500,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43661"> +<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43679"> <summary> Send and receive TCP traffic on the l2tp port. </summary> @@ -37427,7 +37511,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_l2tp_port" lineno="43676"> +<interface name="corenet_udp_send_l2tp_port" lineno="43694"> <summary> Send UDP traffic on the l2tp port. </summary> @@ -37438,7 +37522,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43691"> +<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43709"> <summary> Do not audit attempts to send UDP traffic on the l2tp port. </summary> @@ -37449,7 +37533,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_l2tp_port" lineno="43706"> +<interface name="corenet_udp_receive_l2tp_port" lineno="43724"> <summary> Receive UDP traffic on the l2tp port. </summary> @@ -37460,7 +37544,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43721"> +<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43739"> <summary> Do not audit attempts to receive UDP traffic on the l2tp port. </summary> @@ -37471,7 +37555,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43736"> +<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43754"> <summary> Send and receive UDP traffic on the l2tp port. </summary> @@ -37482,7 +37566,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43752"> +<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43770"> <summary> Do not audit attempts to send and receive UDP traffic on the l2tp port. @@ -37494,7 +37578,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_l2tp_port" lineno="43767"> +<interface name="corenet_tcp_bind_l2tp_port" lineno="43785"> <summary> Bind TCP sockets to the l2tp port. </summary> @@ -37505,7 +37589,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_l2tp_port" lineno="43787"> +<interface name="corenet_udp_bind_l2tp_port" lineno="43805"> <summary> Bind UDP sockets to the l2tp port. </summary> @@ -37516,7 +37600,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_l2tp_port" lineno="43806"> +<interface name="corenet_tcp_connect_l2tp_port" lineno="43824"> <summary> Make a TCP connection to the l2tp port. </summary> @@ -37526,7 +37610,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_l2tp_client_packets" lineno="43826"> +<interface name="corenet_send_l2tp_client_packets" lineno="43844"> <summary> Send l2tp_client packets. </summary> @@ -37537,7 +37621,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43845"> +<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43863"> <summary> Do not audit attempts to send l2tp_client packets. </summary> @@ -37548,7 +37632,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_l2tp_client_packets" lineno="43864"> +<interface name="corenet_receive_l2tp_client_packets" lineno="43882"> <summary> Receive l2tp_client packets. </summary> @@ -37559,7 +37643,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43883"> +<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43901"> <summary> Do not audit attempts to receive l2tp_client packets. </summary> @@ -37570,7 +37654,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43902"> +<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43920"> <summary> Send and receive l2tp_client packets. </summary> @@ -37581,7 +37665,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43918"> +<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43936"> <summary> Do not audit attempts to send and receive l2tp_client packets. </summary> @@ -37592,7 +37676,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_l2tp_client_packets" lineno="43933"> +<interface name="corenet_relabelto_l2tp_client_packets" lineno="43951"> <summary> Relabel packets to l2tp_client the packet type. </summary> @@ -37602,7 +37686,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_l2tp_server_packets" lineno="43953"> +<interface name="corenet_send_l2tp_server_packets" lineno="43971"> <summary> Send l2tp_server packets. </summary> @@ -37613,7 +37697,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43972"> +<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43990"> <summary> Do not audit attempts to send l2tp_server packets. </summary> @@ -37624,7 +37708,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_l2tp_server_packets" lineno="43991"> +<interface name="corenet_receive_l2tp_server_packets" lineno="44009"> <summary> Receive l2tp_server packets. </summary> @@ -37635,7 +37719,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44010"> +<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44028"> <summary> Do not audit attempts to receive l2tp_server packets. </summary> @@ -37646,7 +37730,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44029"> +<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44047"> <summary> Send and receive l2tp_server packets. </summary> @@ -37657,7 +37741,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44045"> +<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44063"> <summary> Do not audit attempts to send and receive l2tp_server packets. </summary> @@ -37668,7 +37752,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_l2tp_server_packets" lineno="44060"> +<interface name="corenet_relabelto_l2tp_server_packets" lineno="44078"> <summary> Relabel packets to l2tp_server the packet type. </summary> @@ -37678,7 +37762,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44082"> +<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44100"> <summary> Send and receive TCP traffic on the ldap port. </summary> @@ -37689,7 +37773,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ldap_port" lineno="44097"> +<interface name="corenet_udp_send_ldap_port" lineno="44115"> <summary> Send UDP traffic on the ldap port. </summary> @@ -37700,7 +37784,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44112"> +<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44130"> <summary> Do not audit attempts to send UDP traffic on the ldap port. </summary> @@ -37711,7 +37795,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ldap_port" lineno="44127"> +<interface name="corenet_udp_receive_ldap_port" lineno="44145"> <summary> Receive UDP traffic on the ldap port. </summary> @@ -37722,7 +37806,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44142"> +<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44160"> <summary> Do not audit attempts to receive UDP traffic on the ldap port. </summary> @@ -37733,7 +37817,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ldap_port" lineno="44157"> +<interface name="corenet_udp_sendrecv_ldap_port" lineno="44175"> <summary> Send and receive UDP traffic on the ldap port. </summary> @@ -37744,7 +37828,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44173"> +<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44191"> <summary> Do not audit attempts to send and receive UDP traffic on the ldap port. @@ -37756,7 +37840,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ldap_port" lineno="44188"> +<interface name="corenet_tcp_bind_ldap_port" lineno="44206"> <summary> Bind TCP sockets to the ldap port. </summary> @@ -37767,7 +37851,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ldap_port" lineno="44208"> +<interface name="corenet_udp_bind_ldap_port" lineno="44226"> <summary> Bind UDP sockets to the ldap port. </summary> @@ -37778,7 +37862,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ldap_port" lineno="44227"> +<interface name="corenet_tcp_connect_ldap_port" lineno="44245"> <summary> Make a TCP connection to the ldap port. </summary> @@ -37788,7 +37872,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ldap_client_packets" lineno="44247"> +<interface name="corenet_send_ldap_client_packets" lineno="44265"> <summary> Send ldap_client packets. </summary> @@ -37799,7 +37883,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44266"> +<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44284"> <summary> Do not audit attempts to send ldap_client packets. </summary> @@ -37810,7 +37894,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ldap_client_packets" lineno="44285"> +<interface name="corenet_receive_ldap_client_packets" lineno="44303"> <summary> Receive ldap_client packets. </summary> @@ -37821,7 +37905,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44304"> +<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44322"> <summary> Do not audit attempts to receive ldap_client packets. </summary> @@ -37832,7 +37916,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ldap_client_packets" lineno="44323"> +<interface name="corenet_sendrecv_ldap_client_packets" lineno="44341"> <summary> Send and receive ldap_client packets. </summary> @@ -37843,7 +37927,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44339"> +<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44357"> <summary> Do not audit attempts to send and receive ldap_client packets. </summary> @@ -37854,7 +37938,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ldap_client_packets" lineno="44354"> +<interface name="corenet_relabelto_ldap_client_packets" lineno="44372"> <summary> Relabel packets to ldap_client the packet type. </summary> @@ -37864,7 +37948,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ldap_server_packets" lineno="44374"> +<interface name="corenet_send_ldap_server_packets" lineno="44392"> <summary> Send ldap_server packets. </summary> @@ -37875,7 +37959,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44393"> +<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44411"> <summary> Do not audit attempts to send ldap_server packets. </summary> @@ -37886,7 +37970,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ldap_server_packets" lineno="44412"> +<interface name="corenet_receive_ldap_server_packets" lineno="44430"> <summary> Receive ldap_server packets. </summary> @@ -37897,7 +37981,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44431"> +<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44449"> <summary> Do not audit attempts to receive ldap_server packets. </summary> @@ -37908,7 +37992,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ldap_server_packets" lineno="44450"> +<interface name="corenet_sendrecv_ldap_server_packets" lineno="44468"> <summary> Send and receive ldap_server packets. </summary> @@ -37919,7 +38003,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44466"> +<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44484"> <summary> Do not audit attempts to send and receive ldap_server packets. </summary> @@ -37930,7 +38014,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ldap_server_packets" lineno="44481"> +<interface name="corenet_relabelto_ldap_server_packets" lineno="44499"> <summary> Relabel packets to ldap_server the packet type. </summary> @@ -37940,7 +38024,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44503"> +<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44521"> <summary> Send and receive TCP traffic on the lirc port. </summary> @@ -37951,7 +38035,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_lirc_port" lineno="44518"> +<interface name="corenet_udp_send_lirc_port" lineno="44536"> <summary> Send UDP traffic on the lirc port. </summary> @@ -37962,7 +38046,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44533"> +<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44551"> <summary> Do not audit attempts to send UDP traffic on the lirc port. </summary> @@ -37973,7 +38057,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_lirc_port" lineno="44548"> +<interface name="corenet_udp_receive_lirc_port" lineno="44566"> <summary> Receive UDP traffic on the lirc port. </summary> @@ -37984,7 +38068,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44563"> +<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44581"> <summary> Do not audit attempts to receive UDP traffic on the lirc port. </summary> @@ -37995,7 +38079,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_lirc_port" lineno="44578"> +<interface name="corenet_udp_sendrecv_lirc_port" lineno="44596"> <summary> Send and receive UDP traffic on the lirc port. </summary> @@ -38006,7 +38090,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44594"> +<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44612"> <summary> Do not audit attempts to send and receive UDP traffic on the lirc port. @@ -38018,7 +38102,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_lirc_port" lineno="44609"> +<interface name="corenet_tcp_bind_lirc_port" lineno="44627"> <summary> Bind TCP sockets to the lirc port. </summary> @@ -38029,7 +38113,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_lirc_port" lineno="44629"> +<interface name="corenet_udp_bind_lirc_port" lineno="44647"> <summary> Bind UDP sockets to the lirc port. </summary> @@ -38040,7 +38124,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_lirc_port" lineno="44648"> +<interface name="corenet_tcp_connect_lirc_port" lineno="44666"> <summary> Make a TCP connection to the lirc port. </summary> @@ -38050,7 +38134,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lirc_client_packets" lineno="44668"> +<interface name="corenet_send_lirc_client_packets" lineno="44686"> <summary> Send lirc_client packets. </summary> @@ -38061,7 +38145,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44687"> +<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44705"> <summary> Do not audit attempts to send lirc_client packets. </summary> @@ -38072,7 +38156,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lirc_client_packets" lineno="44706"> +<interface name="corenet_receive_lirc_client_packets" lineno="44724"> <summary> Receive lirc_client packets. </summary> @@ -38083,7 +38167,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44725"> +<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44743"> <summary> Do not audit attempts to receive lirc_client packets. </summary> @@ -38094,7 +38178,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lirc_client_packets" lineno="44744"> +<interface name="corenet_sendrecv_lirc_client_packets" lineno="44762"> <summary> Send and receive lirc_client packets. </summary> @@ -38105,7 +38189,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44760"> +<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44778"> <summary> Do not audit attempts to send and receive lirc_client packets. </summary> @@ -38116,7 +38200,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lirc_client_packets" lineno="44775"> +<interface name="corenet_relabelto_lirc_client_packets" lineno="44793"> <summary> Relabel packets to lirc_client the packet type. </summary> @@ -38126,7 +38210,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lirc_server_packets" lineno="44795"> +<interface name="corenet_send_lirc_server_packets" lineno="44813"> <summary> Send lirc_server packets. </summary> @@ -38137,7 +38221,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44814"> +<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44832"> <summary> Do not audit attempts to send lirc_server packets. </summary> @@ -38148,7 +38232,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lirc_server_packets" lineno="44833"> +<interface name="corenet_receive_lirc_server_packets" lineno="44851"> <summary> Receive lirc_server packets. </summary> @@ -38159,7 +38243,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44852"> +<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44870"> <summary> Do not audit attempts to receive lirc_server packets. </summary> @@ -38170,7 +38254,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lirc_server_packets" lineno="44871"> +<interface name="corenet_sendrecv_lirc_server_packets" lineno="44889"> <summary> Send and receive lirc_server packets. </summary> @@ -38181,7 +38265,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44887"> +<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44905"> <summary> Do not audit attempts to send and receive lirc_server packets. </summary> @@ -38192,7 +38276,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lirc_server_packets" lineno="44902"> +<interface name="corenet_relabelto_lirc_server_packets" lineno="44920"> <summary> Relabel packets to lirc_server the packet type. </summary> @@ -38202,7 +38286,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44924"> +<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44942"> <summary> Send and receive TCP traffic on the llmnr port. </summary> @@ -38213,7 +38297,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_llmnr_port" lineno="44939"> +<interface name="corenet_udp_send_llmnr_port" lineno="44957"> <summary> Send UDP traffic on the llmnr port. </summary> @@ -38224,7 +38308,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44954"> +<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44972"> <summary> Do not audit attempts to send UDP traffic on the llmnr port. </summary> @@ -38235,7 +38319,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_llmnr_port" lineno="44969"> +<interface name="corenet_udp_receive_llmnr_port" lineno="44987"> <summary> Receive UDP traffic on the llmnr port. </summary> @@ -38246,7 +38330,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44984"> +<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="45002"> <summary> Do not audit attempts to receive UDP traffic on the llmnr port. </summary> @@ -38257,7 +38341,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44999"> +<interface name="corenet_udp_sendrecv_llmnr_port" lineno="45017"> <summary> Send and receive UDP traffic on the llmnr port. </summary> @@ -38268,7 +38352,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45015"> +<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45033"> <summary> Do not audit attempts to send and receive UDP traffic on the llmnr port. @@ -38280,7 +38364,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_llmnr_port" lineno="45030"> +<interface name="corenet_tcp_bind_llmnr_port" lineno="45048"> <summary> Bind TCP sockets to the llmnr port. </summary> @@ -38291,7 +38375,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_llmnr_port" lineno="45050"> +<interface name="corenet_udp_bind_llmnr_port" lineno="45068"> <summary> Bind UDP sockets to the llmnr port. </summary> @@ -38302,7 +38386,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_llmnr_port" lineno="45069"> +<interface name="corenet_tcp_connect_llmnr_port" lineno="45087"> <summary> Make a TCP connection to the llmnr port. </summary> @@ -38312,7 +38396,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_llmnr_client_packets" lineno="45089"> +<interface name="corenet_send_llmnr_client_packets" lineno="45107"> <summary> Send llmnr_client packets. </summary> @@ -38323,7 +38407,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45108"> +<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45126"> <summary> Do not audit attempts to send llmnr_client packets. </summary> @@ -38334,7 +38418,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_llmnr_client_packets" lineno="45127"> +<interface name="corenet_receive_llmnr_client_packets" lineno="45145"> <summary> Receive llmnr_client packets. </summary> @@ -38345,7 +38429,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45146"> +<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45164"> <summary> Do not audit attempts to receive llmnr_client packets. </summary> @@ -38356,7 +38440,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45165"> +<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45183"> <summary> Send and receive llmnr_client packets. </summary> @@ -38367,7 +38451,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45181"> +<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45199"> <summary> Do not audit attempts to send and receive llmnr_client packets. </summary> @@ -38378,7 +38462,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_llmnr_client_packets" lineno="45196"> +<interface name="corenet_relabelto_llmnr_client_packets" lineno="45214"> <summary> Relabel packets to llmnr_client the packet type. </summary> @@ -38388,7 +38472,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_llmnr_server_packets" lineno="45216"> +<interface name="corenet_send_llmnr_server_packets" lineno="45234"> <summary> Send llmnr_server packets. </summary> @@ -38399,7 +38483,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45235"> +<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45253"> <summary> Do not audit attempts to send llmnr_server packets. </summary> @@ -38410,7 +38494,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_llmnr_server_packets" lineno="45254"> +<interface name="corenet_receive_llmnr_server_packets" lineno="45272"> <summary> Receive llmnr_server packets. </summary> @@ -38421,7 +38505,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45273"> +<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45291"> <summary> Do not audit attempts to receive llmnr_server packets. </summary> @@ -38432,7 +38516,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45292"> +<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45310"> <summary> Send and receive llmnr_server packets. </summary> @@ -38443,7 +38527,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45308"> +<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45326"> <summary> Do not audit attempts to send and receive llmnr_server packets. </summary> @@ -38454,7 +38538,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_llmnr_server_packets" lineno="45323"> +<interface name="corenet_relabelto_llmnr_server_packets" lineno="45341"> <summary> Relabel packets to llmnr_server the packet type. </summary> @@ -38464,7 +38548,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45345"> +<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45363"> <summary> Send and receive TCP traffic on the lmtp port. </summary> @@ -38475,7 +38559,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_lmtp_port" lineno="45360"> +<interface name="corenet_udp_send_lmtp_port" lineno="45378"> <summary> Send UDP traffic on the lmtp port. </summary> @@ -38486,7 +38570,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45375"> +<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45393"> <summary> Do not audit attempts to send UDP traffic on the lmtp port. </summary> @@ -38497,7 +38581,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_lmtp_port" lineno="45390"> +<interface name="corenet_udp_receive_lmtp_port" lineno="45408"> <summary> Receive UDP traffic on the lmtp port. </summary> @@ -38508,7 +38592,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45405"> +<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45423"> <summary> Do not audit attempts to receive UDP traffic on the lmtp port. </summary> @@ -38519,7 +38603,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45420"> +<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45438"> <summary> Send and receive UDP traffic on the lmtp port. </summary> @@ -38530,7 +38614,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45436"> +<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45454"> <summary> Do not audit attempts to send and receive UDP traffic on the lmtp port. @@ -38542,7 +38626,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_lmtp_port" lineno="45451"> +<interface name="corenet_tcp_bind_lmtp_port" lineno="45469"> <summary> Bind TCP sockets to the lmtp port. </summary> @@ -38553,7 +38637,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_lmtp_port" lineno="45471"> +<interface name="corenet_udp_bind_lmtp_port" lineno="45489"> <summary> Bind UDP sockets to the lmtp port. </summary> @@ -38564,7 +38648,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_lmtp_port" lineno="45490"> +<interface name="corenet_tcp_connect_lmtp_port" lineno="45508"> <summary> Make a TCP connection to the lmtp port. </summary> @@ -38574,7 +38658,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lmtp_client_packets" lineno="45510"> +<interface name="corenet_send_lmtp_client_packets" lineno="45528"> <summary> Send lmtp_client packets. </summary> @@ -38585,7 +38669,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45529"> +<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45547"> <summary> Do not audit attempts to send lmtp_client packets. </summary> @@ -38596,7 +38680,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lmtp_client_packets" lineno="45548"> +<interface name="corenet_receive_lmtp_client_packets" lineno="45566"> <summary> Receive lmtp_client packets. </summary> @@ -38607,7 +38691,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45567"> +<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45585"> <summary> Do not audit attempts to receive lmtp_client packets. </summary> @@ -38618,7 +38702,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45586"> +<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45604"> <summary> Send and receive lmtp_client packets. </summary> @@ -38629,7 +38713,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45602"> +<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45620"> <summary> Do not audit attempts to send and receive lmtp_client packets. </summary> @@ -38640,7 +38724,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lmtp_client_packets" lineno="45617"> +<interface name="corenet_relabelto_lmtp_client_packets" lineno="45635"> <summary> Relabel packets to lmtp_client the packet type. </summary> @@ -38650,7 +38734,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lmtp_server_packets" lineno="45637"> +<interface name="corenet_send_lmtp_server_packets" lineno="45655"> <summary> Send lmtp_server packets. </summary> @@ -38661,7 +38745,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45656"> +<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45674"> <summary> Do not audit attempts to send lmtp_server packets. </summary> @@ -38672,7 +38756,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lmtp_server_packets" lineno="45675"> +<interface name="corenet_receive_lmtp_server_packets" lineno="45693"> <summary> Receive lmtp_server packets. </summary> @@ -38683,7 +38767,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45694"> +<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45712"> <summary> Do not audit attempts to receive lmtp_server packets. </summary> @@ -38694,7 +38778,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45713"> +<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45731"> <summary> Send and receive lmtp_server packets. </summary> @@ -38705,7 +38789,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45729"> +<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45747"> <summary> Do not audit attempts to send and receive lmtp_server packets. </summary> @@ -38716,7 +38800,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lmtp_server_packets" lineno="45744"> +<interface name="corenet_relabelto_lmtp_server_packets" lineno="45762"> <summary> Relabel packets to lmtp_server the packet type. </summary> @@ -38726,7 +38810,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45766"> +<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45784"> <summary> Send and receive TCP traffic on the lrrd port. </summary> @@ -38737,7 +38821,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_lrrd_port" lineno="45781"> +<interface name="corenet_udp_send_lrrd_port" lineno="45799"> <summary> Send UDP traffic on the lrrd port. </summary> @@ -38748,7 +38832,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45796"> +<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45814"> <summary> Do not audit attempts to send UDP traffic on the lrrd port. </summary> @@ -38759,7 +38843,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_lrrd_port" lineno="45811"> +<interface name="corenet_udp_receive_lrrd_port" lineno="45829"> <summary> Receive UDP traffic on the lrrd port. </summary> @@ -38770,7 +38854,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45826"> +<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45844"> <summary> Do not audit attempts to receive UDP traffic on the lrrd port. </summary> @@ -38781,7 +38865,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45841"> +<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45859"> <summary> Send and receive UDP traffic on the lrrd port. </summary> @@ -38792,7 +38876,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45857"> +<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45875"> <summary> Do not audit attempts to send and receive UDP traffic on the lrrd port. @@ -38804,7 +38888,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_lrrd_port" lineno="45872"> +<interface name="corenet_tcp_bind_lrrd_port" lineno="45890"> <summary> Bind TCP sockets to the lrrd port. </summary> @@ -38815,7 +38899,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_lrrd_port" lineno="45892"> +<interface name="corenet_udp_bind_lrrd_port" lineno="45910"> <summary> Bind UDP sockets to the lrrd port. </summary> @@ -38826,7 +38910,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_lrrd_port" lineno="45911"> +<interface name="corenet_tcp_connect_lrrd_port" lineno="45929"> <summary> Make a TCP connection to the lrrd port. </summary> @@ -38836,7 +38920,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lrrd_client_packets" lineno="45931"> +<interface name="corenet_send_lrrd_client_packets" lineno="45949"> <summary> Send lrrd_client packets. </summary> @@ -38847,7 +38931,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45950"> +<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45968"> <summary> Do not audit attempts to send lrrd_client packets. </summary> @@ -38858,7 +38942,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lrrd_client_packets" lineno="45969"> +<interface name="corenet_receive_lrrd_client_packets" lineno="45987"> <summary> Receive lrrd_client packets. </summary> @@ -38869,7 +38953,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45988"> +<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="46006"> <summary> Do not audit attempts to receive lrrd_client packets. </summary> @@ -38880,7 +38964,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46007"> +<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46025"> <summary> Send and receive lrrd_client packets. </summary> @@ -38891,7 +38975,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46023"> +<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46041"> <summary> Do not audit attempts to send and receive lrrd_client packets. </summary> @@ -38902,7 +38986,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lrrd_client_packets" lineno="46038"> +<interface name="corenet_relabelto_lrrd_client_packets" lineno="46056"> <summary> Relabel packets to lrrd_client the packet type. </summary> @@ -38912,7 +38996,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lrrd_server_packets" lineno="46058"> +<interface name="corenet_send_lrrd_server_packets" lineno="46076"> <summary> Send lrrd_server packets. </summary> @@ -38923,7 +39007,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46077"> +<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46095"> <summary> Do not audit attempts to send lrrd_server packets. </summary> @@ -38934,7 +39018,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lrrd_server_packets" lineno="46096"> +<interface name="corenet_receive_lrrd_server_packets" lineno="46114"> <summary> Receive lrrd_server packets. </summary> @@ -38945,7 +39029,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46115"> +<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46133"> <summary> Do not audit attempts to receive lrrd_server packets. </summary> @@ -38956,7 +39040,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46134"> +<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46152"> <summary> Send and receive lrrd_server packets. </summary> @@ -38967,7 +39051,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46150"> +<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46168"> <summary> Do not audit attempts to send and receive lrrd_server packets. </summary> @@ -38978,7 +39062,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lrrd_server_packets" lineno="46165"> +<interface name="corenet_relabelto_lrrd_server_packets" lineno="46183"> <summary> Relabel packets to lrrd_server the packet type. </summary> @@ -38988,7 +39072,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mail_port" lineno="46187"> +<interface name="corenet_tcp_sendrecv_mail_port" lineno="46205"> <summary> Send and receive TCP traffic on the mail port. </summary> @@ -38999,7 +39083,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mail_port" lineno="46202"> +<interface name="corenet_udp_send_mail_port" lineno="46220"> <summary> Send UDP traffic on the mail port. </summary> @@ -39010,7 +39094,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46217"> +<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46235"> <summary> Do not audit attempts to send UDP traffic on the mail port. </summary> @@ -39021,7 +39105,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mail_port" lineno="46232"> +<interface name="corenet_udp_receive_mail_port" lineno="46250"> <summary> Receive UDP traffic on the mail port. </summary> @@ -39032,7 +39116,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46247"> +<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46265"> <summary> Do not audit attempts to receive UDP traffic on the mail port. </summary> @@ -39043,7 +39127,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mail_port" lineno="46262"> +<interface name="corenet_udp_sendrecv_mail_port" lineno="46280"> <summary> Send and receive UDP traffic on the mail port. </summary> @@ -39054,7 +39138,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46278"> +<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46296"> <summary> Do not audit attempts to send and receive UDP traffic on the mail port. @@ -39066,7 +39150,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mail_port" lineno="46293"> +<interface name="corenet_tcp_bind_mail_port" lineno="46311"> <summary> Bind TCP sockets to the mail port. </summary> @@ -39077,7 +39161,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mail_port" lineno="46313"> +<interface name="corenet_udp_bind_mail_port" lineno="46331"> <summary> Bind UDP sockets to the mail port. </summary> @@ -39088,7 +39172,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mail_port" lineno="46332"> +<interface name="corenet_tcp_connect_mail_port" lineno="46350"> <summary> Make a TCP connection to the mail port. </summary> @@ -39098,7 +39182,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mail_client_packets" lineno="46352"> +<interface name="corenet_send_mail_client_packets" lineno="46370"> <summary> Send mail_client packets. </summary> @@ -39109,7 +39193,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46371"> +<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46389"> <summary> Do not audit attempts to send mail_client packets. </summary> @@ -39120,7 +39204,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mail_client_packets" lineno="46390"> +<interface name="corenet_receive_mail_client_packets" lineno="46408"> <summary> Receive mail_client packets. </summary> @@ -39131,7 +39215,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46409"> +<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46427"> <summary> Do not audit attempts to receive mail_client packets. </summary> @@ -39142,7 +39226,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mail_client_packets" lineno="46428"> +<interface name="corenet_sendrecv_mail_client_packets" lineno="46446"> <summary> Send and receive mail_client packets. </summary> @@ -39153,7 +39237,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46444"> +<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46462"> <summary> Do not audit attempts to send and receive mail_client packets. </summary> @@ -39164,7 +39248,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mail_client_packets" lineno="46459"> +<interface name="corenet_relabelto_mail_client_packets" lineno="46477"> <summary> Relabel packets to mail_client the packet type. </summary> @@ -39174,7 +39258,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mail_server_packets" lineno="46479"> +<interface name="corenet_send_mail_server_packets" lineno="46497"> <summary> Send mail_server packets. </summary> @@ -39185,7 +39269,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46498"> +<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46516"> <summary> Do not audit attempts to send mail_server packets. </summary> @@ -39196,7 +39280,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mail_server_packets" lineno="46517"> +<interface name="corenet_receive_mail_server_packets" lineno="46535"> <summary> Receive mail_server packets. </summary> @@ -39207,7 +39291,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46536"> +<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46554"> <summary> Do not audit attempts to receive mail_server packets. </summary> @@ -39218,7 +39302,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mail_server_packets" lineno="46555"> +<interface name="corenet_sendrecv_mail_server_packets" lineno="46573"> <summary> Send and receive mail_server packets. </summary> @@ -39229,7 +39313,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46571"> +<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46589"> <summary> Do not audit attempts to send and receive mail_server packets. </summary> @@ -39240,7 +39324,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mail_server_packets" lineno="46586"> +<interface name="corenet_relabelto_mail_server_packets" lineno="46604"> <summary> Relabel packets to mail_server the packet type. </summary> @@ -39250,7 +39334,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46608"> +<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46626"> <summary> Send and receive TCP traffic on the matahari port. </summary> @@ -39261,7 +39345,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_matahari_port" lineno="46623"> +<interface name="corenet_udp_send_matahari_port" lineno="46641"> <summary> Send UDP traffic on the matahari port. </summary> @@ -39272,7 +39356,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46638"> +<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46656"> <summary> Do not audit attempts to send UDP traffic on the matahari port. </summary> @@ -39283,7 +39367,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_matahari_port" lineno="46653"> +<interface name="corenet_udp_receive_matahari_port" lineno="46671"> <summary> Receive UDP traffic on the matahari port. </summary> @@ -39294,7 +39378,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46668"> +<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46686"> <summary> Do not audit attempts to receive UDP traffic on the matahari port. </summary> @@ -39305,7 +39389,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_matahari_port" lineno="46683"> +<interface name="corenet_udp_sendrecv_matahari_port" lineno="46701"> <summary> Send and receive UDP traffic on the matahari port. </summary> @@ -39316,7 +39400,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46699"> +<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46717"> <summary> Do not audit attempts to send and receive UDP traffic on the matahari port. @@ -39328,7 +39412,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_matahari_port" lineno="46714"> +<interface name="corenet_tcp_bind_matahari_port" lineno="46732"> <summary> Bind TCP sockets to the matahari port. </summary> @@ -39339,7 +39423,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_matahari_port" lineno="46734"> +<interface name="corenet_udp_bind_matahari_port" lineno="46752"> <summary> Bind UDP sockets to the matahari port. </summary> @@ -39350,7 +39434,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_matahari_port" lineno="46753"> +<interface name="corenet_tcp_connect_matahari_port" lineno="46771"> <summary> Make a TCP connection to the matahari port. </summary> @@ -39360,7 +39444,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_matahari_client_packets" lineno="46773"> +<interface name="corenet_send_matahari_client_packets" lineno="46791"> <summary> Send matahari_client packets. </summary> @@ -39371,7 +39455,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46792"> +<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46810"> <summary> Do not audit attempts to send matahari_client packets. </summary> @@ -39382,7 +39466,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_matahari_client_packets" lineno="46811"> +<interface name="corenet_receive_matahari_client_packets" lineno="46829"> <summary> Receive matahari_client packets. </summary> @@ -39393,7 +39477,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46830"> +<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46848"> <summary> Do not audit attempts to receive matahari_client packets. </summary> @@ -39404,7 +39488,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_matahari_client_packets" lineno="46849"> +<interface name="corenet_sendrecv_matahari_client_packets" lineno="46867"> <summary> Send and receive matahari_client packets. </summary> @@ -39415,7 +39499,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46865"> +<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46883"> <summary> Do not audit attempts to send and receive matahari_client packets. </summary> @@ -39426,7 +39510,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_matahari_client_packets" lineno="46880"> +<interface name="corenet_relabelto_matahari_client_packets" lineno="46898"> <summary> Relabel packets to matahari_client the packet type. </summary> @@ -39436,7 +39520,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_matahari_server_packets" lineno="46900"> +<interface name="corenet_send_matahari_server_packets" lineno="46918"> <summary> Send matahari_server packets. </summary> @@ -39447,7 +39531,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46919"> +<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46937"> <summary> Do not audit attempts to send matahari_server packets. </summary> @@ -39458,7 +39542,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_matahari_server_packets" lineno="46938"> +<interface name="corenet_receive_matahari_server_packets" lineno="46956"> <summary> Receive matahari_server packets. </summary> @@ -39469,7 +39553,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46957"> +<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46975"> <summary> Do not audit attempts to receive matahari_server packets. </summary> @@ -39480,7 +39564,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_matahari_server_packets" lineno="46976"> +<interface name="corenet_sendrecv_matahari_server_packets" lineno="46994"> <summary> Send and receive matahari_server packets. </summary> @@ -39491,7 +39575,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46992"> +<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="47010"> <summary> Do not audit attempts to send and receive matahari_server packets. </summary> @@ -39502,7 +39586,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_matahari_server_packets" lineno="47007"> +<interface name="corenet_relabelto_matahari_server_packets" lineno="47025"> <summary> Relabel packets to matahari_server the packet type. </summary> @@ -39512,7 +39596,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47029"> +<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47047"> <summary> Send and receive TCP traffic on the memcache port. </summary> @@ -39523,7 +39607,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_memcache_port" lineno="47044"> +<interface name="corenet_udp_send_memcache_port" lineno="47062"> <summary> Send UDP traffic on the memcache port. </summary> @@ -39534,7 +39618,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47059"> +<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47077"> <summary> Do not audit attempts to send UDP traffic on the memcache port. </summary> @@ -39545,7 +39629,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_memcache_port" lineno="47074"> +<interface name="corenet_udp_receive_memcache_port" lineno="47092"> <summary> Receive UDP traffic on the memcache port. </summary> @@ -39556,7 +39640,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47089"> +<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47107"> <summary> Do not audit attempts to receive UDP traffic on the memcache port. </summary> @@ -39567,7 +39651,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_memcache_port" lineno="47104"> +<interface name="corenet_udp_sendrecv_memcache_port" lineno="47122"> <summary> Send and receive UDP traffic on the memcache port. </summary> @@ -39578,7 +39662,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47120"> +<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47138"> <summary> Do not audit attempts to send and receive UDP traffic on the memcache port. @@ -39590,7 +39674,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_memcache_port" lineno="47135"> +<interface name="corenet_tcp_bind_memcache_port" lineno="47153"> <summary> Bind TCP sockets to the memcache port. </summary> @@ -39601,7 +39685,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_memcache_port" lineno="47155"> +<interface name="corenet_udp_bind_memcache_port" lineno="47173"> <summary> Bind UDP sockets to the memcache port. </summary> @@ -39612,7 +39696,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_memcache_port" lineno="47174"> +<interface name="corenet_tcp_connect_memcache_port" lineno="47192"> <summary> Make a TCP connection to the memcache port. </summary> @@ -39622,7 +39706,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_memcache_client_packets" lineno="47194"> +<interface name="corenet_send_memcache_client_packets" lineno="47212"> <summary> Send memcache_client packets. </summary> @@ -39633,7 +39717,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47213"> +<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47231"> <summary> Do not audit attempts to send memcache_client packets. </summary> @@ -39644,7 +39728,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_memcache_client_packets" lineno="47232"> +<interface name="corenet_receive_memcache_client_packets" lineno="47250"> <summary> Receive memcache_client packets. </summary> @@ -39655,7 +39739,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47251"> +<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47269"> <summary> Do not audit attempts to receive memcache_client packets. </summary> @@ -39666,7 +39750,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_memcache_client_packets" lineno="47270"> +<interface name="corenet_sendrecv_memcache_client_packets" lineno="47288"> <summary> Send and receive memcache_client packets. </summary> @@ -39677,7 +39761,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47286"> +<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47304"> <summary> Do not audit attempts to send and receive memcache_client packets. </summary> @@ -39688,7 +39772,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_memcache_client_packets" lineno="47301"> +<interface name="corenet_relabelto_memcache_client_packets" lineno="47319"> <summary> Relabel packets to memcache_client the packet type. </summary> @@ -39698,7 +39782,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_memcache_server_packets" lineno="47321"> +<interface name="corenet_send_memcache_server_packets" lineno="47339"> <summary> Send memcache_server packets. </summary> @@ -39709,7 +39793,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47340"> +<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47358"> <summary> Do not audit attempts to send memcache_server packets. </summary> @@ -39720,7 +39804,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_memcache_server_packets" lineno="47359"> +<interface name="corenet_receive_memcache_server_packets" lineno="47377"> <summary> Receive memcache_server packets. </summary> @@ -39731,7 +39815,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47378"> +<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47396"> <summary> Do not audit attempts to receive memcache_server packets. </summary> @@ -39742,7 +39826,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_memcache_server_packets" lineno="47397"> +<interface name="corenet_sendrecv_memcache_server_packets" lineno="47415"> <summary> Send and receive memcache_server packets. </summary> @@ -39753,7 +39837,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47413"> +<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47431"> <summary> Do not audit attempts to send and receive memcache_server packets. </summary> @@ -39764,7 +39848,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_memcache_server_packets" lineno="47428"> +<interface name="corenet_relabelto_memcache_server_packets" lineno="47446"> <summary> Relabel packets to memcache_server the packet type. </summary> @@ -39774,7 +39858,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_milter_port" lineno="47450"> +<interface name="corenet_tcp_sendrecv_milter_port" lineno="47468"> <summary> Send and receive TCP traffic on the milter port. </summary> @@ -39785,7 +39869,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_milter_port" lineno="47465"> +<interface name="corenet_udp_send_milter_port" lineno="47483"> <summary> Send UDP traffic on the milter port. </summary> @@ -39796,7 +39880,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47480"> +<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47498"> <summary> Do not audit attempts to send UDP traffic on the milter port. </summary> @@ -39807,7 +39891,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_milter_port" lineno="47495"> +<interface name="corenet_udp_receive_milter_port" lineno="47513"> <summary> Receive UDP traffic on the milter port. </summary> @@ -39818,7 +39902,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47510"> +<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47528"> <summary> Do not audit attempts to receive UDP traffic on the milter port. </summary> @@ -39829,7 +39913,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_milter_port" lineno="47525"> +<interface name="corenet_udp_sendrecv_milter_port" lineno="47543"> <summary> Send and receive UDP traffic on the milter port. </summary> @@ -39840,7 +39924,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47541"> +<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47559"> <summary> Do not audit attempts to send and receive UDP traffic on the milter port. @@ -39852,7 +39936,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_milter_port" lineno="47556"> +<interface name="corenet_tcp_bind_milter_port" lineno="47574"> <summary> Bind TCP sockets to the milter port. </summary> @@ -39863,7 +39947,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_milter_port" lineno="47576"> +<interface name="corenet_udp_bind_milter_port" lineno="47594"> <summary> Bind UDP sockets to the milter port. </summary> @@ -39874,7 +39958,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_milter_port" lineno="47595"> +<interface name="corenet_tcp_connect_milter_port" lineno="47613"> <summary> Make a TCP connection to the milter port. </summary> @@ -39884,7 +39968,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_milter_client_packets" lineno="47615"> +<interface name="corenet_send_milter_client_packets" lineno="47633"> <summary> Send milter_client packets. </summary> @@ -39895,7 +39979,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47634"> +<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47652"> <summary> Do not audit attempts to send milter_client packets. </summary> @@ -39906,7 +39990,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_milter_client_packets" lineno="47653"> +<interface name="corenet_receive_milter_client_packets" lineno="47671"> <summary> Receive milter_client packets. </summary> @@ -39917,7 +40001,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47672"> +<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47690"> <summary> Do not audit attempts to receive milter_client packets. </summary> @@ -39928,7 +40012,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_milter_client_packets" lineno="47691"> +<interface name="corenet_sendrecv_milter_client_packets" lineno="47709"> <summary> Send and receive milter_client packets. </summary> @@ -39939,7 +40023,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47707"> +<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47725"> <summary> Do not audit attempts to send and receive milter_client packets. </summary> @@ -39950,7 +40034,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_milter_client_packets" lineno="47722"> +<interface name="corenet_relabelto_milter_client_packets" lineno="47740"> <summary> Relabel packets to milter_client the packet type. </summary> @@ -39960,7 +40044,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_milter_server_packets" lineno="47742"> +<interface name="corenet_send_milter_server_packets" lineno="47760"> <summary> Send milter_server packets. </summary> @@ -39971,7 +40055,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47761"> +<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47779"> <summary> Do not audit attempts to send milter_server packets. </summary> @@ -39982,7 +40066,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_milter_server_packets" lineno="47780"> +<interface name="corenet_receive_milter_server_packets" lineno="47798"> <summary> Receive milter_server packets. </summary> @@ -39993,7 +40077,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47799"> +<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47817"> <summary> Do not audit attempts to receive milter_server packets. </summary> @@ -40004,7 +40088,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_milter_server_packets" lineno="47818"> +<interface name="corenet_sendrecv_milter_server_packets" lineno="47836"> <summary> Send and receive milter_server packets. </summary> @@ -40015,7 +40099,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47834"> +<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47852"> <summary> Do not audit attempts to send and receive milter_server packets. </summary> @@ -40026,7 +40110,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_milter_server_packets" lineno="47849"> +<interface name="corenet_relabelto_milter_server_packets" lineno="47867"> <summary> Relabel packets to milter_server the packet type. </summary> @@ -40036,7 +40120,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47871"> +<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47889"> <summary> Send and receive TCP traffic on the mmcc port. </summary> @@ -40047,7 +40131,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mmcc_port" lineno="47886"> +<interface name="corenet_udp_send_mmcc_port" lineno="47904"> <summary> Send UDP traffic on the mmcc port. </summary> @@ -40058,7 +40142,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47901"> +<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47919"> <summary> Do not audit attempts to send UDP traffic on the mmcc port. </summary> @@ -40069,7 +40153,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mmcc_port" lineno="47916"> +<interface name="corenet_udp_receive_mmcc_port" lineno="47934"> <summary> Receive UDP traffic on the mmcc port. </summary> @@ -40080,7 +40164,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47931"> +<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47949"> <summary> Do not audit attempts to receive UDP traffic on the mmcc port. </summary> @@ -40091,7 +40175,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47946"> +<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47964"> <summary> Send and receive UDP traffic on the mmcc port. </summary> @@ -40102,7 +40186,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47962"> +<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47980"> <summary> Do not audit attempts to send and receive UDP traffic on the mmcc port. @@ -40114,7 +40198,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mmcc_port" lineno="47977"> +<interface name="corenet_tcp_bind_mmcc_port" lineno="47995"> <summary> Bind TCP sockets to the mmcc port. </summary> @@ -40125,7 +40209,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mmcc_port" lineno="47997"> +<interface name="corenet_udp_bind_mmcc_port" lineno="48015"> <summary> Bind UDP sockets to the mmcc port. </summary> @@ -40136,7 +40220,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mmcc_port" lineno="48016"> +<interface name="corenet_tcp_connect_mmcc_port" lineno="48034"> <summary> Make a TCP connection to the mmcc port. </summary> @@ -40146,7 +40230,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mmcc_client_packets" lineno="48036"> +<interface name="corenet_send_mmcc_client_packets" lineno="48054"> <summary> Send mmcc_client packets. </summary> @@ -40157,7 +40241,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48055"> +<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48073"> <summary> Do not audit attempts to send mmcc_client packets. </summary> @@ -40168,7 +40252,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mmcc_client_packets" lineno="48074"> +<interface name="corenet_receive_mmcc_client_packets" lineno="48092"> <summary> Receive mmcc_client packets. </summary> @@ -40179,7 +40263,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48093"> +<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48111"> <summary> Do not audit attempts to receive mmcc_client packets. </summary> @@ -40190,7 +40274,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48112"> +<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48130"> <summary> Send and receive mmcc_client packets. </summary> @@ -40201,7 +40285,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48128"> +<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48146"> <summary> Do not audit attempts to send and receive mmcc_client packets. </summary> @@ -40212,7 +40296,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mmcc_client_packets" lineno="48143"> +<interface name="corenet_relabelto_mmcc_client_packets" lineno="48161"> <summary> Relabel packets to mmcc_client the packet type. </summary> @@ -40222,7 +40306,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mmcc_server_packets" lineno="48163"> +<interface name="corenet_send_mmcc_server_packets" lineno="48181"> <summary> Send mmcc_server packets. </summary> @@ -40233,7 +40317,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48182"> +<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48200"> <summary> Do not audit attempts to send mmcc_server packets. </summary> @@ -40244,7 +40328,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mmcc_server_packets" lineno="48201"> +<interface name="corenet_receive_mmcc_server_packets" lineno="48219"> <summary> Receive mmcc_server packets. </summary> @@ -40255,7 +40339,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48220"> +<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48238"> <summary> Do not audit attempts to receive mmcc_server packets. </summary> @@ -40266,7 +40350,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48239"> +<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48257"> <summary> Send and receive mmcc_server packets. </summary> @@ -40277,7 +40361,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48255"> +<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48273"> <summary> Do not audit attempts to send and receive mmcc_server packets. </summary> @@ -40288,7 +40372,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mmcc_server_packets" lineno="48270"> +<interface name="corenet_relabelto_mmcc_server_packets" lineno="48288"> <summary> Relabel packets to mmcc_server the packet type. </summary> @@ -40298,7 +40382,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mon_port" lineno="48292"> +<interface name="corenet_tcp_sendrecv_mon_port" lineno="48310"> <summary> Send and receive TCP traffic on the mon port. </summary> @@ -40309,7 +40393,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mon_port" lineno="48307"> +<interface name="corenet_udp_send_mon_port" lineno="48325"> <summary> Send UDP traffic on the mon port. </summary> @@ -40320,7 +40404,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48322"> +<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48340"> <summary> Do not audit attempts to send UDP traffic on the mon port. </summary> @@ -40331,7 +40415,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mon_port" lineno="48337"> +<interface name="corenet_udp_receive_mon_port" lineno="48355"> <summary> Receive UDP traffic on the mon port. </summary> @@ -40342,7 +40426,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48352"> +<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48370"> <summary> Do not audit attempts to receive UDP traffic on the mon port. </summary> @@ -40353,7 +40437,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mon_port" lineno="48367"> +<interface name="corenet_udp_sendrecv_mon_port" lineno="48385"> <summary> Send and receive UDP traffic on the mon port. </summary> @@ -40364,7 +40448,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48383"> +<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48401"> <summary> Do not audit attempts to send and receive UDP traffic on the mon port. @@ -40376,7 +40460,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mon_port" lineno="48398"> +<interface name="corenet_tcp_bind_mon_port" lineno="48416"> <summary> Bind TCP sockets to the mon port. </summary> @@ -40387,7 +40471,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mon_port" lineno="48418"> +<interface name="corenet_udp_bind_mon_port" lineno="48436"> <summary> Bind UDP sockets to the mon port. </summary> @@ -40398,7 +40482,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mon_port" lineno="48437"> +<interface name="corenet_tcp_connect_mon_port" lineno="48455"> <summary> Make a TCP connection to the mon port. </summary> @@ -40408,7 +40492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mon_client_packets" lineno="48457"> +<interface name="corenet_send_mon_client_packets" lineno="48475"> <summary> Send mon_client packets. </summary> @@ -40419,7 +40503,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48476"> +<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48494"> <summary> Do not audit attempts to send mon_client packets. </summary> @@ -40430,7 +40514,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mon_client_packets" lineno="48495"> +<interface name="corenet_receive_mon_client_packets" lineno="48513"> <summary> Receive mon_client packets. </summary> @@ -40441,7 +40525,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48514"> +<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48532"> <summary> Do not audit attempts to receive mon_client packets. </summary> @@ -40452,7 +40536,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mon_client_packets" lineno="48533"> +<interface name="corenet_sendrecv_mon_client_packets" lineno="48551"> <summary> Send and receive mon_client packets. </summary> @@ -40463,7 +40547,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48549"> +<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48567"> <summary> Do not audit attempts to send and receive mon_client packets. </summary> @@ -40474,7 +40558,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mon_client_packets" lineno="48564"> +<interface name="corenet_relabelto_mon_client_packets" lineno="48582"> <summary> Relabel packets to mon_client the packet type. </summary> @@ -40484,7 +40568,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mon_server_packets" lineno="48584"> +<interface name="corenet_send_mon_server_packets" lineno="48602"> <summary> Send mon_server packets. </summary> @@ -40495,7 +40579,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48603"> +<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48621"> <summary> Do not audit attempts to send mon_server packets. </summary> @@ -40506,7 +40590,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mon_server_packets" lineno="48622"> +<interface name="corenet_receive_mon_server_packets" lineno="48640"> <summary> Receive mon_server packets. </summary> @@ -40517,7 +40601,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48641"> +<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48659"> <summary> Do not audit attempts to receive mon_server packets. </summary> @@ -40528,7 +40612,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mon_server_packets" lineno="48660"> +<interface name="corenet_sendrecv_mon_server_packets" lineno="48678"> <summary> Send and receive mon_server packets. </summary> @@ -40539,7 +40623,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48676"> +<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48694"> <summary> Do not audit attempts to send and receive mon_server packets. </summary> @@ -40550,7 +40634,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mon_server_packets" lineno="48691"> +<interface name="corenet_relabelto_mon_server_packets" lineno="48709"> <summary> Relabel packets to mon_server the packet type. </summary> @@ -40560,7 +40644,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_monit_port" lineno="48713"> +<interface name="corenet_tcp_sendrecv_monit_port" lineno="48731"> <summary> Send and receive TCP traffic on the monit port. </summary> @@ -40571,7 +40655,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_monit_port" lineno="48728"> +<interface name="corenet_udp_send_monit_port" lineno="48746"> <summary> Send UDP traffic on the monit port. </summary> @@ -40582,7 +40666,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48743"> +<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48761"> <summary> Do not audit attempts to send UDP traffic on the monit port. </summary> @@ -40593,7 +40677,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_monit_port" lineno="48758"> +<interface name="corenet_udp_receive_monit_port" lineno="48776"> <summary> Receive UDP traffic on the monit port. </summary> @@ -40604,7 +40688,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48773"> +<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48791"> <summary> Do not audit attempts to receive UDP traffic on the monit port. </summary> @@ -40615,7 +40699,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_monit_port" lineno="48788"> +<interface name="corenet_udp_sendrecv_monit_port" lineno="48806"> <summary> Send and receive UDP traffic on the monit port. </summary> @@ -40626,7 +40710,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48804"> +<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48822"> <summary> Do not audit attempts to send and receive UDP traffic on the monit port. @@ -40638,7 +40722,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_monit_port" lineno="48819"> +<interface name="corenet_tcp_bind_monit_port" lineno="48837"> <summary> Bind TCP sockets to the monit port. </summary> @@ -40649,7 +40733,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_monit_port" lineno="48839"> +<interface name="corenet_udp_bind_monit_port" lineno="48857"> <summary> Bind UDP sockets to the monit port. </summary> @@ -40660,7 +40744,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_monit_port" lineno="48858"> +<interface name="corenet_tcp_connect_monit_port" lineno="48876"> <summary> Make a TCP connection to the monit port. </summary> @@ -40670,7 +40754,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monit_client_packets" lineno="48878"> +<interface name="corenet_send_monit_client_packets" lineno="48896"> <summary> Send monit_client packets. </summary> @@ -40681,7 +40765,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48897"> +<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48915"> <summary> Do not audit attempts to send monit_client packets. </summary> @@ -40692,7 +40776,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monit_client_packets" lineno="48916"> +<interface name="corenet_receive_monit_client_packets" lineno="48934"> <summary> Receive monit_client packets. </summary> @@ -40703,7 +40787,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48935"> +<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48953"> <summary> Do not audit attempts to receive monit_client packets. </summary> @@ -40714,7 +40798,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monit_client_packets" lineno="48954"> +<interface name="corenet_sendrecv_monit_client_packets" lineno="48972"> <summary> Send and receive monit_client packets. </summary> @@ -40725,7 +40809,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48970"> +<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48988"> <summary> Do not audit attempts to send and receive monit_client packets. </summary> @@ -40736,7 +40820,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monit_client_packets" lineno="48985"> +<interface name="corenet_relabelto_monit_client_packets" lineno="49003"> <summary> Relabel packets to monit_client the packet type. </summary> @@ -40746,7 +40830,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monit_server_packets" lineno="49005"> +<interface name="corenet_send_monit_server_packets" lineno="49023"> <summary> Send monit_server packets. </summary> @@ -40757,7 +40841,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49024"> +<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49042"> <summary> Do not audit attempts to send monit_server packets. </summary> @@ -40768,7 +40852,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monit_server_packets" lineno="49043"> +<interface name="corenet_receive_monit_server_packets" lineno="49061"> <summary> Receive monit_server packets. </summary> @@ -40779,7 +40863,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49062"> +<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49080"> <summary> Do not audit attempts to receive monit_server packets. </summary> @@ -40790,7 +40874,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monit_server_packets" lineno="49081"> +<interface name="corenet_sendrecv_monit_server_packets" lineno="49099"> <summary> Send and receive monit_server packets. </summary> @@ -40801,7 +40885,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49097"> +<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49115"> <summary> Do not audit attempts to send and receive monit_server packets. </summary> @@ -40812,7 +40896,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monit_server_packets" lineno="49112"> +<interface name="corenet_relabelto_monit_server_packets" lineno="49130"> <summary> Relabel packets to monit_server the packet type. </summary> @@ -40822,7 +40906,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49134"> +<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49152"> <summary> Send and receive TCP traffic on the monopd port. </summary> @@ -40833,7 +40917,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_monopd_port" lineno="49149"> +<interface name="corenet_udp_send_monopd_port" lineno="49167"> <summary> Send UDP traffic on the monopd port. </summary> @@ -40844,7 +40928,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49164"> +<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49182"> <summary> Do not audit attempts to send UDP traffic on the monopd port. </summary> @@ -40855,7 +40939,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_monopd_port" lineno="49179"> +<interface name="corenet_udp_receive_monopd_port" lineno="49197"> <summary> Receive UDP traffic on the monopd port. </summary> @@ -40866,7 +40950,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49194"> +<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49212"> <summary> Do not audit attempts to receive UDP traffic on the monopd port. </summary> @@ -40877,7 +40961,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_monopd_port" lineno="49209"> +<interface name="corenet_udp_sendrecv_monopd_port" lineno="49227"> <summary> Send and receive UDP traffic on the monopd port. </summary> @@ -40888,7 +40972,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49225"> +<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49243"> <summary> Do not audit attempts to send and receive UDP traffic on the monopd port. @@ -40900,7 +40984,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_monopd_port" lineno="49240"> +<interface name="corenet_tcp_bind_monopd_port" lineno="49258"> <summary> Bind TCP sockets to the monopd port. </summary> @@ -40911,7 +40995,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_monopd_port" lineno="49260"> +<interface name="corenet_udp_bind_monopd_port" lineno="49278"> <summary> Bind UDP sockets to the monopd port. </summary> @@ -40922,7 +41006,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_monopd_port" lineno="49279"> +<interface name="corenet_tcp_connect_monopd_port" lineno="49297"> <summary> Make a TCP connection to the monopd port. </summary> @@ -40932,7 +41016,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monopd_client_packets" lineno="49299"> +<interface name="corenet_send_monopd_client_packets" lineno="49317"> <summary> Send monopd_client packets. </summary> @@ -40943,7 +41027,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49318"> +<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49336"> <summary> Do not audit attempts to send monopd_client packets. </summary> @@ -40954,7 +41038,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monopd_client_packets" lineno="49337"> +<interface name="corenet_receive_monopd_client_packets" lineno="49355"> <summary> Receive monopd_client packets. </summary> @@ -40965,7 +41049,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49356"> +<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49374"> <summary> Do not audit attempts to receive monopd_client packets. </summary> @@ -40976,7 +41060,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monopd_client_packets" lineno="49375"> +<interface name="corenet_sendrecv_monopd_client_packets" lineno="49393"> <summary> Send and receive monopd_client packets. </summary> @@ -40987,7 +41071,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49391"> +<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49409"> <summary> Do not audit attempts to send and receive monopd_client packets. </summary> @@ -40998,7 +41082,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monopd_client_packets" lineno="49406"> +<interface name="corenet_relabelto_monopd_client_packets" lineno="49424"> <summary> Relabel packets to monopd_client the packet type. </summary> @@ -41008,7 +41092,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monopd_server_packets" lineno="49426"> +<interface name="corenet_send_monopd_server_packets" lineno="49444"> <summary> Send monopd_server packets. </summary> @@ -41019,7 +41103,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49445"> +<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49463"> <summary> Do not audit attempts to send monopd_server packets. </summary> @@ -41030,7 +41114,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monopd_server_packets" lineno="49464"> +<interface name="corenet_receive_monopd_server_packets" lineno="49482"> <summary> Receive monopd_server packets. </summary> @@ -41041,7 +41125,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49483"> +<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49501"> <summary> Do not audit attempts to receive monopd_server packets. </summary> @@ -41052,7 +41136,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monopd_server_packets" lineno="49502"> +<interface name="corenet_sendrecv_monopd_server_packets" lineno="49520"> <summary> Send and receive monopd_server packets. </summary> @@ -41063,7 +41147,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49518"> +<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49536"> <summary> Do not audit attempts to send and receive monopd_server packets. </summary> @@ -41074,7 +41158,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monopd_server_packets" lineno="49533"> +<interface name="corenet_relabelto_monopd_server_packets" lineno="49551"> <summary> Relabel packets to monopd_server the packet type. </summary> @@ -41084,7 +41168,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49555"> +<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49573"> <summary> Send and receive TCP traffic on the mountd port. </summary> @@ -41095,7 +41179,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mountd_port" lineno="49570"> +<interface name="corenet_udp_send_mountd_port" lineno="49588"> <summary> Send UDP traffic on the mountd port. </summary> @@ -41106,7 +41190,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49585"> +<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49603"> <summary> Do not audit attempts to send UDP traffic on the mountd port. </summary> @@ -41117,7 +41201,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mountd_port" lineno="49600"> +<interface name="corenet_udp_receive_mountd_port" lineno="49618"> <summary> Receive UDP traffic on the mountd port. </summary> @@ -41128,7 +41212,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49615"> +<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49633"> <summary> Do not audit attempts to receive UDP traffic on the mountd port. </summary> @@ -41139,7 +41223,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mountd_port" lineno="49630"> +<interface name="corenet_udp_sendrecv_mountd_port" lineno="49648"> <summary> Send and receive UDP traffic on the mountd port. </summary> @@ -41150,7 +41234,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49646"> +<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49664"> <summary> Do not audit attempts to send and receive UDP traffic on the mountd port. @@ -41162,7 +41246,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mountd_port" lineno="49661"> +<interface name="corenet_tcp_bind_mountd_port" lineno="49679"> <summary> Bind TCP sockets to the mountd port. </summary> @@ -41173,7 +41257,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mountd_port" lineno="49681"> +<interface name="corenet_udp_bind_mountd_port" lineno="49699"> <summary> Bind UDP sockets to the mountd port. </summary> @@ -41184,7 +41268,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mountd_port" lineno="49700"> +<interface name="corenet_tcp_connect_mountd_port" lineno="49718"> <summary> Make a TCP connection to the mountd port. </summary> @@ -41194,7 +41278,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mountd_client_packets" lineno="49720"> +<interface name="corenet_send_mountd_client_packets" lineno="49738"> <summary> Send mountd_client packets. </summary> @@ -41205,7 +41289,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49739"> +<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49757"> <summary> Do not audit attempts to send mountd_client packets. </summary> @@ -41216,7 +41300,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mountd_client_packets" lineno="49758"> +<interface name="corenet_receive_mountd_client_packets" lineno="49776"> <summary> Receive mountd_client packets. </summary> @@ -41227,7 +41311,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49777"> +<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49795"> <summary> Do not audit attempts to receive mountd_client packets. </summary> @@ -41238,7 +41322,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mountd_client_packets" lineno="49796"> +<interface name="corenet_sendrecv_mountd_client_packets" lineno="49814"> <summary> Send and receive mountd_client packets. </summary> @@ -41249,7 +41333,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49812"> +<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49830"> <summary> Do not audit attempts to send and receive mountd_client packets. </summary> @@ -41260,7 +41344,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mountd_client_packets" lineno="49827"> +<interface name="corenet_relabelto_mountd_client_packets" lineno="49845"> <summary> Relabel packets to mountd_client the packet type. </summary> @@ -41270,7 +41354,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mountd_server_packets" lineno="49847"> +<interface name="corenet_send_mountd_server_packets" lineno="49865"> <summary> Send mountd_server packets. </summary> @@ -41281,7 +41365,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49866"> +<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49884"> <summary> Do not audit attempts to send mountd_server packets. </summary> @@ -41292,7 +41376,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mountd_server_packets" lineno="49885"> +<interface name="corenet_receive_mountd_server_packets" lineno="49903"> <summary> Receive mountd_server packets. </summary> @@ -41303,7 +41387,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49904"> +<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49922"> <summary> Do not audit attempts to receive mountd_server packets. </summary> @@ -41314,7 +41398,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mountd_server_packets" lineno="49923"> +<interface name="corenet_sendrecv_mountd_server_packets" lineno="49941"> <summary> Send and receive mountd_server packets. </summary> @@ -41325,7 +41409,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49939"> +<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49957"> <summary> Do not audit attempts to send and receive mountd_server packets. </summary> @@ -41336,7 +41420,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mountd_server_packets" lineno="49954"> +<interface name="corenet_relabelto_mountd_server_packets" lineno="49972"> <summary> Relabel packets to mountd_server the packet type. </summary> @@ -41346,7 +41430,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49976"> +<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49994"> <summary> Send and receive TCP traffic on the movaz_ssc port. </summary> @@ -41357,7 +41441,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_movaz_ssc_port" lineno="49991"> +<interface name="corenet_udp_send_movaz_ssc_port" lineno="50009"> <summary> Send UDP traffic on the movaz_ssc port. </summary> @@ -41368,7 +41452,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50006"> +<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50024"> <summary> Do not audit attempts to send UDP traffic on the movaz_ssc port. </summary> @@ -41379,7 +41463,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50021"> +<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50039"> <summary> Receive UDP traffic on the movaz_ssc port. </summary> @@ -41390,7 +41474,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50036"> +<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50054"> <summary> Do not audit attempts to receive UDP traffic on the movaz_ssc port. </summary> @@ -41401,7 +41485,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50051"> +<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50069"> <summary> Send and receive UDP traffic on the movaz_ssc port. </summary> @@ -41412,7 +41496,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50067"> +<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50085"> <summary> Do not audit attempts to send and receive UDP traffic on the movaz_ssc port. @@ -41424,7 +41508,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50082"> +<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50100"> <summary> Bind TCP sockets to the movaz_ssc port. </summary> @@ -41435,7 +41519,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50102"> +<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50120"> <summary> Bind UDP sockets to the movaz_ssc port. </summary> @@ -41446,7 +41530,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50121"> +<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50139"> <summary> Make a TCP connection to the movaz_ssc port. </summary> @@ -41456,7 +41540,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_movaz_ssc_client_packets" lineno="50141"> +<interface name="corenet_send_movaz_ssc_client_packets" lineno="50159"> <summary> Send movaz_ssc_client packets. </summary> @@ -41467,7 +41551,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50160"> +<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50178"> <summary> Do not audit attempts to send movaz_ssc_client packets. </summary> @@ -41478,7 +41562,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50179"> +<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50197"> <summary> Receive movaz_ssc_client packets. </summary> @@ -41489,7 +41573,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50198"> +<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50216"> <summary> Do not audit attempts to receive movaz_ssc_client packets. </summary> @@ -41500,7 +41584,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50217"> +<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50235"> <summary> Send and receive movaz_ssc_client packets. </summary> @@ -41511,7 +41595,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50233"> +<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50251"> <summary> Do not audit attempts to send and receive movaz_ssc_client packets. </summary> @@ -41522,7 +41606,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50248"> +<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50266"> <summary> Relabel packets to movaz_ssc_client the packet type. </summary> @@ -41532,7 +41616,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_movaz_ssc_server_packets" lineno="50268"> +<interface name="corenet_send_movaz_ssc_server_packets" lineno="50286"> <summary> Send movaz_ssc_server packets. </summary> @@ -41543,7 +41627,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50287"> +<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50305"> <summary> Do not audit attempts to send movaz_ssc_server packets. </summary> @@ -41554,7 +41638,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50306"> +<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50324"> <summary> Receive movaz_ssc_server packets. </summary> @@ -41565,7 +41649,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50325"> +<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50343"> <summary> Do not audit attempts to receive movaz_ssc_server packets. </summary> @@ -41576,7 +41660,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50344"> +<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50362"> <summary> Send and receive movaz_ssc_server packets. </summary> @@ -41587,7 +41671,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50360"> +<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50378"> <summary> Do not audit attempts to send and receive movaz_ssc_server packets. </summary> @@ -41598,7 +41682,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50375"> +<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50393"> <summary> Relabel packets to movaz_ssc_server the packet type. </summary> @@ -41608,7 +41692,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50397"> +<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50415"> <summary> Send and receive TCP traffic on the mpd port. </summary> @@ -41619,7 +41703,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mpd_port" lineno="50412"> +<interface name="corenet_udp_send_mpd_port" lineno="50430"> <summary> Send UDP traffic on the mpd port. </summary> @@ -41630,7 +41714,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50427"> +<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50445"> <summary> Do not audit attempts to send UDP traffic on the mpd port. </summary> @@ -41641,7 +41725,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mpd_port" lineno="50442"> +<interface name="corenet_udp_receive_mpd_port" lineno="50460"> <summary> Receive UDP traffic on the mpd port. </summary> @@ -41652,7 +41736,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50457"> +<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50475"> <summary> Do not audit attempts to receive UDP traffic on the mpd port. </summary> @@ -41663,7 +41747,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mpd_port" lineno="50472"> +<interface name="corenet_udp_sendrecv_mpd_port" lineno="50490"> <summary> Send and receive UDP traffic on the mpd port. </summary> @@ -41674,7 +41758,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50488"> +<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50506"> <summary> Do not audit attempts to send and receive UDP traffic on the mpd port. @@ -41686,7 +41770,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mpd_port" lineno="50503"> +<interface name="corenet_tcp_bind_mpd_port" lineno="50521"> <summary> Bind TCP sockets to the mpd port. </summary> @@ -41697,7 +41781,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mpd_port" lineno="50523"> +<interface name="corenet_udp_bind_mpd_port" lineno="50541"> <summary> Bind UDP sockets to the mpd port. </summary> @@ -41708,7 +41792,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mpd_port" lineno="50542"> +<interface name="corenet_tcp_connect_mpd_port" lineno="50560"> <summary> Make a TCP connection to the mpd port. </summary> @@ -41718,7 +41802,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mpd_client_packets" lineno="50562"> +<interface name="corenet_send_mpd_client_packets" lineno="50580"> <summary> Send mpd_client packets. </summary> @@ -41729,7 +41813,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50581"> +<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50599"> <summary> Do not audit attempts to send mpd_client packets. </summary> @@ -41740,7 +41824,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mpd_client_packets" lineno="50600"> +<interface name="corenet_receive_mpd_client_packets" lineno="50618"> <summary> Receive mpd_client packets. </summary> @@ -41751,7 +41835,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50619"> +<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50637"> <summary> Do not audit attempts to receive mpd_client packets. </summary> @@ -41762,7 +41846,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mpd_client_packets" lineno="50638"> +<interface name="corenet_sendrecv_mpd_client_packets" lineno="50656"> <summary> Send and receive mpd_client packets. </summary> @@ -41773,7 +41857,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50654"> +<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50672"> <summary> Do not audit attempts to send and receive mpd_client packets. </summary> @@ -41784,7 +41868,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mpd_client_packets" lineno="50669"> +<interface name="corenet_relabelto_mpd_client_packets" lineno="50687"> <summary> Relabel packets to mpd_client the packet type. </summary> @@ -41794,7 +41878,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mpd_server_packets" lineno="50689"> +<interface name="corenet_send_mpd_server_packets" lineno="50707"> <summary> Send mpd_server packets. </summary> @@ -41805,7 +41889,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50708"> +<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50726"> <summary> Do not audit attempts to send mpd_server packets. </summary> @@ -41816,7 +41900,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mpd_server_packets" lineno="50727"> +<interface name="corenet_receive_mpd_server_packets" lineno="50745"> <summary> Receive mpd_server packets. </summary> @@ -41827,7 +41911,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50746"> +<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50764"> <summary> Do not audit attempts to receive mpd_server packets. </summary> @@ -41838,7 +41922,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mpd_server_packets" lineno="50765"> +<interface name="corenet_sendrecv_mpd_server_packets" lineno="50783"> <summary> Send and receive mpd_server packets. </summary> @@ -41849,7 +41933,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50781"> +<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50799"> <summary> Do not audit attempts to send and receive mpd_server packets. </summary> @@ -41860,7 +41944,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mpd_server_packets" lineno="50796"> +<interface name="corenet_relabelto_mpd_server_packets" lineno="50814"> <summary> Relabel packets to mpd_server the packet type. </summary> @@ -41870,7 +41954,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50818"> +<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50836"> <summary> Send and receive TCP traffic on the msgsrvr port. </summary> @@ -41881,7 +41965,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_msgsrvr_port" lineno="50833"> +<interface name="corenet_udp_send_msgsrvr_port" lineno="50851"> <summary> Send UDP traffic on the msgsrvr port. </summary> @@ -41892,7 +41976,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50848"> +<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50866"> <summary> Do not audit attempts to send UDP traffic on the msgsrvr port. </summary> @@ -41903,7 +41987,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_msgsrvr_port" lineno="50863"> +<interface name="corenet_udp_receive_msgsrvr_port" lineno="50881"> <summary> Receive UDP traffic on the msgsrvr port. </summary> @@ -41914,7 +41998,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50878"> +<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50896"> <summary> Do not audit attempts to receive UDP traffic on the msgsrvr port. </summary> @@ -41925,7 +42009,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50893"> +<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50911"> <summary> Send and receive UDP traffic on the msgsrvr port. </summary> @@ -41936,7 +42020,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50909"> +<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50927"> <summary> Do not audit attempts to send and receive UDP traffic on the msgsrvr port. @@ -41948,7 +42032,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50924"> +<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50942"> <summary> Bind TCP sockets to the msgsrvr port. </summary> @@ -41959,7 +42043,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_msgsrvr_port" lineno="50944"> +<interface name="corenet_udp_bind_msgsrvr_port" lineno="50962"> <summary> Bind UDP sockets to the msgsrvr port. </summary> @@ -41970,7 +42054,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50963"> +<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50981"> <summary> Make a TCP connection to the msgsrvr port. </summary> @@ -41980,7 +42064,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msgsrvr_client_packets" lineno="50983"> +<interface name="corenet_send_msgsrvr_client_packets" lineno="51001"> <summary> Send msgsrvr_client packets. </summary> @@ -41991,7 +42075,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51002"> +<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51020"> <summary> Do not audit attempts to send msgsrvr_client packets. </summary> @@ -42002,7 +42086,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msgsrvr_client_packets" lineno="51021"> +<interface name="corenet_receive_msgsrvr_client_packets" lineno="51039"> <summary> Receive msgsrvr_client packets. </summary> @@ -42013,7 +42097,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51040"> +<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51058"> <summary> Do not audit attempts to receive msgsrvr_client packets. </summary> @@ -42024,7 +42108,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51059"> +<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51077"> <summary> Send and receive msgsrvr_client packets. </summary> @@ -42035,7 +42119,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51075"> +<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51093"> <summary> Do not audit attempts to send and receive msgsrvr_client packets. </summary> @@ -42046,7 +42130,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51090"> +<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51108"> <summary> Relabel packets to msgsrvr_client the packet type. </summary> @@ -42056,7 +42140,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msgsrvr_server_packets" lineno="51110"> +<interface name="corenet_send_msgsrvr_server_packets" lineno="51128"> <summary> Send msgsrvr_server packets. </summary> @@ -42067,7 +42151,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51129"> +<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51147"> <summary> Do not audit attempts to send msgsrvr_server packets. </summary> @@ -42078,7 +42162,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msgsrvr_server_packets" lineno="51148"> +<interface name="corenet_receive_msgsrvr_server_packets" lineno="51166"> <summary> Receive msgsrvr_server packets. </summary> @@ -42089,7 +42173,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51167"> +<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51185"> <summary> Do not audit attempts to receive msgsrvr_server packets. </summary> @@ -42100,7 +42184,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51186"> +<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51204"> <summary> Send and receive msgsrvr_server packets. </summary> @@ -42111,7 +42195,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51202"> +<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51220"> <summary> Do not audit attempts to send and receive msgsrvr_server packets. </summary> @@ -42122,7 +42206,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51217"> +<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51235"> <summary> Relabel packets to msgsrvr_server the packet type. </summary> @@ -42132,7 +42216,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51239"> +<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51257"> <summary> Send and receive TCP traffic on the msnp port. </summary> @@ -42143,7 +42227,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_msnp_port" lineno="51254"> +<interface name="corenet_udp_send_msnp_port" lineno="51272"> <summary> Send UDP traffic on the msnp port. </summary> @@ -42154,7 +42238,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51269"> +<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51287"> <summary> Do not audit attempts to send UDP traffic on the msnp port. </summary> @@ -42165,7 +42249,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_msnp_port" lineno="51284"> +<interface name="corenet_udp_receive_msnp_port" lineno="51302"> <summary> Receive UDP traffic on the msnp port. </summary> @@ -42176,7 +42260,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51299"> +<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51317"> <summary> Do not audit attempts to receive UDP traffic on the msnp port. </summary> @@ -42187,7 +42271,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_msnp_port" lineno="51314"> +<interface name="corenet_udp_sendrecv_msnp_port" lineno="51332"> <summary> Send and receive UDP traffic on the msnp port. </summary> @@ -42198,7 +42282,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51330"> +<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51348"> <summary> Do not audit attempts to send and receive UDP traffic on the msnp port. @@ -42210,7 +42294,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_msnp_port" lineno="51345"> +<interface name="corenet_tcp_bind_msnp_port" lineno="51363"> <summary> Bind TCP sockets to the msnp port. </summary> @@ -42221,7 +42305,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_msnp_port" lineno="51365"> +<interface name="corenet_udp_bind_msnp_port" lineno="51383"> <summary> Bind UDP sockets to the msnp port. </summary> @@ -42232,7 +42316,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_msnp_port" lineno="51384"> +<interface name="corenet_tcp_connect_msnp_port" lineno="51402"> <summary> Make a TCP connection to the msnp port. </summary> @@ -42242,7 +42326,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msnp_client_packets" lineno="51404"> +<interface name="corenet_send_msnp_client_packets" lineno="51422"> <summary> Send msnp_client packets. </summary> @@ -42253,7 +42337,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51423"> +<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51441"> <summary> Do not audit attempts to send msnp_client packets. </summary> @@ -42264,7 +42348,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msnp_client_packets" lineno="51442"> +<interface name="corenet_receive_msnp_client_packets" lineno="51460"> <summary> Receive msnp_client packets. </summary> @@ -42275,7 +42359,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51461"> +<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51479"> <summary> Do not audit attempts to receive msnp_client packets. </summary> @@ -42286,7 +42370,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msnp_client_packets" lineno="51480"> +<interface name="corenet_sendrecv_msnp_client_packets" lineno="51498"> <summary> Send and receive msnp_client packets. </summary> @@ -42297,7 +42381,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51496"> +<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51514"> <summary> Do not audit attempts to send and receive msnp_client packets. </summary> @@ -42308,7 +42392,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msnp_client_packets" lineno="51511"> +<interface name="corenet_relabelto_msnp_client_packets" lineno="51529"> <summary> Relabel packets to msnp_client the packet type. </summary> @@ -42318,7 +42402,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msnp_server_packets" lineno="51531"> +<interface name="corenet_send_msnp_server_packets" lineno="51549"> <summary> Send msnp_server packets. </summary> @@ -42329,7 +42413,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51550"> +<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51568"> <summary> Do not audit attempts to send msnp_server packets. </summary> @@ -42340,7 +42424,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msnp_server_packets" lineno="51569"> +<interface name="corenet_receive_msnp_server_packets" lineno="51587"> <summary> Receive msnp_server packets. </summary> @@ -42351,7 +42435,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51588"> +<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51606"> <summary> Do not audit attempts to receive msnp_server packets. </summary> @@ -42362,7 +42446,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msnp_server_packets" lineno="51607"> +<interface name="corenet_sendrecv_msnp_server_packets" lineno="51625"> <summary> Send and receive msnp_server packets. </summary> @@ -42373,7 +42457,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51623"> +<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51641"> <summary> Do not audit attempts to send and receive msnp_server packets. </summary> @@ -42384,7 +42468,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msnp_server_packets" lineno="51638"> +<interface name="corenet_relabelto_msnp_server_packets" lineno="51656"> <summary> Relabel packets to msnp_server the packet type. </summary> @@ -42394,7 +42478,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51660"> +<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51678"> <summary> Send and receive TCP traffic on the mssql port. </summary> @@ -42405,7 +42489,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mssql_port" lineno="51675"> +<interface name="corenet_udp_send_mssql_port" lineno="51693"> <summary> Send UDP traffic on the mssql port. </summary> @@ -42416,7 +42500,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51690"> +<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51708"> <summary> Do not audit attempts to send UDP traffic on the mssql port. </summary> @@ -42427,7 +42511,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mssql_port" lineno="51705"> +<interface name="corenet_udp_receive_mssql_port" lineno="51723"> <summary> Receive UDP traffic on the mssql port. </summary> @@ -42438,7 +42522,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51720"> +<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51738"> <summary> Do not audit attempts to receive UDP traffic on the mssql port. </summary> @@ -42449,7 +42533,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mssql_port" lineno="51735"> +<interface name="corenet_udp_sendrecv_mssql_port" lineno="51753"> <summary> Send and receive UDP traffic on the mssql port. </summary> @@ -42460,7 +42544,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51751"> +<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51769"> <summary> Do not audit attempts to send and receive UDP traffic on the mssql port. @@ -42472,7 +42556,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mssql_port" lineno="51766"> +<interface name="corenet_tcp_bind_mssql_port" lineno="51784"> <summary> Bind TCP sockets to the mssql port. </summary> @@ -42483,7 +42567,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mssql_port" lineno="51786"> +<interface name="corenet_udp_bind_mssql_port" lineno="51804"> <summary> Bind UDP sockets to the mssql port. </summary> @@ -42494,7 +42578,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mssql_port" lineno="51805"> +<interface name="corenet_tcp_connect_mssql_port" lineno="51823"> <summary> Make a TCP connection to the mssql port. </summary> @@ -42504,7 +42588,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mssql_client_packets" lineno="51825"> +<interface name="corenet_send_mssql_client_packets" lineno="51843"> <summary> Send mssql_client packets. </summary> @@ -42515,7 +42599,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51844"> +<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51862"> <summary> Do not audit attempts to send mssql_client packets. </summary> @@ -42526,7 +42610,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mssql_client_packets" lineno="51863"> +<interface name="corenet_receive_mssql_client_packets" lineno="51881"> <summary> Receive mssql_client packets. </summary> @@ -42537,7 +42621,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51882"> +<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51900"> <summary> Do not audit attempts to receive mssql_client packets. </summary> @@ -42548,7 +42632,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mssql_client_packets" lineno="51901"> +<interface name="corenet_sendrecv_mssql_client_packets" lineno="51919"> <summary> Send and receive mssql_client packets. </summary> @@ -42559,7 +42643,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51917"> +<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51935"> <summary> Do not audit attempts to send and receive mssql_client packets. </summary> @@ -42570,7 +42654,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mssql_client_packets" lineno="51932"> +<interface name="corenet_relabelto_mssql_client_packets" lineno="51950"> <summary> Relabel packets to mssql_client the packet type. </summary> @@ -42580,7 +42664,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mssql_server_packets" lineno="51952"> +<interface name="corenet_send_mssql_server_packets" lineno="51970"> <summary> Send mssql_server packets. </summary> @@ -42591,7 +42675,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51971"> +<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51989"> <summary> Do not audit attempts to send mssql_server packets. </summary> @@ -42602,7 +42686,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mssql_server_packets" lineno="51990"> +<interface name="corenet_receive_mssql_server_packets" lineno="52008"> <summary> Receive mssql_server packets. </summary> @@ -42613,7 +42697,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52009"> +<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52027"> <summary> Do not audit attempts to receive mssql_server packets. </summary> @@ -42624,7 +42708,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mssql_server_packets" lineno="52028"> +<interface name="corenet_sendrecv_mssql_server_packets" lineno="52046"> <summary> Send and receive mssql_server packets. </summary> @@ -42635,7 +42719,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52044"> +<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52062"> <summary> Do not audit attempts to send and receive mssql_server packets. </summary> @@ -42646,7 +42730,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mssql_server_packets" lineno="52059"> +<interface name="corenet_relabelto_mssql_server_packets" lineno="52077"> <summary> Relabel packets to mssql_server the packet type. </summary> @@ -42656,7 +42740,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52081"> +<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52099"> <summary> Send and receive TCP traffic on the ms_streaming port. </summary> @@ -42667,7 +42751,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ms_streaming_port" lineno="52096"> +<interface name="corenet_udp_send_ms_streaming_port" lineno="52114"> <summary> Send UDP traffic on the ms_streaming port. </summary> @@ -42678,7 +42762,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52111"> +<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52129"> <summary> Do not audit attempts to send UDP traffic on the ms_streaming port. </summary> @@ -42689,7 +42773,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ms_streaming_port" lineno="52126"> +<interface name="corenet_udp_receive_ms_streaming_port" lineno="52144"> <summary> Receive UDP traffic on the ms_streaming port. </summary> @@ -42700,7 +42784,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52141"> +<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52159"> <summary> Do not audit attempts to receive UDP traffic on the ms_streaming port. </summary> @@ -42711,7 +42795,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52156"> +<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52174"> <summary> Send and receive UDP traffic on the ms_streaming port. </summary> @@ -42722,7 +42806,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52172"> +<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52190"> <summary> Do not audit attempts to send and receive UDP traffic on the ms_streaming port. @@ -42734,7 +42818,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52187"> +<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52205"> <summary> Bind TCP sockets to the ms_streaming port. </summary> @@ -42745,7 +42829,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ms_streaming_port" lineno="52207"> +<interface name="corenet_udp_bind_ms_streaming_port" lineno="52225"> <summary> Bind UDP sockets to the ms_streaming port. </summary> @@ -42756,7 +42840,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52226"> +<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52244"> <summary> Make a TCP connection to the ms_streaming port. </summary> @@ -42766,7 +42850,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ms_streaming_client_packets" lineno="52246"> +<interface name="corenet_send_ms_streaming_client_packets" lineno="52264"> <summary> Send ms_streaming_client packets. </summary> @@ -42777,7 +42861,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52265"> +<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52283"> <summary> Do not audit attempts to send ms_streaming_client packets. </summary> @@ -42788,7 +42872,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ms_streaming_client_packets" lineno="52284"> +<interface name="corenet_receive_ms_streaming_client_packets" lineno="52302"> <summary> Receive ms_streaming_client packets. </summary> @@ -42799,7 +42883,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52303"> +<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52321"> <summary> Do not audit attempts to receive ms_streaming_client packets. </summary> @@ -42810,7 +42894,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52322"> +<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52340"> <summary> Send and receive ms_streaming_client packets. </summary> @@ -42821,7 +42905,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52338"> +<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52356"> <summary> Do not audit attempts to send and receive ms_streaming_client packets. </summary> @@ -42832,7 +42916,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52353"> +<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52371"> <summary> Relabel packets to ms_streaming_client the packet type. </summary> @@ -42842,7 +42926,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ms_streaming_server_packets" lineno="52373"> +<interface name="corenet_send_ms_streaming_server_packets" lineno="52391"> <summary> Send ms_streaming_server packets. </summary> @@ -42853,7 +42937,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52392"> +<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52410"> <summary> Do not audit attempts to send ms_streaming_server packets. </summary> @@ -42864,7 +42948,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ms_streaming_server_packets" lineno="52411"> +<interface name="corenet_receive_ms_streaming_server_packets" lineno="52429"> <summary> Receive ms_streaming_server packets. </summary> @@ -42875,7 +42959,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52430"> +<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52448"> <summary> Do not audit attempts to receive ms_streaming_server packets. </summary> @@ -42886,7 +42970,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52449"> +<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52467"> <summary> Send and receive ms_streaming_server packets. </summary> @@ -42897,7 +42981,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52465"> +<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52483"> <summary> Do not audit attempts to send and receive ms_streaming_server packets. </summary> @@ -42908,7 +42992,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52480"> +<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52498"> <summary> Relabel packets to ms_streaming_server the packet type. </summary> @@ -42918,7 +43002,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_munin_port" lineno="52502"> +<interface name="corenet_tcp_sendrecv_munin_port" lineno="52520"> <summary> Send and receive TCP traffic on the munin port. </summary> @@ -42929,7 +43013,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_munin_port" lineno="52517"> +<interface name="corenet_udp_send_munin_port" lineno="52535"> <summary> Send UDP traffic on the munin port. </summary> @@ -42940,7 +43024,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52532"> +<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52550"> <summary> Do not audit attempts to send UDP traffic on the munin port. </summary> @@ -42951,7 +43035,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_munin_port" lineno="52547"> +<interface name="corenet_udp_receive_munin_port" lineno="52565"> <summary> Receive UDP traffic on the munin port. </summary> @@ -42962,7 +43046,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52562"> +<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52580"> <summary> Do not audit attempts to receive UDP traffic on the munin port. </summary> @@ -42973,7 +43057,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_munin_port" lineno="52577"> +<interface name="corenet_udp_sendrecv_munin_port" lineno="52595"> <summary> Send and receive UDP traffic on the munin port. </summary> @@ -42984,7 +43068,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52593"> +<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52611"> <summary> Do not audit attempts to send and receive UDP traffic on the munin port. @@ -42996,7 +43080,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_munin_port" lineno="52608"> +<interface name="corenet_tcp_bind_munin_port" lineno="52626"> <summary> Bind TCP sockets to the munin port. </summary> @@ -43007,7 +43091,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_munin_port" lineno="52628"> +<interface name="corenet_udp_bind_munin_port" lineno="52646"> <summary> Bind UDP sockets to the munin port. </summary> @@ -43018,7 +43102,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_munin_port" lineno="52647"> +<interface name="corenet_tcp_connect_munin_port" lineno="52665"> <summary> Make a TCP connection to the munin port. </summary> @@ -43028,7 +43112,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_munin_client_packets" lineno="52667"> +<interface name="corenet_send_munin_client_packets" lineno="52685"> <summary> Send munin_client packets. </summary> @@ -43039,7 +43123,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52686"> +<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52704"> <summary> Do not audit attempts to send munin_client packets. </summary> @@ -43050,7 +43134,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_munin_client_packets" lineno="52705"> +<interface name="corenet_receive_munin_client_packets" lineno="52723"> <summary> Receive munin_client packets. </summary> @@ -43061,7 +43145,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52724"> +<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52742"> <summary> Do not audit attempts to receive munin_client packets. </summary> @@ -43072,7 +43156,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_munin_client_packets" lineno="52743"> +<interface name="corenet_sendrecv_munin_client_packets" lineno="52761"> <summary> Send and receive munin_client packets. </summary> @@ -43083,7 +43167,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52759"> +<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52777"> <summary> Do not audit attempts to send and receive munin_client packets. </summary> @@ -43094,7 +43178,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_munin_client_packets" lineno="52774"> +<interface name="corenet_relabelto_munin_client_packets" lineno="52792"> <summary> Relabel packets to munin_client the packet type. </summary> @@ -43104,7 +43188,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_munin_server_packets" lineno="52794"> +<interface name="corenet_send_munin_server_packets" lineno="52812"> <summary> Send munin_server packets. </summary> @@ -43115,7 +43199,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52813"> +<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52831"> <summary> Do not audit attempts to send munin_server packets. </summary> @@ -43126,7 +43210,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_munin_server_packets" lineno="52832"> +<interface name="corenet_receive_munin_server_packets" lineno="52850"> <summary> Receive munin_server packets. </summary> @@ -43137,7 +43221,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52851"> +<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52869"> <summary> Do not audit attempts to receive munin_server packets. </summary> @@ -43148,7 +43232,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_munin_server_packets" lineno="52870"> +<interface name="corenet_sendrecv_munin_server_packets" lineno="52888"> <summary> Send and receive munin_server packets. </summary> @@ -43159,7 +43243,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52886"> +<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52904"> <summary> Do not audit attempts to send and receive munin_server packets. </summary> @@ -43170,7 +43254,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_munin_server_packets" lineno="52901"> +<interface name="corenet_relabelto_munin_server_packets" lineno="52919"> <summary> Relabel packets to munin_server the packet type. </summary> @@ -43180,7 +43264,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52923"> +<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52941"> <summary> Send and receive TCP traffic on the mxi port. </summary> @@ -43191,7 +43275,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mxi_port" lineno="52938"> +<interface name="corenet_udp_send_mxi_port" lineno="52956"> <summary> Send UDP traffic on the mxi port. </summary> @@ -43202,7 +43286,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52953"> +<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52971"> <summary> Do not audit attempts to send UDP traffic on the mxi port. </summary> @@ -43213,7 +43297,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mxi_port" lineno="52968"> +<interface name="corenet_udp_receive_mxi_port" lineno="52986"> <summary> Receive UDP traffic on the mxi port. </summary> @@ -43224,7 +43308,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52983"> +<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="53001"> <summary> Do not audit attempts to receive UDP traffic on the mxi port. </summary> @@ -43235,7 +43319,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mxi_port" lineno="52998"> +<interface name="corenet_udp_sendrecv_mxi_port" lineno="53016"> <summary> Send and receive UDP traffic on the mxi port. </summary> @@ -43246,7 +43330,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53014"> +<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53032"> <summary> Do not audit attempts to send and receive UDP traffic on the mxi port. @@ -43258,7 +43342,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mxi_port" lineno="53029"> +<interface name="corenet_tcp_bind_mxi_port" lineno="53047"> <summary> Bind TCP sockets to the mxi port. </summary> @@ -43269,7 +43353,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mxi_port" lineno="53049"> +<interface name="corenet_udp_bind_mxi_port" lineno="53067"> <summary> Bind UDP sockets to the mxi port. </summary> @@ -43280,7 +43364,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mxi_port" lineno="53068"> +<interface name="corenet_tcp_connect_mxi_port" lineno="53086"> <summary> Make a TCP connection to the mxi port. </summary> @@ -43290,7 +43374,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mxi_client_packets" lineno="53088"> +<interface name="corenet_send_mxi_client_packets" lineno="53106"> <summary> Send mxi_client packets. </summary> @@ -43301,7 +43385,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53107"> +<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53125"> <summary> Do not audit attempts to send mxi_client packets. </summary> @@ -43312,7 +43396,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mxi_client_packets" lineno="53126"> +<interface name="corenet_receive_mxi_client_packets" lineno="53144"> <summary> Receive mxi_client packets. </summary> @@ -43323,7 +43407,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53145"> +<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53163"> <summary> Do not audit attempts to receive mxi_client packets. </summary> @@ -43334,7 +43418,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mxi_client_packets" lineno="53164"> +<interface name="corenet_sendrecv_mxi_client_packets" lineno="53182"> <summary> Send and receive mxi_client packets. </summary> @@ -43345,7 +43429,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53180"> +<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53198"> <summary> Do not audit attempts to send and receive mxi_client packets. </summary> @@ -43356,7 +43440,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mxi_client_packets" lineno="53195"> +<interface name="corenet_relabelto_mxi_client_packets" lineno="53213"> <summary> Relabel packets to mxi_client the packet type. </summary> @@ -43366,7 +43450,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mxi_server_packets" lineno="53215"> +<interface name="corenet_send_mxi_server_packets" lineno="53233"> <summary> Send mxi_server packets. </summary> @@ -43377,7 +43461,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53234"> +<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53252"> <summary> Do not audit attempts to send mxi_server packets. </summary> @@ -43388,7 +43472,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mxi_server_packets" lineno="53253"> +<interface name="corenet_receive_mxi_server_packets" lineno="53271"> <summary> Receive mxi_server packets. </summary> @@ -43399,7 +43483,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53272"> +<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53290"> <summary> Do not audit attempts to receive mxi_server packets. </summary> @@ -43410,7 +43494,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mxi_server_packets" lineno="53291"> +<interface name="corenet_sendrecv_mxi_server_packets" lineno="53309"> <summary> Send and receive mxi_server packets. </summary> @@ -43421,7 +43505,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53307"> +<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53325"> <summary> Do not audit attempts to send and receive mxi_server packets. </summary> @@ -43432,7 +43516,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mxi_server_packets" lineno="53322"> +<interface name="corenet_relabelto_mxi_server_packets" lineno="53340"> <summary> Relabel packets to mxi_server the packet type. </summary> @@ -43442,7 +43526,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53344"> +<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53362"> <summary> Send and receive TCP traffic on the mysqld port. </summary> @@ -43453,7 +43537,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mysqld_port" lineno="53359"> +<interface name="corenet_udp_send_mysqld_port" lineno="53377"> <summary> Send UDP traffic on the mysqld port. </summary> @@ -43464,7 +43548,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53374"> +<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53392"> <summary> Do not audit attempts to send UDP traffic on the mysqld port. </summary> @@ -43475,7 +43559,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mysqld_port" lineno="53389"> +<interface name="corenet_udp_receive_mysqld_port" lineno="53407"> <summary> Receive UDP traffic on the mysqld port. </summary> @@ -43486,7 +43570,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53404"> +<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53422"> <summary> Do not audit attempts to receive UDP traffic on the mysqld port. </summary> @@ -43497,7 +43581,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53419"> +<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53437"> <summary> Send and receive UDP traffic on the mysqld port. </summary> @@ -43508,7 +43592,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53435"> +<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53453"> <summary> Do not audit attempts to send and receive UDP traffic on the mysqld port. @@ -43520,7 +43604,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mysqld_port" lineno="53450"> +<interface name="corenet_tcp_bind_mysqld_port" lineno="53468"> <summary> Bind TCP sockets to the mysqld port. </summary> @@ -43531,7 +43615,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mysqld_port" lineno="53470"> +<interface name="corenet_udp_bind_mysqld_port" lineno="53488"> <summary> Bind UDP sockets to the mysqld port. </summary> @@ -43542,7 +43626,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mysqld_port" lineno="53489"> +<interface name="corenet_tcp_connect_mysqld_port" lineno="53507"> <summary> Make a TCP connection to the mysqld port. </summary> @@ -43552,7 +43636,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqld_client_packets" lineno="53509"> +<interface name="corenet_send_mysqld_client_packets" lineno="53527"> <summary> Send mysqld_client packets. </summary> @@ -43563,7 +43647,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53528"> +<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53546"> <summary> Do not audit attempts to send mysqld_client packets. </summary> @@ -43574,7 +43658,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqld_client_packets" lineno="53547"> +<interface name="corenet_receive_mysqld_client_packets" lineno="53565"> <summary> Receive mysqld_client packets. </summary> @@ -43585,7 +43669,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53566"> +<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53584"> <summary> Do not audit attempts to receive mysqld_client packets. </summary> @@ -43596,7 +43680,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53585"> +<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53603"> <summary> Send and receive mysqld_client packets. </summary> @@ -43607,7 +43691,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53601"> +<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53619"> <summary> Do not audit attempts to send and receive mysqld_client packets. </summary> @@ -43618,7 +43702,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqld_client_packets" lineno="53616"> +<interface name="corenet_relabelto_mysqld_client_packets" lineno="53634"> <summary> Relabel packets to mysqld_client the packet type. </summary> @@ -43628,7 +43712,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqld_server_packets" lineno="53636"> +<interface name="corenet_send_mysqld_server_packets" lineno="53654"> <summary> Send mysqld_server packets. </summary> @@ -43639,7 +43723,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53655"> +<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53673"> <summary> Do not audit attempts to send mysqld_server packets. </summary> @@ -43650,7 +43734,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqld_server_packets" lineno="53674"> +<interface name="corenet_receive_mysqld_server_packets" lineno="53692"> <summary> Receive mysqld_server packets. </summary> @@ -43661,7 +43745,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53693"> +<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53711"> <summary> Do not audit attempts to receive mysqld_server packets. </summary> @@ -43672,7 +43756,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53712"> +<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53730"> <summary> Send and receive mysqld_server packets. </summary> @@ -43683,7 +43767,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53728"> +<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53746"> <summary> Do not audit attempts to send and receive mysqld_server packets. </summary> @@ -43694,7 +43778,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqld_server_packets" lineno="53743"> +<interface name="corenet_relabelto_mysqld_server_packets" lineno="53761"> <summary> Relabel packets to mysqld_server the packet type. </summary> @@ -43704,7 +43788,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53765"> +<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53783"> <summary> Send and receive TCP traffic on the mysqlmanagerd port. </summary> @@ -43715,7 +43799,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53780"> +<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53798"> <summary> Send UDP traffic on the mysqlmanagerd port. </summary> @@ -43726,7 +43810,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53795"> +<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53813"> <summary> Do not audit attempts to send UDP traffic on the mysqlmanagerd port. </summary> @@ -43737,7 +43821,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53810"> +<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53828"> <summary> Receive UDP traffic on the mysqlmanagerd port. </summary> @@ -43748,7 +43832,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53825"> +<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53843"> <summary> Do not audit attempts to receive UDP traffic on the mysqlmanagerd port. </summary> @@ -43759,7 +43843,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53840"> +<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53858"> <summary> Send and receive UDP traffic on the mysqlmanagerd port. </summary> @@ -43770,7 +43854,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53856"> +<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53874"> <summary> Do not audit attempts to send and receive UDP traffic on the mysqlmanagerd port. @@ -43782,7 +43866,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53871"> +<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53889"> <summary> Bind TCP sockets to the mysqlmanagerd port. </summary> @@ -43793,7 +43877,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53891"> +<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53909"> <summary> Bind UDP sockets to the mysqlmanagerd port. </summary> @@ -43804,7 +43888,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53910"> +<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53928"> <summary> Make a TCP connection to the mysqlmanagerd port. </summary> @@ -43814,7 +43898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53930"> +<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53948"> <summary> Send mysqlmanagerd_client packets. </summary> @@ -43825,7 +43909,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53949"> +<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53967"> <summary> Do not audit attempts to send mysqlmanagerd_client packets. </summary> @@ -43836,7 +43920,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53968"> +<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53986"> <summary> Receive mysqlmanagerd_client packets. </summary> @@ -43847,7 +43931,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53987"> +<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="54005"> <summary> Do not audit attempts to receive mysqlmanagerd_client packets. </summary> @@ -43858,7 +43942,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54006"> +<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54024"> <summary> Send and receive mysqlmanagerd_client packets. </summary> @@ -43869,7 +43953,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54022"> +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54040"> <summary> Do not audit attempts to send and receive mysqlmanagerd_client packets. </summary> @@ -43880,7 +43964,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54037"> +<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54055"> <summary> Relabel packets to mysqlmanagerd_client the packet type. </summary> @@ -43890,7 +43974,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54057"> +<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54075"> <summary> Send mysqlmanagerd_server packets. </summary> @@ -43901,7 +43985,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54076"> +<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54094"> <summary> Do not audit attempts to send mysqlmanagerd_server packets. </summary> @@ -43912,7 +43996,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54095"> +<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54113"> <summary> Receive mysqlmanagerd_server packets. </summary> @@ -43923,7 +44007,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54114"> +<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54132"> <summary> Do not audit attempts to receive mysqlmanagerd_server packets. </summary> @@ -43934,7 +44018,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54133"> +<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54151"> <summary> Send and receive mysqlmanagerd_server packets. </summary> @@ -43945,7 +44029,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54149"> +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54167"> <summary> Do not audit attempts to send and receive mysqlmanagerd_server packets. </summary> @@ -43956,7 +44040,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54164"> +<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54182"> <summary> Relabel packets to mysqlmanagerd_server the packet type. </summary> @@ -43966,7 +44050,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54186"> +<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54204"> <summary> Send and receive TCP traffic on the nessus port. </summary> @@ -43977,7 +44061,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_nessus_port" lineno="54201"> +<interface name="corenet_udp_send_nessus_port" lineno="54219"> <summary> Send UDP traffic on the nessus port. </summary> @@ -43988,7 +44072,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54216"> +<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54234"> <summary> Do not audit attempts to send UDP traffic on the nessus port. </summary> @@ -43999,7 +44083,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_nessus_port" lineno="54231"> +<interface name="corenet_udp_receive_nessus_port" lineno="54249"> <summary> Receive UDP traffic on the nessus port. </summary> @@ -44010,7 +44094,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54246"> +<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54264"> <summary> Do not audit attempts to receive UDP traffic on the nessus port. </summary> @@ -44021,7 +44105,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_nessus_port" lineno="54261"> +<interface name="corenet_udp_sendrecv_nessus_port" lineno="54279"> <summary> Send and receive UDP traffic on the nessus port. </summary> @@ -44032,7 +44116,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54277"> +<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54295"> <summary> Do not audit attempts to send and receive UDP traffic on the nessus port. @@ -44044,7 +44128,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_nessus_port" lineno="54292"> +<interface name="corenet_tcp_bind_nessus_port" lineno="54310"> <summary> Bind TCP sockets to the nessus port. </summary> @@ -44055,7 +44139,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nessus_port" lineno="54312"> +<interface name="corenet_udp_bind_nessus_port" lineno="54330"> <summary> Bind UDP sockets to the nessus port. </summary> @@ -44066,7 +44150,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nessus_port" lineno="54331"> +<interface name="corenet_tcp_connect_nessus_port" lineno="54349"> <summary> Make a TCP connection to the nessus port. </summary> @@ -44076,7 +44160,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nessus_client_packets" lineno="54351"> +<interface name="corenet_send_nessus_client_packets" lineno="54369"> <summary> Send nessus_client packets. </summary> @@ -44087,7 +44171,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54370"> +<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54388"> <summary> Do not audit attempts to send nessus_client packets. </summary> @@ -44098,7 +44182,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nessus_client_packets" lineno="54389"> +<interface name="corenet_receive_nessus_client_packets" lineno="54407"> <summary> Receive nessus_client packets. </summary> @@ -44109,7 +44193,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54408"> +<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54426"> <summary> Do not audit attempts to receive nessus_client packets. </summary> @@ -44120,7 +44204,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nessus_client_packets" lineno="54427"> +<interface name="corenet_sendrecv_nessus_client_packets" lineno="54445"> <summary> Send and receive nessus_client packets. </summary> @@ -44131,7 +44215,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54443"> +<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54461"> <summary> Do not audit attempts to send and receive nessus_client packets. </summary> @@ -44142,7 +44226,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nessus_client_packets" lineno="54458"> +<interface name="corenet_relabelto_nessus_client_packets" lineno="54476"> <summary> Relabel packets to nessus_client the packet type. </summary> @@ -44152,7 +44236,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nessus_server_packets" lineno="54478"> +<interface name="corenet_send_nessus_server_packets" lineno="54496"> <summary> Send nessus_server packets. </summary> @@ -44163,7 +44247,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54497"> +<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54515"> <summary> Do not audit attempts to send nessus_server packets. </summary> @@ -44174,7 +44258,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nessus_server_packets" lineno="54516"> +<interface name="corenet_receive_nessus_server_packets" lineno="54534"> <summary> Receive nessus_server packets. </summary> @@ -44185,7 +44269,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54535"> +<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54553"> <summary> Do not audit attempts to receive nessus_server packets. </summary> @@ -44196,7 +44280,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nessus_server_packets" lineno="54554"> +<interface name="corenet_sendrecv_nessus_server_packets" lineno="54572"> <summary> Send and receive nessus_server packets. </summary> @@ -44207,7 +44291,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54570"> +<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54588"> <summary> Do not audit attempts to send and receive nessus_server packets. </summary> @@ -44218,7 +44302,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nessus_server_packets" lineno="54585"> +<interface name="corenet_relabelto_nessus_server_packets" lineno="54603"> <summary> Relabel packets to nessus_server the packet type. </summary> @@ -44228,7 +44312,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_netport_port" lineno="54607"> +<interface name="corenet_tcp_sendrecv_netport_port" lineno="54625"> <summary> Send and receive TCP traffic on the netport port. </summary> @@ -44239,7 +44323,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_netport_port" lineno="54622"> +<interface name="corenet_udp_send_netport_port" lineno="54640"> <summary> Send UDP traffic on the netport port. </summary> @@ -44250,7 +44334,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54637"> +<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54655"> <summary> Do not audit attempts to send UDP traffic on the netport port. </summary> @@ -44261,7 +44345,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_netport_port" lineno="54652"> +<interface name="corenet_udp_receive_netport_port" lineno="54670"> <summary> Receive UDP traffic on the netport port. </summary> @@ -44272,7 +44356,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54667"> +<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54685"> <summary> Do not audit attempts to receive UDP traffic on the netport port. </summary> @@ -44283,7 +44367,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_netport_port" lineno="54682"> +<interface name="corenet_udp_sendrecv_netport_port" lineno="54700"> <summary> Send and receive UDP traffic on the netport port. </summary> @@ -44294,7 +44378,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54698"> +<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54716"> <summary> Do not audit attempts to send and receive UDP traffic on the netport port. @@ -44306,7 +44390,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_netport_port" lineno="54713"> +<interface name="corenet_tcp_bind_netport_port" lineno="54731"> <summary> Bind TCP sockets to the netport port. </summary> @@ -44317,7 +44401,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_netport_port" lineno="54733"> +<interface name="corenet_udp_bind_netport_port" lineno="54751"> <summary> Bind UDP sockets to the netport port. </summary> @@ -44328,7 +44412,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_netport_port" lineno="54752"> +<interface name="corenet_tcp_connect_netport_port" lineno="54770"> <summary> Make a TCP connection to the netport port. </summary> @@ -44338,7 +44422,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netport_client_packets" lineno="54772"> +<interface name="corenet_send_netport_client_packets" lineno="54790"> <summary> Send netport_client packets. </summary> @@ -44349,7 +44433,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54791"> +<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54809"> <summary> Do not audit attempts to send netport_client packets. </summary> @@ -44360,7 +44444,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netport_client_packets" lineno="54810"> +<interface name="corenet_receive_netport_client_packets" lineno="54828"> <summary> Receive netport_client packets. </summary> @@ -44371,7 +44455,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54829"> +<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54847"> <summary> Do not audit attempts to receive netport_client packets. </summary> @@ -44382,7 +44466,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netport_client_packets" lineno="54848"> +<interface name="corenet_sendrecv_netport_client_packets" lineno="54866"> <summary> Send and receive netport_client packets. </summary> @@ -44393,7 +44477,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54864"> +<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54882"> <summary> Do not audit attempts to send and receive netport_client packets. </summary> @@ -44404,7 +44488,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netport_client_packets" lineno="54879"> +<interface name="corenet_relabelto_netport_client_packets" lineno="54897"> <summary> Relabel packets to netport_client the packet type. </summary> @@ -44414,7 +44498,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netport_server_packets" lineno="54899"> +<interface name="corenet_send_netport_server_packets" lineno="54917"> <summary> Send netport_server packets. </summary> @@ -44425,7 +44509,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54918"> +<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54936"> <summary> Do not audit attempts to send netport_server packets. </summary> @@ -44436,7 +44520,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netport_server_packets" lineno="54937"> +<interface name="corenet_receive_netport_server_packets" lineno="54955"> <summary> Receive netport_server packets. </summary> @@ -44447,7 +44531,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54956"> +<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54974"> <summary> Do not audit attempts to receive netport_server packets. </summary> @@ -44458,7 +44542,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netport_server_packets" lineno="54975"> +<interface name="corenet_sendrecv_netport_server_packets" lineno="54993"> <summary> Send and receive netport_server packets. </summary> @@ -44469,7 +44553,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54991"> +<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="55009"> <summary> Do not audit attempts to send and receive netport_server packets. </summary> @@ -44480,7 +44564,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netport_server_packets" lineno="55006"> +<interface name="corenet_relabelto_netport_server_packets" lineno="55024"> <summary> Relabel packets to netport_server the packet type. </summary> @@ -44490,7 +44574,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55028"> +<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55046"> <summary> Send and receive TCP traffic on the netsupport port. </summary> @@ -44501,7 +44585,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_netsupport_port" lineno="55043"> +<interface name="corenet_udp_send_netsupport_port" lineno="55061"> <summary> Send UDP traffic on the netsupport port. </summary> @@ -44512,7 +44596,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55058"> +<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55076"> <summary> Do not audit attempts to send UDP traffic on the netsupport port. </summary> @@ -44523,7 +44607,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_netsupport_port" lineno="55073"> +<interface name="corenet_udp_receive_netsupport_port" lineno="55091"> <summary> Receive UDP traffic on the netsupport port. </summary> @@ -44534,7 +44618,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55088"> +<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55106"> <summary> Do not audit attempts to receive UDP traffic on the netsupport port. </summary> @@ -44545,7 +44629,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55103"> +<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55121"> <summary> Send and receive UDP traffic on the netsupport port. </summary> @@ -44556,7 +44640,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55119"> +<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55137"> <summary> Do not audit attempts to send and receive UDP traffic on the netsupport port. @@ -44568,7 +44652,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_netsupport_port" lineno="55134"> +<interface name="corenet_tcp_bind_netsupport_port" lineno="55152"> <summary> Bind TCP sockets to the netsupport port. </summary> @@ -44579,7 +44663,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_netsupport_port" lineno="55154"> +<interface name="corenet_udp_bind_netsupport_port" lineno="55172"> <summary> Bind UDP sockets to the netsupport port. </summary> @@ -44590,7 +44674,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_netsupport_port" lineno="55173"> +<interface name="corenet_tcp_connect_netsupport_port" lineno="55191"> <summary> Make a TCP connection to the netsupport port. </summary> @@ -44600,7 +44684,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netsupport_client_packets" lineno="55193"> +<interface name="corenet_send_netsupport_client_packets" lineno="55211"> <summary> Send netsupport_client packets. </summary> @@ -44611,7 +44695,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55212"> +<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55230"> <summary> Do not audit attempts to send netsupport_client packets. </summary> @@ -44622,7 +44706,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netsupport_client_packets" lineno="55231"> +<interface name="corenet_receive_netsupport_client_packets" lineno="55249"> <summary> Receive netsupport_client packets. </summary> @@ -44633,7 +44717,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55250"> +<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55268"> <summary> Do not audit attempts to receive netsupport_client packets. </summary> @@ -44644,7 +44728,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55269"> +<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55287"> <summary> Send and receive netsupport_client packets. </summary> @@ -44655,7 +44739,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55285"> +<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55303"> <summary> Do not audit attempts to send and receive netsupport_client packets. </summary> @@ -44666,7 +44750,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netsupport_client_packets" lineno="55300"> +<interface name="corenet_relabelto_netsupport_client_packets" lineno="55318"> <summary> Relabel packets to netsupport_client the packet type. </summary> @@ -44676,7 +44760,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netsupport_server_packets" lineno="55320"> +<interface name="corenet_send_netsupport_server_packets" lineno="55338"> <summary> Send netsupport_server packets. </summary> @@ -44687,7 +44771,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55339"> +<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55357"> <summary> Do not audit attempts to send netsupport_server packets. </summary> @@ -44698,7 +44782,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netsupport_server_packets" lineno="55358"> +<interface name="corenet_receive_netsupport_server_packets" lineno="55376"> <summary> Receive netsupport_server packets. </summary> @@ -44709,7 +44793,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55377"> +<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55395"> <summary> Do not audit attempts to receive netsupport_server packets. </summary> @@ -44720,7 +44804,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55396"> +<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55414"> <summary> Send and receive netsupport_server packets. </summary> @@ -44731,7 +44815,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55412"> +<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55430"> <summary> Do not audit attempts to send and receive netsupport_server packets. </summary> @@ -44742,7 +44826,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netsupport_server_packets" lineno="55427"> +<interface name="corenet_relabelto_netsupport_server_packets" lineno="55445"> <summary> Relabel packets to netsupport_server the packet type. </summary> @@ -44752,7 +44836,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55449"> +<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55467"> <summary> Send and receive TCP traffic on the nfs port. </summary> @@ -44763,7 +44847,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_nfs_port" lineno="55464"> +<interface name="corenet_udp_send_nfs_port" lineno="55482"> <summary> Send UDP traffic on the nfs port. </summary> @@ -44774,7 +44858,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55479"> +<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55497"> <summary> Do not audit attempts to send UDP traffic on the nfs port. </summary> @@ -44785,7 +44869,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_nfs_port" lineno="55494"> +<interface name="corenet_udp_receive_nfs_port" lineno="55512"> <summary> Receive UDP traffic on the nfs port. </summary> @@ -44796,7 +44880,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55509"> +<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55527"> <summary> Do not audit attempts to receive UDP traffic on the nfs port. </summary> @@ -44807,7 +44891,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_nfs_port" lineno="55524"> +<interface name="corenet_udp_sendrecv_nfs_port" lineno="55542"> <summary> Send and receive UDP traffic on the nfs port. </summary> @@ -44818,7 +44902,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55540"> +<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55558"> <summary> Do not audit attempts to send and receive UDP traffic on the nfs port. @@ -44830,7 +44914,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_nfs_port" lineno="55555"> +<interface name="corenet_tcp_bind_nfs_port" lineno="55573"> <summary> Bind TCP sockets to the nfs port. </summary> @@ -44841,7 +44925,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nfs_port" lineno="55575"> +<interface name="corenet_udp_bind_nfs_port" lineno="55593"> <summary> Bind UDP sockets to the nfs port. </summary> @@ -44852,7 +44936,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nfs_port" lineno="55594"> +<interface name="corenet_tcp_connect_nfs_port" lineno="55612"> <summary> Make a TCP connection to the nfs port. </summary> @@ -44862,7 +44946,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfs_client_packets" lineno="55614"> +<interface name="corenet_send_nfs_client_packets" lineno="55632"> <summary> Send nfs_client packets. </summary> @@ -44873,7 +44957,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55633"> +<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55651"> <summary> Do not audit attempts to send nfs_client packets. </summary> @@ -44884,7 +44968,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfs_client_packets" lineno="55652"> +<interface name="corenet_receive_nfs_client_packets" lineno="55670"> <summary> Receive nfs_client packets. </summary> @@ -44895,7 +44979,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55671"> +<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55689"> <summary> Do not audit attempts to receive nfs_client packets. </summary> @@ -44906,7 +44990,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfs_client_packets" lineno="55690"> +<interface name="corenet_sendrecv_nfs_client_packets" lineno="55708"> <summary> Send and receive nfs_client packets. </summary> @@ -44917,7 +45001,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55706"> +<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55724"> <summary> Do not audit attempts to send and receive nfs_client packets. </summary> @@ -44928,7 +45012,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfs_client_packets" lineno="55721"> +<interface name="corenet_relabelto_nfs_client_packets" lineno="55739"> <summary> Relabel packets to nfs_client the packet type. </summary> @@ -44938,7 +45022,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfs_server_packets" lineno="55741"> +<interface name="corenet_send_nfs_server_packets" lineno="55759"> <summary> Send nfs_server packets. </summary> @@ -44949,7 +45033,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55760"> +<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55778"> <summary> Do not audit attempts to send nfs_server packets. </summary> @@ -44960,7 +45044,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfs_server_packets" lineno="55779"> +<interface name="corenet_receive_nfs_server_packets" lineno="55797"> <summary> Receive nfs_server packets. </summary> @@ -44971,7 +45055,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55798"> +<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55816"> <summary> Do not audit attempts to receive nfs_server packets. </summary> @@ -44982,7 +45066,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfs_server_packets" lineno="55817"> +<interface name="corenet_sendrecv_nfs_server_packets" lineno="55835"> <summary> Send and receive nfs_server packets. </summary> @@ -44993,7 +45077,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55833"> +<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55851"> <summary> Do not audit attempts to send and receive nfs_server packets. </summary> @@ -45004,7 +45088,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfs_server_packets" lineno="55848"> +<interface name="corenet_relabelto_nfs_server_packets" lineno="55866"> <summary> Relabel packets to nfs_server the packet type. </summary> @@ -45014,7 +45098,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55870"> +<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55888"> <summary> Send and receive TCP traffic on the nfsrdma port. </summary> @@ -45025,7 +45109,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_nfsrdma_port" lineno="55885"> +<interface name="corenet_udp_send_nfsrdma_port" lineno="55903"> <summary> Send UDP traffic on the nfsrdma port. </summary> @@ -45036,7 +45120,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55900"> +<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55918"> <summary> Do not audit attempts to send UDP traffic on the nfsrdma port. </summary> @@ -45047,7 +45131,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_nfsrdma_port" lineno="55915"> +<interface name="corenet_udp_receive_nfsrdma_port" lineno="55933"> <summary> Receive UDP traffic on the nfsrdma port. </summary> @@ -45058,7 +45142,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55930"> +<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55948"> <summary> Do not audit attempts to receive UDP traffic on the nfsrdma port. </summary> @@ -45069,7 +45153,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55945"> +<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55963"> <summary> Send and receive UDP traffic on the nfsrdma port. </summary> @@ -45080,7 +45164,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55961"> +<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55979"> <summary> Do not audit attempts to send and receive UDP traffic on the nfsrdma port. @@ -45092,7 +45176,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55976"> +<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55994"> <summary> Bind TCP sockets to the nfsrdma port. </summary> @@ -45103,7 +45187,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nfsrdma_port" lineno="55996"> +<interface name="corenet_udp_bind_nfsrdma_port" lineno="56014"> <summary> Bind UDP sockets to the nfsrdma port. </summary> @@ -45114,7 +45198,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56015"> +<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56033"> <summary> Make a TCP connection to the nfsrdma port. </summary> @@ -45124,7 +45208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfsrdma_client_packets" lineno="56035"> +<interface name="corenet_send_nfsrdma_client_packets" lineno="56053"> <summary> Send nfsrdma_client packets. </summary> @@ -45135,7 +45219,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56054"> +<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56072"> <summary> Do not audit attempts to send nfsrdma_client packets. </summary> @@ -45146,7 +45230,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfsrdma_client_packets" lineno="56073"> +<interface name="corenet_receive_nfsrdma_client_packets" lineno="56091"> <summary> Receive nfsrdma_client packets. </summary> @@ -45157,7 +45241,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56092"> +<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56110"> <summary> Do not audit attempts to receive nfsrdma_client packets. </summary> @@ -45168,7 +45252,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56111"> +<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56129"> <summary> Send and receive nfsrdma_client packets. </summary> @@ -45179,7 +45263,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56127"> +<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56145"> <summary> Do not audit attempts to send and receive nfsrdma_client packets. </summary> @@ -45190,7 +45274,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56142"> +<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56160"> <summary> Relabel packets to nfsrdma_client the packet type. </summary> @@ -45200,7 +45284,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfsrdma_server_packets" lineno="56162"> +<interface name="corenet_send_nfsrdma_server_packets" lineno="56180"> <summary> Send nfsrdma_server packets. </summary> @@ -45211,7 +45295,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56181"> +<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56199"> <summary> Do not audit attempts to send nfsrdma_server packets. </summary> @@ -45222,7 +45306,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfsrdma_server_packets" lineno="56200"> +<interface name="corenet_receive_nfsrdma_server_packets" lineno="56218"> <summary> Receive nfsrdma_server packets. </summary> @@ -45233,7 +45317,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56219"> +<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56237"> <summary> Do not audit attempts to receive nfsrdma_server packets. </summary> @@ -45244,7 +45328,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56238"> +<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56256"> <summary> Send and receive nfsrdma_server packets. </summary> @@ -45255,7 +45339,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56254"> +<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56272"> <summary> Do not audit attempts to send and receive nfsrdma_server packets. </summary> @@ -45266,7 +45350,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56269"> +<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56287"> <summary> Relabel packets to nfsrdma_server the packet type. </summary> @@ -45276,7 +45360,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56291"> +<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56309"> <summary> Send and receive TCP traffic on the nmbd port. </summary> @@ -45287,7 +45371,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_nmbd_port" lineno="56306"> +<interface name="corenet_udp_send_nmbd_port" lineno="56324"> <summary> Send UDP traffic on the nmbd port. </summary> @@ -45298,7 +45382,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56321"> +<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56339"> <summary> Do not audit attempts to send UDP traffic on the nmbd port. </summary> @@ -45309,7 +45393,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_nmbd_port" lineno="56336"> +<interface name="corenet_udp_receive_nmbd_port" lineno="56354"> <summary> Receive UDP traffic on the nmbd port. </summary> @@ -45320,7 +45404,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56351"> +<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56369"> <summary> Do not audit attempts to receive UDP traffic on the nmbd port. </summary> @@ -45331,7 +45415,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56366"> +<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56384"> <summary> Send and receive UDP traffic on the nmbd port. </summary> @@ -45342,7 +45426,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56382"> +<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56400"> <summary> Do not audit attempts to send and receive UDP traffic on the nmbd port. @@ -45354,7 +45438,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_nmbd_port" lineno="56397"> +<interface name="corenet_tcp_bind_nmbd_port" lineno="56415"> <summary> Bind TCP sockets to the nmbd port. </summary> @@ -45365,7 +45449,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nmbd_port" lineno="56417"> +<interface name="corenet_udp_bind_nmbd_port" lineno="56435"> <summary> Bind UDP sockets to the nmbd port. </summary> @@ -45376,7 +45460,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nmbd_port" lineno="56436"> +<interface name="corenet_tcp_connect_nmbd_port" lineno="56454"> <summary> Make a TCP connection to the nmbd port. </summary> @@ -45386,7 +45470,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nmbd_client_packets" lineno="56456"> +<interface name="corenet_send_nmbd_client_packets" lineno="56474"> <summary> Send nmbd_client packets. </summary> @@ -45397,7 +45481,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56475"> +<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56493"> <summary> Do not audit attempts to send nmbd_client packets. </summary> @@ -45408,7 +45492,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nmbd_client_packets" lineno="56494"> +<interface name="corenet_receive_nmbd_client_packets" lineno="56512"> <summary> Receive nmbd_client packets. </summary> @@ -45419,7 +45503,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56513"> +<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56531"> <summary> Do not audit attempts to receive nmbd_client packets. </summary> @@ -45430,7 +45514,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56532"> +<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56550"> <summary> Send and receive nmbd_client packets. </summary> @@ -45441,7 +45525,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56548"> +<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56566"> <summary> Do not audit attempts to send and receive nmbd_client packets. </summary> @@ -45452,7 +45536,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nmbd_client_packets" lineno="56563"> +<interface name="corenet_relabelto_nmbd_client_packets" lineno="56581"> <summary> Relabel packets to nmbd_client the packet type. </summary> @@ -45462,7 +45546,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nmbd_server_packets" lineno="56583"> +<interface name="corenet_send_nmbd_server_packets" lineno="56601"> <summary> Send nmbd_server packets. </summary> @@ -45473,7 +45557,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56602"> +<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56620"> <summary> Do not audit attempts to send nmbd_server packets. </summary> @@ -45484,7 +45568,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nmbd_server_packets" lineno="56621"> +<interface name="corenet_receive_nmbd_server_packets" lineno="56639"> <summary> Receive nmbd_server packets. </summary> @@ -45495,7 +45579,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56640"> +<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56658"> <summary> Do not audit attempts to receive nmbd_server packets. </summary> @@ -45506,7 +45590,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56659"> +<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56677"> <summary> Send and receive nmbd_server packets. </summary> @@ -45517,7 +45601,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56675"> +<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56693"> <summary> Do not audit attempts to send and receive nmbd_server packets. </summary> @@ -45528,7 +45612,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nmbd_server_packets" lineno="56690"> +<interface name="corenet_relabelto_nmbd_server_packets" lineno="56708"> <summary> Relabel packets to nmbd_server the packet type. </summary> @@ -45538,7 +45622,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56712"> +<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56730"> <summary> Send and receive TCP traffic on the ntop port. </summary> @@ -45549,7 +45633,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ntop_port" lineno="56727"> +<interface name="corenet_udp_send_ntop_port" lineno="56745"> <summary> Send UDP traffic on the ntop port. </summary> @@ -45560,7 +45644,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56742"> +<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56760"> <summary> Do not audit attempts to send UDP traffic on the ntop port. </summary> @@ -45571,7 +45655,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ntop_port" lineno="56757"> +<interface name="corenet_udp_receive_ntop_port" lineno="56775"> <summary> Receive UDP traffic on the ntop port. </summary> @@ -45582,7 +45666,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56772"> +<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56790"> <summary> Do not audit attempts to receive UDP traffic on the ntop port. </summary> @@ -45593,7 +45677,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ntop_port" lineno="56787"> +<interface name="corenet_udp_sendrecv_ntop_port" lineno="56805"> <summary> Send and receive UDP traffic on the ntop port. </summary> @@ -45604,7 +45688,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56803"> +<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56821"> <summary> Do not audit attempts to send and receive UDP traffic on the ntop port. @@ -45616,7 +45700,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ntop_port" lineno="56818"> +<interface name="corenet_tcp_bind_ntop_port" lineno="56836"> <summary> Bind TCP sockets to the ntop port. </summary> @@ -45627,7 +45711,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ntop_port" lineno="56838"> +<interface name="corenet_udp_bind_ntop_port" lineno="56856"> <summary> Bind UDP sockets to the ntop port. </summary> @@ -45638,7 +45722,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ntop_port" lineno="56857"> +<interface name="corenet_tcp_connect_ntop_port" lineno="56875"> <summary> Make a TCP connection to the ntop port. </summary> @@ -45648,7 +45732,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntop_client_packets" lineno="56877"> +<interface name="corenet_send_ntop_client_packets" lineno="56895"> <summary> Send ntop_client packets. </summary> @@ -45659,7 +45743,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56896"> +<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56914"> <summary> Do not audit attempts to send ntop_client packets. </summary> @@ -45670,7 +45754,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntop_client_packets" lineno="56915"> +<interface name="corenet_receive_ntop_client_packets" lineno="56933"> <summary> Receive ntop_client packets. </summary> @@ -45681,7 +45765,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56934"> +<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56952"> <summary> Do not audit attempts to receive ntop_client packets. </summary> @@ -45692,7 +45776,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntop_client_packets" lineno="56953"> +<interface name="corenet_sendrecv_ntop_client_packets" lineno="56971"> <summary> Send and receive ntop_client packets. </summary> @@ -45703,7 +45787,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56969"> +<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56987"> <summary> Do not audit attempts to send and receive ntop_client packets. </summary> @@ -45714,7 +45798,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntop_client_packets" lineno="56984"> +<interface name="corenet_relabelto_ntop_client_packets" lineno="57002"> <summary> Relabel packets to ntop_client the packet type. </summary> @@ -45724,7 +45808,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntop_server_packets" lineno="57004"> +<interface name="corenet_send_ntop_server_packets" lineno="57022"> <summary> Send ntop_server packets. </summary> @@ -45735,7 +45819,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57023"> +<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57041"> <summary> Do not audit attempts to send ntop_server packets. </summary> @@ -45746,7 +45830,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntop_server_packets" lineno="57042"> +<interface name="corenet_receive_ntop_server_packets" lineno="57060"> <summary> Receive ntop_server packets. </summary> @@ -45757,7 +45841,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57061"> +<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57079"> <summary> Do not audit attempts to receive ntop_server packets. </summary> @@ -45768,7 +45852,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntop_server_packets" lineno="57080"> +<interface name="corenet_sendrecv_ntop_server_packets" lineno="57098"> <summary> Send and receive ntop_server packets. </summary> @@ -45779,7 +45863,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57096"> +<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57114"> <summary> Do not audit attempts to send and receive ntop_server packets. </summary> @@ -45790,7 +45874,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntop_server_packets" lineno="57111"> +<interface name="corenet_relabelto_ntop_server_packets" lineno="57129"> <summary> Relabel packets to ntop_server the packet type. </summary> @@ -45800,7 +45884,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57133"> +<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57151"> <summary> Send and receive TCP traffic on the ntp port. </summary> @@ -45811,7 +45895,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ntp_port" lineno="57148"> +<interface name="corenet_udp_send_ntp_port" lineno="57166"> <summary> Send UDP traffic on the ntp port. </summary> @@ -45822,7 +45906,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57163"> +<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57181"> <summary> Do not audit attempts to send UDP traffic on the ntp port. </summary> @@ -45833,7 +45917,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ntp_port" lineno="57178"> +<interface name="corenet_udp_receive_ntp_port" lineno="57196"> <summary> Receive UDP traffic on the ntp port. </summary> @@ -45844,7 +45928,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57193"> +<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57211"> <summary> Do not audit attempts to receive UDP traffic on the ntp port. </summary> @@ -45855,7 +45939,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ntp_port" lineno="57208"> +<interface name="corenet_udp_sendrecv_ntp_port" lineno="57226"> <summary> Send and receive UDP traffic on the ntp port. </summary> @@ -45866,7 +45950,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57224"> +<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57242"> <summary> Do not audit attempts to send and receive UDP traffic on the ntp port. @@ -45878,7 +45962,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ntp_port" lineno="57239"> +<interface name="corenet_tcp_bind_ntp_port" lineno="57257"> <summary> Bind TCP sockets to the ntp port. </summary> @@ -45889,7 +45973,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ntp_port" lineno="57259"> +<interface name="corenet_udp_bind_ntp_port" lineno="57277"> <summary> Bind UDP sockets to the ntp port. </summary> @@ -45900,7 +45984,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ntp_port" lineno="57278"> +<interface name="corenet_tcp_connect_ntp_port" lineno="57296"> <summary> Make a TCP connection to the ntp port. </summary> @@ -45910,7 +45994,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntp_client_packets" lineno="57298"> +<interface name="corenet_send_ntp_client_packets" lineno="57316"> <summary> Send ntp_client packets. </summary> @@ -45921,7 +46005,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57317"> +<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57335"> <summary> Do not audit attempts to send ntp_client packets. </summary> @@ -45932,7 +46016,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntp_client_packets" lineno="57336"> +<interface name="corenet_receive_ntp_client_packets" lineno="57354"> <summary> Receive ntp_client packets. </summary> @@ -45943,7 +46027,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57355"> +<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57373"> <summary> Do not audit attempts to receive ntp_client packets. </summary> @@ -45954,7 +46038,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntp_client_packets" lineno="57374"> +<interface name="corenet_sendrecv_ntp_client_packets" lineno="57392"> <summary> Send and receive ntp_client packets. </summary> @@ -45965,7 +46049,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57390"> +<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57408"> <summary> Do not audit attempts to send and receive ntp_client packets. </summary> @@ -45976,7 +46060,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntp_client_packets" lineno="57405"> +<interface name="corenet_relabelto_ntp_client_packets" lineno="57423"> <summary> Relabel packets to ntp_client the packet type. </summary> @@ -45986,7 +46070,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntp_server_packets" lineno="57425"> +<interface name="corenet_send_ntp_server_packets" lineno="57443"> <summary> Send ntp_server packets. </summary> @@ -45997,7 +46081,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57444"> +<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57462"> <summary> Do not audit attempts to send ntp_server packets. </summary> @@ -46008,7 +46092,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntp_server_packets" lineno="57463"> +<interface name="corenet_receive_ntp_server_packets" lineno="57481"> <summary> Receive ntp_server packets. </summary> @@ -46019,7 +46103,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57482"> +<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57500"> <summary> Do not audit attempts to receive ntp_server packets. </summary> @@ -46030,7 +46114,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntp_server_packets" lineno="57501"> +<interface name="corenet_sendrecv_ntp_server_packets" lineno="57519"> <summary> Send and receive ntp_server packets. </summary> @@ -46041,7 +46125,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57517"> +<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57535"> <summary> Do not audit attempts to send and receive ntp_server packets. </summary> @@ -46052,7 +46136,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntp_server_packets" lineno="57532"> +<interface name="corenet_relabelto_ntp_server_packets" lineno="57550"> <summary> Relabel packets to ntp_server the packet type. </summary> @@ -46062,7 +46146,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57554"> +<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57572"> <summary> Send and receive TCP traffic on the ntske port. </summary> @@ -46073,7 +46157,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ntske_port" lineno="57569"> +<interface name="corenet_udp_send_ntske_port" lineno="57587"> <summary> Send UDP traffic on the ntske port. </summary> @@ -46084,7 +46168,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57584"> +<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57602"> <summary> Do not audit attempts to send UDP traffic on the ntske port. </summary> @@ -46095,7 +46179,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ntske_port" lineno="57599"> +<interface name="corenet_udp_receive_ntske_port" lineno="57617"> <summary> Receive UDP traffic on the ntske port. </summary> @@ -46106,7 +46190,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57614"> +<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57632"> <summary> Do not audit attempts to receive UDP traffic on the ntske port. </summary> @@ -46117,7 +46201,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ntske_port" lineno="57629"> +<interface name="corenet_udp_sendrecv_ntske_port" lineno="57647"> <summary> Send and receive UDP traffic on the ntske port. </summary> @@ -46128,7 +46212,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57645"> +<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57663"> <summary> Do not audit attempts to send and receive UDP traffic on the ntske port. @@ -46140,7 +46224,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ntske_port" lineno="57660"> +<interface name="corenet_tcp_bind_ntske_port" lineno="57678"> <summary> Bind TCP sockets to the ntske port. </summary> @@ -46151,7 +46235,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ntske_port" lineno="57680"> +<interface name="corenet_udp_bind_ntske_port" lineno="57698"> <summary> Bind UDP sockets to the ntske port. </summary> @@ -46162,7 +46246,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ntske_port" lineno="57699"> +<interface name="corenet_tcp_connect_ntske_port" lineno="57717"> <summary> Make a TCP connection to the ntske port. </summary> @@ -46172,7 +46256,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntske_client_packets" lineno="57719"> +<interface name="corenet_send_ntske_client_packets" lineno="57737"> <summary> Send ntske_client packets. </summary> @@ -46183,7 +46267,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57738"> +<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57756"> <summary> Do not audit attempts to send ntske_client packets. </summary> @@ -46194,7 +46278,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntske_client_packets" lineno="57757"> +<interface name="corenet_receive_ntske_client_packets" lineno="57775"> <summary> Receive ntske_client packets. </summary> @@ -46205,7 +46289,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57776"> +<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57794"> <summary> Do not audit attempts to receive ntske_client packets. </summary> @@ -46216,7 +46300,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntske_client_packets" lineno="57795"> +<interface name="corenet_sendrecv_ntske_client_packets" lineno="57813"> <summary> Send and receive ntske_client packets. </summary> @@ -46227,7 +46311,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57811"> +<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57829"> <summary> Do not audit attempts to send and receive ntske_client packets. </summary> @@ -46238,7 +46322,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntske_client_packets" lineno="57826"> +<interface name="corenet_relabelto_ntske_client_packets" lineno="57844"> <summary> Relabel packets to ntske_client the packet type. </summary> @@ -46248,7 +46332,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntske_server_packets" lineno="57846"> +<interface name="corenet_send_ntske_server_packets" lineno="57864"> <summary> Send ntske_server packets. </summary> @@ -46259,7 +46343,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57865"> +<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57883"> <summary> Do not audit attempts to send ntske_server packets. </summary> @@ -46270,7 +46354,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntske_server_packets" lineno="57884"> +<interface name="corenet_receive_ntske_server_packets" lineno="57902"> <summary> Receive ntske_server packets. </summary> @@ -46281,7 +46365,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57903"> +<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57921"> <summary> Do not audit attempts to receive ntske_server packets. </summary> @@ -46292,7 +46376,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntske_server_packets" lineno="57922"> +<interface name="corenet_sendrecv_ntske_server_packets" lineno="57940"> <summary> Send and receive ntske_server packets. </summary> @@ -46303,7 +46387,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57938"> +<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57956"> <summary> Do not audit attempts to send and receive ntske_server packets. </summary> @@ -46314,7 +46398,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntske_server_packets" lineno="57953"> +<interface name="corenet_relabelto_ntske_server_packets" lineno="57971"> <summary> Relabel packets to ntske_server the packet type. </summary> @@ -46324,7 +46408,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57975"> +<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57993"> <summary> Send and receive TCP traffic on the oa_system port. </summary> @@ -46335,7 +46419,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_oa_system_port" lineno="57990"> +<interface name="corenet_udp_send_oa_system_port" lineno="58008"> <summary> Send UDP traffic on the oa_system port. </summary> @@ -46346,7 +46430,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58005"> +<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58023"> <summary> Do not audit attempts to send UDP traffic on the oa_system port. </summary> @@ -46357,7 +46441,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_oa_system_port" lineno="58020"> +<interface name="corenet_udp_receive_oa_system_port" lineno="58038"> <summary> Receive UDP traffic on the oa_system port. </summary> @@ -46368,7 +46452,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58035"> +<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58053"> <summary> Do not audit attempts to receive UDP traffic on the oa_system port. </summary> @@ -46379,7 +46463,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58050"> +<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58068"> <summary> Send and receive UDP traffic on the oa_system port. </summary> @@ -46390,7 +46474,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58066"> +<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58084"> <summary> Do not audit attempts to send and receive UDP traffic on the oa_system port. @@ -46402,7 +46486,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_oa_system_port" lineno="58081"> +<interface name="corenet_tcp_bind_oa_system_port" lineno="58099"> <summary> Bind TCP sockets to the oa_system port. </summary> @@ -46413,7 +46497,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_oa_system_port" lineno="58101"> +<interface name="corenet_udp_bind_oa_system_port" lineno="58119"> <summary> Bind UDP sockets to the oa_system port. </summary> @@ -46424,7 +46508,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_oa_system_port" lineno="58120"> +<interface name="corenet_tcp_connect_oa_system_port" lineno="58138"> <summary> Make a TCP connection to the oa_system port. </summary> @@ -46434,7 +46518,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oa_system_client_packets" lineno="58140"> +<interface name="corenet_send_oa_system_client_packets" lineno="58158"> <summary> Send oa_system_client packets. </summary> @@ -46445,7 +46529,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58159"> +<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58177"> <summary> Do not audit attempts to send oa_system_client packets. </summary> @@ -46456,7 +46540,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oa_system_client_packets" lineno="58178"> +<interface name="corenet_receive_oa_system_client_packets" lineno="58196"> <summary> Receive oa_system_client packets. </summary> @@ -46467,7 +46551,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58197"> +<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58215"> <summary> Do not audit attempts to receive oa_system_client packets. </summary> @@ -46478,7 +46562,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58216"> +<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58234"> <summary> Send and receive oa_system_client packets. </summary> @@ -46489,7 +46573,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58232"> +<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58250"> <summary> Do not audit attempts to send and receive oa_system_client packets. </summary> @@ -46500,7 +46584,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oa_system_client_packets" lineno="58247"> +<interface name="corenet_relabelto_oa_system_client_packets" lineno="58265"> <summary> Relabel packets to oa_system_client the packet type. </summary> @@ -46510,7 +46594,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oa_system_server_packets" lineno="58267"> +<interface name="corenet_send_oa_system_server_packets" lineno="58285"> <summary> Send oa_system_server packets. </summary> @@ -46521,7 +46605,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58286"> +<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58304"> <summary> Do not audit attempts to send oa_system_server packets. </summary> @@ -46532,7 +46616,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oa_system_server_packets" lineno="58305"> +<interface name="corenet_receive_oa_system_server_packets" lineno="58323"> <summary> Receive oa_system_server packets. </summary> @@ -46543,7 +46627,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58324"> +<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58342"> <summary> Do not audit attempts to receive oa_system_server packets. </summary> @@ -46554,7 +46638,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58343"> +<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58361"> <summary> Send and receive oa_system_server packets. </summary> @@ -46565,7 +46649,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58359"> +<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58377"> <summary> Do not audit attempts to send and receive oa_system_server packets. </summary> @@ -46576,7 +46660,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oa_system_server_packets" lineno="58374"> +<interface name="corenet_relabelto_oa_system_server_packets" lineno="58392"> <summary> Relabel packets to oa_system_server the packet type. </summary> @@ -46586,7 +46670,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58396"> +<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58414"> <summary> Send and receive TCP traffic on the oracledb port. </summary> @@ -46597,7 +46681,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_oracledb_port" lineno="58411"> +<interface name="corenet_udp_send_oracledb_port" lineno="58429"> <summary> Send UDP traffic on the oracledb port. </summary> @@ -46608,7 +46692,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58426"> +<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58444"> <summary> Do not audit attempts to send UDP traffic on the oracledb port. </summary> @@ -46619,7 +46703,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_oracledb_port" lineno="58441"> +<interface name="corenet_udp_receive_oracledb_port" lineno="58459"> <summary> Receive UDP traffic on the oracledb port. </summary> @@ -46630,7 +46714,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58456"> +<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58474"> <summary> Do not audit attempts to receive UDP traffic on the oracledb port. </summary> @@ -46641,7 +46725,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58471"> +<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58489"> <summary> Send and receive UDP traffic on the oracledb port. </summary> @@ -46652,7 +46736,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58487"> +<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58505"> <summary> Do not audit attempts to send and receive UDP traffic on the oracledb port. @@ -46664,7 +46748,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_oracledb_port" lineno="58502"> +<interface name="corenet_tcp_bind_oracledb_port" lineno="58520"> <summary> Bind TCP sockets to the oracledb port. </summary> @@ -46675,7 +46759,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_oracledb_port" lineno="58522"> +<interface name="corenet_udp_bind_oracledb_port" lineno="58540"> <summary> Bind UDP sockets to the oracledb port. </summary> @@ -46686,7 +46770,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_oracledb_port" lineno="58541"> +<interface name="corenet_tcp_connect_oracledb_port" lineno="58559"> <summary> Make a TCP connection to the oracledb port. </summary> @@ -46696,7 +46780,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oracledb_client_packets" lineno="58561"> +<interface name="corenet_send_oracledb_client_packets" lineno="58579"> <summary> Send oracledb_client packets. </summary> @@ -46707,7 +46791,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58580"> +<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58598"> <summary> Do not audit attempts to send oracledb_client packets. </summary> @@ -46718,7 +46802,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oracledb_client_packets" lineno="58599"> +<interface name="corenet_receive_oracledb_client_packets" lineno="58617"> <summary> Receive oracledb_client packets. </summary> @@ -46729,7 +46813,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58618"> +<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58636"> <summary> Do not audit attempts to receive oracledb_client packets. </summary> @@ -46740,7 +46824,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58637"> +<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58655"> <summary> Send and receive oracledb_client packets. </summary> @@ -46751,7 +46835,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58653"> +<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58671"> <summary> Do not audit attempts to send and receive oracledb_client packets. </summary> @@ -46762,7 +46846,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oracledb_client_packets" lineno="58668"> +<interface name="corenet_relabelto_oracledb_client_packets" lineno="58686"> <summary> Relabel packets to oracledb_client the packet type. </summary> @@ -46772,7 +46856,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oracledb_server_packets" lineno="58688"> +<interface name="corenet_send_oracledb_server_packets" lineno="58706"> <summary> Send oracledb_server packets. </summary> @@ -46783,7 +46867,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58707"> +<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58725"> <summary> Do not audit attempts to send oracledb_server packets. </summary> @@ -46794,7 +46878,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oracledb_server_packets" lineno="58726"> +<interface name="corenet_receive_oracledb_server_packets" lineno="58744"> <summary> Receive oracledb_server packets. </summary> @@ -46805,7 +46889,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58745"> +<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58763"> <summary> Do not audit attempts to receive oracledb_server packets. </summary> @@ -46816,7 +46900,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58764"> +<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58782"> <summary> Send and receive oracledb_server packets. </summary> @@ -46827,7 +46911,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58780"> +<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58798"> <summary> Do not audit attempts to send and receive oracledb_server packets. </summary> @@ -46838,7 +46922,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oracledb_server_packets" lineno="58795"> +<interface name="corenet_relabelto_oracledb_server_packets" lineno="58813"> <summary> Relabel packets to oracledb_server the packet type. </summary> @@ -46848,7 +46932,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58817"> +<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58835"> <summary> Send and receive TCP traffic on the ocsp port. </summary> @@ -46859,7 +46943,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ocsp_port" lineno="58832"> +<interface name="corenet_udp_send_ocsp_port" lineno="58850"> <summary> Send UDP traffic on the ocsp port. </summary> @@ -46870,7 +46954,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58847"> +<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58865"> <summary> Do not audit attempts to send UDP traffic on the ocsp port. </summary> @@ -46881,7 +46965,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ocsp_port" lineno="58862"> +<interface name="corenet_udp_receive_ocsp_port" lineno="58880"> <summary> Receive UDP traffic on the ocsp port. </summary> @@ -46892,7 +46976,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58877"> +<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58895"> <summary> Do not audit attempts to receive UDP traffic on the ocsp port. </summary> @@ -46903,7 +46987,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58892"> +<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58910"> <summary> Send and receive UDP traffic on the ocsp port. </summary> @@ -46914,7 +46998,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58908"> +<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58926"> <summary> Do not audit attempts to send and receive UDP traffic on the ocsp port. @@ -46926,7 +47010,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ocsp_port" lineno="58923"> +<interface name="corenet_tcp_bind_ocsp_port" lineno="58941"> <summary> Bind TCP sockets to the ocsp port. </summary> @@ -46937,7 +47021,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ocsp_port" lineno="58943"> +<interface name="corenet_udp_bind_ocsp_port" lineno="58961"> <summary> Bind UDP sockets to the ocsp port. </summary> @@ -46948,7 +47032,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ocsp_port" lineno="58962"> +<interface name="corenet_tcp_connect_ocsp_port" lineno="58980"> <summary> Make a TCP connection to the ocsp port. </summary> @@ -46958,7 +47042,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ocsp_client_packets" lineno="58982"> +<interface name="corenet_send_ocsp_client_packets" lineno="59000"> <summary> Send ocsp_client packets. </summary> @@ -46969,7 +47053,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59001"> +<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59019"> <summary> Do not audit attempts to send ocsp_client packets. </summary> @@ -46980,7 +47064,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ocsp_client_packets" lineno="59020"> +<interface name="corenet_receive_ocsp_client_packets" lineno="59038"> <summary> Receive ocsp_client packets. </summary> @@ -46991,7 +47075,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59039"> +<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59057"> <summary> Do not audit attempts to receive ocsp_client packets. </summary> @@ -47002,7 +47086,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59058"> +<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59076"> <summary> Send and receive ocsp_client packets. </summary> @@ -47013,7 +47097,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59074"> +<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59092"> <summary> Do not audit attempts to send and receive ocsp_client packets. </summary> @@ -47024,7 +47108,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ocsp_client_packets" lineno="59089"> +<interface name="corenet_relabelto_ocsp_client_packets" lineno="59107"> <summary> Relabel packets to ocsp_client the packet type. </summary> @@ -47034,7 +47118,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ocsp_server_packets" lineno="59109"> +<interface name="corenet_send_ocsp_server_packets" lineno="59127"> <summary> Send ocsp_server packets. </summary> @@ -47045,7 +47129,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59128"> +<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59146"> <summary> Do not audit attempts to send ocsp_server packets. </summary> @@ -47056,7 +47140,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ocsp_server_packets" lineno="59147"> +<interface name="corenet_receive_ocsp_server_packets" lineno="59165"> <summary> Receive ocsp_server packets. </summary> @@ -47067,7 +47151,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59166"> +<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59184"> <summary> Do not audit attempts to receive ocsp_server packets. </summary> @@ -47078,7 +47162,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59185"> +<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59203"> <summary> Send and receive ocsp_server packets. </summary> @@ -47089,7 +47173,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59201"> +<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59219"> <summary> Do not audit attempts to send and receive ocsp_server packets. </summary> @@ -47100,7 +47184,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ocsp_server_packets" lineno="59216"> +<interface name="corenet_relabelto_ocsp_server_packets" lineno="59234"> <summary> Relabel packets to ocsp_server the packet type. </summary> @@ -47110,7 +47194,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59238"> +<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59256"> <summary> Send and receive TCP traffic on the openhpid port. </summary> @@ -47121,7 +47205,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_openhpid_port" lineno="59253"> +<interface name="corenet_udp_send_openhpid_port" lineno="59271"> <summary> Send UDP traffic on the openhpid port. </summary> @@ -47132,7 +47216,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59268"> +<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59286"> <summary> Do not audit attempts to send UDP traffic on the openhpid port. </summary> @@ -47143,7 +47227,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_openhpid_port" lineno="59283"> +<interface name="corenet_udp_receive_openhpid_port" lineno="59301"> <summary> Receive UDP traffic on the openhpid port. </summary> @@ -47154,7 +47238,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59298"> +<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59316"> <summary> Do not audit attempts to receive UDP traffic on the openhpid port. </summary> @@ -47165,7 +47249,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59313"> +<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59331"> <summary> Send and receive UDP traffic on the openhpid port. </summary> @@ -47176,7 +47260,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59329"> +<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59347"> <summary> Do not audit attempts to send and receive UDP traffic on the openhpid port. @@ -47188,7 +47272,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_openhpid_port" lineno="59344"> +<interface name="corenet_tcp_bind_openhpid_port" lineno="59362"> <summary> Bind TCP sockets to the openhpid port. </summary> @@ -47199,7 +47283,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_openhpid_port" lineno="59364"> +<interface name="corenet_udp_bind_openhpid_port" lineno="59382"> <summary> Bind UDP sockets to the openhpid port. </summary> @@ -47210,7 +47294,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_openhpid_port" lineno="59383"> +<interface name="corenet_tcp_connect_openhpid_port" lineno="59401"> <summary> Make a TCP connection to the openhpid port. </summary> @@ -47220,7 +47304,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openhpid_client_packets" lineno="59403"> +<interface name="corenet_send_openhpid_client_packets" lineno="59421"> <summary> Send openhpid_client packets. </summary> @@ -47231,7 +47315,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59422"> +<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59440"> <summary> Do not audit attempts to send openhpid_client packets. </summary> @@ -47242,7 +47326,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openhpid_client_packets" lineno="59441"> +<interface name="corenet_receive_openhpid_client_packets" lineno="59459"> <summary> Receive openhpid_client packets. </summary> @@ -47253,7 +47337,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59460"> +<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59478"> <summary> Do not audit attempts to receive openhpid_client packets. </summary> @@ -47264,7 +47348,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59479"> +<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59497"> <summary> Send and receive openhpid_client packets. </summary> @@ -47275,7 +47359,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59495"> +<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59513"> <summary> Do not audit attempts to send and receive openhpid_client packets. </summary> @@ -47286,7 +47370,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openhpid_client_packets" lineno="59510"> +<interface name="corenet_relabelto_openhpid_client_packets" lineno="59528"> <summary> Relabel packets to openhpid_client the packet type. </summary> @@ -47296,7 +47380,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openhpid_server_packets" lineno="59530"> +<interface name="corenet_send_openhpid_server_packets" lineno="59548"> <summary> Send openhpid_server packets. </summary> @@ -47307,7 +47391,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59549"> +<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59567"> <summary> Do not audit attempts to send openhpid_server packets. </summary> @@ -47318,7 +47402,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openhpid_server_packets" lineno="59568"> +<interface name="corenet_receive_openhpid_server_packets" lineno="59586"> <summary> Receive openhpid_server packets. </summary> @@ -47329,7 +47413,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59587"> +<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59605"> <summary> Do not audit attempts to receive openhpid_server packets. </summary> @@ -47340,7 +47424,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59606"> +<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59624"> <summary> Send and receive openhpid_server packets. </summary> @@ -47351,7 +47435,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59622"> +<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59640"> <summary> Do not audit attempts to send and receive openhpid_server packets. </summary> @@ -47362,7 +47446,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openhpid_server_packets" lineno="59637"> +<interface name="corenet_relabelto_openhpid_server_packets" lineno="59655"> <summary> Relabel packets to openhpid_server the packet type. </summary> @@ -47372,7 +47456,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59659"> +<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59677"> <summary> Send and receive TCP traffic on the openvpn port. </summary> @@ -47383,7 +47467,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_openvpn_port" lineno="59674"> +<interface name="corenet_udp_send_openvpn_port" lineno="59692"> <summary> Send UDP traffic on the openvpn port. </summary> @@ -47394,7 +47478,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59689"> +<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59707"> <summary> Do not audit attempts to send UDP traffic on the openvpn port. </summary> @@ -47405,7 +47489,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_openvpn_port" lineno="59704"> +<interface name="corenet_udp_receive_openvpn_port" lineno="59722"> <summary> Receive UDP traffic on the openvpn port. </summary> @@ -47416,7 +47500,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59719"> +<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59737"> <summary> Do not audit attempts to receive UDP traffic on the openvpn port. </summary> @@ -47427,7 +47511,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59734"> +<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59752"> <summary> Send and receive UDP traffic on the openvpn port. </summary> @@ -47438,7 +47522,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59750"> +<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59768"> <summary> Do not audit attempts to send and receive UDP traffic on the openvpn port. @@ -47450,7 +47534,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_openvpn_port" lineno="59765"> +<interface name="corenet_tcp_bind_openvpn_port" lineno="59783"> <summary> Bind TCP sockets to the openvpn port. </summary> @@ -47461,7 +47545,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_openvpn_port" lineno="59785"> +<interface name="corenet_udp_bind_openvpn_port" lineno="59803"> <summary> Bind UDP sockets to the openvpn port. </summary> @@ -47472,7 +47556,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_openvpn_port" lineno="59804"> +<interface name="corenet_tcp_connect_openvpn_port" lineno="59822"> <summary> Make a TCP connection to the openvpn port. </summary> @@ -47482,7 +47566,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openvpn_client_packets" lineno="59824"> +<interface name="corenet_send_openvpn_client_packets" lineno="59842"> <summary> Send openvpn_client packets. </summary> @@ -47493,7 +47577,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59843"> +<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59861"> <summary> Do not audit attempts to send openvpn_client packets. </summary> @@ -47504,7 +47588,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openvpn_client_packets" lineno="59862"> +<interface name="corenet_receive_openvpn_client_packets" lineno="59880"> <summary> Receive openvpn_client packets. </summary> @@ -47515,7 +47599,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59881"> +<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59899"> <summary> Do not audit attempts to receive openvpn_client packets. </summary> @@ -47526,7 +47610,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59900"> +<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59918"> <summary> Send and receive openvpn_client packets. </summary> @@ -47537,7 +47621,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59916"> +<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59934"> <summary> Do not audit attempts to send and receive openvpn_client packets. </summary> @@ -47548,7 +47632,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openvpn_client_packets" lineno="59931"> +<interface name="corenet_relabelto_openvpn_client_packets" lineno="59949"> <summary> Relabel packets to openvpn_client the packet type. </summary> @@ -47558,7 +47642,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openvpn_server_packets" lineno="59951"> +<interface name="corenet_send_openvpn_server_packets" lineno="59969"> <summary> Send openvpn_server packets. </summary> @@ -47569,7 +47653,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59970"> +<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59988"> <summary> Do not audit attempts to send openvpn_server packets. </summary> @@ -47580,7 +47664,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openvpn_server_packets" lineno="59989"> +<interface name="corenet_receive_openvpn_server_packets" lineno="60007"> <summary> Receive openvpn_server packets. </summary> @@ -47591,7 +47675,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60008"> +<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60026"> <summary> Do not audit attempts to receive openvpn_server packets. </summary> @@ -47602,7 +47686,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60027"> +<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60045"> <summary> Send and receive openvpn_server packets. </summary> @@ -47613,7 +47697,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60043"> +<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60061"> <summary> Do not audit attempts to send and receive openvpn_server packets. </summary> @@ -47624,7 +47708,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openvpn_server_packets" lineno="60058"> +<interface name="corenet_relabelto_openvpn_server_packets" lineno="60076"> <summary> Relabel packets to openvpn_server the packet type. </summary> @@ -47634,7 +47718,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60080"> +<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60098"> <summary> Send and receive TCP traffic on the pdps port. </summary> @@ -47645,7 +47729,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pdps_port" lineno="60095"> +<interface name="corenet_udp_send_pdps_port" lineno="60113"> <summary> Send UDP traffic on the pdps port. </summary> @@ -47656,7 +47740,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60110"> +<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60128"> <summary> Do not audit attempts to send UDP traffic on the pdps port. </summary> @@ -47667,7 +47751,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pdps_port" lineno="60125"> +<interface name="corenet_udp_receive_pdps_port" lineno="60143"> <summary> Receive UDP traffic on the pdps port. </summary> @@ -47678,7 +47762,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60140"> +<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60158"> <summary> Do not audit attempts to receive UDP traffic on the pdps port. </summary> @@ -47689,7 +47773,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pdps_port" lineno="60155"> +<interface name="corenet_udp_sendrecv_pdps_port" lineno="60173"> <summary> Send and receive UDP traffic on the pdps port. </summary> @@ -47700,7 +47784,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60171"> +<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60189"> <summary> Do not audit attempts to send and receive UDP traffic on the pdps port. @@ -47712,7 +47796,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pdps_port" lineno="60186"> +<interface name="corenet_tcp_bind_pdps_port" lineno="60204"> <summary> Bind TCP sockets to the pdps port. </summary> @@ -47723,7 +47807,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pdps_port" lineno="60206"> +<interface name="corenet_udp_bind_pdps_port" lineno="60224"> <summary> Bind UDP sockets to the pdps port. </summary> @@ -47734,7 +47818,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pdps_port" lineno="60225"> +<interface name="corenet_tcp_connect_pdps_port" lineno="60243"> <summary> Make a TCP connection to the pdps port. </summary> @@ -47744,7 +47828,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pdps_client_packets" lineno="60245"> +<interface name="corenet_send_pdps_client_packets" lineno="60263"> <summary> Send pdps_client packets. </summary> @@ -47755,7 +47839,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60264"> +<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60282"> <summary> Do not audit attempts to send pdps_client packets. </summary> @@ -47766,7 +47850,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pdps_client_packets" lineno="60283"> +<interface name="corenet_receive_pdps_client_packets" lineno="60301"> <summary> Receive pdps_client packets. </summary> @@ -47777,7 +47861,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60302"> +<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60320"> <summary> Do not audit attempts to receive pdps_client packets. </summary> @@ -47788,7 +47872,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pdps_client_packets" lineno="60321"> +<interface name="corenet_sendrecv_pdps_client_packets" lineno="60339"> <summary> Send and receive pdps_client packets. </summary> @@ -47799,7 +47883,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60337"> +<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60355"> <summary> Do not audit attempts to send and receive pdps_client packets. </summary> @@ -47810,7 +47894,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pdps_client_packets" lineno="60352"> +<interface name="corenet_relabelto_pdps_client_packets" lineno="60370"> <summary> Relabel packets to pdps_client the packet type. </summary> @@ -47820,7 +47904,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pdps_server_packets" lineno="60372"> +<interface name="corenet_send_pdps_server_packets" lineno="60390"> <summary> Send pdps_server packets. </summary> @@ -47831,7 +47915,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60391"> +<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60409"> <summary> Do not audit attempts to send pdps_server packets. </summary> @@ -47842,7 +47926,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pdps_server_packets" lineno="60410"> +<interface name="corenet_receive_pdps_server_packets" lineno="60428"> <summary> Receive pdps_server packets. </summary> @@ -47853,7 +47937,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60429"> +<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60447"> <summary> Do not audit attempts to receive pdps_server packets. </summary> @@ -47864,7 +47948,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pdps_server_packets" lineno="60448"> +<interface name="corenet_sendrecv_pdps_server_packets" lineno="60466"> <summary> Send and receive pdps_server packets. </summary> @@ -47875,7 +47959,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60464"> +<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60482"> <summary> Do not audit attempts to send and receive pdps_server packets. </summary> @@ -47886,7 +47970,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pdps_server_packets" lineno="60479"> +<interface name="corenet_relabelto_pdps_server_packets" lineno="60497"> <summary> Relabel packets to pdps_server the packet type. </summary> @@ -47896,7 +47980,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60501"> +<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60519"> <summary> Send and receive TCP traffic on the pegasus_http port. </summary> @@ -47907,7 +47991,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pegasus_http_port" lineno="60516"> +<interface name="corenet_udp_send_pegasus_http_port" lineno="60534"> <summary> Send UDP traffic on the pegasus_http port. </summary> @@ -47918,7 +48002,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60531"> +<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60549"> <summary> Do not audit attempts to send UDP traffic on the pegasus_http port. </summary> @@ -47929,7 +48013,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pegasus_http_port" lineno="60546"> +<interface name="corenet_udp_receive_pegasus_http_port" lineno="60564"> <summary> Receive UDP traffic on the pegasus_http port. </summary> @@ -47940,7 +48024,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60561"> +<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60579"> <summary> Do not audit attempts to receive UDP traffic on the pegasus_http port. </summary> @@ -47951,7 +48035,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60576"> +<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60594"> <summary> Send and receive UDP traffic on the pegasus_http port. </summary> @@ -47962,7 +48046,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60592"> +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60610"> <summary> Do not audit attempts to send and receive UDP traffic on the pegasus_http port. @@ -47974,7 +48058,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60607"> +<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60625"> <summary> Bind TCP sockets to the pegasus_http port. </summary> @@ -47985,7 +48069,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pegasus_http_port" lineno="60627"> +<interface name="corenet_udp_bind_pegasus_http_port" lineno="60645"> <summary> Bind UDP sockets to the pegasus_http port. </summary> @@ -47996,7 +48080,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60646"> +<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60664"> <summary> Make a TCP connection to the pegasus_http port. </summary> @@ -48006,7 +48090,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_http_client_packets" lineno="60666"> +<interface name="corenet_send_pegasus_http_client_packets" lineno="60684"> <summary> Send pegasus_http_client packets. </summary> @@ -48017,7 +48101,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60685"> +<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60703"> <summary> Do not audit attempts to send pegasus_http_client packets. </summary> @@ -48028,7 +48112,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_http_client_packets" lineno="60704"> +<interface name="corenet_receive_pegasus_http_client_packets" lineno="60722"> <summary> Receive pegasus_http_client packets. </summary> @@ -48039,7 +48123,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60723"> +<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60741"> <summary> Do not audit attempts to receive pegasus_http_client packets. </summary> @@ -48050,7 +48134,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60742"> +<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60760"> <summary> Send and receive pegasus_http_client packets. </summary> @@ -48061,7 +48145,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60758"> +<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60776"> <summary> Do not audit attempts to send and receive pegasus_http_client packets. </summary> @@ -48072,7 +48156,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60773"> +<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60791"> <summary> Relabel packets to pegasus_http_client the packet type. </summary> @@ -48082,7 +48166,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_http_server_packets" lineno="60793"> +<interface name="corenet_send_pegasus_http_server_packets" lineno="60811"> <summary> Send pegasus_http_server packets. </summary> @@ -48093,7 +48177,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60812"> +<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60830"> <summary> Do not audit attempts to send pegasus_http_server packets. </summary> @@ -48104,7 +48188,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_http_server_packets" lineno="60831"> +<interface name="corenet_receive_pegasus_http_server_packets" lineno="60849"> <summary> Receive pegasus_http_server packets. </summary> @@ -48115,7 +48199,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60850"> +<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60868"> <summary> Do not audit attempts to receive pegasus_http_server packets. </summary> @@ -48126,7 +48210,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60869"> +<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60887"> <summary> Send and receive pegasus_http_server packets. </summary> @@ -48137,7 +48221,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60885"> +<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60903"> <summary> Do not audit attempts to send and receive pegasus_http_server packets. </summary> @@ -48148,7 +48232,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60900"> +<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60918"> <summary> Relabel packets to pegasus_http_server the packet type. </summary> @@ -48158,7 +48242,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60922"> +<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60940"> <summary> Send and receive TCP traffic on the pegasus_https port. </summary> @@ -48169,7 +48253,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pegasus_https_port" lineno="60937"> +<interface name="corenet_udp_send_pegasus_https_port" lineno="60955"> <summary> Send UDP traffic on the pegasus_https port. </summary> @@ -48180,7 +48264,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60952"> +<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60970"> <summary> Do not audit attempts to send UDP traffic on the pegasus_https port. </summary> @@ -48191,7 +48275,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pegasus_https_port" lineno="60967"> +<interface name="corenet_udp_receive_pegasus_https_port" lineno="60985"> <summary> Receive UDP traffic on the pegasus_https port. </summary> @@ -48202,7 +48286,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60982"> +<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="61000"> <summary> Do not audit attempts to receive UDP traffic on the pegasus_https port. </summary> @@ -48213,7 +48297,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60997"> +<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="61015"> <summary> Send and receive UDP traffic on the pegasus_https port. </summary> @@ -48224,7 +48308,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61013"> +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61031"> <summary> Do not audit attempts to send and receive UDP traffic on the pegasus_https port. @@ -48236,7 +48320,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61028"> +<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61046"> <summary> Bind TCP sockets to the pegasus_https port. </summary> @@ -48247,7 +48331,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pegasus_https_port" lineno="61048"> +<interface name="corenet_udp_bind_pegasus_https_port" lineno="61066"> <summary> Bind UDP sockets to the pegasus_https port. </summary> @@ -48258,7 +48342,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61067"> +<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61085"> <summary> Make a TCP connection to the pegasus_https port. </summary> @@ -48268,7 +48352,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_https_client_packets" lineno="61087"> +<interface name="corenet_send_pegasus_https_client_packets" lineno="61105"> <summary> Send pegasus_https_client packets. </summary> @@ -48279,7 +48363,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61106"> +<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61124"> <summary> Do not audit attempts to send pegasus_https_client packets. </summary> @@ -48290,7 +48374,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_https_client_packets" lineno="61125"> +<interface name="corenet_receive_pegasus_https_client_packets" lineno="61143"> <summary> Receive pegasus_https_client packets. </summary> @@ -48301,7 +48385,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61144"> +<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61162"> <summary> Do not audit attempts to receive pegasus_https_client packets. </summary> @@ -48312,7 +48396,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61163"> +<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61181"> <summary> Send and receive pegasus_https_client packets. </summary> @@ -48323,7 +48407,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61179"> +<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61197"> <summary> Do not audit attempts to send and receive pegasus_https_client packets. </summary> @@ -48334,7 +48418,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61194"> +<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61212"> <summary> Relabel packets to pegasus_https_client the packet type. </summary> @@ -48344,7 +48428,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_https_server_packets" lineno="61214"> +<interface name="corenet_send_pegasus_https_server_packets" lineno="61232"> <summary> Send pegasus_https_server packets. </summary> @@ -48355,7 +48439,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61233"> +<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61251"> <summary> Do not audit attempts to send pegasus_https_server packets. </summary> @@ -48366,7 +48450,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_https_server_packets" lineno="61252"> +<interface name="corenet_receive_pegasus_https_server_packets" lineno="61270"> <summary> Receive pegasus_https_server packets. </summary> @@ -48377,7 +48461,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61271"> +<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61289"> <summary> Do not audit attempts to receive pegasus_https_server packets. </summary> @@ -48388,7 +48472,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61290"> +<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61308"> <summary> Send and receive pegasus_https_server packets. </summary> @@ -48399,7 +48483,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61306"> +<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61324"> <summary> Do not audit attempts to send and receive pegasus_https_server packets. </summary> @@ -48410,7 +48494,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61321"> +<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61339"> <summary> Relabel packets to pegasus_https_server the packet type. </summary> @@ -48420,7 +48504,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61343"> +<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61361"> <summary> Send and receive TCP traffic on the pgpkeyserver port. </summary> @@ -48431,7 +48515,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61358"> +<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61376"> <summary> Send UDP traffic on the pgpkeyserver port. </summary> @@ -48442,7 +48526,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61373"> +<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61391"> <summary> Do not audit attempts to send UDP traffic on the pgpkeyserver port. </summary> @@ -48453,7 +48537,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61388"> +<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61406"> <summary> Receive UDP traffic on the pgpkeyserver port. </summary> @@ -48464,7 +48548,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61403"> +<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61421"> <summary> Do not audit attempts to receive UDP traffic on the pgpkeyserver port. </summary> @@ -48475,7 +48559,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61418"> +<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61436"> <summary> Send and receive UDP traffic on the pgpkeyserver port. </summary> @@ -48486,7 +48570,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61434"> +<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61452"> <summary> Do not audit attempts to send and receive UDP traffic on the pgpkeyserver port. @@ -48498,7 +48582,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61449"> +<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61467"> <summary> Bind TCP sockets to the pgpkeyserver port. </summary> @@ -48509,7 +48593,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61469"> +<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61487"> <summary> Bind UDP sockets to the pgpkeyserver port. </summary> @@ -48520,7 +48604,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61488"> +<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61506"> <summary> Make a TCP connection to the pgpkeyserver port. </summary> @@ -48530,7 +48614,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61508"> +<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61526"> <summary> Send pgpkeyserver_client packets. </summary> @@ -48541,7 +48625,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61527"> +<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61545"> <summary> Do not audit attempts to send pgpkeyserver_client packets. </summary> @@ -48552,7 +48636,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61546"> +<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61564"> <summary> Receive pgpkeyserver_client packets. </summary> @@ -48563,7 +48647,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61565"> +<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61583"> <summary> Do not audit attempts to receive pgpkeyserver_client packets. </summary> @@ -48574,7 +48658,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61584"> +<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61602"> <summary> Send and receive pgpkeyserver_client packets. </summary> @@ -48585,7 +48669,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61600"> +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61618"> <summary> Do not audit attempts to send and receive pgpkeyserver_client packets. </summary> @@ -48596,7 +48680,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61615"> +<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61633"> <summary> Relabel packets to pgpkeyserver_client the packet type. </summary> @@ -48606,7 +48690,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61635"> +<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61653"> <summary> Send pgpkeyserver_server packets. </summary> @@ -48617,7 +48701,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61654"> +<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61672"> <summary> Do not audit attempts to send pgpkeyserver_server packets. </summary> @@ -48628,7 +48712,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61673"> +<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61691"> <summary> Receive pgpkeyserver_server packets. </summary> @@ -48639,7 +48723,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61692"> +<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61710"> <summary> Do not audit attempts to receive pgpkeyserver_server packets. </summary> @@ -48650,7 +48734,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61711"> +<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61729"> <summary> Send and receive pgpkeyserver_server packets. </summary> @@ -48661,7 +48745,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61727"> +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61745"> <summary> Do not audit attempts to send and receive pgpkeyserver_server packets. </summary> @@ -48672,7 +48756,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61742"> +<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61760"> <summary> Relabel packets to pgpkeyserver_server the packet type. </summary> @@ -48682,7 +48766,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61764"> +<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61782"> <summary> Send and receive TCP traffic on the pingd port. </summary> @@ -48693,7 +48777,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pingd_port" lineno="61779"> +<interface name="corenet_udp_send_pingd_port" lineno="61797"> <summary> Send UDP traffic on the pingd port. </summary> @@ -48704,7 +48788,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61794"> +<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61812"> <summary> Do not audit attempts to send UDP traffic on the pingd port. </summary> @@ -48715,7 +48799,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pingd_port" lineno="61809"> +<interface name="corenet_udp_receive_pingd_port" lineno="61827"> <summary> Receive UDP traffic on the pingd port. </summary> @@ -48726,7 +48810,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61824"> +<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61842"> <summary> Do not audit attempts to receive UDP traffic on the pingd port. </summary> @@ -48737,7 +48821,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pingd_port" lineno="61839"> +<interface name="corenet_udp_sendrecv_pingd_port" lineno="61857"> <summary> Send and receive UDP traffic on the pingd port. </summary> @@ -48748,7 +48832,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61855"> +<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61873"> <summary> Do not audit attempts to send and receive UDP traffic on the pingd port. @@ -48760,7 +48844,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pingd_port" lineno="61870"> +<interface name="corenet_tcp_bind_pingd_port" lineno="61888"> <summary> Bind TCP sockets to the pingd port. </summary> @@ -48771,7 +48855,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pingd_port" lineno="61890"> +<interface name="corenet_udp_bind_pingd_port" lineno="61908"> <summary> Bind UDP sockets to the pingd port. </summary> @@ -48782,7 +48866,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pingd_port" lineno="61909"> +<interface name="corenet_tcp_connect_pingd_port" lineno="61927"> <summary> Make a TCP connection to the pingd port. </summary> @@ -48792,7 +48876,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pingd_client_packets" lineno="61929"> +<interface name="corenet_send_pingd_client_packets" lineno="61947"> <summary> Send pingd_client packets. </summary> @@ -48803,7 +48887,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61948"> +<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61966"> <summary> Do not audit attempts to send pingd_client packets. </summary> @@ -48814,7 +48898,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pingd_client_packets" lineno="61967"> +<interface name="corenet_receive_pingd_client_packets" lineno="61985"> <summary> Receive pingd_client packets. </summary> @@ -48825,7 +48909,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61986"> +<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="62004"> <summary> Do not audit attempts to receive pingd_client packets. </summary> @@ -48836,7 +48920,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pingd_client_packets" lineno="62005"> +<interface name="corenet_sendrecv_pingd_client_packets" lineno="62023"> <summary> Send and receive pingd_client packets. </summary> @@ -48847,7 +48931,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62021"> +<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62039"> <summary> Do not audit attempts to send and receive pingd_client packets. </summary> @@ -48858,7 +48942,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pingd_client_packets" lineno="62036"> +<interface name="corenet_relabelto_pingd_client_packets" lineno="62054"> <summary> Relabel packets to pingd_client the packet type. </summary> @@ -48868,7 +48952,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pingd_server_packets" lineno="62056"> +<interface name="corenet_send_pingd_server_packets" lineno="62074"> <summary> Send pingd_server packets. </summary> @@ -48879,7 +48963,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62075"> +<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62093"> <summary> Do not audit attempts to send pingd_server packets. </summary> @@ -48890,7 +48974,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pingd_server_packets" lineno="62094"> +<interface name="corenet_receive_pingd_server_packets" lineno="62112"> <summary> Receive pingd_server packets. </summary> @@ -48901,7 +48985,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62113"> +<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62131"> <summary> Do not audit attempts to receive pingd_server packets. </summary> @@ -48912,7 +48996,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pingd_server_packets" lineno="62132"> +<interface name="corenet_sendrecv_pingd_server_packets" lineno="62150"> <summary> Send and receive pingd_server packets. </summary> @@ -48923,7 +49007,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62148"> +<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62166"> <summary> Do not audit attempts to send and receive pingd_server packets. </summary> @@ -48934,7 +49018,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pingd_server_packets" lineno="62163"> +<interface name="corenet_relabelto_pingd_server_packets" lineno="62181"> <summary> Relabel packets to pingd_server the packet type. </summary> @@ -48944,7 +49028,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62185"> +<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62203"> <summary> Send and receive TCP traffic on the pktcable_cops port. </summary> @@ -48955,7 +49039,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pktcable_cops_port" lineno="62200"> +<interface name="corenet_udp_send_pktcable_cops_port" lineno="62218"> <summary> Send UDP traffic on the pktcable_cops port. </summary> @@ -48966,7 +49050,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62215"> +<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62233"> <summary> Do not audit attempts to send UDP traffic on the pktcable_cops port. </summary> @@ -48977,7 +49061,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62230"> +<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62248"> <summary> Receive UDP traffic on the pktcable_cops port. </summary> @@ -48988,7 +49072,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62245"> +<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62263"> <summary> Do not audit attempts to receive UDP traffic on the pktcable_cops port. </summary> @@ -48999,7 +49083,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62260"> +<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62278"> <summary> Send and receive UDP traffic on the pktcable_cops port. </summary> @@ -49010,7 +49094,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62276"> +<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62294"> <summary> Do not audit attempts to send and receive UDP traffic on the pktcable_cops port. @@ -49022,7 +49106,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62291"> +<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62309"> <summary> Bind TCP sockets to the pktcable_cops port. </summary> @@ -49033,7 +49117,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62311"> +<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62329"> <summary> Bind UDP sockets to the pktcable_cops port. </summary> @@ -49044,7 +49128,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62330"> +<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62348"> <summary> Make a TCP connection to the pktcable_cops port. </summary> @@ -49054,7 +49138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pktcable_cops_client_packets" lineno="62350"> +<interface name="corenet_send_pktcable_cops_client_packets" lineno="62368"> <summary> Send pktcable_cops_client packets. </summary> @@ -49065,7 +49149,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62369"> +<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62387"> <summary> Do not audit attempts to send pktcable_cops_client packets. </summary> @@ -49076,7 +49160,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62388"> +<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62406"> <summary> Receive pktcable_cops_client packets. </summary> @@ -49087,7 +49171,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62407"> +<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62425"> <summary> Do not audit attempts to receive pktcable_cops_client packets. </summary> @@ -49098,7 +49182,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62426"> +<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62444"> <summary> Send and receive pktcable_cops_client packets. </summary> @@ -49109,7 +49193,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62442"> +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62460"> <summary> Do not audit attempts to send and receive pktcable_cops_client packets. </summary> @@ -49120,7 +49204,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62457"> +<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62475"> <summary> Relabel packets to pktcable_cops_client the packet type. </summary> @@ -49130,7 +49214,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pktcable_cops_server_packets" lineno="62477"> +<interface name="corenet_send_pktcable_cops_server_packets" lineno="62495"> <summary> Send pktcable_cops_server packets. </summary> @@ -49141,7 +49225,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62496"> +<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62514"> <summary> Do not audit attempts to send pktcable_cops_server packets. </summary> @@ -49152,7 +49236,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62515"> +<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62533"> <summary> Receive pktcable_cops_server packets. </summary> @@ -49163,7 +49247,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62534"> +<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62552"> <summary> Do not audit attempts to receive pktcable_cops_server packets. </summary> @@ -49174,7 +49258,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62553"> +<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62571"> <summary> Send and receive pktcable_cops_server packets. </summary> @@ -49185,7 +49269,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62569"> +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62587"> <summary> Do not audit attempts to send and receive pktcable_cops_server packets. </summary> @@ -49196,7 +49280,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62584"> +<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62602"> <summary> Relabel packets to pktcable_cops_server the packet type. </summary> @@ -49206,7 +49290,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pop_port" lineno="62606"> +<interface name="corenet_tcp_sendrecv_pop_port" lineno="62624"> <summary> Send and receive TCP traffic on the pop port. </summary> @@ -49217,7 +49301,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pop_port" lineno="62621"> +<interface name="corenet_udp_send_pop_port" lineno="62639"> <summary> Send UDP traffic on the pop port. </summary> @@ -49228,7 +49312,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62636"> +<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62654"> <summary> Do not audit attempts to send UDP traffic on the pop port. </summary> @@ -49239,7 +49323,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pop_port" lineno="62651"> +<interface name="corenet_udp_receive_pop_port" lineno="62669"> <summary> Receive UDP traffic on the pop port. </summary> @@ -49250,7 +49334,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62666"> +<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62684"> <summary> Do not audit attempts to receive UDP traffic on the pop port. </summary> @@ -49261,7 +49345,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pop_port" lineno="62681"> +<interface name="corenet_udp_sendrecv_pop_port" lineno="62699"> <summary> Send and receive UDP traffic on the pop port. </summary> @@ -49272,7 +49356,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62697"> +<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62715"> <summary> Do not audit attempts to send and receive UDP traffic on the pop port. @@ -49284,7 +49368,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pop_port" lineno="62712"> +<interface name="corenet_tcp_bind_pop_port" lineno="62730"> <summary> Bind TCP sockets to the pop port. </summary> @@ -49295,7 +49379,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pop_port" lineno="62732"> +<interface name="corenet_udp_bind_pop_port" lineno="62750"> <summary> Bind UDP sockets to the pop port. </summary> @@ -49306,7 +49390,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pop_port" lineno="62751"> +<interface name="corenet_tcp_connect_pop_port" lineno="62769"> <summary> Make a TCP connection to the pop port. </summary> @@ -49316,7 +49400,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pop_client_packets" lineno="62771"> +<interface name="corenet_send_pop_client_packets" lineno="62789"> <summary> Send pop_client packets. </summary> @@ -49327,7 +49411,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62790"> +<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62808"> <summary> Do not audit attempts to send pop_client packets. </summary> @@ -49338,7 +49422,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pop_client_packets" lineno="62809"> +<interface name="corenet_receive_pop_client_packets" lineno="62827"> <summary> Receive pop_client packets. </summary> @@ -49349,7 +49433,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62828"> +<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62846"> <summary> Do not audit attempts to receive pop_client packets. </summary> @@ -49360,7 +49444,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pop_client_packets" lineno="62847"> +<interface name="corenet_sendrecv_pop_client_packets" lineno="62865"> <summary> Send and receive pop_client packets. </summary> @@ -49371,7 +49455,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62863"> +<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62881"> <summary> Do not audit attempts to send and receive pop_client packets. </summary> @@ -49382,7 +49466,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pop_client_packets" lineno="62878"> +<interface name="corenet_relabelto_pop_client_packets" lineno="62896"> <summary> Relabel packets to pop_client the packet type. </summary> @@ -49392,7 +49476,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pop_server_packets" lineno="62898"> +<interface name="corenet_send_pop_server_packets" lineno="62916"> <summary> Send pop_server packets. </summary> @@ -49403,7 +49487,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62917"> +<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62935"> <summary> Do not audit attempts to send pop_server packets. </summary> @@ -49414,7 +49498,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pop_server_packets" lineno="62936"> +<interface name="corenet_receive_pop_server_packets" lineno="62954"> <summary> Receive pop_server packets. </summary> @@ -49425,7 +49509,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62955"> +<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62973"> <summary> Do not audit attempts to receive pop_server packets. </summary> @@ -49436,7 +49520,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pop_server_packets" lineno="62974"> +<interface name="corenet_sendrecv_pop_server_packets" lineno="62992"> <summary> Send and receive pop_server packets. </summary> @@ -49447,7 +49531,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62990"> +<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="63008"> <summary> Do not audit attempts to send and receive pop_server packets. </summary> @@ -49458,7 +49542,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pop_server_packets" lineno="63005"> +<interface name="corenet_relabelto_pop_server_packets" lineno="63023"> <summary> Relabel packets to pop_server the packet type. </summary> @@ -49468,7 +49552,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63027"> +<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63045"> <summary> Send and receive TCP traffic on the portmap port. </summary> @@ -49479,7 +49563,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_portmap_port" lineno="63042"> +<interface name="corenet_udp_send_portmap_port" lineno="63060"> <summary> Send UDP traffic on the portmap port. </summary> @@ -49490,7 +49574,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63057"> +<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63075"> <summary> Do not audit attempts to send UDP traffic on the portmap port. </summary> @@ -49501,7 +49585,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_portmap_port" lineno="63072"> +<interface name="corenet_udp_receive_portmap_port" lineno="63090"> <summary> Receive UDP traffic on the portmap port. </summary> @@ -49512,7 +49596,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63087"> +<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63105"> <summary> Do not audit attempts to receive UDP traffic on the portmap port. </summary> @@ -49523,7 +49607,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_portmap_port" lineno="63102"> +<interface name="corenet_udp_sendrecv_portmap_port" lineno="63120"> <summary> Send and receive UDP traffic on the portmap port. </summary> @@ -49534,7 +49618,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63118"> +<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63136"> <summary> Do not audit attempts to send and receive UDP traffic on the portmap port. @@ -49546,7 +49630,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_portmap_port" lineno="63133"> +<interface name="corenet_tcp_bind_portmap_port" lineno="63151"> <summary> Bind TCP sockets to the portmap port. </summary> @@ -49557,7 +49641,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_portmap_port" lineno="63153"> +<interface name="corenet_udp_bind_portmap_port" lineno="63171"> <summary> Bind UDP sockets to the portmap port. </summary> @@ -49568,7 +49652,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_portmap_port" lineno="63172"> +<interface name="corenet_tcp_connect_portmap_port" lineno="63190"> <summary> Make a TCP connection to the portmap port. </summary> @@ -49578,7 +49662,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_portmap_client_packets" lineno="63192"> +<interface name="corenet_send_portmap_client_packets" lineno="63210"> <summary> Send portmap_client packets. </summary> @@ -49589,7 +49673,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63211"> +<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63229"> <summary> Do not audit attempts to send portmap_client packets. </summary> @@ -49600,7 +49684,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_portmap_client_packets" lineno="63230"> +<interface name="corenet_receive_portmap_client_packets" lineno="63248"> <summary> Receive portmap_client packets. </summary> @@ -49611,7 +49695,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63249"> +<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63267"> <summary> Do not audit attempts to receive portmap_client packets. </summary> @@ -49622,7 +49706,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_portmap_client_packets" lineno="63268"> +<interface name="corenet_sendrecv_portmap_client_packets" lineno="63286"> <summary> Send and receive portmap_client packets. </summary> @@ -49633,7 +49717,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63284"> +<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63302"> <summary> Do not audit attempts to send and receive portmap_client packets. </summary> @@ -49644,7 +49728,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_portmap_client_packets" lineno="63299"> +<interface name="corenet_relabelto_portmap_client_packets" lineno="63317"> <summary> Relabel packets to portmap_client the packet type. </summary> @@ -49654,7 +49738,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_portmap_server_packets" lineno="63319"> +<interface name="corenet_send_portmap_server_packets" lineno="63337"> <summary> Send portmap_server packets. </summary> @@ -49665,7 +49749,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63338"> +<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63356"> <summary> Do not audit attempts to send portmap_server packets. </summary> @@ -49676,7 +49760,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_portmap_server_packets" lineno="63357"> +<interface name="corenet_receive_portmap_server_packets" lineno="63375"> <summary> Receive portmap_server packets. </summary> @@ -49687,7 +49771,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63376"> +<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63394"> <summary> Do not audit attempts to receive portmap_server packets. </summary> @@ -49698,7 +49782,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_portmap_server_packets" lineno="63395"> +<interface name="corenet_sendrecv_portmap_server_packets" lineno="63413"> <summary> Send and receive portmap_server packets. </summary> @@ -49709,7 +49793,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63411"> +<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63429"> <summary> Do not audit attempts to send and receive portmap_server packets. </summary> @@ -49720,7 +49804,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_portmap_server_packets" lineno="63426"> +<interface name="corenet_relabelto_portmap_server_packets" lineno="63444"> <summary> Relabel packets to portmap_server the packet type. </summary> @@ -49730,7 +49814,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63448"> +<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63466"> <summary> Send and receive TCP traffic on the postfix_policyd port. </summary> @@ -49741,7 +49825,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_postfix_policyd_port" lineno="63463"> +<interface name="corenet_udp_send_postfix_policyd_port" lineno="63481"> <summary> Send UDP traffic on the postfix_policyd port. </summary> @@ -49752,7 +49836,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63478"> +<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63496"> <summary> Do not audit attempts to send UDP traffic on the postfix_policyd port. </summary> @@ -49763,7 +49847,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63493"> +<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63511"> <summary> Receive UDP traffic on the postfix_policyd port. </summary> @@ -49774,7 +49858,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63508"> +<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63526"> <summary> Do not audit attempts to receive UDP traffic on the postfix_policyd port. </summary> @@ -49785,7 +49869,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63523"> +<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63541"> <summary> Send and receive UDP traffic on the postfix_policyd port. </summary> @@ -49796,7 +49880,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63539"> +<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63557"> <summary> Do not audit attempts to send and receive UDP traffic on the postfix_policyd port. @@ -49808,7 +49892,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63554"> +<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63572"> <summary> Bind TCP sockets to the postfix_policyd port. </summary> @@ -49819,7 +49903,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63574"> +<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63592"> <summary> Bind UDP sockets to the postfix_policyd port. </summary> @@ -49830,7 +49914,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63593"> +<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63611"> <summary> Make a TCP connection to the postfix_policyd port. </summary> @@ -49840,7 +49924,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postfix_policyd_client_packets" lineno="63613"> +<interface name="corenet_send_postfix_policyd_client_packets" lineno="63631"> <summary> Send postfix_policyd_client packets. </summary> @@ -49851,7 +49935,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63632"> +<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63650"> <summary> Do not audit attempts to send postfix_policyd_client packets. </summary> @@ -49862,7 +49946,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63651"> +<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63669"> <summary> Receive postfix_policyd_client packets. </summary> @@ -49873,7 +49957,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63670"> +<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63688"> <summary> Do not audit attempts to receive postfix_policyd_client packets. </summary> @@ -49884,7 +49968,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63689"> +<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63707"> <summary> Send and receive postfix_policyd_client packets. </summary> @@ -49895,7 +49979,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63705"> +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63723"> <summary> Do not audit attempts to send and receive postfix_policyd_client packets. </summary> @@ -49906,7 +49990,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63720"> +<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63738"> <summary> Relabel packets to postfix_policyd_client the packet type. </summary> @@ -49916,7 +50000,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postfix_policyd_server_packets" lineno="63740"> +<interface name="corenet_send_postfix_policyd_server_packets" lineno="63758"> <summary> Send postfix_policyd_server packets. </summary> @@ -49927,7 +50011,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63759"> +<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63777"> <summary> Do not audit attempts to send postfix_policyd_server packets. </summary> @@ -49938,7 +50022,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63778"> +<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63796"> <summary> Receive postfix_policyd_server packets. </summary> @@ -49949,7 +50033,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63797"> +<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63815"> <summary> Do not audit attempts to receive postfix_policyd_server packets. </summary> @@ -49960,7 +50044,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63816"> +<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63834"> <summary> Send and receive postfix_policyd_server packets. </summary> @@ -49971,7 +50055,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63832"> +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63850"> <summary> Do not audit attempts to send and receive postfix_policyd_server packets. </summary> @@ -49982,7 +50066,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63847"> +<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63865"> <summary> Relabel packets to postfix_policyd_server the packet type. </summary> @@ -49992,7 +50076,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63869"> +<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63887"> <summary> Send and receive TCP traffic on the postgresql port. </summary> @@ -50003,7 +50087,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_postgresql_port" lineno="63884"> +<interface name="corenet_udp_send_postgresql_port" lineno="63902"> <summary> Send UDP traffic on the postgresql port. </summary> @@ -50014,7 +50098,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63899"> +<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63917"> <summary> Do not audit attempts to send UDP traffic on the postgresql port. </summary> @@ -50025,7 +50109,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_postgresql_port" lineno="63914"> +<interface name="corenet_udp_receive_postgresql_port" lineno="63932"> <summary> Receive UDP traffic on the postgresql port. </summary> @@ -50036,7 +50120,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63929"> +<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63947"> <summary> Do not audit attempts to receive UDP traffic on the postgresql port. </summary> @@ -50047,7 +50131,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63944"> +<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63962"> <summary> Send and receive UDP traffic on the postgresql port. </summary> @@ -50058,7 +50142,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63960"> +<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63978"> <summary> Do not audit attempts to send and receive UDP traffic on the postgresql port. @@ -50070,7 +50154,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_postgresql_port" lineno="63975"> +<interface name="corenet_tcp_bind_postgresql_port" lineno="63993"> <summary> Bind TCP sockets to the postgresql port. </summary> @@ -50081,7 +50165,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_postgresql_port" lineno="63995"> +<interface name="corenet_udp_bind_postgresql_port" lineno="64013"> <summary> Bind UDP sockets to the postgresql port. </summary> @@ -50092,7 +50176,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_postgresql_port" lineno="64014"> +<interface name="corenet_tcp_connect_postgresql_port" lineno="64032"> <summary> Make a TCP connection to the postgresql port. </summary> @@ -50102,7 +50186,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgresql_client_packets" lineno="64034"> +<interface name="corenet_send_postgresql_client_packets" lineno="64052"> <summary> Send postgresql_client packets. </summary> @@ -50113,7 +50197,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64053"> +<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64071"> <summary> Do not audit attempts to send postgresql_client packets. </summary> @@ -50124,7 +50208,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgresql_client_packets" lineno="64072"> +<interface name="corenet_receive_postgresql_client_packets" lineno="64090"> <summary> Receive postgresql_client packets. </summary> @@ -50135,7 +50219,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64091"> +<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64109"> <summary> Do not audit attempts to receive postgresql_client packets. </summary> @@ -50146,7 +50230,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64110"> +<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64128"> <summary> Send and receive postgresql_client packets. </summary> @@ -50157,7 +50241,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64126"> +<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64144"> <summary> Do not audit attempts to send and receive postgresql_client packets. </summary> @@ -50168,7 +50252,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgresql_client_packets" lineno="64141"> +<interface name="corenet_relabelto_postgresql_client_packets" lineno="64159"> <summary> Relabel packets to postgresql_client the packet type. </summary> @@ -50178,7 +50262,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgresql_server_packets" lineno="64161"> +<interface name="corenet_send_postgresql_server_packets" lineno="64179"> <summary> Send postgresql_server packets. </summary> @@ -50189,7 +50273,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64180"> +<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64198"> <summary> Do not audit attempts to send postgresql_server packets. </summary> @@ -50200,7 +50284,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgresql_server_packets" lineno="64199"> +<interface name="corenet_receive_postgresql_server_packets" lineno="64217"> <summary> Receive postgresql_server packets. </summary> @@ -50211,7 +50295,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64218"> +<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64236"> <summary> Do not audit attempts to receive postgresql_server packets. </summary> @@ -50222,7 +50306,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64237"> +<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64255"> <summary> Send and receive postgresql_server packets. </summary> @@ -50233,7 +50317,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64253"> +<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64271"> <summary> Do not audit attempts to send and receive postgresql_server packets. </summary> @@ -50244,7 +50328,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgresql_server_packets" lineno="64268"> +<interface name="corenet_relabelto_postgresql_server_packets" lineno="64286"> <summary> Relabel packets to postgresql_server the packet type. </summary> @@ -50254,7 +50338,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64290"> +<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64308"> <summary> Send and receive TCP traffic on the postgrey port. </summary> @@ -50265,7 +50349,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_postgrey_port" lineno="64305"> +<interface name="corenet_udp_send_postgrey_port" lineno="64323"> <summary> Send UDP traffic on the postgrey port. </summary> @@ -50276,7 +50360,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64320"> +<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64338"> <summary> Do not audit attempts to send UDP traffic on the postgrey port. </summary> @@ -50287,7 +50371,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_postgrey_port" lineno="64335"> +<interface name="corenet_udp_receive_postgrey_port" lineno="64353"> <summary> Receive UDP traffic on the postgrey port. </summary> @@ -50298,7 +50382,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64350"> +<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64368"> <summary> Do not audit attempts to receive UDP traffic on the postgrey port. </summary> @@ -50309,7 +50393,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64365"> +<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64383"> <summary> Send and receive UDP traffic on the postgrey port. </summary> @@ -50320,7 +50404,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64381"> +<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64399"> <summary> Do not audit attempts to send and receive UDP traffic on the postgrey port. @@ -50332,7 +50416,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_postgrey_port" lineno="64396"> +<interface name="corenet_tcp_bind_postgrey_port" lineno="64414"> <summary> Bind TCP sockets to the postgrey port. </summary> @@ -50343,7 +50427,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_postgrey_port" lineno="64416"> +<interface name="corenet_udp_bind_postgrey_port" lineno="64434"> <summary> Bind UDP sockets to the postgrey port. </summary> @@ -50354,7 +50438,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_postgrey_port" lineno="64435"> +<interface name="corenet_tcp_connect_postgrey_port" lineno="64453"> <summary> Make a TCP connection to the postgrey port. </summary> @@ -50364,7 +50448,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgrey_client_packets" lineno="64455"> +<interface name="corenet_send_postgrey_client_packets" lineno="64473"> <summary> Send postgrey_client packets. </summary> @@ -50375,7 +50459,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64474"> +<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64492"> <summary> Do not audit attempts to send postgrey_client packets. </summary> @@ -50386,7 +50470,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgrey_client_packets" lineno="64493"> +<interface name="corenet_receive_postgrey_client_packets" lineno="64511"> <summary> Receive postgrey_client packets. </summary> @@ -50397,7 +50481,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64512"> +<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64530"> <summary> Do not audit attempts to receive postgrey_client packets. </summary> @@ -50408,7 +50492,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64531"> +<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64549"> <summary> Send and receive postgrey_client packets. </summary> @@ -50419,7 +50503,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64547"> +<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64565"> <summary> Do not audit attempts to send and receive postgrey_client packets. </summary> @@ -50430,7 +50514,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgrey_client_packets" lineno="64562"> +<interface name="corenet_relabelto_postgrey_client_packets" lineno="64580"> <summary> Relabel packets to postgrey_client the packet type. </summary> @@ -50440,7 +50524,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgrey_server_packets" lineno="64582"> +<interface name="corenet_send_postgrey_server_packets" lineno="64600"> <summary> Send postgrey_server packets. </summary> @@ -50451,7 +50535,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64601"> +<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64619"> <summary> Do not audit attempts to send postgrey_server packets. </summary> @@ -50462,7 +50546,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgrey_server_packets" lineno="64620"> +<interface name="corenet_receive_postgrey_server_packets" lineno="64638"> <summary> Receive postgrey_server packets. </summary> @@ -50473,7 +50557,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64639"> +<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64657"> <summary> Do not audit attempts to receive postgrey_server packets. </summary> @@ -50484,7 +50568,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64658"> +<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64676"> <summary> Send and receive postgrey_server packets. </summary> @@ -50495,7 +50579,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64674"> +<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64692"> <summary> Do not audit attempts to send and receive postgrey_server packets. </summary> @@ -50506,7 +50590,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgrey_server_packets" lineno="64689"> +<interface name="corenet_relabelto_postgrey_server_packets" lineno="64707"> <summary> Relabel packets to postgrey_server the packet type. </summary> @@ -50516,7 +50600,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64711"> +<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64729"> <summary> Send and receive TCP traffic on the pptp port. </summary> @@ -50527,7 +50611,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pptp_port" lineno="64726"> +<interface name="corenet_udp_send_pptp_port" lineno="64744"> <summary> Send UDP traffic on the pptp port. </summary> @@ -50538,7 +50622,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64741"> +<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64759"> <summary> Do not audit attempts to send UDP traffic on the pptp port. </summary> @@ -50549,7 +50633,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pptp_port" lineno="64756"> +<interface name="corenet_udp_receive_pptp_port" lineno="64774"> <summary> Receive UDP traffic on the pptp port. </summary> @@ -50560,7 +50644,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64771"> +<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64789"> <summary> Do not audit attempts to receive UDP traffic on the pptp port. </summary> @@ -50571,7 +50655,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pptp_port" lineno="64786"> +<interface name="corenet_udp_sendrecv_pptp_port" lineno="64804"> <summary> Send and receive UDP traffic on the pptp port. </summary> @@ -50582,7 +50666,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64802"> +<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64820"> <summary> Do not audit attempts to send and receive UDP traffic on the pptp port. @@ -50594,7 +50678,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pptp_port" lineno="64817"> +<interface name="corenet_tcp_bind_pptp_port" lineno="64835"> <summary> Bind TCP sockets to the pptp port. </summary> @@ -50605,7 +50689,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pptp_port" lineno="64837"> +<interface name="corenet_udp_bind_pptp_port" lineno="64855"> <summary> Bind UDP sockets to the pptp port. </summary> @@ -50616,7 +50700,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pptp_port" lineno="64856"> +<interface name="corenet_tcp_connect_pptp_port" lineno="64874"> <summary> Make a TCP connection to the pptp port. </summary> @@ -50626,7 +50710,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pptp_client_packets" lineno="64876"> +<interface name="corenet_send_pptp_client_packets" lineno="64894"> <summary> Send pptp_client packets. </summary> @@ -50637,7 +50721,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64895"> +<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64913"> <summary> Do not audit attempts to send pptp_client packets. </summary> @@ -50648,7 +50732,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pptp_client_packets" lineno="64914"> +<interface name="corenet_receive_pptp_client_packets" lineno="64932"> <summary> Receive pptp_client packets. </summary> @@ -50659,7 +50743,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64933"> +<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64951"> <summary> Do not audit attempts to receive pptp_client packets. </summary> @@ -50670,7 +50754,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pptp_client_packets" lineno="64952"> +<interface name="corenet_sendrecv_pptp_client_packets" lineno="64970"> <summary> Send and receive pptp_client packets. </summary> @@ -50681,7 +50765,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64968"> +<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64986"> <summary> Do not audit attempts to send and receive pptp_client packets. </summary> @@ -50692,7 +50776,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pptp_client_packets" lineno="64983"> +<interface name="corenet_relabelto_pptp_client_packets" lineno="65001"> <summary> Relabel packets to pptp_client the packet type. </summary> @@ -50702,7 +50786,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pptp_server_packets" lineno="65003"> +<interface name="corenet_send_pptp_server_packets" lineno="65021"> <summary> Send pptp_server packets. </summary> @@ -50713,7 +50797,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65022"> +<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65040"> <summary> Do not audit attempts to send pptp_server packets. </summary> @@ -50724,7 +50808,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pptp_server_packets" lineno="65041"> +<interface name="corenet_receive_pptp_server_packets" lineno="65059"> <summary> Receive pptp_server packets. </summary> @@ -50735,7 +50819,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65060"> +<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65078"> <summary> Do not audit attempts to receive pptp_server packets. </summary> @@ -50746,7 +50830,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pptp_server_packets" lineno="65079"> +<interface name="corenet_sendrecv_pptp_server_packets" lineno="65097"> <summary> Send and receive pptp_server packets. </summary> @@ -50757,7 +50841,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65095"> +<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65113"> <summary> Do not audit attempts to send and receive pptp_server packets. </summary> @@ -50768,7 +50852,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pptp_server_packets" lineno="65110"> +<interface name="corenet_relabelto_pptp_server_packets" lineno="65128"> <summary> Relabel packets to pptp_server the packet type. </summary> @@ -50778,7 +50862,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65132"> +<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65150"> <summary> Send and receive TCP traffic on the prelude port. </summary> @@ -50789,7 +50873,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_prelude_port" lineno="65147"> +<interface name="corenet_udp_send_prelude_port" lineno="65165"> <summary> Send UDP traffic on the prelude port. </summary> @@ -50800,7 +50884,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65162"> +<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65180"> <summary> Do not audit attempts to send UDP traffic on the prelude port. </summary> @@ -50811,7 +50895,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_prelude_port" lineno="65177"> +<interface name="corenet_udp_receive_prelude_port" lineno="65195"> <summary> Receive UDP traffic on the prelude port. </summary> @@ -50822,7 +50906,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65192"> +<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65210"> <summary> Do not audit attempts to receive UDP traffic on the prelude port. </summary> @@ -50833,7 +50917,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_prelude_port" lineno="65207"> +<interface name="corenet_udp_sendrecv_prelude_port" lineno="65225"> <summary> Send and receive UDP traffic on the prelude port. </summary> @@ -50844,7 +50928,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65223"> +<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65241"> <summary> Do not audit attempts to send and receive UDP traffic on the prelude port. @@ -50856,7 +50940,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_prelude_port" lineno="65238"> +<interface name="corenet_tcp_bind_prelude_port" lineno="65256"> <summary> Bind TCP sockets to the prelude port. </summary> @@ -50867,7 +50951,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_prelude_port" lineno="65258"> +<interface name="corenet_udp_bind_prelude_port" lineno="65276"> <summary> Bind UDP sockets to the prelude port. </summary> @@ -50878,7 +50962,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_prelude_port" lineno="65277"> +<interface name="corenet_tcp_connect_prelude_port" lineno="65295"> <summary> Make a TCP connection to the prelude port. </summary> @@ -50888,7 +50972,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_prelude_client_packets" lineno="65297"> +<interface name="corenet_send_prelude_client_packets" lineno="65315"> <summary> Send prelude_client packets. </summary> @@ -50899,7 +50983,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65316"> +<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65334"> <summary> Do not audit attempts to send prelude_client packets. </summary> @@ -50910,7 +50994,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_prelude_client_packets" lineno="65335"> +<interface name="corenet_receive_prelude_client_packets" lineno="65353"> <summary> Receive prelude_client packets. </summary> @@ -50921,7 +51005,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65354"> +<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65372"> <summary> Do not audit attempts to receive prelude_client packets. </summary> @@ -50932,7 +51016,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_prelude_client_packets" lineno="65373"> +<interface name="corenet_sendrecv_prelude_client_packets" lineno="65391"> <summary> Send and receive prelude_client packets. </summary> @@ -50943,7 +51027,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65389"> +<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65407"> <summary> Do not audit attempts to send and receive prelude_client packets. </summary> @@ -50954,7 +51038,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_prelude_client_packets" lineno="65404"> +<interface name="corenet_relabelto_prelude_client_packets" lineno="65422"> <summary> Relabel packets to prelude_client the packet type. </summary> @@ -50964,7 +51048,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_prelude_server_packets" lineno="65424"> +<interface name="corenet_send_prelude_server_packets" lineno="65442"> <summary> Send prelude_server packets. </summary> @@ -50975,7 +51059,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65443"> +<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65461"> <summary> Do not audit attempts to send prelude_server packets. </summary> @@ -50986,7 +51070,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_prelude_server_packets" lineno="65462"> +<interface name="corenet_receive_prelude_server_packets" lineno="65480"> <summary> Receive prelude_server packets. </summary> @@ -50997,7 +51081,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65481"> +<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65499"> <summary> Do not audit attempts to receive prelude_server packets. </summary> @@ -51008,7 +51092,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_prelude_server_packets" lineno="65500"> +<interface name="corenet_sendrecv_prelude_server_packets" lineno="65518"> <summary> Send and receive prelude_server packets. </summary> @@ -51019,7 +51103,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65516"> +<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65534"> <summary> Do not audit attempts to send and receive prelude_server packets. </summary> @@ -51030,7 +51114,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_prelude_server_packets" lineno="65531"> +<interface name="corenet_relabelto_prelude_server_packets" lineno="65549"> <summary> Relabel packets to prelude_server the packet type. </summary> @@ -51040,7 +51124,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_presence_port" lineno="65553"> +<interface name="corenet_tcp_sendrecv_presence_port" lineno="65571"> <summary> Send and receive TCP traffic on the presence port. </summary> @@ -51051,7 +51135,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_presence_port" lineno="65568"> +<interface name="corenet_udp_send_presence_port" lineno="65586"> <summary> Send UDP traffic on the presence port. </summary> @@ -51062,7 +51146,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65583"> +<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65601"> <summary> Do not audit attempts to send UDP traffic on the presence port. </summary> @@ -51073,7 +51157,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_presence_port" lineno="65598"> +<interface name="corenet_udp_receive_presence_port" lineno="65616"> <summary> Receive UDP traffic on the presence port. </summary> @@ -51084,7 +51168,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65613"> +<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65631"> <summary> Do not audit attempts to receive UDP traffic on the presence port. </summary> @@ -51095,7 +51179,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_presence_port" lineno="65628"> +<interface name="corenet_udp_sendrecv_presence_port" lineno="65646"> <summary> Send and receive UDP traffic on the presence port. </summary> @@ -51106,7 +51190,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65644"> +<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65662"> <summary> Do not audit attempts to send and receive UDP traffic on the presence port. @@ -51118,7 +51202,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_presence_port" lineno="65659"> +<interface name="corenet_tcp_bind_presence_port" lineno="65677"> <summary> Bind TCP sockets to the presence port. </summary> @@ -51129,7 +51213,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_presence_port" lineno="65679"> +<interface name="corenet_udp_bind_presence_port" lineno="65697"> <summary> Bind UDP sockets to the presence port. </summary> @@ -51140,7 +51224,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_presence_port" lineno="65698"> +<interface name="corenet_tcp_connect_presence_port" lineno="65716"> <summary> Make a TCP connection to the presence port. </summary> @@ -51150,7 +51234,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_presence_client_packets" lineno="65718"> +<interface name="corenet_send_presence_client_packets" lineno="65736"> <summary> Send presence_client packets. </summary> @@ -51161,7 +51245,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65737"> +<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65755"> <summary> Do not audit attempts to send presence_client packets. </summary> @@ -51172,7 +51256,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_presence_client_packets" lineno="65756"> +<interface name="corenet_receive_presence_client_packets" lineno="65774"> <summary> Receive presence_client packets. </summary> @@ -51183,7 +51267,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65775"> +<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65793"> <summary> Do not audit attempts to receive presence_client packets. </summary> @@ -51194,7 +51278,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_presence_client_packets" lineno="65794"> +<interface name="corenet_sendrecv_presence_client_packets" lineno="65812"> <summary> Send and receive presence_client packets. </summary> @@ -51205,7 +51289,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65810"> +<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65828"> <summary> Do not audit attempts to send and receive presence_client packets. </summary> @@ -51216,7 +51300,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_presence_client_packets" lineno="65825"> +<interface name="corenet_relabelto_presence_client_packets" lineno="65843"> <summary> Relabel packets to presence_client the packet type. </summary> @@ -51226,7 +51310,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_presence_server_packets" lineno="65845"> +<interface name="corenet_send_presence_server_packets" lineno="65863"> <summary> Send presence_server packets. </summary> @@ -51237,7 +51321,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65864"> +<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65882"> <summary> Do not audit attempts to send presence_server packets. </summary> @@ -51248,7 +51332,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_presence_server_packets" lineno="65883"> +<interface name="corenet_receive_presence_server_packets" lineno="65901"> <summary> Receive presence_server packets. </summary> @@ -51259,7 +51343,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65902"> +<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65920"> <summary> Do not audit attempts to receive presence_server packets. </summary> @@ -51270,7 +51354,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_presence_server_packets" lineno="65921"> +<interface name="corenet_sendrecv_presence_server_packets" lineno="65939"> <summary> Send and receive presence_server packets. </summary> @@ -51281,7 +51365,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65937"> +<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65955"> <summary> Do not audit attempts to send and receive presence_server packets. </summary> @@ -51292,7 +51376,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_presence_server_packets" lineno="65952"> +<interface name="corenet_relabelto_presence_server_packets" lineno="65970"> <summary> Relabel packets to presence_server the packet type. </summary> @@ -51302,7 +51386,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_printer_port" lineno="65974"> +<interface name="corenet_tcp_sendrecv_printer_port" lineno="65992"> <summary> Send and receive TCP traffic on the printer port. </summary> @@ -51313,7 +51397,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_printer_port" lineno="65989"> +<interface name="corenet_udp_send_printer_port" lineno="66007"> <summary> Send UDP traffic on the printer port. </summary> @@ -51324,7 +51408,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66004"> +<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66022"> <summary> Do not audit attempts to send UDP traffic on the printer port. </summary> @@ -51335,7 +51419,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_printer_port" lineno="66019"> +<interface name="corenet_udp_receive_printer_port" lineno="66037"> <summary> Receive UDP traffic on the printer port. </summary> @@ -51346,7 +51430,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66034"> +<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66052"> <summary> Do not audit attempts to receive UDP traffic on the printer port. </summary> @@ -51357,7 +51441,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_printer_port" lineno="66049"> +<interface name="corenet_udp_sendrecv_printer_port" lineno="66067"> <summary> Send and receive UDP traffic on the printer port. </summary> @@ -51368,7 +51452,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66065"> +<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66083"> <summary> Do not audit attempts to send and receive UDP traffic on the printer port. @@ -51380,7 +51464,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_printer_port" lineno="66080"> +<interface name="corenet_tcp_bind_printer_port" lineno="66098"> <summary> Bind TCP sockets to the printer port. </summary> @@ -51391,7 +51475,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_printer_port" lineno="66100"> +<interface name="corenet_udp_bind_printer_port" lineno="66118"> <summary> Bind UDP sockets to the printer port. </summary> @@ -51402,7 +51486,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_printer_port" lineno="66119"> +<interface name="corenet_tcp_connect_printer_port" lineno="66137"> <summary> Make a TCP connection to the printer port. </summary> @@ -51412,7 +51496,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_printer_client_packets" lineno="66139"> +<interface name="corenet_send_printer_client_packets" lineno="66157"> <summary> Send printer_client packets. </summary> @@ -51423,7 +51507,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66158"> +<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66176"> <summary> Do not audit attempts to send printer_client packets. </summary> @@ -51434,7 +51518,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_printer_client_packets" lineno="66177"> +<interface name="corenet_receive_printer_client_packets" lineno="66195"> <summary> Receive printer_client packets. </summary> @@ -51445,7 +51529,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66196"> +<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66214"> <summary> Do not audit attempts to receive printer_client packets. </summary> @@ -51456,7 +51540,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_printer_client_packets" lineno="66215"> +<interface name="corenet_sendrecv_printer_client_packets" lineno="66233"> <summary> Send and receive printer_client packets. </summary> @@ -51467,7 +51551,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66231"> +<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66249"> <summary> Do not audit attempts to send and receive printer_client packets. </summary> @@ -51478,7 +51562,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_printer_client_packets" lineno="66246"> +<interface name="corenet_relabelto_printer_client_packets" lineno="66264"> <summary> Relabel packets to printer_client the packet type. </summary> @@ -51488,7 +51572,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_printer_server_packets" lineno="66266"> +<interface name="corenet_send_printer_server_packets" lineno="66284"> <summary> Send printer_server packets. </summary> @@ -51499,7 +51583,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66285"> +<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66303"> <summary> Do not audit attempts to send printer_server packets. </summary> @@ -51510,7 +51594,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_printer_server_packets" lineno="66304"> +<interface name="corenet_receive_printer_server_packets" lineno="66322"> <summary> Receive printer_server packets. </summary> @@ -51521,7 +51605,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66323"> +<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66341"> <summary> Do not audit attempts to receive printer_server packets. </summary> @@ -51532,7 +51616,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_printer_server_packets" lineno="66342"> +<interface name="corenet_sendrecv_printer_server_packets" lineno="66360"> <summary> Send and receive printer_server packets. </summary> @@ -51543,7 +51627,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66358"> +<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66376"> <summary> Do not audit attempts to send and receive printer_server packets. </summary> @@ -51554,7 +51638,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_printer_server_packets" lineno="66373"> +<interface name="corenet_relabelto_printer_server_packets" lineno="66391"> <summary> Relabel packets to printer_server the packet type. </summary> @@ -51564,7 +51648,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66395"> +<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66413"> <summary> Send and receive TCP traffic on the ptal port. </summary> @@ -51575,7 +51659,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ptal_port" lineno="66410"> +<interface name="corenet_udp_send_ptal_port" lineno="66428"> <summary> Send UDP traffic on the ptal port. </summary> @@ -51586,7 +51670,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66425"> +<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66443"> <summary> Do not audit attempts to send UDP traffic on the ptal port. </summary> @@ -51597,7 +51681,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ptal_port" lineno="66440"> +<interface name="corenet_udp_receive_ptal_port" lineno="66458"> <summary> Receive UDP traffic on the ptal port. </summary> @@ -51608,7 +51692,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66455"> +<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66473"> <summary> Do not audit attempts to receive UDP traffic on the ptal port. </summary> @@ -51619,7 +51703,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ptal_port" lineno="66470"> +<interface name="corenet_udp_sendrecv_ptal_port" lineno="66488"> <summary> Send and receive UDP traffic on the ptal port. </summary> @@ -51630,7 +51714,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66486"> +<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66504"> <summary> Do not audit attempts to send and receive UDP traffic on the ptal port. @@ -51642,7 +51726,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ptal_port" lineno="66501"> +<interface name="corenet_tcp_bind_ptal_port" lineno="66519"> <summary> Bind TCP sockets to the ptal port. </summary> @@ -51653,7 +51737,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ptal_port" lineno="66521"> +<interface name="corenet_udp_bind_ptal_port" lineno="66539"> <summary> Bind UDP sockets to the ptal port. </summary> @@ -51664,7 +51748,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ptal_port" lineno="66540"> +<interface name="corenet_tcp_connect_ptal_port" lineno="66558"> <summary> Make a TCP connection to the ptal port. </summary> @@ -51674,7 +51758,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ptal_client_packets" lineno="66560"> +<interface name="corenet_send_ptal_client_packets" lineno="66578"> <summary> Send ptal_client packets. </summary> @@ -51685,7 +51769,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66579"> +<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66597"> <summary> Do not audit attempts to send ptal_client packets. </summary> @@ -51696,7 +51780,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ptal_client_packets" lineno="66598"> +<interface name="corenet_receive_ptal_client_packets" lineno="66616"> <summary> Receive ptal_client packets. </summary> @@ -51707,7 +51791,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66617"> +<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66635"> <summary> Do not audit attempts to receive ptal_client packets. </summary> @@ -51718,7 +51802,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ptal_client_packets" lineno="66636"> +<interface name="corenet_sendrecv_ptal_client_packets" lineno="66654"> <summary> Send and receive ptal_client packets. </summary> @@ -51729,7 +51813,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66652"> +<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66670"> <summary> Do not audit attempts to send and receive ptal_client packets. </summary> @@ -51740,7 +51824,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ptal_client_packets" lineno="66667"> +<interface name="corenet_relabelto_ptal_client_packets" lineno="66685"> <summary> Relabel packets to ptal_client the packet type. </summary> @@ -51750,7 +51834,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ptal_server_packets" lineno="66687"> +<interface name="corenet_send_ptal_server_packets" lineno="66705"> <summary> Send ptal_server packets. </summary> @@ -51761,7 +51845,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66706"> +<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66724"> <summary> Do not audit attempts to send ptal_server packets. </summary> @@ -51772,7 +51856,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ptal_server_packets" lineno="66725"> +<interface name="corenet_receive_ptal_server_packets" lineno="66743"> <summary> Receive ptal_server packets. </summary> @@ -51783,7 +51867,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66744"> +<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66762"> <summary> Do not audit attempts to receive ptal_server packets. </summary> @@ -51794,7 +51878,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ptal_server_packets" lineno="66763"> +<interface name="corenet_sendrecv_ptal_server_packets" lineno="66781"> <summary> Send and receive ptal_server packets. </summary> @@ -51805,7 +51889,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66779"> +<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66797"> <summary> Do not audit attempts to send and receive ptal_server packets. </summary> @@ -51816,7 +51900,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ptal_server_packets" lineno="66794"> +<interface name="corenet_relabelto_ptal_server_packets" lineno="66812"> <summary> Relabel packets to ptal_server the packet type. </summary> @@ -51826,7 +51910,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66816"> +<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66834"> <summary> Send and receive TCP traffic on the pulseaudio port. </summary> @@ -51837,7 +51921,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pulseaudio_port" lineno="66831"> +<interface name="corenet_udp_send_pulseaudio_port" lineno="66849"> <summary> Send UDP traffic on the pulseaudio port. </summary> @@ -51848,7 +51932,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66846"> +<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66864"> <summary> Do not audit attempts to send UDP traffic on the pulseaudio port. </summary> @@ -51859,7 +51943,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pulseaudio_port" lineno="66861"> +<interface name="corenet_udp_receive_pulseaudio_port" lineno="66879"> <summary> Receive UDP traffic on the pulseaudio port. </summary> @@ -51870,7 +51954,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66876"> +<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66894"> <summary> Do not audit attempts to receive UDP traffic on the pulseaudio port. </summary> @@ -51881,7 +51965,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66891"> +<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66909"> <summary> Send and receive UDP traffic on the pulseaudio port. </summary> @@ -51892,7 +51976,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66907"> +<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66925"> <summary> Do not audit attempts to send and receive UDP traffic on the pulseaudio port. @@ -51904,7 +51988,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66922"> +<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66940"> <summary> Bind TCP sockets to the pulseaudio port. </summary> @@ -51915,7 +51999,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pulseaudio_port" lineno="66942"> +<interface name="corenet_udp_bind_pulseaudio_port" lineno="66960"> <summary> Bind UDP sockets to the pulseaudio port. </summary> @@ -51926,7 +52010,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66961"> +<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66979"> <summary> Make a TCP connection to the pulseaudio port. </summary> @@ -51936,7 +52020,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pulseaudio_client_packets" lineno="66981"> +<interface name="corenet_send_pulseaudio_client_packets" lineno="66999"> <summary> Send pulseaudio_client packets. </summary> @@ -51947,7 +52031,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67000"> +<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67018"> <summary> Do not audit attempts to send pulseaudio_client packets. </summary> @@ -51958,7 +52042,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pulseaudio_client_packets" lineno="67019"> +<interface name="corenet_receive_pulseaudio_client_packets" lineno="67037"> <summary> Receive pulseaudio_client packets. </summary> @@ -51969,7 +52053,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67038"> +<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67056"> <summary> Do not audit attempts to receive pulseaudio_client packets. </summary> @@ -51980,7 +52064,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67057"> +<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67075"> <summary> Send and receive pulseaudio_client packets. </summary> @@ -51991,7 +52075,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67073"> +<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67091"> <summary> Do not audit attempts to send and receive pulseaudio_client packets. </summary> @@ -52002,7 +52086,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67088"> +<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67106"> <summary> Relabel packets to pulseaudio_client the packet type. </summary> @@ -52012,7 +52096,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pulseaudio_server_packets" lineno="67108"> +<interface name="corenet_send_pulseaudio_server_packets" lineno="67126"> <summary> Send pulseaudio_server packets. </summary> @@ -52023,7 +52107,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67127"> +<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67145"> <summary> Do not audit attempts to send pulseaudio_server packets. </summary> @@ -52034,7 +52118,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pulseaudio_server_packets" lineno="67146"> +<interface name="corenet_receive_pulseaudio_server_packets" lineno="67164"> <summary> Receive pulseaudio_server packets. </summary> @@ -52045,7 +52129,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67165"> +<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67183"> <summary> Do not audit attempts to receive pulseaudio_server packets. </summary> @@ -52056,7 +52140,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67184"> +<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67202"> <summary> Send and receive pulseaudio_server packets. </summary> @@ -52067,7 +52151,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67200"> +<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67218"> <summary> Do not audit attempts to send and receive pulseaudio_server packets. </summary> @@ -52078,7 +52162,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67215"> +<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67233"> <summary> Relabel packets to pulseaudio_server the packet type. </summary> @@ -52088,7 +52172,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67237"> +<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67255"> <summary> Send and receive TCP traffic on the puppet port. </summary> @@ -52099,7 +52183,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_puppet_port" lineno="67252"> +<interface name="corenet_udp_send_puppet_port" lineno="67270"> <summary> Send UDP traffic on the puppet port. </summary> @@ -52110,7 +52194,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67267"> +<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67285"> <summary> Do not audit attempts to send UDP traffic on the puppet port. </summary> @@ -52121,7 +52205,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_puppet_port" lineno="67282"> +<interface name="corenet_udp_receive_puppet_port" lineno="67300"> <summary> Receive UDP traffic on the puppet port. </summary> @@ -52132,7 +52216,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67297"> +<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67315"> <summary> Do not audit attempts to receive UDP traffic on the puppet port. </summary> @@ -52143,7 +52227,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_puppet_port" lineno="67312"> +<interface name="corenet_udp_sendrecv_puppet_port" lineno="67330"> <summary> Send and receive UDP traffic on the puppet port. </summary> @@ -52154,7 +52238,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67328"> +<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67346"> <summary> Do not audit attempts to send and receive UDP traffic on the puppet port. @@ -52166,7 +52250,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_puppet_port" lineno="67343"> +<interface name="corenet_tcp_bind_puppet_port" lineno="67361"> <summary> Bind TCP sockets to the puppet port. </summary> @@ -52177,7 +52261,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_puppet_port" lineno="67363"> +<interface name="corenet_udp_bind_puppet_port" lineno="67381"> <summary> Bind UDP sockets to the puppet port. </summary> @@ -52188,7 +52272,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_puppet_port" lineno="67382"> +<interface name="corenet_tcp_connect_puppet_port" lineno="67400"> <summary> Make a TCP connection to the puppet port. </summary> @@ -52198,7 +52282,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppet_client_packets" lineno="67402"> +<interface name="corenet_send_puppet_client_packets" lineno="67420"> <summary> Send puppet_client packets. </summary> @@ -52209,7 +52293,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67421"> +<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67439"> <summary> Do not audit attempts to send puppet_client packets. </summary> @@ -52220,7 +52304,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppet_client_packets" lineno="67440"> +<interface name="corenet_receive_puppet_client_packets" lineno="67458"> <summary> Receive puppet_client packets. </summary> @@ -52231,7 +52315,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67459"> +<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67477"> <summary> Do not audit attempts to receive puppet_client packets. </summary> @@ -52242,7 +52326,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppet_client_packets" lineno="67478"> +<interface name="corenet_sendrecv_puppet_client_packets" lineno="67496"> <summary> Send and receive puppet_client packets. </summary> @@ -52253,7 +52337,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67494"> +<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67512"> <summary> Do not audit attempts to send and receive puppet_client packets. </summary> @@ -52264,7 +52348,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppet_client_packets" lineno="67509"> +<interface name="corenet_relabelto_puppet_client_packets" lineno="67527"> <summary> Relabel packets to puppet_client the packet type. </summary> @@ -52274,7 +52358,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppet_server_packets" lineno="67529"> +<interface name="corenet_send_puppet_server_packets" lineno="67547"> <summary> Send puppet_server packets. </summary> @@ -52285,7 +52369,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67548"> +<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67566"> <summary> Do not audit attempts to send puppet_server packets. </summary> @@ -52296,7 +52380,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppet_server_packets" lineno="67567"> +<interface name="corenet_receive_puppet_server_packets" lineno="67585"> <summary> Receive puppet_server packets. </summary> @@ -52307,7 +52391,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67586"> +<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67604"> <summary> Do not audit attempts to receive puppet_server packets. </summary> @@ -52318,7 +52402,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppet_server_packets" lineno="67605"> +<interface name="corenet_sendrecv_puppet_server_packets" lineno="67623"> <summary> Send and receive puppet_server packets. </summary> @@ -52329,7 +52413,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67621"> +<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67639"> <summary> Do not audit attempts to send and receive puppet_server packets. </summary> @@ -52340,7 +52424,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppet_server_packets" lineno="67636"> +<interface name="corenet_relabelto_puppet_server_packets" lineno="67654"> <summary> Relabel packets to puppet_server the packet type. </summary> @@ -52350,7 +52434,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67658"> +<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67676"> <summary> Send and receive TCP traffic on the puppetclient port. </summary> @@ -52361,7 +52445,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_puppetclient_port" lineno="67673"> +<interface name="corenet_udp_send_puppetclient_port" lineno="67691"> <summary> Send UDP traffic on the puppetclient port. </summary> @@ -52372,7 +52456,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67688"> +<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67706"> <summary> Do not audit attempts to send UDP traffic on the puppetclient port. </summary> @@ -52383,7 +52467,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_puppetclient_port" lineno="67703"> +<interface name="corenet_udp_receive_puppetclient_port" lineno="67721"> <summary> Receive UDP traffic on the puppetclient port. </summary> @@ -52394,7 +52478,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67718"> +<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67736"> <summary> Do not audit attempts to receive UDP traffic on the puppetclient port. </summary> @@ -52405,7 +52489,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67733"> +<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67751"> <summary> Send and receive UDP traffic on the puppetclient port. </summary> @@ -52416,7 +52500,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67749"> +<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67767"> <summary> Do not audit attempts to send and receive UDP traffic on the puppetclient port. @@ -52428,7 +52512,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_puppetclient_port" lineno="67764"> +<interface name="corenet_tcp_bind_puppetclient_port" lineno="67782"> <summary> Bind TCP sockets to the puppetclient port. </summary> @@ -52439,7 +52523,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_puppetclient_port" lineno="67784"> +<interface name="corenet_udp_bind_puppetclient_port" lineno="67802"> <summary> Bind UDP sockets to the puppetclient port. </summary> @@ -52450,7 +52534,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_puppetclient_port" lineno="67803"> +<interface name="corenet_tcp_connect_puppetclient_port" lineno="67821"> <summary> Make a TCP connection to the puppetclient port. </summary> @@ -52460,7 +52544,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppetclient_client_packets" lineno="67823"> +<interface name="corenet_send_puppetclient_client_packets" lineno="67841"> <summary> Send puppetclient_client packets. </summary> @@ -52471,7 +52555,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67842"> +<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67860"> <summary> Do not audit attempts to send puppetclient_client packets. </summary> @@ -52482,7 +52566,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppetclient_client_packets" lineno="67861"> +<interface name="corenet_receive_puppetclient_client_packets" lineno="67879"> <summary> Receive puppetclient_client packets. </summary> @@ -52493,7 +52577,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67880"> +<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67898"> <summary> Do not audit attempts to receive puppetclient_client packets. </summary> @@ -52504,7 +52588,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67899"> +<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67917"> <summary> Send and receive puppetclient_client packets. </summary> @@ -52515,7 +52599,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67915"> +<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67933"> <summary> Do not audit attempts to send and receive puppetclient_client packets. </summary> @@ -52526,7 +52610,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67930"> +<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67948"> <summary> Relabel packets to puppetclient_client the packet type. </summary> @@ -52536,7 +52620,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppetclient_server_packets" lineno="67950"> +<interface name="corenet_send_puppetclient_server_packets" lineno="67968"> <summary> Send puppetclient_server packets. </summary> @@ -52547,7 +52631,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67969"> +<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67987"> <summary> Do not audit attempts to send puppetclient_server packets. </summary> @@ -52558,7 +52642,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppetclient_server_packets" lineno="67988"> +<interface name="corenet_receive_puppetclient_server_packets" lineno="68006"> <summary> Receive puppetclient_server packets. </summary> @@ -52569,7 +52653,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68007"> +<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68025"> <summary> Do not audit attempts to receive puppetclient_server packets. </summary> @@ -52580,7 +52664,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68026"> +<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68044"> <summary> Send and receive puppetclient_server packets. </summary> @@ -52591,7 +52675,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68042"> +<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68060"> <summary> Do not audit attempts to send and receive puppetclient_server packets. </summary> @@ -52602,7 +52686,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68057"> +<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68075"> <summary> Relabel packets to puppetclient_server the packet type. </summary> @@ -52612,7 +52696,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68079"> +<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68097"> <summary> Send and receive TCP traffic on the pxe port. </summary> @@ -52623,7 +52707,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pxe_port" lineno="68094"> +<interface name="corenet_udp_send_pxe_port" lineno="68112"> <summary> Send UDP traffic on the pxe port. </summary> @@ -52634,7 +52718,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68109"> +<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68127"> <summary> Do not audit attempts to send UDP traffic on the pxe port. </summary> @@ -52645,7 +52729,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pxe_port" lineno="68124"> +<interface name="corenet_udp_receive_pxe_port" lineno="68142"> <summary> Receive UDP traffic on the pxe port. </summary> @@ -52656,7 +52740,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68139"> +<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68157"> <summary> Do not audit attempts to receive UDP traffic on the pxe port. </summary> @@ -52667,7 +52751,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pxe_port" lineno="68154"> +<interface name="corenet_udp_sendrecv_pxe_port" lineno="68172"> <summary> Send and receive UDP traffic on the pxe port. </summary> @@ -52678,7 +52762,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68170"> +<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68188"> <summary> Do not audit attempts to send and receive UDP traffic on the pxe port. @@ -52690,7 +52774,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pxe_port" lineno="68185"> +<interface name="corenet_tcp_bind_pxe_port" lineno="68203"> <summary> Bind TCP sockets to the pxe port. </summary> @@ -52701,7 +52785,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pxe_port" lineno="68205"> +<interface name="corenet_udp_bind_pxe_port" lineno="68223"> <summary> Bind UDP sockets to the pxe port. </summary> @@ -52712,7 +52796,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pxe_port" lineno="68224"> +<interface name="corenet_tcp_connect_pxe_port" lineno="68242"> <summary> Make a TCP connection to the pxe port. </summary> @@ -52722,7 +52806,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pxe_client_packets" lineno="68244"> +<interface name="corenet_send_pxe_client_packets" lineno="68262"> <summary> Send pxe_client packets. </summary> @@ -52733,7 +52817,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68263"> +<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68281"> <summary> Do not audit attempts to send pxe_client packets. </summary> @@ -52744,7 +52828,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pxe_client_packets" lineno="68282"> +<interface name="corenet_receive_pxe_client_packets" lineno="68300"> <summary> Receive pxe_client packets. </summary> @@ -52755,7 +52839,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68301"> +<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68319"> <summary> Do not audit attempts to receive pxe_client packets. </summary> @@ -52766,7 +52850,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pxe_client_packets" lineno="68320"> +<interface name="corenet_sendrecv_pxe_client_packets" lineno="68338"> <summary> Send and receive pxe_client packets. </summary> @@ -52777,7 +52861,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68336"> +<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68354"> <summary> Do not audit attempts to send and receive pxe_client packets. </summary> @@ -52788,7 +52872,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pxe_client_packets" lineno="68351"> +<interface name="corenet_relabelto_pxe_client_packets" lineno="68369"> <summary> Relabel packets to pxe_client the packet type. </summary> @@ -52798,7 +52882,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pxe_server_packets" lineno="68371"> +<interface name="corenet_send_pxe_server_packets" lineno="68389"> <summary> Send pxe_server packets. </summary> @@ -52809,7 +52893,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68390"> +<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68408"> <summary> Do not audit attempts to send pxe_server packets. </summary> @@ -52820,7 +52904,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pxe_server_packets" lineno="68409"> +<interface name="corenet_receive_pxe_server_packets" lineno="68427"> <summary> Receive pxe_server packets. </summary> @@ -52831,7 +52915,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68428"> +<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68446"> <summary> Do not audit attempts to receive pxe_server packets. </summary> @@ -52842,7 +52926,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pxe_server_packets" lineno="68447"> +<interface name="corenet_sendrecv_pxe_server_packets" lineno="68465"> <summary> Send and receive pxe_server packets. </summary> @@ -52853,7 +52937,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68463"> +<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68481"> <summary> Do not audit attempts to send and receive pxe_server packets. </summary> @@ -52864,7 +52948,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pxe_server_packets" lineno="68478"> +<interface name="corenet_relabelto_pxe_server_packets" lineno="68496"> <summary> Relabel packets to pxe_server the packet type. </summary> @@ -52874,7 +52958,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68500"> +<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68518"> <summary> Send and receive TCP traffic on the pyzor port. </summary> @@ -52885,7 +52969,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_pyzor_port" lineno="68515"> +<interface name="corenet_udp_send_pyzor_port" lineno="68533"> <summary> Send UDP traffic on the pyzor port. </summary> @@ -52896,7 +52980,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68530"> +<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68548"> <summary> Do not audit attempts to send UDP traffic on the pyzor port. </summary> @@ -52907,7 +52991,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_pyzor_port" lineno="68545"> +<interface name="corenet_udp_receive_pyzor_port" lineno="68563"> <summary> Receive UDP traffic on the pyzor port. </summary> @@ -52918,7 +53002,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68560"> +<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68578"> <summary> Do not audit attempts to receive UDP traffic on the pyzor port. </summary> @@ -52929,7 +53013,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68575"> +<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68593"> <summary> Send and receive UDP traffic on the pyzor port. </summary> @@ -52940,7 +53024,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68591"> +<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68609"> <summary> Do not audit attempts to send and receive UDP traffic on the pyzor port. @@ -52952,7 +53036,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_pyzor_port" lineno="68606"> +<interface name="corenet_tcp_bind_pyzor_port" lineno="68624"> <summary> Bind TCP sockets to the pyzor port. </summary> @@ -52963,7 +53047,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pyzor_port" lineno="68626"> +<interface name="corenet_udp_bind_pyzor_port" lineno="68644"> <summary> Bind UDP sockets to the pyzor port. </summary> @@ -52974,7 +53058,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pyzor_port" lineno="68645"> +<interface name="corenet_tcp_connect_pyzor_port" lineno="68663"> <summary> Make a TCP connection to the pyzor port. </summary> @@ -52984,7 +53068,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pyzor_client_packets" lineno="68665"> +<interface name="corenet_send_pyzor_client_packets" lineno="68683"> <summary> Send pyzor_client packets. </summary> @@ -52995,7 +53079,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68684"> +<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68702"> <summary> Do not audit attempts to send pyzor_client packets. </summary> @@ -53006,7 +53090,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pyzor_client_packets" lineno="68703"> +<interface name="corenet_receive_pyzor_client_packets" lineno="68721"> <summary> Receive pyzor_client packets. </summary> @@ -53017,7 +53101,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68722"> +<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68740"> <summary> Do not audit attempts to receive pyzor_client packets. </summary> @@ -53028,7 +53112,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68741"> +<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68759"> <summary> Send and receive pyzor_client packets. </summary> @@ -53039,7 +53123,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68757"> +<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68775"> <summary> Do not audit attempts to send and receive pyzor_client packets. </summary> @@ -53050,7 +53134,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pyzor_client_packets" lineno="68772"> +<interface name="corenet_relabelto_pyzor_client_packets" lineno="68790"> <summary> Relabel packets to pyzor_client the packet type. </summary> @@ -53060,7 +53144,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pyzor_server_packets" lineno="68792"> +<interface name="corenet_send_pyzor_server_packets" lineno="68810"> <summary> Send pyzor_server packets. </summary> @@ -53071,7 +53155,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68811"> +<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68829"> <summary> Do not audit attempts to send pyzor_server packets. </summary> @@ -53082,7 +53166,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pyzor_server_packets" lineno="68830"> +<interface name="corenet_receive_pyzor_server_packets" lineno="68848"> <summary> Receive pyzor_server packets. </summary> @@ -53093,7 +53177,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68849"> +<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68867"> <summary> Do not audit attempts to receive pyzor_server packets. </summary> @@ -53104,7 +53188,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68868"> +<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68886"> <summary> Send and receive pyzor_server packets. </summary> @@ -53115,7 +53199,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68884"> +<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68902"> <summary> Do not audit attempts to send and receive pyzor_server packets. </summary> @@ -53126,7 +53210,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pyzor_server_packets" lineno="68899"> +<interface name="corenet_relabelto_pyzor_server_packets" lineno="68917"> <summary> Relabel packets to pyzor_server the packet type. </summary> @@ -53136,7 +53220,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68921"> +<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68939"> <summary> Send and receive TCP traffic on the radacct port. </summary> @@ -53147,7 +53231,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_radacct_port" lineno="68936"> +<interface name="corenet_udp_send_radacct_port" lineno="68954"> <summary> Send UDP traffic on the radacct port. </summary> @@ -53158,7 +53242,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68951"> +<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68969"> <summary> Do not audit attempts to send UDP traffic on the radacct port. </summary> @@ -53169,7 +53253,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_radacct_port" lineno="68966"> +<interface name="corenet_udp_receive_radacct_port" lineno="68984"> <summary> Receive UDP traffic on the radacct port. </summary> @@ -53180,7 +53264,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68981"> +<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68999"> <summary> Do not audit attempts to receive UDP traffic on the radacct port. </summary> @@ -53191,7 +53275,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_radacct_port" lineno="68996"> +<interface name="corenet_udp_sendrecv_radacct_port" lineno="69014"> <summary> Send and receive UDP traffic on the radacct port. </summary> @@ -53202,7 +53286,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69012"> +<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69030"> <summary> Do not audit attempts to send and receive UDP traffic on the radacct port. @@ -53214,7 +53298,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_radacct_port" lineno="69027"> +<interface name="corenet_tcp_bind_radacct_port" lineno="69045"> <summary> Bind TCP sockets to the radacct port. </summary> @@ -53225,7 +53309,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_radacct_port" lineno="69047"> +<interface name="corenet_udp_bind_radacct_port" lineno="69065"> <summary> Bind UDP sockets to the radacct port. </summary> @@ -53236,7 +53320,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_radacct_port" lineno="69066"> +<interface name="corenet_tcp_connect_radacct_port" lineno="69084"> <summary> Make a TCP connection to the radacct port. </summary> @@ -53246,7 +53330,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radacct_client_packets" lineno="69086"> +<interface name="corenet_send_radacct_client_packets" lineno="69104"> <summary> Send radacct_client packets. </summary> @@ -53257,7 +53341,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69105"> +<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69123"> <summary> Do not audit attempts to send radacct_client packets. </summary> @@ -53268,7 +53352,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radacct_client_packets" lineno="69124"> +<interface name="corenet_receive_radacct_client_packets" lineno="69142"> <summary> Receive radacct_client packets. </summary> @@ -53279,7 +53363,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69143"> +<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69161"> <summary> Do not audit attempts to receive radacct_client packets. </summary> @@ -53290,7 +53374,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radacct_client_packets" lineno="69162"> +<interface name="corenet_sendrecv_radacct_client_packets" lineno="69180"> <summary> Send and receive radacct_client packets. </summary> @@ -53301,7 +53385,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69178"> +<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69196"> <summary> Do not audit attempts to send and receive radacct_client packets. </summary> @@ -53312,7 +53396,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radacct_client_packets" lineno="69193"> +<interface name="corenet_relabelto_radacct_client_packets" lineno="69211"> <summary> Relabel packets to radacct_client the packet type. </summary> @@ -53322,7 +53406,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radacct_server_packets" lineno="69213"> +<interface name="corenet_send_radacct_server_packets" lineno="69231"> <summary> Send radacct_server packets. </summary> @@ -53333,7 +53417,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69232"> +<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69250"> <summary> Do not audit attempts to send radacct_server packets. </summary> @@ -53344,7 +53428,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radacct_server_packets" lineno="69251"> +<interface name="corenet_receive_radacct_server_packets" lineno="69269"> <summary> Receive radacct_server packets. </summary> @@ -53355,7 +53439,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69270"> +<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69288"> <summary> Do not audit attempts to receive radacct_server packets. </summary> @@ -53366,7 +53450,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radacct_server_packets" lineno="69289"> +<interface name="corenet_sendrecv_radacct_server_packets" lineno="69307"> <summary> Send and receive radacct_server packets. </summary> @@ -53377,7 +53461,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69305"> +<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69323"> <summary> Do not audit attempts to send and receive radacct_server packets. </summary> @@ -53388,7 +53472,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radacct_server_packets" lineno="69320"> +<interface name="corenet_relabelto_radacct_server_packets" lineno="69338"> <summary> Relabel packets to radacct_server the packet type. </summary> @@ -53398,7 +53482,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_radius_port" lineno="69342"> +<interface name="corenet_tcp_sendrecv_radius_port" lineno="69360"> <summary> Send and receive TCP traffic on the radius port. </summary> @@ -53409,7 +53493,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_radius_port" lineno="69357"> +<interface name="corenet_udp_send_radius_port" lineno="69375"> <summary> Send UDP traffic on the radius port. </summary> @@ -53420,7 +53504,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69372"> +<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69390"> <summary> Do not audit attempts to send UDP traffic on the radius port. </summary> @@ -53431,7 +53515,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_radius_port" lineno="69387"> +<interface name="corenet_udp_receive_radius_port" lineno="69405"> <summary> Receive UDP traffic on the radius port. </summary> @@ -53442,7 +53526,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69402"> +<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69420"> <summary> Do not audit attempts to receive UDP traffic on the radius port. </summary> @@ -53453,7 +53537,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_radius_port" lineno="69417"> +<interface name="corenet_udp_sendrecv_radius_port" lineno="69435"> <summary> Send and receive UDP traffic on the radius port. </summary> @@ -53464,7 +53548,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69433"> +<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69451"> <summary> Do not audit attempts to send and receive UDP traffic on the radius port. @@ -53476,7 +53560,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_radius_port" lineno="69448"> +<interface name="corenet_tcp_bind_radius_port" lineno="69466"> <summary> Bind TCP sockets to the radius port. </summary> @@ -53487,7 +53571,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_radius_port" lineno="69468"> +<interface name="corenet_udp_bind_radius_port" lineno="69486"> <summary> Bind UDP sockets to the radius port. </summary> @@ -53498,7 +53582,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_radius_port" lineno="69487"> +<interface name="corenet_tcp_connect_radius_port" lineno="69505"> <summary> Make a TCP connection to the radius port. </summary> @@ -53508,7 +53592,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radius_client_packets" lineno="69507"> +<interface name="corenet_send_radius_client_packets" lineno="69525"> <summary> Send radius_client packets. </summary> @@ -53519,7 +53603,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69526"> +<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69544"> <summary> Do not audit attempts to send radius_client packets. </summary> @@ -53530,7 +53614,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radius_client_packets" lineno="69545"> +<interface name="corenet_receive_radius_client_packets" lineno="69563"> <summary> Receive radius_client packets. </summary> @@ -53541,7 +53625,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69564"> +<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69582"> <summary> Do not audit attempts to receive radius_client packets. </summary> @@ -53552,7 +53636,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radius_client_packets" lineno="69583"> +<interface name="corenet_sendrecv_radius_client_packets" lineno="69601"> <summary> Send and receive radius_client packets. </summary> @@ -53563,7 +53647,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69599"> +<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69617"> <summary> Do not audit attempts to send and receive radius_client packets. </summary> @@ -53574,7 +53658,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radius_client_packets" lineno="69614"> +<interface name="corenet_relabelto_radius_client_packets" lineno="69632"> <summary> Relabel packets to radius_client the packet type. </summary> @@ -53584,7 +53668,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radius_server_packets" lineno="69634"> +<interface name="corenet_send_radius_server_packets" lineno="69652"> <summary> Send radius_server packets. </summary> @@ -53595,7 +53679,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69653"> +<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69671"> <summary> Do not audit attempts to send radius_server packets. </summary> @@ -53606,7 +53690,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radius_server_packets" lineno="69672"> +<interface name="corenet_receive_radius_server_packets" lineno="69690"> <summary> Receive radius_server packets. </summary> @@ -53617,7 +53701,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69691"> +<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69709"> <summary> Do not audit attempts to receive radius_server packets. </summary> @@ -53628,7 +53712,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radius_server_packets" lineno="69710"> +<interface name="corenet_sendrecv_radius_server_packets" lineno="69728"> <summary> Send and receive radius_server packets. </summary> @@ -53639,7 +53723,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69726"> +<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69744"> <summary> Do not audit attempts to send and receive radius_server packets. </summary> @@ -53650,7 +53734,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radius_server_packets" lineno="69741"> +<interface name="corenet_relabelto_radius_server_packets" lineno="69759"> <summary> Relabel packets to radius_server the packet type. </summary> @@ -53660,7 +53744,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69763"> +<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69781"> <summary> Send and receive TCP traffic on the radsec port. </summary> @@ -53671,7 +53755,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_radsec_port" lineno="69778"> +<interface name="corenet_udp_send_radsec_port" lineno="69796"> <summary> Send UDP traffic on the radsec port. </summary> @@ -53682,7 +53766,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69793"> +<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69811"> <summary> Do not audit attempts to send UDP traffic on the radsec port. </summary> @@ -53693,7 +53777,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_radsec_port" lineno="69808"> +<interface name="corenet_udp_receive_radsec_port" lineno="69826"> <summary> Receive UDP traffic on the radsec port. </summary> @@ -53704,7 +53788,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69823"> +<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69841"> <summary> Do not audit attempts to receive UDP traffic on the radsec port. </summary> @@ -53715,7 +53799,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_radsec_port" lineno="69838"> +<interface name="corenet_udp_sendrecv_radsec_port" lineno="69856"> <summary> Send and receive UDP traffic on the radsec port. </summary> @@ -53726,7 +53810,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69854"> +<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69872"> <summary> Do not audit attempts to send and receive UDP traffic on the radsec port. @@ -53738,7 +53822,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_radsec_port" lineno="69869"> +<interface name="corenet_tcp_bind_radsec_port" lineno="69887"> <summary> Bind TCP sockets to the radsec port. </summary> @@ -53749,7 +53833,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_radsec_port" lineno="69889"> +<interface name="corenet_udp_bind_radsec_port" lineno="69907"> <summary> Bind UDP sockets to the radsec port. </summary> @@ -53760,7 +53844,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_radsec_port" lineno="69908"> +<interface name="corenet_tcp_connect_radsec_port" lineno="69926"> <summary> Make a TCP connection to the radsec port. </summary> @@ -53770,7 +53854,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radsec_client_packets" lineno="69928"> +<interface name="corenet_send_radsec_client_packets" lineno="69946"> <summary> Send radsec_client packets. </summary> @@ -53781,7 +53865,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69947"> +<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69965"> <summary> Do not audit attempts to send radsec_client packets. </summary> @@ -53792,7 +53876,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radsec_client_packets" lineno="69966"> +<interface name="corenet_receive_radsec_client_packets" lineno="69984"> <summary> Receive radsec_client packets. </summary> @@ -53803,7 +53887,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69985"> +<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="70003"> <summary> Do not audit attempts to receive radsec_client packets. </summary> @@ -53814,7 +53898,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radsec_client_packets" lineno="70004"> +<interface name="corenet_sendrecv_radsec_client_packets" lineno="70022"> <summary> Send and receive radsec_client packets. </summary> @@ -53825,7 +53909,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70020"> +<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70038"> <summary> Do not audit attempts to send and receive radsec_client packets. </summary> @@ -53836,7 +53920,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radsec_client_packets" lineno="70035"> +<interface name="corenet_relabelto_radsec_client_packets" lineno="70053"> <summary> Relabel packets to radsec_client the packet type. </summary> @@ -53846,7 +53930,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radsec_server_packets" lineno="70055"> +<interface name="corenet_send_radsec_server_packets" lineno="70073"> <summary> Send radsec_server packets. </summary> @@ -53857,7 +53941,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70074"> +<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70092"> <summary> Do not audit attempts to send radsec_server packets. </summary> @@ -53868,7 +53952,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radsec_server_packets" lineno="70093"> +<interface name="corenet_receive_radsec_server_packets" lineno="70111"> <summary> Receive radsec_server packets. </summary> @@ -53879,7 +53963,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70112"> +<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70130"> <summary> Do not audit attempts to receive radsec_server packets. </summary> @@ -53890,7 +53974,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radsec_server_packets" lineno="70131"> +<interface name="corenet_sendrecv_radsec_server_packets" lineno="70149"> <summary> Send and receive radsec_server packets. </summary> @@ -53901,7 +53985,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70147"> +<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70165"> <summary> Do not audit attempts to send and receive radsec_server packets. </summary> @@ -53912,7 +53996,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radsec_server_packets" lineno="70162"> +<interface name="corenet_relabelto_radsec_server_packets" lineno="70180"> <summary> Relabel packets to radsec_server the packet type. </summary> @@ -53922,7 +54006,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_razor_port" lineno="70184"> +<interface name="corenet_tcp_sendrecv_razor_port" lineno="70202"> <summary> Send and receive TCP traffic on the razor port. </summary> @@ -53933,7 +54017,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_razor_port" lineno="70199"> +<interface name="corenet_udp_send_razor_port" lineno="70217"> <summary> Send UDP traffic on the razor port. </summary> @@ -53944,7 +54028,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70214"> +<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70232"> <summary> Do not audit attempts to send UDP traffic on the razor port. </summary> @@ -53955,7 +54039,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_razor_port" lineno="70229"> +<interface name="corenet_udp_receive_razor_port" lineno="70247"> <summary> Receive UDP traffic on the razor port. </summary> @@ -53966,7 +54050,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70244"> +<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70262"> <summary> Do not audit attempts to receive UDP traffic on the razor port. </summary> @@ -53977,7 +54061,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_razor_port" lineno="70259"> +<interface name="corenet_udp_sendrecv_razor_port" lineno="70277"> <summary> Send and receive UDP traffic on the razor port. </summary> @@ -53988,7 +54072,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70275"> +<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70293"> <summary> Do not audit attempts to send and receive UDP traffic on the razor port. @@ -54000,7 +54084,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_razor_port" lineno="70290"> +<interface name="corenet_tcp_bind_razor_port" lineno="70308"> <summary> Bind TCP sockets to the razor port. </summary> @@ -54011,7 +54095,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_razor_port" lineno="70310"> +<interface name="corenet_udp_bind_razor_port" lineno="70328"> <summary> Bind UDP sockets to the razor port. </summary> @@ -54022,7 +54106,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_razor_port" lineno="70329"> +<interface name="corenet_tcp_connect_razor_port" lineno="70347"> <summary> Make a TCP connection to the razor port. </summary> @@ -54032,7 +54116,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_razor_client_packets" lineno="70349"> +<interface name="corenet_send_razor_client_packets" lineno="70367"> <summary> Send razor_client packets. </summary> @@ -54043,7 +54127,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70368"> +<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70386"> <summary> Do not audit attempts to send razor_client packets. </summary> @@ -54054,7 +54138,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_razor_client_packets" lineno="70387"> +<interface name="corenet_receive_razor_client_packets" lineno="70405"> <summary> Receive razor_client packets. </summary> @@ -54065,7 +54149,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70406"> +<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70424"> <summary> Do not audit attempts to receive razor_client packets. </summary> @@ -54076,7 +54160,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_razor_client_packets" lineno="70425"> +<interface name="corenet_sendrecv_razor_client_packets" lineno="70443"> <summary> Send and receive razor_client packets. </summary> @@ -54087,7 +54171,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70441"> +<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70459"> <summary> Do not audit attempts to send and receive razor_client packets. </summary> @@ -54098,7 +54182,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_razor_client_packets" lineno="70456"> +<interface name="corenet_relabelto_razor_client_packets" lineno="70474"> <summary> Relabel packets to razor_client the packet type. </summary> @@ -54108,7 +54192,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_razor_server_packets" lineno="70476"> +<interface name="corenet_send_razor_server_packets" lineno="70494"> <summary> Send razor_server packets. </summary> @@ -54119,7 +54203,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70495"> +<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70513"> <summary> Do not audit attempts to send razor_server packets. </summary> @@ -54130,7 +54214,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_razor_server_packets" lineno="70514"> +<interface name="corenet_receive_razor_server_packets" lineno="70532"> <summary> Receive razor_server packets. </summary> @@ -54141,7 +54225,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70533"> +<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70551"> <summary> Do not audit attempts to receive razor_server packets. </summary> @@ -54152,7 +54236,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_razor_server_packets" lineno="70552"> +<interface name="corenet_sendrecv_razor_server_packets" lineno="70570"> <summary> Send and receive razor_server packets. </summary> @@ -54163,7 +54247,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70568"> +<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70586"> <summary> Do not audit attempts to send and receive razor_server packets. </summary> @@ -54174,7 +54258,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_razor_server_packets" lineno="70583"> +<interface name="corenet_relabelto_razor_server_packets" lineno="70601"> <summary> Relabel packets to razor_server the packet type. </summary> @@ -54184,7 +54268,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_redis_port" lineno="70605"> +<interface name="corenet_tcp_sendrecv_redis_port" lineno="70623"> <summary> Send and receive TCP traffic on the redis port. </summary> @@ -54195,7 +54279,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_redis_port" lineno="70620"> +<interface name="corenet_udp_send_redis_port" lineno="70638"> <summary> Send UDP traffic on the redis port. </summary> @@ -54206,7 +54290,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70635"> +<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70653"> <summary> Do not audit attempts to send UDP traffic on the redis port. </summary> @@ -54217,7 +54301,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_redis_port" lineno="70650"> +<interface name="corenet_udp_receive_redis_port" lineno="70668"> <summary> Receive UDP traffic on the redis port. </summary> @@ -54228,7 +54312,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70665"> +<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70683"> <summary> Do not audit attempts to receive UDP traffic on the redis port. </summary> @@ -54239,7 +54323,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_redis_port" lineno="70680"> +<interface name="corenet_udp_sendrecv_redis_port" lineno="70698"> <summary> Send and receive UDP traffic on the redis port. </summary> @@ -54250,7 +54334,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70696"> +<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70714"> <summary> Do not audit attempts to send and receive UDP traffic on the redis port. @@ -54262,7 +54346,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_redis_port" lineno="70711"> +<interface name="corenet_tcp_bind_redis_port" lineno="70729"> <summary> Bind TCP sockets to the redis port. </summary> @@ -54273,7 +54357,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_redis_port" lineno="70731"> +<interface name="corenet_udp_bind_redis_port" lineno="70749"> <summary> Bind UDP sockets to the redis port. </summary> @@ -54284,7 +54368,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_redis_port" lineno="70750"> +<interface name="corenet_tcp_connect_redis_port" lineno="70768"> <summary> Make a TCP connection to the redis port. </summary> @@ -54294,7 +54378,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_redis_client_packets" lineno="70770"> +<interface name="corenet_send_redis_client_packets" lineno="70788"> <summary> Send redis_client packets. </summary> @@ -54305,7 +54389,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70789"> +<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70807"> <summary> Do not audit attempts to send redis_client packets. </summary> @@ -54316,7 +54400,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_redis_client_packets" lineno="70808"> +<interface name="corenet_receive_redis_client_packets" lineno="70826"> <summary> Receive redis_client packets. </summary> @@ -54327,7 +54411,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70827"> +<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70845"> <summary> Do not audit attempts to receive redis_client packets. </summary> @@ -54338,7 +54422,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_redis_client_packets" lineno="70846"> +<interface name="corenet_sendrecv_redis_client_packets" lineno="70864"> <summary> Send and receive redis_client packets. </summary> @@ -54349,7 +54433,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70862"> +<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70880"> <summary> Do not audit attempts to send and receive redis_client packets. </summary> @@ -54360,7 +54444,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_redis_client_packets" lineno="70877"> +<interface name="corenet_relabelto_redis_client_packets" lineno="70895"> <summary> Relabel packets to redis_client the packet type. </summary> @@ -54370,7 +54454,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_redis_server_packets" lineno="70897"> +<interface name="corenet_send_redis_server_packets" lineno="70915"> <summary> Send redis_server packets. </summary> @@ -54381,7 +54465,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70916"> +<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70934"> <summary> Do not audit attempts to send redis_server packets. </summary> @@ -54392,7 +54476,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_redis_server_packets" lineno="70935"> +<interface name="corenet_receive_redis_server_packets" lineno="70953"> <summary> Receive redis_server packets. </summary> @@ -54403,7 +54487,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70954"> +<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70972"> <summary> Do not audit attempts to receive redis_server packets. </summary> @@ -54414,7 +54498,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_redis_server_packets" lineno="70973"> +<interface name="corenet_sendrecv_redis_server_packets" lineno="70991"> <summary> Send and receive redis_server packets. </summary> @@ -54425,7 +54509,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70989"> +<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="71007"> <summary> Do not audit attempts to send and receive redis_server packets. </summary> @@ -54436,7 +54520,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_redis_server_packets" lineno="71004"> +<interface name="corenet_relabelto_redis_server_packets" lineno="71022"> <summary> Relabel packets to redis_server the packet type. </summary> @@ -54446,7 +54530,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_repository_port" lineno="71026"> +<interface name="corenet_tcp_sendrecv_repository_port" lineno="71044"> <summary> Send and receive TCP traffic on the repository port. </summary> @@ -54457,7 +54541,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_repository_port" lineno="71041"> +<interface name="corenet_udp_send_repository_port" lineno="71059"> <summary> Send UDP traffic on the repository port. </summary> @@ -54468,7 +54552,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71056"> +<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71074"> <summary> Do not audit attempts to send UDP traffic on the repository port. </summary> @@ -54479,7 +54563,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_repository_port" lineno="71071"> +<interface name="corenet_udp_receive_repository_port" lineno="71089"> <summary> Receive UDP traffic on the repository port. </summary> @@ -54490,7 +54574,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71086"> +<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71104"> <summary> Do not audit attempts to receive UDP traffic on the repository port. </summary> @@ -54501,7 +54585,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_repository_port" lineno="71101"> +<interface name="corenet_udp_sendrecv_repository_port" lineno="71119"> <summary> Send and receive UDP traffic on the repository port. </summary> @@ -54512,7 +54596,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71117"> +<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71135"> <summary> Do not audit attempts to send and receive UDP traffic on the repository port. @@ -54524,7 +54608,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_repository_port" lineno="71132"> +<interface name="corenet_tcp_bind_repository_port" lineno="71150"> <summary> Bind TCP sockets to the repository port. </summary> @@ -54535,7 +54619,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_repository_port" lineno="71152"> +<interface name="corenet_udp_bind_repository_port" lineno="71170"> <summary> Bind UDP sockets to the repository port. </summary> @@ -54546,7 +54630,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_repository_port" lineno="71171"> +<interface name="corenet_tcp_connect_repository_port" lineno="71189"> <summary> Make a TCP connection to the repository port. </summary> @@ -54556,7 +54640,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_repository_client_packets" lineno="71191"> +<interface name="corenet_send_repository_client_packets" lineno="71209"> <summary> Send repository_client packets. </summary> @@ -54567,7 +54651,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71210"> +<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71228"> <summary> Do not audit attempts to send repository_client packets. </summary> @@ -54578,7 +54662,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_repository_client_packets" lineno="71229"> +<interface name="corenet_receive_repository_client_packets" lineno="71247"> <summary> Receive repository_client packets. </summary> @@ -54589,7 +54673,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71248"> +<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71266"> <summary> Do not audit attempts to receive repository_client packets. </summary> @@ -54600,7 +54684,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_repository_client_packets" lineno="71267"> +<interface name="corenet_sendrecv_repository_client_packets" lineno="71285"> <summary> Send and receive repository_client packets. </summary> @@ -54611,7 +54695,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71283"> +<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71301"> <summary> Do not audit attempts to send and receive repository_client packets. </summary> @@ -54622,7 +54706,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_repository_client_packets" lineno="71298"> +<interface name="corenet_relabelto_repository_client_packets" lineno="71316"> <summary> Relabel packets to repository_client the packet type. </summary> @@ -54632,7 +54716,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_repository_server_packets" lineno="71318"> +<interface name="corenet_send_repository_server_packets" lineno="71336"> <summary> Send repository_server packets. </summary> @@ -54643,7 +54727,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71337"> +<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71355"> <summary> Do not audit attempts to send repository_server packets. </summary> @@ -54654,7 +54738,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_repository_server_packets" lineno="71356"> +<interface name="corenet_receive_repository_server_packets" lineno="71374"> <summary> Receive repository_server packets. </summary> @@ -54665,7 +54749,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71375"> +<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71393"> <summary> Do not audit attempts to receive repository_server packets. </summary> @@ -54676,7 +54760,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_repository_server_packets" lineno="71394"> +<interface name="corenet_sendrecv_repository_server_packets" lineno="71412"> <summary> Send and receive repository_server packets. </summary> @@ -54687,7 +54771,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71410"> +<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71428"> <summary> Do not audit attempts to send and receive repository_server packets. </summary> @@ -54698,7 +54782,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_repository_server_packets" lineno="71425"> +<interface name="corenet_relabelto_repository_server_packets" lineno="71443"> <summary> Relabel packets to repository_server the packet type. </summary> @@ -54708,7 +54792,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71447"> +<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71465"> <summary> Send and receive TCP traffic on the ricci port. </summary> @@ -54719,7 +54803,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ricci_port" lineno="71462"> +<interface name="corenet_udp_send_ricci_port" lineno="71480"> <summary> Send UDP traffic on the ricci port. </summary> @@ -54730,7 +54814,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71477"> +<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71495"> <summary> Do not audit attempts to send UDP traffic on the ricci port. </summary> @@ -54741,7 +54825,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ricci_port" lineno="71492"> +<interface name="corenet_udp_receive_ricci_port" lineno="71510"> <summary> Receive UDP traffic on the ricci port. </summary> @@ -54752,7 +54836,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71507"> +<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71525"> <summary> Do not audit attempts to receive UDP traffic on the ricci port. </summary> @@ -54763,7 +54847,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ricci_port" lineno="71522"> +<interface name="corenet_udp_sendrecv_ricci_port" lineno="71540"> <summary> Send and receive UDP traffic on the ricci port. </summary> @@ -54774,7 +54858,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71538"> +<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71556"> <summary> Do not audit attempts to send and receive UDP traffic on the ricci port. @@ -54786,7 +54870,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ricci_port" lineno="71553"> +<interface name="corenet_tcp_bind_ricci_port" lineno="71571"> <summary> Bind TCP sockets to the ricci port. </summary> @@ -54797,7 +54881,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ricci_port" lineno="71573"> +<interface name="corenet_udp_bind_ricci_port" lineno="71591"> <summary> Bind UDP sockets to the ricci port. </summary> @@ -54808,7 +54892,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ricci_port" lineno="71592"> +<interface name="corenet_tcp_connect_ricci_port" lineno="71610"> <summary> Make a TCP connection to the ricci port. </summary> @@ -54818,7 +54902,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_client_packets" lineno="71612"> +<interface name="corenet_send_ricci_client_packets" lineno="71630"> <summary> Send ricci_client packets. </summary> @@ -54829,7 +54913,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71631"> +<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71649"> <summary> Do not audit attempts to send ricci_client packets. </summary> @@ -54840,7 +54924,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_client_packets" lineno="71650"> +<interface name="corenet_receive_ricci_client_packets" lineno="71668"> <summary> Receive ricci_client packets. </summary> @@ -54851,7 +54935,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71669"> +<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71687"> <summary> Do not audit attempts to receive ricci_client packets. </summary> @@ -54862,7 +54946,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_client_packets" lineno="71688"> +<interface name="corenet_sendrecv_ricci_client_packets" lineno="71706"> <summary> Send and receive ricci_client packets. </summary> @@ -54873,7 +54957,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71704"> +<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71722"> <summary> Do not audit attempts to send and receive ricci_client packets. </summary> @@ -54884,7 +54968,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_client_packets" lineno="71719"> +<interface name="corenet_relabelto_ricci_client_packets" lineno="71737"> <summary> Relabel packets to ricci_client the packet type. </summary> @@ -54894,7 +54978,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_server_packets" lineno="71739"> +<interface name="corenet_send_ricci_server_packets" lineno="71757"> <summary> Send ricci_server packets. </summary> @@ -54905,7 +54989,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71758"> +<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71776"> <summary> Do not audit attempts to send ricci_server packets. </summary> @@ -54916,7 +55000,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_server_packets" lineno="71777"> +<interface name="corenet_receive_ricci_server_packets" lineno="71795"> <summary> Receive ricci_server packets. </summary> @@ -54927,7 +55011,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71796"> +<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71814"> <summary> Do not audit attempts to receive ricci_server packets. </summary> @@ -54938,7 +55022,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_server_packets" lineno="71815"> +<interface name="corenet_sendrecv_ricci_server_packets" lineno="71833"> <summary> Send and receive ricci_server packets. </summary> @@ -54949,7 +55033,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71831"> +<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71849"> <summary> Do not audit attempts to send and receive ricci_server packets. </summary> @@ -54960,7 +55044,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_server_packets" lineno="71846"> +<interface name="corenet_relabelto_ricci_server_packets" lineno="71864"> <summary> Relabel packets to ricci_server the packet type. </summary> @@ -54970,7 +55054,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71868"> +<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71886"> <summary> Send and receive TCP traffic on the ricci_modcluster port. </summary> @@ -54981,7 +55065,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71883"> +<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71901"> <summary> Send UDP traffic on the ricci_modcluster port. </summary> @@ -54992,7 +55076,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71898"> +<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71916"> <summary> Do not audit attempts to send UDP traffic on the ricci_modcluster port. </summary> @@ -55003,7 +55087,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71913"> +<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71931"> <summary> Receive UDP traffic on the ricci_modcluster port. </summary> @@ -55014,7 +55098,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71928"> +<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71946"> <summary> Do not audit attempts to receive UDP traffic on the ricci_modcluster port. </summary> @@ -55025,7 +55109,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71943"> +<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71961"> <summary> Send and receive UDP traffic on the ricci_modcluster port. </summary> @@ -55036,7 +55120,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71959"> +<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71977"> <summary> Do not audit attempts to send and receive UDP traffic on the ricci_modcluster port. @@ -55048,7 +55132,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71974"> +<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71992"> <summary> Bind TCP sockets to the ricci_modcluster port. </summary> @@ -55059,7 +55143,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71994"> +<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="72012"> <summary> Bind UDP sockets to the ricci_modcluster port. </summary> @@ -55070,7 +55154,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72013"> +<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72031"> <summary> Make a TCP connection to the ricci_modcluster port. </summary> @@ -55080,7 +55164,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72033"> +<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72051"> <summary> Send ricci_modcluster_client packets. </summary> @@ -55091,7 +55175,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72052"> +<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72070"> <summary> Do not audit attempts to send ricci_modcluster_client packets. </summary> @@ -55102,7 +55186,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72071"> +<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72089"> <summary> Receive ricci_modcluster_client packets. </summary> @@ -55113,7 +55197,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72090"> +<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72108"> <summary> Do not audit attempts to receive ricci_modcluster_client packets. </summary> @@ -55124,7 +55208,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72109"> +<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72127"> <summary> Send and receive ricci_modcluster_client packets. </summary> @@ -55135,7 +55219,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72125"> +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72143"> <summary> Do not audit attempts to send and receive ricci_modcluster_client packets. </summary> @@ -55146,7 +55230,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72140"> +<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72158"> <summary> Relabel packets to ricci_modcluster_client the packet type. </summary> @@ -55156,7 +55240,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72160"> +<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72178"> <summary> Send ricci_modcluster_server packets. </summary> @@ -55167,7 +55251,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72179"> +<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72197"> <summary> Do not audit attempts to send ricci_modcluster_server packets. </summary> @@ -55178,7 +55262,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72198"> +<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72216"> <summary> Receive ricci_modcluster_server packets. </summary> @@ -55189,7 +55273,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72217"> +<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72235"> <summary> Do not audit attempts to receive ricci_modcluster_server packets. </summary> @@ -55200,7 +55284,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72236"> +<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72254"> <summary> Send and receive ricci_modcluster_server packets. </summary> @@ -55211,7 +55295,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72252"> +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72270"> <summary> Do not audit attempts to send and receive ricci_modcluster_server packets. </summary> @@ -55222,7 +55306,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72267"> +<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72285"> <summary> Relabel packets to ricci_modcluster_server the packet type. </summary> @@ -55232,7 +55316,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72289"> +<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72307"> <summary> Send and receive TCP traffic on the rlogind port. </summary> @@ -55243,7 +55327,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rlogind_port" lineno="72304"> +<interface name="corenet_udp_send_rlogind_port" lineno="72322"> <summary> Send UDP traffic on the rlogind port. </summary> @@ -55254,7 +55338,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72319"> +<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72337"> <summary> Do not audit attempts to send UDP traffic on the rlogind port. </summary> @@ -55265,7 +55349,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rlogind_port" lineno="72334"> +<interface name="corenet_udp_receive_rlogind_port" lineno="72352"> <summary> Receive UDP traffic on the rlogind port. </summary> @@ -55276,7 +55360,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72349"> +<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72367"> <summary> Do not audit attempts to receive UDP traffic on the rlogind port. </summary> @@ -55287,7 +55371,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72364"> +<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72382"> <summary> Send and receive UDP traffic on the rlogind port. </summary> @@ -55298,7 +55382,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72380"> +<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72398"> <summary> Do not audit attempts to send and receive UDP traffic on the rlogind port. @@ -55310,7 +55394,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rlogind_port" lineno="72395"> +<interface name="corenet_tcp_bind_rlogind_port" lineno="72413"> <summary> Bind TCP sockets to the rlogind port. </summary> @@ -55321,7 +55405,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rlogind_port" lineno="72415"> +<interface name="corenet_udp_bind_rlogind_port" lineno="72433"> <summary> Bind UDP sockets to the rlogind port. </summary> @@ -55332,7 +55416,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rlogind_port" lineno="72434"> +<interface name="corenet_tcp_connect_rlogind_port" lineno="72452"> <summary> Make a TCP connection to the rlogind port. </summary> @@ -55342,7 +55426,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rlogind_client_packets" lineno="72454"> +<interface name="corenet_send_rlogind_client_packets" lineno="72472"> <summary> Send rlogind_client packets. </summary> @@ -55353,7 +55437,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72473"> +<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72491"> <summary> Do not audit attempts to send rlogind_client packets. </summary> @@ -55364,7 +55448,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rlogind_client_packets" lineno="72492"> +<interface name="corenet_receive_rlogind_client_packets" lineno="72510"> <summary> Receive rlogind_client packets. </summary> @@ -55375,7 +55459,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72511"> +<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72529"> <summary> Do not audit attempts to receive rlogind_client packets. </summary> @@ -55386,7 +55470,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72530"> +<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72548"> <summary> Send and receive rlogind_client packets. </summary> @@ -55397,7 +55481,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72546"> +<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72564"> <summary> Do not audit attempts to send and receive rlogind_client packets. </summary> @@ -55408,7 +55492,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rlogind_client_packets" lineno="72561"> +<interface name="corenet_relabelto_rlogind_client_packets" lineno="72579"> <summary> Relabel packets to rlogind_client the packet type. </summary> @@ -55418,7 +55502,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rlogind_server_packets" lineno="72581"> +<interface name="corenet_send_rlogind_server_packets" lineno="72599"> <summary> Send rlogind_server packets. </summary> @@ -55429,7 +55513,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72600"> +<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72618"> <summary> Do not audit attempts to send rlogind_server packets. </summary> @@ -55440,7 +55524,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rlogind_server_packets" lineno="72619"> +<interface name="corenet_receive_rlogind_server_packets" lineno="72637"> <summary> Receive rlogind_server packets. </summary> @@ -55451,7 +55535,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72638"> +<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72656"> <summary> Do not audit attempts to receive rlogind_server packets. </summary> @@ -55462,7 +55546,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72657"> +<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72675"> <summary> Send and receive rlogind_server packets. </summary> @@ -55473,7 +55557,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72673"> +<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72691"> <summary> Do not audit attempts to send and receive rlogind_server packets. </summary> @@ -55484,7 +55568,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rlogind_server_packets" lineno="72688"> +<interface name="corenet_relabelto_rlogind_server_packets" lineno="72706"> <summary> Relabel packets to rlogind_server the packet type. </summary> @@ -55494,7 +55578,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72710"> +<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72728"> <summary> Send and receive TCP traffic on the rndc port. </summary> @@ -55505,7 +55589,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rndc_port" lineno="72725"> +<interface name="corenet_udp_send_rndc_port" lineno="72743"> <summary> Send UDP traffic on the rndc port. </summary> @@ -55516,7 +55600,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72740"> +<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72758"> <summary> Do not audit attempts to send UDP traffic on the rndc port. </summary> @@ -55527,7 +55611,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rndc_port" lineno="72755"> +<interface name="corenet_udp_receive_rndc_port" lineno="72773"> <summary> Receive UDP traffic on the rndc port. </summary> @@ -55538,7 +55622,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72770"> +<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72788"> <summary> Do not audit attempts to receive UDP traffic on the rndc port. </summary> @@ -55549,7 +55633,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rndc_port" lineno="72785"> +<interface name="corenet_udp_sendrecv_rndc_port" lineno="72803"> <summary> Send and receive UDP traffic on the rndc port. </summary> @@ -55560,7 +55644,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72801"> +<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72819"> <summary> Do not audit attempts to send and receive UDP traffic on the rndc port. @@ -55572,7 +55656,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rndc_port" lineno="72816"> +<interface name="corenet_tcp_bind_rndc_port" lineno="72834"> <summary> Bind TCP sockets to the rndc port. </summary> @@ -55583,7 +55667,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rndc_port" lineno="72836"> +<interface name="corenet_udp_bind_rndc_port" lineno="72854"> <summary> Bind UDP sockets to the rndc port. </summary> @@ -55594,7 +55678,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rndc_port" lineno="72855"> +<interface name="corenet_tcp_connect_rndc_port" lineno="72873"> <summary> Make a TCP connection to the rndc port. </summary> @@ -55604,7 +55688,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rndc_client_packets" lineno="72875"> +<interface name="corenet_send_rndc_client_packets" lineno="72893"> <summary> Send rndc_client packets. </summary> @@ -55615,7 +55699,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72894"> +<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72912"> <summary> Do not audit attempts to send rndc_client packets. </summary> @@ -55626,7 +55710,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rndc_client_packets" lineno="72913"> +<interface name="corenet_receive_rndc_client_packets" lineno="72931"> <summary> Receive rndc_client packets. </summary> @@ -55637,7 +55721,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72932"> +<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72950"> <summary> Do not audit attempts to receive rndc_client packets. </summary> @@ -55648,7 +55732,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rndc_client_packets" lineno="72951"> +<interface name="corenet_sendrecv_rndc_client_packets" lineno="72969"> <summary> Send and receive rndc_client packets. </summary> @@ -55659,7 +55743,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72967"> +<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72985"> <summary> Do not audit attempts to send and receive rndc_client packets. </summary> @@ -55670,7 +55754,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rndc_client_packets" lineno="72982"> +<interface name="corenet_relabelto_rndc_client_packets" lineno="73000"> <summary> Relabel packets to rndc_client the packet type. </summary> @@ -55680,7 +55764,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rndc_server_packets" lineno="73002"> +<interface name="corenet_send_rndc_server_packets" lineno="73020"> <summary> Send rndc_server packets. </summary> @@ -55691,7 +55775,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73021"> +<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73039"> <summary> Do not audit attempts to send rndc_server packets. </summary> @@ -55702,7 +55786,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rndc_server_packets" lineno="73040"> +<interface name="corenet_receive_rndc_server_packets" lineno="73058"> <summary> Receive rndc_server packets. </summary> @@ -55713,7 +55797,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73059"> +<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73077"> <summary> Do not audit attempts to receive rndc_server packets. </summary> @@ -55724,7 +55808,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rndc_server_packets" lineno="73078"> +<interface name="corenet_sendrecv_rndc_server_packets" lineno="73096"> <summary> Send and receive rndc_server packets. </summary> @@ -55735,7 +55819,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73094"> +<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73112"> <summary> Do not audit attempts to send and receive rndc_server packets. </summary> @@ -55746,7 +55830,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rndc_server_packets" lineno="73109"> +<interface name="corenet_relabelto_rndc_server_packets" lineno="73127"> <summary> Relabel packets to rndc_server the packet type. </summary> @@ -55756,7 +55840,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_router_port" lineno="73131"> +<interface name="corenet_tcp_sendrecv_router_port" lineno="73149"> <summary> Send and receive TCP traffic on the router port. </summary> @@ -55767,7 +55851,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_router_port" lineno="73146"> +<interface name="corenet_udp_send_router_port" lineno="73164"> <summary> Send UDP traffic on the router port. </summary> @@ -55778,7 +55862,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_router_port" lineno="73161"> +<interface name="corenet_dontaudit_udp_send_router_port" lineno="73179"> <summary> Do not audit attempts to send UDP traffic on the router port. </summary> @@ -55789,7 +55873,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_router_port" lineno="73176"> +<interface name="corenet_udp_receive_router_port" lineno="73194"> <summary> Receive UDP traffic on the router port. </summary> @@ -55800,7 +55884,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73191"> +<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73209"> <summary> Do not audit attempts to receive UDP traffic on the router port. </summary> @@ -55811,7 +55895,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_router_port" lineno="73206"> +<interface name="corenet_udp_sendrecv_router_port" lineno="73224"> <summary> Send and receive UDP traffic on the router port. </summary> @@ -55822,7 +55906,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73222"> +<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73240"> <summary> Do not audit attempts to send and receive UDP traffic on the router port. @@ -55834,7 +55918,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_router_port" lineno="73237"> +<interface name="corenet_tcp_bind_router_port" lineno="73255"> <summary> Bind TCP sockets to the router port. </summary> @@ -55845,7 +55929,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_router_port" lineno="73257"> +<interface name="corenet_udp_bind_router_port" lineno="73275"> <summary> Bind UDP sockets to the router port. </summary> @@ -55856,7 +55940,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_router_port" lineno="73276"> +<interface name="corenet_tcp_connect_router_port" lineno="73294"> <summary> Make a TCP connection to the router port. </summary> @@ -55866,7 +55950,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_router_client_packets" lineno="73296"> +<interface name="corenet_send_router_client_packets" lineno="73314"> <summary> Send router_client packets. </summary> @@ -55877,7 +55961,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_router_client_packets" lineno="73315"> +<interface name="corenet_dontaudit_send_router_client_packets" lineno="73333"> <summary> Do not audit attempts to send router_client packets. </summary> @@ -55888,7 +55972,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_router_client_packets" lineno="73334"> +<interface name="corenet_receive_router_client_packets" lineno="73352"> <summary> Receive router_client packets. </summary> @@ -55899,7 +55983,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73353"> +<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73371"> <summary> Do not audit attempts to receive router_client packets. </summary> @@ -55910,7 +55994,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_router_client_packets" lineno="73372"> +<interface name="corenet_sendrecv_router_client_packets" lineno="73390"> <summary> Send and receive router_client packets. </summary> @@ -55921,7 +56005,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73388"> +<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73406"> <summary> Do not audit attempts to send and receive router_client packets. </summary> @@ -55932,7 +56016,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_router_client_packets" lineno="73403"> +<interface name="corenet_relabelto_router_client_packets" lineno="73421"> <summary> Relabel packets to router_client the packet type. </summary> @@ -55942,7 +56026,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_router_server_packets" lineno="73423"> +<interface name="corenet_send_router_server_packets" lineno="73441"> <summary> Send router_server packets. </summary> @@ -55953,7 +56037,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_router_server_packets" lineno="73442"> +<interface name="corenet_dontaudit_send_router_server_packets" lineno="73460"> <summary> Do not audit attempts to send router_server packets. </summary> @@ -55964,7 +56048,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_router_server_packets" lineno="73461"> +<interface name="corenet_receive_router_server_packets" lineno="73479"> <summary> Receive router_server packets. </summary> @@ -55975,7 +56059,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73480"> +<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73498"> <summary> Do not audit attempts to receive router_server packets. </summary> @@ -55986,7 +56070,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_router_server_packets" lineno="73499"> +<interface name="corenet_sendrecv_router_server_packets" lineno="73517"> <summary> Send and receive router_server packets. </summary> @@ -55997,7 +56081,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73515"> +<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73533"> <summary> Do not audit attempts to send and receive router_server packets. </summary> @@ -56008,7 +56092,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_router_server_packets" lineno="73530"> +<interface name="corenet_relabelto_router_server_packets" lineno="73548"> <summary> Relabel packets to router_server the packet type. </summary> @@ -56018,7 +56102,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73552"> +<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73570"> <summary> Send and receive TCP traffic on the rsh port. </summary> @@ -56029,7 +56113,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rsh_port" lineno="73567"> +<interface name="corenet_udp_send_rsh_port" lineno="73585"> <summary> Send UDP traffic on the rsh port. </summary> @@ -56040,7 +56124,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73582"> +<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73600"> <summary> Do not audit attempts to send UDP traffic on the rsh port. </summary> @@ -56051,7 +56135,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rsh_port" lineno="73597"> +<interface name="corenet_udp_receive_rsh_port" lineno="73615"> <summary> Receive UDP traffic on the rsh port. </summary> @@ -56062,7 +56146,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73612"> +<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73630"> <summary> Do not audit attempts to receive UDP traffic on the rsh port. </summary> @@ -56073,7 +56157,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rsh_port" lineno="73627"> +<interface name="corenet_udp_sendrecv_rsh_port" lineno="73645"> <summary> Send and receive UDP traffic on the rsh port. </summary> @@ -56084,7 +56168,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73643"> +<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73661"> <summary> Do not audit attempts to send and receive UDP traffic on the rsh port. @@ -56096,7 +56180,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rsh_port" lineno="73658"> +<interface name="corenet_tcp_bind_rsh_port" lineno="73676"> <summary> Bind TCP sockets to the rsh port. </summary> @@ -56107,7 +56191,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rsh_port" lineno="73678"> +<interface name="corenet_udp_bind_rsh_port" lineno="73696"> <summary> Bind UDP sockets to the rsh port. </summary> @@ -56118,7 +56202,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rsh_port" lineno="73697"> +<interface name="corenet_tcp_connect_rsh_port" lineno="73715"> <summary> Make a TCP connection to the rsh port. </summary> @@ -56128,7 +56212,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsh_client_packets" lineno="73717"> +<interface name="corenet_send_rsh_client_packets" lineno="73735"> <summary> Send rsh_client packets. </summary> @@ -56139,7 +56223,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73736"> +<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73754"> <summary> Do not audit attempts to send rsh_client packets. </summary> @@ -56150,7 +56234,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsh_client_packets" lineno="73755"> +<interface name="corenet_receive_rsh_client_packets" lineno="73773"> <summary> Receive rsh_client packets. </summary> @@ -56161,7 +56245,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73774"> +<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73792"> <summary> Do not audit attempts to receive rsh_client packets. </summary> @@ -56172,7 +56256,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsh_client_packets" lineno="73793"> +<interface name="corenet_sendrecv_rsh_client_packets" lineno="73811"> <summary> Send and receive rsh_client packets. </summary> @@ -56183,7 +56267,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73809"> +<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73827"> <summary> Do not audit attempts to send and receive rsh_client packets. </summary> @@ -56194,7 +56278,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsh_client_packets" lineno="73824"> +<interface name="corenet_relabelto_rsh_client_packets" lineno="73842"> <summary> Relabel packets to rsh_client the packet type. </summary> @@ -56204,7 +56288,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsh_server_packets" lineno="73844"> +<interface name="corenet_send_rsh_server_packets" lineno="73862"> <summary> Send rsh_server packets. </summary> @@ -56215,7 +56299,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73863"> +<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73881"> <summary> Do not audit attempts to send rsh_server packets. </summary> @@ -56226,7 +56310,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsh_server_packets" lineno="73882"> +<interface name="corenet_receive_rsh_server_packets" lineno="73900"> <summary> Receive rsh_server packets. </summary> @@ -56237,7 +56321,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73901"> +<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73919"> <summary> Do not audit attempts to receive rsh_server packets. </summary> @@ -56248,7 +56332,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsh_server_packets" lineno="73920"> +<interface name="corenet_sendrecv_rsh_server_packets" lineno="73938"> <summary> Send and receive rsh_server packets. </summary> @@ -56259,7 +56343,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73936"> +<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73954"> <summary> Do not audit attempts to send and receive rsh_server packets. </summary> @@ -56270,7 +56354,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsh_server_packets" lineno="73951"> +<interface name="corenet_relabelto_rsh_server_packets" lineno="73969"> <summary> Relabel packets to rsh_server the packet type. </summary> @@ -56280,7 +56364,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73973"> +<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73991"> <summary> Send and receive TCP traffic on the rsync port. </summary> @@ -56291,7 +56375,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rsync_port" lineno="73988"> +<interface name="corenet_udp_send_rsync_port" lineno="74006"> <summary> Send UDP traffic on the rsync port. </summary> @@ -56302,7 +56386,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74003"> +<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74021"> <summary> Do not audit attempts to send UDP traffic on the rsync port. </summary> @@ -56313,7 +56397,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rsync_port" lineno="74018"> +<interface name="corenet_udp_receive_rsync_port" lineno="74036"> <summary> Receive UDP traffic on the rsync port. </summary> @@ -56324,7 +56408,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74033"> +<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74051"> <summary> Do not audit attempts to receive UDP traffic on the rsync port. </summary> @@ -56335,7 +56419,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rsync_port" lineno="74048"> +<interface name="corenet_udp_sendrecv_rsync_port" lineno="74066"> <summary> Send and receive UDP traffic on the rsync port. </summary> @@ -56346,7 +56430,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74064"> +<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74082"> <summary> Do not audit attempts to send and receive UDP traffic on the rsync port. @@ -56358,7 +56442,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rsync_port" lineno="74079"> +<interface name="corenet_tcp_bind_rsync_port" lineno="74097"> <summary> Bind TCP sockets to the rsync port. </summary> @@ -56369,7 +56453,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rsync_port" lineno="74099"> +<interface name="corenet_udp_bind_rsync_port" lineno="74117"> <summary> Bind UDP sockets to the rsync port. </summary> @@ -56380,7 +56464,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rsync_port" lineno="74118"> +<interface name="corenet_tcp_connect_rsync_port" lineno="74136"> <summary> Make a TCP connection to the rsync port. </summary> @@ -56390,7 +56474,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsync_client_packets" lineno="74138"> +<interface name="corenet_send_rsync_client_packets" lineno="74156"> <summary> Send rsync_client packets. </summary> @@ -56401,7 +56485,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74157"> +<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74175"> <summary> Do not audit attempts to send rsync_client packets. </summary> @@ -56412,7 +56496,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsync_client_packets" lineno="74176"> +<interface name="corenet_receive_rsync_client_packets" lineno="74194"> <summary> Receive rsync_client packets. </summary> @@ -56423,7 +56507,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74195"> +<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74213"> <summary> Do not audit attempts to receive rsync_client packets. </summary> @@ -56434,7 +56518,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsync_client_packets" lineno="74214"> +<interface name="corenet_sendrecv_rsync_client_packets" lineno="74232"> <summary> Send and receive rsync_client packets. </summary> @@ -56445,7 +56529,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74230"> +<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74248"> <summary> Do not audit attempts to send and receive rsync_client packets. </summary> @@ -56456,7 +56540,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsync_client_packets" lineno="74245"> +<interface name="corenet_relabelto_rsync_client_packets" lineno="74263"> <summary> Relabel packets to rsync_client the packet type. </summary> @@ -56466,7 +56550,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsync_server_packets" lineno="74265"> +<interface name="corenet_send_rsync_server_packets" lineno="74283"> <summary> Send rsync_server packets. </summary> @@ -56477,7 +56561,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74284"> +<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74302"> <summary> Do not audit attempts to send rsync_server packets. </summary> @@ -56488,7 +56572,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsync_server_packets" lineno="74303"> +<interface name="corenet_receive_rsync_server_packets" lineno="74321"> <summary> Receive rsync_server packets. </summary> @@ -56499,7 +56583,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74322"> +<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74340"> <summary> Do not audit attempts to receive rsync_server packets. </summary> @@ -56510,7 +56594,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsync_server_packets" lineno="74341"> +<interface name="corenet_sendrecv_rsync_server_packets" lineno="74359"> <summary> Send and receive rsync_server packets. </summary> @@ -56521,7 +56605,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74357"> +<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74375"> <summary> Do not audit attempts to send and receive rsync_server packets. </summary> @@ -56532,7 +56616,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsync_server_packets" lineno="74372"> +<interface name="corenet_relabelto_rsync_server_packets" lineno="74390"> <summary> Relabel packets to rsync_server the packet type. </summary> @@ -56542,7 +56626,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74394"> +<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74412"> <summary> Send and receive TCP traffic on the rtorrent port. </summary> @@ -56553,7 +56637,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rtorrent_port" lineno="74409"> +<interface name="corenet_udp_send_rtorrent_port" lineno="74427"> <summary> Send UDP traffic on the rtorrent port. </summary> @@ -56564,7 +56648,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74424"> +<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74442"> <summary> Do not audit attempts to send UDP traffic on the rtorrent port. </summary> @@ -56575,7 +56659,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rtorrent_port" lineno="74439"> +<interface name="corenet_udp_receive_rtorrent_port" lineno="74457"> <summary> Receive UDP traffic on the rtorrent port. </summary> @@ -56586,7 +56670,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74454"> +<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74472"> <summary> Do not audit attempts to receive UDP traffic on the rtorrent port. </summary> @@ -56597,7 +56681,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74469"> +<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74487"> <summary> Send and receive UDP traffic on the rtorrent port. </summary> @@ -56608,7 +56692,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74485"> +<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74503"> <summary> Do not audit attempts to send and receive UDP traffic on the rtorrent port. @@ -56620,7 +56704,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rtorrent_port" lineno="74500"> +<interface name="corenet_tcp_bind_rtorrent_port" lineno="74518"> <summary> Bind TCP sockets to the rtorrent port. </summary> @@ -56631,7 +56715,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rtorrent_port" lineno="74520"> +<interface name="corenet_udp_bind_rtorrent_port" lineno="74538"> <summary> Bind UDP sockets to the rtorrent port. </summary> @@ -56642,7 +56726,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rtorrent_port" lineno="74539"> +<interface name="corenet_tcp_connect_rtorrent_port" lineno="74557"> <summary> Make a TCP connection to the rtorrent port. </summary> @@ -56652,7 +56736,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtorrent_client_packets" lineno="74559"> +<interface name="corenet_send_rtorrent_client_packets" lineno="74577"> <summary> Send rtorrent_client packets. </summary> @@ -56663,7 +56747,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74578"> +<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74596"> <summary> Do not audit attempts to send rtorrent_client packets. </summary> @@ -56674,7 +56758,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtorrent_client_packets" lineno="74597"> +<interface name="corenet_receive_rtorrent_client_packets" lineno="74615"> <summary> Receive rtorrent_client packets. </summary> @@ -56685,7 +56769,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74616"> +<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74634"> <summary> Do not audit attempts to receive rtorrent_client packets. </summary> @@ -56696,7 +56780,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74635"> +<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74653"> <summary> Send and receive rtorrent_client packets. </summary> @@ -56707,7 +56791,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74651"> +<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74669"> <summary> Do not audit attempts to send and receive rtorrent_client packets. </summary> @@ -56718,7 +56802,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74666"> +<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74684"> <summary> Relabel packets to rtorrent_client the packet type. </summary> @@ -56728,7 +56812,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtorrent_server_packets" lineno="74686"> +<interface name="corenet_send_rtorrent_server_packets" lineno="74704"> <summary> Send rtorrent_server packets. </summary> @@ -56739,7 +56823,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74705"> +<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74723"> <summary> Do not audit attempts to send rtorrent_server packets. </summary> @@ -56750,7 +56834,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtorrent_server_packets" lineno="74724"> +<interface name="corenet_receive_rtorrent_server_packets" lineno="74742"> <summary> Receive rtorrent_server packets. </summary> @@ -56761,7 +56845,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74743"> +<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74761"> <summary> Do not audit attempts to receive rtorrent_server packets. </summary> @@ -56772,7 +56856,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74762"> +<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74780"> <summary> Send and receive rtorrent_server packets. </summary> @@ -56783,7 +56867,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74778"> +<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74796"> <summary> Do not audit attempts to send and receive rtorrent_server packets. </summary> @@ -56794,7 +56878,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74793"> +<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74811"> <summary> Relabel packets to rtorrent_server the packet type. </summary> @@ -56804,7 +56888,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74815"> +<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74833"> <summary> Send and receive TCP traffic on the rtsp port. </summary> @@ -56815,7 +56899,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rtsp_port" lineno="74830"> +<interface name="corenet_udp_send_rtsp_port" lineno="74848"> <summary> Send UDP traffic on the rtsp port. </summary> @@ -56826,7 +56910,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74845"> +<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74863"> <summary> Do not audit attempts to send UDP traffic on the rtsp port. </summary> @@ -56837,7 +56921,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rtsp_port" lineno="74860"> +<interface name="corenet_udp_receive_rtsp_port" lineno="74878"> <summary> Receive UDP traffic on the rtsp port. </summary> @@ -56848,7 +56932,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74875"> +<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74893"> <summary> Do not audit attempts to receive UDP traffic on the rtsp port. </summary> @@ -56859,7 +56943,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74890"> +<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74908"> <summary> Send and receive UDP traffic on the rtsp port. </summary> @@ -56870,7 +56954,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74906"> +<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74924"> <summary> Do not audit attempts to send and receive UDP traffic on the rtsp port. @@ -56882,7 +56966,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rtsp_port" lineno="74921"> +<interface name="corenet_tcp_bind_rtsp_port" lineno="74939"> <summary> Bind TCP sockets to the rtsp port. </summary> @@ -56893,7 +56977,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rtsp_port" lineno="74941"> +<interface name="corenet_udp_bind_rtsp_port" lineno="74959"> <summary> Bind UDP sockets to the rtsp port. </summary> @@ -56904,7 +56988,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rtsp_port" lineno="74960"> +<interface name="corenet_tcp_connect_rtsp_port" lineno="74978"> <summary> Make a TCP connection to the rtsp port. </summary> @@ -56914,7 +56998,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtsp_client_packets" lineno="74980"> +<interface name="corenet_send_rtsp_client_packets" lineno="74998"> <summary> Send rtsp_client packets. </summary> @@ -56925,7 +57009,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74999"> +<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="75017"> <summary> Do not audit attempts to send rtsp_client packets. </summary> @@ -56936,7 +57020,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtsp_client_packets" lineno="75018"> +<interface name="corenet_receive_rtsp_client_packets" lineno="75036"> <summary> Receive rtsp_client packets. </summary> @@ -56947,7 +57031,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75037"> +<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75055"> <summary> Do not audit attempts to receive rtsp_client packets. </summary> @@ -56958,7 +57042,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75056"> +<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75074"> <summary> Send and receive rtsp_client packets. </summary> @@ -56969,7 +57053,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75072"> +<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75090"> <summary> Do not audit attempts to send and receive rtsp_client packets. </summary> @@ -56980,7 +57064,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtsp_client_packets" lineno="75087"> +<interface name="corenet_relabelto_rtsp_client_packets" lineno="75105"> <summary> Relabel packets to rtsp_client the packet type. </summary> @@ -56990,7 +57074,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtsp_server_packets" lineno="75107"> +<interface name="corenet_send_rtsp_server_packets" lineno="75125"> <summary> Send rtsp_server packets. </summary> @@ -57001,7 +57085,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75126"> +<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75144"> <summary> Do not audit attempts to send rtsp_server packets. </summary> @@ -57012,7 +57096,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtsp_server_packets" lineno="75145"> +<interface name="corenet_receive_rtsp_server_packets" lineno="75163"> <summary> Receive rtsp_server packets. </summary> @@ -57023,7 +57107,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75164"> +<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75182"> <summary> Do not audit attempts to receive rtsp_server packets. </summary> @@ -57034,7 +57118,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75183"> +<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75201"> <summary> Send and receive rtsp_server packets. </summary> @@ -57045,7 +57129,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75199"> +<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75217"> <summary> Do not audit attempts to send and receive rtsp_server packets. </summary> @@ -57056,7 +57140,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtsp_server_packets" lineno="75214"> +<interface name="corenet_relabelto_rtsp_server_packets" lineno="75232"> <summary> Relabel packets to rtsp_server the packet type. </summary> @@ -57066,7 +57150,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75236"> +<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75254"> <summary> Send and receive TCP traffic on the rwho port. </summary> @@ -57077,7 +57161,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_rwho_port" lineno="75251"> +<interface name="corenet_udp_send_rwho_port" lineno="75269"> <summary> Send UDP traffic on the rwho port. </summary> @@ -57088,7 +57172,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75266"> +<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75284"> <summary> Do not audit attempts to send UDP traffic on the rwho port. </summary> @@ -57099,7 +57183,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_rwho_port" lineno="75281"> +<interface name="corenet_udp_receive_rwho_port" lineno="75299"> <summary> Receive UDP traffic on the rwho port. </summary> @@ -57110,7 +57194,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75296"> +<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75314"> <summary> Do not audit attempts to receive UDP traffic on the rwho port. </summary> @@ -57121,7 +57205,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_rwho_port" lineno="75311"> +<interface name="corenet_udp_sendrecv_rwho_port" lineno="75329"> <summary> Send and receive UDP traffic on the rwho port. </summary> @@ -57132,7 +57216,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75327"> +<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75345"> <summary> Do not audit attempts to send and receive UDP traffic on the rwho port. @@ -57144,7 +57228,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_rwho_port" lineno="75342"> +<interface name="corenet_tcp_bind_rwho_port" lineno="75360"> <summary> Bind TCP sockets to the rwho port. </summary> @@ -57155,7 +57239,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rwho_port" lineno="75362"> +<interface name="corenet_udp_bind_rwho_port" lineno="75380"> <summary> Bind UDP sockets to the rwho port. </summary> @@ -57166,7 +57250,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rwho_port" lineno="75381"> +<interface name="corenet_tcp_connect_rwho_port" lineno="75399"> <summary> Make a TCP connection to the rwho port. </summary> @@ -57176,7 +57260,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rwho_client_packets" lineno="75401"> +<interface name="corenet_send_rwho_client_packets" lineno="75419"> <summary> Send rwho_client packets. </summary> @@ -57187,7 +57271,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75420"> +<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75438"> <summary> Do not audit attempts to send rwho_client packets. </summary> @@ -57198,7 +57282,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rwho_client_packets" lineno="75439"> +<interface name="corenet_receive_rwho_client_packets" lineno="75457"> <summary> Receive rwho_client packets. </summary> @@ -57209,7 +57293,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75458"> +<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75476"> <summary> Do not audit attempts to receive rwho_client packets. </summary> @@ -57220,7 +57304,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rwho_client_packets" lineno="75477"> +<interface name="corenet_sendrecv_rwho_client_packets" lineno="75495"> <summary> Send and receive rwho_client packets. </summary> @@ -57231,7 +57315,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75493"> +<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75511"> <summary> Do not audit attempts to send and receive rwho_client packets. </summary> @@ -57242,7 +57326,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rwho_client_packets" lineno="75508"> +<interface name="corenet_relabelto_rwho_client_packets" lineno="75526"> <summary> Relabel packets to rwho_client the packet type. </summary> @@ -57252,7 +57336,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rwho_server_packets" lineno="75528"> +<interface name="corenet_send_rwho_server_packets" lineno="75546"> <summary> Send rwho_server packets. </summary> @@ -57263,7 +57347,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75547"> +<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75565"> <summary> Do not audit attempts to send rwho_server packets. </summary> @@ -57274,7 +57358,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rwho_server_packets" lineno="75566"> +<interface name="corenet_receive_rwho_server_packets" lineno="75584"> <summary> Receive rwho_server packets. </summary> @@ -57285,7 +57369,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75585"> +<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75603"> <summary> Do not audit attempts to receive rwho_server packets. </summary> @@ -57296,7 +57380,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rwho_server_packets" lineno="75604"> +<interface name="corenet_sendrecv_rwho_server_packets" lineno="75622"> <summary> Send and receive rwho_server packets. </summary> @@ -57307,7 +57391,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75620"> +<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75638"> <summary> Do not audit attempts to send and receive rwho_server packets. </summary> @@ -57318,7 +57402,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rwho_server_packets" lineno="75635"> +<interface name="corenet_relabelto_rwho_server_packets" lineno="75653"> <summary> Relabel packets to rwho_server the packet type. </summary> @@ -57328,7 +57412,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_salt_port" lineno="75657"> +<interface name="corenet_tcp_sendrecv_salt_port" lineno="75675"> <summary> Send and receive TCP traffic on the salt port. </summary> @@ -57339,7 +57423,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_salt_port" lineno="75672"> +<interface name="corenet_udp_send_salt_port" lineno="75690"> <summary> Send UDP traffic on the salt port. </summary> @@ -57350,7 +57434,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75687"> +<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75705"> <summary> Do not audit attempts to send UDP traffic on the salt port. </summary> @@ -57361,7 +57445,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_salt_port" lineno="75702"> +<interface name="corenet_udp_receive_salt_port" lineno="75720"> <summary> Receive UDP traffic on the salt port. </summary> @@ -57372,7 +57456,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75717"> +<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75735"> <summary> Do not audit attempts to receive UDP traffic on the salt port. </summary> @@ -57383,7 +57467,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_salt_port" lineno="75732"> +<interface name="corenet_udp_sendrecv_salt_port" lineno="75750"> <summary> Send and receive UDP traffic on the salt port. </summary> @@ -57394,7 +57478,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75748"> +<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75766"> <summary> Do not audit attempts to send and receive UDP traffic on the salt port. @@ -57406,7 +57490,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_salt_port" lineno="75763"> +<interface name="corenet_tcp_bind_salt_port" lineno="75781"> <summary> Bind TCP sockets to the salt port. </summary> @@ -57417,7 +57501,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_salt_port" lineno="75783"> +<interface name="corenet_udp_bind_salt_port" lineno="75801"> <summary> Bind UDP sockets to the salt port. </summary> @@ -57428,7 +57512,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_salt_port" lineno="75802"> +<interface name="corenet_tcp_connect_salt_port" lineno="75820"> <summary> Make a TCP connection to the salt port. </summary> @@ -57438,7 +57522,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_salt_client_packets" lineno="75822"> +<interface name="corenet_send_salt_client_packets" lineno="75840"> <summary> Send salt_client packets. </summary> @@ -57449,7 +57533,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75841"> +<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75859"> <summary> Do not audit attempts to send salt_client packets. </summary> @@ -57460,7 +57544,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_salt_client_packets" lineno="75860"> +<interface name="corenet_receive_salt_client_packets" lineno="75878"> <summary> Receive salt_client packets. </summary> @@ -57471,7 +57555,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75879"> +<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75897"> <summary> Do not audit attempts to receive salt_client packets. </summary> @@ -57482,7 +57566,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_salt_client_packets" lineno="75898"> +<interface name="corenet_sendrecv_salt_client_packets" lineno="75916"> <summary> Send and receive salt_client packets. </summary> @@ -57493,7 +57577,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75914"> +<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75932"> <summary> Do not audit attempts to send and receive salt_client packets. </summary> @@ -57504,7 +57588,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_salt_client_packets" lineno="75929"> +<interface name="corenet_relabelto_salt_client_packets" lineno="75947"> <summary> Relabel packets to salt_client the packet type. </summary> @@ -57514,7 +57598,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_salt_server_packets" lineno="75949"> +<interface name="corenet_send_salt_server_packets" lineno="75967"> <summary> Send salt_server packets. </summary> @@ -57525,7 +57609,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75968"> +<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75986"> <summary> Do not audit attempts to send salt_server packets. </summary> @@ -57536,7 +57620,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_salt_server_packets" lineno="75987"> +<interface name="corenet_receive_salt_server_packets" lineno="76005"> <summary> Receive salt_server packets. </summary> @@ -57547,7 +57631,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76006"> +<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76024"> <summary> Do not audit attempts to receive salt_server packets. </summary> @@ -57558,7 +57642,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_salt_server_packets" lineno="76025"> +<interface name="corenet_sendrecv_salt_server_packets" lineno="76043"> <summary> Send and receive salt_server packets. </summary> @@ -57569,7 +57653,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76041"> +<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76059"> <summary> Do not audit attempts to send and receive salt_server packets. </summary> @@ -57580,7 +57664,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_salt_server_packets" lineno="76056"> +<interface name="corenet_relabelto_salt_server_packets" lineno="76074"> <summary> Relabel packets to salt_server the packet type. </summary> @@ -57590,7 +57674,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sap_port" lineno="76078"> +<interface name="corenet_tcp_sendrecv_sap_port" lineno="76096"> <summary> Send and receive TCP traffic on the sap port. </summary> @@ -57601,7 +57685,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_sap_port" lineno="76093"> +<interface name="corenet_udp_send_sap_port" lineno="76111"> <summary> Send UDP traffic on the sap port. </summary> @@ -57612,7 +57696,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76108"> +<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76126"> <summary> Do not audit attempts to send UDP traffic on the sap port. </summary> @@ -57623,7 +57707,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_sap_port" lineno="76123"> +<interface name="corenet_udp_receive_sap_port" lineno="76141"> <summary> Receive UDP traffic on the sap port. </summary> @@ -57634,7 +57718,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76138"> +<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76156"> <summary> Do not audit attempts to receive UDP traffic on the sap port. </summary> @@ -57645,7 +57729,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_sap_port" lineno="76153"> +<interface name="corenet_udp_sendrecv_sap_port" lineno="76171"> <summary> Send and receive UDP traffic on the sap port. </summary> @@ -57656,7 +57740,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76169"> +<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76187"> <summary> Do not audit attempts to send and receive UDP traffic on the sap port. @@ -57668,7 +57752,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_sap_port" lineno="76184"> +<interface name="corenet_tcp_bind_sap_port" lineno="76202"> <summary> Bind TCP sockets to the sap port. </summary> @@ -57679,7 +57763,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sap_port" lineno="76204"> +<interface name="corenet_udp_bind_sap_port" lineno="76222"> <summary> Bind UDP sockets to the sap port. </summary> @@ -57690,7 +57774,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sap_port" lineno="76223"> +<interface name="corenet_tcp_connect_sap_port" lineno="76241"> <summary> Make a TCP connection to the sap port. </summary> @@ -57700,7 +57784,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sap_client_packets" lineno="76243"> +<interface name="corenet_send_sap_client_packets" lineno="76261"> <summary> Send sap_client packets. </summary> @@ -57711,7 +57795,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76262"> +<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76280"> <summary> Do not audit attempts to send sap_client packets. </summary> @@ -57722,7 +57806,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sap_client_packets" lineno="76281"> +<interface name="corenet_receive_sap_client_packets" lineno="76299"> <summary> Receive sap_client packets. </summary> @@ -57733,7 +57817,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76300"> +<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76318"> <summary> Do not audit attempts to receive sap_client packets. </summary> @@ -57744,7 +57828,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sap_client_packets" lineno="76319"> +<interface name="corenet_sendrecv_sap_client_packets" lineno="76337"> <summary> Send and receive sap_client packets. </summary> @@ -57755,7 +57839,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76335"> +<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76353"> <summary> Do not audit attempts to send and receive sap_client packets. </summary> @@ -57766,7 +57850,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sap_client_packets" lineno="76350"> +<interface name="corenet_relabelto_sap_client_packets" lineno="76368"> <summary> Relabel packets to sap_client the packet type. </summary> @@ -57776,7 +57860,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sap_server_packets" lineno="76370"> +<interface name="corenet_send_sap_server_packets" lineno="76388"> <summary> Send sap_server packets. </summary> @@ -57787,7 +57871,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76389"> +<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76407"> <summary> Do not audit attempts to send sap_server packets. </summary> @@ -57798,7 +57882,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sap_server_packets" lineno="76408"> +<interface name="corenet_receive_sap_server_packets" lineno="76426"> <summary> Receive sap_server packets. </summary> @@ -57809,7 +57893,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76427"> +<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76445"> <summary> Do not audit attempts to receive sap_server packets. </summary> @@ -57820,7 +57904,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sap_server_packets" lineno="76446"> +<interface name="corenet_sendrecv_sap_server_packets" lineno="76464"> <summary> Send and receive sap_server packets. </summary> @@ -57831,7 +57915,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76462"> +<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76480"> <summary> Do not audit attempts to send and receive sap_server packets. </summary> @@ -57842,7 +57926,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sap_server_packets" lineno="76477"> +<interface name="corenet_relabelto_sap_server_packets" lineno="76495"> <summary> Relabel packets to sap_server the packet type. </summary> @@ -57852,7 +57936,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76499"> +<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76517"> <summary> Send and receive TCP traffic on the servistaitsm port. </summary> @@ -57863,7 +57947,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_servistaitsm_port" lineno="76514"> +<interface name="corenet_udp_send_servistaitsm_port" lineno="76532"> <summary> Send UDP traffic on the servistaitsm port. </summary> @@ -57874,7 +57958,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76529"> +<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76547"> <summary> Do not audit attempts to send UDP traffic on the servistaitsm port. </summary> @@ -57885,7 +57969,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_servistaitsm_port" lineno="76544"> +<interface name="corenet_udp_receive_servistaitsm_port" lineno="76562"> <summary> Receive UDP traffic on the servistaitsm port. </summary> @@ -57896,7 +57980,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76559"> +<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76577"> <summary> Do not audit attempts to receive UDP traffic on the servistaitsm port. </summary> @@ -57907,7 +57991,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76574"> +<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76592"> <summary> Send and receive UDP traffic on the servistaitsm port. </summary> @@ -57918,7 +58002,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76590"> +<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76608"> <summary> Do not audit attempts to send and receive UDP traffic on the servistaitsm port. @@ -57930,7 +58014,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76605"> +<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76623"> <summary> Bind TCP sockets to the servistaitsm port. </summary> @@ -57941,7 +58025,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_servistaitsm_port" lineno="76625"> +<interface name="corenet_udp_bind_servistaitsm_port" lineno="76643"> <summary> Bind UDP sockets to the servistaitsm port. </summary> @@ -57952,7 +58036,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76644"> +<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76662"> <summary> Make a TCP connection to the servistaitsm port. </summary> @@ -57962,7 +58046,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_servistaitsm_client_packets" lineno="76664"> +<interface name="corenet_send_servistaitsm_client_packets" lineno="76682"> <summary> Send servistaitsm_client packets. </summary> @@ -57973,7 +58057,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76683"> +<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76701"> <summary> Do not audit attempts to send servistaitsm_client packets. </summary> @@ -57984,7 +58068,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_servistaitsm_client_packets" lineno="76702"> +<interface name="corenet_receive_servistaitsm_client_packets" lineno="76720"> <summary> Receive servistaitsm_client packets. </summary> @@ -57995,7 +58079,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76721"> +<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76739"> <summary> Do not audit attempts to receive servistaitsm_client packets. </summary> @@ -58006,7 +58090,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76740"> +<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76758"> <summary> Send and receive servistaitsm_client packets. </summary> @@ -58017,7 +58101,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76756"> +<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76774"> <summary> Do not audit attempts to send and receive servistaitsm_client packets. </summary> @@ -58028,7 +58112,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76771"> +<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76789"> <summary> Relabel packets to servistaitsm_client the packet type. </summary> @@ -58038,7 +58122,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_servistaitsm_server_packets" lineno="76791"> +<interface name="corenet_send_servistaitsm_server_packets" lineno="76809"> <summary> Send servistaitsm_server packets. </summary> @@ -58049,7 +58133,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76810"> +<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76828"> <summary> Do not audit attempts to send servistaitsm_server packets. </summary> @@ -58060,7 +58144,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_servistaitsm_server_packets" lineno="76829"> +<interface name="corenet_receive_servistaitsm_server_packets" lineno="76847"> <summary> Receive servistaitsm_server packets. </summary> @@ -58071,7 +58155,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76848"> +<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76866"> <summary> Do not audit attempts to receive servistaitsm_server packets. </summary> @@ -58082,7 +58166,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76867"> +<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76885"> <summary> Send and receive servistaitsm_server packets. </summary> @@ -58093,7 +58177,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76883"> +<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76901"> <summary> Do not audit attempts to send and receive servistaitsm_server packets. </summary> @@ -58104,7 +58188,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76898"> +<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76916"> <summary> Relabel packets to servistaitsm_server the packet type. </summary> @@ -58114,7 +58198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76920"> +<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76938"> <summary> Send and receive TCP traffic on the sieve port. </summary> @@ -58125,7 +58209,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_sieve_port" lineno="76935"> +<interface name="corenet_udp_send_sieve_port" lineno="76953"> <summary> Send UDP traffic on the sieve port. </summary> @@ -58136,7 +58220,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76950"> +<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76968"> <summary> Do not audit attempts to send UDP traffic on the sieve port. </summary> @@ -58147,7 +58231,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_sieve_port" lineno="76965"> +<interface name="corenet_udp_receive_sieve_port" lineno="76983"> <summary> Receive UDP traffic on the sieve port. </summary> @@ -58158,7 +58242,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76980"> +<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76998"> <summary> Do not audit attempts to receive UDP traffic on the sieve port. </summary> @@ -58169,7 +58253,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_sieve_port" lineno="76995"> +<interface name="corenet_udp_sendrecv_sieve_port" lineno="77013"> <summary> Send and receive UDP traffic on the sieve port. </summary> @@ -58180,7 +58264,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77011"> +<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77029"> <summary> Do not audit attempts to send and receive UDP traffic on the sieve port. @@ -58192,7 +58276,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_sieve_port" lineno="77026"> +<interface name="corenet_tcp_bind_sieve_port" lineno="77044"> <summary> Bind TCP sockets to the sieve port. </summary> @@ -58203,7 +58287,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sieve_port" lineno="77046"> +<interface name="corenet_udp_bind_sieve_port" lineno="77064"> <summary> Bind UDP sockets to the sieve port. </summary> @@ -58214,7 +58298,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sieve_port" lineno="77065"> +<interface name="corenet_tcp_connect_sieve_port" lineno="77083"> <summary> Make a TCP connection to the sieve port. </summary> @@ -58224,7 +58308,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sieve_client_packets" lineno="77085"> +<interface name="corenet_send_sieve_client_packets" lineno="77103"> <summary> Send sieve_client packets. </summary> @@ -58235,7 +58319,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77104"> +<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77122"> <summary> Do not audit attempts to send sieve_client packets. </summary> @@ -58246,7 +58330,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sieve_client_packets" lineno="77123"> +<interface name="corenet_receive_sieve_client_packets" lineno="77141"> <summary> Receive sieve_client packets. </summary> @@ -58257,7 +58341,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77142"> +<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77160"> <summary> Do not audit attempts to receive sieve_client packets. </summary> @@ -58268,7 +58352,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sieve_client_packets" lineno="77161"> +<interface name="corenet_sendrecv_sieve_client_packets" lineno="77179"> <summary> Send and receive sieve_client packets. </summary> @@ -58279,7 +58363,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77177"> +<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77195"> <summary> Do not audit attempts to send and receive sieve_client packets. </summary> @@ -58290,7 +58374,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sieve_client_packets" lineno="77192"> +<interface name="corenet_relabelto_sieve_client_packets" lineno="77210"> <summary> Relabel packets to sieve_client the packet type. </summary> @@ -58300,7 +58384,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sieve_server_packets" lineno="77212"> +<interface name="corenet_send_sieve_server_packets" lineno="77230"> <summary> Send sieve_server packets. </summary> @@ -58311,7 +58395,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77231"> +<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77249"> <summary> Do not audit attempts to send sieve_server packets. </summary> @@ -58322,7 +58406,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sieve_server_packets" lineno="77250"> +<interface name="corenet_receive_sieve_server_packets" lineno="77268"> <summary> Receive sieve_server packets. </summary> @@ -58333,7 +58417,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77269"> +<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77287"> <summary> Do not audit attempts to receive sieve_server packets. </summary> @@ -58344,7 +58428,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sieve_server_packets" lineno="77288"> +<interface name="corenet_sendrecv_sieve_server_packets" lineno="77306"> <summary> Send and receive sieve_server packets. </summary> @@ -58355,7 +58439,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77304"> +<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77322"> <summary> Do not audit attempts to send and receive sieve_server packets. </summary> @@ -58366,7 +58450,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sieve_server_packets" lineno="77319"> +<interface name="corenet_relabelto_sieve_server_packets" lineno="77337"> <summary> Relabel packets to sieve_server the packet type. </summary> @@ -58376,7 +58460,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sip_port" lineno="77341"> +<interface name="corenet_tcp_sendrecv_sip_port" lineno="77359"> <summary> Send and receive TCP traffic on the sip port. </summary> @@ -58387,7 +58471,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_sip_port" lineno="77356"> +<interface name="corenet_udp_send_sip_port" lineno="77374"> <summary> Send UDP traffic on the sip port. </summary> @@ -58398,7 +58482,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77371"> +<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77389"> <summary> Do not audit attempts to send UDP traffic on the sip port. </summary> @@ -58409,7 +58493,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_sip_port" lineno="77386"> +<interface name="corenet_udp_receive_sip_port" lineno="77404"> <summary> Receive UDP traffic on the sip port. </summary> @@ -58420,7 +58504,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77401"> +<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77419"> <summary> Do not audit attempts to receive UDP traffic on the sip port. </summary> @@ -58431,7 +58515,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_sip_port" lineno="77416"> +<interface name="corenet_udp_sendrecv_sip_port" lineno="77434"> <summary> Send and receive UDP traffic on the sip port. </summary> @@ -58442,7 +58526,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77432"> +<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77450"> <summary> Do not audit attempts to send and receive UDP traffic on the sip port. @@ -58454,7 +58538,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_sip_port" lineno="77447"> +<interface name="corenet_tcp_bind_sip_port" lineno="77465"> <summary> Bind TCP sockets to the sip port. </summary> @@ -58465,7 +58549,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sip_port" lineno="77467"> +<interface name="corenet_udp_bind_sip_port" lineno="77485"> <summary> Bind UDP sockets to the sip port. </summary> @@ -58476,7 +58560,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sip_port" lineno="77486"> +<interface name="corenet_tcp_connect_sip_port" lineno="77504"> <summary> Make a TCP connection to the sip port. </summary> @@ -58486,7 +58570,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sip_client_packets" lineno="77506"> +<interface name="corenet_send_sip_client_packets" lineno="77524"> <summary> Send sip_client packets. </summary> @@ -58497,7 +58581,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77525"> +<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77543"> <summary> Do not audit attempts to send sip_client packets. </summary> @@ -58508,7 +58592,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sip_client_packets" lineno="77544"> +<interface name="corenet_receive_sip_client_packets" lineno="77562"> <summary> Receive sip_client packets. </summary> @@ -58519,7 +58603,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77563"> +<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77581"> <summary> Do not audit attempts to receive sip_client packets. </summary> @@ -58530,7 +58614,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sip_client_packets" lineno="77582"> +<interface name="corenet_sendrecv_sip_client_packets" lineno="77600"> <summary> Send and receive sip_client packets. </summary> @@ -58541,7 +58625,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77598"> +<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77616"> <summary> Do not audit attempts to send and receive sip_client packets. </summary> @@ -58552,7 +58636,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sip_client_packets" lineno="77613"> +<interface name="corenet_relabelto_sip_client_packets" lineno="77631"> <summary> Relabel packets to sip_client the packet type. </summary> @@ -58562,7 +58646,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sip_server_packets" lineno="77633"> +<interface name="corenet_send_sip_server_packets" lineno="77651"> <summary> Send sip_server packets. </summary> @@ -58573,7 +58657,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77652"> +<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77670"> <summary> Do not audit attempts to send sip_server packets. </summary> @@ -58584,7 +58668,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sip_server_packets" lineno="77671"> +<interface name="corenet_receive_sip_server_packets" lineno="77689"> <summary> Receive sip_server packets. </summary> @@ -58595,7 +58679,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77690"> +<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77708"> <summary> Do not audit attempts to receive sip_server packets. </summary> @@ -58606,7 +58690,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sip_server_packets" lineno="77709"> +<interface name="corenet_sendrecv_sip_server_packets" lineno="77727"> <summary> Send and receive sip_server packets. </summary> @@ -58617,7 +58701,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77725"> +<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77743"> <summary> Do not audit attempts to send and receive sip_server packets. </summary> @@ -58628,7 +58712,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sip_server_packets" lineno="77740"> +<interface name="corenet_relabelto_sip_server_packets" lineno="77758"> <summary> Relabel packets to sip_server the packet type. </summary> @@ -58638,7 +58722,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77762"> +<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77780"> <summary> Send and receive TCP traffic on the sixxsconfig port. </summary> @@ -58649,7 +58733,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_sixxsconfig_port" lineno="77777"> +<interface name="corenet_udp_send_sixxsconfig_port" lineno="77795"> <summary> Send UDP traffic on the sixxsconfig port. </summary> @@ -58660,7 +58744,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77792"> +<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77810"> <summary> Do not audit attempts to send UDP traffic on the sixxsconfig port. </summary> @@ -58671,7 +58755,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77807"> +<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77825"> <summary> Receive UDP traffic on the sixxsconfig port. </summary> @@ -58682,7 +58766,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77822"> +<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77840"> <summary> Do not audit attempts to receive UDP traffic on the sixxsconfig port. </summary> @@ -58693,7 +58777,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77837"> +<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77855"> <summary> Send and receive UDP traffic on the sixxsconfig port. </summary> @@ -58704,7 +58788,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77853"> +<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77871"> <summary> Do not audit attempts to send and receive UDP traffic on the sixxsconfig port. @@ -58716,7 +58800,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77868"> +<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77886"> <summary> Bind TCP sockets to the sixxsconfig port. </summary> @@ -58727,7 +58811,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77888"> +<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77906"> <summary> Bind UDP sockets to the sixxsconfig port. </summary> @@ -58738,7 +58822,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77907"> +<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77925"> <summary> Make a TCP connection to the sixxsconfig port. </summary> @@ -58748,7 +58832,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sixxsconfig_client_packets" lineno="77927"> +<interface name="corenet_send_sixxsconfig_client_packets" lineno="77945"> <summary> Send sixxsconfig_client packets. </summary> @@ -58759,7 +58843,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77946"> +<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77964"> <summary> Do not audit attempts to send sixxsconfig_client packets. </summary> @@ -58770,7 +58854,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77965"> +<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77983"> <summary> Receive sixxsconfig_client packets. </summary> @@ -58781,7 +58865,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77984"> +<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="78002"> <summary> Do not audit attempts to receive sixxsconfig_client packets. </summary> @@ -58792,7 +58876,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78003"> +<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78021"> <summary> Send and receive sixxsconfig_client packets. </summary> @@ -58803,7 +58887,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78019"> +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78037"> <summary> Do not audit attempts to send and receive sixxsconfig_client packets. </summary> @@ -58814,7 +58898,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78034"> +<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78052"> <summary> Relabel packets to sixxsconfig_client the packet type. </summary> @@ -58824,7 +58908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sixxsconfig_server_packets" lineno="78054"> +<interface name="corenet_send_sixxsconfig_server_packets" lineno="78072"> <summary> Send sixxsconfig_server packets. </summary> @@ -58835,7 +58919,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78073"> +<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78091"> <summary> Do not audit attempts to send sixxsconfig_server packets. </summary> @@ -58846,7 +58930,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78092"> +<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78110"> <summary> Receive sixxsconfig_server packets. </summary> @@ -58857,7 +58941,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78111"> +<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78129"> <summary> Do not audit attempts to receive sixxsconfig_server packets. </summary> @@ -58868,7 +58952,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78130"> +<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78148"> <summary> Send and receive sixxsconfig_server packets. </summary> @@ -58879,7 +58963,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78146"> +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78164"> <summary> Do not audit attempts to send and receive sixxsconfig_server packets. </summary> @@ -58890,7 +58974,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78161"> +<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78179"> <summary> Relabel packets to sixxsconfig_server the packet type. </summary> @@ -58900,7 +58984,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78183"> +<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78201"> <summary> Send and receive TCP traffic on the smbd port. </summary> @@ -58911,7 +58995,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_smbd_port" lineno="78198"> +<interface name="corenet_udp_send_smbd_port" lineno="78216"> <summary> Send UDP traffic on the smbd port. </summary> @@ -58922,7 +59006,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78213"> +<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78231"> <summary> Do not audit attempts to send UDP traffic on the smbd port. </summary> @@ -58933,7 +59017,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_smbd_port" lineno="78228"> +<interface name="corenet_udp_receive_smbd_port" lineno="78246"> <summary> Receive UDP traffic on the smbd port. </summary> @@ -58944,7 +59028,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78243"> +<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78261"> <summary> Do not audit attempts to receive UDP traffic on the smbd port. </summary> @@ -58955,7 +59039,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_smbd_port" lineno="78258"> +<interface name="corenet_udp_sendrecv_smbd_port" lineno="78276"> <summary> Send and receive UDP traffic on the smbd port. </summary> @@ -58966,7 +59050,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78274"> +<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78292"> <summary> Do not audit attempts to send and receive UDP traffic on the smbd port. @@ -58978,7 +59062,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_smbd_port" lineno="78289"> +<interface name="corenet_tcp_bind_smbd_port" lineno="78307"> <summary> Bind TCP sockets to the smbd port. </summary> @@ -58989,7 +59073,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_smbd_port" lineno="78309"> +<interface name="corenet_udp_bind_smbd_port" lineno="78327"> <summary> Bind UDP sockets to the smbd port. </summary> @@ -59000,7 +59084,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_smbd_port" lineno="78328"> +<interface name="corenet_tcp_connect_smbd_port" lineno="78346"> <summary> Make a TCP connection to the smbd port. </summary> @@ -59010,7 +59094,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smbd_client_packets" lineno="78348"> +<interface name="corenet_send_smbd_client_packets" lineno="78366"> <summary> Send smbd_client packets. </summary> @@ -59021,7 +59105,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78367"> +<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78385"> <summary> Do not audit attempts to send smbd_client packets. </summary> @@ -59032,7 +59116,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smbd_client_packets" lineno="78386"> +<interface name="corenet_receive_smbd_client_packets" lineno="78404"> <summary> Receive smbd_client packets. </summary> @@ -59043,7 +59127,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78405"> +<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78423"> <summary> Do not audit attempts to receive smbd_client packets. </summary> @@ -59054,7 +59138,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smbd_client_packets" lineno="78424"> +<interface name="corenet_sendrecv_smbd_client_packets" lineno="78442"> <summary> Send and receive smbd_client packets. </summary> @@ -59065,7 +59149,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78440"> +<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78458"> <summary> Do not audit attempts to send and receive smbd_client packets. </summary> @@ -59076,7 +59160,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smbd_client_packets" lineno="78455"> +<interface name="corenet_relabelto_smbd_client_packets" lineno="78473"> <summary> Relabel packets to smbd_client the packet type. </summary> @@ -59086,7 +59170,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smbd_server_packets" lineno="78475"> +<interface name="corenet_send_smbd_server_packets" lineno="78493"> <summary> Send smbd_server packets. </summary> @@ -59097,7 +59181,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78494"> +<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78512"> <summary> Do not audit attempts to send smbd_server packets. </summary> @@ -59108,7 +59192,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smbd_server_packets" lineno="78513"> +<interface name="corenet_receive_smbd_server_packets" lineno="78531"> <summary> Receive smbd_server packets. </summary> @@ -59119,7 +59203,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78532"> +<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78550"> <summary> Do not audit attempts to receive smbd_server packets. </summary> @@ -59130,7 +59214,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smbd_server_packets" lineno="78551"> +<interface name="corenet_sendrecv_smbd_server_packets" lineno="78569"> <summary> Send and receive smbd_server packets. </summary> @@ -59141,7 +59225,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78567"> +<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78585"> <summary> Do not audit attempts to send and receive smbd_server packets. </summary> @@ -59152,7 +59236,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smbd_server_packets" lineno="78582"> +<interface name="corenet_relabelto_smbd_server_packets" lineno="78600"> <summary> Relabel packets to smbd_server the packet type. </summary> @@ -59162,7 +59246,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78604"> +<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78622"> <summary> Send and receive TCP traffic on the smtp port. </summary> @@ -59173,7 +59257,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_smtp_port" lineno="78619"> +<interface name="corenet_udp_send_smtp_port" lineno="78637"> <summary> Send UDP traffic on the smtp port. </summary> @@ -59184,7 +59268,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78634"> +<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78652"> <summary> Do not audit attempts to send UDP traffic on the smtp port. </summary> @@ -59195,7 +59279,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_smtp_port" lineno="78649"> +<interface name="corenet_udp_receive_smtp_port" lineno="78667"> <summary> Receive UDP traffic on the smtp port. </summary> @@ -59206,7 +59290,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78664"> +<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78682"> <summary> Do not audit attempts to receive UDP traffic on the smtp port. </summary> @@ -59217,7 +59301,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_smtp_port" lineno="78679"> +<interface name="corenet_udp_sendrecv_smtp_port" lineno="78697"> <summary> Send and receive UDP traffic on the smtp port. </summary> @@ -59228,7 +59312,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78695"> +<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78713"> <summary> Do not audit attempts to send and receive UDP traffic on the smtp port. @@ -59240,7 +59324,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_smtp_port" lineno="78710"> +<interface name="corenet_tcp_bind_smtp_port" lineno="78728"> <summary> Bind TCP sockets to the smtp port. </summary> @@ -59251,7 +59335,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_smtp_port" lineno="78730"> +<interface name="corenet_udp_bind_smtp_port" lineno="78748"> <summary> Bind UDP sockets to the smtp port. </summary> @@ -59262,7 +59346,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_smtp_port" lineno="78749"> +<interface name="corenet_tcp_connect_smtp_port" lineno="78767"> <summary> Make a TCP connection to the smtp port. </summary> @@ -59272,7 +59356,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smtp_client_packets" lineno="78769"> +<interface name="corenet_send_smtp_client_packets" lineno="78787"> <summary> Send smtp_client packets. </summary> @@ -59283,7 +59367,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78788"> +<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78806"> <summary> Do not audit attempts to send smtp_client packets. </summary> @@ -59294,7 +59378,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smtp_client_packets" lineno="78807"> +<interface name="corenet_receive_smtp_client_packets" lineno="78825"> <summary> Receive smtp_client packets. </summary> @@ -59305,7 +59389,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78826"> +<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78844"> <summary> Do not audit attempts to receive smtp_client packets. </summary> @@ -59316,7 +59400,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smtp_client_packets" lineno="78845"> +<interface name="corenet_sendrecv_smtp_client_packets" lineno="78863"> <summary> Send and receive smtp_client packets. </summary> @@ -59327,7 +59411,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78861"> +<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78879"> <summary> Do not audit attempts to send and receive smtp_client packets. </summary> @@ -59338,7 +59422,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smtp_client_packets" lineno="78876"> +<interface name="corenet_relabelto_smtp_client_packets" lineno="78894"> <summary> Relabel packets to smtp_client the packet type. </summary> @@ -59348,7 +59432,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smtp_server_packets" lineno="78896"> +<interface name="corenet_send_smtp_server_packets" lineno="78914"> <summary> Send smtp_server packets. </summary> @@ -59359,7 +59443,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78915"> +<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78933"> <summary> Do not audit attempts to send smtp_server packets. </summary> @@ -59370,7 +59454,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smtp_server_packets" lineno="78934"> +<interface name="corenet_receive_smtp_server_packets" lineno="78952"> <summary> Receive smtp_server packets. </summary> @@ -59381,7 +59465,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78953"> +<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78971"> <summary> Do not audit attempts to receive smtp_server packets. </summary> @@ -59392,7 +59476,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smtp_server_packets" lineno="78972"> +<interface name="corenet_sendrecv_smtp_server_packets" lineno="78990"> <summary> Send and receive smtp_server packets. </summary> @@ -59403,7 +59487,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78988"> +<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="79006"> <summary> Do not audit attempts to send and receive smtp_server packets. </summary> @@ -59414,7 +59498,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smtp_server_packets" lineno="79003"> +<interface name="corenet_relabelto_smtp_server_packets" lineno="79021"> <summary> Relabel packets to smtp_server the packet type. </summary> @@ -59424,7 +59508,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79025"> +<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79043"> <summary> Send and receive TCP traffic on the snmp port. </summary> @@ -59435,7 +59519,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_snmp_port" lineno="79040"> +<interface name="corenet_udp_send_snmp_port" lineno="79058"> <summary> Send UDP traffic on the snmp port. </summary> @@ -59446,7 +59530,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79055"> +<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79073"> <summary> Do not audit attempts to send UDP traffic on the snmp port. </summary> @@ -59457,7 +59541,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_snmp_port" lineno="79070"> +<interface name="corenet_udp_receive_snmp_port" lineno="79088"> <summary> Receive UDP traffic on the snmp port. </summary> @@ -59468,7 +59552,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79085"> +<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79103"> <summary> Do not audit attempts to receive UDP traffic on the snmp port. </summary> @@ -59479,7 +59563,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_snmp_port" lineno="79100"> +<interface name="corenet_udp_sendrecv_snmp_port" lineno="79118"> <summary> Send and receive UDP traffic on the snmp port. </summary> @@ -59490,7 +59574,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79116"> +<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79134"> <summary> Do not audit attempts to send and receive UDP traffic on the snmp port. @@ -59502,7 +59586,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_snmp_port" lineno="79131"> +<interface name="corenet_tcp_bind_snmp_port" lineno="79149"> <summary> Bind TCP sockets to the snmp port. </summary> @@ -59513,7 +59597,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_snmp_port" lineno="79151"> +<interface name="corenet_udp_bind_snmp_port" lineno="79169"> <summary> Bind UDP sockets to the snmp port. </summary> @@ -59524,7 +59608,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_snmp_port" lineno="79170"> +<interface name="corenet_tcp_connect_snmp_port" lineno="79188"> <summary> Make a TCP connection to the snmp port. </summary> @@ -59534,7 +59618,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_snmp_client_packets" lineno="79190"> +<interface name="corenet_send_snmp_client_packets" lineno="79208"> <summary> Send snmp_client packets. </summary> @@ -59545,7 +59629,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79209"> +<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79227"> <summary> Do not audit attempts to send snmp_client packets. </summary> @@ -59556,7 +59640,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_snmp_client_packets" lineno="79228"> +<interface name="corenet_receive_snmp_client_packets" lineno="79246"> <summary> Receive snmp_client packets. </summary> @@ -59567,7 +59651,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79247"> +<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79265"> <summary> Do not audit attempts to receive snmp_client packets. </summary> @@ -59578,7 +59662,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_snmp_client_packets" lineno="79266"> +<interface name="corenet_sendrecv_snmp_client_packets" lineno="79284"> <summary> Send and receive snmp_client packets. </summary> @@ -59589,7 +59673,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79282"> +<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79300"> <summary> Do not audit attempts to send and receive snmp_client packets. </summary> @@ -59600,7 +59684,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_snmp_client_packets" lineno="79297"> +<interface name="corenet_relabelto_snmp_client_packets" lineno="79315"> <summary> Relabel packets to snmp_client the packet type. </summary> @@ -59610,7 +59694,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_snmp_server_packets" lineno="79317"> +<interface name="corenet_send_snmp_server_packets" lineno="79335"> <summary> Send snmp_server packets. </summary> @@ -59621,7 +59705,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79336"> +<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79354"> <summary> Do not audit attempts to send snmp_server packets. </summary> @@ -59632,7 +59716,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_snmp_server_packets" lineno="79355"> +<interface name="corenet_receive_snmp_server_packets" lineno="79373"> <summary> Receive snmp_server packets. </summary> @@ -59643,7 +59727,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79374"> +<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79392"> <summary> Do not audit attempts to receive snmp_server packets. </summary> @@ -59654,7 +59738,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_snmp_server_packets" lineno="79393"> +<interface name="corenet_sendrecv_snmp_server_packets" lineno="79411"> <summary> Send and receive snmp_server packets. </summary> @@ -59665,7 +59749,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79409"> +<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79427"> <summary> Do not audit attempts to send and receive snmp_server packets. </summary> @@ -59676,7 +59760,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_snmp_server_packets" lineno="79424"> +<interface name="corenet_relabelto_snmp_server_packets" lineno="79442"> <summary> Relabel packets to snmp_server the packet type. </summary> @@ -59686,7 +59770,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_socks_port" lineno="79446"> +<interface name="corenet_tcp_sendrecv_socks_port" lineno="79464"> <summary> Send and receive TCP traffic on the socks port. </summary> @@ -59697,7 +59781,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_socks_port" lineno="79461"> +<interface name="corenet_udp_send_socks_port" lineno="79479"> <summary> Send UDP traffic on the socks port. </summary> @@ -59708,7 +59792,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79476"> +<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79494"> <summary> Do not audit attempts to send UDP traffic on the socks port. </summary> @@ -59719,7 +59803,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_socks_port" lineno="79491"> +<interface name="corenet_udp_receive_socks_port" lineno="79509"> <summary> Receive UDP traffic on the socks port. </summary> @@ -59730,7 +59814,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79506"> +<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79524"> <summary> Do not audit attempts to receive UDP traffic on the socks port. </summary> @@ -59741,7 +59825,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_socks_port" lineno="79521"> +<interface name="corenet_udp_sendrecv_socks_port" lineno="79539"> <summary> Send and receive UDP traffic on the socks port. </summary> @@ -59752,7 +59836,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79537"> +<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79555"> <summary> Do not audit attempts to send and receive UDP traffic on the socks port. @@ -59764,7 +59848,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_socks_port" lineno="79552"> +<interface name="corenet_tcp_bind_socks_port" lineno="79570"> <summary> Bind TCP sockets to the socks port. </summary> @@ -59775,7 +59859,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_socks_port" lineno="79572"> +<interface name="corenet_udp_bind_socks_port" lineno="79590"> <summary> Bind UDP sockets to the socks port. </summary> @@ -59786,7 +59870,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_socks_port" lineno="79591"> +<interface name="corenet_tcp_connect_socks_port" lineno="79609"> <summary> Make a TCP connection to the socks port. </summary> @@ -59796,7 +59880,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_socks_client_packets" lineno="79611"> +<interface name="corenet_send_socks_client_packets" lineno="79629"> <summary> Send socks_client packets. </summary> @@ -59807,7 +59891,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79630"> +<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79648"> <summary> Do not audit attempts to send socks_client packets. </summary> @@ -59818,7 +59902,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_socks_client_packets" lineno="79649"> +<interface name="corenet_receive_socks_client_packets" lineno="79667"> <summary> Receive socks_client packets. </summary> @@ -59829,7 +59913,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79668"> +<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79686"> <summary> Do not audit attempts to receive socks_client packets. </summary> @@ -59840,7 +59924,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_socks_client_packets" lineno="79687"> +<interface name="corenet_sendrecv_socks_client_packets" lineno="79705"> <summary> Send and receive socks_client packets. </summary> @@ -59851,7 +59935,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79703"> +<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79721"> <summary> Do not audit attempts to send and receive socks_client packets. </summary> @@ -59862,7 +59946,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_socks_client_packets" lineno="79718"> +<interface name="corenet_relabelto_socks_client_packets" lineno="79736"> <summary> Relabel packets to socks_client the packet type. </summary> @@ -59872,7 +59956,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_socks_server_packets" lineno="79738"> +<interface name="corenet_send_socks_server_packets" lineno="79756"> <summary> Send socks_server packets. </summary> @@ -59883,7 +59967,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79757"> +<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79775"> <summary> Do not audit attempts to send socks_server packets. </summary> @@ -59894,7 +59978,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_socks_server_packets" lineno="79776"> +<interface name="corenet_receive_socks_server_packets" lineno="79794"> <summary> Receive socks_server packets. </summary> @@ -59905,7 +59989,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79795"> +<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79813"> <summary> Do not audit attempts to receive socks_server packets. </summary> @@ -59916,7 +60000,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_socks_server_packets" lineno="79814"> +<interface name="corenet_sendrecv_socks_server_packets" lineno="79832"> <summary> Send and receive socks_server packets. </summary> @@ -59927,7 +60011,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79830"> +<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79848"> <summary> Do not audit attempts to send and receive socks_server packets. </summary> @@ -59938,7 +60022,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_socks_server_packets" lineno="79845"> +<interface name="corenet_relabelto_socks_server_packets" lineno="79863"> <summary> Relabel packets to socks_server the packet type. </summary> @@ -59948,7 +60032,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79867"> +<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79885"> <summary> Send and receive TCP traffic on the soundd port. </summary> @@ -59959,7 +60043,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_soundd_port" lineno="79882"> +<interface name="corenet_udp_send_soundd_port" lineno="79900"> <summary> Send UDP traffic on the soundd port. </summary> @@ -59970,7 +60054,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79897"> +<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79915"> <summary> Do not audit attempts to send UDP traffic on the soundd port. </summary> @@ -59981,7 +60065,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_soundd_port" lineno="79912"> +<interface name="corenet_udp_receive_soundd_port" lineno="79930"> <summary> Receive UDP traffic on the soundd port. </summary> @@ -59992,7 +60076,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79927"> +<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79945"> <summary> Do not audit attempts to receive UDP traffic on the soundd port. </summary> @@ -60003,7 +60087,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_soundd_port" lineno="79942"> +<interface name="corenet_udp_sendrecv_soundd_port" lineno="79960"> <summary> Send and receive UDP traffic on the soundd port. </summary> @@ -60014,7 +60098,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79958"> +<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79976"> <summary> Do not audit attempts to send and receive UDP traffic on the soundd port. @@ -60026,7 +60110,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_soundd_port" lineno="79973"> +<interface name="corenet_tcp_bind_soundd_port" lineno="79991"> <summary> Bind TCP sockets to the soundd port. </summary> @@ -60037,7 +60121,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_soundd_port" lineno="79993"> +<interface name="corenet_udp_bind_soundd_port" lineno="80011"> <summary> Bind UDP sockets to the soundd port. </summary> @@ -60048,7 +60132,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_soundd_port" lineno="80012"> +<interface name="corenet_tcp_connect_soundd_port" lineno="80030"> <summary> Make a TCP connection to the soundd port. </summary> @@ -60058,7 +60142,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_soundd_client_packets" lineno="80032"> +<interface name="corenet_send_soundd_client_packets" lineno="80050"> <summary> Send soundd_client packets. </summary> @@ -60069,7 +60153,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80051"> +<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80069"> <summary> Do not audit attempts to send soundd_client packets. </summary> @@ -60080,7 +60164,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_soundd_client_packets" lineno="80070"> +<interface name="corenet_receive_soundd_client_packets" lineno="80088"> <summary> Receive soundd_client packets. </summary> @@ -60091,7 +60175,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80089"> +<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80107"> <summary> Do not audit attempts to receive soundd_client packets. </summary> @@ -60102,7 +60186,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_soundd_client_packets" lineno="80108"> +<interface name="corenet_sendrecv_soundd_client_packets" lineno="80126"> <summary> Send and receive soundd_client packets. </summary> @@ -60113,7 +60197,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80124"> +<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80142"> <summary> Do not audit attempts to send and receive soundd_client packets. </summary> @@ -60124,7 +60208,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_soundd_client_packets" lineno="80139"> +<interface name="corenet_relabelto_soundd_client_packets" lineno="80157"> <summary> Relabel packets to soundd_client the packet type. </summary> @@ -60134,7 +60218,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_soundd_server_packets" lineno="80159"> +<interface name="corenet_send_soundd_server_packets" lineno="80177"> <summary> Send soundd_server packets. </summary> @@ -60145,7 +60229,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80178"> +<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80196"> <summary> Do not audit attempts to send soundd_server packets. </summary> @@ -60156,7 +60240,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_soundd_server_packets" lineno="80197"> +<interface name="corenet_receive_soundd_server_packets" lineno="80215"> <summary> Receive soundd_server packets. </summary> @@ -60167,7 +60251,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80216"> +<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80234"> <summary> Do not audit attempts to receive soundd_server packets. </summary> @@ -60178,7 +60262,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_soundd_server_packets" lineno="80235"> +<interface name="corenet_sendrecv_soundd_server_packets" lineno="80253"> <summary> Send and receive soundd_server packets. </summary> @@ -60189,7 +60273,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80251"> +<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80269"> <summary> Do not audit attempts to send and receive soundd_server packets. </summary> @@ -60200,7 +60284,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_soundd_server_packets" lineno="80266"> +<interface name="corenet_relabelto_soundd_server_packets" lineno="80284"> <summary> Relabel packets to soundd_server the packet type. </summary> @@ -60210,7 +60294,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80288"> +<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80306"> <summary> Send and receive TCP traffic on the spamd port. </summary> @@ -60221,7 +60305,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_spamd_port" lineno="80303"> +<interface name="corenet_udp_send_spamd_port" lineno="80321"> <summary> Send UDP traffic on the spamd port. </summary> @@ -60232,7 +60316,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80318"> +<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80336"> <summary> Do not audit attempts to send UDP traffic on the spamd port. </summary> @@ -60243,7 +60327,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_spamd_port" lineno="80333"> +<interface name="corenet_udp_receive_spamd_port" lineno="80351"> <summary> Receive UDP traffic on the spamd port. </summary> @@ -60254,7 +60338,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80348"> +<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80366"> <summary> Do not audit attempts to receive UDP traffic on the spamd port. </summary> @@ -60265,7 +60349,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_spamd_port" lineno="80363"> +<interface name="corenet_udp_sendrecv_spamd_port" lineno="80381"> <summary> Send and receive UDP traffic on the spamd port. </summary> @@ -60276,7 +60360,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80379"> +<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80397"> <summary> Do not audit attempts to send and receive UDP traffic on the spamd port. @@ -60288,7 +60372,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_spamd_port" lineno="80394"> +<interface name="corenet_tcp_bind_spamd_port" lineno="80412"> <summary> Bind TCP sockets to the spamd port. </summary> @@ -60299,7 +60383,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_spamd_port" lineno="80414"> +<interface name="corenet_udp_bind_spamd_port" lineno="80432"> <summary> Bind UDP sockets to the spamd port. </summary> @@ -60310,7 +60394,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_spamd_port" lineno="80433"> +<interface name="corenet_tcp_connect_spamd_port" lineno="80451"> <summary> Make a TCP connection to the spamd port. </summary> @@ -60320,7 +60404,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_spamd_client_packets" lineno="80453"> +<interface name="corenet_send_spamd_client_packets" lineno="80471"> <summary> Send spamd_client packets. </summary> @@ -60331,7 +60415,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80472"> +<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80490"> <summary> Do not audit attempts to send spamd_client packets. </summary> @@ -60342,7 +60426,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_spamd_client_packets" lineno="80491"> +<interface name="corenet_receive_spamd_client_packets" lineno="80509"> <summary> Receive spamd_client packets. </summary> @@ -60353,7 +60437,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80510"> +<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80528"> <summary> Do not audit attempts to receive spamd_client packets. </summary> @@ -60364,7 +60448,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_spamd_client_packets" lineno="80529"> +<interface name="corenet_sendrecv_spamd_client_packets" lineno="80547"> <summary> Send and receive spamd_client packets. </summary> @@ -60375,7 +60459,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80545"> +<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80563"> <summary> Do not audit attempts to send and receive spamd_client packets. </summary> @@ -60386,7 +60470,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_spamd_client_packets" lineno="80560"> +<interface name="corenet_relabelto_spamd_client_packets" lineno="80578"> <summary> Relabel packets to spamd_client the packet type. </summary> @@ -60396,7 +60480,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_spamd_server_packets" lineno="80580"> +<interface name="corenet_send_spamd_server_packets" lineno="80598"> <summary> Send spamd_server packets. </summary> @@ -60407,7 +60491,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80599"> +<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80617"> <summary> Do not audit attempts to send spamd_server packets. </summary> @@ -60418,7 +60502,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_spamd_server_packets" lineno="80618"> +<interface name="corenet_receive_spamd_server_packets" lineno="80636"> <summary> Receive spamd_server packets. </summary> @@ -60429,7 +60513,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80637"> +<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80655"> <summary> Do not audit attempts to receive spamd_server packets. </summary> @@ -60440,7 +60524,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_spamd_server_packets" lineno="80656"> +<interface name="corenet_sendrecv_spamd_server_packets" lineno="80674"> <summary> Send and receive spamd_server packets. </summary> @@ -60451,7 +60535,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80672"> +<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80690"> <summary> Do not audit attempts to send and receive spamd_server packets. </summary> @@ -60462,7 +60546,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_spamd_server_packets" lineno="80687"> +<interface name="corenet_relabelto_spamd_server_packets" lineno="80705"> <summary> Relabel packets to spamd_server the packet type. </summary> @@ -60472,7 +60556,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_speech_port" lineno="80709"> +<interface name="corenet_tcp_sendrecv_speech_port" lineno="80727"> <summary> Send and receive TCP traffic on the speech port. </summary> @@ -60483,7 +60567,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_speech_port" lineno="80724"> +<interface name="corenet_udp_send_speech_port" lineno="80742"> <summary> Send UDP traffic on the speech port. </summary> @@ -60494,7 +60578,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80739"> +<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80757"> <summary> Do not audit attempts to send UDP traffic on the speech port. </summary> @@ -60505,7 +60589,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_speech_port" lineno="80754"> +<interface name="corenet_udp_receive_speech_port" lineno="80772"> <summary> Receive UDP traffic on the speech port. </summary> @@ -60516,7 +60600,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80769"> +<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80787"> <summary> Do not audit attempts to receive UDP traffic on the speech port. </summary> @@ -60527,7 +60611,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_speech_port" lineno="80784"> +<interface name="corenet_udp_sendrecv_speech_port" lineno="80802"> <summary> Send and receive UDP traffic on the speech port. </summary> @@ -60538,7 +60622,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80800"> +<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80818"> <summary> Do not audit attempts to send and receive UDP traffic on the speech port. @@ -60550,7 +60634,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_speech_port" lineno="80815"> +<interface name="corenet_tcp_bind_speech_port" lineno="80833"> <summary> Bind TCP sockets to the speech port. </summary> @@ -60561,7 +60645,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_speech_port" lineno="80835"> +<interface name="corenet_udp_bind_speech_port" lineno="80853"> <summary> Bind UDP sockets to the speech port. </summary> @@ -60572,7 +60656,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_speech_port" lineno="80854"> +<interface name="corenet_tcp_connect_speech_port" lineno="80872"> <summary> Make a TCP connection to the speech port. </summary> @@ -60582,7 +60666,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_speech_client_packets" lineno="80874"> +<interface name="corenet_send_speech_client_packets" lineno="80892"> <summary> Send speech_client packets. </summary> @@ -60593,7 +60677,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80893"> +<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80911"> <summary> Do not audit attempts to send speech_client packets. </summary> @@ -60604,7 +60688,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_speech_client_packets" lineno="80912"> +<interface name="corenet_receive_speech_client_packets" lineno="80930"> <summary> Receive speech_client packets. </summary> @@ -60615,7 +60699,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80931"> +<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80949"> <summary> Do not audit attempts to receive speech_client packets. </summary> @@ -60626,7 +60710,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_speech_client_packets" lineno="80950"> +<interface name="corenet_sendrecv_speech_client_packets" lineno="80968"> <summary> Send and receive speech_client packets. </summary> @@ -60637,7 +60721,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80966"> +<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80984"> <summary> Do not audit attempts to send and receive speech_client packets. </summary> @@ -60648,7 +60732,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_speech_client_packets" lineno="80981"> +<interface name="corenet_relabelto_speech_client_packets" lineno="80999"> <summary> Relabel packets to speech_client the packet type. </summary> @@ -60658,7 +60742,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_speech_server_packets" lineno="81001"> +<interface name="corenet_send_speech_server_packets" lineno="81019"> <summary> Send speech_server packets. </summary> @@ -60669,7 +60753,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81020"> +<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81038"> <summary> Do not audit attempts to send speech_server packets. </summary> @@ -60680,7 +60764,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_speech_server_packets" lineno="81039"> +<interface name="corenet_receive_speech_server_packets" lineno="81057"> <summary> Receive speech_server packets. </summary> @@ -60691,7 +60775,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81058"> +<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81076"> <summary> Do not audit attempts to receive speech_server packets. </summary> @@ -60702,7 +60786,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_speech_server_packets" lineno="81077"> +<interface name="corenet_sendrecv_speech_server_packets" lineno="81095"> <summary> Send and receive speech_server packets. </summary> @@ -60713,7 +60797,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81093"> +<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81111"> <summary> Do not audit attempts to send and receive speech_server packets. </summary> @@ -60724,7 +60808,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_speech_server_packets" lineno="81108"> +<interface name="corenet_relabelto_speech_server_packets" lineno="81126"> <summary> Relabel packets to speech_server the packet type. </summary> @@ -60734,7 +60818,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_squid_port" lineno="81130"> +<interface name="corenet_tcp_sendrecv_squid_port" lineno="81148"> <summary> Send and receive TCP traffic on the squid port. </summary> @@ -60745,7 +60829,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_squid_port" lineno="81145"> +<interface name="corenet_udp_send_squid_port" lineno="81163"> <summary> Send UDP traffic on the squid port. </summary> @@ -60756,7 +60840,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81160"> +<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81178"> <summary> Do not audit attempts to send UDP traffic on the squid port. </summary> @@ -60767,7 +60851,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_squid_port" lineno="81175"> +<interface name="corenet_udp_receive_squid_port" lineno="81193"> <summary> Receive UDP traffic on the squid port. </summary> @@ -60778,7 +60862,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81190"> +<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81208"> <summary> Do not audit attempts to receive UDP traffic on the squid port. </summary> @@ -60789,7 +60873,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_squid_port" lineno="81205"> +<interface name="corenet_udp_sendrecv_squid_port" lineno="81223"> <summary> Send and receive UDP traffic on the squid port. </summary> @@ -60800,7 +60884,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81221"> +<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81239"> <summary> Do not audit attempts to send and receive UDP traffic on the squid port. @@ -60812,7 +60896,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_squid_port" lineno="81236"> +<interface name="corenet_tcp_bind_squid_port" lineno="81254"> <summary> Bind TCP sockets to the squid port. </summary> @@ -60823,7 +60907,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_squid_port" lineno="81256"> +<interface name="corenet_udp_bind_squid_port" lineno="81274"> <summary> Bind UDP sockets to the squid port. </summary> @@ -60834,7 +60918,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_squid_port" lineno="81275"> +<interface name="corenet_tcp_connect_squid_port" lineno="81293"> <summary> Make a TCP connection to the squid port. </summary> @@ -60844,7 +60928,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_squid_client_packets" lineno="81295"> +<interface name="corenet_send_squid_client_packets" lineno="81313"> <summary> Send squid_client packets. </summary> @@ -60855,7 +60939,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81314"> +<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81332"> <summary> Do not audit attempts to send squid_client packets. </summary> @@ -60866,7 +60950,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_squid_client_packets" lineno="81333"> +<interface name="corenet_receive_squid_client_packets" lineno="81351"> <summary> Receive squid_client packets. </summary> @@ -60877,7 +60961,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81352"> +<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81370"> <summary> Do not audit attempts to receive squid_client packets. </summary> @@ -60888,7 +60972,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_squid_client_packets" lineno="81371"> +<interface name="corenet_sendrecv_squid_client_packets" lineno="81389"> <summary> Send and receive squid_client packets. </summary> @@ -60899,7 +60983,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81387"> +<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81405"> <summary> Do not audit attempts to send and receive squid_client packets. </summary> @@ -60910,7 +60994,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_squid_client_packets" lineno="81402"> +<interface name="corenet_relabelto_squid_client_packets" lineno="81420"> <summary> Relabel packets to squid_client the packet type. </summary> @@ -60920,7 +61004,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_squid_server_packets" lineno="81422"> +<interface name="corenet_send_squid_server_packets" lineno="81440"> <summary> Send squid_server packets. </summary> @@ -60931,7 +61015,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81441"> +<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81459"> <summary> Do not audit attempts to send squid_server packets. </summary> @@ -60942,7 +61026,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_squid_server_packets" lineno="81460"> +<interface name="corenet_receive_squid_server_packets" lineno="81478"> <summary> Receive squid_server packets. </summary> @@ -60953,7 +61037,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81479"> +<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81497"> <summary> Do not audit attempts to receive squid_server packets. </summary> @@ -60964,7 +61048,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_squid_server_packets" lineno="81498"> +<interface name="corenet_sendrecv_squid_server_packets" lineno="81516"> <summary> Send and receive squid_server packets. </summary> @@ -60975,7 +61059,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81514"> +<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81532"> <summary> Do not audit attempts to send and receive squid_server packets. </summary> @@ -60986,7 +61070,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_squid_server_packets" lineno="81529"> +<interface name="corenet_relabelto_squid_server_packets" lineno="81547"> <summary> Relabel packets to squid_server the packet type. </summary> @@ -60996,7 +61080,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81551"> +<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81569"> <summary> Send and receive TCP traffic on the ssdp port. </summary> @@ -61007,7 +61091,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ssdp_port" lineno="81566"> +<interface name="corenet_udp_send_ssdp_port" lineno="81584"> <summary> Send UDP traffic on the ssdp port. </summary> @@ -61018,7 +61102,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81581"> +<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81599"> <summary> Do not audit attempts to send UDP traffic on the ssdp port. </summary> @@ -61029,7 +61113,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ssdp_port" lineno="81596"> +<interface name="corenet_udp_receive_ssdp_port" lineno="81614"> <summary> Receive UDP traffic on the ssdp port. </summary> @@ -61040,7 +61124,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81611"> +<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81629"> <summary> Do not audit attempts to receive UDP traffic on the ssdp port. </summary> @@ -61051,7 +61135,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81626"> +<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81644"> <summary> Send and receive UDP traffic on the ssdp port. </summary> @@ -61062,7 +61146,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81642"> +<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81660"> <summary> Do not audit attempts to send and receive UDP traffic on the ssdp port. @@ -61074,7 +61158,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ssdp_port" lineno="81657"> +<interface name="corenet_tcp_bind_ssdp_port" lineno="81675"> <summary> Bind TCP sockets to the ssdp port. </summary> @@ -61085,7 +61169,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ssdp_port" lineno="81677"> +<interface name="corenet_udp_bind_ssdp_port" lineno="81695"> <summary> Bind UDP sockets to the ssdp port. </summary> @@ -61096,7 +61180,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ssdp_port" lineno="81696"> +<interface name="corenet_tcp_connect_ssdp_port" lineno="81714"> <summary> Make a TCP connection to the ssdp port. </summary> @@ -61106,7 +61190,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssdp_client_packets" lineno="81716"> +<interface name="corenet_send_ssdp_client_packets" lineno="81734"> <summary> Send ssdp_client packets. </summary> @@ -61117,7 +61201,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81735"> +<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81753"> <summary> Do not audit attempts to send ssdp_client packets. </summary> @@ -61128,7 +61212,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssdp_client_packets" lineno="81754"> +<interface name="corenet_receive_ssdp_client_packets" lineno="81772"> <summary> Receive ssdp_client packets. </summary> @@ -61139,7 +61223,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81773"> +<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81791"> <summary> Do not audit attempts to receive ssdp_client packets. </summary> @@ -61150,7 +61234,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81792"> +<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81810"> <summary> Send and receive ssdp_client packets. </summary> @@ -61161,7 +61245,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81808"> +<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81826"> <summary> Do not audit attempts to send and receive ssdp_client packets. </summary> @@ -61172,7 +61256,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssdp_client_packets" lineno="81823"> +<interface name="corenet_relabelto_ssdp_client_packets" lineno="81841"> <summary> Relabel packets to ssdp_client the packet type. </summary> @@ -61182,7 +61266,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssdp_server_packets" lineno="81843"> +<interface name="corenet_send_ssdp_server_packets" lineno="81861"> <summary> Send ssdp_server packets. </summary> @@ -61193,7 +61277,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81862"> +<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81880"> <summary> Do not audit attempts to send ssdp_server packets. </summary> @@ -61204,7 +61288,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssdp_server_packets" lineno="81881"> +<interface name="corenet_receive_ssdp_server_packets" lineno="81899"> <summary> Receive ssdp_server packets. </summary> @@ -61215,7 +61299,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81900"> +<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81918"> <summary> Do not audit attempts to receive ssdp_server packets. </summary> @@ -61226,7 +61310,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81919"> +<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81937"> <summary> Send and receive ssdp_server packets. </summary> @@ -61237,7 +61321,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81935"> +<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81953"> <summary> Do not audit attempts to send and receive ssdp_server packets. </summary> @@ -61248,7 +61332,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssdp_server_packets" lineno="81950"> +<interface name="corenet_relabelto_ssdp_server_packets" lineno="81968"> <summary> Relabel packets to ssdp_server the packet type. </summary> @@ -61258,7 +61342,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81972"> +<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81990"> <summary> Send and receive TCP traffic on the ssh port. </summary> @@ -61269,7 +61353,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ssh_port" lineno="81987"> +<interface name="corenet_udp_send_ssh_port" lineno="82005"> <summary> Send UDP traffic on the ssh port. </summary> @@ -61280,7 +61364,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82002"> +<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82020"> <summary> Do not audit attempts to send UDP traffic on the ssh port. </summary> @@ -61291,7 +61375,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ssh_port" lineno="82017"> +<interface name="corenet_udp_receive_ssh_port" lineno="82035"> <summary> Receive UDP traffic on the ssh port. </summary> @@ -61302,7 +61386,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82032"> +<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82050"> <summary> Do not audit attempts to receive UDP traffic on the ssh port. </summary> @@ -61313,7 +61397,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ssh_port" lineno="82047"> +<interface name="corenet_udp_sendrecv_ssh_port" lineno="82065"> <summary> Send and receive UDP traffic on the ssh port. </summary> @@ -61324,7 +61408,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82063"> +<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82081"> <summary> Do not audit attempts to send and receive UDP traffic on the ssh port. @@ -61336,7 +61420,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ssh_port" lineno="82078"> +<interface name="corenet_tcp_bind_ssh_port" lineno="82096"> <summary> Bind TCP sockets to the ssh port. </summary> @@ -61347,7 +61431,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ssh_port" lineno="82098"> +<interface name="corenet_udp_bind_ssh_port" lineno="82116"> <summary> Bind UDP sockets to the ssh port. </summary> @@ -61358,7 +61442,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ssh_port" lineno="82117"> +<interface name="corenet_tcp_connect_ssh_port" lineno="82135"> <summary> Make a TCP connection to the ssh port. </summary> @@ -61368,7 +61452,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssh_client_packets" lineno="82137"> +<interface name="corenet_send_ssh_client_packets" lineno="82155"> <summary> Send ssh_client packets. </summary> @@ -61379,7 +61463,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82156"> +<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82174"> <summary> Do not audit attempts to send ssh_client packets. </summary> @@ -61390,7 +61474,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssh_client_packets" lineno="82175"> +<interface name="corenet_receive_ssh_client_packets" lineno="82193"> <summary> Receive ssh_client packets. </summary> @@ -61401,7 +61485,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82194"> +<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82212"> <summary> Do not audit attempts to receive ssh_client packets. </summary> @@ -61412,7 +61496,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssh_client_packets" lineno="82213"> +<interface name="corenet_sendrecv_ssh_client_packets" lineno="82231"> <summary> Send and receive ssh_client packets. </summary> @@ -61423,7 +61507,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82229"> +<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82247"> <summary> Do not audit attempts to send and receive ssh_client packets. </summary> @@ -61434,7 +61518,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssh_client_packets" lineno="82244"> +<interface name="corenet_relabelto_ssh_client_packets" lineno="82262"> <summary> Relabel packets to ssh_client the packet type. </summary> @@ -61444,7 +61528,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssh_server_packets" lineno="82264"> +<interface name="corenet_send_ssh_server_packets" lineno="82282"> <summary> Send ssh_server packets. </summary> @@ -61455,7 +61539,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82283"> +<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82301"> <summary> Do not audit attempts to send ssh_server packets. </summary> @@ -61466,7 +61550,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssh_server_packets" lineno="82302"> +<interface name="corenet_receive_ssh_server_packets" lineno="82320"> <summary> Receive ssh_server packets. </summary> @@ -61477,7 +61561,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82321"> +<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82339"> <summary> Do not audit attempts to receive ssh_server packets. </summary> @@ -61488,7 +61572,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssh_server_packets" lineno="82340"> +<interface name="corenet_sendrecv_ssh_server_packets" lineno="82358"> <summary> Send and receive ssh_server packets. </summary> @@ -61499,7 +61583,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82356"> +<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82374"> <summary> Do not audit attempts to send and receive ssh_server packets. </summary> @@ -61510,7 +61594,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssh_server_packets" lineno="82371"> +<interface name="corenet_relabelto_ssh_server_packets" lineno="82389"> <summary> Relabel packets to ssh_server the packet type. </summary> @@ -61520,7 +61604,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82393"> +<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82411"> <summary> Send and receive TCP traffic on the stunnel port. </summary> @@ -61531,7 +61615,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_stunnel_port" lineno="82408"> +<interface name="corenet_udp_send_stunnel_port" lineno="82426"> <summary> Send UDP traffic on the stunnel port. </summary> @@ -61542,7 +61626,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82423"> +<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82441"> <summary> Do not audit attempts to send UDP traffic on the stunnel port. </summary> @@ -61553,7 +61637,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_stunnel_port" lineno="82438"> +<interface name="corenet_udp_receive_stunnel_port" lineno="82456"> <summary> Receive UDP traffic on the stunnel port. </summary> @@ -61564,7 +61648,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82453"> +<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82471"> <summary> Do not audit attempts to receive UDP traffic on the stunnel port. </summary> @@ -61575,7 +61659,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82468"> +<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82486"> <summary> Send and receive UDP traffic on the stunnel port. </summary> @@ -61586,7 +61670,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82484"> +<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82502"> <summary> Do not audit attempts to send and receive UDP traffic on the stunnel port. @@ -61598,7 +61682,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_stunnel_port" lineno="82499"> +<interface name="corenet_tcp_bind_stunnel_port" lineno="82517"> <summary> Bind TCP sockets to the stunnel port. </summary> @@ -61609,7 +61693,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_stunnel_port" lineno="82519"> +<interface name="corenet_udp_bind_stunnel_port" lineno="82537"> <summary> Bind UDP sockets to the stunnel port. </summary> @@ -61620,7 +61704,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_stunnel_port" lineno="82538"> +<interface name="corenet_tcp_connect_stunnel_port" lineno="82556"> <summary> Make a TCP connection to the stunnel port. </summary> @@ -61630,7 +61714,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_stunnel_client_packets" lineno="82558"> +<interface name="corenet_send_stunnel_client_packets" lineno="82576"> <summary> Send stunnel_client packets. </summary> @@ -61641,7 +61725,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82577"> +<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82595"> <summary> Do not audit attempts to send stunnel_client packets. </summary> @@ -61652,7 +61736,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_stunnel_client_packets" lineno="82596"> +<interface name="corenet_receive_stunnel_client_packets" lineno="82614"> <summary> Receive stunnel_client packets. </summary> @@ -61663,7 +61747,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82615"> +<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82633"> <summary> Do not audit attempts to receive stunnel_client packets. </summary> @@ -61674,7 +61758,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82634"> +<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82652"> <summary> Send and receive stunnel_client packets. </summary> @@ -61685,7 +61769,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82650"> +<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82668"> <summary> Do not audit attempts to send and receive stunnel_client packets. </summary> @@ -61696,7 +61780,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_stunnel_client_packets" lineno="82665"> +<interface name="corenet_relabelto_stunnel_client_packets" lineno="82683"> <summary> Relabel packets to stunnel_client the packet type. </summary> @@ -61706,7 +61790,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_stunnel_server_packets" lineno="82685"> +<interface name="corenet_send_stunnel_server_packets" lineno="82703"> <summary> Send stunnel_server packets. </summary> @@ -61717,7 +61801,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82704"> +<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82722"> <summary> Do not audit attempts to send stunnel_server packets. </summary> @@ -61728,7 +61812,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_stunnel_server_packets" lineno="82723"> +<interface name="corenet_receive_stunnel_server_packets" lineno="82741"> <summary> Receive stunnel_server packets. </summary> @@ -61739,7 +61823,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82742"> +<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82760"> <summary> Do not audit attempts to receive stunnel_server packets. </summary> @@ -61750,7 +61834,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82761"> +<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82779"> <summary> Send and receive stunnel_server packets. </summary> @@ -61761,7 +61845,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82777"> +<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82795"> <summary> Do not audit attempts to send and receive stunnel_server packets. </summary> @@ -61772,7 +61856,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_stunnel_server_packets" lineno="82792"> +<interface name="corenet_relabelto_stunnel_server_packets" lineno="82810"> <summary> Relabel packets to stunnel_server the packet type. </summary> @@ -61782,7 +61866,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_svn_port" lineno="82814"> +<interface name="corenet_tcp_sendrecv_svn_port" lineno="82832"> <summary> Send and receive TCP traffic on the svn port. </summary> @@ -61793,7 +61877,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_svn_port" lineno="82829"> +<interface name="corenet_udp_send_svn_port" lineno="82847"> <summary> Send UDP traffic on the svn port. </summary> @@ -61804,7 +61888,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82844"> +<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82862"> <summary> Do not audit attempts to send UDP traffic on the svn port. </summary> @@ -61815,7 +61899,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_svn_port" lineno="82859"> +<interface name="corenet_udp_receive_svn_port" lineno="82877"> <summary> Receive UDP traffic on the svn port. </summary> @@ -61826,7 +61910,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82874"> +<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82892"> <summary> Do not audit attempts to receive UDP traffic on the svn port. </summary> @@ -61837,7 +61921,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_svn_port" lineno="82889"> +<interface name="corenet_udp_sendrecv_svn_port" lineno="82907"> <summary> Send and receive UDP traffic on the svn port. </summary> @@ -61848,7 +61932,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82905"> +<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82923"> <summary> Do not audit attempts to send and receive UDP traffic on the svn port. @@ -61860,7 +61944,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_svn_port" lineno="82920"> +<interface name="corenet_tcp_bind_svn_port" lineno="82938"> <summary> Bind TCP sockets to the svn port. </summary> @@ -61871,7 +61955,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_svn_port" lineno="82940"> +<interface name="corenet_udp_bind_svn_port" lineno="82958"> <summary> Bind UDP sockets to the svn port. </summary> @@ -61882,7 +61966,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_svn_port" lineno="82959"> +<interface name="corenet_tcp_connect_svn_port" lineno="82977"> <summary> Make a TCP connection to the svn port. </summary> @@ -61892,7 +61976,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svn_client_packets" lineno="82979"> +<interface name="corenet_send_svn_client_packets" lineno="82997"> <summary> Send svn_client packets. </summary> @@ -61903,7 +61987,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82998"> +<interface name="corenet_dontaudit_send_svn_client_packets" lineno="83016"> <summary> Do not audit attempts to send svn_client packets. </summary> @@ -61914,7 +61998,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svn_client_packets" lineno="83017"> +<interface name="corenet_receive_svn_client_packets" lineno="83035"> <summary> Receive svn_client packets. </summary> @@ -61925,7 +62009,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83036"> +<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83054"> <summary> Do not audit attempts to receive svn_client packets. </summary> @@ -61936,7 +62020,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svn_client_packets" lineno="83055"> +<interface name="corenet_sendrecv_svn_client_packets" lineno="83073"> <summary> Send and receive svn_client packets. </summary> @@ -61947,7 +62031,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83071"> +<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83089"> <summary> Do not audit attempts to send and receive svn_client packets. </summary> @@ -61958,7 +62042,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svn_client_packets" lineno="83086"> +<interface name="corenet_relabelto_svn_client_packets" lineno="83104"> <summary> Relabel packets to svn_client the packet type. </summary> @@ -61968,7 +62052,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svn_server_packets" lineno="83106"> +<interface name="corenet_send_svn_server_packets" lineno="83124"> <summary> Send svn_server packets. </summary> @@ -61979,7 +62063,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83125"> +<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83143"> <summary> Do not audit attempts to send svn_server packets. </summary> @@ -61990,7 +62074,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svn_server_packets" lineno="83144"> +<interface name="corenet_receive_svn_server_packets" lineno="83162"> <summary> Receive svn_server packets. </summary> @@ -62001,7 +62085,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83163"> +<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83181"> <summary> Do not audit attempts to receive svn_server packets. </summary> @@ -62012,7 +62096,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svn_server_packets" lineno="83182"> +<interface name="corenet_sendrecv_svn_server_packets" lineno="83200"> <summary> Send and receive svn_server packets. </summary> @@ -62023,7 +62107,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83198"> +<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83216"> <summary> Do not audit attempts to send and receive svn_server packets. </summary> @@ -62034,7 +62118,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svn_server_packets" lineno="83213"> +<interface name="corenet_relabelto_svn_server_packets" lineno="83231"> <summary> Relabel packets to svn_server the packet type. </summary> @@ -62044,7 +62128,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83235"> +<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83253"> <summary> Send and receive TCP traffic on the svrloc port. </summary> @@ -62055,7 +62139,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_svrloc_port" lineno="83250"> +<interface name="corenet_udp_send_svrloc_port" lineno="83268"> <summary> Send UDP traffic on the svrloc port. </summary> @@ -62066,7 +62150,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83265"> +<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83283"> <summary> Do not audit attempts to send UDP traffic on the svrloc port. </summary> @@ -62077,7 +62161,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_svrloc_port" lineno="83280"> +<interface name="corenet_udp_receive_svrloc_port" lineno="83298"> <summary> Receive UDP traffic on the svrloc port. </summary> @@ -62088,7 +62172,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83295"> +<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83313"> <summary> Do not audit attempts to receive UDP traffic on the svrloc port. </summary> @@ -62099,7 +62183,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83310"> +<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83328"> <summary> Send and receive UDP traffic on the svrloc port. </summary> @@ -62110,7 +62194,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83326"> +<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83344"> <summary> Do not audit attempts to send and receive UDP traffic on the svrloc port. @@ -62122,7 +62206,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_svrloc_port" lineno="83341"> +<interface name="corenet_tcp_bind_svrloc_port" lineno="83359"> <summary> Bind TCP sockets to the svrloc port. </summary> @@ -62133,7 +62217,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_svrloc_port" lineno="83361"> +<interface name="corenet_udp_bind_svrloc_port" lineno="83379"> <summary> Bind UDP sockets to the svrloc port. </summary> @@ -62144,7 +62228,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_svrloc_port" lineno="83380"> +<interface name="corenet_tcp_connect_svrloc_port" lineno="83398"> <summary> Make a TCP connection to the svrloc port. </summary> @@ -62154,7 +62238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svrloc_client_packets" lineno="83400"> +<interface name="corenet_send_svrloc_client_packets" lineno="83418"> <summary> Send svrloc_client packets. </summary> @@ -62165,7 +62249,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83419"> +<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83437"> <summary> Do not audit attempts to send svrloc_client packets. </summary> @@ -62176,7 +62260,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svrloc_client_packets" lineno="83438"> +<interface name="corenet_receive_svrloc_client_packets" lineno="83456"> <summary> Receive svrloc_client packets. </summary> @@ -62187,7 +62271,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83457"> +<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83475"> <summary> Do not audit attempts to receive svrloc_client packets. </summary> @@ -62198,7 +62282,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83476"> +<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83494"> <summary> Send and receive svrloc_client packets. </summary> @@ -62209,7 +62293,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83492"> +<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83510"> <summary> Do not audit attempts to send and receive svrloc_client packets. </summary> @@ -62220,7 +62304,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svrloc_client_packets" lineno="83507"> +<interface name="corenet_relabelto_svrloc_client_packets" lineno="83525"> <summary> Relabel packets to svrloc_client the packet type. </summary> @@ -62230,7 +62314,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svrloc_server_packets" lineno="83527"> +<interface name="corenet_send_svrloc_server_packets" lineno="83545"> <summary> Send svrloc_server packets. </summary> @@ -62241,7 +62325,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83546"> +<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83564"> <summary> Do not audit attempts to send svrloc_server packets. </summary> @@ -62252,7 +62336,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svrloc_server_packets" lineno="83565"> +<interface name="corenet_receive_svrloc_server_packets" lineno="83583"> <summary> Receive svrloc_server packets. </summary> @@ -62263,7 +62347,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83584"> +<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83602"> <summary> Do not audit attempts to receive svrloc_server packets. </summary> @@ -62274,7 +62358,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83603"> +<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83621"> <summary> Send and receive svrloc_server packets. </summary> @@ -62285,7 +62369,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83619"> +<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83637"> <summary> Do not audit attempts to send and receive svrloc_server packets. </summary> @@ -62296,7 +62380,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svrloc_server_packets" lineno="83634"> +<interface name="corenet_relabelto_svrloc_server_packets" lineno="83652"> <summary> Relabel packets to svrloc_server the packet type. </summary> @@ -62306,7 +62390,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_swat_port" lineno="83656"> +<interface name="corenet_tcp_sendrecv_swat_port" lineno="83674"> <summary> Send and receive TCP traffic on the swat port. </summary> @@ -62317,7 +62401,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_swat_port" lineno="83671"> +<interface name="corenet_udp_send_swat_port" lineno="83689"> <summary> Send UDP traffic on the swat port. </summary> @@ -62328,7 +62412,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83686"> +<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83704"> <summary> Do not audit attempts to send UDP traffic on the swat port. </summary> @@ -62339,7 +62423,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_swat_port" lineno="83701"> +<interface name="corenet_udp_receive_swat_port" lineno="83719"> <summary> Receive UDP traffic on the swat port. </summary> @@ -62350,7 +62434,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83716"> +<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83734"> <summary> Do not audit attempts to receive UDP traffic on the swat port. </summary> @@ -62361,7 +62445,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_swat_port" lineno="83731"> +<interface name="corenet_udp_sendrecv_swat_port" lineno="83749"> <summary> Send and receive UDP traffic on the swat port. </summary> @@ -62372,7 +62456,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83747"> +<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83765"> <summary> Do not audit attempts to send and receive UDP traffic on the swat port. @@ -62384,7 +62468,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_swat_port" lineno="83762"> +<interface name="corenet_tcp_bind_swat_port" lineno="83780"> <summary> Bind TCP sockets to the swat port. </summary> @@ -62395,7 +62479,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_swat_port" lineno="83782"> +<interface name="corenet_udp_bind_swat_port" lineno="83800"> <summary> Bind UDP sockets to the swat port. </summary> @@ -62406,7 +62490,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_swat_port" lineno="83801"> +<interface name="corenet_tcp_connect_swat_port" lineno="83819"> <summary> Make a TCP connection to the swat port. </summary> @@ -62416,7 +62500,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_swat_client_packets" lineno="83821"> +<interface name="corenet_send_swat_client_packets" lineno="83839"> <summary> Send swat_client packets. </summary> @@ -62427,7 +62511,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83840"> +<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83858"> <summary> Do not audit attempts to send swat_client packets. </summary> @@ -62438,7 +62522,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_swat_client_packets" lineno="83859"> +<interface name="corenet_receive_swat_client_packets" lineno="83877"> <summary> Receive swat_client packets. </summary> @@ -62449,7 +62533,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83878"> +<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83896"> <summary> Do not audit attempts to receive swat_client packets. </summary> @@ -62460,7 +62544,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_swat_client_packets" lineno="83897"> +<interface name="corenet_sendrecv_swat_client_packets" lineno="83915"> <summary> Send and receive swat_client packets. </summary> @@ -62471,7 +62555,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83913"> +<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83931"> <summary> Do not audit attempts to send and receive swat_client packets. </summary> @@ -62482,7 +62566,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_swat_client_packets" lineno="83928"> +<interface name="corenet_relabelto_swat_client_packets" lineno="83946"> <summary> Relabel packets to swat_client the packet type. </summary> @@ -62492,7 +62576,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_swat_server_packets" lineno="83948"> +<interface name="corenet_send_swat_server_packets" lineno="83966"> <summary> Send swat_server packets. </summary> @@ -62503,7 +62587,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83967"> +<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83985"> <summary> Do not audit attempts to send swat_server packets. </summary> @@ -62514,7 +62598,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_swat_server_packets" lineno="83986"> +<interface name="corenet_receive_swat_server_packets" lineno="84004"> <summary> Receive swat_server packets. </summary> @@ -62525,7 +62609,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84005"> +<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84023"> <summary> Do not audit attempts to receive swat_server packets. </summary> @@ -62536,7 +62620,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_swat_server_packets" lineno="84024"> +<interface name="corenet_sendrecv_swat_server_packets" lineno="84042"> <summary> Send and receive swat_server packets. </summary> @@ -62547,7 +62631,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84040"> +<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84058"> <summary> Do not audit attempts to send and receive swat_server packets. </summary> @@ -62558,7 +62642,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_swat_server_packets" lineno="84055"> +<interface name="corenet_relabelto_swat_server_packets" lineno="84073"> <summary> Relabel packets to swat_server the packet type. </summary> @@ -62568,7 +62652,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84077"> +<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84095"> <summary> Send and receive TCP traffic on the syncthing port. </summary> @@ -62579,7 +62663,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_syncthing_port" lineno="84092"> +<interface name="corenet_udp_send_syncthing_port" lineno="84110"> <summary> Send UDP traffic on the syncthing port. </summary> @@ -62590,7 +62674,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84107"> +<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84125"> <summary> Do not audit attempts to send UDP traffic on the syncthing port. </summary> @@ -62601,7 +62685,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_syncthing_port" lineno="84122"> +<interface name="corenet_udp_receive_syncthing_port" lineno="84140"> <summary> Receive UDP traffic on the syncthing port. </summary> @@ -62612,7 +62696,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84137"> +<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84155"> <summary> Do not audit attempts to receive UDP traffic on the syncthing port. </summary> @@ -62623,7 +62707,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84152"> +<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84170"> <summary> Send and receive UDP traffic on the syncthing port. </summary> @@ -62634,7 +62718,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84168"> +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84186"> <summary> Do not audit attempts to send and receive UDP traffic on the syncthing port. @@ -62646,7 +62730,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_syncthing_port" lineno="84183"> +<interface name="corenet_tcp_bind_syncthing_port" lineno="84201"> <summary> Bind TCP sockets to the syncthing port. </summary> @@ -62657,7 +62741,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syncthing_port" lineno="84203"> +<interface name="corenet_udp_bind_syncthing_port" lineno="84221"> <summary> Bind UDP sockets to the syncthing port. </summary> @@ -62668,7 +62752,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syncthing_port" lineno="84222"> +<interface name="corenet_tcp_connect_syncthing_port" lineno="84240"> <summary> Make a TCP connection to the syncthing port. </summary> @@ -62678,7 +62762,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_client_packets" lineno="84242"> +<interface name="corenet_send_syncthing_client_packets" lineno="84260"> <summary> Send syncthing_client packets. </summary> @@ -62689,7 +62773,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84261"> +<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84279"> <summary> Do not audit attempts to send syncthing_client packets. </summary> @@ -62700,7 +62784,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_client_packets" lineno="84280"> +<interface name="corenet_receive_syncthing_client_packets" lineno="84298"> <summary> Receive syncthing_client packets. </summary> @@ -62711,7 +62795,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84299"> +<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84317"> <summary> Do not audit attempts to receive syncthing_client packets. </summary> @@ -62722,7 +62806,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84318"> +<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84336"> <summary> Send and receive syncthing_client packets. </summary> @@ -62733,7 +62817,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84334"> +<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84352"> <summary> Do not audit attempts to send and receive syncthing_client packets. </summary> @@ -62744,7 +62828,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_client_packets" lineno="84349"> +<interface name="corenet_relabelto_syncthing_client_packets" lineno="84367"> <summary> Relabel packets to syncthing_client the packet type. </summary> @@ -62754,7 +62838,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_server_packets" lineno="84369"> +<interface name="corenet_send_syncthing_server_packets" lineno="84387"> <summary> Send syncthing_server packets. </summary> @@ -62765,7 +62849,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84388"> +<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84406"> <summary> Do not audit attempts to send syncthing_server packets. </summary> @@ -62776,7 +62860,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_server_packets" lineno="84407"> +<interface name="corenet_receive_syncthing_server_packets" lineno="84425"> <summary> Receive syncthing_server packets. </summary> @@ -62787,7 +62871,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84426"> +<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84444"> <summary> Do not audit attempts to receive syncthing_server packets. </summary> @@ -62798,7 +62882,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84445"> +<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84463"> <summary> Send and receive syncthing_server packets. </summary> @@ -62809,7 +62893,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84461"> +<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84479"> <summary> Do not audit attempts to send and receive syncthing_server packets. </summary> @@ -62820,7 +62904,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_server_packets" lineno="84476"> +<interface name="corenet_relabelto_syncthing_server_packets" lineno="84494"> <summary> Relabel packets to syncthing_server the packet type. </summary> @@ -62830,7 +62914,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84498"> +<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84516"> <summary> Send and receive TCP traffic on the syncthing_admin port. </summary> @@ -62841,7 +62925,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_syncthing_admin_port" lineno="84513"> +<interface name="corenet_udp_send_syncthing_admin_port" lineno="84531"> <summary> Send UDP traffic on the syncthing_admin port. </summary> @@ -62852,7 +62936,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84528"> +<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84546"> <summary> Do not audit attempts to send UDP traffic on the syncthing_admin port. </summary> @@ -62863,7 +62947,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84543"> +<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84561"> <summary> Receive UDP traffic on the syncthing_admin port. </summary> @@ -62874,7 +62958,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84558"> +<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84576"> <summary> Do not audit attempts to receive UDP traffic on the syncthing_admin port. </summary> @@ -62885,7 +62969,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84573"> +<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84591"> <summary> Send and receive UDP traffic on the syncthing_admin port. </summary> @@ -62896,7 +62980,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84589"> +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84607"> <summary> Do not audit attempts to send and receive UDP traffic on the syncthing_admin port. @@ -62908,7 +62992,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84604"> +<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84622"> <summary> Bind TCP sockets to the syncthing_admin port. </summary> @@ -62919,7 +63003,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84624"> +<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84642"> <summary> Bind UDP sockets to the syncthing_admin port. </summary> @@ -62930,7 +63014,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84643"> +<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84661"> <summary> Make a TCP connection to the syncthing_admin port. </summary> @@ -62940,7 +63024,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_admin_client_packets" lineno="84663"> +<interface name="corenet_send_syncthing_admin_client_packets" lineno="84681"> <summary> Send syncthing_admin_client packets. </summary> @@ -62951,7 +63035,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84682"> +<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84700"> <summary> Do not audit attempts to send syncthing_admin_client packets. </summary> @@ -62962,7 +63046,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84701"> +<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84719"> <summary> Receive syncthing_admin_client packets. </summary> @@ -62973,7 +63057,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84720"> +<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84738"> <summary> Do not audit attempts to receive syncthing_admin_client packets. </summary> @@ -62984,7 +63068,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84739"> +<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84757"> <summary> Send and receive syncthing_admin_client packets. </summary> @@ -62995,7 +63079,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84755"> +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84773"> <summary> Do not audit attempts to send and receive syncthing_admin_client packets. </summary> @@ -63006,7 +63090,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84770"> +<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84788"> <summary> Relabel packets to syncthing_admin_client the packet type. </summary> @@ -63016,7 +63100,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_admin_server_packets" lineno="84790"> +<interface name="corenet_send_syncthing_admin_server_packets" lineno="84808"> <summary> Send syncthing_admin_server packets. </summary> @@ -63027,7 +63111,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84809"> +<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84827"> <summary> Do not audit attempts to send syncthing_admin_server packets. </summary> @@ -63038,7 +63122,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84828"> +<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84846"> <summary> Receive syncthing_admin_server packets. </summary> @@ -63049,7 +63133,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84847"> +<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84865"> <summary> Do not audit attempts to receive syncthing_admin_server packets. </summary> @@ -63060,7 +63144,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84866"> +<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84884"> <summary> Send and receive syncthing_admin_server packets. </summary> @@ -63071,7 +63155,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84882"> +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84900"> <summary> Do not audit attempts to send and receive syncthing_admin_server packets. </summary> @@ -63082,7 +63166,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84897"> +<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84915"> <summary> Relabel packets to syncthing_admin_server the packet type. </summary> @@ -63092,7 +63176,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84919"> +<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84937"> <summary> Send and receive TCP traffic on the syncthing_discovery port. </summary> @@ -63103,7 +63187,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84934"> +<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84952"> <summary> Send UDP traffic on the syncthing_discovery port. </summary> @@ -63114,7 +63198,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84949"> +<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84967"> <summary> Do not audit attempts to send UDP traffic on the syncthing_discovery port. </summary> @@ -63125,7 +63209,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84964"> +<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84982"> <summary> Receive UDP traffic on the syncthing_discovery port. </summary> @@ -63136,7 +63220,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84979"> +<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84997"> <summary> Do not audit attempts to receive UDP traffic on the syncthing_discovery port. </summary> @@ -63147,7 +63231,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84994"> +<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="85012"> <summary> Send and receive UDP traffic on the syncthing_discovery port. </summary> @@ -63158,7 +63242,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85010"> +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85028"> <summary> Do not audit attempts to send and receive UDP traffic on the syncthing_discovery port. @@ -63170,7 +63254,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85025"> +<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85043"> <summary> Bind TCP sockets to the syncthing_discovery port. </summary> @@ -63181,7 +63265,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85045"> +<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85063"> <summary> Bind UDP sockets to the syncthing_discovery port. </summary> @@ -63192,7 +63276,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85064"> +<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85082"> <summary> Make a TCP connection to the syncthing_discovery port. </summary> @@ -63202,7 +63286,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85084"> +<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85102"> <summary> Send syncthing_discovery_client packets. </summary> @@ -63213,7 +63297,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85103"> +<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85121"> <summary> Do not audit attempts to send syncthing_discovery_client packets. </summary> @@ -63224,7 +63308,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85122"> +<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85140"> <summary> Receive syncthing_discovery_client packets. </summary> @@ -63235,7 +63319,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85141"> +<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85159"> <summary> Do not audit attempts to receive syncthing_discovery_client packets. </summary> @@ -63246,7 +63330,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85160"> +<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85178"> <summary> Send and receive syncthing_discovery_client packets. </summary> @@ -63257,7 +63341,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85176"> +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85194"> <summary> Do not audit attempts to send and receive syncthing_discovery_client packets. </summary> @@ -63268,7 +63352,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85191"> +<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85209"> <summary> Relabel packets to syncthing_discovery_client the packet type. </summary> @@ -63278,7 +63362,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85211"> +<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85229"> <summary> Send syncthing_discovery_server packets. </summary> @@ -63289,7 +63373,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85230"> +<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85248"> <summary> Do not audit attempts to send syncthing_discovery_server packets. </summary> @@ -63300,7 +63384,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85249"> +<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85267"> <summary> Receive syncthing_discovery_server packets. </summary> @@ -63311,7 +63395,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85268"> +<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85286"> <summary> Do not audit attempts to receive syncthing_discovery_server packets. </summary> @@ -63322,7 +63406,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85287"> +<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85305"> <summary> Send and receive syncthing_discovery_server packets. </summary> @@ -63333,7 +63417,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85303"> +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85321"> <summary> Do not audit attempts to send and receive syncthing_discovery_server packets. </summary> @@ -63344,7 +63428,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85318"> +<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85336"> <summary> Relabel packets to syncthing_discovery_server the packet type. </summary> @@ -63354,7 +63438,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85340"> +<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85358"> <summary> Send and receive TCP traffic on the sype_transport port. </summary> @@ -63365,7 +63449,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_sype_transport_port" lineno="85355"> +<interface name="corenet_udp_send_sype_transport_port" lineno="85373"> <summary> Send UDP traffic on the sype_transport port. </summary> @@ -63376,7 +63460,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85370"> +<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85388"> <summary> Do not audit attempts to send UDP traffic on the sype_transport port. </summary> @@ -63387,7 +63471,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_sype_transport_port" lineno="85385"> +<interface name="corenet_udp_receive_sype_transport_port" lineno="85403"> <summary> Receive UDP traffic on the sype_transport port. </summary> @@ -63398,7 +63482,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85400"> +<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85418"> <summary> Do not audit attempts to receive UDP traffic on the sype_transport port. </summary> @@ -63409,7 +63493,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85415"> +<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85433"> <summary> Send and receive UDP traffic on the sype_transport port. </summary> @@ -63420,7 +63504,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85431"> +<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85449"> <summary> Do not audit attempts to send and receive UDP traffic on the sype_transport port. @@ -63432,7 +63516,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_sype_transport_port" lineno="85446"> +<interface name="corenet_tcp_bind_sype_transport_port" lineno="85464"> <summary> Bind TCP sockets to the sype_transport port. </summary> @@ -63443,7 +63527,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sype_transport_port" lineno="85466"> +<interface name="corenet_udp_bind_sype_transport_port" lineno="85484"> <summary> Bind UDP sockets to the sype_transport port. </summary> @@ -63454,7 +63538,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sype_transport_port" lineno="85485"> +<interface name="corenet_tcp_connect_sype_transport_port" lineno="85503"> <summary> Make a TCP connection to the sype_transport port. </summary> @@ -63464,7 +63548,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sype_transport_client_packets" lineno="85505"> +<interface name="corenet_send_sype_transport_client_packets" lineno="85523"> <summary> Send sype_transport_client packets. </summary> @@ -63475,7 +63559,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85524"> +<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85542"> <summary> Do not audit attempts to send sype_transport_client packets. </summary> @@ -63486,7 +63570,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sype_transport_client_packets" lineno="85543"> +<interface name="corenet_receive_sype_transport_client_packets" lineno="85561"> <summary> Receive sype_transport_client packets. </summary> @@ -63497,7 +63581,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85562"> +<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85580"> <summary> Do not audit attempts to receive sype_transport_client packets. </summary> @@ -63508,7 +63592,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85581"> +<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85599"> <summary> Send and receive sype_transport_client packets. </summary> @@ -63519,7 +63603,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85597"> +<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85615"> <summary> Do not audit attempts to send and receive sype_transport_client packets. </summary> @@ -63530,7 +63614,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85612"> +<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85630"> <summary> Relabel packets to sype_transport_client the packet type. </summary> @@ -63540,7 +63624,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sype_transport_server_packets" lineno="85632"> +<interface name="corenet_send_sype_transport_server_packets" lineno="85650"> <summary> Send sype_transport_server packets. </summary> @@ -63551,7 +63635,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85651"> +<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85669"> <summary> Do not audit attempts to send sype_transport_server packets. </summary> @@ -63562,7 +63646,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sype_transport_server_packets" lineno="85670"> +<interface name="corenet_receive_sype_transport_server_packets" lineno="85688"> <summary> Receive sype_transport_server packets. </summary> @@ -63573,7 +63657,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85689"> +<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85707"> <summary> Do not audit attempts to receive sype_transport_server packets. </summary> @@ -63584,7 +63668,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85708"> +<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85726"> <summary> Send and receive sype_transport_server packets. </summary> @@ -63595,7 +63679,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85724"> +<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85742"> <summary> Do not audit attempts to send and receive sype_transport_server packets. </summary> @@ -63606,7 +63690,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85739"> +<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85757"> <summary> Relabel packets to sype_transport_server the packet type. </summary> @@ -63616,7 +63700,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85761"> +<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85779"> <summary> Send and receive TCP traffic on the syslogd port. </summary> @@ -63627,7 +63711,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_syslogd_port" lineno="85776"> +<interface name="corenet_udp_send_syslogd_port" lineno="85794"> <summary> Send UDP traffic on the syslogd port. </summary> @@ -63638,7 +63722,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85791"> +<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85809"> <summary> Do not audit attempts to send UDP traffic on the syslogd port. </summary> @@ -63649,7 +63733,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_syslogd_port" lineno="85806"> +<interface name="corenet_udp_receive_syslogd_port" lineno="85824"> <summary> Receive UDP traffic on the syslogd port. </summary> @@ -63660,7 +63744,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85821"> +<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85839"> <summary> Do not audit attempts to receive UDP traffic on the syslogd port. </summary> @@ -63671,7 +63755,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85836"> +<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85854"> <summary> Send and receive UDP traffic on the syslogd port. </summary> @@ -63682,7 +63766,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85852"> +<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85870"> <summary> Do not audit attempts to send and receive UDP traffic on the syslogd port. @@ -63694,7 +63778,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_syslogd_port" lineno="85867"> +<interface name="corenet_tcp_bind_syslogd_port" lineno="85885"> <summary> Bind TCP sockets to the syslogd port. </summary> @@ -63705,7 +63789,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syslogd_port" lineno="85887"> +<interface name="corenet_udp_bind_syslogd_port" lineno="85905"> <summary> Bind UDP sockets to the syslogd port. </summary> @@ -63716,7 +63800,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syslogd_port" lineno="85906"> +<interface name="corenet_tcp_connect_syslogd_port" lineno="85924"> <summary> Make a TCP connection to the syslogd port. </summary> @@ -63726,7 +63810,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslogd_client_packets" lineno="85926"> +<interface name="corenet_send_syslogd_client_packets" lineno="85944"> <summary> Send syslogd_client packets. </summary> @@ -63737,7 +63821,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85945"> +<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85963"> <summary> Do not audit attempts to send syslogd_client packets. </summary> @@ -63748,7 +63832,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslogd_client_packets" lineno="85964"> +<interface name="corenet_receive_syslogd_client_packets" lineno="85982"> <summary> Receive syslogd_client packets. </summary> @@ -63759,7 +63843,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85983"> +<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="86001"> <summary> Do not audit attempts to receive syslogd_client packets. </summary> @@ -63770,7 +63854,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86002"> +<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86020"> <summary> Send and receive syslogd_client packets. </summary> @@ -63781,7 +63865,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86018"> +<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86036"> <summary> Do not audit attempts to send and receive syslogd_client packets. </summary> @@ -63792,7 +63876,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslogd_client_packets" lineno="86033"> +<interface name="corenet_relabelto_syslogd_client_packets" lineno="86051"> <summary> Relabel packets to syslogd_client the packet type. </summary> @@ -63802,7 +63886,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslogd_server_packets" lineno="86053"> +<interface name="corenet_send_syslogd_server_packets" lineno="86071"> <summary> Send syslogd_server packets. </summary> @@ -63813,7 +63897,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86072"> +<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86090"> <summary> Do not audit attempts to send syslogd_server packets. </summary> @@ -63824,7 +63908,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslogd_server_packets" lineno="86091"> +<interface name="corenet_receive_syslogd_server_packets" lineno="86109"> <summary> Receive syslogd_server packets. </summary> @@ -63835,7 +63919,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86110"> +<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86128"> <summary> Do not audit attempts to receive syslogd_server packets. </summary> @@ -63846,7 +63930,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86129"> +<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86147"> <summary> Send and receive syslogd_server packets. </summary> @@ -63857,7 +63941,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86145"> +<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86163"> <summary> Do not audit attempts to send and receive syslogd_server packets. </summary> @@ -63868,7 +63952,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslogd_server_packets" lineno="86160"> +<interface name="corenet_relabelto_syslogd_server_packets" lineno="86178"> <summary> Relabel packets to syslogd_server the packet type. </summary> @@ -63878,7 +63962,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86182"> +<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86200"> <summary> Send and receive TCP traffic on the syslog_tls port. </summary> @@ -63889,7 +63973,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_syslog_tls_port" lineno="86197"> +<interface name="corenet_udp_send_syslog_tls_port" lineno="86215"> <summary> Send UDP traffic on the syslog_tls port. </summary> @@ -63900,7 +63984,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86212"> +<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86230"> <summary> Do not audit attempts to send UDP traffic on the syslog_tls port. </summary> @@ -63911,7 +63995,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_syslog_tls_port" lineno="86227"> +<interface name="corenet_udp_receive_syslog_tls_port" lineno="86245"> <summary> Receive UDP traffic on the syslog_tls port. </summary> @@ -63922,7 +64006,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86242"> +<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86260"> <summary> Do not audit attempts to receive UDP traffic on the syslog_tls port. </summary> @@ -63933,7 +64017,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86257"> +<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86275"> <summary> Send and receive UDP traffic on the syslog_tls port. </summary> @@ -63944,7 +64028,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86273"> +<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86291"> <summary> Do not audit attempts to send and receive UDP traffic on the syslog_tls port. @@ -63956,7 +64040,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86288"> +<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86306"> <summary> Bind TCP sockets to the syslog_tls port. </summary> @@ -63967,7 +64051,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syslog_tls_port" lineno="86308"> +<interface name="corenet_udp_bind_syslog_tls_port" lineno="86326"> <summary> Bind UDP sockets to the syslog_tls port. </summary> @@ -63978,7 +64062,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86327"> +<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86345"> <summary> Make a TCP connection to the syslog_tls port. </summary> @@ -63988,7 +64072,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslog_tls_client_packets" lineno="86347"> +<interface name="corenet_send_syslog_tls_client_packets" lineno="86365"> <summary> Send syslog_tls_client packets. </summary> @@ -63999,7 +64083,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86366"> +<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86384"> <summary> Do not audit attempts to send syslog_tls_client packets. </summary> @@ -64010,7 +64094,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslog_tls_client_packets" lineno="86385"> +<interface name="corenet_receive_syslog_tls_client_packets" lineno="86403"> <summary> Receive syslog_tls_client packets. </summary> @@ -64021,7 +64105,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86404"> +<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86422"> <summary> Do not audit attempts to receive syslog_tls_client packets. </summary> @@ -64032,7 +64116,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86423"> +<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86441"> <summary> Send and receive syslog_tls_client packets. </summary> @@ -64043,7 +64127,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86439"> +<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86457"> <summary> Do not audit attempts to send and receive syslog_tls_client packets. </summary> @@ -64054,7 +64138,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86454"> +<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86472"> <summary> Relabel packets to syslog_tls_client the packet type. </summary> @@ -64064,7 +64148,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslog_tls_server_packets" lineno="86474"> +<interface name="corenet_send_syslog_tls_server_packets" lineno="86492"> <summary> Send syslog_tls_server packets. </summary> @@ -64075,7 +64159,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86493"> +<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86511"> <summary> Do not audit attempts to send syslog_tls_server packets. </summary> @@ -64086,7 +64170,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslog_tls_server_packets" lineno="86512"> +<interface name="corenet_receive_syslog_tls_server_packets" lineno="86530"> <summary> Receive syslog_tls_server packets. </summary> @@ -64097,7 +64181,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86531"> +<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86549"> <summary> Do not audit attempts to receive syslog_tls_server packets. </summary> @@ -64108,7 +64192,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86550"> +<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86568"> <summary> Send and receive syslog_tls_server packets. </summary> @@ -64119,7 +64203,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86566"> +<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86584"> <summary> Do not audit attempts to send and receive syslog_tls_server packets. </summary> @@ -64130,7 +64214,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86581"> +<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86599"> <summary> Relabel packets to syslog_tls_server the packet type. </summary> @@ -64140,7 +64224,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86603"> +<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86621"> <summary> Send and receive TCP traffic on the tcs port. </summary> @@ -64151,7 +64235,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_tcs_port" lineno="86618"> +<interface name="corenet_udp_send_tcs_port" lineno="86636"> <summary> Send UDP traffic on the tcs port. </summary> @@ -64162,7 +64246,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86633"> +<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86651"> <summary> Do not audit attempts to send UDP traffic on the tcs port. </summary> @@ -64173,7 +64257,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_tcs_port" lineno="86648"> +<interface name="corenet_udp_receive_tcs_port" lineno="86666"> <summary> Receive UDP traffic on the tcs port. </summary> @@ -64184,7 +64268,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86663"> +<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86681"> <summary> Do not audit attempts to receive UDP traffic on the tcs port. </summary> @@ -64195,7 +64279,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_tcs_port" lineno="86678"> +<interface name="corenet_udp_sendrecv_tcs_port" lineno="86696"> <summary> Send and receive UDP traffic on the tcs port. </summary> @@ -64206,7 +64290,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86694"> +<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86712"> <summary> Do not audit attempts to send and receive UDP traffic on the tcs port. @@ -64218,7 +64302,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_tcs_port" lineno="86709"> +<interface name="corenet_tcp_bind_tcs_port" lineno="86727"> <summary> Bind TCP sockets to the tcs port. </summary> @@ -64229,7 +64313,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_tcs_port" lineno="86729"> +<interface name="corenet_udp_bind_tcs_port" lineno="86747"> <summary> Bind UDP sockets to the tcs port. </summary> @@ -64240,7 +64324,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_tcs_port" lineno="86748"> +<interface name="corenet_tcp_connect_tcs_port" lineno="86766"> <summary> Make a TCP connection to the tcs port. </summary> @@ -64250,7 +64334,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tcs_client_packets" lineno="86768"> +<interface name="corenet_send_tcs_client_packets" lineno="86786"> <summary> Send tcs_client packets. </summary> @@ -64261,7 +64345,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86787"> +<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86805"> <summary> Do not audit attempts to send tcs_client packets. </summary> @@ -64272,7 +64356,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tcs_client_packets" lineno="86806"> +<interface name="corenet_receive_tcs_client_packets" lineno="86824"> <summary> Receive tcs_client packets. </summary> @@ -64283,7 +64367,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86825"> +<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86843"> <summary> Do not audit attempts to receive tcs_client packets. </summary> @@ -64294,7 +64378,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tcs_client_packets" lineno="86844"> +<interface name="corenet_sendrecv_tcs_client_packets" lineno="86862"> <summary> Send and receive tcs_client packets. </summary> @@ -64305,7 +64389,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86860"> +<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86878"> <summary> Do not audit attempts to send and receive tcs_client packets. </summary> @@ -64316,7 +64400,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tcs_client_packets" lineno="86875"> +<interface name="corenet_relabelto_tcs_client_packets" lineno="86893"> <summary> Relabel packets to tcs_client the packet type. </summary> @@ -64326,7 +64410,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tcs_server_packets" lineno="86895"> +<interface name="corenet_send_tcs_server_packets" lineno="86913"> <summary> Send tcs_server packets. </summary> @@ -64337,7 +64421,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86914"> +<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86932"> <summary> Do not audit attempts to send tcs_server packets. </summary> @@ -64348,7 +64432,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tcs_server_packets" lineno="86933"> +<interface name="corenet_receive_tcs_server_packets" lineno="86951"> <summary> Receive tcs_server packets. </summary> @@ -64359,7 +64443,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86952"> +<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86970"> <summary> Do not audit attempts to receive tcs_server packets. </summary> @@ -64370,7 +64454,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tcs_server_packets" lineno="86971"> +<interface name="corenet_sendrecv_tcs_server_packets" lineno="86989"> <summary> Send and receive tcs_server packets. </summary> @@ -64381,7 +64465,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86987"> +<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="87005"> <summary> Do not audit attempts to send and receive tcs_server packets. </summary> @@ -64392,7 +64476,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tcs_server_packets" lineno="87002"> +<interface name="corenet_relabelto_tcs_server_packets" lineno="87020"> <summary> Relabel packets to tcs_server the packet type. </summary> @@ -64402,7 +64486,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87024"> +<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87042"> <summary> Send and receive TCP traffic on the telnetd port. </summary> @@ -64413,7 +64497,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_telnetd_port" lineno="87039"> +<interface name="corenet_udp_send_telnetd_port" lineno="87057"> <summary> Send UDP traffic on the telnetd port. </summary> @@ -64424,7 +64508,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87054"> +<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87072"> <summary> Do not audit attempts to send UDP traffic on the telnetd port. </summary> @@ -64435,7 +64519,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_telnetd_port" lineno="87069"> +<interface name="corenet_udp_receive_telnetd_port" lineno="87087"> <summary> Receive UDP traffic on the telnetd port. </summary> @@ -64446,7 +64530,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87084"> +<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87102"> <summary> Do not audit attempts to receive UDP traffic on the telnetd port. </summary> @@ -64457,7 +64541,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87099"> +<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87117"> <summary> Send and receive UDP traffic on the telnetd port. </summary> @@ -64468,7 +64552,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87115"> +<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87133"> <summary> Do not audit attempts to send and receive UDP traffic on the telnetd port. @@ -64480,7 +64564,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_telnetd_port" lineno="87130"> +<interface name="corenet_tcp_bind_telnetd_port" lineno="87148"> <summary> Bind TCP sockets to the telnetd port. </summary> @@ -64491,7 +64575,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_telnetd_port" lineno="87150"> +<interface name="corenet_udp_bind_telnetd_port" lineno="87168"> <summary> Bind UDP sockets to the telnetd port. </summary> @@ -64502,7 +64586,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_telnetd_port" lineno="87169"> +<interface name="corenet_tcp_connect_telnetd_port" lineno="87187"> <summary> Make a TCP connection to the telnetd port. </summary> @@ -64512,7 +64596,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_telnetd_client_packets" lineno="87189"> +<interface name="corenet_send_telnetd_client_packets" lineno="87207"> <summary> Send telnetd_client packets. </summary> @@ -64523,7 +64607,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87208"> +<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87226"> <summary> Do not audit attempts to send telnetd_client packets. </summary> @@ -64534,7 +64618,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_telnetd_client_packets" lineno="87227"> +<interface name="corenet_receive_telnetd_client_packets" lineno="87245"> <summary> Receive telnetd_client packets. </summary> @@ -64545,7 +64629,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87246"> +<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87264"> <summary> Do not audit attempts to receive telnetd_client packets. </summary> @@ -64556,7 +64640,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87265"> +<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87283"> <summary> Send and receive telnetd_client packets. </summary> @@ -64567,7 +64651,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87281"> +<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87299"> <summary> Do not audit attempts to send and receive telnetd_client packets. </summary> @@ -64578,7 +64662,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_telnetd_client_packets" lineno="87296"> +<interface name="corenet_relabelto_telnetd_client_packets" lineno="87314"> <summary> Relabel packets to telnetd_client the packet type. </summary> @@ -64588,7 +64672,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_telnetd_server_packets" lineno="87316"> +<interface name="corenet_send_telnetd_server_packets" lineno="87334"> <summary> Send telnetd_server packets. </summary> @@ -64599,7 +64683,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87335"> +<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87353"> <summary> Do not audit attempts to send telnetd_server packets. </summary> @@ -64610,7 +64694,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_telnetd_server_packets" lineno="87354"> +<interface name="corenet_receive_telnetd_server_packets" lineno="87372"> <summary> Receive telnetd_server packets. </summary> @@ -64621,7 +64705,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87373"> +<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87391"> <summary> Do not audit attempts to receive telnetd_server packets. </summary> @@ -64632,7 +64716,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87392"> +<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87410"> <summary> Send and receive telnetd_server packets. </summary> @@ -64643,7 +64727,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87408"> +<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87426"> <summary> Do not audit attempts to send and receive telnetd_server packets. </summary> @@ -64654,7 +64738,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_telnetd_server_packets" lineno="87423"> +<interface name="corenet_relabelto_telnetd_server_packets" lineno="87441"> <summary> Relabel packets to telnetd_server the packet type. </summary> @@ -64664,7 +64748,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87445"> +<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87463"> <summary> Send and receive TCP traffic on the tftp port. </summary> @@ -64675,7 +64759,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_tftp_port" lineno="87460"> +<interface name="corenet_udp_send_tftp_port" lineno="87478"> <summary> Send UDP traffic on the tftp port. </summary> @@ -64686,7 +64770,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87475"> +<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87493"> <summary> Do not audit attempts to send UDP traffic on the tftp port. </summary> @@ -64697,7 +64781,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_tftp_port" lineno="87490"> +<interface name="corenet_udp_receive_tftp_port" lineno="87508"> <summary> Receive UDP traffic on the tftp port. </summary> @@ -64708,7 +64792,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87505"> +<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87523"> <summary> Do not audit attempts to receive UDP traffic on the tftp port. </summary> @@ -64719,7 +64803,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_tftp_port" lineno="87520"> +<interface name="corenet_udp_sendrecv_tftp_port" lineno="87538"> <summary> Send and receive UDP traffic on the tftp port. </summary> @@ -64730,7 +64814,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87536"> +<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87554"> <summary> Do not audit attempts to send and receive UDP traffic on the tftp port. @@ -64742,7 +64826,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_tftp_port" lineno="87551"> +<interface name="corenet_tcp_bind_tftp_port" lineno="87569"> <summary> Bind TCP sockets to the tftp port. </summary> @@ -64753,7 +64837,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_tftp_port" lineno="87571"> +<interface name="corenet_udp_bind_tftp_port" lineno="87589"> <summary> Bind UDP sockets to the tftp port. </summary> @@ -64764,7 +64848,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_tftp_port" lineno="87590"> +<interface name="corenet_tcp_connect_tftp_port" lineno="87608"> <summary> Make a TCP connection to the tftp port. </summary> @@ -64774,7 +64858,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tftp_client_packets" lineno="87610"> +<interface name="corenet_send_tftp_client_packets" lineno="87628"> <summary> Send tftp_client packets. </summary> @@ -64785,7 +64869,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87629"> +<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87647"> <summary> Do not audit attempts to send tftp_client packets. </summary> @@ -64796,7 +64880,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tftp_client_packets" lineno="87648"> +<interface name="corenet_receive_tftp_client_packets" lineno="87666"> <summary> Receive tftp_client packets. </summary> @@ -64807,7 +64891,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87667"> +<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87685"> <summary> Do not audit attempts to receive tftp_client packets. </summary> @@ -64818,7 +64902,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tftp_client_packets" lineno="87686"> +<interface name="corenet_sendrecv_tftp_client_packets" lineno="87704"> <summary> Send and receive tftp_client packets. </summary> @@ -64829,7 +64913,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87702"> +<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87720"> <summary> Do not audit attempts to send and receive tftp_client packets. </summary> @@ -64840,7 +64924,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tftp_client_packets" lineno="87717"> +<interface name="corenet_relabelto_tftp_client_packets" lineno="87735"> <summary> Relabel packets to tftp_client the packet type. </summary> @@ -64850,7 +64934,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tftp_server_packets" lineno="87737"> +<interface name="corenet_send_tftp_server_packets" lineno="87755"> <summary> Send tftp_server packets. </summary> @@ -64861,7 +64945,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87756"> +<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87774"> <summary> Do not audit attempts to send tftp_server packets. </summary> @@ -64872,7 +64956,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tftp_server_packets" lineno="87775"> +<interface name="corenet_receive_tftp_server_packets" lineno="87793"> <summary> Receive tftp_server packets. </summary> @@ -64883,7 +64967,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87794"> +<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87812"> <summary> Do not audit attempts to receive tftp_server packets. </summary> @@ -64894,7 +64978,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tftp_server_packets" lineno="87813"> +<interface name="corenet_sendrecv_tftp_server_packets" lineno="87831"> <summary> Send and receive tftp_server packets. </summary> @@ -64905,7 +64989,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87829"> +<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87847"> <summary> Do not audit attempts to send and receive tftp_server packets. </summary> @@ -64916,7 +65000,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tftp_server_packets" lineno="87844"> +<interface name="corenet_relabelto_tftp_server_packets" lineno="87862"> <summary> Relabel packets to tftp_server the packet type. </summary> @@ -64926,7 +65010,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_tor_port" lineno="87866"> +<interface name="corenet_tcp_sendrecv_tor_port" lineno="87884"> <summary> Send and receive TCP traffic on the tor port. </summary> @@ -64937,7 +65021,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_tor_port" lineno="87881"> +<interface name="corenet_udp_send_tor_port" lineno="87899"> <summary> Send UDP traffic on the tor port. </summary> @@ -64948,7 +65032,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87896"> +<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87914"> <summary> Do not audit attempts to send UDP traffic on the tor port. </summary> @@ -64959,7 +65043,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_tor_port" lineno="87911"> +<interface name="corenet_udp_receive_tor_port" lineno="87929"> <summary> Receive UDP traffic on the tor port. </summary> @@ -64970,7 +65054,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87926"> +<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87944"> <summary> Do not audit attempts to receive UDP traffic on the tor port. </summary> @@ -64981,7 +65065,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_tor_port" lineno="87941"> +<interface name="corenet_udp_sendrecv_tor_port" lineno="87959"> <summary> Send and receive UDP traffic on the tor port. </summary> @@ -64992,7 +65076,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87957"> +<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87975"> <summary> Do not audit attempts to send and receive UDP traffic on the tor port. @@ -65004,7 +65088,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_tor_port" lineno="87972"> +<interface name="corenet_tcp_bind_tor_port" lineno="87990"> <summary> Bind TCP sockets to the tor port. </summary> @@ -65015,7 +65099,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_tor_port" lineno="87992"> +<interface name="corenet_udp_bind_tor_port" lineno="88010"> <summary> Bind UDP sockets to the tor port. </summary> @@ -65026,7 +65110,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_tor_port" lineno="88011"> +<interface name="corenet_tcp_connect_tor_port" lineno="88029"> <summary> Make a TCP connection to the tor port. </summary> @@ -65036,7 +65120,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tor_client_packets" lineno="88031"> +<interface name="corenet_send_tor_client_packets" lineno="88049"> <summary> Send tor_client packets. </summary> @@ -65047,7 +65131,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88050"> +<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88068"> <summary> Do not audit attempts to send tor_client packets. </summary> @@ -65058,7 +65142,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tor_client_packets" lineno="88069"> +<interface name="corenet_receive_tor_client_packets" lineno="88087"> <summary> Receive tor_client packets. </summary> @@ -65069,7 +65153,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88088"> +<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88106"> <summary> Do not audit attempts to receive tor_client packets. </summary> @@ -65080,7 +65164,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tor_client_packets" lineno="88107"> +<interface name="corenet_sendrecv_tor_client_packets" lineno="88125"> <summary> Send and receive tor_client packets. </summary> @@ -65091,7 +65175,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88123"> +<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88141"> <summary> Do not audit attempts to send and receive tor_client packets. </summary> @@ -65102,7 +65186,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tor_client_packets" lineno="88138"> +<interface name="corenet_relabelto_tor_client_packets" lineno="88156"> <summary> Relabel packets to tor_client the packet type. </summary> @@ -65112,7 +65196,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tor_server_packets" lineno="88158"> +<interface name="corenet_send_tor_server_packets" lineno="88176"> <summary> Send tor_server packets. </summary> @@ -65123,7 +65207,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88177"> +<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88195"> <summary> Do not audit attempts to send tor_server packets. </summary> @@ -65134,7 +65218,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tor_server_packets" lineno="88196"> +<interface name="corenet_receive_tor_server_packets" lineno="88214"> <summary> Receive tor_server packets. </summary> @@ -65145,7 +65229,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88215"> +<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88233"> <summary> Do not audit attempts to receive tor_server packets. </summary> @@ -65156,7 +65240,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tor_server_packets" lineno="88234"> +<interface name="corenet_sendrecv_tor_server_packets" lineno="88252"> <summary> Send and receive tor_server packets. </summary> @@ -65167,7 +65251,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88250"> +<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88268"> <summary> Do not audit attempts to send and receive tor_server packets. </summary> @@ -65178,7 +65262,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tor_server_packets" lineno="88265"> +<interface name="corenet_relabelto_tor_server_packets" lineno="88283"> <summary> Relabel packets to tor_server the packet type. </summary> @@ -65188,7 +65272,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88287"> +<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88305"> <summary> Send and receive TCP traffic on the traceroute port. </summary> @@ -65199,7 +65283,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_traceroute_port" lineno="88302"> +<interface name="corenet_udp_send_traceroute_port" lineno="88320"> <summary> Send UDP traffic on the traceroute port. </summary> @@ -65210,7 +65294,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88317"> +<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88335"> <summary> Do not audit attempts to send UDP traffic on the traceroute port. </summary> @@ -65221,7 +65305,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_traceroute_port" lineno="88332"> +<interface name="corenet_udp_receive_traceroute_port" lineno="88350"> <summary> Receive UDP traffic on the traceroute port. </summary> @@ -65232,7 +65316,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88347"> +<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88365"> <summary> Do not audit attempts to receive UDP traffic on the traceroute port. </summary> @@ -65243,7 +65327,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88362"> +<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88380"> <summary> Send and receive UDP traffic on the traceroute port. </summary> @@ -65254,7 +65338,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88378"> +<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88396"> <summary> Do not audit attempts to send and receive UDP traffic on the traceroute port. @@ -65266,7 +65350,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_traceroute_port" lineno="88393"> +<interface name="corenet_tcp_bind_traceroute_port" lineno="88411"> <summary> Bind TCP sockets to the traceroute port. </summary> @@ -65277,7 +65361,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_traceroute_port" lineno="88413"> +<interface name="corenet_udp_bind_traceroute_port" lineno="88431"> <summary> Bind UDP sockets to the traceroute port. </summary> @@ -65288,7 +65372,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_traceroute_port" lineno="88432"> +<interface name="corenet_tcp_connect_traceroute_port" lineno="88450"> <summary> Make a TCP connection to the traceroute port. </summary> @@ -65298,7 +65382,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_traceroute_client_packets" lineno="88452"> +<interface name="corenet_send_traceroute_client_packets" lineno="88470"> <summary> Send traceroute_client packets. </summary> @@ -65309,7 +65393,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88471"> +<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88489"> <summary> Do not audit attempts to send traceroute_client packets. </summary> @@ -65320,7 +65404,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_traceroute_client_packets" lineno="88490"> +<interface name="corenet_receive_traceroute_client_packets" lineno="88508"> <summary> Receive traceroute_client packets. </summary> @@ -65331,7 +65415,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88509"> +<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88527"> <summary> Do not audit attempts to receive traceroute_client packets. </summary> @@ -65342,7 +65426,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88528"> +<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88546"> <summary> Send and receive traceroute_client packets. </summary> @@ -65353,7 +65437,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88544"> +<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88562"> <summary> Do not audit attempts to send and receive traceroute_client packets. </summary> @@ -65364,7 +65448,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_traceroute_client_packets" lineno="88559"> +<interface name="corenet_relabelto_traceroute_client_packets" lineno="88577"> <summary> Relabel packets to traceroute_client the packet type. </summary> @@ -65374,7 +65458,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_traceroute_server_packets" lineno="88579"> +<interface name="corenet_send_traceroute_server_packets" lineno="88597"> <summary> Send traceroute_server packets. </summary> @@ -65385,7 +65469,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88598"> +<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88616"> <summary> Do not audit attempts to send traceroute_server packets. </summary> @@ -65396,7 +65480,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_traceroute_server_packets" lineno="88617"> +<interface name="corenet_receive_traceroute_server_packets" lineno="88635"> <summary> Receive traceroute_server packets. </summary> @@ -65407,7 +65491,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88636"> +<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88654"> <summary> Do not audit attempts to receive traceroute_server packets. </summary> @@ -65418,7 +65502,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88655"> +<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88673"> <summary> Send and receive traceroute_server packets. </summary> @@ -65429,7 +65513,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88671"> +<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88689"> <summary> Do not audit attempts to send and receive traceroute_server packets. </summary> @@ -65440,7 +65524,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_traceroute_server_packets" lineno="88686"> +<interface name="corenet_relabelto_traceroute_server_packets" lineno="88704"> <summary> Relabel packets to traceroute_server the packet type. </summary> @@ -65450,7 +65534,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88708"> +<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88726"> <summary> Send and receive TCP traffic on the transproxy port. </summary> @@ -65461,7 +65545,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_transproxy_port" lineno="88723"> +<interface name="corenet_udp_send_transproxy_port" lineno="88741"> <summary> Send UDP traffic on the transproxy port. </summary> @@ -65472,7 +65556,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88738"> +<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88756"> <summary> Do not audit attempts to send UDP traffic on the transproxy port. </summary> @@ -65483,7 +65567,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_transproxy_port" lineno="88753"> +<interface name="corenet_udp_receive_transproxy_port" lineno="88771"> <summary> Receive UDP traffic on the transproxy port. </summary> @@ -65494,7 +65578,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88768"> +<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88786"> <summary> Do not audit attempts to receive UDP traffic on the transproxy port. </summary> @@ -65505,7 +65589,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88783"> +<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88801"> <summary> Send and receive UDP traffic on the transproxy port. </summary> @@ -65516,7 +65600,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88799"> +<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88817"> <summary> Do not audit attempts to send and receive UDP traffic on the transproxy port. @@ -65528,7 +65612,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_transproxy_port" lineno="88814"> +<interface name="corenet_tcp_bind_transproxy_port" lineno="88832"> <summary> Bind TCP sockets to the transproxy port. </summary> @@ -65539,7 +65623,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_transproxy_port" lineno="88834"> +<interface name="corenet_udp_bind_transproxy_port" lineno="88852"> <summary> Bind UDP sockets to the transproxy port. </summary> @@ -65550,7 +65634,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_transproxy_port" lineno="88853"> +<interface name="corenet_tcp_connect_transproxy_port" lineno="88871"> <summary> Make a TCP connection to the transproxy port. </summary> @@ -65560,7 +65644,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_transproxy_client_packets" lineno="88873"> +<interface name="corenet_send_transproxy_client_packets" lineno="88891"> <summary> Send transproxy_client packets. </summary> @@ -65571,7 +65655,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88892"> +<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88910"> <summary> Do not audit attempts to send transproxy_client packets. </summary> @@ -65582,7 +65666,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_transproxy_client_packets" lineno="88911"> +<interface name="corenet_receive_transproxy_client_packets" lineno="88929"> <summary> Receive transproxy_client packets. </summary> @@ -65593,7 +65677,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88930"> +<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88948"> <summary> Do not audit attempts to receive transproxy_client packets. </summary> @@ -65604,7 +65688,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88949"> +<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88967"> <summary> Send and receive transproxy_client packets. </summary> @@ -65615,7 +65699,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88965"> +<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88983"> <summary> Do not audit attempts to send and receive transproxy_client packets. </summary> @@ -65626,7 +65710,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_transproxy_client_packets" lineno="88980"> +<interface name="corenet_relabelto_transproxy_client_packets" lineno="88998"> <summary> Relabel packets to transproxy_client the packet type. </summary> @@ -65636,7 +65720,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_transproxy_server_packets" lineno="89000"> +<interface name="corenet_send_transproxy_server_packets" lineno="89018"> <summary> Send transproxy_server packets. </summary> @@ -65647,7 +65731,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89019"> +<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89037"> <summary> Do not audit attempts to send transproxy_server packets. </summary> @@ -65658,7 +65742,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_transproxy_server_packets" lineno="89038"> +<interface name="corenet_receive_transproxy_server_packets" lineno="89056"> <summary> Receive transproxy_server packets. </summary> @@ -65669,7 +65753,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89057"> +<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89075"> <summary> Do not audit attempts to receive transproxy_server packets. </summary> @@ -65680,7 +65764,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89076"> +<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89094"> <summary> Send and receive transproxy_server packets. </summary> @@ -65691,7 +65775,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89092"> +<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89110"> <summary> Do not audit attempts to send and receive transproxy_server packets. </summary> @@ -65702,7 +65786,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_transproxy_server_packets" lineno="89107"> +<interface name="corenet_relabelto_transproxy_server_packets" lineno="89125"> <summary> Relabel packets to transproxy_server the packet type. </summary> @@ -65712,7 +65796,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89129"> +<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89147"> <summary> Send and receive TCP traffic on the trisoap port. </summary> @@ -65723,7 +65807,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_trisoap_port" lineno="89144"> +<interface name="corenet_udp_send_trisoap_port" lineno="89162"> <summary> Send UDP traffic on the trisoap port. </summary> @@ -65734,7 +65818,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89159"> +<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89177"> <summary> Do not audit attempts to send UDP traffic on the trisoap port. </summary> @@ -65745,7 +65829,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_trisoap_port" lineno="89174"> +<interface name="corenet_udp_receive_trisoap_port" lineno="89192"> <summary> Receive UDP traffic on the trisoap port. </summary> @@ -65756,7 +65840,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89189"> +<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89207"> <summary> Do not audit attempts to receive UDP traffic on the trisoap port. </summary> @@ -65767,7 +65851,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89204"> +<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89222"> <summary> Send and receive UDP traffic on the trisoap port. </summary> @@ -65778,7 +65862,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89220"> +<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89238"> <summary> Do not audit attempts to send and receive UDP traffic on the trisoap port. @@ -65790,7 +65874,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_trisoap_port" lineno="89235"> +<interface name="corenet_tcp_bind_trisoap_port" lineno="89253"> <summary> Bind TCP sockets to the trisoap port. </summary> @@ -65801,7 +65885,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_trisoap_port" lineno="89255"> +<interface name="corenet_udp_bind_trisoap_port" lineno="89273"> <summary> Bind UDP sockets to the trisoap port. </summary> @@ -65812,7 +65896,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_trisoap_port" lineno="89274"> +<interface name="corenet_tcp_connect_trisoap_port" lineno="89292"> <summary> Make a TCP connection to the trisoap port. </summary> @@ -65822,7 +65906,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trisoap_client_packets" lineno="89294"> +<interface name="corenet_send_trisoap_client_packets" lineno="89312"> <summary> Send trisoap_client packets. </summary> @@ -65833,7 +65917,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89313"> +<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89331"> <summary> Do not audit attempts to send trisoap_client packets. </summary> @@ -65844,7 +65928,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trisoap_client_packets" lineno="89332"> +<interface name="corenet_receive_trisoap_client_packets" lineno="89350"> <summary> Receive trisoap_client packets. </summary> @@ -65855,7 +65939,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89351"> +<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89369"> <summary> Do not audit attempts to receive trisoap_client packets. </summary> @@ -65866,7 +65950,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89370"> +<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89388"> <summary> Send and receive trisoap_client packets. </summary> @@ -65877,7 +65961,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89386"> +<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89404"> <summary> Do not audit attempts to send and receive trisoap_client packets. </summary> @@ -65888,7 +65972,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trisoap_client_packets" lineno="89401"> +<interface name="corenet_relabelto_trisoap_client_packets" lineno="89419"> <summary> Relabel packets to trisoap_client the packet type. </summary> @@ -65898,7 +65982,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trisoap_server_packets" lineno="89421"> +<interface name="corenet_send_trisoap_server_packets" lineno="89439"> <summary> Send trisoap_server packets. </summary> @@ -65909,7 +65993,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89440"> +<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89458"> <summary> Do not audit attempts to send trisoap_server packets. </summary> @@ -65920,7 +66004,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trisoap_server_packets" lineno="89459"> +<interface name="corenet_receive_trisoap_server_packets" lineno="89477"> <summary> Receive trisoap_server packets. </summary> @@ -65931,7 +66015,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89478"> +<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89496"> <summary> Do not audit attempts to receive trisoap_server packets. </summary> @@ -65942,7 +66026,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89497"> +<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89515"> <summary> Send and receive trisoap_server packets. </summary> @@ -65953,7 +66037,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89513"> +<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89531"> <summary> Do not audit attempts to send and receive trisoap_server packets. </summary> @@ -65964,7 +66048,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trisoap_server_packets" lineno="89528"> +<interface name="corenet_relabelto_trisoap_server_packets" lineno="89546"> <summary> Relabel packets to trisoap_server the packet type. </summary> @@ -65974,7 +66058,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89550"> +<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89568"> <summary> Send and receive TCP traffic on the trivnet1 port. </summary> @@ -65985,7 +66069,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_trivnet1_port" lineno="89565"> +<interface name="corenet_udp_send_trivnet1_port" lineno="89583"> <summary> Send UDP traffic on the trivnet1 port. </summary> @@ -65996,7 +66080,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89580"> +<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89598"> <summary> Do not audit attempts to send UDP traffic on the trivnet1 port. </summary> @@ -66007,7 +66091,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_trivnet1_port" lineno="89595"> +<interface name="corenet_udp_receive_trivnet1_port" lineno="89613"> <summary> Receive UDP traffic on the trivnet1 port. </summary> @@ -66018,7 +66102,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89610"> +<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89628"> <summary> Do not audit attempts to receive UDP traffic on the trivnet1 port. </summary> @@ -66029,7 +66113,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89625"> +<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89643"> <summary> Send and receive UDP traffic on the trivnet1 port. </summary> @@ -66040,7 +66124,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89641"> +<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89659"> <summary> Do not audit attempts to send and receive UDP traffic on the trivnet1 port. @@ -66052,7 +66136,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_trivnet1_port" lineno="89656"> +<interface name="corenet_tcp_bind_trivnet1_port" lineno="89674"> <summary> Bind TCP sockets to the trivnet1 port. </summary> @@ -66063,7 +66147,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_trivnet1_port" lineno="89676"> +<interface name="corenet_udp_bind_trivnet1_port" lineno="89694"> <summary> Bind UDP sockets to the trivnet1 port. </summary> @@ -66074,7 +66158,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_trivnet1_port" lineno="89695"> +<interface name="corenet_tcp_connect_trivnet1_port" lineno="89713"> <summary> Make a TCP connection to the trivnet1 port. </summary> @@ -66084,7 +66168,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trivnet1_client_packets" lineno="89715"> +<interface name="corenet_send_trivnet1_client_packets" lineno="89733"> <summary> Send trivnet1_client packets. </summary> @@ -66095,7 +66179,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89734"> +<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89752"> <summary> Do not audit attempts to send trivnet1_client packets. </summary> @@ -66106,7 +66190,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trivnet1_client_packets" lineno="89753"> +<interface name="corenet_receive_trivnet1_client_packets" lineno="89771"> <summary> Receive trivnet1_client packets. </summary> @@ -66117,7 +66201,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89772"> +<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89790"> <summary> Do not audit attempts to receive trivnet1_client packets. </summary> @@ -66128,7 +66212,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89791"> +<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89809"> <summary> Send and receive trivnet1_client packets. </summary> @@ -66139,7 +66223,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89807"> +<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89825"> <summary> Do not audit attempts to send and receive trivnet1_client packets. </summary> @@ -66150,7 +66234,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89822"> +<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89840"> <summary> Relabel packets to trivnet1_client the packet type. </summary> @@ -66160,7 +66244,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trivnet1_server_packets" lineno="89842"> +<interface name="corenet_send_trivnet1_server_packets" lineno="89860"> <summary> Send trivnet1_server packets. </summary> @@ -66171,7 +66255,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89861"> +<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89879"> <summary> Do not audit attempts to send trivnet1_server packets. </summary> @@ -66182,7 +66266,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trivnet1_server_packets" lineno="89880"> +<interface name="corenet_receive_trivnet1_server_packets" lineno="89898"> <summary> Receive trivnet1_server packets. </summary> @@ -66193,7 +66277,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89899"> +<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89917"> <summary> Do not audit attempts to receive trivnet1_server packets. </summary> @@ -66204,7 +66288,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89918"> +<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89936"> <summary> Send and receive trivnet1_server packets. </summary> @@ -66215,7 +66299,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89934"> +<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89952"> <summary> Do not audit attempts to send and receive trivnet1_server packets. </summary> @@ -66226,7 +66310,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89949"> +<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89967"> <summary> Relabel packets to trivnet1_server the packet type. </summary> @@ -66236,7 +66320,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ups_port" lineno="89971"> +<interface name="corenet_tcp_sendrecv_ups_port" lineno="89989"> <summary> Send and receive TCP traffic on the ups port. </summary> @@ -66247,7 +66331,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ups_port" lineno="89986"> +<interface name="corenet_udp_send_ups_port" lineno="90004"> <summary> Send UDP traffic on the ups port. </summary> @@ -66258,7 +66342,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90001"> +<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90019"> <summary> Do not audit attempts to send UDP traffic on the ups port. </summary> @@ -66269,7 +66353,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ups_port" lineno="90016"> +<interface name="corenet_udp_receive_ups_port" lineno="90034"> <summary> Receive UDP traffic on the ups port. </summary> @@ -66280,7 +66364,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90031"> +<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90049"> <summary> Do not audit attempts to receive UDP traffic on the ups port. </summary> @@ -66291,7 +66375,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ups_port" lineno="90046"> +<interface name="corenet_udp_sendrecv_ups_port" lineno="90064"> <summary> Send and receive UDP traffic on the ups port. </summary> @@ -66302,7 +66386,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90062"> +<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90080"> <summary> Do not audit attempts to send and receive UDP traffic on the ups port. @@ -66314,7 +66398,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ups_port" lineno="90077"> +<interface name="corenet_tcp_bind_ups_port" lineno="90095"> <summary> Bind TCP sockets to the ups port. </summary> @@ -66325,7 +66409,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ups_port" lineno="90097"> +<interface name="corenet_udp_bind_ups_port" lineno="90115"> <summary> Bind UDP sockets to the ups port. </summary> @@ -66336,7 +66420,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ups_port" lineno="90116"> +<interface name="corenet_tcp_connect_ups_port" lineno="90134"> <summary> Make a TCP connection to the ups port. </summary> @@ -66346,7 +66430,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ups_client_packets" lineno="90136"> +<interface name="corenet_send_ups_client_packets" lineno="90154"> <summary> Send ups_client packets. </summary> @@ -66357,7 +66441,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90155"> +<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90173"> <summary> Do not audit attempts to send ups_client packets. </summary> @@ -66368,7 +66452,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ups_client_packets" lineno="90174"> +<interface name="corenet_receive_ups_client_packets" lineno="90192"> <summary> Receive ups_client packets. </summary> @@ -66379,7 +66463,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90193"> +<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90211"> <summary> Do not audit attempts to receive ups_client packets. </summary> @@ -66390,7 +66474,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ups_client_packets" lineno="90212"> +<interface name="corenet_sendrecv_ups_client_packets" lineno="90230"> <summary> Send and receive ups_client packets. </summary> @@ -66401,7 +66485,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90228"> +<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90246"> <summary> Do not audit attempts to send and receive ups_client packets. </summary> @@ -66412,7 +66496,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ups_client_packets" lineno="90243"> +<interface name="corenet_relabelto_ups_client_packets" lineno="90261"> <summary> Relabel packets to ups_client the packet type. </summary> @@ -66422,7 +66506,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ups_server_packets" lineno="90263"> +<interface name="corenet_send_ups_server_packets" lineno="90281"> <summary> Send ups_server packets. </summary> @@ -66433,7 +66517,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90282"> +<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90300"> <summary> Do not audit attempts to send ups_server packets. </summary> @@ -66444,7 +66528,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ups_server_packets" lineno="90301"> +<interface name="corenet_receive_ups_server_packets" lineno="90319"> <summary> Receive ups_server packets. </summary> @@ -66455,7 +66539,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90320"> +<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90338"> <summary> Do not audit attempts to receive ups_server packets. </summary> @@ -66466,7 +66550,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ups_server_packets" lineno="90339"> +<interface name="corenet_sendrecv_ups_server_packets" lineno="90357"> <summary> Send and receive ups_server packets. </summary> @@ -66477,7 +66561,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90355"> +<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90373"> <summary> Do not audit attempts to send and receive ups_server packets. </summary> @@ -66488,7 +66572,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ups_server_packets" lineno="90370"> +<interface name="corenet_relabelto_ups_server_packets" lineno="90388"> <summary> Relabel packets to ups_server the packet type. </summary> @@ -66498,7 +66582,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90392"> +<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90410"> <summary> Send and receive TCP traffic on the utcpserver port. </summary> @@ -66509,7 +66593,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_utcpserver_port" lineno="90407"> +<interface name="corenet_udp_send_utcpserver_port" lineno="90425"> <summary> Send UDP traffic on the utcpserver port. </summary> @@ -66520,7 +66604,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90422"> +<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90440"> <summary> Do not audit attempts to send UDP traffic on the utcpserver port. </summary> @@ -66531,7 +66615,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_utcpserver_port" lineno="90437"> +<interface name="corenet_udp_receive_utcpserver_port" lineno="90455"> <summary> Receive UDP traffic on the utcpserver port. </summary> @@ -66542,7 +66626,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90452"> +<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90470"> <summary> Do not audit attempts to receive UDP traffic on the utcpserver port. </summary> @@ -66553,7 +66637,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90467"> +<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90485"> <summary> Send and receive UDP traffic on the utcpserver port. </summary> @@ -66564,7 +66648,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90483"> +<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90501"> <summary> Do not audit attempts to send and receive UDP traffic on the utcpserver port. @@ -66576,7 +66660,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_utcpserver_port" lineno="90498"> +<interface name="corenet_tcp_bind_utcpserver_port" lineno="90516"> <summary> Bind TCP sockets to the utcpserver port. </summary> @@ -66587,7 +66671,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_utcpserver_port" lineno="90518"> +<interface name="corenet_udp_bind_utcpserver_port" lineno="90536"> <summary> Bind UDP sockets to the utcpserver port. </summary> @@ -66598,7 +66682,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_utcpserver_port" lineno="90537"> +<interface name="corenet_tcp_connect_utcpserver_port" lineno="90555"> <summary> Make a TCP connection to the utcpserver port. </summary> @@ -66608,7 +66692,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_utcpserver_client_packets" lineno="90557"> +<interface name="corenet_send_utcpserver_client_packets" lineno="90575"> <summary> Send utcpserver_client packets. </summary> @@ -66619,7 +66703,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90576"> +<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90594"> <summary> Do not audit attempts to send utcpserver_client packets. </summary> @@ -66630,7 +66714,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_utcpserver_client_packets" lineno="90595"> +<interface name="corenet_receive_utcpserver_client_packets" lineno="90613"> <summary> Receive utcpserver_client packets. </summary> @@ -66641,7 +66725,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90614"> +<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90632"> <summary> Do not audit attempts to receive utcpserver_client packets. </summary> @@ -66652,7 +66736,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90633"> +<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90651"> <summary> Send and receive utcpserver_client packets. </summary> @@ -66663,7 +66747,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90649"> +<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90667"> <summary> Do not audit attempts to send and receive utcpserver_client packets. </summary> @@ -66674,7 +66758,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90664"> +<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90682"> <summary> Relabel packets to utcpserver_client the packet type. </summary> @@ -66684,7 +66768,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_utcpserver_server_packets" lineno="90684"> +<interface name="corenet_send_utcpserver_server_packets" lineno="90702"> <summary> Send utcpserver_server packets. </summary> @@ -66695,7 +66779,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90703"> +<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90721"> <summary> Do not audit attempts to send utcpserver_server packets. </summary> @@ -66706,7 +66790,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_utcpserver_server_packets" lineno="90722"> +<interface name="corenet_receive_utcpserver_server_packets" lineno="90740"> <summary> Receive utcpserver_server packets. </summary> @@ -66717,7 +66801,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90741"> +<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90759"> <summary> Do not audit attempts to receive utcpserver_server packets. </summary> @@ -66728,7 +66812,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90760"> +<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90778"> <summary> Send and receive utcpserver_server packets. </summary> @@ -66739,7 +66823,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90776"> +<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90794"> <summary> Do not audit attempts to send and receive utcpserver_server packets. </summary> @@ -66750,7 +66834,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90791"> +<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90809"> <summary> Relabel packets to utcpserver_server the packet type. </summary> @@ -66760,7 +66844,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90813"> +<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90831"> <summary> Send and receive TCP traffic on the uucpd port. </summary> @@ -66771,7 +66855,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_uucpd_port" lineno="90828"> +<interface name="corenet_udp_send_uucpd_port" lineno="90846"> <summary> Send UDP traffic on the uucpd port. </summary> @@ -66782,7 +66866,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90843"> +<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90861"> <summary> Do not audit attempts to send UDP traffic on the uucpd port. </summary> @@ -66793,7 +66877,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_uucpd_port" lineno="90858"> +<interface name="corenet_udp_receive_uucpd_port" lineno="90876"> <summary> Receive UDP traffic on the uucpd port. </summary> @@ -66804,7 +66888,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90873"> +<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90891"> <summary> Do not audit attempts to receive UDP traffic on the uucpd port. </summary> @@ -66815,7 +66899,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90888"> +<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90906"> <summary> Send and receive UDP traffic on the uucpd port. </summary> @@ -66826,7 +66910,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90904"> +<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90922"> <summary> Do not audit attempts to send and receive UDP traffic on the uucpd port. @@ -66838,7 +66922,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_uucpd_port" lineno="90919"> +<interface name="corenet_tcp_bind_uucpd_port" lineno="90937"> <summary> Bind TCP sockets to the uucpd port. </summary> @@ -66849,7 +66933,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_uucpd_port" lineno="90939"> +<interface name="corenet_udp_bind_uucpd_port" lineno="90957"> <summary> Bind UDP sockets to the uucpd port. </summary> @@ -66860,7 +66944,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_uucpd_port" lineno="90958"> +<interface name="corenet_tcp_connect_uucpd_port" lineno="90976"> <summary> Make a TCP connection to the uucpd port. </summary> @@ -66870,7 +66954,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_uucpd_client_packets" lineno="90978"> +<interface name="corenet_send_uucpd_client_packets" lineno="90996"> <summary> Send uucpd_client packets. </summary> @@ -66881,7 +66965,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90997"> +<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="91015"> <summary> Do not audit attempts to send uucpd_client packets. </summary> @@ -66892,7 +66976,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_uucpd_client_packets" lineno="91016"> +<interface name="corenet_receive_uucpd_client_packets" lineno="91034"> <summary> Receive uucpd_client packets. </summary> @@ -66903,7 +66987,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91035"> +<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91053"> <summary> Do not audit attempts to receive uucpd_client packets. </summary> @@ -66914,7 +66998,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91054"> +<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91072"> <summary> Send and receive uucpd_client packets. </summary> @@ -66925,7 +67009,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91070"> +<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91088"> <summary> Do not audit attempts to send and receive uucpd_client packets. </summary> @@ -66936,7 +67020,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_uucpd_client_packets" lineno="91085"> +<interface name="corenet_relabelto_uucpd_client_packets" lineno="91103"> <summary> Relabel packets to uucpd_client the packet type. </summary> @@ -66946,7 +67030,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_uucpd_server_packets" lineno="91105"> +<interface name="corenet_send_uucpd_server_packets" lineno="91123"> <summary> Send uucpd_server packets. </summary> @@ -66957,7 +67041,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91124"> +<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91142"> <summary> Do not audit attempts to send uucpd_server packets. </summary> @@ -66968,7 +67052,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_uucpd_server_packets" lineno="91143"> +<interface name="corenet_receive_uucpd_server_packets" lineno="91161"> <summary> Receive uucpd_server packets. </summary> @@ -66979,7 +67063,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91162"> +<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91180"> <summary> Do not audit attempts to receive uucpd_server packets. </summary> @@ -66990,7 +67074,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91181"> +<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91199"> <summary> Send and receive uucpd_server packets. </summary> @@ -67001,7 +67085,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91197"> +<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91215"> <summary> Do not audit attempts to send and receive uucpd_server packets. </summary> @@ -67012,7 +67096,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_uucpd_server_packets" lineno="91212"> +<interface name="corenet_relabelto_uucpd_server_packets" lineno="91230"> <summary> Relabel packets to uucpd_server the packet type. </summary> @@ -67022,7 +67106,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91234"> +<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91252"> <summary> Send and receive TCP traffic on the varnishd port. </summary> @@ -67033,7 +67117,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_varnishd_port" lineno="91249"> +<interface name="corenet_udp_send_varnishd_port" lineno="91267"> <summary> Send UDP traffic on the varnishd port. </summary> @@ -67044,7 +67128,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91264"> +<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91282"> <summary> Do not audit attempts to send UDP traffic on the varnishd port. </summary> @@ -67055,7 +67139,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_varnishd_port" lineno="91279"> +<interface name="corenet_udp_receive_varnishd_port" lineno="91297"> <summary> Receive UDP traffic on the varnishd port. </summary> @@ -67066,7 +67150,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91294"> +<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91312"> <summary> Do not audit attempts to receive UDP traffic on the varnishd port. </summary> @@ -67077,7 +67161,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91309"> +<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91327"> <summary> Send and receive UDP traffic on the varnishd port. </summary> @@ -67088,7 +67172,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91325"> +<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91343"> <summary> Do not audit attempts to send and receive UDP traffic on the varnishd port. @@ -67100,7 +67184,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_varnishd_port" lineno="91340"> +<interface name="corenet_tcp_bind_varnishd_port" lineno="91358"> <summary> Bind TCP sockets to the varnishd port. </summary> @@ -67111,7 +67195,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_varnishd_port" lineno="91360"> +<interface name="corenet_udp_bind_varnishd_port" lineno="91378"> <summary> Bind UDP sockets to the varnishd port. </summary> @@ -67122,7 +67206,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_varnishd_port" lineno="91379"> +<interface name="corenet_tcp_connect_varnishd_port" lineno="91397"> <summary> Make a TCP connection to the varnishd port. </summary> @@ -67132,7 +67216,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_varnishd_client_packets" lineno="91399"> +<interface name="corenet_send_varnishd_client_packets" lineno="91417"> <summary> Send varnishd_client packets. </summary> @@ -67143,7 +67227,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91418"> +<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91436"> <summary> Do not audit attempts to send varnishd_client packets. </summary> @@ -67154,7 +67238,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_varnishd_client_packets" lineno="91437"> +<interface name="corenet_receive_varnishd_client_packets" lineno="91455"> <summary> Receive varnishd_client packets. </summary> @@ -67165,7 +67249,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91456"> +<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91474"> <summary> Do not audit attempts to receive varnishd_client packets. </summary> @@ -67176,7 +67260,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91475"> +<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91493"> <summary> Send and receive varnishd_client packets. </summary> @@ -67187,7 +67271,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91491"> +<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91509"> <summary> Do not audit attempts to send and receive varnishd_client packets. </summary> @@ -67198,7 +67282,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_varnishd_client_packets" lineno="91506"> +<interface name="corenet_relabelto_varnishd_client_packets" lineno="91524"> <summary> Relabel packets to varnishd_client the packet type. </summary> @@ -67208,7 +67292,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_varnishd_server_packets" lineno="91526"> +<interface name="corenet_send_varnishd_server_packets" lineno="91544"> <summary> Send varnishd_server packets. </summary> @@ -67219,7 +67303,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91545"> +<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91563"> <summary> Do not audit attempts to send varnishd_server packets. </summary> @@ -67230,7 +67314,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_varnishd_server_packets" lineno="91564"> +<interface name="corenet_receive_varnishd_server_packets" lineno="91582"> <summary> Receive varnishd_server packets. </summary> @@ -67241,7 +67325,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91583"> +<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91601"> <summary> Do not audit attempts to receive varnishd_server packets. </summary> @@ -67252,7 +67336,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91602"> +<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91620"> <summary> Send and receive varnishd_server packets. </summary> @@ -67263,7 +67347,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91618"> +<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91636"> <summary> Do not audit attempts to send and receive varnishd_server packets. </summary> @@ -67274,7 +67358,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_varnishd_server_packets" lineno="91633"> +<interface name="corenet_relabelto_varnishd_server_packets" lineno="91651"> <summary> Relabel packets to varnishd_server the packet type. </summary> @@ -67284,7 +67368,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_virt_port" lineno="91655"> +<interface name="corenet_tcp_sendrecv_virt_port" lineno="91673"> <summary> Send and receive TCP traffic on the virt port. </summary> @@ -67295,7 +67379,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_virt_port" lineno="91670"> +<interface name="corenet_udp_send_virt_port" lineno="91688"> <summary> Send UDP traffic on the virt port. </summary> @@ -67306,7 +67390,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91685"> +<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91703"> <summary> Do not audit attempts to send UDP traffic on the virt port. </summary> @@ -67317,7 +67401,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_virt_port" lineno="91700"> +<interface name="corenet_udp_receive_virt_port" lineno="91718"> <summary> Receive UDP traffic on the virt port. </summary> @@ -67328,7 +67412,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91715"> +<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91733"> <summary> Do not audit attempts to receive UDP traffic on the virt port. </summary> @@ -67339,7 +67423,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_virt_port" lineno="91730"> +<interface name="corenet_udp_sendrecv_virt_port" lineno="91748"> <summary> Send and receive UDP traffic on the virt port. </summary> @@ -67350,7 +67434,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91746"> +<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91764"> <summary> Do not audit attempts to send and receive UDP traffic on the virt port. @@ -67362,7 +67446,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_virt_port" lineno="91761"> +<interface name="corenet_tcp_bind_virt_port" lineno="91779"> <summary> Bind TCP sockets to the virt port. </summary> @@ -67373,7 +67457,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_virt_port" lineno="91781"> +<interface name="corenet_udp_bind_virt_port" lineno="91799"> <summary> Bind UDP sockets to the virt port. </summary> @@ -67384,7 +67468,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_virt_port" lineno="91800"> +<interface name="corenet_tcp_connect_virt_port" lineno="91818"> <summary> Make a TCP connection to the virt port. </summary> @@ -67394,7 +67478,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_client_packets" lineno="91820"> +<interface name="corenet_send_virt_client_packets" lineno="91838"> <summary> Send virt_client packets. </summary> @@ -67405,7 +67489,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91839"> +<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91857"> <summary> Do not audit attempts to send virt_client packets. </summary> @@ -67416,7 +67500,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_client_packets" lineno="91858"> +<interface name="corenet_receive_virt_client_packets" lineno="91876"> <summary> Receive virt_client packets. </summary> @@ -67427,7 +67511,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91877"> +<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91895"> <summary> Do not audit attempts to receive virt_client packets. </summary> @@ -67438,7 +67522,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_client_packets" lineno="91896"> +<interface name="corenet_sendrecv_virt_client_packets" lineno="91914"> <summary> Send and receive virt_client packets. </summary> @@ -67449,7 +67533,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91912"> +<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91930"> <summary> Do not audit attempts to send and receive virt_client packets. </summary> @@ -67460,7 +67544,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_client_packets" lineno="91927"> +<interface name="corenet_relabelto_virt_client_packets" lineno="91945"> <summary> Relabel packets to virt_client the packet type. </summary> @@ -67470,7 +67554,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_server_packets" lineno="91947"> +<interface name="corenet_send_virt_server_packets" lineno="91965"> <summary> Send virt_server packets. </summary> @@ -67481,7 +67565,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91966"> +<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91984"> <summary> Do not audit attempts to send virt_server packets. </summary> @@ -67492,7 +67576,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_server_packets" lineno="91985"> +<interface name="corenet_receive_virt_server_packets" lineno="92003"> <summary> Receive virt_server packets. </summary> @@ -67503,7 +67587,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92004"> +<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92022"> <summary> Do not audit attempts to receive virt_server packets. </summary> @@ -67514,7 +67598,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_server_packets" lineno="92023"> +<interface name="corenet_sendrecv_virt_server_packets" lineno="92041"> <summary> Send and receive virt_server packets. </summary> @@ -67525,7 +67609,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92039"> +<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92057"> <summary> Do not audit attempts to send and receive virt_server packets. </summary> @@ -67536,7 +67620,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_server_packets" lineno="92054"> +<interface name="corenet_relabelto_virt_server_packets" lineno="92072"> <summary> Relabel packets to virt_server the packet type. </summary> @@ -67546,7 +67630,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92076"> +<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92094"> <summary> Send and receive TCP traffic on the virtual_places port. </summary> @@ -67557,7 +67641,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_virtual_places_port" lineno="92091"> +<interface name="corenet_udp_send_virtual_places_port" lineno="92109"> <summary> Send UDP traffic on the virtual_places port. </summary> @@ -67568,7 +67652,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92106"> +<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92124"> <summary> Do not audit attempts to send UDP traffic on the virtual_places port. </summary> @@ -67579,7 +67663,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_virtual_places_port" lineno="92121"> +<interface name="corenet_udp_receive_virtual_places_port" lineno="92139"> <summary> Receive UDP traffic on the virtual_places port. </summary> @@ -67590,7 +67674,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92136"> +<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92154"> <summary> Do not audit attempts to receive UDP traffic on the virtual_places port. </summary> @@ -67601,7 +67685,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92151"> +<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92169"> <summary> Send and receive UDP traffic on the virtual_places port. </summary> @@ -67612,7 +67696,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92167"> +<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92185"> <summary> Do not audit attempts to send and receive UDP traffic on the virtual_places port. @@ -67624,7 +67708,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_virtual_places_port" lineno="92182"> +<interface name="corenet_tcp_bind_virtual_places_port" lineno="92200"> <summary> Bind TCP sockets to the virtual_places port. </summary> @@ -67635,7 +67719,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_virtual_places_port" lineno="92202"> +<interface name="corenet_udp_bind_virtual_places_port" lineno="92220"> <summary> Bind UDP sockets to the virtual_places port. </summary> @@ -67646,7 +67730,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_virtual_places_port" lineno="92221"> +<interface name="corenet_tcp_connect_virtual_places_port" lineno="92239"> <summary> Make a TCP connection to the virtual_places port. </summary> @@ -67656,7 +67740,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virtual_places_client_packets" lineno="92241"> +<interface name="corenet_send_virtual_places_client_packets" lineno="92259"> <summary> Send virtual_places_client packets. </summary> @@ -67667,7 +67751,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92260"> +<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92278"> <summary> Do not audit attempts to send virtual_places_client packets. </summary> @@ -67678,7 +67762,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virtual_places_client_packets" lineno="92279"> +<interface name="corenet_receive_virtual_places_client_packets" lineno="92297"> <summary> Receive virtual_places_client packets. </summary> @@ -67689,7 +67773,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92298"> +<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92316"> <summary> Do not audit attempts to receive virtual_places_client packets. </summary> @@ -67700,7 +67784,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92317"> +<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92335"> <summary> Send and receive virtual_places_client packets. </summary> @@ -67711,7 +67795,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92333"> +<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92351"> <summary> Do not audit attempts to send and receive virtual_places_client packets. </summary> @@ -67722,7 +67806,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92348"> +<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92366"> <summary> Relabel packets to virtual_places_client the packet type. </summary> @@ -67732,7 +67816,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virtual_places_server_packets" lineno="92368"> +<interface name="corenet_send_virtual_places_server_packets" lineno="92386"> <summary> Send virtual_places_server packets. </summary> @@ -67743,7 +67827,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92387"> +<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92405"> <summary> Do not audit attempts to send virtual_places_server packets. </summary> @@ -67754,7 +67838,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virtual_places_server_packets" lineno="92406"> +<interface name="corenet_receive_virtual_places_server_packets" lineno="92424"> <summary> Receive virtual_places_server packets. </summary> @@ -67765,7 +67849,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92425"> +<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92443"> <summary> Do not audit attempts to receive virtual_places_server packets. </summary> @@ -67776,7 +67860,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92444"> +<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92462"> <summary> Send and receive virtual_places_server packets. </summary> @@ -67787,7 +67871,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92460"> +<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92478"> <summary> Do not audit attempts to send and receive virtual_places_server packets. </summary> @@ -67798,7 +67882,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92475"> +<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92493"> <summary> Relabel packets to virtual_places_server the packet type. </summary> @@ -67808,7 +67892,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92497"> +<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92515"> <summary> Send and receive TCP traffic on the virt_migration port. </summary> @@ -67819,7 +67903,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_virt_migration_port" lineno="92512"> +<interface name="corenet_udp_send_virt_migration_port" lineno="92530"> <summary> Send UDP traffic on the virt_migration port. </summary> @@ -67830,7 +67914,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92527"> +<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92545"> <summary> Do not audit attempts to send UDP traffic on the virt_migration port. </summary> @@ -67841,7 +67925,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_virt_migration_port" lineno="92542"> +<interface name="corenet_udp_receive_virt_migration_port" lineno="92560"> <summary> Receive UDP traffic on the virt_migration port. </summary> @@ -67852,7 +67936,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92557"> +<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92575"> <summary> Do not audit attempts to receive UDP traffic on the virt_migration port. </summary> @@ -67863,7 +67947,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92572"> +<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92590"> <summary> Send and receive UDP traffic on the virt_migration port. </summary> @@ -67874,7 +67958,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92588"> +<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92606"> <summary> Do not audit attempts to send and receive UDP traffic on the virt_migration port. @@ -67886,7 +67970,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_virt_migration_port" lineno="92603"> +<interface name="corenet_tcp_bind_virt_migration_port" lineno="92621"> <summary> Bind TCP sockets to the virt_migration port. </summary> @@ -67897,7 +67981,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_virt_migration_port" lineno="92623"> +<interface name="corenet_udp_bind_virt_migration_port" lineno="92641"> <summary> Bind UDP sockets to the virt_migration port. </summary> @@ -67908,7 +67992,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_virt_migration_port" lineno="92642"> +<interface name="corenet_tcp_connect_virt_migration_port" lineno="92660"> <summary> Make a TCP connection to the virt_migration port. </summary> @@ -67918,7 +68002,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_migration_client_packets" lineno="92662"> +<interface name="corenet_send_virt_migration_client_packets" lineno="92680"> <summary> Send virt_migration_client packets. </summary> @@ -67929,7 +68013,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92681"> +<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92699"> <summary> Do not audit attempts to send virt_migration_client packets. </summary> @@ -67940,7 +68024,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_migration_client_packets" lineno="92700"> +<interface name="corenet_receive_virt_migration_client_packets" lineno="92718"> <summary> Receive virt_migration_client packets. </summary> @@ -67951,7 +68035,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92719"> +<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92737"> <summary> Do not audit attempts to receive virt_migration_client packets. </summary> @@ -67962,7 +68046,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92738"> +<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92756"> <summary> Send and receive virt_migration_client packets. </summary> @@ -67973,7 +68057,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92754"> +<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92772"> <summary> Do not audit attempts to send and receive virt_migration_client packets. </summary> @@ -67984,7 +68068,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92769"> +<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92787"> <summary> Relabel packets to virt_migration_client the packet type. </summary> @@ -67994,7 +68078,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_migration_server_packets" lineno="92789"> +<interface name="corenet_send_virt_migration_server_packets" lineno="92807"> <summary> Send virt_migration_server packets. </summary> @@ -68005,7 +68089,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92808"> +<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92826"> <summary> Do not audit attempts to send virt_migration_server packets. </summary> @@ -68016,7 +68100,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_migration_server_packets" lineno="92827"> +<interface name="corenet_receive_virt_migration_server_packets" lineno="92845"> <summary> Receive virt_migration_server packets. </summary> @@ -68027,7 +68111,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92846"> +<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92864"> <summary> Do not audit attempts to receive virt_migration_server packets. </summary> @@ -68038,7 +68122,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92865"> +<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92883"> <summary> Send and receive virt_migration_server packets. </summary> @@ -68049,7 +68133,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92881"> +<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92899"> <summary> Do not audit attempts to send and receive virt_migration_server packets. </summary> @@ -68060,7 +68144,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92896"> +<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92914"> <summary> Relabel packets to virt_migration_server the packet type. </summary> @@ -68070,7 +68154,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92918"> +<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92936"> <summary> Send and receive TCP traffic on the vnc port. </summary> @@ -68081,7 +68165,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_vnc_port" lineno="92933"> +<interface name="corenet_udp_send_vnc_port" lineno="92951"> <summary> Send UDP traffic on the vnc port. </summary> @@ -68092,7 +68176,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92948"> +<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92966"> <summary> Do not audit attempts to send UDP traffic on the vnc port. </summary> @@ -68103,7 +68187,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_vnc_port" lineno="92963"> +<interface name="corenet_udp_receive_vnc_port" lineno="92981"> <summary> Receive UDP traffic on the vnc port. </summary> @@ -68114,7 +68198,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92978"> +<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92996"> <summary> Do not audit attempts to receive UDP traffic on the vnc port. </summary> @@ -68125,7 +68209,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_vnc_port" lineno="92993"> +<interface name="corenet_udp_sendrecv_vnc_port" lineno="93011"> <summary> Send and receive UDP traffic on the vnc port. </summary> @@ -68136,7 +68220,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93009"> +<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93027"> <summary> Do not audit attempts to send and receive UDP traffic on the vnc port. @@ -68148,7 +68232,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_vnc_port" lineno="93024"> +<interface name="corenet_tcp_bind_vnc_port" lineno="93042"> <summary> Bind TCP sockets to the vnc port. </summary> @@ -68159,7 +68243,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_vnc_port" lineno="93044"> +<interface name="corenet_udp_bind_vnc_port" lineno="93062"> <summary> Bind UDP sockets to the vnc port. </summary> @@ -68170,7 +68254,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_vnc_port" lineno="93063"> +<interface name="corenet_tcp_connect_vnc_port" lineno="93081"> <summary> Make a TCP connection to the vnc port. </summary> @@ -68180,7 +68264,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_vnc_client_packets" lineno="93083"> +<interface name="corenet_send_vnc_client_packets" lineno="93101"> <summary> Send vnc_client packets. </summary> @@ -68191,7 +68275,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93102"> +<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93120"> <summary> Do not audit attempts to send vnc_client packets. </summary> @@ -68202,7 +68286,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_vnc_client_packets" lineno="93121"> +<interface name="corenet_receive_vnc_client_packets" lineno="93139"> <summary> Receive vnc_client packets. </summary> @@ -68213,7 +68297,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93140"> +<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93158"> <summary> Do not audit attempts to receive vnc_client packets. </summary> @@ -68224,7 +68308,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_vnc_client_packets" lineno="93159"> +<interface name="corenet_sendrecv_vnc_client_packets" lineno="93177"> <summary> Send and receive vnc_client packets. </summary> @@ -68235,7 +68319,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93175"> +<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93193"> <summary> Do not audit attempts to send and receive vnc_client packets. </summary> @@ -68246,7 +68330,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_vnc_client_packets" lineno="93190"> +<interface name="corenet_relabelto_vnc_client_packets" lineno="93208"> <summary> Relabel packets to vnc_client the packet type. </summary> @@ -68256,7 +68340,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_vnc_server_packets" lineno="93210"> +<interface name="corenet_send_vnc_server_packets" lineno="93228"> <summary> Send vnc_server packets. </summary> @@ -68267,7 +68351,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93229"> +<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93247"> <summary> Do not audit attempts to send vnc_server packets. </summary> @@ -68278,7 +68362,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_vnc_server_packets" lineno="93248"> +<interface name="corenet_receive_vnc_server_packets" lineno="93266"> <summary> Receive vnc_server packets. </summary> @@ -68289,7 +68373,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93267"> +<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93285"> <summary> Do not audit attempts to receive vnc_server packets. </summary> @@ -68300,7 +68384,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_vnc_server_packets" lineno="93286"> +<interface name="corenet_sendrecv_vnc_server_packets" lineno="93304"> <summary> Send and receive vnc_server packets. </summary> @@ -68311,7 +68395,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93302"> +<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93320"> <summary> Do not audit attempts to send and receive vnc_server packets. </summary> @@ -68322,7 +68406,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_vnc_server_packets" lineno="93317"> +<interface name="corenet_relabelto_vnc_server_packets" lineno="93335"> <summary> Relabel packets to vnc_server the packet type. </summary> @@ -68332,7 +68416,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93339"> +<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93357"> <summary> Send and receive TCP traffic on the wccp port. </summary> @@ -68343,7 +68427,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_wccp_port" lineno="93354"> +<interface name="corenet_udp_send_wccp_port" lineno="93372"> <summary> Send UDP traffic on the wccp port. </summary> @@ -68354,7 +68438,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93369"> +<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93387"> <summary> Do not audit attempts to send UDP traffic on the wccp port. </summary> @@ -68365,7 +68449,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_wccp_port" lineno="93384"> +<interface name="corenet_udp_receive_wccp_port" lineno="93402"> <summary> Receive UDP traffic on the wccp port. </summary> @@ -68376,7 +68460,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93399"> +<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93417"> <summary> Do not audit attempts to receive UDP traffic on the wccp port. </summary> @@ -68387,7 +68471,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_wccp_port" lineno="93414"> +<interface name="corenet_udp_sendrecv_wccp_port" lineno="93432"> <summary> Send and receive UDP traffic on the wccp port. </summary> @@ -68398,7 +68482,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93430"> +<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93448"> <summary> Do not audit attempts to send and receive UDP traffic on the wccp port. @@ -68410,7 +68494,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_wccp_port" lineno="93445"> +<interface name="corenet_tcp_bind_wccp_port" lineno="93463"> <summary> Bind TCP sockets to the wccp port. </summary> @@ -68421,7 +68505,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_wccp_port" lineno="93465"> +<interface name="corenet_udp_bind_wccp_port" lineno="93483"> <summary> Bind UDP sockets to the wccp port. </summary> @@ -68432,7 +68516,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_wccp_port" lineno="93484"> +<interface name="corenet_tcp_connect_wccp_port" lineno="93502"> <summary> Make a TCP connection to the wccp port. </summary> @@ -68442,7 +68526,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wccp_client_packets" lineno="93504"> +<interface name="corenet_send_wccp_client_packets" lineno="93522"> <summary> Send wccp_client packets. </summary> @@ -68453,7 +68537,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93523"> +<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93541"> <summary> Do not audit attempts to send wccp_client packets. </summary> @@ -68464,7 +68548,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wccp_client_packets" lineno="93542"> +<interface name="corenet_receive_wccp_client_packets" lineno="93560"> <summary> Receive wccp_client packets. </summary> @@ -68475,7 +68559,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93561"> +<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93579"> <summary> Do not audit attempts to receive wccp_client packets. </summary> @@ -68486,7 +68570,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wccp_client_packets" lineno="93580"> +<interface name="corenet_sendrecv_wccp_client_packets" lineno="93598"> <summary> Send and receive wccp_client packets. </summary> @@ -68497,7 +68581,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93596"> +<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93614"> <summary> Do not audit attempts to send and receive wccp_client packets. </summary> @@ -68508,7 +68592,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wccp_client_packets" lineno="93611"> +<interface name="corenet_relabelto_wccp_client_packets" lineno="93629"> <summary> Relabel packets to wccp_client the packet type. </summary> @@ -68518,7 +68602,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wccp_server_packets" lineno="93631"> +<interface name="corenet_send_wccp_server_packets" lineno="93649"> <summary> Send wccp_server packets. </summary> @@ -68529,7 +68613,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93650"> +<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93668"> <summary> Do not audit attempts to send wccp_server packets. </summary> @@ -68540,7 +68624,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wccp_server_packets" lineno="93669"> +<interface name="corenet_receive_wccp_server_packets" lineno="93687"> <summary> Receive wccp_server packets. </summary> @@ -68551,7 +68635,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93688"> +<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93706"> <summary> Do not audit attempts to receive wccp_server packets. </summary> @@ -68562,7 +68646,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wccp_server_packets" lineno="93707"> +<interface name="corenet_sendrecv_wccp_server_packets" lineno="93725"> <summary> Send and receive wccp_server packets. </summary> @@ -68573,7 +68657,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93723"> +<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93741"> <summary> Do not audit attempts to send and receive wccp_server packets. </summary> @@ -68584,7 +68668,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wccp_server_packets" lineno="93738"> +<interface name="corenet_relabelto_wccp_server_packets" lineno="93756"> <summary> Relabel packets to wccp_server the packet type. </summary> @@ -68594,7 +68678,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_websm_port" lineno="93760"> +<interface name="corenet_tcp_sendrecv_websm_port" lineno="93778"> <summary> Send and receive TCP traffic on the websm port. </summary> @@ -68605,7 +68689,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_websm_port" lineno="93775"> +<interface name="corenet_udp_send_websm_port" lineno="93793"> <summary> Send UDP traffic on the websm port. </summary> @@ -68616,7 +68700,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93790"> +<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93808"> <summary> Do not audit attempts to send UDP traffic on the websm port. </summary> @@ -68627,7 +68711,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_websm_port" lineno="93805"> +<interface name="corenet_udp_receive_websm_port" lineno="93823"> <summary> Receive UDP traffic on the websm port. </summary> @@ -68638,7 +68722,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93820"> +<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93838"> <summary> Do not audit attempts to receive UDP traffic on the websm port. </summary> @@ -68649,7 +68733,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_websm_port" lineno="93835"> +<interface name="corenet_udp_sendrecv_websm_port" lineno="93853"> <summary> Send and receive UDP traffic on the websm port. </summary> @@ -68660,7 +68744,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93851"> +<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93869"> <summary> Do not audit attempts to send and receive UDP traffic on the websm port. @@ -68672,7 +68756,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_websm_port" lineno="93866"> +<interface name="corenet_tcp_bind_websm_port" lineno="93884"> <summary> Bind TCP sockets to the websm port. </summary> @@ -68683,7 +68767,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_websm_port" lineno="93886"> +<interface name="corenet_udp_bind_websm_port" lineno="93904"> <summary> Bind UDP sockets to the websm port. </summary> @@ -68694,7 +68778,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_websm_port" lineno="93905"> +<interface name="corenet_tcp_connect_websm_port" lineno="93923"> <summary> Make a TCP connection to the websm port. </summary> @@ -68704,7 +68788,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_websm_client_packets" lineno="93925"> +<interface name="corenet_send_websm_client_packets" lineno="93943"> <summary> Send websm_client packets. </summary> @@ -68715,7 +68799,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93944"> +<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93962"> <summary> Do not audit attempts to send websm_client packets. </summary> @@ -68726,7 +68810,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_websm_client_packets" lineno="93963"> +<interface name="corenet_receive_websm_client_packets" lineno="93981"> <summary> Receive websm_client packets. </summary> @@ -68737,7 +68821,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93982"> +<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="94000"> <summary> Do not audit attempts to receive websm_client packets. </summary> @@ -68748,7 +68832,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_websm_client_packets" lineno="94001"> +<interface name="corenet_sendrecv_websm_client_packets" lineno="94019"> <summary> Send and receive websm_client packets. </summary> @@ -68759,7 +68843,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94017"> +<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94035"> <summary> Do not audit attempts to send and receive websm_client packets. </summary> @@ -68770,7 +68854,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_websm_client_packets" lineno="94032"> +<interface name="corenet_relabelto_websm_client_packets" lineno="94050"> <summary> Relabel packets to websm_client the packet type. </summary> @@ -68780,7 +68864,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_websm_server_packets" lineno="94052"> +<interface name="corenet_send_websm_server_packets" lineno="94070"> <summary> Send websm_server packets. </summary> @@ -68791,7 +68875,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94071"> +<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94089"> <summary> Do not audit attempts to send websm_server packets. </summary> @@ -68802,7 +68886,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_websm_server_packets" lineno="94090"> +<interface name="corenet_receive_websm_server_packets" lineno="94108"> <summary> Receive websm_server packets. </summary> @@ -68813,7 +68897,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94109"> +<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94127"> <summary> Do not audit attempts to receive websm_server packets. </summary> @@ -68824,7 +68908,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_websm_server_packets" lineno="94128"> +<interface name="corenet_sendrecv_websm_server_packets" lineno="94146"> <summary> Send and receive websm_server packets. </summary> @@ -68835,7 +68919,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94144"> +<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94162"> <summary> Do not audit attempts to send and receive websm_server packets. </summary> @@ -68846,7 +68930,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_websm_server_packets" lineno="94159"> +<interface name="corenet_relabelto_websm_server_packets" lineno="94177"> <summary> Relabel packets to websm_server the packet type. </summary> @@ -68856,7 +68940,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_whois_port" lineno="94181"> +<interface name="corenet_tcp_sendrecv_whois_port" lineno="94199"> <summary> Send and receive TCP traffic on the whois port. </summary> @@ -68867,7 +68951,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_whois_port" lineno="94196"> +<interface name="corenet_udp_send_whois_port" lineno="94214"> <summary> Send UDP traffic on the whois port. </summary> @@ -68878,7 +68962,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94211"> +<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94229"> <summary> Do not audit attempts to send UDP traffic on the whois port. </summary> @@ -68889,7 +68973,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_whois_port" lineno="94226"> +<interface name="corenet_udp_receive_whois_port" lineno="94244"> <summary> Receive UDP traffic on the whois port. </summary> @@ -68900,7 +68984,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94241"> +<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94259"> <summary> Do not audit attempts to receive UDP traffic on the whois port. </summary> @@ -68911,7 +68995,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_whois_port" lineno="94256"> +<interface name="corenet_udp_sendrecv_whois_port" lineno="94274"> <summary> Send and receive UDP traffic on the whois port. </summary> @@ -68922,7 +69006,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94272"> +<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94290"> <summary> Do not audit attempts to send and receive UDP traffic on the whois port. @@ -68934,7 +69018,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_whois_port" lineno="94287"> +<interface name="corenet_tcp_bind_whois_port" lineno="94305"> <summary> Bind TCP sockets to the whois port. </summary> @@ -68945,7 +69029,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_whois_port" lineno="94307"> +<interface name="corenet_udp_bind_whois_port" lineno="94325"> <summary> Bind UDP sockets to the whois port. </summary> @@ -68956,7 +69040,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_whois_port" lineno="94326"> +<interface name="corenet_tcp_connect_whois_port" lineno="94344"> <summary> Make a TCP connection to the whois port. </summary> @@ -68966,7 +69050,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_whois_client_packets" lineno="94346"> +<interface name="corenet_send_whois_client_packets" lineno="94364"> <summary> Send whois_client packets. </summary> @@ -68977,7 +69061,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94365"> +<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94383"> <summary> Do not audit attempts to send whois_client packets. </summary> @@ -68988,7 +69072,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_whois_client_packets" lineno="94384"> +<interface name="corenet_receive_whois_client_packets" lineno="94402"> <summary> Receive whois_client packets. </summary> @@ -68999,7 +69083,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94403"> +<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94421"> <summary> Do not audit attempts to receive whois_client packets. </summary> @@ -69010,7 +69094,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_whois_client_packets" lineno="94422"> +<interface name="corenet_sendrecv_whois_client_packets" lineno="94440"> <summary> Send and receive whois_client packets. </summary> @@ -69021,7 +69105,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94438"> +<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94456"> <summary> Do not audit attempts to send and receive whois_client packets. </summary> @@ -69032,7 +69116,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_whois_client_packets" lineno="94453"> +<interface name="corenet_relabelto_whois_client_packets" lineno="94471"> <summary> Relabel packets to whois_client the packet type. </summary> @@ -69042,7 +69126,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_whois_server_packets" lineno="94473"> +<interface name="corenet_send_whois_server_packets" lineno="94491"> <summary> Send whois_server packets. </summary> @@ -69053,7 +69137,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94492"> +<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94510"> <summary> Do not audit attempts to send whois_server packets. </summary> @@ -69064,7 +69148,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_whois_server_packets" lineno="94511"> +<interface name="corenet_receive_whois_server_packets" lineno="94529"> <summary> Receive whois_server packets. </summary> @@ -69075,7 +69159,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94530"> +<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94548"> <summary> Do not audit attempts to receive whois_server packets. </summary> @@ -69086,7 +69170,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_whois_server_packets" lineno="94549"> +<interface name="corenet_sendrecv_whois_server_packets" lineno="94567"> <summary> Send and receive whois_server packets. </summary> @@ -69097,7 +69181,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94565"> +<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94583"> <summary> Do not audit attempts to send and receive whois_server packets. </summary> @@ -69108,7 +69192,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_whois_server_packets" lineno="94580"> +<interface name="corenet_relabelto_whois_server_packets" lineno="94598"> <summary> Relabel packets to whois_server the packet type. </summary> @@ -69118,7 +69202,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94602"> +<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94620"> <summary> Send and receive TCP traffic on the winshadow port. </summary> @@ -69129,7 +69213,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_winshadow_port" lineno="94617"> +<interface name="corenet_udp_send_winshadow_port" lineno="94635"> <summary> Send UDP traffic on the winshadow port. </summary> @@ -69140,7 +69224,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94632"> +<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94650"> <summary> Do not audit attempts to send UDP traffic on the winshadow port. </summary> @@ -69151,7 +69235,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_winshadow_port" lineno="94647"> +<interface name="corenet_udp_receive_winshadow_port" lineno="94665"> <summary> Receive UDP traffic on the winshadow port. </summary> @@ -69162,7 +69246,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94662"> +<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94680"> <summary> Do not audit attempts to receive UDP traffic on the winshadow port. </summary> @@ -69173,7 +69257,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94677"> +<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94695"> <summary> Send and receive UDP traffic on the winshadow port. </summary> @@ -69184,7 +69268,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94693"> +<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94711"> <summary> Do not audit attempts to send and receive UDP traffic on the winshadow port. @@ -69196,7 +69280,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_winshadow_port" lineno="94708"> +<interface name="corenet_tcp_bind_winshadow_port" lineno="94726"> <summary> Bind TCP sockets to the winshadow port. </summary> @@ -69207,7 +69291,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_winshadow_port" lineno="94728"> +<interface name="corenet_udp_bind_winshadow_port" lineno="94746"> <summary> Bind UDP sockets to the winshadow port. </summary> @@ -69218,7 +69302,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_winshadow_port" lineno="94747"> +<interface name="corenet_tcp_connect_winshadow_port" lineno="94765"> <summary> Make a TCP connection to the winshadow port. </summary> @@ -69228,7 +69312,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_winshadow_client_packets" lineno="94767"> +<interface name="corenet_send_winshadow_client_packets" lineno="94785"> <summary> Send winshadow_client packets. </summary> @@ -69239,7 +69323,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94786"> +<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94804"> <summary> Do not audit attempts to send winshadow_client packets. </summary> @@ -69250,7 +69334,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_winshadow_client_packets" lineno="94805"> +<interface name="corenet_receive_winshadow_client_packets" lineno="94823"> <summary> Receive winshadow_client packets. </summary> @@ -69261,7 +69345,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94824"> +<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94842"> <summary> Do not audit attempts to receive winshadow_client packets. </summary> @@ -69272,7 +69356,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94843"> +<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94861"> <summary> Send and receive winshadow_client packets. </summary> @@ -69283,7 +69367,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94859"> +<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94877"> <summary> Do not audit attempts to send and receive winshadow_client packets. </summary> @@ -69294,7 +69378,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_winshadow_client_packets" lineno="94874"> +<interface name="corenet_relabelto_winshadow_client_packets" lineno="94892"> <summary> Relabel packets to winshadow_client the packet type. </summary> @@ -69304,7 +69388,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_winshadow_server_packets" lineno="94894"> +<interface name="corenet_send_winshadow_server_packets" lineno="94912"> <summary> Send winshadow_server packets. </summary> @@ -69315,7 +69399,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94913"> +<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94931"> <summary> Do not audit attempts to send winshadow_server packets. </summary> @@ -69326,7 +69410,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_winshadow_server_packets" lineno="94932"> +<interface name="corenet_receive_winshadow_server_packets" lineno="94950"> <summary> Receive winshadow_server packets. </summary> @@ -69337,7 +69421,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94951"> +<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94969"> <summary> Do not audit attempts to receive winshadow_server packets. </summary> @@ -69348,7 +69432,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94970"> +<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94988"> <summary> Send and receive winshadow_server packets. </summary> @@ -69359,7 +69443,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94986"> +<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="95004"> <summary> Do not audit attempts to send and receive winshadow_server packets. </summary> @@ -69370,7 +69454,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_winshadow_server_packets" lineno="95001"> +<interface name="corenet_relabelto_winshadow_server_packets" lineno="95019"> <summary> Relabel packets to winshadow_server the packet type. </summary> @@ -69380,7 +69464,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95023"> +<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95041"> <summary> Send and receive TCP traffic on the wsdapi port. </summary> @@ -69391,7 +69475,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_wsdapi_port" lineno="95038"> +<interface name="corenet_udp_send_wsdapi_port" lineno="95056"> <summary> Send UDP traffic on the wsdapi port. </summary> @@ -69402,7 +69486,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95053"> +<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95071"> <summary> Do not audit attempts to send UDP traffic on the wsdapi port. </summary> @@ -69413,7 +69497,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_wsdapi_port" lineno="95068"> +<interface name="corenet_udp_receive_wsdapi_port" lineno="95086"> <summary> Receive UDP traffic on the wsdapi port. </summary> @@ -69424,7 +69508,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95083"> +<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95101"> <summary> Do not audit attempts to receive UDP traffic on the wsdapi port. </summary> @@ -69435,7 +69519,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95098"> +<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95116"> <summary> Send and receive UDP traffic on the wsdapi port. </summary> @@ -69446,7 +69530,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95114"> +<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95132"> <summary> Do not audit attempts to send and receive UDP traffic on the wsdapi port. @@ -69458,7 +69542,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_wsdapi_port" lineno="95129"> +<interface name="corenet_tcp_bind_wsdapi_port" lineno="95147"> <summary> Bind TCP sockets to the wsdapi port. </summary> @@ -69469,7 +69553,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_wsdapi_port" lineno="95149"> +<interface name="corenet_udp_bind_wsdapi_port" lineno="95167"> <summary> Bind UDP sockets to the wsdapi port. </summary> @@ -69480,7 +69564,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_wsdapi_port" lineno="95168"> +<interface name="corenet_tcp_connect_wsdapi_port" lineno="95186"> <summary> Make a TCP connection to the wsdapi port. </summary> @@ -69490,7 +69574,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsdapi_client_packets" lineno="95188"> +<interface name="corenet_send_wsdapi_client_packets" lineno="95206"> <summary> Send wsdapi_client packets. </summary> @@ -69501,7 +69585,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95207"> +<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95225"> <summary> Do not audit attempts to send wsdapi_client packets. </summary> @@ -69512,7 +69596,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsdapi_client_packets" lineno="95226"> +<interface name="corenet_receive_wsdapi_client_packets" lineno="95244"> <summary> Receive wsdapi_client packets. </summary> @@ -69523,7 +69607,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95245"> +<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95263"> <summary> Do not audit attempts to receive wsdapi_client packets. </summary> @@ -69534,7 +69618,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95264"> +<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95282"> <summary> Send and receive wsdapi_client packets. </summary> @@ -69545,7 +69629,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95280"> +<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95298"> <summary> Do not audit attempts to send and receive wsdapi_client packets. </summary> @@ -69556,7 +69640,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95295"> +<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95313"> <summary> Relabel packets to wsdapi_client the packet type. </summary> @@ -69566,7 +69650,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsdapi_server_packets" lineno="95315"> +<interface name="corenet_send_wsdapi_server_packets" lineno="95333"> <summary> Send wsdapi_server packets. </summary> @@ -69577,7 +69661,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95334"> +<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95352"> <summary> Do not audit attempts to send wsdapi_server packets. </summary> @@ -69588,7 +69672,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsdapi_server_packets" lineno="95353"> +<interface name="corenet_receive_wsdapi_server_packets" lineno="95371"> <summary> Receive wsdapi_server packets. </summary> @@ -69599,7 +69683,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95372"> +<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95390"> <summary> Do not audit attempts to receive wsdapi_server packets. </summary> @@ -69610,7 +69694,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95391"> +<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95409"> <summary> Send and receive wsdapi_server packets. </summary> @@ -69621,7 +69705,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95407"> +<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95425"> <summary> Do not audit attempts to send and receive wsdapi_server packets. </summary> @@ -69632,7 +69716,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95422"> +<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95440"> <summary> Relabel packets to wsdapi_server the packet type. </summary> @@ -69642,7 +69726,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95444"> +<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95462"> <summary> Send and receive TCP traffic on the wsicopy port. </summary> @@ -69653,7 +69737,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_wsicopy_port" lineno="95459"> +<interface name="corenet_udp_send_wsicopy_port" lineno="95477"> <summary> Send UDP traffic on the wsicopy port. </summary> @@ -69664,7 +69748,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95474"> +<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95492"> <summary> Do not audit attempts to send UDP traffic on the wsicopy port. </summary> @@ -69675,7 +69759,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_wsicopy_port" lineno="95489"> +<interface name="corenet_udp_receive_wsicopy_port" lineno="95507"> <summary> Receive UDP traffic on the wsicopy port. </summary> @@ -69686,7 +69770,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95504"> +<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95522"> <summary> Do not audit attempts to receive UDP traffic on the wsicopy port. </summary> @@ -69697,7 +69781,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95519"> +<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95537"> <summary> Send and receive UDP traffic on the wsicopy port. </summary> @@ -69708,7 +69792,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95535"> +<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95553"> <summary> Do not audit attempts to send and receive UDP traffic on the wsicopy port. @@ -69720,7 +69804,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_wsicopy_port" lineno="95550"> +<interface name="corenet_tcp_bind_wsicopy_port" lineno="95568"> <summary> Bind TCP sockets to the wsicopy port. </summary> @@ -69731,7 +69815,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_wsicopy_port" lineno="95570"> +<interface name="corenet_udp_bind_wsicopy_port" lineno="95588"> <summary> Bind UDP sockets to the wsicopy port. </summary> @@ -69742,7 +69826,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_wsicopy_port" lineno="95589"> +<interface name="corenet_tcp_connect_wsicopy_port" lineno="95607"> <summary> Make a TCP connection to the wsicopy port. </summary> @@ -69752,7 +69836,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsicopy_client_packets" lineno="95609"> +<interface name="corenet_send_wsicopy_client_packets" lineno="95627"> <summary> Send wsicopy_client packets. </summary> @@ -69763,7 +69847,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95628"> +<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95646"> <summary> Do not audit attempts to send wsicopy_client packets. </summary> @@ -69774,7 +69858,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsicopy_client_packets" lineno="95647"> +<interface name="corenet_receive_wsicopy_client_packets" lineno="95665"> <summary> Receive wsicopy_client packets. </summary> @@ -69785,7 +69869,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95666"> +<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95684"> <summary> Do not audit attempts to receive wsicopy_client packets. </summary> @@ -69796,7 +69880,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95685"> +<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95703"> <summary> Send and receive wsicopy_client packets. </summary> @@ -69807,7 +69891,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95701"> +<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95719"> <summary> Do not audit attempts to send and receive wsicopy_client packets. </summary> @@ -69818,7 +69902,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95716"> +<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95734"> <summary> Relabel packets to wsicopy_client the packet type. </summary> @@ -69828,7 +69912,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsicopy_server_packets" lineno="95736"> +<interface name="corenet_send_wsicopy_server_packets" lineno="95754"> <summary> Send wsicopy_server packets. </summary> @@ -69839,7 +69923,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95755"> +<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95773"> <summary> Do not audit attempts to send wsicopy_server packets. </summary> @@ -69850,7 +69934,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsicopy_server_packets" lineno="95774"> +<interface name="corenet_receive_wsicopy_server_packets" lineno="95792"> <summary> Receive wsicopy_server packets. </summary> @@ -69861,7 +69945,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95793"> +<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95811"> <summary> Do not audit attempts to receive wsicopy_server packets. </summary> @@ -69872,7 +69956,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95812"> +<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95830"> <summary> Send and receive wsicopy_server packets. </summary> @@ -69883,7 +69967,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95828"> +<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95846"> <summary> Do not audit attempts to send and receive wsicopy_server packets. </summary> @@ -69894,7 +69978,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95843"> +<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95861"> <summary> Relabel packets to wsicopy_server the packet type. </summary> @@ -69904,7 +69988,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95865"> +<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95883"> <summary> Send and receive TCP traffic on the xdmcp port. </summary> @@ -69915,7 +69999,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_xdmcp_port" lineno="95880"> +<interface name="corenet_udp_send_xdmcp_port" lineno="95898"> <summary> Send UDP traffic on the xdmcp port. </summary> @@ -69926,7 +70010,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95895"> +<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95913"> <summary> Do not audit attempts to send UDP traffic on the xdmcp port. </summary> @@ -69937,7 +70021,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_xdmcp_port" lineno="95910"> +<interface name="corenet_udp_receive_xdmcp_port" lineno="95928"> <summary> Receive UDP traffic on the xdmcp port. </summary> @@ -69948,7 +70032,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95925"> +<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95943"> <summary> Do not audit attempts to receive UDP traffic on the xdmcp port. </summary> @@ -69959,7 +70043,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95940"> +<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95958"> <summary> Send and receive UDP traffic on the xdmcp port. </summary> @@ -69970,7 +70054,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95956"> +<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95974"> <summary> Do not audit attempts to send and receive UDP traffic on the xdmcp port. @@ -69982,7 +70066,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_xdmcp_port" lineno="95971"> +<interface name="corenet_tcp_bind_xdmcp_port" lineno="95989"> <summary> Bind TCP sockets to the xdmcp port. </summary> @@ -69993,7 +70077,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xdmcp_port" lineno="95991"> +<interface name="corenet_udp_bind_xdmcp_port" lineno="96009"> <summary> Bind UDP sockets to the xdmcp port. </summary> @@ -70004,7 +70088,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xdmcp_port" lineno="96010"> +<interface name="corenet_tcp_connect_xdmcp_port" lineno="96028"> <summary> Make a TCP connection to the xdmcp port. </summary> @@ -70014,7 +70098,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xdmcp_client_packets" lineno="96030"> +<interface name="corenet_send_xdmcp_client_packets" lineno="96048"> <summary> Send xdmcp_client packets. </summary> @@ -70025,7 +70109,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96049"> +<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96067"> <summary> Do not audit attempts to send xdmcp_client packets. </summary> @@ -70036,7 +70120,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xdmcp_client_packets" lineno="96068"> +<interface name="corenet_receive_xdmcp_client_packets" lineno="96086"> <summary> Receive xdmcp_client packets. </summary> @@ -70047,7 +70131,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96087"> +<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96105"> <summary> Do not audit attempts to receive xdmcp_client packets. </summary> @@ -70058,7 +70142,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96106"> +<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96124"> <summary> Send and receive xdmcp_client packets. </summary> @@ -70069,7 +70153,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96122"> +<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96140"> <summary> Do not audit attempts to send and receive xdmcp_client packets. </summary> @@ -70080,7 +70164,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96137"> +<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96155"> <summary> Relabel packets to xdmcp_client the packet type. </summary> @@ -70090,7 +70174,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xdmcp_server_packets" lineno="96157"> +<interface name="corenet_send_xdmcp_server_packets" lineno="96175"> <summary> Send xdmcp_server packets. </summary> @@ -70101,7 +70185,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96176"> +<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96194"> <summary> Do not audit attempts to send xdmcp_server packets. </summary> @@ -70112,7 +70196,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xdmcp_server_packets" lineno="96195"> +<interface name="corenet_receive_xdmcp_server_packets" lineno="96213"> <summary> Receive xdmcp_server packets. </summary> @@ -70123,7 +70207,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96214"> +<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96232"> <summary> Do not audit attempts to receive xdmcp_server packets. </summary> @@ -70134,7 +70218,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96233"> +<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96251"> <summary> Send and receive xdmcp_server packets. </summary> @@ -70145,7 +70229,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96249"> +<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96267"> <summary> Do not audit attempts to send and receive xdmcp_server packets. </summary> @@ -70156,7 +70240,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96264"> +<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96282"> <summary> Relabel packets to xdmcp_server the packet type. </summary> @@ -70166,7 +70250,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xen_port" lineno="96286"> +<interface name="corenet_tcp_sendrecv_xen_port" lineno="96304"> <summary> Send and receive TCP traffic on the xen port. </summary> @@ -70177,7 +70261,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_xen_port" lineno="96301"> +<interface name="corenet_udp_send_xen_port" lineno="96319"> <summary> Send UDP traffic on the xen port. </summary> @@ -70188,7 +70272,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96316"> +<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96334"> <summary> Do not audit attempts to send UDP traffic on the xen port. </summary> @@ -70199,7 +70283,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_xen_port" lineno="96331"> +<interface name="corenet_udp_receive_xen_port" lineno="96349"> <summary> Receive UDP traffic on the xen port. </summary> @@ -70210,7 +70294,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96346"> +<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96364"> <summary> Do not audit attempts to receive UDP traffic on the xen port. </summary> @@ -70221,7 +70305,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_xen_port" lineno="96361"> +<interface name="corenet_udp_sendrecv_xen_port" lineno="96379"> <summary> Send and receive UDP traffic on the xen port. </summary> @@ -70232,7 +70316,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96377"> +<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96395"> <summary> Do not audit attempts to send and receive UDP traffic on the xen port. @@ -70244,7 +70328,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_xen_port" lineno="96392"> +<interface name="corenet_tcp_bind_xen_port" lineno="96410"> <summary> Bind TCP sockets to the xen port. </summary> @@ -70255,7 +70339,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xen_port" lineno="96412"> +<interface name="corenet_udp_bind_xen_port" lineno="96430"> <summary> Bind UDP sockets to the xen port. </summary> @@ -70266,7 +70350,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xen_port" lineno="96431"> +<interface name="corenet_tcp_connect_xen_port" lineno="96449"> <summary> Make a TCP connection to the xen port. </summary> @@ -70276,7 +70360,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xen_client_packets" lineno="96451"> +<interface name="corenet_send_xen_client_packets" lineno="96469"> <summary> Send xen_client packets. </summary> @@ -70287,7 +70371,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96470"> +<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96488"> <summary> Do not audit attempts to send xen_client packets. </summary> @@ -70298,7 +70382,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xen_client_packets" lineno="96489"> +<interface name="corenet_receive_xen_client_packets" lineno="96507"> <summary> Receive xen_client packets. </summary> @@ -70309,7 +70393,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96508"> +<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96526"> <summary> Do not audit attempts to receive xen_client packets. </summary> @@ -70320,7 +70404,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xen_client_packets" lineno="96527"> +<interface name="corenet_sendrecv_xen_client_packets" lineno="96545"> <summary> Send and receive xen_client packets. </summary> @@ -70331,7 +70415,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96543"> +<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96561"> <summary> Do not audit attempts to send and receive xen_client packets. </summary> @@ -70342,7 +70426,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xen_client_packets" lineno="96558"> +<interface name="corenet_relabelto_xen_client_packets" lineno="96576"> <summary> Relabel packets to xen_client the packet type. </summary> @@ -70352,7 +70436,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xen_server_packets" lineno="96578"> +<interface name="corenet_send_xen_server_packets" lineno="96596"> <summary> Send xen_server packets. </summary> @@ -70363,7 +70447,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96597"> +<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96615"> <summary> Do not audit attempts to send xen_server packets. </summary> @@ -70374,7 +70458,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xen_server_packets" lineno="96616"> +<interface name="corenet_receive_xen_server_packets" lineno="96634"> <summary> Receive xen_server packets. </summary> @@ -70385,7 +70469,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96635"> +<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96653"> <summary> Do not audit attempts to receive xen_server packets. </summary> @@ -70396,7 +70480,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xen_server_packets" lineno="96654"> +<interface name="corenet_sendrecv_xen_server_packets" lineno="96672"> <summary> Send and receive xen_server packets. </summary> @@ -70407,7 +70491,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96670"> +<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96688"> <summary> Do not audit attempts to send and receive xen_server packets. </summary> @@ -70418,7 +70502,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xen_server_packets" lineno="96685"> +<interface name="corenet_relabelto_xen_server_packets" lineno="96703"> <summary> Relabel packets to xen_server the packet type. </summary> @@ -70428,7 +70512,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96707"> +<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96725"> <summary> Send and receive TCP traffic on the xfs port. </summary> @@ -70439,7 +70523,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_xfs_port" lineno="96722"> +<interface name="corenet_udp_send_xfs_port" lineno="96740"> <summary> Send UDP traffic on the xfs port. </summary> @@ -70450,7 +70534,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96737"> +<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96755"> <summary> Do not audit attempts to send UDP traffic on the xfs port. </summary> @@ -70461,7 +70545,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_xfs_port" lineno="96752"> +<interface name="corenet_udp_receive_xfs_port" lineno="96770"> <summary> Receive UDP traffic on the xfs port. </summary> @@ -70472,7 +70556,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96767"> +<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96785"> <summary> Do not audit attempts to receive UDP traffic on the xfs port. </summary> @@ -70483,7 +70567,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_xfs_port" lineno="96782"> +<interface name="corenet_udp_sendrecv_xfs_port" lineno="96800"> <summary> Send and receive UDP traffic on the xfs port. </summary> @@ -70494,7 +70578,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96798"> +<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96816"> <summary> Do not audit attempts to send and receive UDP traffic on the xfs port. @@ -70506,7 +70590,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_xfs_port" lineno="96813"> +<interface name="corenet_tcp_bind_xfs_port" lineno="96831"> <summary> Bind TCP sockets to the xfs port. </summary> @@ -70517,7 +70601,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xfs_port" lineno="96833"> +<interface name="corenet_udp_bind_xfs_port" lineno="96851"> <summary> Bind UDP sockets to the xfs port. </summary> @@ -70528,7 +70612,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xfs_port" lineno="96852"> +<interface name="corenet_tcp_connect_xfs_port" lineno="96870"> <summary> Make a TCP connection to the xfs port. </summary> @@ -70538,7 +70622,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xfs_client_packets" lineno="96872"> +<interface name="corenet_send_xfs_client_packets" lineno="96890"> <summary> Send xfs_client packets. </summary> @@ -70549,7 +70633,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96891"> +<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96909"> <summary> Do not audit attempts to send xfs_client packets. </summary> @@ -70560,7 +70644,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xfs_client_packets" lineno="96910"> +<interface name="corenet_receive_xfs_client_packets" lineno="96928"> <summary> Receive xfs_client packets. </summary> @@ -70571,7 +70655,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96929"> +<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96947"> <summary> Do not audit attempts to receive xfs_client packets. </summary> @@ -70582,7 +70666,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xfs_client_packets" lineno="96948"> +<interface name="corenet_sendrecv_xfs_client_packets" lineno="96966"> <summary> Send and receive xfs_client packets. </summary> @@ -70593,7 +70677,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96964"> +<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96982"> <summary> Do not audit attempts to send and receive xfs_client packets. </summary> @@ -70604,7 +70688,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xfs_client_packets" lineno="96979"> +<interface name="corenet_relabelto_xfs_client_packets" lineno="96997"> <summary> Relabel packets to xfs_client the packet type. </summary> @@ -70614,7 +70698,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xfs_server_packets" lineno="96999"> +<interface name="corenet_send_xfs_server_packets" lineno="97017"> <summary> Send xfs_server packets. </summary> @@ -70625,7 +70709,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97018"> +<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97036"> <summary> Do not audit attempts to send xfs_server packets. </summary> @@ -70636,7 +70720,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xfs_server_packets" lineno="97037"> +<interface name="corenet_receive_xfs_server_packets" lineno="97055"> <summary> Receive xfs_server packets. </summary> @@ -70647,7 +70731,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97056"> +<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97074"> <summary> Do not audit attempts to receive xfs_server packets. </summary> @@ -70658,7 +70742,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xfs_server_packets" lineno="97075"> +<interface name="corenet_sendrecv_xfs_server_packets" lineno="97093"> <summary> Send and receive xfs_server packets. </summary> @@ -70669,7 +70753,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97091"> +<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97109"> <summary> Do not audit attempts to send and receive xfs_server packets. </summary> @@ -70680,7 +70764,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xfs_server_packets" lineno="97106"> +<interface name="corenet_relabelto_xfs_server_packets" lineno="97124"> <summary> Relabel packets to xfs_server the packet type. </summary> @@ -70690,7 +70774,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97128"> +<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97146"> <summary> Send and receive TCP traffic on the xserver port. </summary> @@ -70701,7 +70785,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_xserver_port" lineno="97143"> +<interface name="corenet_udp_send_xserver_port" lineno="97161"> <summary> Send UDP traffic on the xserver port. </summary> @@ -70712,7 +70796,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97158"> +<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97176"> <summary> Do not audit attempts to send UDP traffic on the xserver port. </summary> @@ -70723,7 +70807,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_xserver_port" lineno="97173"> +<interface name="corenet_udp_receive_xserver_port" lineno="97191"> <summary> Receive UDP traffic on the xserver port. </summary> @@ -70734,7 +70818,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97188"> +<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97206"> <summary> Do not audit attempts to receive UDP traffic on the xserver port. </summary> @@ -70745,7 +70829,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_xserver_port" lineno="97203"> +<interface name="corenet_udp_sendrecv_xserver_port" lineno="97221"> <summary> Send and receive UDP traffic on the xserver port. </summary> @@ -70756,7 +70840,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97219"> +<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97237"> <summary> Do not audit attempts to send and receive UDP traffic on the xserver port. @@ -70768,7 +70852,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_xserver_port" lineno="97234"> +<interface name="corenet_tcp_bind_xserver_port" lineno="97252"> <summary> Bind TCP sockets to the xserver port. </summary> @@ -70779,7 +70863,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xserver_port" lineno="97254"> +<interface name="corenet_udp_bind_xserver_port" lineno="97272"> <summary> Bind UDP sockets to the xserver port. </summary> @@ -70790,7 +70874,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xserver_port" lineno="97273"> +<interface name="corenet_tcp_connect_xserver_port" lineno="97291"> <summary> Make a TCP connection to the xserver port. </summary> @@ -70800,7 +70884,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xserver_client_packets" lineno="97293"> +<interface name="corenet_send_xserver_client_packets" lineno="97311"> <summary> Send xserver_client packets. </summary> @@ -70811,7 +70895,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97312"> +<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97330"> <summary> Do not audit attempts to send xserver_client packets. </summary> @@ -70822,7 +70906,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xserver_client_packets" lineno="97331"> +<interface name="corenet_receive_xserver_client_packets" lineno="97349"> <summary> Receive xserver_client packets. </summary> @@ -70833,7 +70917,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97350"> +<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97368"> <summary> Do not audit attempts to receive xserver_client packets. </summary> @@ -70844,7 +70928,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xserver_client_packets" lineno="97369"> +<interface name="corenet_sendrecv_xserver_client_packets" lineno="97387"> <summary> Send and receive xserver_client packets. </summary> @@ -70855,7 +70939,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97385"> +<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97403"> <summary> Do not audit attempts to send and receive xserver_client packets. </summary> @@ -70866,7 +70950,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xserver_client_packets" lineno="97400"> +<interface name="corenet_relabelto_xserver_client_packets" lineno="97418"> <summary> Relabel packets to xserver_client the packet type. </summary> @@ -70876,7 +70960,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xserver_server_packets" lineno="97420"> +<interface name="corenet_send_xserver_server_packets" lineno="97438"> <summary> Send xserver_server packets. </summary> @@ -70887,7 +70971,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97439"> +<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97457"> <summary> Do not audit attempts to send xserver_server packets. </summary> @@ -70898,7 +70982,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xserver_server_packets" lineno="97458"> +<interface name="corenet_receive_xserver_server_packets" lineno="97476"> <summary> Receive xserver_server packets. </summary> @@ -70909,7 +70993,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97477"> +<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97495"> <summary> Do not audit attempts to receive xserver_server packets. </summary> @@ -70920,7 +71004,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xserver_server_packets" lineno="97496"> +<interface name="corenet_sendrecv_xserver_server_packets" lineno="97514"> <summary> Send and receive xserver_server packets. </summary> @@ -70931,7 +71015,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97512"> +<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97530"> <summary> Do not audit attempts to send and receive xserver_server packets. </summary> @@ -70942,7 +71026,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xserver_server_packets" lineno="97527"> +<interface name="corenet_relabelto_xserver_server_packets" lineno="97545"> <summary> Relabel packets to xserver_server the packet type. </summary> @@ -70952,7 +71036,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97549"> +<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97567"> <summary> Send and receive TCP traffic on the zarafa port. </summary> @@ -70963,7 +71047,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zarafa_port" lineno="97564"> +<interface name="corenet_udp_send_zarafa_port" lineno="97582"> <summary> Send UDP traffic on the zarafa port. </summary> @@ -70974,7 +71058,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97579"> +<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97597"> <summary> Do not audit attempts to send UDP traffic on the zarafa port. </summary> @@ -70985,7 +71069,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zarafa_port" lineno="97594"> +<interface name="corenet_udp_receive_zarafa_port" lineno="97612"> <summary> Receive UDP traffic on the zarafa port. </summary> @@ -70996,7 +71080,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97609"> +<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97627"> <summary> Do not audit attempts to receive UDP traffic on the zarafa port. </summary> @@ -71007,7 +71091,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97624"> +<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97642"> <summary> Send and receive UDP traffic on the zarafa port. </summary> @@ -71018,7 +71102,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97640"> +<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97658"> <summary> Do not audit attempts to send and receive UDP traffic on the zarafa port. @@ -71030,7 +71114,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zarafa_port" lineno="97655"> +<interface name="corenet_tcp_bind_zarafa_port" lineno="97673"> <summary> Bind TCP sockets to the zarafa port. </summary> @@ -71041,7 +71125,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zarafa_port" lineno="97675"> +<interface name="corenet_udp_bind_zarafa_port" lineno="97693"> <summary> Bind UDP sockets to the zarafa port. </summary> @@ -71052,7 +71136,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zarafa_port" lineno="97694"> +<interface name="corenet_tcp_connect_zarafa_port" lineno="97712"> <summary> Make a TCP connection to the zarafa port. </summary> @@ -71062,7 +71146,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zarafa_client_packets" lineno="97714"> +<interface name="corenet_send_zarafa_client_packets" lineno="97732"> <summary> Send zarafa_client packets. </summary> @@ -71073,7 +71157,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97733"> +<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97751"> <summary> Do not audit attempts to send zarafa_client packets. </summary> @@ -71084,7 +71168,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zarafa_client_packets" lineno="97752"> +<interface name="corenet_receive_zarafa_client_packets" lineno="97770"> <summary> Receive zarafa_client packets. </summary> @@ -71095,7 +71179,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97771"> +<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97789"> <summary> Do not audit attempts to receive zarafa_client packets. </summary> @@ -71106,7 +71190,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97790"> +<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97808"> <summary> Send and receive zarafa_client packets. </summary> @@ -71117,7 +71201,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97806"> +<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97824"> <summary> Do not audit attempts to send and receive zarafa_client packets. </summary> @@ -71128,7 +71212,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zarafa_client_packets" lineno="97821"> +<interface name="corenet_relabelto_zarafa_client_packets" lineno="97839"> <summary> Relabel packets to zarafa_client the packet type. </summary> @@ -71138,7 +71222,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zarafa_server_packets" lineno="97841"> +<interface name="corenet_send_zarafa_server_packets" lineno="97859"> <summary> Send zarafa_server packets. </summary> @@ -71149,7 +71233,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97860"> +<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97878"> <summary> Do not audit attempts to send zarafa_server packets. </summary> @@ -71160,7 +71244,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zarafa_server_packets" lineno="97879"> +<interface name="corenet_receive_zarafa_server_packets" lineno="97897"> <summary> Receive zarafa_server packets. </summary> @@ -71171,7 +71255,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97898"> +<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97916"> <summary> Do not audit attempts to receive zarafa_server packets. </summary> @@ -71182,7 +71266,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97917"> +<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97935"> <summary> Send and receive zarafa_server packets. </summary> @@ -71193,7 +71277,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97933"> +<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97951"> <summary> Do not audit attempts to send and receive zarafa_server packets. </summary> @@ -71204,7 +71288,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zarafa_server_packets" lineno="97948"> +<interface name="corenet_relabelto_zarafa_server_packets" lineno="97966"> <summary> Relabel packets to zarafa_server the packet type. </summary> @@ -71214,7 +71298,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97970"> +<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97988"> <summary> Send and receive TCP traffic on the zabbix port. </summary> @@ -71225,7 +71309,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zabbix_port" lineno="97985"> +<interface name="corenet_udp_send_zabbix_port" lineno="98003"> <summary> Send UDP traffic on the zabbix port. </summary> @@ -71236,7 +71320,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98000"> +<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98018"> <summary> Do not audit attempts to send UDP traffic on the zabbix port. </summary> @@ -71247,7 +71331,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zabbix_port" lineno="98015"> +<interface name="corenet_udp_receive_zabbix_port" lineno="98033"> <summary> Receive UDP traffic on the zabbix port. </summary> @@ -71258,7 +71342,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98030"> +<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98048"> <summary> Do not audit attempts to receive UDP traffic on the zabbix port. </summary> @@ -71269,7 +71353,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98045"> +<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98063"> <summary> Send and receive UDP traffic on the zabbix port. </summary> @@ -71280,7 +71364,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98061"> +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98079"> <summary> Do not audit attempts to send and receive UDP traffic on the zabbix port. @@ -71292,7 +71376,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zabbix_port" lineno="98076"> +<interface name="corenet_tcp_bind_zabbix_port" lineno="98094"> <summary> Bind TCP sockets to the zabbix port. </summary> @@ -71303,7 +71387,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zabbix_port" lineno="98096"> +<interface name="corenet_udp_bind_zabbix_port" lineno="98114"> <summary> Bind UDP sockets to the zabbix port. </summary> @@ -71314,7 +71398,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zabbix_port" lineno="98115"> +<interface name="corenet_tcp_connect_zabbix_port" lineno="98133"> <summary> Make a TCP connection to the zabbix port. </summary> @@ -71324,7 +71408,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_client_packets" lineno="98135"> +<interface name="corenet_send_zabbix_client_packets" lineno="98153"> <summary> Send zabbix_client packets. </summary> @@ -71335,7 +71419,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98154"> +<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98172"> <summary> Do not audit attempts to send zabbix_client packets. </summary> @@ -71346,7 +71430,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_client_packets" lineno="98173"> +<interface name="corenet_receive_zabbix_client_packets" lineno="98191"> <summary> Receive zabbix_client packets. </summary> @@ -71357,7 +71441,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98192"> +<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98210"> <summary> Do not audit attempts to receive zabbix_client packets. </summary> @@ -71368,7 +71452,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98211"> +<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98229"> <summary> Send and receive zabbix_client packets. </summary> @@ -71379,7 +71463,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98227"> +<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98245"> <summary> Do not audit attempts to send and receive zabbix_client packets. </summary> @@ -71390,7 +71474,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_client_packets" lineno="98242"> +<interface name="corenet_relabelto_zabbix_client_packets" lineno="98260"> <summary> Relabel packets to zabbix_client the packet type. </summary> @@ -71400,7 +71484,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_server_packets" lineno="98262"> +<interface name="corenet_send_zabbix_server_packets" lineno="98280"> <summary> Send zabbix_server packets. </summary> @@ -71411,7 +71495,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98281"> +<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98299"> <summary> Do not audit attempts to send zabbix_server packets. </summary> @@ -71422,7 +71506,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_server_packets" lineno="98300"> +<interface name="corenet_receive_zabbix_server_packets" lineno="98318"> <summary> Receive zabbix_server packets. </summary> @@ -71433,7 +71517,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98319"> +<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98337"> <summary> Do not audit attempts to receive zabbix_server packets. </summary> @@ -71444,7 +71528,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98338"> +<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98356"> <summary> Send and receive zabbix_server packets. </summary> @@ -71455,7 +71539,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98354"> +<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98372"> <summary> Do not audit attempts to send and receive zabbix_server packets. </summary> @@ -71466,7 +71550,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_server_packets" lineno="98369"> +<interface name="corenet_relabelto_zabbix_server_packets" lineno="98387"> <summary> Relabel packets to zabbix_server the packet type. </summary> @@ -71476,7 +71560,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98391"> +<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98409"> <summary> Send and receive TCP traffic on the zabbix_agent port. </summary> @@ -71487,7 +71571,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zabbix_agent_port" lineno="98406"> +<interface name="corenet_udp_send_zabbix_agent_port" lineno="98424"> <summary> Send UDP traffic on the zabbix_agent port. </summary> @@ -71498,7 +71582,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98421"> +<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98439"> <summary> Do not audit attempts to send UDP traffic on the zabbix_agent port. </summary> @@ -71509,7 +71593,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98436"> +<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98454"> <summary> Receive UDP traffic on the zabbix_agent port. </summary> @@ -71520,7 +71604,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98451"> +<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98469"> <summary> Do not audit attempts to receive UDP traffic on the zabbix_agent port. </summary> @@ -71531,7 +71615,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98466"> +<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98484"> <summary> Send and receive UDP traffic on the zabbix_agent port. </summary> @@ -71542,7 +71626,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98482"> +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98500"> <summary> Do not audit attempts to send and receive UDP traffic on the zabbix_agent port. @@ -71554,7 +71638,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98497"> +<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98515"> <summary> Bind TCP sockets to the zabbix_agent port. </summary> @@ -71565,7 +71649,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98517"> +<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98535"> <summary> Bind UDP sockets to the zabbix_agent port. </summary> @@ -71576,7 +71660,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98536"> +<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98554"> <summary> Make a TCP connection to the zabbix_agent port. </summary> @@ -71586,7 +71670,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_agent_client_packets" lineno="98556"> +<interface name="corenet_send_zabbix_agent_client_packets" lineno="98574"> <summary> Send zabbix_agent_client packets. </summary> @@ -71597,7 +71681,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98575"> +<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98593"> <summary> Do not audit attempts to send zabbix_agent_client packets. </summary> @@ -71608,7 +71692,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98594"> +<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98612"> <summary> Receive zabbix_agent_client packets. </summary> @@ -71619,7 +71703,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98613"> +<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98631"> <summary> Do not audit attempts to receive zabbix_agent_client packets. </summary> @@ -71630,7 +71714,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98632"> +<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98650"> <summary> Send and receive zabbix_agent_client packets. </summary> @@ -71641,7 +71725,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98648"> +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98666"> <summary> Do not audit attempts to send and receive zabbix_agent_client packets. </summary> @@ -71652,7 +71736,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98663"> +<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98681"> <summary> Relabel packets to zabbix_agent_client the packet type. </summary> @@ -71662,7 +71746,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_agent_server_packets" lineno="98683"> +<interface name="corenet_send_zabbix_agent_server_packets" lineno="98701"> <summary> Send zabbix_agent_server packets. </summary> @@ -71673,7 +71757,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98702"> +<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98720"> <summary> Do not audit attempts to send zabbix_agent_server packets. </summary> @@ -71684,7 +71768,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98721"> +<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98739"> <summary> Receive zabbix_agent_server packets. </summary> @@ -71695,7 +71779,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98740"> +<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98758"> <summary> Do not audit attempts to receive zabbix_agent_server packets. </summary> @@ -71706,7 +71790,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98759"> +<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98777"> <summary> Send and receive zabbix_agent_server packets. </summary> @@ -71717,7 +71801,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98775"> +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98793"> <summary> Do not audit attempts to send and receive zabbix_agent_server packets. </summary> @@ -71728,7 +71812,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98790"> +<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98808"> <summary> Relabel packets to zabbix_agent_server the packet type. </summary> @@ -71738,7 +71822,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98812"> +<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98830"> <summary> Send and receive TCP traffic on the zookeeper_client port. </summary> @@ -71749,7 +71833,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zookeeper_client_port" lineno="98827"> +<interface name="corenet_udp_send_zookeeper_client_port" lineno="98845"> <summary> Send UDP traffic on the zookeeper_client port. </summary> @@ -71760,7 +71844,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98842"> +<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98860"> <summary> Do not audit attempts to send UDP traffic on the zookeeper_client port. </summary> @@ -71771,7 +71855,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98857"> +<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98875"> <summary> Receive UDP traffic on the zookeeper_client port. </summary> @@ -71782,7 +71866,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98872"> +<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98890"> <summary> Do not audit attempts to receive UDP traffic on the zookeeper_client port. </summary> @@ -71793,7 +71877,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98887"> +<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98905"> <summary> Send and receive UDP traffic on the zookeeper_client port. </summary> @@ -71804,7 +71888,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98903"> +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98921"> <summary> Do not audit attempts to send and receive UDP traffic on the zookeeper_client port. @@ -71816,7 +71900,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98918"> +<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98936"> <summary> Bind TCP sockets to the zookeeper_client port. </summary> @@ -71827,7 +71911,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98938"> +<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98956"> <summary> Bind UDP sockets to the zookeeper_client port. </summary> @@ -71838,7 +71922,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98957"> +<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98975"> <summary> Make a TCP connection to the zookeeper_client port. </summary> @@ -71848,7 +71932,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_client_client_packets" lineno="98977"> +<interface name="corenet_send_zookeeper_client_client_packets" lineno="98995"> <summary> Send zookeeper_client_client packets. </summary> @@ -71859,7 +71943,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98996"> +<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="99014"> <summary> Do not audit attempts to send zookeeper_client_client packets. </summary> @@ -71870,7 +71954,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99015"> +<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99033"> <summary> Receive zookeeper_client_client packets. </summary> @@ -71881,7 +71965,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99034"> +<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99052"> <summary> Do not audit attempts to receive zookeeper_client_client packets. </summary> @@ -71892,7 +71976,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99053"> +<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99071"> <summary> Send and receive zookeeper_client_client packets. </summary> @@ -71903,7 +71987,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99069"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99087"> <summary> Do not audit attempts to send and receive zookeeper_client_client packets. </summary> @@ -71914,7 +71998,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99084"> +<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99102"> <summary> Relabel packets to zookeeper_client_client the packet type. </summary> @@ -71924,7 +72008,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_client_server_packets" lineno="99104"> +<interface name="corenet_send_zookeeper_client_server_packets" lineno="99122"> <summary> Send zookeeper_client_server packets. </summary> @@ -71935,7 +72019,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99123"> +<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99141"> <summary> Do not audit attempts to send zookeeper_client_server packets. </summary> @@ -71946,7 +72030,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99142"> +<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99160"> <summary> Receive zookeeper_client_server packets. </summary> @@ -71957,7 +72041,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99161"> +<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99179"> <summary> Do not audit attempts to receive zookeeper_client_server packets. </summary> @@ -71968,7 +72052,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99180"> +<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99198"> <summary> Send and receive zookeeper_client_server packets. </summary> @@ -71979,7 +72063,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99196"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99214"> <summary> Do not audit attempts to send and receive zookeeper_client_server packets. </summary> @@ -71990,7 +72074,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99211"> +<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99229"> <summary> Relabel packets to zookeeper_client_server the packet type. </summary> @@ -72000,7 +72084,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99233"> +<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99251"> <summary> Send and receive TCP traffic on the zookeeper_election port. </summary> @@ -72011,7 +72095,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zookeeper_election_port" lineno="99248"> +<interface name="corenet_udp_send_zookeeper_election_port" lineno="99266"> <summary> Send UDP traffic on the zookeeper_election port. </summary> @@ -72022,7 +72106,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99263"> +<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99281"> <summary> Do not audit attempts to send UDP traffic on the zookeeper_election port. </summary> @@ -72033,7 +72117,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99278"> +<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99296"> <summary> Receive UDP traffic on the zookeeper_election port. </summary> @@ -72044,7 +72128,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99293"> +<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99311"> <summary> Do not audit attempts to receive UDP traffic on the zookeeper_election port. </summary> @@ -72055,7 +72139,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99308"> +<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99326"> <summary> Send and receive UDP traffic on the zookeeper_election port. </summary> @@ -72066,7 +72150,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99324"> +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99342"> <summary> Do not audit attempts to send and receive UDP traffic on the zookeeper_election port. @@ -72078,7 +72162,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99339"> +<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99357"> <summary> Bind TCP sockets to the zookeeper_election port. </summary> @@ -72089,7 +72173,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99359"> +<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99377"> <summary> Bind UDP sockets to the zookeeper_election port. </summary> @@ -72100,7 +72184,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99378"> +<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99396"> <summary> Make a TCP connection to the zookeeper_election port. </summary> @@ -72110,7 +72194,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_election_client_packets" lineno="99398"> +<interface name="corenet_send_zookeeper_election_client_packets" lineno="99416"> <summary> Send zookeeper_election_client packets. </summary> @@ -72121,7 +72205,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99417"> +<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99435"> <summary> Do not audit attempts to send zookeeper_election_client packets. </summary> @@ -72132,7 +72216,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99436"> +<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99454"> <summary> Receive zookeeper_election_client packets. </summary> @@ -72143,7 +72227,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99455"> +<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99473"> <summary> Do not audit attempts to receive zookeeper_election_client packets. </summary> @@ -72154,7 +72238,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99474"> +<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99492"> <summary> Send and receive zookeeper_election_client packets. </summary> @@ -72165,7 +72249,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99490"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99508"> <summary> Do not audit attempts to send and receive zookeeper_election_client packets. </summary> @@ -72176,7 +72260,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99505"> +<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99523"> <summary> Relabel packets to zookeeper_election_client the packet type. </summary> @@ -72186,7 +72270,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_election_server_packets" lineno="99525"> +<interface name="corenet_send_zookeeper_election_server_packets" lineno="99543"> <summary> Send zookeeper_election_server packets. </summary> @@ -72197,7 +72281,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99544"> +<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99562"> <summary> Do not audit attempts to send zookeeper_election_server packets. </summary> @@ -72208,7 +72292,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99563"> +<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99581"> <summary> Receive zookeeper_election_server packets. </summary> @@ -72219,7 +72303,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99582"> +<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99600"> <summary> Do not audit attempts to receive zookeeper_election_server packets. </summary> @@ -72230,7 +72314,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99601"> +<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99619"> <summary> Send and receive zookeeper_election_server packets. </summary> @@ -72241,7 +72325,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99617"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99635"> <summary> Do not audit attempts to send and receive zookeeper_election_server packets. </summary> @@ -72252,7 +72336,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99632"> +<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99650"> <summary> Relabel packets to zookeeper_election_server the packet type. </summary> @@ -72262,7 +72346,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99654"> +<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99672"> <summary> Send and receive TCP traffic on the zookeeper_leader port. </summary> @@ -72273,7 +72357,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99669"> +<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99687"> <summary> Send UDP traffic on the zookeeper_leader port. </summary> @@ -72284,7 +72368,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99684"> +<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99702"> <summary> Do not audit attempts to send UDP traffic on the zookeeper_leader port. </summary> @@ -72295,7 +72379,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99699"> +<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99717"> <summary> Receive UDP traffic on the zookeeper_leader port. </summary> @@ -72306,7 +72390,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99714"> +<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99732"> <summary> Do not audit attempts to receive UDP traffic on the zookeeper_leader port. </summary> @@ -72317,7 +72401,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99729"> +<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99747"> <summary> Send and receive UDP traffic on the zookeeper_leader port. </summary> @@ -72328,7 +72412,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99745"> +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99763"> <summary> Do not audit attempts to send and receive UDP traffic on the zookeeper_leader port. @@ -72340,7 +72424,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99760"> +<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99778"> <summary> Bind TCP sockets to the zookeeper_leader port. </summary> @@ -72351,7 +72435,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99780"> +<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99798"> <summary> Bind UDP sockets to the zookeeper_leader port. </summary> @@ -72362,7 +72446,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99799"> +<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99817"> <summary> Make a TCP connection to the zookeeper_leader port. </summary> @@ -72372,7 +72456,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99819"> +<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99837"> <summary> Send zookeeper_leader_client packets. </summary> @@ -72383,7 +72467,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99838"> +<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99856"> <summary> Do not audit attempts to send zookeeper_leader_client packets. </summary> @@ -72394,7 +72478,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99857"> +<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99875"> <summary> Receive zookeeper_leader_client packets. </summary> @@ -72405,7 +72489,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99876"> +<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99894"> <summary> Do not audit attempts to receive zookeeper_leader_client packets. </summary> @@ -72416,7 +72500,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99895"> +<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99913"> <summary> Send and receive zookeeper_leader_client packets. </summary> @@ -72427,7 +72511,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99911"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99929"> <summary> Do not audit attempts to send and receive zookeeper_leader_client packets. </summary> @@ -72438,7 +72522,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99926"> +<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99944"> <summary> Relabel packets to zookeeper_leader_client the packet type. </summary> @@ -72448,7 +72532,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99946"> +<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99964"> <summary> Send zookeeper_leader_server packets. </summary> @@ -72459,7 +72543,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99965"> +<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99983"> <summary> Do not audit attempts to send zookeeper_leader_server packets. </summary> @@ -72470,7 +72554,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99984"> +<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="100002"> <summary> Receive zookeeper_leader_server packets. </summary> @@ -72481,7 +72565,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100003"> +<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100021"> <summary> Do not audit attempts to receive zookeeper_leader_server packets. </summary> @@ -72492,7 +72576,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100022"> +<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100040"> <summary> Send and receive zookeeper_leader_server packets. </summary> @@ -72503,7 +72587,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100038"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100056"> <summary> Do not audit attempts to send and receive zookeeper_leader_server packets. </summary> @@ -72514,7 +72598,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100053"> +<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100071"> <summary> Relabel packets to zookeeper_leader_server the packet type. </summary> @@ -72524,7 +72608,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100075"> +<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100093"> <summary> Send and receive TCP traffic on the zebra port. </summary> @@ -72535,7 +72619,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zebra_port" lineno="100090"> +<interface name="corenet_udp_send_zebra_port" lineno="100108"> <summary> Send UDP traffic on the zebra port. </summary> @@ -72546,7 +72630,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100105"> +<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100123"> <summary> Do not audit attempts to send UDP traffic on the zebra port. </summary> @@ -72557,7 +72641,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zebra_port" lineno="100120"> +<interface name="corenet_udp_receive_zebra_port" lineno="100138"> <summary> Receive UDP traffic on the zebra port. </summary> @@ -72568,7 +72652,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100135"> +<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100153"> <summary> Do not audit attempts to receive UDP traffic on the zebra port. </summary> @@ -72579,7 +72663,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zebra_port" lineno="100150"> +<interface name="corenet_udp_sendrecv_zebra_port" lineno="100168"> <summary> Send and receive UDP traffic on the zebra port. </summary> @@ -72590,7 +72674,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100166"> +<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100184"> <summary> Do not audit attempts to send and receive UDP traffic on the zebra port. @@ -72602,7 +72686,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zebra_port" lineno="100181"> +<interface name="corenet_tcp_bind_zebra_port" lineno="100199"> <summary> Bind TCP sockets to the zebra port. </summary> @@ -72613,7 +72697,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zebra_port" lineno="100201"> +<interface name="corenet_udp_bind_zebra_port" lineno="100219"> <summary> Bind UDP sockets to the zebra port. </summary> @@ -72624,7 +72708,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zebra_port" lineno="100220"> +<interface name="corenet_tcp_connect_zebra_port" lineno="100238"> <summary> Make a TCP connection to the zebra port. </summary> @@ -72634,7 +72718,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zebra_client_packets" lineno="100240"> +<interface name="corenet_send_zebra_client_packets" lineno="100258"> <summary> Send zebra_client packets. </summary> @@ -72645,7 +72729,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100259"> +<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100277"> <summary> Do not audit attempts to send zebra_client packets. </summary> @@ -72656,7 +72740,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zebra_client_packets" lineno="100278"> +<interface name="corenet_receive_zebra_client_packets" lineno="100296"> <summary> Receive zebra_client packets. </summary> @@ -72667,7 +72751,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100297"> +<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100315"> <summary> Do not audit attempts to receive zebra_client packets. </summary> @@ -72678,7 +72762,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zebra_client_packets" lineno="100316"> +<interface name="corenet_sendrecv_zebra_client_packets" lineno="100334"> <summary> Send and receive zebra_client packets. </summary> @@ -72689,7 +72773,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100332"> +<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100350"> <summary> Do not audit attempts to send and receive zebra_client packets. </summary> @@ -72700,7 +72784,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zebra_client_packets" lineno="100347"> +<interface name="corenet_relabelto_zebra_client_packets" lineno="100365"> <summary> Relabel packets to zebra_client the packet type. </summary> @@ -72710,7 +72794,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zebra_server_packets" lineno="100367"> +<interface name="corenet_send_zebra_server_packets" lineno="100385"> <summary> Send zebra_server packets. </summary> @@ -72721,7 +72805,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100386"> +<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100404"> <summary> Do not audit attempts to send zebra_server packets. </summary> @@ -72732,7 +72816,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zebra_server_packets" lineno="100405"> +<interface name="corenet_receive_zebra_server_packets" lineno="100423"> <summary> Receive zebra_server packets. </summary> @@ -72743,7 +72827,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100424"> +<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100442"> <summary> Do not audit attempts to receive zebra_server packets. </summary> @@ -72754,7 +72838,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zebra_server_packets" lineno="100443"> +<interface name="corenet_sendrecv_zebra_server_packets" lineno="100461"> <summary> Send and receive zebra_server packets. </summary> @@ -72765,7 +72849,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100459"> +<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100477"> <summary> Do not audit attempts to send and receive zebra_server packets. </summary> @@ -72776,7 +72860,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zebra_server_packets" lineno="100474"> +<interface name="corenet_relabelto_zebra_server_packets" lineno="100492"> <summary> Relabel packets to zebra_server the packet type. </summary> @@ -72786,7 +72870,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zented_port" lineno="100496"> +<interface name="corenet_tcp_sendrecv_zented_port" lineno="100514"> <summary> Send and receive TCP traffic on the zented port. </summary> @@ -72797,7 +72881,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zented_port" lineno="100511"> +<interface name="corenet_udp_send_zented_port" lineno="100529"> <summary> Send UDP traffic on the zented port. </summary> @@ -72808,7 +72892,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100526"> +<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100544"> <summary> Do not audit attempts to send UDP traffic on the zented port. </summary> @@ -72819,7 +72903,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zented_port" lineno="100541"> +<interface name="corenet_udp_receive_zented_port" lineno="100559"> <summary> Receive UDP traffic on the zented port. </summary> @@ -72830,7 +72914,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100556"> +<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100574"> <summary> Do not audit attempts to receive UDP traffic on the zented port. </summary> @@ -72841,7 +72925,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zented_port" lineno="100571"> +<interface name="corenet_udp_sendrecv_zented_port" lineno="100589"> <summary> Send and receive UDP traffic on the zented port. </summary> @@ -72852,7 +72936,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100587"> +<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100605"> <summary> Do not audit attempts to send and receive UDP traffic on the zented port. @@ -72864,7 +72948,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zented_port" lineno="100602"> +<interface name="corenet_tcp_bind_zented_port" lineno="100620"> <summary> Bind TCP sockets to the zented port. </summary> @@ -72875,7 +72959,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zented_port" lineno="100622"> +<interface name="corenet_udp_bind_zented_port" lineno="100640"> <summary> Bind UDP sockets to the zented port. </summary> @@ -72886,7 +72970,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zented_port" lineno="100641"> +<interface name="corenet_tcp_connect_zented_port" lineno="100659"> <summary> Make a TCP connection to the zented port. </summary> @@ -72896,7 +72980,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zented_client_packets" lineno="100661"> +<interface name="corenet_send_zented_client_packets" lineno="100679"> <summary> Send zented_client packets. </summary> @@ -72907,7 +72991,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100680"> +<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100698"> <summary> Do not audit attempts to send zented_client packets. </summary> @@ -72918,7 +73002,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zented_client_packets" lineno="100699"> +<interface name="corenet_receive_zented_client_packets" lineno="100717"> <summary> Receive zented_client packets. </summary> @@ -72929,7 +73013,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100718"> +<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100736"> <summary> Do not audit attempts to receive zented_client packets. </summary> @@ -72940,7 +73024,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zented_client_packets" lineno="100737"> +<interface name="corenet_sendrecv_zented_client_packets" lineno="100755"> <summary> Send and receive zented_client packets. </summary> @@ -72951,7 +73035,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100753"> +<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100771"> <summary> Do not audit attempts to send and receive zented_client packets. </summary> @@ -72962,7 +73046,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zented_client_packets" lineno="100768"> +<interface name="corenet_relabelto_zented_client_packets" lineno="100786"> <summary> Relabel packets to zented_client the packet type. </summary> @@ -72972,7 +73056,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zented_server_packets" lineno="100788"> +<interface name="corenet_send_zented_server_packets" lineno="100806"> <summary> Send zented_server packets. </summary> @@ -72983,7 +73067,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100807"> +<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100825"> <summary> Do not audit attempts to send zented_server packets. </summary> @@ -72994,7 +73078,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zented_server_packets" lineno="100826"> +<interface name="corenet_receive_zented_server_packets" lineno="100844"> <summary> Receive zented_server packets. </summary> @@ -73005,7 +73089,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100845"> +<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100863"> <summary> Do not audit attempts to receive zented_server packets. </summary> @@ -73016,7 +73100,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zented_server_packets" lineno="100864"> +<interface name="corenet_sendrecv_zented_server_packets" lineno="100882"> <summary> Send and receive zented_server packets. </summary> @@ -73027,7 +73111,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100880"> +<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100898"> <summary> Do not audit attempts to send and receive zented_server packets. </summary> @@ -73038,7 +73122,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zented_server_packets" lineno="100895"> +<interface name="corenet_relabelto_zented_server_packets" lineno="100913"> <summary> Relabel packets to zented_server the packet type. </summary> @@ -73048,7 +73132,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zope_port" lineno="100917"> +<interface name="corenet_tcp_sendrecv_zope_port" lineno="100935"> <summary> Send and receive TCP traffic on the zope port. </summary> @@ -73059,7 +73143,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_zope_port" lineno="100932"> +<interface name="corenet_udp_send_zope_port" lineno="100950"> <summary> Send UDP traffic on the zope port. </summary> @@ -73070,7 +73154,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100947"> +<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100965"> <summary> Do not audit attempts to send UDP traffic on the zope port. </summary> @@ -73081,7 +73165,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_zope_port" lineno="100962"> +<interface name="corenet_udp_receive_zope_port" lineno="100980"> <summary> Receive UDP traffic on the zope port. </summary> @@ -73092,7 +73176,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100977"> +<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100995"> <summary> Do not audit attempts to receive UDP traffic on the zope port. </summary> @@ -73103,7 +73187,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_zope_port" lineno="100992"> +<interface name="corenet_udp_sendrecv_zope_port" lineno="101010"> <summary> Send and receive UDP traffic on the zope port. </summary> @@ -73114,7 +73198,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101008"> +<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101026"> <summary> Do not audit attempts to send and receive UDP traffic on the zope port. @@ -73126,7 +73210,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_zope_port" lineno="101023"> +<interface name="corenet_tcp_bind_zope_port" lineno="101041"> <summary> Bind TCP sockets to the zope port. </summary> @@ -73137,7 +73221,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zope_port" lineno="101043"> +<interface name="corenet_udp_bind_zope_port" lineno="101061"> <summary> Bind UDP sockets to the zope port. </summary> @@ -73148,7 +73232,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zope_port" lineno="101062"> +<interface name="corenet_tcp_connect_zope_port" lineno="101080"> <summary> Make a TCP connection to the zope port. </summary> @@ -73158,7 +73242,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zope_client_packets" lineno="101082"> +<interface name="corenet_send_zope_client_packets" lineno="101100"> <summary> Send zope_client packets. </summary> @@ -73169,7 +73253,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101101"> +<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101119"> <summary> Do not audit attempts to send zope_client packets. </summary> @@ -73180,7 +73264,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zope_client_packets" lineno="101120"> +<interface name="corenet_receive_zope_client_packets" lineno="101138"> <summary> Receive zope_client packets. </summary> @@ -73191,7 +73275,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101139"> +<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101157"> <summary> Do not audit attempts to receive zope_client packets. </summary> @@ -73202,7 +73286,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zope_client_packets" lineno="101158"> +<interface name="corenet_sendrecv_zope_client_packets" lineno="101176"> <summary> Send and receive zope_client packets. </summary> @@ -73213,7 +73297,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101174"> +<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101192"> <summary> Do not audit attempts to send and receive zope_client packets. </summary> @@ -73224,7 +73308,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zope_client_packets" lineno="101189"> +<interface name="corenet_relabelto_zope_client_packets" lineno="101207"> <summary> Relabel packets to zope_client the packet type. </summary> @@ -73234,7 +73318,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zope_server_packets" lineno="101209"> +<interface name="corenet_send_zope_server_packets" lineno="101227"> <summary> Send zope_server packets. </summary> @@ -73245,7 +73329,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101228"> +<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101246"> <summary> Do not audit attempts to send zope_server packets. </summary> @@ -73256,7 +73340,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zope_server_packets" lineno="101247"> +<interface name="corenet_receive_zope_server_packets" lineno="101265"> <summary> Receive zope_server packets. </summary> @@ -73267,7 +73351,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101266"> +<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101284"> <summary> Do not audit attempts to receive zope_server packets. </summary> @@ -73278,7 +73362,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zope_server_packets" lineno="101285"> +<interface name="corenet_sendrecv_zope_server_packets" lineno="101303"> <summary> Send and receive zope_server packets. </summary> @@ -73289,7 +73373,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101301"> +<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101319"> <summary> Do not audit attempts to send and receive zope_server packets. </summary> @@ -73300,7 +73384,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zope_server_packets" lineno="101316"> +<interface name="corenet_relabelto_zope_server_packets" lineno="101334"> <summary> Relabel packets to zope_server the packet type. </summary> @@ -73310,7 +73394,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lo_if" lineno="101339"> +<interface name="corenet_tcp_sendrecv_lo_if" lineno="101357"> <summary> Send and receive TCP network traffic on the lo interface. </summary> @@ -73321,7 +73405,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_lo_if" lineno="101358"> +<interface name="corenet_udp_send_lo_if" lineno="101376"> <summary> Send UDP network traffic on the lo interface. </summary> @@ -73332,7 +73416,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_udp_receive_lo_if" lineno="101377"> +<interface name="corenet_udp_receive_lo_if" lineno="101395"> <summary> Receive UDP network traffic on the lo interface. </summary> @@ -73343,7 +73427,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_udp_sendrecv_lo_if" lineno="101396"> +<interface name="corenet_udp_sendrecv_lo_if" lineno="101414"> <summary> Send and receive UDP network traffic on the lo interface. </summary> @@ -73354,7 +73438,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_raw_send_lo_if" lineno="101412"> +<interface name="corenet_raw_send_lo_if" lineno="101430"> <summary> Send raw IP packets on the lo interface. </summary> @@ -73365,7 +73449,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_raw_receive_lo_if" lineno="101431"> +<interface name="corenet_raw_receive_lo_if" lineno="101449"> <summary> Receive raw IP packets on the lo interface. </summary> @@ -73376,7 +73460,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_raw_sendrecv_lo_if" lineno="101450"> +<interface name="corenet_raw_sendrecv_lo_if" lineno="101468"> <summary> Send and receive raw IP packets on the lo interface. </summary> @@ -74725,7 +74809,27 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_kmsg" lineno="2381"> +<interface name="dev_rw_hyperv_kvp" lineno="2381"> +<summary> +Allow read/write the hypervkvp device +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_hyperv_vss" lineno="2399"> +<summary> +Allow read/write the hypervvssd device +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_kmsg" lineno="2417"> <summary> Read the kernel messages </summary> @@ -74735,7 +74839,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_read_kmsg" lineno="2399"> +<interface name="dev_dontaudit_read_kmsg" lineno="2435"> <summary> Do not audit attempts to read the kernel messages </summary> @@ -74745,7 +74849,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_kmsg" lineno="2417"> +<interface name="dev_write_kmsg" lineno="2453"> <summary> Write to the kernel messages device </summary> @@ -74755,7 +74859,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_kmsg" lineno="2435"> +<interface name="dev_rw_kmsg" lineno="2471"> <summary> Read and write to the kernel messages device </summary> @@ -74765,7 +74869,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mounton_kmsg" lineno="2453"> +<interface name="dev_mounton_kmsg" lineno="2489"> <summary> Mount on the kernel messages device </summary> @@ -74775,7 +74879,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_ksm_dev" lineno="2471"> +<interface name="dev_getattr_ksm_dev" lineno="2507"> <summary> Get the attributes of the ksm devices. </summary> @@ -74785,7 +74889,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_ksm_dev" lineno="2489"> +<interface name="dev_setattr_ksm_dev" lineno="2525"> <summary> Set the attributes of the ksm devices. </summary> @@ -74795,7 +74899,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_ksm" lineno="2507"> +<interface name="dev_read_ksm" lineno="2543"> <summary> Read the ksm devices. </summary> @@ -74805,7 +74909,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_ksm" lineno="2525"> +<interface name="dev_rw_ksm" lineno="2561"> <summary> Read and write to ksm devices. </summary> @@ -74815,7 +74919,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_kvm_dev" lineno="2543"> +<interface name="dev_getattr_kvm_dev" lineno="2579"> <summary> Get the attributes of the kvm devices. </summary> @@ -74825,7 +74929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_kvm_dev" lineno="2561"> +<interface name="dev_setattr_kvm_dev" lineno="2597"> <summary> Set the attributes of the kvm devices. </summary> @@ -74835,7 +74939,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_kvm" lineno="2579"> +<interface name="dev_read_kvm" lineno="2615"> <summary> Read the kvm devices. </summary> @@ -74845,7 +74949,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_kvm" lineno="2597"> +<interface name="dev_rw_kvm" lineno="2633"> <summary> Read and write to kvm devices. </summary> @@ -74855,7 +74959,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_lirc" lineno="2615"> +<interface name="dev_read_lirc" lineno="2651"> <summary> Read the lirc device. </summary> @@ -74865,7 +74969,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_lirc" lineno="2633"> +<interface name="dev_rw_lirc" lineno="2669"> <summary> Read and write the lirc device. </summary> @@ -74875,7 +74979,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_filetrans_lirc" lineno="2657"> +<interface name="dev_filetrans_lirc" lineno="2693"> <summary> Automatic type transition to the type for lirc device nodes when created in /dev. @@ -74891,7 +74995,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dev_rw_loop_control" lineno="2675"> +<interface name="dev_rw_loop_control" lineno="2711"> <summary> Read and write the loop-control device. </summary> @@ -74901,7 +75005,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_lvm_control" lineno="2693"> +<interface name="dev_getattr_lvm_control" lineno="2729"> <summary> Get the attributes of the lvm comtrol device. </summary> @@ -74911,7 +75015,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_lvm_control" lineno="2711"> +<interface name="dev_read_lvm_control" lineno="2747"> <summary> Read the lvm comtrol device. </summary> @@ -74921,7 +75025,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_lvm_control" lineno="2729"> +<interface name="dev_rw_lvm_control" lineno="2765"> <summary> Read and write the lvm control device. </summary> @@ -74931,7 +75035,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_rw_lvm_control" lineno="2747"> +<interface name="dev_dontaudit_rw_lvm_control" lineno="2783"> <summary> Do not audit attempts to read and write lvm control device. </summary> @@ -74941,7 +75045,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_delete_lvm_control_dev" lineno="2765"> +<interface name="dev_delete_lvm_control_dev" lineno="2801"> <summary> Delete the lvm control device. </summary> @@ -74951,7 +75055,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_memory_dev" lineno="2783"> +<interface name="dev_dontaudit_getattr_memory_dev" lineno="2819"> <summary> dontaudit getattr raw memory devices (e.g. /dev/mem). </summary> @@ -74961,7 +75065,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_raw_memory" lineno="2804"> +<interface name="dev_read_raw_memory" lineno="2840"> <summary> Read raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -74974,7 +75078,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_raw_memory_cond" lineno="2834"> +<interface name="dev_read_raw_memory_cond" lineno="2870"> <summary> Read raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -74992,7 +75096,7 @@ Tunable to depend on </summary> </param> </interface> -<interface name="dev_dontaudit_read_raw_memory" lineno="2861"> +<interface name="dev_dontaudit_read_raw_memory" lineno="2897"> <summary> Do not audit attempts to read raw memory devices (e.g. /dev/mem). @@ -75006,7 +75110,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_raw_memory" lineno="2882"> +<interface name="dev_write_raw_memory" lineno="2918"> <summary> Write raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -75019,7 +75123,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_raw_memory_cond" lineno="2912"> +<interface name="dev_write_raw_memory_cond" lineno="2948"> <summary> Write raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -75037,7 +75141,7 @@ Tunable to depend on </summary> </param> </interface> -<interface name="dev_rx_raw_memory" lineno="2938"> +<interface name="dev_rx_raw_memory" lineno="2974"> <summary> Read and execute raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -75050,7 +75154,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_wx_raw_memory" lineno="2960"> +<interface name="dev_wx_raw_memory" lineno="2996"> <summary> Write and execute raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -75063,7 +75167,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_wx_raw_memory_cond" lineno="2987"> +<interface name="dev_wx_raw_memory_cond" lineno="3023"> <summary> Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -75081,7 +75185,7 @@ Tunable to depend on </summary> </param> </interface> -<interface name="dev_getattr_misc_dev" lineno="3010"> +<interface name="dev_getattr_misc_dev" lineno="3046"> <summary> Get the attributes of miscellaneous devices. </summary> @@ -75091,7 +75195,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_misc_dev" lineno="3029"> +<interface name="dev_dontaudit_getattr_misc_dev" lineno="3065"> <summary> Do not audit attempts to get the attributes of miscellaneous devices. @@ -75102,7 +75206,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_misc_dev" lineno="3047"> +<interface name="dev_setattr_misc_dev" lineno="3083"> <summary> Set the attributes of miscellaneous devices. </summary> @@ -75112,7 +75216,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_misc_dev" lineno="3066"> +<interface name="dev_dontaudit_setattr_misc_dev" lineno="3102"> <summary> Do not audit attempts to set the attributes of miscellaneous devices. @@ -75123,7 +75227,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_misc" lineno="3084"> +<interface name="dev_read_misc" lineno="3120"> <summary> Read miscellaneous devices. </summary> @@ -75133,7 +75237,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_misc" lineno="3102"> +<interface name="dev_write_misc" lineno="3138"> <summary> Write miscellaneous devices. </summary> @@ -75143,7 +75247,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_rw_misc" lineno="3120"> +<interface name="dev_dontaudit_rw_misc" lineno="3156"> <summary> Do not audit attempts to read and write miscellaneous devices. </summary> @@ -75153,7 +75257,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_modem_dev" lineno="3138"> +<interface name="dev_getattr_modem_dev" lineno="3174"> <summary> Get the attributes of the modem devices. </summary> @@ -75163,7 +75267,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_modem_dev" lineno="3156"> +<interface name="dev_setattr_modem_dev" lineno="3192"> <summary> Set the attributes of the modem devices. </summary> @@ -75173,7 +75277,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_modem" lineno="3174"> +<interface name="dev_read_modem" lineno="3210"> <summary> Read the modem devices. </summary> @@ -75183,7 +75287,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_modem" lineno="3192"> +<interface name="dev_rw_modem" lineno="3228"> <summary> Read and write to modem devices. </summary> @@ -75193,7 +75297,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_mouse_dev" lineno="3210"> +<interface name="dev_getattr_mouse_dev" lineno="3246"> <summary> Get the attributes of the mouse devices. </summary> @@ -75203,7 +75307,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_mouse_dev" lineno="3228"> +<interface name="dev_setattr_mouse_dev" lineno="3264"> <summary> Set the attributes of the mouse devices. </summary> @@ -75213,7 +75317,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_mouse" lineno="3246"> +<interface name="dev_read_mouse" lineno="3282"> <summary> Read the mouse devices. </summary> @@ -75223,7 +75327,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_mouse" lineno="3264"> +<interface name="dev_rw_mouse" lineno="3300"> <summary> Read and write to mouse devices. </summary> @@ -75233,7 +75337,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_mtrr_dev" lineno="3283"> +<interface name="dev_getattr_mtrr_dev" lineno="3319"> <summary> Get the attributes of the memory type range registers (MTRR) device. @@ -75244,7 +75348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_write_mtrr" lineno="3303"> +<interface name="dev_dontaudit_write_mtrr" lineno="3339"> <summary> Do not audit attempts to write the memory type range registers (MTRR). @@ -75255,7 +75359,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_mtrr" lineno="3322"> +<interface name="dev_rw_mtrr" lineno="3358"> <summary> Read and write the memory type range registers (MTRR). </summary> @@ -75265,7 +75369,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_netcontrol_dev" lineno="3341"> +<interface name="dev_getattr_netcontrol_dev" lineno="3377"> <summary> Get the attributes of the network control device (Deprecated) </summary> @@ -75275,7 +75379,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_netcontrol" lineno="3356"> +<interface name="dev_read_netcontrol" lineno="3392"> <summary> Read the network control identity. (Deprecated) </summary> @@ -75285,7 +75389,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_netcontrol" lineno="3371"> +<interface name="dev_rw_netcontrol" lineno="3407"> <summary> Read and write the the network control device. (Deprecated) </summary> @@ -75295,7 +75399,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_null_dev" lineno="3386"> +<interface name="dev_getattr_null_dev" lineno="3422"> <summary> Get the attributes of the null device nodes. </summary> @@ -75305,7 +75409,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_null_dev" lineno="3404"> +<interface name="dev_setattr_null_dev" lineno="3440"> <summary> Set the attributes of the null device nodes. </summary> @@ -75315,7 +75419,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_null_dev" lineno="3423"> +<interface name="dev_dontaudit_setattr_null_dev" lineno="3459"> <summary> Do not audit attempts to set the attributes of the null device nodes. @@ -75326,7 +75430,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_delete_null" lineno="3441"> +<interface name="dev_delete_null" lineno="3477"> <summary> Delete the null device (/dev/null). </summary> @@ -75336,7 +75440,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_null" lineno="3459"> +<interface name="dev_rw_null" lineno="3495"> <summary> Read and write to the null device (/dev/null). </summary> @@ -75346,7 +75450,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_null_dev" lineno="3477"> +<interface name="dev_create_null_dev" lineno="3513"> <summary> Create the null device (/dev/null). </summary> @@ -75356,7 +75460,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_null_service" lineno="3496"> +<interface name="dev_manage_null_service" lineno="3532"> <summary> Manage services with script type null_device_t for when /lib/systemd/system/something.service is a link to /dev/null @@ -75367,7 +75471,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3516"> +<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3552"> <summary> Do not audit attempts to get the attributes of the BIOS non-volatile RAM device. @@ -75378,7 +75482,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_nvram" lineno="3534"> +<interface name="dev_rw_nvram" lineno="3570"> <summary> Read and write BIOS non-volatile RAM. </summary> @@ -75388,7 +75492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_printer_dev" lineno="3552"> +<interface name="dev_getattr_printer_dev" lineno="3588"> <summary> Get the attributes of the printer device nodes. </summary> @@ -75398,7 +75502,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_printer_dev" lineno="3570"> +<interface name="dev_setattr_printer_dev" lineno="3606"> <summary> Set the attributes of the printer device nodes. </summary> @@ -75408,7 +75512,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_append_printer" lineno="3589"> +<interface name="dev_append_printer" lineno="3625"> <summary> Append the printer device. </summary> @@ -75418,7 +75522,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_printer" lineno="3607"> +<interface name="dev_rw_printer" lineno="3643"> <summary> Read and write the printer device. </summary> @@ -75428,7 +75532,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_pmqos_dev" lineno="3625"> +<interface name="dev_getattr_pmqos_dev" lineno="3661"> <summary> Get the attributes of PM QoS devices </summary> @@ -75438,7 +75542,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_pmqos" lineno="3643"> +<interface name="dev_read_pmqos" lineno="3679"> <summary> Read the PM QoS devices. </summary> @@ -75448,7 +75552,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_pmqos" lineno="3661"> +<interface name="dev_rw_pmqos" lineno="3697"> <summary> Read and write the the PM QoS devices. </summary> @@ -75458,7 +75562,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_qemu_dev" lineno="3680"> +<interface name="dev_getattr_qemu_dev" lineno="3716"> <summary> Get the attributes of the QEMU microcode and id interfaces. @@ -75469,7 +75573,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_qemu_dev" lineno="3699"> +<interface name="dev_setattr_qemu_dev" lineno="3735"> <summary> Set the attributes of the QEMU microcode and id interfaces. @@ -75480,7 +75584,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_qemu" lineno="3717"> +<interface name="dev_read_qemu" lineno="3753"> <summary> Read the QEMU device </summary> @@ -75490,7 +75594,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_qemu" lineno="3735"> +<interface name="dev_rw_qemu" lineno="3771"> <summary> Read and write the the QEMU device. </summary> @@ -75500,7 +75604,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_rand" lineno="3769"> +<interface name="dev_read_rand" lineno="3805"> <summary> Read from random number generator devices (e.g., /dev/random). @@ -75526,7 +75630,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="dev_dontaudit_read_rand" lineno="3788"> +<interface name="dev_dontaudit_read_rand" lineno="3824"> <summary> Do not audit attempts to read from random number generator devices (e.g., /dev/random) @@ -75537,7 +75641,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_dontaudit_append_rand" lineno="3807"> +<interface name="dev_dontaudit_append_rand" lineno="3843"> <summary> Do not audit attempts to append to random number generator devices (e.g., /dev/random) @@ -75548,7 +75652,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_rand" lineno="3827"> +<interface name="dev_write_rand" lineno="3863"> <summary> Write to the random device (e.g., /dev/random). This adds entropy used to generate the random data read from the @@ -75560,7 +75664,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_rand_dev" lineno="3845"> +<interface name="dev_create_rand_dev" lineno="3881"> <summary> Create the random device (/dev/random). </summary> @@ -75570,7 +75674,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_realtime_clock" lineno="3863"> +<interface name="dev_read_realtime_clock" lineno="3899"> <summary> Read the realtime clock (/dev/rtc). </summary> @@ -75580,7 +75684,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_realtime_clock" lineno="3881"> +<interface name="dev_write_realtime_clock" lineno="3917"> <summary> Set the realtime clock (/dev/rtc). </summary> @@ -75590,7 +75694,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_realtime_clock" lineno="3901"> +<interface name="dev_rw_realtime_clock" lineno="3937"> <summary> Read and set the realtime clock (/dev/rtc). </summary> @@ -75600,7 +75704,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_scanner_dev" lineno="3916"> +<interface name="dev_getattr_scanner_dev" lineno="3952"> <summary> Get the attributes of the scanner device. </summary> @@ -75610,7 +75714,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3935"> +<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3971"> <summary> Do not audit attempts to get the attributes of the scanner device. @@ -75621,7 +75725,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_scanner_dev" lineno="3953"> +<interface name="dev_setattr_scanner_dev" lineno="3989"> <summary> Set the attributes of the scanner device. </summary> @@ -75631,7 +75735,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3972"> +<interface name="dev_dontaudit_setattr_scanner_dev" lineno="4008"> <summary> Do not audit attempts to set the attributes of the scanner device. @@ -75642,7 +75746,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_scanner" lineno="3990"> +<interface name="dev_rw_scanner" lineno="4026"> <summary> Read and write the scanner device. </summary> @@ -75652,7 +75756,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_sound_dev" lineno="4008"> +<interface name="dev_getattr_sound_dev" lineno="4044"> <summary> Get the attributes of the sound devices. </summary> @@ -75662,7 +75766,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_sound_dev" lineno="4026"> +<interface name="dev_setattr_sound_dev" lineno="4062"> <summary> Set the attributes of the sound devices. </summary> @@ -75672,7 +75776,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_sound" lineno="4044"> +<interface name="dev_read_sound" lineno="4080"> <summary> Read the sound devices. </summary> @@ -75682,7 +75786,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_sound" lineno="4063"> +<interface name="dev_write_sound" lineno="4099"> <summary> Write the sound devices. </summary> @@ -75692,7 +75796,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_sound_mixer" lineno="4082"> +<interface name="dev_read_sound_mixer" lineno="4118"> <summary> Read the sound mixer devices. </summary> @@ -75702,7 +75806,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_sound_mixer" lineno="4101"> +<interface name="dev_write_sound_mixer" lineno="4137"> <summary> Write the sound mixer devices. </summary> @@ -75712,7 +75816,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_power_mgmt_dev" lineno="4120"> +<interface name="dev_getattr_power_mgmt_dev" lineno="4156"> <summary> Get the attributes of the the power management device. </summary> @@ -75722,7 +75826,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_power_mgmt_dev" lineno="4138"> +<interface name="dev_setattr_power_mgmt_dev" lineno="4174"> <summary> Set the attributes of the the power management device. </summary> @@ -75732,7 +75836,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_power_management" lineno="4156"> +<interface name="dev_rw_power_management" lineno="4192"> <summary> Read and write the the power management device. </summary> @@ -75742,7 +75846,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_smartcard_dev" lineno="4174"> +<interface name="dev_getattr_smartcard_dev" lineno="4210"> <summary> Getattr on smartcard devices </summary> @@ -75752,7 +75856,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4193"> +<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4229"> <summary> dontaudit getattr on smartcard devices </summary> @@ -75762,7 +75866,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_smartcard" lineno="4212"> +<interface name="dev_rw_smartcard" lineno="4248"> <summary> Read and write smartcard devices. </summary> @@ -75772,7 +75876,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_smartcard" lineno="4230"> +<interface name="dev_manage_smartcard" lineno="4266"> <summary> Create, read, write, and delete smartcard devices. </summary> @@ -75782,7 +75886,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_sysdig" lineno="4248"> +<interface name="dev_rw_sysdig" lineno="4284"> <summary> Read, write and map the sysdig device. </summary> @@ -75792,7 +75896,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mounton_sysfs" lineno="4267"> +<interface name="dev_mounton_sysfs" lineno="4303"> <summary> Mount a filesystem on sysfs. (Deprecated) </summary> @@ -75802,7 +75906,7 @@ Domain allow access. </summary> </param> </interface> -<interface name="dev_associate_sysfs" lineno="4282"> +<interface name="dev_associate_sysfs" lineno="4318"> <summary> Associate a file to a sysfs filesystem. </summary> @@ -75812,7 +75916,7 @@ The type of the file to be associated to sysfs. </summary> </param> </interface> -<interface name="dev_getattr_sysfs_dirs" lineno="4300"> +<interface name="dev_getattr_sysfs_dirs" lineno="4336"> <summary> Get the attributes of sysfs directories. </summary> @@ -75822,7 +75926,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_sysfs" lineno="4318"> +<interface name="dev_getattr_sysfs" lineno="4354"> <summary> Get the attributes of sysfs filesystem </summary> @@ -75832,7 +75936,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mount_sysfs" lineno="4336"> +<interface name="dev_mount_sysfs" lineno="4372"> <summary> mount a sysfs filesystem </summary> @@ -75842,7 +75946,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_remount_sysfs" lineno="4354"> +<interface name="dev_remount_sysfs" lineno="4390"> <summary> Remount a sysfs filesystem. </summary> @@ -75852,7 +75956,7 @@ Domain allow access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_sysfs" lineno="4372"> +<interface name="dev_dontaudit_getattr_sysfs" lineno="4408"> <summary> Do not audit getting the attributes of sysfs filesystem </summary> @@ -75862,7 +75966,7 @@ Domain to dontaudit access from </summary> </param> </interface> -<interface name="dev_dontaudit_read_sysfs" lineno="4390"> +<interface name="dev_dontaudit_read_sysfs" lineno="4426"> <summary> Dont audit attempts to read hardware state information </summary> @@ -75872,7 +75976,7 @@ Domain for which the attempts do not need to be audited </summary> </param> </interface> -<interface name="dev_mounton_sysfs_dirs" lineno="4410"> +<interface name="dev_mounton_sysfs_dirs" lineno="4446"> <summary> Mount on sysfs directories. </summary> @@ -75882,7 +75986,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_search_sysfs" lineno="4428"> +<interface name="dev_search_sysfs" lineno="4464"> <summary> Search the sysfs directories. </summary> @@ -75892,7 +75996,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_search_sysfs" lineno="4446"> +<interface name="dev_dontaudit_search_sysfs" lineno="4482"> <summary> Do not audit attempts to search sysfs. </summary> @@ -75902,7 +76006,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_list_sysfs" lineno="4464"> +<interface name="dev_list_sysfs" lineno="4500"> <summary> List the contents of the sysfs directories. </summary> @@ -75912,7 +76016,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_sysfs_dirs" lineno="4483"> +<interface name="dev_write_sysfs_dirs" lineno="4519"> <summary> Write in a sysfs directories. </summary> @@ -75922,7 +76026,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4501"> +<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4537"> <summary> Do not audit attempts to write in a sysfs directory. </summary> @@ -75932,7 +76036,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_dontaudit_write_sysfs_files" lineno="4519"> +<interface name="dev_dontaudit_write_sysfs_files" lineno="4555"> <summary> Do not audit attempts to write to a sysfs file. </summary> @@ -75942,7 +76046,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_manage_sysfs_dirs" lineno="4538"> +<interface name="dev_manage_sysfs_dirs" lineno="4574"> <summary> Create, read, write, and delete sysfs directories. @@ -75953,7 +76057,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_sysfs" lineno="4565"> +<interface name="dev_read_sysfs" lineno="4601"> <summary> Read hardware state information. </summary> @@ -75972,7 +76076,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="dev_write_sysfs" lineno="4593"> +<interface name="dev_write_sysfs" lineno="4629"> <summary> Write to hardware state information. </summary> @@ -75989,7 +76093,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="dev_rw_sysfs" lineno="4612"> +<interface name="dev_rw_sysfs" lineno="4648"> <summary> Allow caller to modify hardware state information. </summary> @@ -75999,7 +76103,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_sysfs_files" lineno="4633"> +<interface name="dev_create_sysfs_files" lineno="4669"> <summary> Add a sysfs file </summary> @@ -76009,7 +76113,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_sysfs_dirs" lineno="4651"> +<interface name="dev_relabel_sysfs_dirs" lineno="4687"> <summary> Relabel hardware state directories. </summary> @@ -76019,7 +76123,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_all_sysfs" lineno="4669"> +<interface name="dev_relabel_all_sysfs" lineno="4705"> <summary> Relabel from/to all sysfs types. </summary> @@ -76029,7 +76133,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_all_sysfs" lineno="4689"> +<interface name="dev_setattr_all_sysfs" lineno="4725"> <summary> Set the attributes of sysfs files, directories and symlinks. </summary> @@ -76039,7 +76143,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_tpm" lineno="4709"> +<interface name="dev_rw_tpm" lineno="4745"> <summary> Read and write the TPM device. </summary> @@ -76049,7 +76153,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_urand" lineno="4750"> +<interface name="dev_read_urand" lineno="4786"> <summary> Read from pseudo random number generator devices (e.g., /dev/urandom). </summary> @@ -76082,7 +76186,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="dev_dontaudit_read_urand" lineno="4769"> +<interface name="dev_dontaudit_read_urand" lineno="4805"> <summary> Do not audit attempts to read from pseudo random devices (e.g., /dev/urandom) @@ -76093,7 +76197,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_urand" lineno="4788"> +<interface name="dev_write_urand" lineno="4824"> <summary> Write to the pseudo random device (e.g., /dev/urandom). This sets the random number generator seed. @@ -76104,7 +76208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_urand_dev" lineno="4806"> +<interface name="dev_create_urand_dev" lineno="4842"> <summary> Create the urandom device (/dev/urandom). </summary> @@ -76114,7 +76218,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_generic_usb_dev" lineno="4824"> +<interface name="dev_getattr_generic_usb_dev" lineno="4860"> <summary> Getattr generic the USB devices. </summary> @@ -76124,7 +76228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_generic_usb_dev" lineno="4842"> +<interface name="dev_setattr_generic_usb_dev" lineno="4878"> <summary> Setattr generic the USB devices. </summary> @@ -76134,7 +76238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_generic_usb_dev" lineno="4860"> +<interface name="dev_read_generic_usb_dev" lineno="4896"> <summary> Read generic the USB devices. </summary> @@ -76144,7 +76248,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_generic_usb_dev" lineno="4878"> +<interface name="dev_rw_generic_usb_dev" lineno="4914"> <summary> Read and write generic the USB devices. </summary> @@ -76154,7 +76258,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_generic_usb_dev" lineno="4896"> +<interface name="dev_relabel_generic_usb_dev" lineno="4932"> <summary> Relabel generic the USB devices. </summary> @@ -76164,7 +76268,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_usbmon_dev" lineno="4914"> +<interface name="dev_read_usbmon_dev" lineno="4950"> <summary> Read USB monitor devices. </summary> @@ -76174,7 +76278,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_usbmon_dev" lineno="4932"> +<interface name="dev_write_usbmon_dev" lineno="4968"> <summary> Write USB monitor devices. </summary> @@ -76184,7 +76288,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mount_usbfs" lineno="4950"> +<interface name="dev_mount_usbfs" lineno="4986"> <summary> Mount a usbfs filesystem. </summary> @@ -76194,7 +76298,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_associate_usbfs" lineno="4968"> +<interface name="dev_associate_usbfs" lineno="5004"> <summary> Associate a file to a usbfs filesystem. </summary> @@ -76204,7 +76308,7 @@ The type of the file to be associated to usbfs. </summary> </param> </interface> -<interface name="dev_getattr_usbfs_dirs" lineno="4986"> +<interface name="dev_getattr_usbfs_dirs" lineno="5022"> <summary> Get the attributes of a directory in the usb filesystem. </summary> @@ -76214,7 +76318,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5005"> +<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5041"> <summary> Do not audit attempts to get the attributes of a directory in the usb filesystem. @@ -76225,7 +76329,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_search_usbfs" lineno="5023"> +<interface name="dev_search_usbfs" lineno="5059"> <summary> Search the directory containing USB hardware information. </summary> @@ -76235,7 +76339,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_list_usbfs" lineno="5041"> +<interface name="dev_list_usbfs" lineno="5077"> <summary> Allow caller to get a list of usb hardware. </summary> @@ -76245,7 +76349,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_usbfs_files" lineno="5062"> +<interface name="dev_setattr_usbfs_files" lineno="5098"> <summary> Set the attributes of usbfs filesystem. </summary> @@ -76255,7 +76359,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_usbfs" lineno="5082"> +<interface name="dev_read_usbfs" lineno="5118"> <summary> Read USB hardware information using the usbfs filesystem interface. @@ -76266,7 +76370,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_usbfs" lineno="5102"> +<interface name="dev_rw_usbfs" lineno="5138"> <summary> Allow caller to modify usb hardware configuration files. </summary> @@ -76276,7 +76380,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_video_dev" lineno="5122"> +<interface name="dev_getattr_video_dev" lineno="5158"> <summary> Get the attributes of video4linux devices. </summary> @@ -76286,7 +76390,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_userio_dev" lineno="5140"> +<interface name="dev_rw_userio_dev" lineno="5176"> <summary> Read and write userio device. </summary> @@ -76296,7 +76400,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_video_dev" lineno="5159"> +<interface name="dev_dontaudit_getattr_video_dev" lineno="5195"> <summary> Do not audit attempts to get the attributes of video4linux device nodes. @@ -76307,7 +76411,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_video_dev" lineno="5177"> +<interface name="dev_setattr_video_dev" lineno="5213"> <summary> Set the attributes of video4linux device nodes. </summary> @@ -76317,7 +76421,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_video_dev" lineno="5196"> +<interface name="dev_dontaudit_setattr_video_dev" lineno="5232"> <summary> Do not audit attempts to set the attributes of video4linux device nodes. @@ -76328,7 +76432,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_video_dev" lineno="5214"> +<interface name="dev_read_video_dev" lineno="5250"> <summary> Read the video4linux devices. </summary> @@ -76338,7 +76442,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_video_dev" lineno="5232"> +<interface name="dev_write_video_dev" lineno="5268"> <summary> Write the video4linux devices. </summary> @@ -76348,7 +76452,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_vfio_dev" lineno="5250"> +<interface name="dev_rw_vfio_dev" lineno="5286"> <summary> Read and write vfio devices. </summary> @@ -76358,7 +76462,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabelfrom_vfio_dev" lineno="5268"> +<interface name="dev_relabelfrom_vfio_dev" lineno="5304"> <summary> Relabel vfio devices. </summary> @@ -76368,7 +76472,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_vhost" lineno="5286"> +<interface name="dev_rw_vhost" lineno="5322"> <summary> Allow read/write the vhost devices </summary> @@ -76378,7 +76482,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_vmware" lineno="5304"> +<interface name="dev_rw_vmware" lineno="5340"> <summary> Read and write VMWare devices. </summary> @@ -76388,7 +76492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rwx_vmware" lineno="5322"> +<interface name="dev_rwx_vmware" lineno="5358"> <summary> Read, write, and mmap VMWare devices. </summary> @@ -76398,7 +76502,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_watchdog" lineno="5341"> +<interface name="dev_read_watchdog" lineno="5377"> <summary> Read from watchdog devices. </summary> @@ -76408,7 +76512,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_watchdog" lineno="5359"> +<interface name="dev_write_watchdog" lineno="5395"> <summary> Write to watchdog devices. </summary> @@ -76418,7 +76522,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_wireless" lineno="5377"> +<interface name="dev_read_wireless" lineno="5413"> <summary> Read the wireless device. </summary> @@ -76428,7 +76532,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_wireless" lineno="5395"> +<interface name="dev_rw_wireless" lineno="5431"> <summary> Read and write the the wireless device. </summary> @@ -76438,7 +76542,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_wireless" lineno="5413"> +<interface name="dev_manage_wireless" lineno="5449"> <summary> manage the wireless device. </summary> @@ -76448,7 +76552,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_xen" lineno="5431"> +<interface name="dev_rw_xen" lineno="5467"> <summary> Read and write Xen devices. </summary> @@ -76458,7 +76562,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_xen" lineno="5450"> +<interface name="dev_manage_xen" lineno="5486"> <summary> Create, read, write, and delete Xen devices. </summary> @@ -76468,7 +76572,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_filetrans_xen" lineno="5474"> +<interface name="dev_filetrans_xen" lineno="5510"> <summary> Automatic type transition to the type for xen device nodes when created in /dev. @@ -76484,7 +76588,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dev_getattr_xserver_misc_dev" lineno="5492"> +<interface name="dev_getattr_xserver_misc_dev" lineno="5528"> <summary> Get the attributes of X server miscellaneous devices. </summary> @@ -76494,7 +76598,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_xserver_misc_dev" lineno="5510"> +<interface name="dev_setattr_xserver_misc_dev" lineno="5546"> <summary> Set the attributes of X server miscellaneous devices. </summary> @@ -76504,7 +76608,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_xserver_misc" lineno="5528"> +<interface name="dev_rw_xserver_misc" lineno="5564"> <summary> Read and write X server miscellaneous devices. </summary> @@ -76514,7 +76618,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_map_xserver_misc" lineno="5546"> +<interface name="dev_map_xserver_misc" lineno="5582"> <summary> Map X server miscellaneous devices. </summary> @@ -76524,7 +76628,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_zero" lineno="5564"> +<interface name="dev_rw_zero" lineno="5600"> <summary> Read and write to the zero device (/dev/zero). </summary> @@ -76534,7 +76638,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rwx_zero" lineno="5582"> +<interface name="dev_rwx_zero" lineno="5618"> <summary> Read, write, and execute the zero device (/dev/zero). </summary> @@ -76544,7 +76648,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_execmod_zero" lineno="5601"> +<interface name="dev_execmod_zero" lineno="5637"> <summary> Execmod the zero device (/dev/zero). </summary> @@ -76554,7 +76658,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_zero_dev" lineno="5620"> +<interface name="dev_create_zero_dev" lineno="5656"> <summary> Create the zero device (/dev/zero). </summary> @@ -76564,7 +76668,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_cpu_online" lineno="5643"> +<interface name="dev_read_cpu_online" lineno="5679"> <summary> Read cpu online hardware state information </summary> @@ -76579,7 +76683,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_unconfined" lineno="5663"> +<interface name="dev_unconfined" lineno="5699"> <summary> Unconfined access to devices. </summary> @@ -76589,7 +76693,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_cpu_online" lineno="5683"> +<interface name="dev_relabel_cpu_online" lineno="5719"> <summary> Relabel cpu online hardware state information. </summary> @@ -76599,7 +76703,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_read_usbmon_dev" lineno="5702"> +<interface name="dev_dontaudit_read_usbmon_dev" lineno="5738"> <summary> Dont audit attempts to read usbmon devices </summary> @@ -78355,7 +78459,7 @@ must be negated by the caller. </param> <rolecap/> </interface> -<interface name="files_search_all" lineno="1259"> +<interface name="files_search_all" lineno="1255"> <summary> Search the contents of all directories on extended attribute filesystems. @@ -78366,7 +78470,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_all" lineno="1278"> +<interface name="files_list_all" lineno="1274"> <summary> List the contents of all directories on extended attribute filesystems. @@ -78377,7 +78481,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_files_as" lineno="1296"> +<interface name="files_create_all_files_as" lineno="1292"> <summary> Create all files as is. </summary> @@ -78387,7 +78491,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_all_dirs" lineno="1316"> +<interface name="files_dontaudit_search_all_dirs" lineno="1312"> <summary> Do not audit attempts to search the contents of any directories on extended @@ -78399,7 +78503,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_getattr_all_file_type_fs" lineno="1339"> +<interface name="files_getattr_all_file_type_fs" lineno="1335"> <summary> Get the attributes of all filesystems with the type of a file. @@ -78410,7 +78514,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_all_file_type_fs" lineno="1357"> +<interface name="files_relabelto_all_file_type_fs" lineno="1353"> <summary> Relabel a filesystem to the type of a file. </summary> @@ -78420,7 +78524,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_file_type_fs" lineno="1375"> +<interface name="files_relabel_all_file_type_fs" lineno="1371"> <summary> Relabel a filesystem to and from the type of a file. </summary> @@ -78430,7 +78534,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mount_all_file_type_fs" lineno="1393"> +<interface name="files_mount_all_file_type_fs" lineno="1389"> <summary> Mount all filesystems with the type of a file. </summary> @@ -78440,7 +78544,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_unmount_all_file_type_fs" lineno="1411"> +<interface name="files_unmount_all_file_type_fs" lineno="1407"> <summary> Unmount all filesystems with the type of a file. </summary> @@ -78450,7 +78554,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_non_auth_dirs" lineno="1430"> +<interface name="files_list_non_auth_dirs" lineno="1426"> <summary> Read all non-authentication related directories. @@ -78461,7 +78565,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_non_auth_files" lineno="1449"> +<interface name="files_read_non_auth_files" lineno="1445"> <summary> Read all non-authentication related files. @@ -78472,7 +78576,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_non_auth_symlinks" lineno="1468"> +<interface name="files_read_non_auth_symlinks" lineno="1464"> <summary> Read all non-authentication related symbolic links. @@ -78483,7 +78587,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_non_auth_files" lineno="1486"> +<interface name="files_rw_non_auth_files" lineno="1482"> <summary> rw non-authentication related files. </summary> @@ -78493,7 +78597,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_non_auth_files" lineno="1506"> +<interface name="files_manage_non_auth_files" lineno="1502"> <summary> Manage non-authentication related files. @@ -78505,7 +78609,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_map_non_auth_files" lineno="1534"> +<interface name="files_map_non_auth_files" lineno="1526"> <summary> Mmap non-authentication related files. @@ -78517,7 +78621,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_non_auth_files" lineno="1554"> +<interface name="files_relabel_non_auth_files" lineno="1546"> <summary> Relabel all non-authentication related files. @@ -78529,7 +78633,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_config_dirs" lineno="1587"> +<interface name="files_manage_config_dirs" lineno="1579"> <summary> Manage all configuration directories on filesystem </summary> @@ -78540,7 +78644,7 @@ Domain allowed access. </param> </interface> -<interface name="files_relabel_config_dirs" lineno="1606"> +<interface name="files_relabel_config_dirs" lineno="1598"> <summary> Relabel configuration directories </summary> @@ -78551,7 +78655,7 @@ Domain allowed access. </param> </interface> -<interface name="files_dontaudit_relabel_config_dirs" lineno="1625"> +<interface name="files_dontaudit_relabel_config_dirs" lineno="1617"> <summary> Do not audit attempts to relabel configuration directories </summary> @@ -78562,7 +78666,7 @@ Domain not to audit. </param> </interface> -<interface name="files_read_config_files" lineno="1643"> +<interface name="files_read_config_files" lineno="1635"> <summary> Read config files in /etc. </summary> @@ -78572,7 +78676,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_config_files" lineno="1664"> +<interface name="files_manage_config_files" lineno="1656"> <summary> Manage all configuration files on filesystem </summary> @@ -78583,7 +78687,7 @@ Domain allowed access. </param> </interface> -<interface name="files_relabel_config_files" lineno="1683"> +<interface name="files_relabel_config_files" lineno="1675"> <summary> Relabel configuration files </summary> @@ -78594,7 +78698,7 @@ Domain allowed access. </param> </interface> -<interface name="files_dontaudit_relabel_config_files" lineno="1702"> +<interface name="files_dontaudit_relabel_config_files" lineno="1694"> <summary> Do not audit attempts to relabel configuration files </summary> @@ -78605,7 +78709,7 @@ Domain not to audit. </param> </interface> -<interface name="files_mounton_all_mountpoints" lineno="1720"> +<interface name="files_mounton_all_mountpoints" lineno="1712"> <summary> Mount a filesystem on all mount points. </summary> @@ -78615,7 +78719,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_all_mountpoints" lineno="1741"> +<interface name="files_getattr_all_mountpoints" lineno="1733"> <summary> Get the attributes of all mount points. </summary> @@ -78625,7 +78729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_all_mountpoints" lineno="1759"> +<interface name="files_setattr_all_mountpoints" lineno="1751"> <summary> Set the attributes of all mount points. </summary> @@ -78635,7 +78739,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1777"> +<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1769"> <summary> Do not audit attempts to set the attributes on all mount points. </summary> @@ -78645,7 +78749,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_all_mountpoints" lineno="1795"> +<interface name="files_search_all_mountpoints" lineno="1787"> <summary> Search all mount points. </summary> @@ -78655,7 +78759,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_all_mountpoints" lineno="1813"> +<interface name="files_dontaudit_search_all_mountpoints" lineno="1805"> <summary> Do not audit searching of all mount points. </summary> @@ -78665,7 +78769,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_all_mountpoints" lineno="1831"> +<interface name="files_list_all_mountpoints" lineno="1823"> <summary> List all mount points. </summary> @@ -78675,7 +78779,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_all_mountpoints" lineno="1849"> +<interface name="files_dontaudit_list_all_mountpoints" lineno="1841"> <summary> Do not audit listing of all mount points. </summary> @@ -78685,7 +78789,17 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_write_all_mountpoints" lineno="1867"> +<interface name="files_write_all_mountpoints" lineno="1859"> +<summary> +Check if all mountpoints are writable. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_write_all_mountpoints" lineno="1877"> <summary> Do not audit attempts to write to mount points. </summary> @@ -78695,7 +78809,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_root" lineno="1885"> +<interface name="files_list_root" lineno="1895"> <summary> List the contents of the root directory. </summary> @@ -78705,7 +78819,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_symlinks" lineno="1905"> +<interface name="files_delete_root_symlinks" lineno="1915"> <summary> Delete symbolic links in the root directory. @@ -78716,7 +78830,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_root_dirs" lineno="1923"> +<interface name="files_dontaudit_write_root_dirs" lineno="1933"> <summary> Do not audit attempts to write to / dirs. </summary> @@ -78726,7 +78840,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_dir" lineno="1942"> +<interface name="files_dontaudit_rw_root_dir" lineno="1952"> <summary> Do not audit attempts to write files in the root directory. @@ -78737,7 +78851,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_watch_root_dirs" lineno="1960"> +<interface name="files_watch_root_dirs" lineno="1970"> <summary> Watch the root directory. </summary> @@ -78747,7 +78861,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_root_filetrans" lineno="1994"> +<interface name="files_root_filetrans" lineno="2004"> <summary> Create an object in the root directory, with a private type using a type transition. @@ -78773,7 +78887,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_dontaudit_read_root_files" lineno="2013"> +<interface name="files_dontaudit_read_root_files" lineno="2023"> <summary> Do not audit attempts to read files in the root directory. @@ -78784,7 +78898,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_files" lineno="2032"> +<interface name="files_dontaudit_rw_root_files" lineno="2042"> <summary> Do not audit attempts to read or write files in the root directory. @@ -78795,7 +78909,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_chr_files" lineno="2051"> +<interface name="files_dontaudit_rw_root_chr_files" lineno="2061"> <summary> Do not audit attempts to read or write character device nodes in the root directory. @@ -78806,7 +78920,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_delete_root_chr_files" lineno="2070"> +<interface name="files_delete_root_chr_files" lineno="2080"> <summary> Delete character device nodes in the root directory. @@ -78817,7 +78931,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_files" lineno="2088"> +<interface name="files_delete_root_files" lineno="2098"> <summary> Delete files in the root directory. </summary> @@ -78827,7 +78941,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_root_files" lineno="2106"> +<interface name="files_exec_root_files" lineno="2116"> <summary> Execute files in the root directory. </summary> @@ -78837,7 +78951,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_dir_entry" lineno="2124"> +<interface name="files_delete_root_dir_entry" lineno="2134"> <summary> Remove entries from the root directory. </summary> @@ -78847,7 +78961,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_root_dir" lineno="2142"> +<interface name="files_manage_root_dir" lineno="2152"> <summary> Manage the root directory. </summary> @@ -78857,7 +78971,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_rootfs" lineno="2161"> +<interface name="files_getattr_rootfs" lineno="2171"> <summary> Get the attributes of a rootfs file system. @@ -78868,7 +78982,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_associate_rootfs" lineno="2179"> +<interface name="files_associate_rootfs" lineno="2189"> <summary> Associate to root file system. </summary> @@ -78878,7 +78992,7 @@ Type of the file to associate. </summary> </param> </interface> -<interface name="files_relabel_rootfs" lineno="2197"> +<interface name="files_relabel_rootfs" lineno="2207"> <summary> Relabel to and from rootfs file system. </summary> @@ -78888,7 +79002,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_unmount_rootfs" lineno="2215"> +<interface name="files_unmount_rootfs" lineno="2225"> <summary> Unmount a rootfs filesystem. </summary> @@ -78898,7 +79012,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_root" lineno="2233"> +<interface name="files_mounton_root" lineno="2243"> <summary> Mount on the root directory (/) </summary> @@ -78908,7 +79022,28 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_boot_dirs" lineno="2251"> +<interface name="files_getattr_boot_fs" lineno="2262"> +<summary> +Get the attributes of a filesystem +mounted on /boot. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_remount_boot" lineno="2280"> +<summary> +Remount a filesystem mounted on /boot. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_getattr_boot_dirs" lineno="2298"> <summary> Get attributes of the /boot directory. </summary> @@ -78918,7 +79053,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_boot_dirs" lineno="2270"> +<interface name="files_dontaudit_getattr_boot_dirs" lineno="2317"> <summary> Do not audit attempts to get attributes of the /boot directory. @@ -78929,7 +79064,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_boot" lineno="2288"> +<interface name="files_search_boot" lineno="2335"> <summary> Search the /boot directory. </summary> @@ -78939,7 +79074,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_boot" lineno="2306"> +<interface name="files_dontaudit_search_boot" lineno="2353"> <summary> Do not audit attempts to search the /boot directory. </summary> @@ -78949,7 +79084,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_boot" lineno="2324"> +<interface name="files_list_boot" lineno="2371"> <summary> List the /boot directory. </summary> @@ -78959,7 +79094,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_boot" lineno="2342"> +<interface name="files_dontaudit_list_boot" lineno="2389"> <summary> Do not audit attempts to list the /boot directory. </summary> @@ -78969,7 +79104,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_boot_dirs" lineno="2360"> +<interface name="files_create_boot_dirs" lineno="2407"> <summary> Create directories in /boot </summary> @@ -78979,7 +79114,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_boot_dirs" lineno="2379"> +<interface name="files_manage_boot_dirs" lineno="2426"> <summary> Create, read, write, and delete directories in /boot. @@ -78990,7 +79125,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_boot_filetrans" lineno="2413"> +<interface name="files_boot_filetrans" lineno="2460"> <summary> Create a private type object in boot with an automatic type transition @@ -79016,7 +79151,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_read_boot_files" lineno="2432"> +<interface name="files_read_boot_files" lineno="2479"> <summary> read files in the /boot directory. </summary> @@ -79027,7 +79162,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_boot_files" lineno="2452"> +<interface name="files_manage_boot_files" lineno="2499"> <summary> Create, read, write, and delete files in the /boot directory. @@ -79039,7 +79174,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabelfrom_boot_files" lineno="2470"> +<interface name="files_relabelfrom_boot_files" lineno="2517"> <summary> Relabel from files in the /boot directory. </summary> @@ -79049,7 +79184,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_boot_symlinks" lineno="2488"> +<interface name="files_read_boot_symlinks" lineno="2535"> <summary> Read symbolic links in the /boot directory. </summary> @@ -79059,7 +79194,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_boot_symlinks" lineno="2507"> +<interface name="files_rw_boot_symlinks" lineno="2554"> <summary> Read and write symbolic links in the /boot directory. @@ -79070,7 +79205,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_boot_symlinks" lineno="2527"> +<interface name="files_manage_boot_symlinks" lineno="2574"> <summary> Create, read, write, and delete symbolic links in the /boot directory. @@ -79081,7 +79216,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_img" lineno="2545"> +<interface name="files_read_kernel_img" lineno="2592"> <summary> Read kernel files in the /boot directory. </summary> @@ -79091,7 +79226,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_kernel_img" lineno="2566"> +<interface name="files_create_kernel_img" lineno="2613"> <summary> Install a kernel into the /boot directory. </summary> @@ -79102,7 +79237,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_delete_kernel" lineno="2586"> +<interface name="files_delete_kernel" lineno="2633"> <summary> Delete a kernel from /boot. </summary> @@ -79113,7 +79248,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_default_dirs" lineno="2604"> +<interface name="files_getattr_default_dirs" lineno="2651"> <summary> Getattr of directories with the default file type. </summary> @@ -79123,7 +79258,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_default_dirs" lineno="2623"> +<interface name="files_dontaudit_getattr_default_dirs" lineno="2670"> <summary> Do not audit attempts to get the attributes of directories with the default file type. @@ -79134,7 +79269,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_default" lineno="2641"> +<interface name="files_search_default" lineno="2688"> <summary> Search the contents of directories with the default file type. </summary> @@ -79144,7 +79279,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_default" lineno="2659"> +<interface name="files_list_default" lineno="2706"> <summary> List contents of directories with the default file type. </summary> @@ -79154,7 +79289,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_default" lineno="2678"> +<interface name="files_dontaudit_list_default" lineno="2725"> <summary> Do not audit attempts to list contents of directories with the default file type. @@ -79165,7 +79300,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_default_dirs" lineno="2697"> +<interface name="files_manage_default_dirs" lineno="2744"> <summary> Create, read, write, and delete directories with the default file type. @@ -79176,7 +79311,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_default" lineno="2715"> +<interface name="files_mounton_default" lineno="2762"> <summary> Mount a filesystem on a directory with the default file type. </summary> @@ -79186,7 +79321,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_default_files" lineno="2734"> +<interface name="files_dontaudit_getattr_default_files" lineno="2781"> <summary> Do not audit attempts to get the attributes of files with the default file type. @@ -79197,7 +79332,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_default_files" lineno="2752"> +<interface name="files_read_default_files" lineno="2799"> <summary> Read files with the default file type. </summary> @@ -79207,7 +79342,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_read_default_files" lineno="2771"> +<interface name="files_dontaudit_read_default_files" lineno="2818"> <summary> Do not audit attempts to read files with the default file type. @@ -79218,7 +79353,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_default_files" lineno="2790"> +<interface name="files_manage_default_files" lineno="2837"> <summary> Create, read, write, and delete files with the default file type. @@ -79229,7 +79364,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_symlinks" lineno="2808"> +<interface name="files_read_default_symlinks" lineno="2855"> <summary> Read symbolic links with the default file type. </summary> @@ -79239,7 +79374,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_sockets" lineno="2826"> +<interface name="files_read_default_sockets" lineno="2873"> <summary> Read sockets with the default file type. </summary> @@ -79249,7 +79384,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_pipes" lineno="2844"> +<interface name="files_read_default_pipes" lineno="2891"> <summary> Read named pipes with the default file type. </summary> @@ -79259,7 +79394,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_etc" lineno="2862"> +<interface name="files_search_etc" lineno="2909"> <summary> Search the contents of /etc directories. </summary> @@ -79269,7 +79404,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_etc_dirs" lineno="2880"> +<interface name="files_setattr_etc_dirs" lineno="2927"> <summary> Set the attributes of the /etc directories. </summary> @@ -79279,7 +79414,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_etc" lineno="2898"> +<interface name="files_list_etc" lineno="2945"> <summary> List the contents of /etc directories. </summary> @@ -79289,7 +79424,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_etc_dirs" lineno="2916"> +<interface name="files_dontaudit_write_etc_dirs" lineno="2963"> <summary> Do not audit attempts to write to /etc dirs. </summary> @@ -79299,7 +79434,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_etc_dirs" lineno="2934"> +<interface name="files_rw_etc_dirs" lineno="2981"> <summary> Add and remove entries from /etc directories. </summary> @@ -79309,7 +79444,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_dirs" lineno="2953"> +<interface name="files_manage_etc_dirs" lineno="3000"> <summary> Manage generic directories in /etc </summary> @@ -79320,7 +79455,7 @@ Domain allowed access </param> </interface> -<interface name="files_relabelto_etc_dirs" lineno="2971"> +<interface name="files_relabelto_etc_dirs" lineno="3018"> <summary> Relabel directories to etc_t. </summary> @@ -79330,7 +79465,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_etc_dirs" lineno="2990"> +<interface name="files_mounton_etc_dirs" lineno="3037"> <summary> Mount a filesystem on the etc directories. @@ -79341,7 +79476,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_etc_dirs" lineno="3008"> +<interface name="files_watch_etc_dirs" lineno="3055"> <summary> Watch /etc directories </summary> @@ -79351,7 +79486,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_etc_files" lineno="3060"> +<interface name="files_read_etc_files" lineno="3107"> <summary> Read generic files in /etc. </summary> @@ -79395,7 +79530,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_map_etc_files" lineno="3092"> +<interface name="files_map_etc_files" lineno="3139"> <summary> Map generic files in /etc. </summary> @@ -79417,7 +79552,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_dontaudit_write_etc_files" lineno="3110"> +<interface name="files_dontaudit_write_etc_files" lineno="3157"> <summary> Do not audit attempts to write generic files in /etc. </summary> @@ -79427,7 +79562,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_etc_files" lineno="3129"> +<interface name="files_rw_etc_files" lineno="3176"> <summary> Read and write generic files in /etc. </summary> @@ -79438,7 +79573,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_etc_files" lineno="3151"> +<interface name="files_manage_etc_files" lineno="3198"> <summary> Create, read, write, and delete generic files in /etc. @@ -79450,7 +79585,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_manage_etc_files" lineno="3172"> +<interface name="files_dontaudit_manage_etc_files" lineno="3219"> <summary> Do not audit attempts to create, read, write, and delete generic files in /etc. @@ -79462,7 +79597,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="files_delete_etc_files" lineno="3190"> +<interface name="files_delete_etc_files" lineno="3237"> <summary> Delete system configuration files in /etc. </summary> @@ -79472,7 +79607,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_etc_files" lineno="3208"> +<interface name="files_exec_etc_files" lineno="3255"> <summary> Execute generic files in /etc. </summary> @@ -79482,7 +79617,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_get_etc_unit_status" lineno="3228"> +<interface name="files_watch_etc_files" lineno="3275"> +<summary> +Watch /etc files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_get_etc_unit_status" lineno="3293"> <summary> Get etc_t service status. </summary> @@ -79492,7 +79637,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_start_etc_service" lineno="3247"> +<interface name="files_start_etc_service" lineno="3312"> <summary> start etc_t service </summary> @@ -79502,7 +79647,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_stop_etc_service" lineno="3266"> +<interface name="files_stop_etc_service" lineno="3331"> <summary> stop etc_t service </summary> @@ -79512,7 +79657,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_etc_files" lineno="3285"> +<interface name="files_relabel_etc_files" lineno="3350"> <summary> Relabel from and to generic files in /etc. </summary> @@ -79522,7 +79667,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_etc_symlinks" lineno="3304"> +<interface name="files_read_etc_symlinks" lineno="3369"> <summary> Read symbolic links in /etc. </summary> @@ -79532,7 +79677,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_etc_symlinks" lineno="3322"> +<interface name="files_watch_etc_symlinks" lineno="3387"> <summary> Watch /etc symlinks </summary> @@ -79542,7 +79687,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_symlinks" lineno="3340"> +<interface name="files_manage_etc_symlinks" lineno="3405"> <summary> Create, read, write, and delete symbolic links in /etc. </summary> @@ -79552,7 +79697,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_etc_filetrans" lineno="3374"> +<interface name="files_etc_filetrans" lineno="3439"> <summary> Create objects in /etc with a private type using a type_transition. @@ -79578,7 +79723,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_create_boot_flag" lineno="3404"> +<interface name="files_create_boot_flag" lineno="3469"> <summary> Create a boot flag. </summary> @@ -79600,7 +79745,7 @@ The name of the object being created. </param> <rolecap/> </interface> -<interface name="files_delete_boot_flag" lineno="3430"> +<interface name="files_delete_boot_flag" lineno="3495"> <summary> Delete a boot flag. </summary> @@ -79617,7 +79762,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_etc_runtime_dirs" lineno="3449"> +<interface name="files_getattr_etc_runtime_dirs" lineno="3514"> <summary> Get the attributes of the etc_runtime directories. @@ -79628,7 +79773,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_etc_runtime_dirs" lineno="3468"> +<interface name="files_mounton_etc_runtime_dirs" lineno="3533"> <summary> Mount a filesystem on the etc_runtime directories. @@ -79639,7 +79784,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_etc_runtime_dirs" lineno="3486"> +<interface name="files_relabelto_etc_runtime_dirs" lineno="3551"> <summary> Relabel to etc_runtime_t dirs. </summary> @@ -79649,7 +79794,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3504"> +<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3569"> <summary> Do not audit attempts to set the attributes of the etc_runtime files </summary> @@ -79659,7 +79804,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_etc_runtime_files" lineno="3542"> +<interface name="files_read_etc_runtime_files" lineno="3607"> <summary> Read files in /etc that are dynamically created on boot, such as mtab. @@ -79689,7 +79834,7 @@ Domain allowed access. <infoflow type="read" weight="10" /> <rolecap/> </interface> -<interface name="files_dontaudit_read_etc_runtime_files" lineno="3564"> +<interface name="files_dontaudit_read_etc_runtime_files" lineno="3629"> <summary> Do not audit attempts to read files in /etc that are dynamically @@ -79701,7 +79846,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_read_etc_files" lineno="3583"> +<interface name="files_dontaudit_read_etc_files" lineno="3648"> <summary> Do not audit attempts to read files in /etc @@ -79712,7 +79857,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_write_etc_runtime_files" lineno="3602"> +<interface name="files_dontaudit_write_etc_runtime_files" lineno="3667"> <summary> Do not audit attempts to write etc runtime files. @@ -79723,7 +79868,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_etc_runtime_files" lineno="3622"> +<interface name="files_rw_etc_runtime_files" lineno="3687"> <summary> Read and write files in /etc that are dynamically created on boot, such as mtab. @@ -79735,7 +79880,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_etc_runtime_files" lineno="3644"> +<interface name="files_manage_etc_runtime_files" lineno="3709"> <summary> Create, read, write, and delete files in /etc that are dynamically created on boot, @@ -79748,7 +79893,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabelto_etc_runtime_files" lineno="3662"> +<interface name="files_relabelto_etc_runtime_files" lineno="3727"> <summary> Relabel to etc_runtime_t files. </summary> @@ -79758,7 +79903,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_etc_filetrans_etc_runtime" lineno="3691"> +<interface name="files_etc_filetrans_etc_runtime" lineno="3756"> <summary> Create, etc runtime objects with an automatic type transition. @@ -79779,7 +79924,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_home_dir" lineno="3710"> +<interface name="files_getattr_home_dir" lineno="3775"> <summary> Get the attributes of the home directories root (/home). @@ -79790,7 +79935,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_home_dir" lineno="3731"> +<interface name="files_dontaudit_getattr_home_dir" lineno="3796"> <summary> Do not audit attempts to get the attributes of the home directories root @@ -79802,7 +79947,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_home" lineno="3750"> +<interface name="files_search_home" lineno="3815"> <summary> Search home directories root (/home). </summary> @@ -79812,7 +79957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_home" lineno="3770"> +<interface name="files_dontaudit_search_home" lineno="3835"> <summary> Do not audit attempts to search home directories root (/home). @@ -79823,7 +79968,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_list_home" lineno="3790"> +<interface name="files_dontaudit_list_home" lineno="3855"> <summary> Do not audit attempts to list home directories root (/home). @@ -79834,7 +79979,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_home" lineno="3809"> +<interface name="files_list_home" lineno="3874"> <summary> Get listing of home directories. </summary> @@ -79844,7 +79989,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_home" lineno="3828"> +<interface name="files_relabelto_home" lineno="3893"> <summary> Relabel to user home root (/home). </summary> @@ -79854,7 +79999,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelfrom_home" lineno="3846"> +<interface name="files_relabelfrom_home" lineno="3911"> <summary> Relabel from user home root (/home). </summary> @@ -79864,7 +80009,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_home_filetrans" lineno="3879"> +<interface name="files_watch_home" lineno="3929"> +<summary> +Watch the user home root (/home). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_home_filetrans" lineno="3962"> <summary> Create objects in /home. </summary> @@ -79889,7 +80044,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_lost_found_dirs" lineno="3897"> +<interface name="files_getattr_lost_found_dirs" lineno="3980"> <summary> Get the attributes of lost+found directories. </summary> @@ -79899,7 +80054,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3916"> +<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3999"> <summary> Do not audit attempts to get the attributes of lost+found directories. @@ -79910,7 +80065,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_lost_found" lineno="3934"> +<interface name="files_list_lost_found" lineno="4017"> <summary> List the contents of lost+found directories. </summary> @@ -79920,7 +80075,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_lost_found" lineno="3954"> +<interface name="files_manage_lost_found" lineno="4037"> <summary> Create, read, write, and delete objects in lost+found directories. @@ -79932,7 +80087,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_search_mnt" lineno="3976"> +<interface name="files_search_mnt" lineno="4059"> <summary> Search the contents of /mnt. </summary> @@ -79942,7 +80097,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_mnt" lineno="3994"> +<interface name="files_dontaudit_search_mnt" lineno="4077"> <summary> Do not audit attempts to search /mnt. </summary> @@ -79952,7 +80107,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_mnt" lineno="4012"> +<interface name="files_list_mnt" lineno="4095"> <summary> List the contents of /mnt. </summary> @@ -79962,7 +80117,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_mnt" lineno="4030"> +<interface name="files_dontaudit_list_mnt" lineno="4113"> <summary> Do not audit attempts to list the contents of /mnt. </summary> @@ -79972,7 +80127,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_mnt" lineno="4048"> +<interface name="files_mounton_mnt" lineno="4131"> <summary> Mount a filesystem on /mnt. </summary> @@ -79982,7 +80137,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mnt_dirs" lineno="4067"> +<interface name="files_manage_mnt_dirs" lineno="4150"> <summary> Create, read, write, and delete directories in /mnt. </summary> @@ -79993,7 +80148,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_mnt_files" lineno="4085"> +<interface name="files_manage_mnt_files" lineno="4168"> <summary> Create, read, write, and delete files in /mnt. </summary> @@ -80003,7 +80158,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_mnt_files" lineno="4103"> +<interface name="files_read_mnt_files" lineno="4186"> <summary> read files in /mnt. </summary> @@ -80013,7 +80168,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_mnt_symlinks" lineno="4121"> +<interface name="files_read_mnt_symlinks" lineno="4204"> <summary> Read symbolic links in /mnt. </summary> @@ -80023,7 +80178,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mnt_symlinks" lineno="4139"> +<interface name="files_manage_mnt_symlinks" lineno="4222"> <summary> Create, read, write, and delete symbolic links in /mnt. </summary> @@ -80033,7 +80188,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_kernel_modules" lineno="4157"> +<interface name="files_search_kernel_modules" lineno="4240"> <summary> Search the contents of the kernel module directories. </summary> @@ -80043,7 +80198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_kernel_modules" lineno="4176"> +<interface name="files_list_kernel_modules" lineno="4259"> <summary> List the contents of the kernel module directories. </summary> @@ -80053,7 +80208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_kernel_modules" lineno="4195"> +<interface name="files_getattr_kernel_modules" lineno="4278"> <summary> Get the attributes of kernel module files. </summary> @@ -80063,7 +80218,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_modules" lineno="4213"> +<interface name="files_read_kernel_modules" lineno="4296"> <summary> Read kernel module files. </summary> @@ -80073,7 +80228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mmap_read_kernel_modules" lineno="4233"> +<interface name="files_mmap_read_kernel_modules" lineno="4316"> <summary> Read and mmap kernel module files. </summary> @@ -80083,7 +80238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_kernel_modules" lineno="4254"> +<interface name="files_write_kernel_modules" lineno="4337"> <summary> Write kernel module files. </summary> @@ -80093,7 +80248,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_kernel_modules" lineno="4273"> +<interface name="files_delete_kernel_modules" lineno="4356"> <summary> Delete kernel module files. </summary> @@ -80103,7 +80258,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_kernel_modules" lineno="4293"> +<interface name="files_manage_kernel_modules" lineno="4376"> <summary> Create, read, write, and delete kernel module files. @@ -80115,7 +80270,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_kernel_modules" lineno="4313"> +<interface name="files_relabel_kernel_modules" lineno="4396"> <summary> Relabel from and to kernel module files. </summary> @@ -80125,7 +80280,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_kernel_modules_filetrans" lineno="4348"> +<interface name="files_kernel_modules_filetrans" lineno="4431"> <summary> Create objects in the kernel module directories with a private type via an automatic type transition. @@ -80151,7 +80306,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_load_kernel_modules" lineno="4366"> +<interface name="files_load_kernel_modules" lineno="4449"> <summary> Load kernel module files. </summary> @@ -80161,7 +80316,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_load_kernel_modules" lineno="4385"> +<interface name="files_dontaudit_load_kernel_modules" lineno="4468"> <summary> Load kernel module files. </summary> @@ -80171,7 +80326,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_world_readable" lineno="4405"> +<interface name="files_list_world_readable" lineno="4488"> <summary> List world-readable directories. </summary> @@ -80182,7 +80337,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_files" lineno="4424"> +<interface name="files_read_world_readable_files" lineno="4507"> <summary> Read world-readable files. </summary> @@ -80193,7 +80348,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_symlinks" lineno="4443"> +<interface name="files_read_world_readable_symlinks" lineno="4526"> <summary> Read world-readable symbolic links. </summary> @@ -80204,7 +80359,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_pipes" lineno="4461"> +<interface name="files_read_world_readable_pipes" lineno="4544"> <summary> Read world-readable named pipes. </summary> @@ -80214,7 +80369,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_world_readable_sockets" lineno="4479"> +<interface name="files_read_world_readable_sockets" lineno="4562"> <summary> Read world-readable sockets. </summary> @@ -80224,7 +80379,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_associate_tmp" lineno="4499"> +<interface name="files_associate_tmp" lineno="4582"> <summary> Allow the specified type to associate to a filesystem with the type of the @@ -80236,7 +80391,7 @@ Type of the file to associate. </summary> </param> </interface> -<interface name="files_getattr_tmp_dirs" lineno="4517"> +<interface name="files_getattr_tmp_dirs" lineno="4600"> <summary> Get the attributes of the tmp directory (/tmp). </summary> @@ -80246,7 +80401,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4536"> +<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4619"> <summary> Do not audit attempts to get the attributes of the tmp directory (/tmp). @@ -80257,7 +80412,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_tmp" lineno="4554"> +<interface name="files_search_tmp" lineno="4637"> <summary> Search the tmp directory (/tmp). </summary> @@ -80267,7 +80422,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_tmp" lineno="4572"> +<interface name="files_dontaudit_search_tmp" lineno="4655"> <summary> Do not audit attempts to search the tmp directory (/tmp). </summary> @@ -80277,7 +80432,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_tmp" lineno="4590"> +<interface name="files_list_tmp" lineno="4673"> <summary> Read the tmp directory (/tmp). </summary> @@ -80287,7 +80442,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_tmp" lineno="4608"> +<interface name="files_dontaudit_list_tmp" lineno="4691"> <summary> Do not audit listing of the tmp directory (/tmp). </summary> @@ -80297,7 +80452,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_delete_tmp_dir_entry" lineno="4626"> +<interface name="files_delete_tmp_dir_entry" lineno="4709"> <summary> Remove entries from the tmp directory. </summary> @@ -80307,7 +80462,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_tmp_files" lineno="4644"> +<interface name="files_read_generic_tmp_files" lineno="4727"> <summary> Read files in the tmp directory (/tmp). </summary> @@ -80317,7 +80472,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_tmp_dirs" lineno="4662"> +<interface name="files_manage_generic_tmp_dirs" lineno="4745"> <summary> Manage temporary directories in /tmp. </summary> @@ -80327,7 +80482,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_generic_tmp_dirs" lineno="4680"> +<interface name="files_relabel_generic_tmp_dirs" lineno="4763"> <summary> Relabel temporary directories in /tmp. </summary> @@ -80337,7 +80492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_tmp_files" lineno="4698"> +<interface name="files_manage_generic_tmp_files" lineno="4781"> <summary> Manage temporary files and directories in /tmp. </summary> @@ -80347,7 +80502,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_tmp_symlinks" lineno="4716"> +<interface name="files_read_generic_tmp_symlinks" lineno="4799"> <summary> Read symbolic links in the tmp directory (/tmp). </summary> @@ -80357,7 +80512,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_generic_tmp_sockets" lineno="4734"> +<interface name="files_rw_generic_tmp_sockets" lineno="4817"> <summary> Read and write generic named sockets in the tmp directory (/tmp). </summary> @@ -80367,7 +80522,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_tmp" lineno="4752"> +<interface name="files_mounton_tmp" lineno="4835"> <summary> Mount filesystems in the tmp directory (/tmp) </summary> @@ -80377,7 +80532,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_all_tmp_dirs" lineno="4770"> +<interface name="files_setattr_all_tmp_dirs" lineno="4853"> <summary> Set the attributes of all tmp directories. </summary> @@ -80387,7 +80542,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_all_tmp" lineno="4788"> +<interface name="files_list_all_tmp" lineno="4871"> <summary> List all tmp directories. </summary> @@ -80397,7 +80552,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_tmp_dirs" lineno="4808"> +<interface name="files_relabel_all_tmp_dirs" lineno="4891"> <summary> Relabel to and from all temporary directory types. @@ -80409,7 +80564,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4829"> +<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4912"> <summary> Do not audit attempts to get the attributes of all tmp files. @@ -80420,7 +80575,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_getattr_all_tmp_files" lineno="4848"> +<interface name="files_getattr_all_tmp_files" lineno="4931"> <summary> Allow attempts to get the attributes of all tmp files. @@ -80431,7 +80586,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_tmp_files" lineno="4868"> +<interface name="files_relabel_all_tmp_files" lineno="4951"> <summary> Relabel to and from all temporary file types. @@ -80443,7 +80598,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4889"> +<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4972"> <summary> Do not audit attempts to get the attributes of all tmp sock_file. @@ -80454,7 +80609,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_read_all_tmp_files" lineno="4907"> +<interface name="files_read_all_tmp_files" lineno="4990"> <summary> Read all tmp files. </summary> @@ -80464,7 +80619,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_tmp_filetrans" lineno="4941"> +<interface name="files_tmp_filetrans" lineno="5024"> <summary> Create an object in the tmp directories, with a private type using a type transition. @@ -80490,7 +80645,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_purge_tmp" lineno="4959"> +<interface name="files_purge_tmp" lineno="5042"> <summary> Delete the contents of /tmp. </summary> @@ -80500,7 +80655,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_usr_dirs" lineno="4982"> +<interface name="files_getattr_all_tmpfs_files" lineno="5065"> +<summary> +Get the attributes of all tmpfs files. +</summary> +<param name="type"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_setattr_usr_dirs" lineno="5084"> <summary> Set the attributes of the /usr directory. </summary> @@ -80510,7 +80675,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_usr" lineno="5000"> +<interface name="files_search_usr" lineno="5102"> <summary> Search the content of /usr. </summary> @@ -80520,7 +80685,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_usr" lineno="5019"> +<interface name="files_list_usr" lineno="5121"> <summary> List the contents of generic directories in /usr. @@ -80531,7 +80696,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_usr_dirs" lineno="5037"> +<interface name="files_dontaudit_write_usr_dirs" lineno="5139"> <summary> Do not audit write of /usr dirs </summary> @@ -80541,7 +80706,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_usr_dirs" lineno="5055"> +<interface name="files_rw_usr_dirs" lineno="5157"> <summary> Add and remove entries from /usr directories. </summary> @@ -80551,7 +80716,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_rw_usr_dirs" lineno="5074"> +<interface name="files_dontaudit_rw_usr_dirs" lineno="5176"> <summary> Do not audit attempts to add and remove entries from /usr directories. @@ -80562,7 +80727,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_delete_usr_dirs" lineno="5092"> +<interface name="files_delete_usr_dirs" lineno="5194"> <summary> Delete generic directories in /usr in the caller domain. </summary> @@ -80572,7 +80737,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_usr_dirs" lineno="5110"> +<interface name="files_watch_usr_dirs" lineno="5212"> <summary> Watch generic directories in /usr. </summary> @@ -80582,7 +80747,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_usr_files" lineno="5128"> +<interface name="files_delete_usr_files" lineno="5230"> <summary> Delete generic files in /usr in the caller domain. </summary> @@ -80592,7 +80757,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_usr_files" lineno="5146"> +<interface name="files_getattr_usr_files" lineno="5248"> <summary> Get the attributes of files in /usr. </summary> @@ -80602,7 +80767,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_map_usr_files" lineno="5165"> +<interface name="files_map_usr_files" lineno="5267"> <summary> Map generic files in /usr. </summary> @@ -80613,7 +80778,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_read_usr_files" lineno="5201"> +<interface name="files_read_usr_files" lineno="5303"> <summary> Read generic files in /usr. </summary> @@ -80641,7 +80806,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_exec_usr_files" lineno="5221"> +<interface name="files_exec_usr_files" lineno="5323"> <summary> Execute generic programs in /usr in the caller domain. </summary> @@ -80651,7 +80816,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_usr_files" lineno="5241"> +<interface name="files_dontaudit_write_usr_files" lineno="5343"> <summary> dontaudit write of /usr files </summary> @@ -80661,7 +80826,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_usr_files" lineno="5259"> +<interface name="files_manage_usr_files" lineno="5361"> <summary> Create, read, write, and delete files in the /usr directory. </summary> @@ -80671,7 +80836,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_usr_files" lineno="5277"> +<interface name="files_relabelto_usr_files" lineno="5379"> <summary> Relabel a file to the type used in /usr. </summary> @@ -80681,7 +80846,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelfrom_usr_files" lineno="5295"> +<interface name="files_relabelfrom_usr_files" lineno="5397"> <summary> Relabel a file from the type used in /usr. </summary> @@ -80691,7 +80856,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_usr_symlinks" lineno="5313"> +<interface name="files_read_usr_symlinks" lineno="5415"> <summary> Read symbolic links in /usr. </summary> @@ -80701,7 +80866,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_usr_filetrans" lineno="5346"> +<interface name="files_usr_filetrans" lineno="5448"> <summary> Create objects in the /usr directory </summary> @@ -80726,7 +80891,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_search_src" lineno="5364"> +<interface name="files_search_src" lineno="5466"> <summary> Search directories in /usr/src. </summary> @@ -80736,7 +80901,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_src" lineno="5382"> +<interface name="files_dontaudit_search_src" lineno="5484"> <summary> Do not audit attempts to search /usr/src. </summary> @@ -80746,7 +80911,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_getattr_usr_src_files" lineno="5400"> +<interface name="files_getattr_usr_src_files" lineno="5502"> <summary> Get the attributes of files in /usr/src. </summary> @@ -80756,7 +80921,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_usr_src_files" lineno="5421"> +<interface name="files_read_usr_src_files" lineno="5523"> <summary> Read files in /usr/src. </summary> @@ -80766,7 +80931,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_usr_src_files" lineno="5442"> +<interface name="files_exec_usr_src_files" lineno="5544"> <summary> Execute programs in /usr/src in the caller domain. </summary> @@ -80776,7 +80941,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_kernel_symbol_table" lineno="5462"> +<interface name="files_create_kernel_symbol_table" lineno="5564"> <summary> Install a system.map into the /boot directory. </summary> @@ -80786,7 +80951,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_symbol_table" lineno="5481"> +<interface name="files_read_kernel_symbol_table" lineno="5583"> <summary> Read system.map in the /boot directory. </summary> @@ -80796,7 +80961,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_kernel_symbol_table" lineno="5500"> +<interface name="files_delete_kernel_symbol_table" lineno="5602"> <summary> Delete a system.map in the /boot directory. </summary> @@ -80806,7 +80971,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_var" lineno="5519"> +<interface name="files_search_var" lineno="5621"> <summary> Search the contents of /var. </summary> @@ -80816,7 +80981,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_var_dirs" lineno="5537"> +<interface name="files_dontaudit_write_var_dirs" lineno="5639"> <summary> Do not audit attempts to write to /var. </summary> @@ -80826,7 +80991,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_write_var_dirs" lineno="5555"> +<interface name="files_write_var_dirs" lineno="5657"> <summary> Allow attempts to write to /var.dirs </summary> @@ -80836,7 +81001,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_var" lineno="5574"> +<interface name="files_dontaudit_search_var" lineno="5676"> <summary> Do not audit attempts to search the contents of /var. @@ -80847,7 +81012,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_var" lineno="5592"> +<interface name="files_list_var" lineno="5694"> <summary> List the contents of /var. </summary> @@ -80857,7 +81022,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_var" lineno="5611"> +<interface name="files_dontaudit_list_var" lineno="5713"> <summary> Do not audit attempts to list the contents of /var. @@ -80868,7 +81033,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_var_dirs" lineno="5630"> +<interface name="files_manage_var_dirs" lineno="5732"> <summary> Create, read, write, and delete directories in the /var directory. @@ -80879,7 +81044,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_var_dirs" lineno="5648"> +<interface name="files_relabel_var_dirs" lineno="5750"> <summary> relabelto/from var directories </summary> @@ -80889,7 +81054,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_files" lineno="5666"> +<interface name="files_read_var_files" lineno="5768"> <summary> Read files in the /var directory. </summary> @@ -80899,7 +81064,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_append_var_files" lineno="5684"> +<interface name="files_append_var_files" lineno="5786"> <summary> Append files in the /var directory. </summary> @@ -80909,7 +81074,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_var_files" lineno="5702"> +<interface name="files_rw_var_files" lineno="5804"> <summary> Read and write files in the /var directory. </summary> @@ -80919,7 +81084,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_rw_var_files" lineno="5721"> +<interface name="files_dontaudit_rw_var_files" lineno="5823"> <summary> Do not audit attempts to read and write files in the /var directory. @@ -80930,7 +81095,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_var_files" lineno="5739"> +<interface name="files_manage_var_files" lineno="5841"> <summary> Create, read, write, and delete files in the /var directory. </summary> @@ -80940,7 +81105,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_symlinks" lineno="5757"> +<interface name="files_read_var_symlinks" lineno="5859"> <summary> Read symbolic links in the /var directory. </summary> @@ -80950,7 +81115,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_var_symlinks" lineno="5776"> +<interface name="files_manage_var_symlinks" lineno="5878"> <summary> Create, read, write, and delete symbolic links in the /var directory. @@ -80961,7 +81126,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_var_filetrans" lineno="5809"> +<interface name="files_var_filetrans" lineno="5911"> <summary> Create objects in the /var directory </summary> @@ -80986,7 +81151,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_var_lib_dirs" lineno="5827"> +<interface name="files_getattr_var_lib_dirs" lineno="5929"> <summary> Get the attributes of the /var/lib directory. </summary> @@ -80996,7 +81161,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_var_lib" lineno="5859"> +<interface name="files_search_var_lib" lineno="5961"> <summary> Search the /var/lib directory. </summary> @@ -81020,7 +81185,7 @@ Domain allowed access. </param> <infoflow type="read" weight="5"/> </interface> -<interface name="files_dontaudit_search_var_lib" lineno="5879"> +<interface name="files_dontaudit_search_var_lib" lineno="5981"> <summary> Do not audit attempts to search the contents of /var/lib. @@ -81032,7 +81197,7 @@ Domain to not audit. </param> <infoflow type="read" weight="5"/> </interface> -<interface name="files_list_var_lib" lineno="5897"> +<interface name="files_list_var_lib" lineno="5999"> <summary> List the contents of the /var/lib directory. </summary> @@ -81042,7 +81207,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_var_lib_dirs" lineno="5915"> +<interface name="files_rw_var_lib_dirs" lineno="6017"> <summary> Read-write /var/lib directories </summary> @@ -81052,7 +81217,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_var_lib_dirs" lineno="5933"> +<interface name="files_manage_var_lib_dirs" lineno="6035"> <summary> manage var_lib_t dirs </summary> @@ -81062,7 +81227,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_var_lib_dirs" lineno="5952"> +<interface name="files_relabel_var_lib_dirs" lineno="6054"> <summary> relabel var_lib_t dirs </summary> @@ -81072,7 +81237,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_var_lib_filetrans" lineno="5986"> +<interface name="files_var_lib_filetrans" lineno="6088"> <summary> Create objects in the /var/lib directory </summary> @@ -81097,7 +81262,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_read_var_lib_files" lineno="6005"> +<interface name="files_read_var_lib_files" lineno="6107"> <summary> Read generic files in /var/lib. </summary> @@ -81107,7 +81272,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_lib_symlinks" lineno="6024"> +<interface name="files_read_var_lib_symlinks" lineno="6126"> <summary> Read generic symbolic links in /var/lib </summary> @@ -81117,7 +81282,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_urandom_seed" lineno="6046"> +<interface name="files_manage_urandom_seed" lineno="6148"> <summary> Create, read, write, and delete the pseudorandom number generator seed. @@ -81128,7 +81293,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mounttab" lineno="6066"> +<interface name="files_manage_mounttab" lineno="6168"> <summary> Allow domain to manage mount tables necessary for rpcd, nfsd, etc. @@ -81139,7 +81304,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_lock_dirs" lineno="6085"> +<interface name="files_setattr_lock_dirs" lineno="6187"> <summary> Set the attributes of the generic lock directories. </summary> @@ -81149,7 +81314,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_locks" lineno="6103"> +<interface name="files_search_locks" lineno="6205"> <summary> Search the locks directory (/var/lock). </summary> @@ -81159,7 +81324,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_locks" lineno="6123"> +<interface name="files_dontaudit_search_locks" lineno="6225"> <summary> Do not audit attempts to search the locks directory (/var/lock). @@ -81170,7 +81335,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_locks" lineno="6142"> +<interface name="files_list_locks" lineno="6244"> <summary> List generic lock directories. </summary> @@ -81180,7 +81345,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_check_write_lock_dirs" lineno="6161"> +<interface name="files_check_write_lock_dirs" lineno="6263"> <summary> Test write access on lock directories. </summary> @@ -81190,7 +81355,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_add_entry_lock_dirs" lineno="6180"> +<interface name="files_add_entry_lock_dirs" lineno="6282"> <summary> Add entries in the /var/lock directories. </summary> @@ -81200,7 +81365,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_lock_dirs" lineno="6200"> +<interface name="files_rw_lock_dirs" lineno="6302"> <summary> Add and remove entries in the /var/lock directories. @@ -81211,7 +81376,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_lock_dirs" lineno="6219"> +<interface name="files_create_lock_dirs" lineno="6321"> <summary> Create lock directories </summary> @@ -81221,7 +81386,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_relabel_all_lock_dirs" lineno="6240"> +<interface name="files_relabel_all_lock_dirs" lineno="6342"> <summary> Relabel to and from all lock directory types. </summary> @@ -81232,7 +81397,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_generic_locks" lineno="6261"> +<interface name="files_getattr_generic_locks" lineno="6363"> <summary> Get the attributes of generic lock files. </summary> @@ -81242,7 +81407,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_generic_locks" lineno="6282"> +<interface name="files_delete_generic_locks" lineno="6384"> <summary> Delete generic lock files. </summary> @@ -81252,7 +81417,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_locks" lineno="6303"> +<interface name="files_manage_generic_locks" lineno="6405"> <summary> Create, read, write, and delete generic lock files. @@ -81263,7 +81428,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_locks" lineno="6325"> +<interface name="files_delete_all_locks" lineno="6427"> <summary> Delete all lock files. </summary> @@ -81274,7 +81439,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_all_locks" lineno="6346"> +<interface name="files_read_all_locks" lineno="6448"> <summary> Read all lock files. </summary> @@ -81284,7 +81449,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_all_locks" lineno="6369"> +<interface name="files_manage_all_locks" lineno="6471"> <summary> manage all lock files. </summary> @@ -81294,7 +81459,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_locks" lineno="6392"> +<interface name="files_relabel_all_locks" lineno="6494"> <summary> Relabel from/to all lock files. </summary> @@ -81304,7 +81469,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_lock_filetrans" lineno="6431"> +<interface name="files_lock_filetrans" lineno="6533"> <summary> Create an object in the locks directory, with a private type using a type transition. @@ -81330,7 +81495,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_pid_dirs" lineno="6452"> +<interface name="files_dontaudit_getattr_pid_dirs" lineno="6554"> <summary> Do not audit attempts to get the attributes of the /var/run directory. (Deprecated) @@ -81341,7 +81506,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_mounton_pid_dirs" lineno="6467"> +<interface name="files_mounton_pid_dirs" lineno="6569"> <summary> mounton a /var/run directory. (Deprecated) </summary> @@ -81351,7 +81516,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_pid_dirs" lineno="6482"> +<interface name="files_setattr_pid_dirs" lineno="6584"> <summary> Set the attributes of the /var/run directory. (Deprecated) </summary> @@ -81361,7 +81526,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_pids" lineno="6498"> +<interface name="files_search_pids" lineno="6600"> <summary> Search the contents of runtime process ID directories (/var/run). (Deprecated) @@ -81372,7 +81537,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_pids" lineno="6514"> +<interface name="files_dontaudit_search_pids" lineno="6616"> <summary> Do not audit attempts to search the /var/run directory. (Deprecated) @@ -81383,7 +81548,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_pids" lineno="6530"> +<interface name="files_list_pids" lineno="6632"> <summary> List the contents of the runtime process ID directories (/var/run). (Deprecated) @@ -81394,7 +81559,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_check_write_pid_dirs" lineno="6545"> +<interface name="files_check_write_pid_dirs" lineno="6647"> <summary> Check write access on /var/run directories. (Deprecated) </summary> @@ -81404,7 +81569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_pid_dirs" lineno="6560"> +<interface name="files_create_pid_dirs" lineno="6662"> <summary> Create a /var/run directory. (Deprecated) </summary> @@ -81414,7 +81579,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6576"> +<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6678"> <summary> Do not audit attempts to get the attributes of the /var/run directory. @@ -81425,7 +81590,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_mounton_runtime_dirs" lineno="6595"> +<interface name="files_mounton_runtime_dirs" lineno="6697"> <summary> mounton a /var/run directory. </summary> @@ -81435,7 +81600,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_runtime_dirs" lineno="6613"> +<interface name="files_setattr_runtime_dirs" lineno="6715"> <summary> Set the attributes of the /var/run directory. </summary> @@ -81445,7 +81610,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_runtime" lineno="6633"> +<interface name="files_search_runtime" lineno="6735"> <summary> Search the contents of runtime process ID directories (/var/run). @@ -81456,7 +81621,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_runtime" lineno="6653"> +<interface name="files_dontaudit_search_runtime" lineno="6755"> <summary> Do not audit attempts to search the /var/run directory. @@ -81467,7 +81632,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_runtime" lineno="6673"> +<interface name="files_list_runtime" lineno="6775"> <summary> List the contents of the runtime process ID directories (/var/run). @@ -81478,7 +81643,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_check_write_runtime_dirs" lineno="6692"> +<interface name="files_check_write_runtime_dirs" lineno="6794"> <summary> Check write access on /var/run directories. </summary> @@ -81488,7 +81653,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_runtime_dirs" lineno="6710"> +<interface name="files_create_runtime_dirs" lineno="6812"> <summary> Create a /var/run directory. </summary> @@ -81498,7 +81663,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_runtime_dirs" lineno="6728"> +<interface name="files_watch_runtime_dirs" lineno="6830"> <summary> Watch /var/run directories. </summary> @@ -81508,7 +81673,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_pids" lineno="6746"> +<interface name="files_read_generic_pids" lineno="6848"> <summary> Read generic process ID files. (Deprecated) </summary> @@ -81518,7 +81683,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_generic_pid_pipes" lineno="6761"> +<interface name="files_write_generic_pid_pipes" lineno="6863"> <summary> Write named generic process ID pipes. (Deprecated) </summary> @@ -81528,7 +81693,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_pid_filetrans" lineno="6818"> +<interface name="files_pid_filetrans" lineno="6920"> <summary> Create an object in the process ID directory, with a private type. (Deprecated) </summary> @@ -81580,7 +81745,7 @@ The name of the object being created. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="files_pid_filetrans_lock_dir" lineno="6838"> +<interface name="files_pid_filetrans_lock_dir" lineno="6940"> <summary> Create a generic lock directory within the run directories. (Deprecated) </summary> @@ -81595,7 +81760,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_rw_generic_pids" lineno="6853"> +<interface name="files_rw_generic_pids" lineno="6955"> <summary> Read and write generic process ID files. (Deprecated) </summary> @@ -81605,7 +81770,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_pids" lineno="6869"> +<interface name="files_dontaudit_getattr_all_pids" lineno="6971"> <summary> Do not audit attempts to get the attributes of daemon runtime data files. (Deprecated) @@ -81616,7 +81781,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_write_all_pids" lineno="6884"> +<interface name="files_dontaudit_write_all_pids" lineno="6986"> <summary> Do not audit attempts to write to daemon runtime data files. (Deprecated) </summary> @@ -81626,7 +81791,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_ioctl_all_pids" lineno="6899"> +<interface name="files_dontaudit_ioctl_all_pids" lineno="7001"> <summary> Do not audit attempts to ioctl daemon runtime data files. (Deprecated) </summary> @@ -81636,7 +81801,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_all_pid_dirs" lineno="6915"> +<interface name="files_manage_all_pid_dirs" lineno="7017"> <summary> manage all pidfile directories in the /var/run directory. (Deprecated) @@ -81647,7 +81812,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_all_pids" lineno="6931"> +<interface name="files_read_all_pids" lineno="7033"> <summary> Read all process ID files. (Deprecated) </summary> @@ -81658,7 +81823,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_exec_generic_pid_files" lineno="6946"> +<interface name="files_exec_generic_pid_files" lineno="7048"> <summary> Execute generic programs in /var/run in the caller domain. (Deprecated) </summary> @@ -81668,7 +81833,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_pid_files" lineno="6961"> +<interface name="files_relabel_all_pid_files" lineno="7063"> <summary> Relabel all pid files. (Deprecated) </summary> @@ -81678,7 +81843,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_pids" lineno="6977"> +<interface name="files_delete_all_pids" lineno="7079"> <summary> Delete all process IDs. (Deprecated) </summary> @@ -81689,7 +81854,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_create_all_pid_sockets" lineno="6996"> +<interface name="files_create_all_pid_sockets" lineno="7098"> <summary> Create all pid sockets. (Deprecated) </summary> @@ -81699,7 +81864,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_pid_pipes" lineno="7011"> +<interface name="files_create_all_pid_pipes" lineno="7113"> <summary> Create all pid named pipes. (Deprecated) </summary> @@ -81709,7 +81874,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_runtime_files" lineno="7026"> +<interface name="files_read_runtime_files" lineno="7128"> <summary> Read generic runtime files. </summary> @@ -81719,7 +81884,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_runtime" lineno="7046"> +<interface name="files_exec_runtime" lineno="7148"> <summary> Execute generic programs in /var/run in the caller domain. </summary> @@ -81729,7 +81894,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_runtime_files" lineno="7064"> +<interface name="files_rw_runtime_files" lineno="7166"> <summary> Read and write generic runtime files. </summary> @@ -81739,7 +81904,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_runtime_symlinks" lineno="7084"> +<interface name="files_delete_runtime_symlinks" lineno="7186"> <summary> Delete generic runtime symlinks. </summary> @@ -81749,7 +81914,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_runtime_pipes" lineno="7102"> +<interface name="files_write_runtime_pipes" lineno="7204"> <summary> Write named generic runtime pipes. </summary> @@ -81759,7 +81924,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_dirs" lineno="7122"> +<interface name="files_delete_all_runtime_dirs" lineno="7224"> <summary> Delete all runtime dirs. </summary> @@ -81770,7 +81935,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_runtime_dirs" lineno="7140"> +<interface name="files_manage_all_runtime_dirs" lineno="7242"> <summary> Create, read, write, and delete all runtime directories. </summary> @@ -81780,7 +81945,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_dirs" lineno="7158"> +<interface name="files_relabel_all_runtime_dirs" lineno="7260"> <summary> Relabel all runtime directories. </summary> @@ -81790,7 +81955,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7177"> +<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7279"> <summary> Do not audit attempts to get the attributes of all runtime data files. @@ -81801,7 +81966,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_all_runtime_files" lineno="7198"> +<interface name="files_read_all_runtime_files" lineno="7300"> <summary> Read all runtime files. </summary> @@ -81812,7 +81977,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7219"> +<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7321"> <summary> Do not audit attempts to ioctl all runtime files. </summary> @@ -81822,7 +81987,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_write_all_runtime_files" lineno="7239"> +<interface name="files_dontaudit_write_all_runtime_files" lineno="7341"> <summary> Do not audit attempts to write to all runtime files. </summary> @@ -81832,7 +81997,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_delete_all_runtime_files" lineno="7260"> +<interface name="files_delete_all_runtime_files" lineno="7362"> <summary> Delete all runtime files. </summary> @@ -81843,7 +82008,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_runtime_files" lineno="7279"> +<interface name="files_manage_all_runtime_files" lineno="7381"> <summary> Create, read, write and delete all var_run (pid) files @@ -81854,7 +82019,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_files" lineno="7297"> +<interface name="files_relabel_all_runtime_files" lineno="7399"> <summary> Relabel all runtime files. </summary> @@ -81864,7 +82029,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_symlinks" lineno="7316"> +<interface name="files_delete_all_runtime_symlinks" lineno="7418"> <summary> Delete all runtime symlinks. </summary> @@ -81875,7 +82040,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_runtime_symlinks" lineno="7335"> +<interface name="files_manage_all_runtime_symlinks" lineno="7437"> <summary> Create, read, write and delete all var_run (pid) symbolic links. @@ -81886,7 +82051,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_symlinks" lineno="7353"> +<interface name="files_relabel_all_runtime_symlinks" lineno="7455"> <summary> Relabel all runtime symbolic links. </summary> @@ -81896,7 +82061,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_runtime_pipes" lineno="7371"> +<interface name="files_create_all_runtime_pipes" lineno="7473"> <summary> Create all runtime named pipes </summary> @@ -81906,7 +82071,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_pipes" lineno="7390"> +<interface name="files_delete_all_runtime_pipes" lineno="7492"> <summary> Delete all runtime named pipes </summary> @@ -81916,7 +82081,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_runtime_sockets" lineno="7409"> +<interface name="files_create_all_runtime_sockets" lineno="7511"> <summary> Create all runtime sockets. </summary> @@ -81926,7 +82091,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_sockets" lineno="7427"> +<interface name="files_delete_all_runtime_sockets" lineno="7529"> <summary> Delete all runtime sockets. </summary> @@ -81936,7 +82101,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_sockets" lineno="7445"> +<interface name="files_relabel_all_runtime_sockets" lineno="7547"> <summary> Relabel all runtime named sockets. </summary> @@ -81946,7 +82111,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_runtime_filetrans" lineno="7505"> +<interface name="files_runtime_filetrans" lineno="7607"> <summary> Create an object in the /run directory, with a private type. </summary> @@ -81998,7 +82163,7 @@ The name of the object being created. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="files_runtime_filetrans_lock_dir" lineno="7530"> +<interface name="files_runtime_filetrans_lock_dir" lineno="7632"> <summary> Create a generic lock directory within the run directories. </summary> @@ -82013,7 +82178,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_create_all_spool_sockets" lineno="7548"> +<interface name="files_create_all_spool_sockets" lineno="7650"> <summary> Create all spool sockets </summary> @@ -82023,7 +82188,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_spool_sockets" lineno="7566"> +<interface name="files_delete_all_spool_sockets" lineno="7668"> <summary> Delete all spool sockets </summary> @@ -82033,7 +82198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_pid_dirs" lineno="7584"> +<interface name="files_delete_all_pid_dirs" lineno="7686"> <summary> Delete all process ID directories. (Deprecated) </summary> @@ -82043,7 +82208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_all_pids" lineno="7600"> +<interface name="files_manage_all_pids" lineno="7702"> <summary> Create, read, write and delete all var_run (pid) content (Deprecated) @@ -82054,7 +82219,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_pid_dirs" lineno="7617"> +<interface name="files_relabel_all_pid_dirs" lineno="7719"> <summary> Relabel to/from all var_run (pid) directories (Deprecated) </summary> @@ -82064,7 +82229,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_pid_sock_files" lineno="7632"> +<interface name="files_relabel_all_pid_sock_files" lineno="7734"> <summary> Relabel to/from all var_run (pid) socket files (Deprecated) </summary> @@ -82074,7 +82239,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_pids" lineno="7647"> +<interface name="files_relabel_all_pids" lineno="7749"> <summary> Relabel to/from all var_run (pid) files and directories (Deprecated) </summary> @@ -82084,7 +82249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_all_poly_members" lineno="7665"> +<interface name="files_mounton_all_poly_members" lineno="7767"> <summary> Mount filesystems on all polyinstantiation member directories. @@ -82095,7 +82260,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_spool" lineno="7684"> +<interface name="files_search_spool" lineno="7786"> <summary> Search the contents of generic spool directories (/var/spool). @@ -82106,7 +82271,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_spool" lineno="7703"> +<interface name="files_dontaudit_search_spool" lineno="7805"> <summary> Do not audit attempts to search generic spool directories. @@ -82117,7 +82282,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_spool" lineno="7722"> +<interface name="files_list_spool" lineno="7824"> <summary> List the contents of generic spool (/var/spool) directories. @@ -82128,7 +82293,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_spool_dirs" lineno="7741"> +<interface name="files_manage_generic_spool_dirs" lineno="7843"> <summary> Create, read, write, and delete generic spool directories (/var/spool). @@ -82139,7 +82304,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_spool" lineno="7760"> +<interface name="files_read_generic_spool" lineno="7862"> <summary> Read generic spool files. </summary> @@ -82149,7 +82314,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_spool" lineno="7780"> +<interface name="files_manage_generic_spool" lineno="7882"> <summary> Create, read, write, and delete generic spool files. @@ -82160,7 +82325,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_spool_filetrans" lineno="7816"> +<interface name="files_spool_filetrans" lineno="7918"> <summary> Create objects in the spool directory with a private type with a type transition. @@ -82187,7 +82352,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_polyinstantiate_all" lineno="7836"> +<interface name="files_polyinstantiate_all" lineno="7938"> <summary> Allow access to manage all polyinstantiated directories on the system. @@ -82198,7 +82363,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_unconfined" lineno="7890"> +<interface name="files_unconfined" lineno="7992"> <summary> Unconfined access to files. </summary> @@ -82208,7 +82373,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_runtime_lnk_files" lineno="7912"> +<interface name="files_manage_etc_runtime_lnk_files" lineno="8014"> <summary> Create, read, write, and delete symbolic links in /etc that are dynamically created on boot. @@ -82220,7 +82385,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_read_etc_runtime" lineno="7930"> +<interface name="files_dontaudit_read_etc_runtime" lineno="8032"> <summary> Do not audit attempts to read etc_runtime resources </summary> @@ -82230,7 +82395,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_src" lineno="7948"> +<interface name="files_list_src" lineno="8050"> <summary> List usr/src files </summary> @@ -82240,7 +82405,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_read_src_files" lineno="7966"> +<interface name="files_read_src_files" lineno="8068"> <summary> Read usr/src files </summary> @@ -82250,7 +82415,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_manage_src_files" lineno="7984"> +<interface name="files_manage_src_files" lineno="8086"> <summary> Manage /usr/src files </summary> @@ -82260,7 +82425,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_lib_filetrans_kernel_modules" lineno="8015"> +<interface name="files_lib_filetrans_kernel_modules" lineno="8117"> <summary> Create a resource in the generic lib location with an automatic type transition towards the kernel modules @@ -82282,7 +82447,7 @@ Optional name of the resource </summary> </param> </interface> -<interface name="files_read_etc_runtime" lineno="8033"> +<interface name="files_read_etc_runtime" lineno="8135"> <summary> Read etc runtime resources </summary> @@ -82292,7 +82457,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_relabel_all_non_security_file_types" lineno="8055"> +<interface name="files_relabel_all_non_security_file_types" lineno="8157"> <summary> Allow relabel from and to non-security types </summary> @@ -82303,7 +82468,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_non_security_file_types" lineno="8085"> +<interface name="files_manage_all_non_security_file_types" lineno="8187"> <summary> Manage non-security-sensitive resource types </summary> @@ -82314,7 +82479,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_all_pidfiles" lineno="8107"> +<interface name="files_relabel_all_pidfiles" lineno="8209"> <summary> Allow relabeling from and to any pidfile associated type </summary> @@ -82792,7 +82957,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_delete_cgroup_dirs" lineno="783"> +<interface name="fs_ioctl_cgroup_dirs" lineno="783"> +<summary> +Ioctl cgroup directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_delete_cgroup_dirs" lineno="802"> <summary> Delete cgroup directories. </summary> @@ -82802,7 +82977,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_cgroup_dirs" lineno="802"> +<interface name="fs_manage_cgroup_dirs" lineno="821"> <summary> Manage cgroup directories. </summary> @@ -82812,7 +82987,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_cgroup_dirs" lineno="822"> +<interface name="fs_relabel_cgroup_dirs" lineno="841"> <summary> Relabel cgroup directories. </summary> @@ -82822,7 +82997,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_cgroup_files" lineno="840"> +<interface name="fs_getattr_cgroup_files" lineno="859"> <summary> Get attributes of cgroup files. </summary> @@ -82832,7 +83007,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cgroup_files" lineno="860"> +<interface name="fs_read_cgroup_files" lineno="879"> <summary> Read cgroup files. </summary> @@ -82842,7 +83017,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_watch_cgroup_files" lineno="881"> +<interface name="fs_watch_cgroup_files" lineno="900"> <summary> Watch cgroup files. </summary> @@ -82852,7 +83027,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_create_cgroup_links" lineno="900"> +<interface name="fs_create_cgroup_links" lineno="919"> <summary> Create cgroup lnk_files. </summary> @@ -82862,7 +83037,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_cgroup_files" lineno="920"> +<interface name="fs_write_cgroup_files" lineno="939"> <summary> Write cgroup files. </summary> @@ -82872,7 +83047,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_cgroup_files" lineno="939"> +<interface name="fs_rw_cgroup_files" lineno="958"> <summary> Read and write cgroup files. </summary> @@ -82882,7 +83057,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_rw_cgroup_files" lineno="961"> +<interface name="fs_dontaudit_rw_cgroup_files" lineno="980"> <summary> Do not audit attempts to open, get attributes, read and write @@ -82894,7 +83069,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cgroup_files" lineno="979"> +<interface name="fs_manage_cgroup_files" lineno="998"> <summary> Manage cgroup files. </summary> @@ -82904,7 +83079,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_cgroup_symlinks" lineno="999"> +<interface name="fs_relabel_cgroup_symlinks" lineno="1018"> <summary> Relabel cgroup symbolic links. </summary> @@ -82914,7 +83089,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_cgroup" lineno="1017"> +<interface name="fs_mounton_cgroup" lineno="1036"> <summary> Mount on cgroup directories. </summary> @@ -82924,7 +83099,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_cgroup_filetrans" lineno="1051"> +<interface name="fs_cgroup_filetrans" lineno="1070"> <summary> Create an object in a cgroup tmpfs filesystem, with a private type using a type transition. @@ -82950,7 +83125,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_dontaudit_list_cifs_dirs" lineno="1072"> +<interface name="fs_dontaudit_list_cifs_dirs" lineno="1091"> <summary> Do not audit attempts to read dirs on a CIFS or SMB filesystem. @@ -82961,7 +83136,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mount_cifs" lineno="1090"> +<interface name="fs_mount_cifs" lineno="1109"> <summary> Mount a CIFS or SMB network filesystem. </summary> @@ -82971,7 +83146,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_cifs" lineno="1109"> +<interface name="fs_remount_cifs" lineno="1128"> <summary> Remount a CIFS or SMB network filesystem. This allows some mount options to be changed. @@ -82982,7 +83157,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_cifs" lineno="1127"> +<interface name="fs_unmount_cifs" lineno="1146"> <summary> Unmount a CIFS or SMB network filesystem. </summary> @@ -82992,7 +83167,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_cifs" lineno="1147"> +<interface name="fs_getattr_cifs" lineno="1166"> <summary> Get the attributes of a CIFS or SMB network filesystem. @@ -83004,7 +83179,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_search_cifs" lineno="1165"> +<interface name="fs_search_cifs" lineno="1184"> <summary> Search directories on a CIFS or SMB filesystem. </summary> @@ -83014,7 +83189,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_cifs" lineno="1184"> +<interface name="fs_list_cifs" lineno="1203"> <summary> List the contents of directories on a CIFS or SMB filesystem. @@ -83025,7 +83200,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_cifs" lineno="1203"> +<interface name="fs_dontaudit_list_cifs" lineno="1222"> <summary> Do not audit attempts to list the contents of directories on a CIFS or SMB filesystem. @@ -83036,7 +83211,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mounton_cifs" lineno="1221"> +<interface name="fs_mounton_cifs" lineno="1240"> <summary> Mounton a CIFS filesystem. </summary> @@ -83046,7 +83221,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_files" lineno="1240"> +<interface name="fs_read_cifs_files" lineno="1259"> <summary> Read files on a CIFS or SMB filesystem. </summary> @@ -83057,7 +83232,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_read_all_inherited_image_files" lineno="1260"> +<interface name="fs_read_all_inherited_image_files" lineno="1279"> <summary> Read all inherited filesystem image files. </summary> @@ -83068,7 +83243,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_read_all_image_files" lineno="1279"> +<interface name="fs_read_all_image_files" lineno="1298"> <summary> Read all filesystem image files. </summary> @@ -83079,7 +83254,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_mmap_read_all_image_files" lineno="1298"> +<interface name="fs_mmap_read_all_image_files" lineno="1317"> <summary> Mmap-read all filesystem image files. </summary> @@ -83090,7 +83265,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_rw_all_image_files" lineno="1317"> +<interface name="fs_rw_all_image_files" lineno="1336"> <summary> Read and write all filesystem image files. </summary> @@ -83101,7 +83276,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_mmap_rw_all_image_files" lineno="1336"> +<interface name="fs_mmap_rw_all_image_files" lineno="1355"> <summary> Mmap-Read-write all filesystem image files. </summary> @@ -83112,7 +83287,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_write_all_image_files" lineno="1355"> +<interface name="fs_dontaudit_write_all_image_files" lineno="1374"> <summary> Do not audit attempts to write all filesystem image files. </summary> @@ -83123,7 +83298,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_noxattr_fs" lineno="1375"> +<interface name="fs_getattr_noxattr_fs" lineno="1394"> <summary> Get the attributes of filesystems that do not have extended attribute support. @@ -83135,7 +83310,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_list_noxattr_fs" lineno="1393"> +<interface name="fs_list_noxattr_fs" lineno="1412"> <summary> Read all noxattrfs directories. </summary> @@ -83145,7 +83320,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_noxattr_fs" lineno="1412"> +<interface name="fs_dontaudit_list_noxattr_fs" lineno="1431"> <summary> Do not audit attempts to list all noxattrfs directories. @@ -83156,7 +83331,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_dirs" lineno="1430"> +<interface name="fs_manage_noxattr_fs_dirs" lineno="1449"> <summary> Create, read, write, and delete all noxattrfs directories. </summary> @@ -83166,7 +83341,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_noxattr_fs_files" lineno="1448"> +<interface name="fs_read_noxattr_fs_files" lineno="1467"> <summary> Read all noxattrfs files. </summary> @@ -83176,7 +83351,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1468"> +<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1487"> <summary> Do not audit attempts to read all noxattrfs files. @@ -83187,7 +83362,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1486"> +<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1505"> <summary> Dont audit attempts to write to noxattrfs files. </summary> @@ -83197,7 +83372,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_files" lineno="1504"> +<interface name="fs_manage_noxattr_fs_files" lineno="1523"> <summary> Create, read, write, and delete all noxattrfs files. </summary> @@ -83207,7 +83382,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_noxattr_fs_symlinks" lineno="1523"> +<interface name="fs_read_noxattr_fs_symlinks" lineno="1542"> <summary> Read all noxattrfs symbolic links. </summary> @@ -83217,7 +83392,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_symlinks" lineno="1542"> +<interface name="fs_manage_noxattr_fs_symlinks" lineno="1561"> <summary> Manage all noxattrfs symbolic links. </summary> @@ -83227,7 +83402,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_noxattr_fs" lineno="1562"> +<interface name="fs_relabelfrom_noxattr_fs" lineno="1581"> <summary> Relabel all objects from filesystems that do not support extended attributes. @@ -83238,7 +83413,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_cifs_files" lineno="1588"> +<interface name="fs_dontaudit_read_cifs_files" lineno="1607"> <summary> Do not audit attempts to read files on a CIFS or SMB filesystem. @@ -83249,7 +83424,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_append_cifs_files" lineno="1608"> +<interface name="fs_append_cifs_files" lineno="1627"> <summary> Append files on a CIFS filesystem. @@ -83261,7 +83436,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_append_cifs_files" lineno="1628"> +<interface name="fs_dontaudit_append_cifs_files" lineno="1647"> <summary> dontaudit Append files on a CIFS filesystem. @@ -83273,7 +83448,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_rw_cifs_files" lineno="1647"> +<interface name="fs_dontaudit_rw_cifs_files" lineno="1666"> <summary> Do not audit attempts to read or write files on a CIFS or SMB filesystem. @@ -83284,7 +83459,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_cifs_symlinks" lineno="1665"> +<interface name="fs_read_cifs_symlinks" lineno="1684"> <summary> Read symbolic links on a CIFS or SMB filesystem. </summary> @@ -83294,7 +83469,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_named_pipes" lineno="1685"> +<interface name="fs_read_cifs_named_pipes" lineno="1704"> <summary> Read named pipes on a CIFS or SMB network filesystem. @@ -83305,7 +83480,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_named_sockets" lineno="1704"> +<interface name="fs_read_cifs_named_sockets" lineno="1723"> <summary> Read named sockets on a CIFS or SMB network filesystem. @@ -83316,7 +83491,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_exec_cifs_files" lineno="1725"> +<interface name="fs_exec_cifs_files" lineno="1744"> <summary> Execute files on a CIFS or SMB network filesystem, in the caller @@ -83329,7 +83504,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_cifs_dirs" lineno="1746"> +<interface name="fs_manage_cifs_dirs" lineno="1765"> <summary> Create, read, write, and delete directories on a CIFS or SMB network filesystem. @@ -83341,7 +83516,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1766"> +<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1785"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -83353,7 +83528,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cifs_files" lineno="1786"> +<interface name="fs_manage_cifs_files" lineno="1805"> <summary> Create, read, write, and delete files on a CIFS or SMB network filesystem. @@ -83365,7 +83540,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_cifs_files" lineno="1806"> +<interface name="fs_dontaudit_manage_cifs_files" lineno="1825"> <summary> Do not audit attempts to create, read, write, and delete files @@ -83377,7 +83552,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cifs_symlinks" lineno="1825"> +<interface name="fs_manage_cifs_symlinks" lineno="1844"> <summary> Create, read, write, and delete symbolic links on a CIFS or SMB network filesystem. @@ -83388,7 +83563,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_cifs_named_pipes" lineno="1844"> +<interface name="fs_manage_cifs_named_pipes" lineno="1863"> <summary> Create, read, write, and delete named pipes on a CIFS or SMB network filesystem. @@ -83399,7 +83574,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_cifs_named_sockets" lineno="1863"> +<interface name="fs_manage_cifs_named_sockets" lineno="1882"> <summary> Create, read, write, and delete named sockets on a CIFS or SMB network filesystem. @@ -83410,7 +83585,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_cifs_domtrans" lineno="1906"> +<interface name="fs_cifs_domtrans" lineno="1925"> <summary> Execute a file on a CIFS or SMB filesystem in the specified domain. @@ -83445,7 +83620,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="fs_manage_configfs_dirs" lineno="1926"> +<interface name="fs_manage_configfs_dirs" lineno="1945"> <summary> Create, read, write, and delete dirs on a configfs filesystem. @@ -83456,7 +83631,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_configfs_files" lineno="1945"> +<interface name="fs_manage_configfs_files" lineno="1964"> <summary> Create, read, write, and delete files on a configfs filesystem. @@ -83467,7 +83642,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_dos_fs" lineno="1964"> +<interface name="fs_mount_dos_fs" lineno="1983"> <summary> Mount a DOS filesystem, such as FAT32 or NTFS. @@ -83478,7 +83653,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_dos_fs" lineno="1984"> +<interface name="fs_remount_dos_fs" lineno="2003"> <summary> Remount a DOS filesystem, such as FAT32 or NTFS. This allows @@ -83490,7 +83665,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_dos_fs" lineno="2003"> +<interface name="fs_unmount_dos_fs" lineno="2022"> <summary> Unmount a DOS filesystem, such as FAT32 or NTFS. @@ -83501,7 +83676,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_dos_fs" lineno="2023"> +<interface name="fs_getattr_dos_fs" lineno="2042"> <summary> Get the attributes of a DOS filesystem, such as FAT32 or NTFS. @@ -83513,7 +83688,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_relabelfrom_dos_fs" lineno="2042"> +<interface name="fs_relabelfrom_dos_fs" lineno="2061"> <summary> Allow changing of the label of a DOS filesystem using the context= mount option. @@ -83524,7 +83699,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_dos_dirs" lineno="2060"> +<interface name="fs_getattr_dos_dirs" lineno="2079"> <summary> Get attributes of directories on a dosfs filesystem. </summary> @@ -83534,7 +83709,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_dos" lineno="2078"> +<interface name="fs_search_dos" lineno="2097"> <summary> Search dosfs filesystem. </summary> @@ -83544,7 +83719,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_dos" lineno="2096"> +<interface name="fs_list_dos" lineno="2115"> <summary> List dirs DOS filesystem. </summary> @@ -83554,7 +83729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_dos_dirs" lineno="2115"> +<interface name="fs_manage_dos_dirs" lineno="2134"> <summary> Create, read, write, and delete dirs on a DOS filesystem. @@ -83565,7 +83740,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_dos_files" lineno="2133"> +<interface name="fs_read_dos_files" lineno="2152"> <summary> Read files on a DOS filesystem. </summary> @@ -83575,7 +83750,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mmap_read_dos_files" lineno="2151"> +<interface name="fs_mmap_read_dos_files" lineno="2170"> <summary> Read and map files on a DOS filesystem. </summary> @@ -83585,7 +83760,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_dos_files" lineno="2171"> +<interface name="fs_manage_dos_files" lineno="2190"> <summary> Create, read, write, and delete files on a DOS filesystem. @@ -83596,7 +83771,52 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_efivarfs" lineno="2189"> +<interface name="fs_list_ecryptfs" lineno="2208"> +<summary> +Read symbolic links on an eCryptfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_ecryptfs_dirs" lineno="2229"> +<summary> +Create, read, write, and delete directories +on an eCryptfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_ecryptfs_files" lineno="2249"> +<summary> +Create, read, write, and delete files +on an eCryptfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_ecryptfs_named_sockets" lineno="2268"> +<summary> +Create, read, write, and delete named sockets +on an eCryptfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_efivarfs" lineno="2286"> <summary> Get the attributes of efivarfs filesystems. </summary> @@ -83606,7 +83826,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_efivars" lineno="2207"> +<interface name="fs_list_efivars" lineno="2304"> <summary> List dirs in efivarfs filesystem. </summary> @@ -83616,7 +83836,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_efivarfs_files" lineno="2227"> +<interface name="fs_read_efivarfs_files" lineno="2324"> <summary> Read files in efivarfs - contains Linux Kernel configuration options for UEFI systems @@ -83628,7 +83848,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_efivarfs_files" lineno="2247"> +<interface name="fs_manage_efivarfs_files" lineno="2344"> <summary> Create, read, write, and delete files on a efivarfs filesystem. @@ -83640,7 +83860,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_fusefs" lineno="2265"> +<interface name="fs_getattr_fusefs" lineno="2362"> <summary> stat a FUSE filesystem </summary> @@ -83650,7 +83870,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_fusefs" lineno="2283"> +<interface name="fs_mount_fusefs" lineno="2380"> <summary> Mount a FUSE filesystem. </summary> @@ -83660,7 +83880,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_fusefs" lineno="2301"> +<interface name="fs_unmount_fusefs" lineno="2398"> <summary> Unmount a FUSE filesystem. </summary> @@ -83670,7 +83890,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_fusefs" lineno="2319"> +<interface name="fs_remount_fusefs" lineno="2416"> <summary> Remount a FUSE filesystem. </summary> @@ -83680,7 +83900,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_fusefs" lineno="2337"> +<interface name="fs_mounton_fusefs" lineno="2434"> <summary> Mounton a FUSEFS filesystem. </summary> @@ -83690,7 +83910,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_fusefs_entry_type" lineno="2356"> +<interface name="fs_fusefs_entry_type" lineno="2453"> <summary> Make FUSEFS files an entrypoint for the specified domain. @@ -83701,7 +83921,7 @@ The domain for which fusefs_t is an entrypoint. </summary> </param> </interface> -<interface name="fs_fusefs_domtrans" lineno="2389"> +<interface name="fs_fusefs_domtrans" lineno="2486"> <summary> Execute FUSEFS files in a specified domain. </summary> @@ -83726,7 +83946,7 @@ Domain to transition to. </summary> </param> </interface> -<interface name="fs_search_fusefs" lineno="2409"> +<interface name="fs_search_fusefs" lineno="2506"> <summary> Search directories on a FUSEFS filesystem. @@ -83738,7 +83958,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_list_fusefs" lineno="2428"> +<interface name="fs_dontaudit_list_fusefs" lineno="2525"> <summary> Do not audit attempts to list the contents of directories on a FUSEFS filesystem. @@ -83749,7 +83969,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_fusefs_dirs" lineno="2448"> +<interface name="fs_manage_fusefs_dirs" lineno="2545"> <summary> Create, read, write, and delete directories on a FUSEFS filesystem. @@ -83761,7 +83981,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2468"> +<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2565"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -83773,7 +83993,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_fusefs_files" lineno="2487"> +<interface name="fs_read_fusefs_files" lineno="2584"> <summary> Read, a FUSEFS filesystem. </summary> @@ -83784,7 +84004,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_exec_fusefs_files" lineno="2506"> +<interface name="fs_exec_fusefs_files" lineno="2603"> <summary> Execute files on a FUSEFS filesystem. </summary> @@ -83795,7 +84015,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_fusefs_files" lineno="2526"> +<interface name="fs_manage_fusefs_files" lineno="2623"> <summary> Create, read, write, and delete files on a FUSEFS filesystem. @@ -83807,7 +84027,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_fusefs_files" lineno="2546"> +<interface name="fs_dontaudit_manage_fusefs_files" lineno="2643"> <summary> Do not audit attempts to create, read, write, and delete files @@ -83819,7 +84039,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_fusefs_symlinks" lineno="2564"> +<interface name="fs_read_fusefs_symlinks" lineno="2661"> <summary> Read symbolic links on a FUSEFS filesystem. </summary> @@ -83829,7 +84049,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_fusefs_symlinks" lineno="2584"> +<interface name="fs_manage_fusefs_symlinks" lineno="2681"> <summary> Manage symlinks on a FUSEFS filesystem. </summary> @@ -83840,7 +84060,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_hugetlbfs" lineno="2603"> +<interface name="fs_getattr_hugetlbfs" lineno="2700"> <summary> Get the attributes of an hugetlbfs filesystem. @@ -83851,7 +84071,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_hugetlbfs" lineno="2621"> +<interface name="fs_list_hugetlbfs" lineno="2718"> <summary> List hugetlbfs. </summary> @@ -83861,7 +84081,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_hugetlbfs_dirs" lineno="2639"> +<interface name="fs_manage_hugetlbfs_dirs" lineno="2736"> <summary> Manage hugetlbfs dirs. </summary> @@ -83871,7 +84091,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2657"> +<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2754"> <summary> Read and write inherited hugetlbfs files. </summary> @@ -83881,7 +84101,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_hugetlbfs_files" lineno="2675"> +<interface name="fs_rw_hugetlbfs_files" lineno="2772"> <summary> Read and write hugetlbfs files. </summary> @@ -83891,7 +84111,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2693"> +<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2790"> <summary> Read, map and write hugetlbfs files. </summary> @@ -83901,7 +84121,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_associate_hugetlbfs" lineno="2712"> +<interface name="fs_associate_hugetlbfs" lineno="2809"> <summary> Allow the type to associate to hugetlbfs filesystems. </summary> @@ -83911,7 +84131,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_search_inotifyfs" lineno="2730"> +<interface name="fs_search_inotifyfs" lineno="2827"> <summary> Search inotifyfs filesystem. </summary> @@ -83921,7 +84141,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_inotifyfs" lineno="2748"> +<interface name="fs_list_inotifyfs" lineno="2845"> <summary> List inotifyfs filesystem. </summary> @@ -83931,7 +84151,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_inotifyfs" lineno="2766"> +<interface name="fs_dontaudit_list_inotifyfs" lineno="2863"> <summary> Dontaudit List inotifyfs filesystem. </summary> @@ -83941,7 +84161,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_hugetlbfs_filetrans" lineno="2800"> +<interface name="fs_hugetlbfs_filetrans" lineno="2897"> <summary> Create an object in a hugetlbfs filesystem, with a private type using a type transition. @@ -83967,7 +84187,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_mount_iso9660_fs" lineno="2820"> +<interface name="fs_mount_iso9660_fs" lineno="2917"> <summary> Mount an iso9660 filesystem, which is usually used on CDs. @@ -83978,7 +84198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_iso9660_fs" lineno="2840"> +<interface name="fs_remount_iso9660_fs" lineno="2937"> <summary> Remount an iso9660 filesystem, which is usually used on CDs. This allows @@ -83990,7 +84210,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_iso9660_fs" lineno="2859"> +<interface name="fs_relabelfrom_iso9660_fs" lineno="2956"> <summary> Allow changing of the label of a filesystem with iso9660 type @@ -84001,7 +84221,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_iso9660_fs" lineno="2878"> +<interface name="fs_unmount_iso9660_fs" lineno="2975"> <summary> Unmount an iso9660 filesystem, which is usually used on CDs. @@ -84012,7 +84232,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_iso9660_fs" lineno="2898"> +<interface name="fs_getattr_iso9660_fs" lineno="2995"> <summary> Get the attributes of an iso9660 filesystem, which is usually used on CDs. @@ -84024,7 +84244,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_iso9660_files" lineno="2917"> +<interface name="fs_getattr_iso9660_files" lineno="3014"> <summary> Get the attributes of files on an iso9660 filesystem, which is usually used on CDs. @@ -84035,7 +84255,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_iso9660_files" lineno="2937"> +<interface name="fs_read_iso9660_files" lineno="3034"> <summary> Read files on an iso9660 filesystem, which is usually used on CDs. @@ -84046,7 +84266,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_nfs" lineno="2957"> +<interface name="fs_mount_nfs" lineno="3054"> <summary> Mount a NFS filesystem. </summary> @@ -84056,7 +84276,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_nfs" lineno="2976"> +<interface name="fs_remount_nfs" lineno="3073"> <summary> Remount a NFS filesystem. This allows some mount options to be changed. @@ -84067,7 +84287,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_nfs" lineno="2994"> +<interface name="fs_unmount_nfs" lineno="3091"> <summary> Unmount a NFS filesystem. </summary> @@ -84077,7 +84297,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfs" lineno="3013"> +<interface name="fs_getattr_nfs" lineno="3110"> <summary> Get the attributes of a NFS filesystem. </summary> @@ -84088,7 +84308,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_search_nfs" lineno="3031"> +<interface name="fs_search_nfs" lineno="3128"> <summary> Search directories on a NFS filesystem. </summary> @@ -84098,7 +84318,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_nfs" lineno="3049"> +<interface name="fs_list_nfs" lineno="3146"> <summary> List NFS filesystem. </summary> @@ -84108,7 +84328,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_nfs" lineno="3068"> +<interface name="fs_dontaudit_list_nfs" lineno="3165"> <summary> Do not audit attempts to list the contents of directories on a NFS filesystem. @@ -84119,7 +84339,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mounton_nfs" lineno="3086"> +<interface name="fs_mounton_nfs" lineno="3183"> <summary> Mounton a NFS filesystem. </summary> @@ -84129,7 +84349,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nfs_files" lineno="3105"> +<interface name="fs_read_nfs_files" lineno="3202"> <summary> Read files on a NFS filesystem. </summary> @@ -84140,7 +84360,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_read_nfs_files" lineno="3125"> +<interface name="fs_dontaudit_read_nfs_files" lineno="3222"> <summary> Do not audit attempts to read files on a NFS filesystem. @@ -84151,7 +84371,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_write_nfs_files" lineno="3143"> +<interface name="fs_write_nfs_files" lineno="3240"> <summary> Read files on a NFS filesystem. </summary> @@ -84161,7 +84381,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_exec_nfs_files" lineno="3163"> +<interface name="fs_exec_nfs_files" lineno="3260"> <summary> Execute files on a NFS filesystem. </summary> @@ -84172,7 +84392,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_append_nfs_files" lineno="3184"> +<interface name="fs_append_nfs_files" lineno="3281"> <summary> Append files on a NFS filesystem. @@ -84184,7 +84404,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_append_nfs_files" lineno="3204"> +<interface name="fs_dontaudit_append_nfs_files" lineno="3301"> <summary> dontaudit Append files on a NFS filesystem. @@ -84196,7 +84416,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_rw_nfs_files" lineno="3223"> +<interface name="fs_dontaudit_rw_nfs_files" lineno="3320"> <summary> Do not audit attempts to read or write files on a NFS filesystem. @@ -84207,7 +84427,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_nfs_symlinks" lineno="3241"> +<interface name="fs_read_nfs_symlinks" lineno="3338"> <summary> Read symbolic links on a NFS filesystem. </summary> @@ -84217,7 +84437,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3260"> +<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3357"> <summary> Dontaudit read symbolic links on a NFS filesystem. </summary> @@ -84227,7 +84447,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_nfs_named_sockets" lineno="3278"> +<interface name="fs_read_nfs_named_sockets" lineno="3375"> <summary> Read named sockets on a NFS filesystem. </summary> @@ -84237,7 +84457,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nfs_named_pipes" lineno="3297"> +<interface name="fs_read_nfs_named_pipes" lineno="3394"> <summary> Read named pipes on a NFS network filesystem. </summary> @@ -84248,7 +84468,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_rpc_dirs" lineno="3316"> +<interface name="fs_getattr_rpc_dirs" lineno="3413"> <summary> Get the attributes of directories of RPC file system pipes. @@ -84259,7 +84479,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_rpc" lineno="3335"> +<interface name="fs_search_rpc" lineno="3432"> <summary> Search directories of RPC file system pipes. </summary> @@ -84269,7 +84489,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_removable" lineno="3353"> +<interface name="fs_search_removable" lineno="3450"> <summary> Search removable storage directories. </summary> @@ -84279,7 +84499,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_removable" lineno="3371"> +<interface name="fs_dontaudit_list_removable" lineno="3468"> <summary> Do not audit attempts to list removable storage directories. </summary> @@ -84289,7 +84509,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_read_removable_files" lineno="3389"> +<interface name="fs_read_removable_files" lineno="3486"> <summary> Read removable storage files. </summary> @@ -84299,7 +84519,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_removable_files" lineno="3407"> +<interface name="fs_dontaudit_read_removable_files" lineno="3504"> <summary> Do not audit attempts to read removable storage files. </summary> @@ -84309,7 +84529,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_dontaudit_write_removable_files" lineno="3425"> +<interface name="fs_dontaudit_write_removable_files" lineno="3522"> <summary> Do not audit attempts to write removable storage files. </summary> @@ -84319,7 +84539,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_read_removable_symlinks" lineno="3443"> +<interface name="fs_read_removable_symlinks" lineno="3540"> <summary> Read removable storage symbolic links. </summary> @@ -84329,7 +84549,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_removable_blk_files" lineno="3461"> +<interface name="fs_read_removable_blk_files" lineno="3558"> <summary> Read block nodes on removable filesystems. </summary> @@ -84339,7 +84559,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_removable_blk_files" lineno="3480"> +<interface name="fs_rw_removable_blk_files" lineno="3577"> <summary> Read and write block nodes on removable filesystems. </summary> @@ -84349,7 +84569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_rpc" lineno="3499"> +<interface name="fs_list_rpc" lineno="3596"> <summary> Read directories of RPC file system pipes. </summary> @@ -84359,7 +84579,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_files" lineno="3517"> +<interface name="fs_read_rpc_files" lineno="3614"> <summary> Read files of RPC file system pipes. </summary> @@ -84369,7 +84589,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_symlinks" lineno="3535"> +<interface name="fs_read_rpc_symlinks" lineno="3632"> <summary> Read symbolic links of RPC file system pipes. </summary> @@ -84379,7 +84599,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_sockets" lineno="3553"> +<interface name="fs_read_rpc_sockets" lineno="3650"> <summary> Read sockets of RPC file system pipes. </summary> @@ -84389,7 +84609,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_rpc_sockets" lineno="3571"> +<interface name="fs_rw_rpc_sockets" lineno="3668"> <summary> Read and write sockets of RPC file system pipes. </summary> @@ -84399,7 +84619,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_nfs_dirs" lineno="3591"> +<interface name="fs_manage_nfs_dirs" lineno="3688"> <summary> Create, read, write, and delete directories on a NFS filesystem. @@ -84411,7 +84631,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3611"> +<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3708"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -84423,7 +84643,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_nfs_files" lineno="3631"> +<interface name="fs_manage_nfs_files" lineno="3728"> <summary> Create, read, write, and delete files on a NFS filesystem. @@ -84435,7 +84655,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_nfs_files" lineno="3651"> +<interface name="fs_dontaudit_manage_nfs_files" lineno="3748"> <summary> Do not audit attempts to create, read, write, and delete files @@ -84447,7 +84667,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_nfs_symlinks" lineno="3671"> +<interface name="fs_manage_nfs_symlinks" lineno="3768"> <summary> Create, read, write, and delete symbolic links on a NFS network filesystem. @@ -84459,7 +84679,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_nfs_named_pipes" lineno="3690"> +<interface name="fs_manage_nfs_named_pipes" lineno="3787"> <summary> Create, read, write, and delete named pipes on a NFS filesystem. @@ -84470,7 +84690,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_nfs_named_sockets" lineno="3709"> +<interface name="fs_manage_nfs_named_sockets" lineno="3806"> <summary> Create, read, write, and delete named sockets on a NFS filesystem. @@ -84481,7 +84701,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_nfs_domtrans" lineno="3752"> +<interface name="fs_nfs_domtrans" lineno="3849"> <summary> Execute a file on a NFS filesystem in the specified domain. @@ -84516,7 +84736,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="fs_mount_nfsd_fs" lineno="3771"> +<interface name="fs_mount_nfsd_fs" lineno="3868"> <summary> Mount a NFS server pseudo filesystem. </summary> @@ -84526,7 +84746,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_nfsd_fs" lineno="3790"> +<interface name="fs_remount_nfsd_fs" lineno="3887"> <summary> Mount a NFS server pseudo filesystem. This allows some mount options to be changed. @@ -84537,7 +84757,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_nfsd_fs" lineno="3808"> +<interface name="fs_unmount_nfsd_fs" lineno="3905"> <summary> Unmount a NFS server pseudo filesystem. </summary> @@ -84547,7 +84767,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfsd_fs" lineno="3827"> +<interface name="fs_getattr_nfsd_fs" lineno="3924"> <summary> Get the attributes of a NFS server pseudo filesystem. @@ -84558,7 +84778,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_nfsd_fs" lineno="3845"> +<interface name="fs_search_nfsd_fs" lineno="3942"> <summary> Search NFS server directories. </summary> @@ -84568,7 +84788,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_nfsd_fs" lineno="3863"> +<interface name="fs_list_nfsd_fs" lineno="3960"> <summary> List NFS server directories. </summary> @@ -84578,7 +84798,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_watch_nfsd_dirs" lineno="3881"> +<interface name="fs_watch_nfsd_dirs" lineno="3978"> <summary> Watch NFS server directories. </summary> @@ -84588,7 +84808,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfsd_files" lineno="3899"> +<interface name="fs_getattr_nfsd_files" lineno="3996"> <summary> Getattr files on an nfsd filesystem </summary> @@ -84598,7 +84818,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_nfsd_fs" lineno="3917"> +<interface name="fs_rw_nfsd_fs" lineno="4014"> <summary> Read and write NFS server files. </summary> @@ -84608,7 +84828,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nsfs_files" lineno="3935"> +<interface name="fs_getattr_nsfs_files" lineno="4032"> +<summary> +Get the attributes of nsfs inodes (e.g. /proc/pid/ns/uts) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_nsfs_files" lineno="4050"> <summary> Read nsfs inodes (e.g. /proc/pid/ns/uts) </summary> @@ -84618,7 +84848,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nsfs" lineno="3953"> +<interface name="fs_getattr_nsfs" lineno="4068"> <summary> Get the attributes of an nsfs filesystem. </summary> @@ -84628,7 +84858,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_nsfs" lineno="3971"> +<interface name="fs_unmount_nsfs" lineno="4086"> <summary> Unmount an nsfs filesystem. </summary> @@ -84638,7 +84868,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_pstorefs" lineno="3989"> +<interface name="fs_getattr_pstorefs" lineno="4104"> <summary> Get the attributes of a pstore filesystem. </summary> @@ -84648,7 +84878,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_pstore_dirs" lineno="4008"> +<interface name="fs_getattr_pstore_dirs" lineno="4123"> <summary> Get the attributes of directories of a pstore filesystem. @@ -84659,7 +84889,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_create_pstore_dirs" lineno="4027"> +<interface name="fs_create_pstore_dirs" lineno="4142"> <summary> Create pstore directories. </summary> @@ -84669,7 +84899,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_pstore_dirs" lineno="4046"> +<interface name="fs_relabel_pstore_dirs" lineno="4161"> <summary> Relabel to/from pstore_t directories. </summary> @@ -84679,7 +84909,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_pstore_dirs" lineno="4065"> +<interface name="fs_list_pstore_dirs" lineno="4180"> <summary> List the directories of a pstore filesystem. @@ -84690,7 +84920,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_pstore_files" lineno="4084"> +<interface name="fs_read_pstore_files" lineno="4199"> <summary> Read pstore_t files </summary> @@ -84700,7 +84930,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_delete_pstore_files" lineno="4103"> +<interface name="fs_delete_pstore_files" lineno="4218"> <summary> Delete the files of a pstore filesystem. @@ -84711,7 +84941,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_associate_ramfs" lineno="4122"> +<interface name="fs_associate_ramfs" lineno="4237"> <summary> Allow the type to associate to ramfs filesystems. </summary> @@ -84721,7 +84951,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_mount_ramfs" lineno="4140"> +<interface name="fs_mount_ramfs" lineno="4255"> <summary> Mount a RAM filesystem. </summary> @@ -84731,7 +84961,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_ramfs" lineno="4159"> +<interface name="fs_remount_ramfs" lineno="4274"> <summary> Remount a RAM filesystem. This allows some mount options to be changed. @@ -84742,7 +84972,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_ramfs" lineno="4177"> +<interface name="fs_unmount_ramfs" lineno="4292"> <summary> Unmount a RAM filesystem. </summary> @@ -84752,7 +84982,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_ramfs" lineno="4195"> +<interface name="fs_getattr_ramfs" lineno="4310"> <summary> Get the attributes of a RAM filesystem. </summary> @@ -84762,7 +84992,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_ramfs" lineno="4213"> +<interface name="fs_search_ramfs" lineno="4328"> <summary> Search directories on a ramfs </summary> @@ -84772,7 +85002,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_search_ramfs" lineno="4231"> +<interface name="fs_dontaudit_search_ramfs" lineno="4346"> <summary> Dontaudit Search directories on a ramfs </summary> @@ -84782,7 +85012,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_ramfs_dirs" lineno="4250"> +<interface name="fs_manage_ramfs_dirs" lineno="4365"> <summary> Create, read, write, and delete directories on a ramfs. @@ -84793,7 +85023,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_ramfs_files" lineno="4268"> +<interface name="fs_dontaudit_read_ramfs_files" lineno="4383"> <summary> Dontaudit read on a ramfs files. </summary> @@ -84803,7 +85033,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4286"> +<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4401"> <summary> Dontaudit read on a ramfs fifo_files. </summary> @@ -84813,7 +85043,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_ramfs_files" lineno="4305"> +<interface name="fs_manage_ramfs_files" lineno="4420"> <summary> Create, read, write, and delete files on a ramfs filesystem. @@ -84824,7 +85054,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_ramfs_pipes" lineno="4323"> +<interface name="fs_write_ramfs_pipes" lineno="4438"> <summary> Write to named pipe on a ramfs filesystem. </summary> @@ -84834,7 +85064,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4342"> +<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4457"> <summary> Do not audit attempts to write to named pipes on a ramfs filesystem. @@ -84845,7 +85075,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_rw_ramfs_pipes" lineno="4360"> +<interface name="fs_rw_ramfs_pipes" lineno="4475"> <summary> Read and write a named pipe on a ramfs filesystem. </summary> @@ -84855,7 +85085,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_ramfs_pipes" lineno="4379"> +<interface name="fs_manage_ramfs_pipes" lineno="4494"> <summary> Create, read, write, and delete named pipes on a ramfs filesystem. @@ -84866,7 +85096,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_ramfs_sockets" lineno="4397"> +<interface name="fs_write_ramfs_sockets" lineno="4512"> <summary> Write to named socket on a ramfs filesystem. </summary> @@ -84876,7 +85106,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_ramfs_sockets" lineno="4416"> +<interface name="fs_manage_ramfs_sockets" lineno="4531"> <summary> Create, read, write, and delete named sockets on a ramfs filesystem. @@ -84887,7 +85117,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_romfs" lineno="4434"> +<interface name="fs_mount_romfs" lineno="4549"> <summary> Mount a ROM filesystem. </summary> @@ -84897,7 +85127,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_romfs" lineno="4453"> +<interface name="fs_remount_romfs" lineno="4568"> <summary> Remount a ROM filesystem. This allows some mount options to be changed. @@ -84908,7 +85138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_romfs" lineno="4471"> +<interface name="fs_unmount_romfs" lineno="4586"> <summary> Unmount a ROM filesystem. </summary> @@ -84918,7 +85148,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_romfs" lineno="4490"> +<interface name="fs_getattr_romfs" lineno="4605"> <summary> Get the attributes of a ROM filesystem. @@ -84929,7 +85159,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_rpc_pipefs" lineno="4508"> +<interface name="fs_mount_rpc_pipefs" lineno="4623"> <summary> Mount a RPC pipe filesystem. </summary> @@ -84939,7 +85169,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_rpc_pipefs" lineno="4527"> +<interface name="fs_remount_rpc_pipefs" lineno="4642"> <summary> Remount a RPC pipe filesystem. This allows some mount option to be changed. @@ -84950,7 +85180,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_rpc_pipefs" lineno="4545"> +<interface name="fs_unmount_rpc_pipefs" lineno="4660"> <summary> Unmount a RPC pipe filesystem. </summary> @@ -84960,7 +85190,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_rpc_pipefs" lineno="4564"> +<interface name="fs_getattr_rpc_pipefs" lineno="4679"> <summary> Get the attributes of a RPC pipe filesystem. @@ -84971,7 +85201,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_rpc_named_pipes" lineno="4582"> +<interface name="fs_rw_rpc_named_pipes" lineno="4697"> <summary> Read and write RPC pipe filesystem named pipes. </summary> @@ -84981,7 +85211,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_tmpfs" lineno="4600"> +<interface name="fs_mount_tmpfs" lineno="4715"> <summary> Mount a tmpfs filesystem. </summary> @@ -84991,7 +85221,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_tmpfs" lineno="4618"> +<interface name="fs_remount_tmpfs" lineno="4733"> <summary> Remount a tmpfs filesystem. </summary> @@ -85001,7 +85231,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_tmpfs" lineno="4636"> +<interface name="fs_unmount_tmpfs" lineno="4751"> <summary> Unmount a tmpfs filesystem. </summary> @@ -85011,7 +85241,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs" lineno="4654"> +<interface name="fs_dontaudit_getattr_tmpfs" lineno="4769"> <summary> Do not audit getting the attributes of a tmpfs filesystem </summary> @@ -85021,7 +85251,7 @@ Domain to not audit </summary> </param> </interface> -<interface name="fs_getattr_tmpfs" lineno="4674"> +<interface name="fs_getattr_tmpfs" lineno="4789"> <summary> Get the attributes of a tmpfs filesystem. @@ -85033,7 +85263,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_associate_tmpfs" lineno="4692"> +<interface name="fs_associate_tmpfs" lineno="4807"> <summary> Allow the type to associate to tmpfs filesystems. </summary> @@ -85043,7 +85273,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs" lineno="4710"> +<interface name="fs_relabelfrom_tmpfs" lineno="4825"> <summary> Relabel from tmpfs filesystem. </summary> @@ -85053,7 +85283,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tmpfs_dirs" lineno="4728"> +<interface name="fs_getattr_tmpfs_dirs" lineno="4843"> <summary> Get the attributes of tmpfs directories. </summary> @@ -85063,7 +85293,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4747"> +<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4862"> <summary> Do not audit attempts to get the attributes of tmpfs directories. @@ -85074,7 +85304,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mounton_tmpfs" lineno="4765"> +<interface name="fs_mounton_tmpfs" lineno="4880"> <summary> Mount on tmpfs directories. </summary> @@ -85084,7 +85314,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_tmpfs_files" lineno="4783"> +<interface name="fs_mounton_tmpfs_files" lineno="4898"> <summary> Mount on tmpfs files. </summary> @@ -85094,7 +85324,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_setattr_tmpfs_dirs" lineno="4801"> +<interface name="fs_setattr_tmpfs_dirs" lineno="4916"> <summary> Set the attributes of tmpfs directories. </summary> @@ -85104,7 +85334,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_tmpfs" lineno="4819"> +<interface name="fs_search_tmpfs" lineno="4934"> <summary> Search tmpfs directories. </summary> @@ -85114,7 +85344,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_tmpfs" lineno="4837"> +<interface name="fs_list_tmpfs" lineno="4952"> <summary> List the contents of generic tmpfs directories. </summary> @@ -85124,7 +85354,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_tmpfs" lineno="4856"> +<interface name="fs_dontaudit_list_tmpfs" lineno="4971"> <summary> Do not audit attempts to list the contents of generic tmpfs directories. @@ -85135,7 +85365,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_dirs" lineno="4875"> +<interface name="fs_manage_tmpfs_dirs" lineno="4990"> <summary> Create, read, write, and delete tmpfs directories @@ -85146,7 +85376,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4894"> +<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5009"> <summary> Do not audit attempts to write tmpfs directories @@ -85157,7 +85387,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4912"> +<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5027"> <summary> Relabel from tmpfs_t dir </summary> @@ -85167,7 +85397,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_dirs" lineno="4930"> +<interface name="fs_relabel_tmpfs_dirs" lineno="5045"> <summary> Relabel directory on tmpfs filesystems. </summary> @@ -85177,7 +85407,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_tmpfs_filetrans" lineno="4963"> +<interface name="fs_tmpfs_filetrans" lineno="5078"> <summary> Create an object in a tmpfs filesystem, with a private type using a type transition. @@ -85203,7 +85433,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4983"> +<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5098"> <summary> Do not audit attempts to getattr generic tmpfs files. @@ -85214,7 +85444,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5002"> +<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5117"> <summary> Do not audit attempts to read or write generic tmpfs files. @@ -85225,7 +85455,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_delete_tmpfs_symlinks" lineno="5020"> +<interface name="fs_delete_tmpfs_symlinks" lineno="5135"> <summary> Delete tmpfs symbolic links. </summary> @@ -85235,7 +85465,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_auto_mountpoints" lineno="5039"> +<interface name="fs_manage_auto_mountpoints" lineno="5154"> <summary> Create, read, write, and delete auto moutpoints. @@ -85246,7 +85476,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_tmpfs_files" lineno="5057"> +<interface name="fs_read_tmpfs_files" lineno="5172"> <summary> Read generic tmpfs files. </summary> @@ -85256,7 +85486,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_files" lineno="5075"> +<interface name="fs_rw_tmpfs_files" lineno="5190"> <summary> Read and write generic tmpfs files. </summary> @@ -85266,7 +85496,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_files" lineno="5093"> +<interface name="fs_relabel_tmpfs_files" lineno="5208"> <summary> Relabel files on tmpfs filesystems. </summary> @@ -85276,7 +85506,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_tmpfs_symlinks" lineno="5111"> +<interface name="fs_read_tmpfs_symlinks" lineno="5226"> <summary> Read tmpfs link files. </summary> @@ -85286,7 +85516,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5129"> +<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5244"> <summary> Relabelfrom socket files on tmpfs filesystems. </summary> @@ -85296,7 +85526,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5147"> +<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5262"> <summary> Relabelfrom tmpfs link files. </summary> @@ -85306,7 +85536,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_chr_files" lineno="5165"> +<interface name="fs_rw_tmpfs_chr_files" lineno="5280"> <summary> Read and write character nodes on tmpfs filesystems. </summary> @@ -85316,7 +85546,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5184"> +<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5299"> <summary> dontaudit Read and write character nodes on tmpfs filesystems. </summary> @@ -85326,7 +85556,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_chr_files" lineno="5203"> +<interface name="fs_relabel_tmpfs_chr_files" lineno="5318"> <summary> Relabel character nodes on tmpfs filesystems. </summary> @@ -85336,7 +85566,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_chr_file" lineno="5222"> +<interface name="fs_relabel_tmpfs_chr_file" lineno="5337"> <summary> Relabel character nodes on tmpfs filesystems. </summary> @@ -85346,7 +85576,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_blk_files" lineno="5237"> +<interface name="fs_rw_tmpfs_blk_files" lineno="5352"> <summary> Read and write block nodes on tmpfs filesystems. </summary> @@ -85356,7 +85586,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_blk_files" lineno="5256"> +<interface name="fs_relabel_tmpfs_blk_files" lineno="5371"> <summary> Relabel block nodes on tmpfs filesystems. </summary> @@ -85366,7 +85596,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_blk_file" lineno="5275"> +<interface name="fs_relabel_tmpfs_blk_file" lineno="5390"> <summary> Relabel block nodes on tmpfs filesystems. </summary> @@ -85376,7 +85606,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_fifo_files" lineno="5290"> +<interface name="fs_relabel_tmpfs_fifo_files" lineno="5405"> <summary> Relabel named pipes on tmpfs filesystems. </summary> @@ -85386,7 +85616,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_files" lineno="5310"> +<interface name="fs_manage_tmpfs_files" lineno="5425"> <summary> Read and write, create and delete generic files on tmpfs filesystems. @@ -85397,7 +85627,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_symlinks" lineno="5329"> +<interface name="fs_manage_tmpfs_symlinks" lineno="5444"> <summary> Read and write, create and delete symbolic links on tmpfs filesystems. @@ -85408,7 +85638,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_sockets" lineno="5348"> +<interface name="fs_manage_tmpfs_sockets" lineno="5463"> <summary> Read and write, create and delete socket files on tmpfs filesystems. @@ -85419,7 +85649,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_chr_files" lineno="5367"> +<interface name="fs_manage_tmpfs_chr_files" lineno="5482"> <summary> Read and write, create and delete character nodes on tmpfs filesystems. @@ -85430,7 +85660,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_blk_files" lineno="5386"> +<interface name="fs_manage_tmpfs_blk_files" lineno="5501"> <summary> Read and write, create and delete block nodes on tmpfs filesystems. @@ -85441,7 +85671,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs" lineno="5404"> +<interface name="fs_getattr_tracefs" lineno="5519"> <summary> Get the attributes of a trace filesystem. </summary> @@ -85451,7 +85681,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs_dirs" lineno="5422"> +<interface name="fs_getattr_tracefs_dirs" lineno="5537"> <summary> Get attributes of dirs on tracefs filesystem. </summary> @@ -85461,7 +85691,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_tracefs" lineno="5440"> +<interface name="fs_search_tracefs" lineno="5555"> <summary> search directories on a tracefs filesystem </summary> @@ -85471,7 +85701,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs_files" lineno="5459"> +<interface name="fs_getattr_tracefs_files" lineno="5574"> <summary> Get the attributes of files on a trace filesystem. @@ -85482,7 +85712,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_xenfs" lineno="5477"> +<interface name="fs_mount_xenfs" lineno="5592"> <summary> Mount a XENFS filesystem. </summary> @@ -85492,7 +85722,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_xenfs" lineno="5495"> +<interface name="fs_search_xenfs" lineno="5610"> <summary> Search the XENFS filesystem. </summary> @@ -85502,7 +85732,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_xenfs_dirs" lineno="5515"> +<interface name="fs_manage_xenfs_dirs" lineno="5630"> <summary> Create, read, write, and delete directories on a XENFS filesystem. @@ -85514,7 +85744,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5535"> +<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5650"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -85526,7 +85756,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_xenfs_files" lineno="5555"> +<interface name="fs_manage_xenfs_files" lineno="5670"> <summary> Create, read, write, and delete files on a XENFS filesystem. @@ -85538,7 +85768,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_mmap_xenfs_files" lineno="5573"> +<interface name="fs_mmap_xenfs_files" lineno="5688"> <summary> Map files a XENFS filesystem. </summary> @@ -85548,7 +85778,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_manage_xenfs_files" lineno="5593"> +<interface name="fs_dontaudit_manage_xenfs_files" lineno="5708"> <summary> Do not audit attempts to create, read, write, and delete files @@ -85560,7 +85790,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mount_all_fs" lineno="5611"> +<interface name="fs_mount_all_fs" lineno="5726"> <summary> Mount all filesystems. </summary> @@ -85570,7 +85800,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_all_fs" lineno="5630"> +<interface name="fs_remount_all_fs" lineno="5745"> <summary> Remount all filesystems. This allows some mount options to be changed. @@ -85581,7 +85811,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_all_fs" lineno="5648"> +<interface name="fs_unmount_all_fs" lineno="5763"> <summary> Unmount all filesystems. </summary> @@ -85591,7 +85821,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_fs" lineno="5680"> +<interface name="fs_getattr_all_fs" lineno="5795"> <summary> Get the attributes of all filesystems. </summary> @@ -85615,7 +85845,7 @@ Domain allowed access. <infoflow type="read" weight="5"/> <rolecap/> </interface> -<interface name="fs_dontaudit_getattr_all_fs" lineno="5700"> +<interface name="fs_dontaudit_getattr_all_fs" lineno="5815"> <summary> Do not audit attempts to get the attributes all filesystems. @@ -85626,7 +85856,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_get_all_fs_quotas" lineno="5719"> +<interface name="fs_get_all_fs_quotas" lineno="5834"> <summary> Get the quotas of all filesystems. </summary> @@ -85637,7 +85867,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_set_all_quotas" lineno="5738"> +<interface name="fs_set_all_quotas" lineno="5853"> <summary> Set the quotas of all filesystems. </summary> @@ -85648,7 +85878,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_relabelfrom_all_fs" lineno="5756"> +<interface name="fs_relabelfrom_all_fs" lineno="5871"> <summary> Relabelfrom all filesystems. </summary> @@ -85658,7 +85888,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_dirs" lineno="5775"> +<interface name="fs_getattr_all_dirs" lineno="5890"> <summary> Get the attributes of all directories with a filesystem type. @@ -85669,7 +85899,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_all" lineno="5793"> +<interface name="fs_search_all" lineno="5908"> <summary> Search all directories with a filesystem type. </summary> @@ -85679,7 +85909,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_all" lineno="5811"> +<interface name="fs_list_all" lineno="5926"> <summary> List all directories with a filesystem type. </summary> @@ -85689,7 +85919,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_files" lineno="5830"> +<interface name="fs_getattr_all_files" lineno="5945"> <summary> Get the attributes of all files with a filesystem type. @@ -85700,7 +85930,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_files" lineno="5849"> +<interface name="fs_dontaudit_getattr_all_files" lineno="5964"> <summary> Do not audit attempts to get the attributes of all files with a filesystem type. @@ -85711,7 +85941,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_symlinks" lineno="5868"> +<interface name="fs_getattr_all_symlinks" lineno="5983"> <summary> Get the attributes of all symbolic links with a filesystem type. @@ -85722,7 +85952,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5887"> +<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6002"> <summary> Do not audit attempts to get the attributes of all symbolic links with a filesystem type. @@ -85733,7 +85963,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_pipes" lineno="5906"> +<interface name="fs_getattr_all_pipes" lineno="6021"> <summary> Get the attributes of all named pipes with a filesystem type. @@ -85744,7 +85974,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_pipes" lineno="5925"> +<interface name="fs_dontaudit_getattr_all_pipes" lineno="6040"> <summary> Do not audit attempts to get the attributes of all named pipes with a filesystem type. @@ -85755,7 +85985,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_sockets" lineno="5944"> +<interface name="fs_getattr_all_sockets" lineno="6059"> <summary> Get the attributes of all named sockets with a filesystem type. @@ -85766,7 +85996,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_sockets" lineno="5963"> +<interface name="fs_dontaudit_getattr_all_sockets" lineno="6078"> <summary> Do not audit attempts to get the attributes of all named sockets with a filesystem type. @@ -85777,7 +86007,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_blk_files" lineno="5982"> +<interface name="fs_getattr_all_blk_files" lineno="6097"> <summary> Get the attributes of all block device nodes with a filesystem type. @@ -85788,7 +86018,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_chr_files" lineno="6001"> +<interface name="fs_getattr_all_chr_files" lineno="6116"> <summary> Get the attributes of all character device nodes with a filesystem type. @@ -85799,7 +86029,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unconfined" lineno="6019"> +<interface name="fs_unconfined" lineno="6134"> <summary> Unconfined access to filesystems </summary> @@ -90282,7 +90512,27 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_getattr_all_ttys" lineno="1298"> +<interface name="term_watch_unallocated_ttys" lineno="1297"> +<summary> +Watch unallocated ttys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_watch_reads_unallocated_ttys" lineno="1316"> +<summary> +Watch reads on unallocated ttys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_getattr_all_ttys" lineno="1336"> <summary> Get the attributes of all tty device nodes. </summary> @@ -90293,7 +90543,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_dontaudit_getattr_all_ttys" lineno="1318"> +<interface name="term_dontaudit_getattr_all_ttys" lineno="1356"> <summary> Do not audit attempts to get the attributes of any tty device nodes. @@ -90304,7 +90554,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_setattr_all_ttys" lineno="1338"> +<interface name="term_setattr_all_ttys" lineno="1376"> <summary> Set the attributes of all tty device nodes. </summary> @@ -90315,7 +90565,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_relabel_all_ttys" lineno="1357"> +<interface name="term_relabel_all_ttys" lineno="1395"> <summary> Relabel from and to all tty device nodes. </summary> @@ -90325,7 +90575,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_write_all_ttys" lineno="1376"> +<interface name="term_write_all_ttys" lineno="1414"> <summary> Write to all ttys. </summary> @@ -90335,7 +90585,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="term_use_all_ttys" lineno="1396"> +<interface name="term_use_all_ttys" lineno="1434"> <summary> Read and write all ttys. </summary> @@ -90346,7 +90596,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="term_dontaudit_use_all_ttys" lineno="1416"> +<interface name="term_dontaudit_use_all_ttys" lineno="1454"> <summary> Do not audit attempts to read or write any ttys. @@ -90357,7 +90607,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="term_use_virtio_console" lineno="1434"> +<interface name="term_use_virtio_console" lineno="1472"> <summary> Read from and write virtio console. </summary> @@ -91756,7 +92006,17 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apache_initrc_domtrans" lineno="249"> +<interface name="apache_exec" lineno="249"> +<summary> +Execute httpd +</summary> +<param name="domain"> +<summary> +Domain allowed to execute it. +</summary> +</param> +</interface> +<interface name="apache_initrc_domtrans" lineno="267"> <summary> Execute httpd server in the httpd domain. </summary> @@ -91766,7 +92026,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apache_signal" lineno="267"> +<interface name="apache_signal" lineno="285"> <summary> Send generic signals to httpd. </summary> @@ -91776,7 +92036,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_signull" lineno="285"> +<interface name="apache_signull" lineno="303"> <summary> Send null signals to httpd. </summary> @@ -91786,7 +92046,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_sigchld" lineno="303"> +<interface name="apache_sigchld" lineno="321"> <summary> Send child terminated signals to httpd. </summary> @@ -91796,7 +92056,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_use_fds" lineno="322"> +<interface name="apache_use_fds" lineno="340"> <summary> Inherit and use file descriptors from httpd. @@ -91807,7 +92067,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_dontaudit_rw_fifo_file" lineno="341"> +<interface name="apache_dontaudit_rw_fifo_file" lineno="359"> <summary> Do not audit attempts to read and write httpd unnamed pipes. @@ -91818,7 +92078,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_dontaudit_rw_stream_sockets" lineno="360"> +<interface name="apache_dontaudit_rw_stream_sockets" lineno="378"> <summary> Do not audit attempts to read and write httpd unix domain stream sockets. @@ -91829,7 +92089,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_rw_stream_sockets" lineno="379"> +<interface name="apache_rw_stream_sockets" lineno="397"> <summary> Read and write httpd unix domain stream sockets. @@ -91840,7 +92100,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_dontaudit_rw_tcp_sockets" lineno="398"> +<interface name="apache_dontaudit_rw_tcp_sockets" lineno="416"> <summary> Do not audit attempts to read and write httpd TCP sockets. @@ -91851,7 +92111,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_reload" lineno="416"> +<interface name="apache_reload" lineno="434"> <summary> Reload the httpd service (systemd). </summary> @@ -91861,7 +92121,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_all_ra_content" lineno="435"> +<interface name="apache_read_all_ra_content" lineno="453"> <summary> Read all appendable content </summary> @@ -91871,7 +92131,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_append_all_ra_content" lineno="454"> +<interface name="apache_append_all_ra_content" lineno="472"> <summary> Append to all appendable web content </summary> @@ -91881,7 +92141,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_all_rw_content" lineno="472"> +<interface name="apache_read_all_rw_content" lineno="490"> <summary> Read all read/write content </summary> @@ -91891,7 +92151,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_manage_all_rw_content" lineno="491"> +<interface name="apache_manage_all_rw_content" lineno="509"> <summary> Manage all read/write content </summary> @@ -91901,7 +92161,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_all_content" lineno="510"> +<interface name="apache_read_all_content" lineno="528"> <summary> Read all web content. </summary> @@ -91911,7 +92171,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_search_all_content" lineno="532"> +<interface name="apache_search_all_content" lineno="550"> <summary> Search all apache content. </summary> @@ -91921,7 +92181,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_list_all_content" lineno="550"> +<interface name="apache_list_all_content" lineno="568"> <summary> List all apache content. </summary> @@ -91931,7 +92191,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_manage_all_content" lineno="570"> +<interface name="apache_manage_all_content" lineno="588"> <summary> Create, read, write, and delete all httpd content. @@ -91943,7 +92203,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="apache_setattr_cache_dirs" lineno="594"> +<interface name="apache_setattr_cache_dirs" lineno="612"> <summary> Set attributes httpd cache directories. </summary> @@ -91953,7 +92213,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_list_cache" lineno="612"> +<interface name="apache_list_cache" lineno="630"> <summary> List httpd cache directories. </summary> @@ -91963,7 +92223,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_rw_cache_files" lineno="630"> +<interface name="apache_rw_cache_files" lineno="648"> <summary> Read and write httpd cache files. </summary> @@ -91973,7 +92233,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_delete_cache_dirs" lineno="648"> +<interface name="apache_delete_cache_dirs" lineno="666"> <summary> Delete httpd cache directories. </summary> @@ -91983,7 +92243,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_delete_cache_files" lineno="666"> +<interface name="apache_delete_cache_files" lineno="684"> <summary> Delete httpd cache files. </summary> @@ -91993,7 +92253,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_config" lineno="685"> +<interface name="apache_read_config" lineno="703"> <summary> Read httpd configuration files. </summary> @@ -92004,7 +92264,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="apache_search_config" lineno="706"> +<interface name="apache_search_config" lineno="724"> <summary> Search httpd configuration directories. </summary> @@ -92014,7 +92274,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_manage_config" lineno="726"> +<interface name="apache_manage_config" lineno="744"> <summary> Create, read, write, and delete httpd configuration files. @@ -92025,7 +92285,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_domtrans_helper" lineno="748"> +<interface name="apache_domtrans_helper" lineno="766"> <summary> Execute the Apache helper program with a domain transition. @@ -92036,7 +92296,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_run_helper" lineno="775"> +<interface name="apache_run_helper" lineno="793"> <summary> Execute the Apache helper program with a domain transition, and allow the @@ -92054,7 +92314,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="apache_read_log" lineno="795"> +<interface name="apache_read_log" lineno="813"> <summary> Read httpd log files. </summary> @@ -92065,7 +92325,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="apache_append_log" lineno="816"> +<interface name="apache_append_log" lineno="834"> <summary> Append httpd log files. </summary> @@ -92075,7 +92335,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_dontaudit_append_log" lineno="837"> +<interface name="apache_dontaudit_append_log" lineno="855"> <summary> Do not audit attempts to append httpd log files. @@ -92086,7 +92346,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_manage_log" lineno="856"> +<interface name="apache_manage_log" lineno="874"> <summary> Create, read, write, and delete httpd log files. @@ -92097,7 +92357,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_write_log" lineno="877"> +<interface name="apache_write_log" lineno="895"> <summary> Write apache log files. </summary> @@ -92107,7 +92367,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_dontaudit_search_modules" lineno="897"> +<interface name="apache_dontaudit_search_modules" lineno="915"> <summary> Do not audit attempts to search httpd module directories. @@ -92118,7 +92378,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_list_modules" lineno="915"> +<interface name="apache_list_modules" lineno="933"> <summary> List httpd module directories. </summary> @@ -92128,7 +92388,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_exec_modules" lineno="933"> +<interface name="apache_exec_modules" lineno="951"> <summary> Execute httpd module files. </summary> @@ -92138,7 +92398,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_module_files" lineno="953"> +<interface name="apache_read_module_files" lineno="971"> <summary> Read httpd module files. </summary> @@ -92148,7 +92408,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_domtrans_rotatelogs" lineno="973"> +<interface name="apache_domtrans_rotatelogs" lineno="991"> <summary> Execute a domain transition to run httpd_rotatelogs. @@ -92159,7 +92419,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apache_list_sys_content" lineno="992"> +<interface name="apache_list_sys_content" lineno="1010"> <summary> List httpd system content directories. </summary> @@ -92169,7 +92429,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_manage_sys_content" lineno="1013"> +<interface name="apache_manage_sys_content" lineno="1031"> <summary> Create, read, write, and delete httpd system content files. @@ -92181,7 +92441,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="apache_manage_sys_rw_content" lineno="1035"> +<interface name="apache_manage_sys_rw_content" lineno="1053"> <summary> Create, read, write, and delete httpd system rw content. @@ -92192,7 +92452,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_domtrans_sys_script" lineno="1057"> +<interface name="apache_domtrans_sys_script" lineno="1075"> <summary> Execute all httpd scripts in the system script domain. @@ -92203,7 +92463,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1080"> +<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1098"> <summary> Do not audit attempts to read and write httpd system script unix @@ -92215,7 +92475,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_domtrans_all_scripts" lineno="1099"> +<interface name="apache_domtrans_all_scripts" lineno="1117"> <summary> Execute all user scripts in the user script domain. @@ -92226,7 +92486,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apache_run_all_scripts" lineno="1124"> +<interface name="apache_run_all_scripts" lineno="1142"> <summary> Execute all user scripts in the user script domain. Add user script domains @@ -92243,7 +92503,7 @@ Role allowed access. </summary> </param> </interface> -<interface name="apache_read_squirrelmail_data" lineno="1143"> +<interface name="apache_read_squirrelmail_data" lineno="1161"> <summary> Read httpd squirrelmail data files. </summary> @@ -92253,7 +92513,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_append_squirrelmail_data" lineno="1161"> +<interface name="apache_append_squirrelmail_data" lineno="1179"> <summary> Append httpd squirrelmail data files. </summary> @@ -92263,7 +92523,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_delete_squirrelmail_spool" lineno="1179"> +<interface name="apache_delete_squirrelmail_spool" lineno="1197"> <summary> delete httpd squirrelmail spool files. </summary> @@ -92273,7 +92533,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_search_sys_content" lineno="1197"> +<interface name="apache_search_sys_content" lineno="1215"> <summary> Search httpd system content. </summary> @@ -92283,7 +92543,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_sys_content" lineno="1216"> +<interface name="apache_read_sys_content" lineno="1234"> <summary> Read httpd system content. </summary> @@ -92293,7 +92553,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_search_sys_scripts" lineno="1236"> +<interface name="apache_search_sys_scripts" lineno="1254"> <summary> Search httpd system CGI directories. </summary> @@ -92303,7 +92563,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_manage_all_user_content" lineno="1256"> +<interface name="apache_manage_all_user_content" lineno="1274"> <summary> Create, read, write, and delete all user httpd content. @@ -92315,7 +92575,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="apache_search_sys_script_state" lineno="1277"> +<interface name="apache_search_sys_script_state" lineno="1295"> <summary> Search system script state directories. </summary> @@ -92325,7 +92585,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_read_tmp_files" lineno="1295"> +<interface name="apache_read_tmp_files" lineno="1313"> <summary> Read httpd tmp files. </summary> @@ -92335,7 +92595,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apache_dontaudit_write_tmp_files" lineno="1315"> +<interface name="apache_dontaudit_write_tmp_files" lineno="1333"> <summary> Do not audit attempts to write httpd tmp files. @@ -92346,7 +92606,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="apache_delete_lib_files" lineno="1333"> +<interface name="apache_delete_lib_files" lineno="1351"> <summary> Delete httpd_var_lib_t files </summary> @@ -92356,7 +92616,7 @@ Domain that can delete the files </summary> </param> </interface> -<interface name="apache_cgi_domain" lineno="1364"> +<interface name="apache_cgi_domain" lineno="1382"> <summary> Execute CGI in the specified domain. </summary> @@ -92378,7 +92638,7 @@ Type of the executable to enter the cgi domain. </summary> </param> </interface> -<interface name="apache_admin" lineno="1392"> +<interface name="apache_admin" lineno="1410"> <summary> All of the rules required to administrate an apache environment. @@ -92395,6 +92655,16 @@ Role allowed access. </param> <rolecap/> </interface> +<interface name="apache_rw_runtime_files" lineno="1462"> +<summary> +rw httpd_runtime_t files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> <tunable name="allow_httpd_anon_write" dftval="false"> <desc> <p> @@ -94992,7 +95262,7 @@ Role allowed access. </summary> </param> </template> -<template name="container_system_role" lineno="187"> +<template name="container_system_role" lineno="175"> <summary> Role access for system containers. </summary> @@ -95018,7 +95288,7 @@ Role allowed access. </summary> </param> </template> -<template name="container_user_role" lineno="229"> +<template name="container_user_role" lineno="217"> <summary> Role access for user containers. </summary> @@ -95044,7 +95314,33 @@ Role allowed access. </summary> </param> </template> -<interface name="container_domtrans_generic_engine" lineno="307"> +<template name="container_unconfined_role" lineno="280"> +<summary> +Unconfined role access for containers. +</summary> +<param name="role_prefix"> +<summary> +The prefix of the user role (e.g., user +is the prefix for user_r). +</summary> +</param> +<param name="user_domain"> +<summary> +User domain for the role. +</summary> +</param> +<param name="user_exec_domain"> +<summary> +User exec domain for execute and transition access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</template> +<interface name="container_domtrans_generic_engine" lineno="319"> <summary> Execute generic container engines in the container engine domain. @@ -95055,7 +95351,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="container_run_generic_engine" lineno="333"> +<interface name="container_run_generic_engine" lineno="345"> <summary> Execute generic container engines in the container engine domain, and allow the @@ -95072,7 +95368,7 @@ The role to be allowed the container domain. </summary> </param> </interface> -<interface name="container_engine_executable_file" lineno="353"> +<interface name="container_engine_executable_file" lineno="365"> <summary> Make the specified type usable for files that are executables for container engines. @@ -95083,7 +95379,7 @@ Type to be used for files. </summary> </param> </interface> -<interface name="container_generic_engine_domtrans" lineno="380"> +<interface name="container_generic_engine_domtrans" lineno="392"> <summary> Execute a generic container engine executable with an automatic transition @@ -95100,7 +95396,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="container_engine_executable_entrypoint" lineno="401"> +<interface name="container_engine_executable_entrypoint" lineno="413"> <summary> Allow the generic container engine executables to be an entrypoint @@ -95112,7 +95408,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_engine_dbus_chat" lineno="420"> +<interface name="container_engine_dbus_chat" lineno="432"> <summary> Send and receive messages from container engines over dbus. @@ -95123,7 +95419,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_runtime_named_socket_activation" lineno="443"> +<interface name="container_runtime_named_socket_activation" lineno="455"> <summary> Allow the specified domain to be started by systemd socket activation using a @@ -95136,7 +95432,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_engine_tmp_files" lineno="462"> +<interface name="container_manage_engine_tmp_files" lineno="474"> <summary> Allow the specified domain to manage container engine temporary files. @@ -95147,7 +95443,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_engine_tmp_sock_files" lineno="482"> +<interface name="container_manage_engine_tmp_sock_files" lineno="494"> <summary> Allow the specified domain to manage container engine temporary named sockets. @@ -95158,7 +95454,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_engine_tmp_filetrans" lineno="514"> +<interface name="container_engine_tmp_filetrans" lineno="526"> <summary> Allow the specified domain to create objects in generic temporary directories @@ -95181,7 +95477,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_read_system_container_state" lineno="533"> +<interface name="container_read_system_container_state" lineno="545"> <summary> Read the process state (/proc/pid) of all system containers. @@ -95192,7 +95488,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_read_user_container_state" lineno="552"> +<interface name="container_read_user_container_state" lineno="564"> <summary> Read the process state (/proc/pid) of all user containers. @@ -95203,7 +95499,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_all_containers" lineno="572"> +<interface name="container_manage_all_containers" lineno="584"> <summary> All of the permissions necessary for a container engine to manage @@ -95215,7 +95511,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_domtrans" lineno="592"> +<interface name="container_domtrans" lineno="604"> <summary> Allow the specified domain to perform a type transition to @@ -95227,7 +95523,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="container_stream_connect_system_containers" lineno="611"> +<interface name="container_stream_connect_system_containers" lineno="623"> <summary> Connect to a system container domain over a unix stream socket. @@ -95238,7 +95534,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_stream_connect_user_containers" lineno="633"> +<interface name="container_stream_connect_user_containers" lineno="645"> <summary> Connect to a user container domain over a unix stream socket. @@ -95249,7 +95545,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_stream_connect_all_containers" lineno="655"> +<interface name="container_stream_connect_all_containers" lineno="667"> <summary> Connect to a container domain over a unix stream socket. @@ -95260,7 +95556,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_signal_all_containers" lineno="678"> +<interface name="container_signal_all_containers" lineno="690"> <summary> Allow the specified domain to send all signals to a container @@ -95272,7 +95568,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="container_setattr_container_ptys" lineno="696"> +<interface name="container_setattr_container_ptys" lineno="708"> <summary> Set the attributes of container ptys. </summary> @@ -95282,7 +95578,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_use_container_ptys" lineno="714"> +<interface name="container_use_container_ptys" lineno="726"> <summary> Read and write container ptys. </summary> @@ -95292,7 +95588,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_mountpoint" lineno="733"> +<interface name="container_mountpoint" lineno="745"> <summary> Make the specified type usable as a mountpoint for containers. @@ -95303,7 +95599,29 @@ Type to be used as a mountpoint. </summary> </param> </interface> -<interface name="container_manage_config_files" lineno="752"> +<interface name="container_create_config_files" lineno="764"> +<summary> +Allow the specified domain to +create container config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_write_config_files" lineno="783"> +<summary> +Allow the specified domain to +write container config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_config_files" lineno="802"> <summary> Allow the specified domain to manage container config files. @@ -95314,7 +95632,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_file_root_filetrans" lineno="773"> +<interface name="container_file_root_filetrans" lineno="823"> <summary> Allow the specified domain to create container files in the @@ -95327,7 +95645,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_dirs" lineno="792"> +<interface name="container_manage_dirs" lineno="842"> <summary> Allow the specified domain to manage container file directories. @@ -95338,7 +95656,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_files" lineno="811"> +<interface name="container_manage_files" lineno="861"> <summary> Allow the specified domain to manage container files. @@ -95349,7 +95667,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_lnk_files" lineno="830"> +<interface name="container_manage_lnk_files" lineno="880"> <summary> Allow the specified domain to manage container lnk files. @@ -95360,7 +95678,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_fifo_files" lineno="849"> +<interface name="container_manage_fifo_files" lineno="899"> <summary> Allow the specified domain to manage container fifo files. @@ -95371,7 +95689,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_sock_files" lineno="868"> +<interface name="container_manage_sock_files" lineno="918"> <summary> Allow the specified domain to manage container sock files. @@ -95382,7 +95700,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_rw_chr_files" lineno="887"> +<interface name="container_rw_chr_files" lineno="937"> <summary> Allow the specified domain to read and write container chr files. @@ -95393,7 +95711,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_dontaudit_rw_chr_files" lineno="906"> +<interface name="container_dontaudit_rw_chr_files" lineno="956"> <summary> Do not audit attempts to read and write container chr files. @@ -95404,7 +95722,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_chr_files" lineno="925"> +<interface name="container_manage_chr_files" lineno="975"> <summary> Allow the specified domain to manage container chr files. @@ -95415,7 +95733,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_home_config" lineno="944"> +<interface name="container_manage_home_config" lineno="994"> <summary> Allow the specified domain to manage container config home content. @@ -95426,7 +95744,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_config_home_filetrans" lineno="976"> +<interface name="container_config_home_filetrans" lineno="1026"> <summary> Allow the specified domain to create objects in an xdg_config directory @@ -95449,7 +95767,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_manage_home_data_files" lineno="996"> +<interface name="container_manage_home_data_files" lineno="1046"> <summary> Allow the specified domain to manage container data home files. @@ -95460,7 +95778,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_home_data_fifo_files" lineno="1016"> +<interface name="container_manage_home_data_fifo_files" lineno="1066"> <summary> Allow the specified domain to manage container data home named @@ -95472,7 +95790,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_home_data_sock_files" lineno="1036"> +<interface name="container_manage_home_data_sock_files" lineno="1086"> <summary> Allow the specified domain to manage container data home named @@ -95484,7 +95802,51 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_relabel_all_content" lineno="1056"> +<interface name="container_admin_all_files" lineno="1104"> +<summary> +Administrate all container files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_admin_all_ro_files" lineno="1124"> +<summary> +Administrate all container read-only files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_admin_all_user_runtime_content" lineno="1146"> +<summary> +All of the rules necessary for a user +to manage user container runtime data +in their user runtime directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_all_home_content" lineno="1166"> +<summary> +All of the rules necessary for a user +to manage container data in their home +directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_relabel_all_content" lineno="1210"> <summary> Allow the specified domain to relabel container files and @@ -95496,7 +95858,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_relabel_fs" lineno="1075"> +<interface name="container_remount_fs" lineno="1229"> +<summary> +Allow the specified domain to +remount container filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_relabel_fs" lineno="1248"> <summary> Allow the specified domain to relabel container filesystems. @@ -95507,7 +95880,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_getattr_fs" lineno="1095"> +<interface name="container_getattr_fs" lineno="1268"> <summary> Allow the specified domain to get the attributes of container @@ -95519,7 +95892,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_search_runtime" lineno="1114"> +<interface name="container_search_runtime" lineno="1287"> <summary> Allow the specified domain to search runtime container directories. @@ -95530,7 +95903,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_runtime_files" lineno="1134"> +<interface name="container_manage_runtime_files" lineno="1307"> <summary> Allow the specified domain to manage runtime container files. @@ -95541,7 +95914,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_runtime_fifo_files" lineno="1153"> +<interface name="container_manage_runtime_fifo_files" lineno="1326"> <summary> Allow the specified domain to manage runtime container named pipes. @@ -95552,7 +95925,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_runtime_sock_files" lineno="1172"> +<interface name="container_manage_runtime_sock_files" lineno="1345"> <summary> Allow the specified domain to manage runtime container named sockets. @@ -95563,7 +95936,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_user_runtime_files" lineno="1191"> +<interface name="container_manage_user_runtime_files" lineno="1364"> <summary> Allow the specified domain to manage user runtime container files. @@ -95574,7 +95947,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_rw_user_runtime_sock_files" lineno="1210"> +<interface name="container_rw_user_runtime_sock_files" lineno="1383"> <summary> Allow the specified domain to read and write user runtime container named sockets. @@ -95585,7 +95958,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_search_var_lib" lineno="1229"> +<interface name="container_search_var_lib" lineno="1402"> <summary> Allow the specified domain to search container directories in /var/lib. @@ -95596,7 +95969,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_var_lib_files" lineno="1249"> +<interface name="container_manage_var_lib_files" lineno="1422"> <summary> Allow the specified domain to manage container files in /var/lib. @@ -95607,7 +95980,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_var_lib_fifo_files" lineno="1268"> +<interface name="container_manage_var_lib_fifo_files" lineno="1441"> <summary> Allow the specified domain to manage container named pipes in /var/lib. @@ -95618,7 +95991,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_var_lib_sock_files" lineno="1287"> +<interface name="container_manage_var_lib_sock_files" lineno="1460"> <summary> Allow the specified domain to manage container named sockets in /var/lib. @@ -95629,7 +96002,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_unlabeled_var_lib_filetrans" lineno="1318"> +<interface name="container_unlabeled_var_lib_filetrans" lineno="1491"> <summary> Allow the specified domain to create objects in unlabeled directories with @@ -95652,7 +96025,18 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_admin" lineno="1346"> +<interface name="container_start_units" lineno="1512"> +<summary> +Allow the specified domain to start +systemd units for containers. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_admin" lineno="1539"> <summary> All of the rules required to administrate a container @@ -95686,6 +96070,27 @@ Allow container engines to mount on all non-security files. </p> </desc> </tunable> +<tunable name="container_manage_public_content" dftval="false"> +<desc> +<p> +Allow containers to manage all read-writable public content. +</p> +</desc> +</tunable> +<tunable name="container_read_public_content" dftval="false"> +<desc> +<p> +Allow containers to read all public content. +</p> +</desc> +</tunable> +<tunable name="container_use_ecryptfs" dftval="false"> +<desc> +<p> +Allow containers to use eCryptfs filesystems. +</p> +</desc> +</tunable> <tunable name="container_use_nfs" dftval="false"> <desc> <p> @@ -96950,7 +97355,7 @@ User domain for the role </summary> </param> </template> -<interface name="dbus_system_bus_client" lineno="140"> +<interface name="dbus_system_bus_client" lineno="137"> <summary> Template for creating connections to the system bus. @@ -96961,7 +97366,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_connect_all_session_bus" lineno="179"> +<interface name="dbus_connect_all_session_bus" lineno="176"> <summary> Acquire service on all DBUS session busses. @@ -96972,7 +97377,7 @@ Domain allowed access. </summary> </param> </interface> -<template name="dbus_connect_spec_session_bus" lineno="205"> +<template name="dbus_connect_spec_session_bus" lineno="202"> <summary> Acquire service on specified DBUS session bus. @@ -96989,7 +97394,7 @@ Domain allowed access. </summary> </param> </template> -<interface name="dbus_all_session_bus_client" lineno="225"> +<interface name="dbus_all_session_bus_client" lineno="222"> <summary> Creating connections to all DBUS session busses. @@ -97000,7 +97405,7 @@ Domain allowed access. </summary> </param> </interface> -<template name="dbus_spec_session_bus_client" lineno="257"> +<template name="dbus_spec_session_bus_client" lineno="254"> <summary> Creating connections to specified DBUS session bus. @@ -97017,7 +97422,7 @@ Domain allowed access. </summary> </param> </template> -<interface name="dbus_send_all_session_bus" lineno="284"> +<interface name="dbus_send_all_session_bus" lineno="281"> <summary> Send messages to all DBUS session busses. @@ -97028,7 +97433,7 @@ Domain allowed access. </summary> </param> </interface> -<template name="dbus_send_spec_session_bus" lineno="310"> +<template name="dbus_send_spec_session_bus" lineno="307"> <summary> Send messages to specified DBUS session busses. @@ -97045,7 +97450,7 @@ Domain allowed access. </summary> </param> </template> -<interface name="dbus_getattr_session_runtime_socket" lineno="330"> +<interface name="dbus_getattr_session_runtime_socket" lineno="327"> <summary> Allow the specified domain to get the attributes of the session dbus sock file. @@ -97056,7 +97461,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_write_session_runtime_socket" lineno="349"> +<interface name="dbus_write_session_runtime_socket" lineno="346"> <summary> Allow the specified domain to write to the session dbus sock file. @@ -97067,7 +97472,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_read_config" lineno="367"> +<interface name="dbus_read_config" lineno="364"> <summary> Read dbus configuration content. </summary> @@ -97077,7 +97482,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_read_lib_files" lineno="386"> +<interface name="dbus_read_lib_files" lineno="383"> <summary> Read system dbus lib files. </summary> @@ -97087,7 +97492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_relabel_lib_dirs" lineno="406"> +<interface name="dbus_relabel_lib_dirs" lineno="403"> <summary> Relabel system dbus lib directory. </summary> @@ -97097,7 +97502,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_manage_lib_files" lineno="426"> +<interface name="dbus_manage_lib_files" lineno="423"> <summary> Create, read, write, and delete system dbus lib files. @@ -97108,7 +97513,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_all_session_domain" lineno="452"> +<interface name="dbus_all_session_domain" lineno="449"> <summary> Allow a application domain to be started by the specified session bus. @@ -97125,7 +97530,7 @@ entry point to this domain. </summary> </param> </interface> -<template name="dbus_spec_session_domain" lineno="486"> +<template name="dbus_spec_session_domain" lineno="483"> <summary> Allow a application domain to be started by the specified session bus. @@ -97148,7 +97553,7 @@ entry point to this domain. </summary> </param> </template> -<interface name="dbus_connect_system_bus" lineno="507"> +<interface name="dbus_connect_system_bus" lineno="504"> <summary> Acquire service on the DBUS system bus. </summary> @@ -97158,7 +97563,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_send_system_bus" lineno="526"> +<interface name="dbus_send_system_bus" lineno="523"> <summary> Send messages to the DBUS system bus. </summary> @@ -97168,7 +97573,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_system_bus_unconfined" lineno="545"> +<interface name="dbus_system_bus_unconfined" lineno="542"> <summary> Unconfined access to DBUS system bus. </summary> @@ -97178,7 +97583,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_system_domain" lineno="570"> +<interface name="dbus_system_domain" lineno="567"> <summary> Create a domain for processes which can be started by the DBUS system bus. @@ -97194,7 +97599,7 @@ Type of the program to be used as an entry point to this domain. </summary> </param> </interface> -<interface name="dbus_use_system_bus_fds" lineno="610"> +<interface name="dbus_use_system_bus_fds" lineno="605"> <summary> Use and inherit DBUS system bus file descriptors. @@ -97205,7 +97610,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="629"> +<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="624"> <summary> Do not audit attempts to read and write DBUS system bus TCP sockets. @@ -97216,7 +97621,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dbus_watch_system_bus_runtime_dirs" lineno="647"> +<interface name="dbus_watch_system_bus_runtime_dirs" lineno="642"> <summary> Watch system bus runtime directories. </summary> @@ -97226,7 +97631,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_list_system_bus_runtime" lineno="665"> +<interface name="dbus_read_system_bus_runtime_files" lineno="660"> +<summary> +Read system bus runtime files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_list_system_bus_runtime" lineno="679"> <summary> List system bus runtime directories. </summary> @@ -97236,7 +97651,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="683"> +<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="697"> <summary> Watch system bus runtime named sockets. </summary> @@ -97246,7 +97661,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="701"> +<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="715"> <summary> Read system bus runtime named sockets. </summary> @@ -97256,7 +97671,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_unconfined" lineno="719"> +<interface name="dbus_unconfined" lineno="733"> <summary> Unconfined access to DBUS. </summary> @@ -97266,7 +97681,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="749"> +<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="763"> <summary> Create resources in /run or /var/run with the system_dbusd_runtime_t label. This method is deprecated in favor of the init_daemon_run_dir @@ -97288,7 +97703,7 @@ Optional file name used for the resource </summary> </param> </interface> -<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="763"> +<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="777"> <summary> Create directories with the system_dbusd_runtime_t label </summary> @@ -97307,6 +97722,23 @@ over D-Bus. This is needed by openvpn3-linux. </p> </desc> </tunable> +<tunable name="dbus_broker_run_transient_units" dftval="false"> +<desc> +<p> +Allow dbus-daemon system bus to to run systemd transient +units. This is used by dbus-broker for dbus-activated +services when the unit file for the service does not exist. +</p> +</desc> +</tunable> +<tunable name="dbus_broker_system_bus" dftval="false"> +<desc> +<p> +Enable additional rules to support using dbus-broker +as the dbus-daemon system bus. +</p> +</desc> +</tunable> </module> <module name="ddclient" filename="policy/modules/services/ddclient.if"> <summary>Update dynamic IP address at DynDNS.org.</summary> @@ -101404,7 +101836,27 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="mailman_exec" lineno="120"> +<interface name="mailman_stream_connect_cgi" lineno="120"> +<summary> +Talk to mailman_cgi_t via Unix domain socket +</summary> +<param name="domain"> +<summary> +Domain talking to mailman +</summary> +</param> +</interface> +<interface name="mailman_manage_runtime_files" lineno="139"> +<summary> +Manage mailman runtime files +</summary> +<param name="domain"> +<summary> +Domain to manage the files +</summary> +</param> +</interface> +<interface name="mailman_exec" lineno="158"> <summary> Execute mailman in the caller domain. </summary> @@ -101414,7 +101866,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mailman_signal_cgi" lineno="139"> +<interface name="mailman_signal_cgi" lineno="177"> <summary> Send generic signals to mailman cgi. </summary> @@ -101424,7 +101876,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mailman_search_data" lineno="157"> +<interface name="mailman_search_data" lineno="195"> <summary> Search mailman data directories. </summary> @@ -101434,7 +101886,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mailman_read_data_files" lineno="176"> +<interface name="mailman_read_data_files" lineno="214"> <summary> Read mailman data content. </summary> @@ -101444,7 +101896,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mailman_manage_data_files" lineno="198"> +<interface name="mailman_map_data_files" lineno="235"> +<summary> +map mailman data content. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mailman_manage_data_files" lineno="254"> <summary> Create, read, write, and delete mailman data files. @@ -101455,7 +101917,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mailman_list_data" lineno="218"> +<interface name="mailman_list_data" lineno="274"> <summary> List mailman data directories. </summary> @@ -101465,7 +101927,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mailman_read_data_symlinks" lineno="237"> +<interface name="mailman_read_data_symlinks" lineno="293"> <summary> Read mailman data symbolic links. </summary> @@ -101475,7 +101937,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mailman_read_log" lineno="255"> +<interface name="mailman_read_log" lineno="311"> <summary> Read mailman log files. </summary> @@ -101485,7 +101947,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mailman_append_log" lineno="274"> +<interface name="mailman_append_log" lineno="330"> <summary> Append mailman log files. </summary> @@ -101495,7 +101957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mailman_manage_log" lineno="294"> +<interface name="mailman_manage_log" lineno="350"> <summary> Create, read, write, and delete mailman log content. @@ -101506,7 +101968,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mailman_read_archive" lineno="314"> +<interface name="mailman_read_archive" lineno="370"> <summary> Read mailman archive content. </summary> @@ -101516,7 +101978,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mailman_domtrans_queue" lineno="337"> +<interface name="mailman_domtrans_queue" lineno="393"> <summary> Execute mailman_queue in the mailman_queue domain. @@ -101527,6 +101989,34 @@ Domain allowed to transition. </summary> </param> </interface> +<interface name="mailman_manage_lockdir" lineno="412"> +<summary> +Manage mailman lock dir +</summary> +<param name="domain"> +<summary> +Domain allowed to manage it. +</summary> +</param> +</interface> +</module> +<module name="matrixd" filename="policy/modules/services/matrixd.if"> +<summary>matrix.org synapse reference server.</summary> +<tunable name="matrix_allow_federation" dftval="true"> +<desc> +<p> +Determine whether Matrixd is allowed to federate +(bind all UDP ports and connect to all TCP ports). +</p> +</desc> +</tunable> +<tunable name="matrix_postgresql_connect" dftval="false"> +<desc> +<p> +Determine whether Matrixd can connect to the Postgres database. +</p> +</desc> +</tunable> </module> <module name="mediawiki" filename="policy/modules/services/mediawiki.if"> <summary>Open source wiki package written in PHP.</summary> @@ -102588,7 +103078,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="mta_read_spool_symlinks" lineno="835"> +<interface name="mta_read_spool_symlinks" lineno="836"> <summary> Allow reading mail spool symlinks. </summary> @@ -102598,7 +103088,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="mta_dontaudit_read_spool_symlinks" lineno="854"> +<interface name="mta_dontaudit_read_spool_symlinks" lineno="855"> <summary> Do not audit attempts to read mail spool symlinks. @@ -102609,7 +103099,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="mta_getattr_spool" lineno="872"> +<interface name="mta_getattr_spool" lineno="873"> <summary> Get attributes of mail spool content. </summary> @@ -102619,7 +103109,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_dontaudit_getattr_spool_files" lineno="894"> +<interface name="mta_dontaudit_getattr_spool_files" lineno="895"> <summary> Do not audit attempts to get attributes of mail spool files. @@ -102630,7 +103120,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="mta_spool_filetrans" lineno="932"> +<interface name="mta_spool_filetrans" lineno="933"> <summary> Create specified objects in the mail spool directory with a @@ -102657,7 +103147,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="mta_read_spool_files" lineno="951"> +<interface name="mta_read_spool_files" lineno="952"> <summary> Read mail spool files. </summary> @@ -102667,7 +103157,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_rw_spool" lineno="971"> +<interface name="mta_rw_spool" lineno="972"> <summary> Read and write mail spool files. </summary> @@ -102677,7 +103167,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_append_spool" lineno="992"> +<interface name="mta_append_spool" lineno="993"> <summary> Create, read, and write mail spool files. </summary> @@ -102687,7 +103177,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_delete_spool" lineno="1013"> +<interface name="mta_delete_spool" lineno="1014"> <summary> Delete mail spool files. </summary> @@ -102697,7 +103187,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_manage_spool" lineno="1033"> +<interface name="mta_manage_spool" lineno="1034"> <summary> Create, read, write, and delete mail spool content. @@ -102708,7 +103198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_watch_spool" lineno="1055"> +<interface name="mta_watch_spool" lineno="1056"> <summary> Watch mail spool content. </summary> @@ -102718,7 +103208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_queue_filetrans" lineno="1090"> +<interface name="mta_queue_filetrans" lineno="1091"> <summary> Create specified objects in the mail queue spool directory with a @@ -102745,7 +103235,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="mta_search_queue" lineno="1109"> +<interface name="mta_search_queue" lineno="1110"> <summary> Search mail queue directories. </summary> @@ -102755,7 +103245,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_list_queue" lineno="1128"> +<interface name="mta_list_queue" lineno="1129"> <summary> List mail queue directories. </summary> @@ -102765,7 +103255,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_read_queue" lineno="1147"> +<interface name="mta_read_queue" lineno="1148"> <summary> Read mail queue files. </summary> @@ -102775,7 +103265,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_dontaudit_rw_queue" lineno="1167"> +<interface name="mta_dontaudit_rw_queue" lineno="1168"> <summary> Do not audit attempts to read and write mail queue content. @@ -102786,7 +103276,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="mta_manage_queue" lineno="1187"> +<interface name="mta_manage_queue" lineno="1188"> <summary> Create, read, write, and delete mail queue content. @@ -102797,7 +103287,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_read_sendmail_bin" lineno="1207"> +<interface name="mta_read_sendmail_bin" lineno="1208"> <summary> Read sendmail binary. </summary> @@ -102807,7 +103297,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_rw_user_mail_stream_sockets" lineno="1226"> +<interface name="mta_rw_user_mail_stream_sockets" lineno="1227"> <summary> Read and write unix domain stream sockets of all base mail domains. @@ -103830,6 +104320,9 @@ Role allowed access. <rolecap/> </interface> </module> +<module name="node_exporter" filename="policy/modules/services/node_exporter.if"> +<summary>Prometheus Node Exporter</summary> +</module> <module name="nscd" filename="policy/modules/services/nscd.if"> <summary>Name service cache daemon.</summary> <interface name="nscd_signal" lineno="13"> @@ -105351,7 +105844,22 @@ Role allowed access. </module> <module name="podman" filename="policy/modules/services/podman.if"> <summary>Policy for podman</summary> -<interface name="podman_domtrans" lineno="13"> +<template name="podman_conmon_domain_template" lineno="18"> +<summary> +Template for conmon domains. +</summary> +<param name="prefix"> +<summary> +Prefix for generated types. +</summary> +</param> +<param name="source_domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</template> +<interface name="podman_domtrans" lineno="55"> <summary> Execute podman in the podman domain. </summary> @@ -105361,7 +105869,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="podman_run" lineno="39"> +<interface name="podman_run" lineno="81"> <summary> Execute podman in the podman domain, and allow the specified role the @@ -105378,7 +105886,7 @@ The role to be allowed the podman domain. </summary> </param> </interface> -<interface name="podman_domtrans_user" lineno="60"> +<interface name="podman_domtrans_user" lineno="102"> <summary> Execute podman in the podman user domain (rootless podman). @@ -105389,7 +105897,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="podman_run_user" lineno="87"> +<interface name="podman_run_user" lineno="129"> <summary> Execute podman in the podman user domain, and allow the specified role @@ -105407,9 +105915,9 @@ The role to be allowed the podman domain. </summary> </param> </interface> -<interface name="podman_domtrans_conmon" lineno="107"> +<interface name="podman_domtrans_conmon" lineno="149"> <summary> -Execute conmon in the conmon domain. +Execute conmon in the podman conmon domain. </summary> <param name="domain"> <summary> @@ -105417,11 +105925,11 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="podman_run_conmon" lineno="133"> +<interface name="podman_run_conmon" lineno="175"> <summary> -Execute conmon in the conmon domain, -and allow the specified role the -conmon domain. +Execute conmon in the podman conmon +domain, and allow the specified role +the podman conmon domain. </summary> <param name="domain"> <summary> @@ -105434,10 +105942,10 @@ The role to be allowed the conmon domain. </summary> </param> </interface> -<interface name="podman_domtrans_conmon_user" lineno="154"> +<interface name="podman_domtrans_conmon_user" lineno="196"> <summary> -Execute conmon in the conmon user -domain (rootless podman). +Execute conmon in the podman conmon +user domain (rootless podman). </summary> <param name="domain"> <summary> @@ -105445,12 +105953,12 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="podman_run_conmon_user" lineno="181"> +<interface name="podman_run_conmon_user" lineno="223"> <summary> -Execute conmon in the conmon user -domain, and allow the specified role -the conmon user domain (rootless -podman). +Execute conmon in the podman conmon +user domain, and allow the specified +role the podman conmon user domain +(rootless podman). </summary> <param name="domain"> <summary> @@ -105463,7 +105971,44 @@ The role to be allowed the conmon domain. </summary> </param> </interface> -<template name="podman_user_role" lineno="218"> +<interface name="podman_spec_rangetrans_conmon" lineno="249"> +<summary> +Make the specified domain perform a +range transition when executing conmon. +</summary> +<param name="domain"> +<summary> +Domain to transition ranges. +</summary> +</param> +<param name="range"> +<summary> +MLS range to transition to. +</summary> +</param> +</interface> +<interface name="podman_rw_conmon_pipes" lineno="272"> +<summary> +Read and write podman conmon unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="podman_use_conmon_fds" lineno="293"> +<summary> +Allow the specified domain to inherit +file descriptors from podman conmon. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<template name="podman_user_role" lineno="330"> <summary> Role access for rootless podman. </summary> @@ -105490,7 +106035,7 @@ Role allowed access. </param> <rolecap/> </template> -<interface name="podman_admin" lineno="255"> +<interface name="podman_admin" lineno="367"> <summary> All of the rules required to administrate a podman @@ -105649,6 +106194,46 @@ Domain allowed access. </summary> </param> </interface> +<interface name="policykit_get_unit_status" lineno="260"> +<summary> +Get the status of the polkit systemd unit. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="policykit_start_unit" lineno="279"> +<summary> +Start the polkit systemd unit. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="policykit_stop_unit" lineno="298"> +<summary> +Stop the polkit systemd unit. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="policykit_reload_unit" lineno="317"> +<summary> +Reload the polkit systemd unit. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> </module> <module name="portmap" filename="policy/modules/services/portmap.if"> <summary>RPC port mapping service.</summary> @@ -110653,7 +111238,7 @@ is the prefix for sshd_t). </summary> </param> </template> -<template name="ssh_role_template" lineno="309"> +<template name="ssh_role_template" lineno="322"> <summary> Role access for ssh </summary> @@ -110679,7 +111264,7 @@ Role allowed access </summary> </param> </template> -<interface name="ssh_sigchld" lineno="474"> +<interface name="ssh_sigchld" lineno="487"> <summary> Send a SIGCHLD signal to the ssh server. </summary> @@ -110689,7 +111274,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_signal" lineno="492"> +<interface name="ssh_signal" lineno="505"> <summary> Send a generic signal to the ssh server. </summary> @@ -110699,7 +111284,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_signull" lineno="510"> +<interface name="ssh_signull" lineno="523"> <summary> Send a null signal to sshd processes. </summary> @@ -110709,7 +111294,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_read_pipes" lineno="528"> +<interface name="ssh_read_pipes" lineno="541"> <summary> Read a ssh server unnamed pipe. </summary> @@ -110719,7 +111304,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_rw_pipes" lineno="545"> +<interface name="ssh_rw_pipes" lineno="558"> <summary> Read and write a ssh server unnamed pipe. </summary> @@ -110729,7 +111314,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_rw_stream_sockets" lineno="563"> +<interface name="ssh_rw_stream_sockets" lineno="576"> <summary> Read and write ssh server unix domain stream sockets. </summary> @@ -110739,7 +111324,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_rw_tcp_sockets" lineno="581"> +<interface name="ssh_rw_tcp_sockets" lineno="594"> <summary> Read and write ssh server TCP sockets. </summary> @@ -110749,7 +111334,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="600"> +<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="613"> <summary> Do not audit attempts to read and write ssh server TCP sockets. @@ -110760,7 +111345,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="ssh_exec_sshd" lineno="618"> +<interface name="ssh_exec_sshd" lineno="631"> <summary> Execute the ssh daemon in the caller domain. </summary> @@ -110770,7 +111355,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_domtrans" lineno="637"> +<interface name="ssh_domtrans" lineno="650"> <summary> Execute the ssh daemon sshd domain. </summary> @@ -110780,7 +111365,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="ssh_client_domtrans" lineno="655"> +<interface name="ssh_client_domtrans" lineno="668"> <summary> Execute the ssh client in the ssh client domain. </summary> @@ -110790,7 +111375,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="ssh_exec" lineno="673"> +<interface name="ssh_exec" lineno="686"> <summary> Execute the ssh client in the caller domain. </summary> @@ -110800,7 +111385,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_setattr_key_files" lineno="692"> +<interface name="ssh_setattr_key_files" lineno="705"> <summary> Set the attributes of sshd key files. </summary> @@ -110810,7 +111395,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_agent_exec" lineno="711"> +<interface name="ssh_agent_exec" lineno="724"> <summary> Execute the ssh agent client in the caller domain. </summary> @@ -110820,7 +111405,27 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_read_user_home_files" lineno="730"> +<interface name="ssh_setattr_home_dirs" lineno="743"> +<summary> +Set the attributes of ssh home directory (~/.ssh) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_create_home_dirs" lineno="761"> +<summary> +Create ssh home directory (~/.ssh) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_read_user_home_files" lineno="780"> <summary> Read ssh home directory content </summary> @@ -110830,7 +111435,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_domtrans_keygen" lineno="751"> +<interface name="ssh_domtrans_keygen" lineno="801"> <summary> Execute the ssh key generator in the ssh keygen domain. </summary> @@ -110840,17 +111445,27 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="ssh_dontaudit_read_server_keys" lineno="769"> +<interface name="ssh_read_server_keys" lineno="819"> <summary> Read ssh server keys </summary> <param name="domain"> <summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_dontaudit_read_server_keys" lineno="837"> +<summary> +Do not audit denials on reading ssh server keys +</summary> +<param name="domain"> +<summary> Domain to not audit. </summary> </param> </interface> -<interface name="ssh_manage_home_files" lineno="787"> +<interface name="ssh_manage_home_files" lineno="855"> <summary> Manage ssh home directory content </summary> @@ -110860,7 +111475,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_delete_tmp" lineno="806"> +<interface name="ssh_delete_tmp" lineno="874"> <summary> Delete from the ssh temp files. </summary> @@ -110870,7 +111485,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_dontaudit_agent_tmp" lineno="825"> +<interface name="ssh_dontaudit_agent_tmp" lineno="893"> <summary> dontaudit access to ssh agent tmp dirs </summary> @@ -115841,7 +116456,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fstools_signal" lineno="76"> +<interface name="fstools_signal" lineno="77"> <summary> Send signal to fsadm process </summary> @@ -115851,7 +116466,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fstools_use_fds" lineno="94"> +<interface name="fstools_use_fds" lineno="95"> <summary> Inherit fstools file descriptors. </summary> @@ -115861,7 +116476,7 @@ The type of the process performing this action. </summary> </param> </interface> -<interface name="fstools_read_pipes" lineno="112"> +<interface name="fstools_read_pipes" lineno="113"> <summary> Read fstools unnamed pipes. </summary> @@ -115871,7 +116486,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fstools_relabelto_entry_files" lineno="131"> +<interface name="fstools_relabelto_entry_files" lineno="132"> <summary> Relabel a file to the type used by the filesystem tools programs. @@ -115882,7 +116497,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fstools_manage_entry_files" lineno="150"> +<interface name="fstools_manage_entry_files" lineno="151"> <summary> Create, read, write, and delete a file used by the filesystem tools programs. @@ -115893,7 +116508,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fstools_write_log" lineno="168"> +<interface name="fstools_write_log" lineno="169"> <summary> Write to fsadm_log_t </summary> @@ -115903,7 +116518,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fstools_manage_runtime_files" lineno="187"> +<interface name="fstools_manage_runtime_files" lineno="188"> <summary> Create, read, write, and delete filesystem tools runtime files. @@ -115914,7 +116529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fstools_getattr_swap_files" lineno="205"> +<interface name="fstools_getattr_swap_files" lineno="206"> <summary> Getattr swapfile </summary> @@ -115924,7 +116539,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fstools_dontaudit_getattr_swap_files" lineno="223"> +<interface name="fstools_dontaudit_getattr_swap_files" lineno="224"> <summary> Ignore access to a swapfile. </summary> @@ -115934,7 +116549,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fstools_relabelto_swap_files" lineno="241"> +<interface name="fstools_relabelto_swap_files" lineno="242"> <summary> Relabel to swapfile. </summary> @@ -115944,7 +116559,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fstools_manage_swap_files" lineno="259"> +<interface name="fstools_manage_swap_files" lineno="260"> <summary> Manage swapfile. </summary> @@ -116244,7 +116859,7 @@ Type of the program to be used as an entry point to this domain. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="init_ranged_daemon_domain" lineno="431"> +<interface name="init_ranged_daemon_domain" lineno="433"> <summary> Create a domain for long running processes (daemons/services) which are started by init scripts, @@ -116286,7 +116901,7 @@ MLS/MCS range for the domain. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="init_abstract_socket_activation" lineno="462"> +<interface name="init_abstract_socket_activation" lineno="464"> <summary> Abstract socket service activation (systemd). </summary> @@ -116296,7 +116911,7 @@ The domain to be started by systemd socket activation. </summary> </param> </interface> -<interface name="init_named_socket_activation" lineno="487"> +<interface name="init_named_socket_activation" lineno="489"> <summary> Named socket service activation (systemd). </summary> @@ -116311,7 +116926,7 @@ The domain socket file type. </summary> </param> </interface> -<interface name="init_system_domain" lineno="538"> +<interface name="init_system_domain" lineno="540"> <summary> Create a domain for short running processes which are started by init scripts. @@ -116348,7 +116963,7 @@ Type of the program to be used as an entry point to this domain. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="init_ranged_system_domain" lineno="600"> +<interface name="init_ranged_system_domain" lineno="602"> <summary> Create a domain for short running processes which are started by init scripts. @@ -116391,7 +117006,7 @@ Range for the domain. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="init_dyntrans" lineno="631"> +<interface name="init_dyntrans" lineno="633"> <summary> Allow domain dyntransition to init_t domain. </summary> @@ -116401,7 +117016,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_daemon_pid_file" lineno="660"> +<interface name="init_daemon_pid_file" lineno="662"> <summary> Mark the file type as a daemon pid file, allowing initrc_t to create it (Deprecated) @@ -116422,7 +117037,7 @@ Filename of the file that the init script creates </summary> </param> </interface> -<interface name="init_daemon_runtime_file" lineno="687"> +<interface name="init_daemon_runtime_file" lineno="689"> <summary> Mark the file type as a daemon runtime file, allowing initrc_t to create it @@ -116443,7 +117058,7 @@ Filename of the file that the init script creates </summary> </param> </interface> -<interface name="init_daemon_lock_file" lineno="720"> +<interface name="init_daemon_lock_file" lineno="722"> <summary> Mark the file type as a daemon lock file, allowing initrc_t to create it @@ -116464,7 +117079,7 @@ Filename of the file that the init script creates </summary> </param> </interface> -<interface name="init_domtrans" lineno="742"> +<interface name="init_domtrans" lineno="744"> <summary> Execute init (/sbin/init) with a domain transition. </summary> @@ -116474,7 +117089,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_pgm_spec_user_daemon_domain" lineno="766"> +<interface name="init_pgm_spec_user_daemon_domain" lineno="768"> <summary> Execute init (/sbin/init) with a domain transition to the provided domain. @@ -116490,7 +117105,7 @@ The type to be used as a systemd --user domain. </summary> </param> </interface> -<interface name="init_exec" lineno="794"> +<interface name="init_exec" lineno="796"> <summary> Execute the init program in the caller domain. </summary> @@ -116501,7 +117116,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_pgm_entrypoint" lineno="815"> +<interface name="init_pgm_entrypoint" lineno="817"> <summary> Allow the init program to be an entrypoint for the specified domain. @@ -116513,7 +117128,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_exec_rc" lineno="844"> +<interface name="init_exec_rc" lineno="846"> <summary> Execute the rc application in the caller domain. </summary> @@ -116534,7 +117149,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getpgid" lineno="863"> +<interface name="init_getpgid" lineno="865"> <summary> Get the process group of init. </summary> @@ -116544,7 +117159,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signal" lineno="881"> +<interface name="init_signal" lineno="883"> <summary> Send init a generic signal. </summary> @@ -116554,7 +117169,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signull" lineno="899"> +<interface name="init_signull" lineno="901"> <summary> Send init a null signal. </summary> @@ -116564,7 +117179,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_sigchld" lineno="917"> +<interface name="init_sigchld" lineno="919"> <summary> Send init a SIGCHLD signal. </summary> @@ -116574,7 +117189,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_setsched" lineno="935"> +<interface name="init_setsched" lineno="937"> <summary> Set the nice level of init. </summary> @@ -116584,7 +117199,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stream_connect" lineno="953"> +<interface name="init_stream_connect" lineno="955"> <summary> Connect to init with a unix socket. </summary> @@ -116594,7 +117209,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_unix_stream_socket_connectto" lineno="974"> +<interface name="init_unix_stream_socket_connectto" lineno="976"> <summary> Connect to init with a unix socket. Without any additional permissions. @@ -116605,7 +117220,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_fds" lineno="1032"> +<interface name="init_use_fds" lineno="1034"> <summary> Inherit and use file descriptors from init. </summary> @@ -116655,7 +117270,7 @@ Domain allowed access. </param> <infoflow type="read" weight="1"/> </interface> -<interface name="init_dontaudit_use_fds" lineno="1051"> +<interface name="init_dontaudit_use_fds" lineno="1053"> <summary> Do not audit attempts to inherit file descriptors from init. @@ -116666,7 +117281,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_dgram_send" lineno="1070"> +<interface name="init_dgram_send" lineno="1072"> <summary> Send messages to init unix datagram sockets. </summary> @@ -116677,7 +117292,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_rw_inherited_stream_socket" lineno="1090"> +<interface name="init_rw_inherited_stream_socket" lineno="1092"> <summary> Read and write to inherited init unix streams. </summary> @@ -116687,7 +117302,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_stream_sockets" lineno="1109"> +<interface name="init_rw_stream_sockets" lineno="1111"> <summary> Allow the specified domain to read/write to init with unix domain stream sockets. @@ -116698,7 +117313,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_start_system" lineno="1127"> +<interface name="init_dontaudit_search_keys" lineno="1129"> +<summary> +Do not audit attempts to search init keys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_start_system" lineno="1147"> <summary> start service (systemd). </summary> @@ -116708,7 +117333,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stop_system" lineno="1145"> +<interface name="init_stop_system" lineno="1165"> <summary> stop service (systemd). </summary> @@ -116718,7 +117343,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_get_system_status" lineno="1163"> +<interface name="init_get_system_status" lineno="1183"> <summary> Get all service status (systemd). </summary> @@ -116728,7 +117353,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_enable" lineno="1181"> +<interface name="init_enable" lineno="1201"> <summary> Enable all systemd services (systemd). </summary> @@ -116738,7 +117363,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_disable" lineno="1199"> +<interface name="init_disable" lineno="1219"> <summary> Disable all services (systemd). </summary> @@ -116748,7 +117373,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_reload" lineno="1217"> +<interface name="init_reload" lineno="1237"> <summary> Reload all services (systemd). </summary> @@ -116758,7 +117383,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_reboot_system" lineno="1235"> +<interface name="init_reboot_system" lineno="1255"> <summary> Reboot the system (systemd). </summary> @@ -116768,7 +117393,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_shutdown_system" lineno="1253"> +<interface name="init_shutdown_system" lineno="1273"> <summary> Shutdown (halt) the system (systemd). </summary> @@ -116778,7 +117403,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_service_status" lineno="1271"> +<interface name="init_service_status" lineno="1291"> <summary> Allow specified domain to get init status </summary> @@ -116788,7 +117413,7 @@ Domain to allow access. </summary> </param> </interface> -<interface name="init_service_start" lineno="1290"> +<interface name="init_service_start" lineno="1310"> <summary> Allow specified domain to get init start </summary> @@ -116798,7 +117423,7 @@ Domain to allow access. </summary> </param> </interface> -<interface name="init_dbus_chat" lineno="1310"> +<interface name="init_dbus_chat" lineno="1330"> <summary> Send and receive messages from systemd over dbus. @@ -116809,7 +117434,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_run_bpf" lineno="1330"> +<interface name="init_run_bpf" lineno="1350"> <summary> Run init BPF programs. </summary> @@ -116819,7 +117444,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_var_lib_links" lineno="1349"> +<interface name="init_read_var_lib_links" lineno="1369"> <summary> read/follow symlinks under /var/lib/systemd/ </summary> @@ -116829,7 +117454,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_list_var_lib_dirs" lineno="1368"> +<interface name="init_search_var_lib_dirs" lineno="1388"> +<summary> +Search /var/lib/systemd/ dirs +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_list_var_lib_dirs" lineno="1407"> <summary> List /var/lib/systemd/ dir </summary> @@ -116839,7 +117474,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_relabel_var_lib_dirs" lineno="1386"> +<interface name="init_relabel_var_lib_dirs" lineno="1425"> <summary> Relabel dirs in /var/lib/systemd/. </summary> @@ -116849,7 +117484,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_var_lib_files" lineno="1404"> +<interface name="init_manage_var_lib_files" lineno="1443"> <summary> Manage files in /var/lib/systemd/. </summary> @@ -116859,7 +117494,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_var_lib_filetrans" lineno="1439"> +<interface name="init_var_lib_filetrans" lineno="1478"> <summary> Create files in /var/lib/systemd with an automatic type transition. @@ -116885,7 +117520,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="init_search_pids" lineno="1458"> +<interface name="init_search_pids" lineno="1497"> <summary> Allow search directory in the /run/systemd directory. (Deprecated) </summary> @@ -116895,7 +117530,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_list_pids" lineno="1473"> +<interface name="init_list_pids" lineno="1512"> <summary> Allow listing of the /run/systemd directory. (Deprecated) </summary> @@ -116905,7 +117540,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_pid_symlinks" lineno="1488"> +<interface name="init_manage_pid_symlinks" lineno="1527"> <summary> Create symbolic links in the /run/systemd directory. (Deprecated) </summary> @@ -116915,7 +117550,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_create_pid_files" lineno="1503"> +<interface name="init_create_pid_files" lineno="1542"> <summary> Create files in the /run/systemd directory. (Deprecated) </summary> @@ -116925,7 +117560,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_write_pid_files" lineno="1518"> +<interface name="init_write_pid_files" lineno="1557"> <summary> Write files in the /run/systemd directory. (Deprecated) </summary> @@ -116935,7 +117570,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_pid_dirs" lineno="1534"> +<interface name="init_manage_pid_dirs" lineno="1573"> <summary> Create, read, write, and delete directories in the /run/systemd directory. (Deprecated) @@ -116946,7 +117581,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_pid_filetrans" lineno="1564"> +<interface name="init_pid_filetrans" lineno="1603"> <summary> Create files in an init PID directory. (Deprecated) </summary> @@ -116971,7 +117606,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="init_search_runtime" lineno="1579"> +<interface name="init_search_runtime" lineno="1618"> <summary> Search init runtime directories, e.g. /run/systemd. </summary> @@ -116981,7 +117616,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_list_runtime" lineno="1597"> +<interface name="init_list_runtime" lineno="1636"> <summary> List init runtime directories, e.g. /run/systemd. </summary> @@ -116991,7 +117626,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_runtime_dirs" lineno="1617"> +<interface name="init_manage_runtime_dirs" lineno="1656"> <summary> Create, read, write, and delete directories in the /run/systemd directory. @@ -117002,7 +117637,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_runtime_filetrans" lineno="1650"> +<interface name="init_runtime_filetrans" lineno="1689"> <summary> Create files in an init runtime directory with a private type. </summary> @@ -117027,7 +117662,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="init_write_runtime_files" lineno="1669"> +<interface name="init_write_runtime_files" lineno="1708"> <summary> Write init runtime files, e.g. in /run/systemd. </summary> @@ -117037,7 +117672,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_create_runtime_files" lineno="1687"> +<interface name="init_create_runtime_files" lineno="1726"> <summary> Create init runtime files, e.g. in /run/systemd. </summary> @@ -117047,7 +117682,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_runtime_symlinks" lineno="1705"> +<interface name="init_manage_runtime_symlinks" lineno="1744"> <summary> Create init runtime symbolic links, e.g. in /run/systemd. </summary> @@ -117057,7 +117692,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getattr_initctl" lineno="1723"> +<interface name="init_getattr_initctl" lineno="1762"> <summary> Get the attributes of initctl. </summary> @@ -117067,7 +117702,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_getattr_initctl" lineno="1744"> +<interface name="init_dontaudit_getattr_initctl" lineno="1783"> <summary> Do not audit attempts to get the attributes of initctl. @@ -117078,7 +117713,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_write_initctl" lineno="1762"> +<interface name="init_write_initctl" lineno="1801"> <summary> Write to initctl. </summary> @@ -117088,7 +117723,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_telinit" lineno="1783"> +<interface name="init_telinit" lineno="1822"> <summary> Use telinit (Read and write initctl). </summary> @@ -117099,7 +117734,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_rw_initctl" lineno="1816"> +<interface name="init_rw_initctl" lineno="1855"> <summary> Read and write initctl. </summary> @@ -117109,7 +117744,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_rw_initctl" lineno="1837"> +<interface name="init_dontaudit_rw_initctl" lineno="1876"> <summary> Do not audit attempts to read and write initctl. @@ -117120,7 +117755,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_script_file_entry_type" lineno="1856"> +<interface name="init_script_file_entry_type" lineno="1895"> <summary> Make init scripts an entry point for the specified domain. @@ -117131,7 +117766,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_spec_domtrans_script" lineno="1879"> +<interface name="init_spec_domtrans_script" lineno="1918"> <summary> Execute init scripts with a specified domain transition. </summary> @@ -117141,7 +117776,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_domtrans_script" lineno="1906"> +<interface name="init_domtrans_script" lineno="1945"> <summary> Execute init scripts with an automatic domain transition. </summary> @@ -117151,7 +117786,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_domtrans_labeled_script" lineno="1941"> +<interface name="init_domtrans_labeled_script" lineno="1980"> <summary> Execute labelled init scripts with an automatic domain transition. </summary> @@ -117161,7 +117796,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_script_file_domtrans" lineno="1987"> +<interface name="init_script_file_domtrans" lineno="2026"> <summary> Execute a init script in a specified domain. </summary> @@ -117186,7 +117821,7 @@ Domain to transition to. </summary> </param> </interface> -<interface name="init_kill_scripts" lineno="2006"> +<interface name="init_kill_scripts" lineno="2045"> <summary> Send a kill signal to init scripts. </summary> @@ -117196,7 +117831,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_script_service" lineno="2024"> +<interface name="init_manage_script_service" lineno="2063"> <summary> Allow manage service for initrc_exec_t scripts </summary> @@ -117206,7 +117841,7 @@ Target domain </summary> </param> </interface> -<interface name="init_labeled_script_domtrans" lineno="2049"> +<interface name="init_labeled_script_domtrans" lineno="2088"> <summary> Transition to the init script domain on a specified labeled init script. @@ -117222,7 +117857,7 @@ Labeled init script file. </summary> </param> </interface> -<interface name="init_all_labeled_script_domtrans" lineno="2071"> +<interface name="init_all_labeled_script_domtrans" lineno="2110"> <summary> Transition to the init script domain for all labeled init script types @@ -117233,7 +117868,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_get_script_status" lineno="2089"> +<interface name="init_get_script_status" lineno="2128"> <summary> Allow getting service status of initrc_exec_t scripts </summary> @@ -117243,7 +117878,7 @@ Target domain </summary> </param> </interface> -<interface name="init_startstop_service" lineno="2129"> +<interface name="init_startstop_service" lineno="2168"> <summary> Allow the role to start and stop labeled services. @@ -117274,7 +117909,7 @@ Systemd unit file type. </summary> </param> </interface> -<interface name="init_run_daemon" lineno="2185"> +<interface name="init_run_daemon" lineno="2224"> <summary> Start and stop daemon programs directly. </summary> @@ -117296,7 +117931,7 @@ The role to be performing this action. </summary> </param> </interface> -<interface name="init_startstop_all_script_services" lineno="2207"> +<interface name="init_startstop_all_script_services" lineno="2246"> <summary> Start and stop init_script_file_type services </summary> @@ -117306,7 +117941,7 @@ domain that can start and stop the services </summary> </param> </interface> -<interface name="init_read_state" lineno="2226"> +<interface name="init_read_state" lineno="2265"> <summary> Read the process state (/proc/pid) of init. </summary> @@ -117316,7 +117951,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_read_state" lineno="2246"> +<interface name="init_dontaudit_read_state" lineno="2285"> <summary> Dontaudit read the process state (/proc/pid) of init. </summary> @@ -117326,7 +117961,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_ptrace" lineno="2267"> +<interface name="init_ptrace" lineno="2306"> <summary> Ptrace init </summary> @@ -117337,7 +117972,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_getattr" lineno="2286"> +<interface name="init_getattr" lineno="2325"> <summary> get init process stats </summary> @@ -117348,7 +117983,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_read_script_pipes" lineno="2304"> +<interface name="init_read_script_pipes" lineno="2343"> <summary> Read an init script unnamed pipe. </summary> @@ -117358,7 +117993,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_write_script_pipes" lineno="2322"> +<interface name="init_write_script_pipes" lineno="2361"> <summary> Write an init script unnamed pipe. </summary> @@ -117368,7 +118003,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getattr_script_files" lineno="2340"> +<interface name="init_getattr_script_files" lineno="2379"> <summary> Get the attribute of init script entrypoint files. </summary> @@ -117378,7 +118013,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_files" lineno="2359"> +<interface name="init_read_script_files" lineno="2398"> <summary> Read init scripts. </summary> @@ -117388,7 +118023,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_exec_script_files" lineno="2378"> +<interface name="init_exec_script_files" lineno="2417"> <summary> Execute init scripts in the caller domain. </summary> @@ -117398,7 +118033,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getattr_all_script_files" lineno="2397"> +<interface name="init_getattr_all_script_files" lineno="2436"> <summary> Get the attribute of all init script entrypoint files. </summary> @@ -117408,7 +118043,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_all_script_files" lineno="2416"> +<interface name="init_read_all_script_files" lineno="2455"> <summary> Read all init script files. </summary> @@ -117418,7 +118053,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_read_all_script_files" lineno="2440"> +<interface name="init_dontaudit_read_all_script_files" lineno="2479"> <summary> Dontaudit read all init script files. </summary> @@ -117428,7 +118063,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_exec_all_script_files" lineno="2458"> +<interface name="init_exec_all_script_files" lineno="2497"> <summary> Execute all init scripts in the caller domain. </summary> @@ -117438,7 +118073,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_state" lineno="2477"> +<interface name="init_read_script_state" lineno="2516"> <summary> Read the process state (/proc/pid) of the init scripts. </summary> @@ -117448,7 +118083,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_script_fds" lineno="2496"> +<interface name="init_use_script_fds" lineno="2535"> <summary> Inherit and use init script file descriptors. </summary> @@ -117458,7 +118093,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_use_script_fds" lineno="2515"> +<interface name="init_dontaudit_use_script_fds" lineno="2554"> <summary> Do not audit attempts to inherit init script file descriptors. @@ -117469,7 +118104,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_search_script_keys" lineno="2533"> +<interface name="init_search_script_keys" lineno="2572"> <summary> Search init script keys. </summary> @@ -117479,7 +118114,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getpgid_script" lineno="2551"> +<interface name="init_getpgid_script" lineno="2590"> <summary> Get the process group ID of init scripts. </summary> @@ -117489,7 +118124,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_sigchld_script" lineno="2569"> +<interface name="init_sigchld_script" lineno="2608"> <summary> Send SIGCHLD signals to init scripts. </summary> @@ -117499,7 +118134,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signal_script" lineno="2587"> +<interface name="init_signal_script" lineno="2626"> <summary> Send generic signals to init scripts. </summary> @@ -117509,7 +118144,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signull_script" lineno="2605"> +<interface name="init_signull_script" lineno="2644"> <summary> Send null signals to init scripts. </summary> @@ -117519,7 +118154,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_script_pipes" lineno="2623"> +<interface name="init_rw_script_pipes" lineno="2662"> <summary> Read and write init script unnamed pipes. </summary> @@ -117529,7 +118164,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stream_connect_script" lineno="2642"> +<interface name="init_stream_connect_script" lineno="2681"> <summary> Allow the specified domain to connect to init scripts with a unix socket. @@ -117540,7 +118175,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_script_stream_sockets" lineno="2661"> +<interface name="init_rw_script_stream_sockets" lineno="2700"> <summary> Allow the specified domain to read/write to init scripts with a unix domain stream sockets. @@ -117551,7 +118186,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_stream_connect_script" lineno="2680"> +<interface name="init_dontaudit_stream_connect_script" lineno="2719"> <summary> Dont audit the specified domain connecting to init scripts with a unix domain stream socket. @@ -117562,7 +118197,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_dbus_send_script" lineno="2697"> +<interface name="init_dbus_send_script" lineno="2736"> <summary> Send messages to init scripts over dbus. </summary> @@ -117572,7 +118207,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dbus_chat_script" lineno="2717"> +<interface name="init_dbus_chat_script" lineno="2756"> <summary> Send and receive messages from init scripts over dbus. @@ -117583,7 +118218,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_script_ptys" lineno="2746"> +<interface name="init_use_script_ptys" lineno="2785"> <summary> Read and write the init script pty. </summary> @@ -117602,7 +118237,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_inherited_script_ptys" lineno="2765"> +<interface name="init_use_inherited_script_ptys" lineno="2804"> <summary> Read and write inherited init script ptys. </summary> @@ -117612,7 +118247,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_use_script_ptys" lineno="2787"> +<interface name="init_dontaudit_use_script_ptys" lineno="2826"> <summary> Do not audit attempts to read and write the init script pty. @@ -117623,7 +118258,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_getattr_script_status_files" lineno="2806"> +<interface name="init_getattr_script_status_files" lineno="2845"> <summary> Get the attributes of init script status files. @@ -117634,7 +118269,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_read_script_status_files" lineno="2825"> +<interface name="init_dontaudit_read_script_status_files" lineno="2864"> <summary> Do not audit attempts to read init script status files. @@ -117645,7 +118280,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_search_run" lineno="2844"> +<interface name="init_search_run" lineno="2883"> <summary> Search the /run/systemd directory. </summary> @@ -117655,7 +118290,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_tmp_files" lineno="2863"> +<interface name="init_read_script_tmp_files" lineno="2902"> <summary> Read init script temporary data. </summary> @@ -117665,7 +118300,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_inherited_script_tmp_files" lineno="2882"> +<interface name="init_rw_inherited_script_tmp_files" lineno="2921"> <summary> Read and write init script inherited temporary data. </summary> @@ -117675,7 +118310,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_script_tmp_files" lineno="2900"> +<interface name="init_rw_script_tmp_files" lineno="2939"> <summary> Read and write init script temporary data. </summary> @@ -117685,7 +118320,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_script_tmp_filetrans" lineno="2935"> +<interface name="init_script_tmp_filetrans" lineno="2974"> <summary> Create files in a init script temporary data directory. @@ -117711,7 +118346,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="init_getattr_utmp" lineno="2954"> +<interface name="init_getattr_utmp" lineno="2993"> <summary> Get the attributes of init script process id files. </summary> @@ -117721,7 +118356,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_utmp" lineno="2972"> +<interface name="init_read_utmp" lineno="3011"> <summary> Read utmp. </summary> @@ -117731,7 +118366,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_write_utmp" lineno="2991"> +<interface name="init_dontaudit_write_utmp" lineno="3030"> <summary> Do not audit attempts to write utmp. </summary> @@ -117741,7 +118376,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_write_utmp" lineno="3009"> +<interface name="init_write_utmp" lineno="3048"> <summary> Write to utmp. </summary> @@ -117751,7 +118386,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_lock_utmp" lineno="3029"> +<interface name="init_dontaudit_lock_utmp" lineno="3068"> <summary> Do not audit attempts to lock init script pid files. @@ -117762,7 +118397,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_rw_utmp" lineno="3047"> +<interface name="init_rw_utmp" lineno="3086"> <summary> Read and write utmp. </summary> @@ -117772,7 +118407,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_rw_utmp" lineno="3066"> +<interface name="init_dontaudit_rw_utmp" lineno="3105"> <summary> Do not audit attempts to read and write utmp. </summary> @@ -117782,7 +118417,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_manage_utmp" lineno="3084"> +<interface name="init_manage_utmp" lineno="3123"> <summary> Create, read, write, and delete utmp. </summary> @@ -117792,7 +118427,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_watch_utmp" lineno="3103"> +<interface name="init_watch_utmp" lineno="3142"> <summary> Add a watch on utmp. </summary> @@ -117802,7 +118437,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_relabel_utmp" lineno="3121"> +<interface name="init_relabel_utmp" lineno="3160"> <summary> Relabel utmp. </summary> @@ -117812,7 +118447,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_runtime_filetrans_utmp" lineno="3140"> +<interface name="init_runtime_filetrans_utmp" lineno="3179"> <summary> Create files in /var/run with the utmp file type. @@ -117823,7 +118458,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_create_runtime_dirs" lineno="3158"> +<interface name="init_create_runtime_dirs" lineno="3197"> <summary> Create a directory in the /run/systemd directory. </summary> @@ -117833,7 +118468,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_runtime_files" lineno="3177"> +<interface name="init_read_runtime_files" lineno="3216"> <summary> Read init_runtime_t files </summary> @@ -117843,7 +118478,7 @@ domain </summary> </param> </interface> -<interface name="init_rename_runtime_files" lineno="3195"> +<interface name="init_rename_runtime_files" lineno="3234"> <summary> Rename init_runtime_t files </summary> @@ -117853,7 +118488,7 @@ domain </summary> </param> </interface> -<interface name="init_setattr_runtime_files" lineno="3213"> +<interface name="init_setattr_runtime_files" lineno="3252"> <summary> Setattr init_runtime_t files </summary> @@ -117863,7 +118498,7 @@ domain </summary> </param> </interface> -<interface name="init_delete_runtime_files" lineno="3231"> +<interface name="init_delete_runtime_files" lineno="3270"> <summary> Delete init_runtime_t files </summary> @@ -117873,7 +118508,7 @@ domain </summary> </param> </interface> -<interface name="init_write_runtime_socket" lineno="3250"> +<interface name="init_write_runtime_socket" lineno="3289"> <summary> Allow the specified domain to write to init sock file. @@ -117884,7 +118519,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_runtime_pipes" lineno="3268"> +<interface name="init_read_runtime_pipes" lineno="3307"> <summary> Read init unnamed pipes. </summary> @@ -117894,7 +118529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_runtime_symlinks" lineno="3286"> +<interface name="init_read_runtime_symlinks" lineno="3325"> <summary> read systemd unit symlinks (usually under /run/systemd/units/) </summary> @@ -117904,7 +118539,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_tcp_recvfrom_all_daemons" lineno="3304"> +<interface name="init_tcp_recvfrom_all_daemons" lineno="3343"> <summary> Allow the specified domain to connect to daemon with a tcp socket </summary> @@ -117914,7 +118549,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_udp_recvfrom_all_daemons" lineno="3322"> +<interface name="init_udp_recvfrom_all_daemons" lineno="3361"> <summary> Allow the specified domain to connect to daemon with a udp socket </summary> @@ -117924,7 +118559,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_status_files" lineno="3341"> +<interface name="init_read_script_status_files" lineno="3380"> <summary> Allow reading the init script state files </summary> @@ -117934,7 +118569,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="init_relabelto_script_state" lineno="3359"> +<interface name="init_relabelto_script_state" lineno="3398"> <summary> Label to init script status files </summary> @@ -117944,7 +118579,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="init_script_readable_type" lineno="3378"> +<interface name="init_script_readable_type" lineno="3417"> <summary> Mark as a readable type for the initrc_t domain </summary> @@ -117954,7 +118589,7 @@ Type that initrc_t needs read access to </summary> </param> </interface> -<interface name="init_search_units" lineno="3396"> +<interface name="init_search_units" lineno="3435"> <summary> Search systemd unit dirs. </summary> @@ -117964,7 +118599,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_list_unit_dirs" lineno="3421"> +<interface name="init_list_unit_dirs" lineno="3460"> <summary> List systemd unit dirs. </summary> @@ -117974,7 +118609,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_generic_units_files" lineno="3441"> +<interface name="init_getattr_generic_units_files" lineno="3480"> +<summary> +Get the attributes of systemd unit files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_read_generic_units_files" lineno="3498"> <summary> Read systemd unit files </summary> @@ -117984,7 +118629,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_generic_units_symlinks" lineno="3459"> +<interface name="init_read_generic_units_symlinks" lineno="3516"> <summary> Read systemd unit links </summary> @@ -117994,7 +118639,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_get_generic_units_status" lineno="3477"> +<interface name="init_get_generic_units_status" lineno="3534"> <summary> Get status of generic systemd units. </summary> @@ -118004,7 +118649,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_start_generic_units" lineno="3496"> +<interface name="init_start_generic_units" lineno="3553"> <summary> Start generic systemd units. </summary> @@ -118014,7 +118659,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stop_generic_units" lineno="3515"> +<interface name="init_stop_generic_units" lineno="3572"> <summary> Stop generic systemd units. </summary> @@ -118024,7 +118669,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_reload_generic_units" lineno="3534"> +<interface name="init_reload_generic_units" lineno="3591"> <summary> Reload generic systemd units. </summary> @@ -118034,7 +118679,47 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_get_all_units_status" lineno="3553"> +<interface name="init_get_transient_units_status" lineno="3610"> +<summary> +Get status of transient systemd units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_start_transient_units" lineno="3629"> +<summary> +Start transient systemd units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_stop_transient_units" lineno="3648"> +<summary> +Stop transient systemd units. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_reload_transient_units" lineno="3667"> +<summary> +Reload transient systemd units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_get_all_units_status" lineno="3687"> <summary> Get status of all systemd units. </summary> @@ -118044,7 +118729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_all_units" lineno="3572"> +<interface name="init_manage_all_units" lineno="3706"> <summary> All perms on all systemd units. </summary> @@ -118054,7 +118739,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_start_all_units" lineno="3592"> +<interface name="init_start_all_units" lineno="3726"> <summary> Start all systemd units. </summary> @@ -118064,7 +118749,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stop_all_units" lineno="3611"> +<interface name="init_stop_all_units" lineno="3745"> <summary> Stop all systemd units. </summary> @@ -118074,7 +118759,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_reload_all_units" lineno="3630"> +<interface name="init_reload_all_units" lineno="3764"> <summary> Reload all systemd units. </summary> @@ -118084,7 +118769,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_all_unit_files" lineno="3649"> +<interface name="init_manage_all_unit_files" lineno="3783"> <summary> Manage systemd unit dirs and the files in them </summary> @@ -118094,7 +118779,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_linkable_keyring" lineno="3670"> +<interface name="init_linkable_keyring" lineno="3804"> <summary> Associate the specified domain to be a domain whose keyring init should be allowed to link. @@ -118105,7 +118790,7 @@ Domain whose keyring init should be allowed to link. </summary> </param> </interface> -<interface name="init_admin" lineno="3688"> +<interface name="init_admin" lineno="3822"> <summary> Allow unconfined access to send instructions to init </summary> @@ -118115,7 +118800,7 @@ Target domain </summary> </param> </interface> -<interface name="init_getrlimit" lineno="3720"> +<interface name="init_getrlimit" lineno="3854"> <summary> Allow getting init_t rlimit </summary> @@ -118412,7 +119097,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="iptables_run" lineno="43"> +<interface name="iptables_run" lineno="41"> <summary> Execute iptables in the iptables domain, and allow the specified role the iptables domain. @@ -118429,7 +119114,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="iptables_exec" lineno="62"> +<interface name="iptables_exec" lineno="60"> <summary> Execute iptables in the caller domain. </summary> @@ -118439,7 +119124,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_initrc_domtrans" lineno="82"> +<interface name="iptables_initrc_domtrans" lineno="80"> <summary> Execute iptables init scripts in the init script domain. @@ -118450,7 +119135,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="iptables_setattr_config" lineno="100"> +<interface name="iptables_setattr_config" lineno="98"> <summary> Set the attributes of iptables config files. </summary> @@ -118460,7 +119145,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_read_config" lineno="119"> +<interface name="iptables_read_config" lineno="117"> <summary> Read iptables config files. </summary> @@ -118470,7 +119155,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_etc_filetrans_config" lineno="140"> +<interface name="iptables_etc_filetrans_config" lineno="138"> <summary> Create files in /etc with the type used for the iptables config files. @@ -118481,7 +119166,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_manage_config" lineno="158"> +<interface name="iptables_manage_config" lineno="156"> <summary> Manage iptables config files. </summary> @@ -118491,7 +119176,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_dontaudit_read_pids" lineno="177"> +<interface name="iptables_dontaudit_read_pids" lineno="175"> <summary> dontaudit reading iptables_runtime_t (Deprecated) </summary> @@ -118501,7 +119186,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="iptables_dontaudit_read_runtime_files" lineno="192"> +<interface name="iptables_dontaudit_read_runtime_files" lineno="190"> <summary> Do not audit reading iptables runtime files. </summary> @@ -118511,7 +119196,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="iptables_startstop" lineno="210"> +<interface name="iptables_startstop" lineno="208"> <summary> Allow specified domain to start and stop iptables service </summary> @@ -118521,7 +119206,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_status" lineno="229"> +<interface name="iptables_status" lineno="227"> <summary> Allow specified domain to get status of iptables service </summary> @@ -118531,7 +119216,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_admin" lineno="256"> +<interface name="iptables_admin" lineno="254"> <summary> All of the rules required to administrate an iptables @@ -118743,7 +119428,24 @@ Domain to not audit. </summary> </param> </interface> -<interface name="libs_manage_lib_dirs" lineno="246"> +<interface name="libs_dontaudit_manage_lib_dirs" lineno="253"> +<summary> +Do not audit attempts to manage to library directories. +</summary> +<desc> +<p> +Do not audit attempts to manage to library directories. +Typically this is used to quiet attempts to recompile +python byte code. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="libs_manage_lib_dirs" lineno="271"> <summary> Create, read, write, and delete library directories. </summary> @@ -118753,7 +119455,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_dontaudit_setattr_lib_files" lineno="264"> +<interface name="libs_dontaudit_setattr_lib_files" lineno="289"> <summary> dontaudit attempts to setattr on library files </summary> @@ -118763,7 +119465,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="libs_read_lib_files" lineno="283"> +<interface name="libs_read_lib_files" lineno="308"> <summary> Read files in the library directories, such as static libraries. @@ -118774,7 +119476,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_exec_lib_files" lineno="304"> +<interface name="libs_exec_lib_files" lineno="329"> <summary> Execute library scripts in the caller domain. </summary> @@ -118784,7 +119486,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_manage_lib_files" lineno="327"> +<interface name="libs_manage_lib_files" lineno="352"> <summary> Create, read, write, and delete generic files in library directories. @@ -118795,7 +119497,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_relabelto_lib_files" lineno="345"> +<interface name="libs_dontaudit_manage_lib_files" lineno="371"> +<summary> +Do not audit attempts to create, read, write, +and delete generic files in library directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="libs_relabelto_lib_files" lineno="389"> <summary> Relabel files to the type used in library directories. </summary> @@ -118805,7 +119518,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_relabel_lib_files" lineno="365"> +<interface name="libs_relabel_lib_files" lineno="409"> <summary> Relabel to and from the type used for generic lib files. @@ -118816,7 +119529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_delete_lib_symlinks" lineno="384"> +<interface name="libs_delete_lib_symlinks" lineno="428"> <summary> Delete generic symlinks in library directories. </summary> @@ -118826,7 +119539,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_manage_lib_symlinks" lineno="402"> +<interface name="libs_manage_lib_symlinks" lineno="446"> <summary> Manage generic symlinks in library directories. </summary> @@ -118836,7 +119549,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_manage_shared_libs" lineno="421"> +<interface name="libs_manage_shared_libs" lineno="465"> <summary> Create, read, write, and delete shared libraries. </summary> @@ -118846,7 +119559,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_use_shared_libs" lineno="439"> +<interface name="libs_use_shared_libs" lineno="483"> <summary> Load and execute functions from shared libraries. </summary> @@ -118856,7 +119569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_legacy_use_shared_libs" lineno="462"> +<interface name="libs_legacy_use_shared_libs" lineno="506"> <summary> Load and execute functions from shared libraries, with legacy support. @@ -118867,7 +119580,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_relabel_shared_libs" lineno="483"> +<interface name="libs_relabel_shared_libs" lineno="527"> <summary> Relabel to and from the type used for shared libraries. @@ -118878,7 +119591,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="516"> +<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="560"> <summary> Create an object in etc with a type transition to the ld_so_cache_t type @@ -118901,7 +119614,7 @@ Name of the resource created for which a type transition occurs </summary> </param> </interface> -<interface name="libs_lib_filetrans" lineno="550"> +<interface name="libs_lib_filetrans" lineno="594"> <summary> Create an object in the generic lib location with a type transition to the provided type @@ -118927,7 +119640,7 @@ Name of the resource created for which a type transition should occur </summary> </param> </interface> -<interface name="libs_relabel_lib_dirs" lineno="571"> +<interface name="libs_relabel_lib_dirs" lineno="615"> <summary> Relabel to and from the type used for generic lib directories. @@ -122118,7 +122831,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_domtrans_ifconfig" lineno="627"> +<interface name="sysnet_manage_dhcpc_runtime_files" lineno="627"> +<summary> +Create, read, write, and delete dhcp client runtime files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_domtrans_ifconfig" lineno="645"> <summary> Execute ifconfig in the ifconfig domain. </summary> @@ -122128,7 +122851,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="sysnet_run_ifconfig" lineno="654"> +<interface name="sysnet_run_ifconfig" lineno="672"> <summary> Execute ifconfig in the ifconfig domain, and allow the specified role the ifconfig domain, @@ -122146,7 +122869,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_exec_ifconfig" lineno="674"> +<interface name="sysnet_exec_ifconfig" lineno="692"> <summary> Execute ifconfig in the caller domain. </summary> @@ -122156,7 +122879,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_signal_ifconfig" lineno="694"> +<interface name="sysnet_signal_ifconfig" lineno="712"> <summary> Send a generic signal to ifconfig. </summary> @@ -122167,7 +122890,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_signull_ifconfig" lineno="713"> +<interface name="sysnet_signull_ifconfig" lineno="731"> <summary> Send null signals to ifconfig. </summary> @@ -122178,7 +122901,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_create_netns_dirs" lineno="732"> +<interface name="sysnet_create_netns_dirs" lineno="750"> <summary> Create the /run/netns directory with an automatic type transition. @@ -122189,7 +122912,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_netns_filetrans" lineno="766"> +<interface name="sysnet_netns_filetrans" lineno="784"> <summary> Create an object in the /run/netns directory with a private type. @@ -122215,7 +122938,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="sysnet_read_dhcp_config" lineno="787"> +<interface name="sysnet_read_dhcp_config" lineno="805"> <summary> Read the DHCP configuration files. </summary> @@ -122225,7 +122948,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_search_dhcp_state" lineno="807"> +<interface name="sysnet_search_dhcp_state" lineno="825"> <summary> Search the DHCP state data directory. </summary> @@ -122235,7 +122958,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_dhcp_state_filetrans" lineno="851"> +<interface name="sysnet_dhcp_state_filetrans" lineno="869"> <summary> Create DHCP state data. </summary> @@ -122270,7 +122993,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="sysnet_dns_name_resolve" lineno="871"> +<interface name="sysnet_dns_name_resolve" lineno="889"> <summary> Perform a DNS name resolution. </summary> @@ -122281,7 +123004,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_use_ldap" lineno="921"> +<interface name="sysnet_use_ldap" lineno="940"> <summary> Connect and use a LDAP server. </summary> @@ -122291,7 +123014,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_use_portmap" lineno="948"> +<interface name="sysnet_use_portmap" lineno="967"> <summary> Connect and use remote port mappers. </summary> @@ -122301,7 +123024,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_dhcpc_script_entry" lineno="982"> +<interface name="sysnet_dhcpc_script_entry" lineno="1001"> <summary> Make the specified program domain accessable from the DHCP hooks/scripts. @@ -122353,7 +123076,7 @@ The type for the user pty </summary> </param> </template> -<template name="systemd_user_daemon_domain" lineno="205"> +<template name="systemd_user_daemon_domain" lineno="221"> <summary> Allow the specified domain to be started as a daemon by the specified systemd user instance. @@ -122374,7 +123097,7 @@ Domain to allow the systemd user domain to run. </summary> </param> </template> -<interface name="systemd_user_activated_sock_file" lineno="226"> +<interface name="systemd_user_activated_sock_file" lineno="242"> <summary> Associate the specified file type to be a type whose sock files can be managed by systemd user instances for socket activation. @@ -122385,7 +123108,7 @@ File type to be associated. </summary> </param> </interface> -<interface name="systemd_user_unix_stream_activated_socket" lineno="251"> +<interface name="systemd_user_unix_stream_activated_socket" lineno="267"> <summary> Associate the specified domain to be a domain whose unix stream sockets and sock files can be managed by systemd user instances @@ -122402,7 +123125,7 @@ File type of the domain's sock files to be associated. </summary> </param> </interface> -<template name="systemd_user_send_systemd_notify" lineno="277"> +<template name="systemd_user_send_systemd_notify" lineno="293"> <summary> Allow the target domain the permissions necessary to use systemd notify when started by the specified @@ -122419,7 +123142,7 @@ Domain to be allowed systemd notify permissions. </summary> </param> </template> -<template name="systemd_user_app_status" lineno="305"> +<template name="systemd_user_app_status" lineno="321"> <summary> Allow the target domain to be monitored and have its output captured by the specified systemd user instance domain. @@ -122435,7 +123158,7 @@ Domain to allow the systemd user instance to monitor. </summary> </param> </template> -<template name="systemd_read_user_manager_state" lineno="345"> +<template name="systemd_read_user_manager_state" lineno="361"> <summary> Read the process state (/proc/pid) of the specified systemd user instance. @@ -122451,7 +123174,7 @@ Domain allowed access. </summary> </param> </template> -<template name="systemd_user_manager_system_start" lineno="369"> +<template name="systemd_user_manager_system_start" lineno="385"> <summary> Send a start request to the specified systemd user instance system object. @@ -122467,7 +123190,7 @@ Domain allowed access. </summary> </param> </template> -<template name="systemd_user_manager_system_stop" lineno="393"> +<template name="systemd_user_manager_system_stop" lineno="409"> <summary> Send a stop request to the specified systemd user instance system object. @@ -122483,7 +123206,7 @@ Domain allowed access. </summary> </param> </template> -<template name="systemd_user_manager_system_status" lineno="417"> +<template name="systemd_user_manager_system_status" lineno="433"> <summary> Get the status of the specified systemd user instance system object. @@ -122499,7 +123222,7 @@ Domain allowed access. </summary> </param> </template> -<template name="systemd_user_manager_dbus_chat" lineno="441"> +<template name="systemd_user_manager_dbus_chat" lineno="457"> <summary> Send and receive messages from the specified systemd user instance over dbus. @@ -122515,7 +123238,7 @@ Domain allowed access. </summary> </param> </template> -<interface name="systemd_search_conf_home_content" lineno="462"> +<interface name="systemd_search_conf_home_content" lineno="478"> <summary> Allow the specified domain to search systemd config home content. @@ -122526,7 +123249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_conf_home_content" lineno="481"> +<interface name="systemd_manage_conf_home_content" lineno="497"> <summary> Allow the specified domain to manage systemd config home content. @@ -122537,7 +123260,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabel_conf_home_content" lineno="502"> +<interface name="systemd_relabel_conf_home_content" lineno="518"> <summary> Allow the specified domain to relabel systemd config home content. @@ -122548,7 +123271,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_search_data_home_content" lineno="523"> +<interface name="systemd_search_data_home_content" lineno="539"> <summary> Allow the specified domain to search systemd data home content. @@ -122559,7 +123282,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_data_home_content" lineno="542"> +<interface name="systemd_manage_data_home_content" lineno="558"> <summary> Allow the specified domain to manage systemd data home content. @@ -122570,7 +123293,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabel_data_home_content" lineno="563"> +<interface name="systemd_relabel_data_home_content" lineno="579"> <summary> Allow the specified domain to relabel systemd data home content. @@ -122581,7 +123304,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_search_user_runtime" lineno="584"> +<interface name="systemd_search_user_runtime" lineno="600"> <summary> Allow the specified domain to search systemd user runtime content. @@ -122592,7 +123315,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_user_runtime_files" lineno="602"> +<interface name="systemd_read_user_runtime_files" lineno="618"> <summary> Allow the specified domain to read systemd user runtime files. </summary> @@ -122602,7 +123325,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_user_runtime_lnk_files" lineno="620"> +<interface name="systemd_read_user_runtime_lnk_files" lineno="636"> <summary> Allow the specified domain to read systemd user runtime lnk files. </summary> @@ -122612,7 +123335,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_user_runtime_socket" lineno="639"> +<interface name="systemd_write_user_runtime_socket" lineno="655"> <summary> Allow the specified domain to write to the systemd user runtime named socket. @@ -122623,7 +123346,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_user_unit_files" lineno="658"> +<interface name="systemd_read_user_unit_files" lineno="674"> +<summary> +Allow the specified domain to read system-wide systemd +user unit files. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_read_user_units_files" lineno="690"> <summary> Allow the specified domain to read system-wide systemd user unit files. @@ -122634,7 +123368,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_user_runtime_units" lineno="678"> +<interface name="systemd_read_user_runtime_units" lineno="710"> +<summary> +Allow the specified domain to read systemd user runtime unit files. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_read_user_runtime_units_files" lineno="725"> <summary> Allow the specified domain to read systemd user runtime unit files. </summary> @@ -122644,7 +123388,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_search_user_runtime_unit_dirs" lineno="698"> +<interface name="systemd_search_user_runtime_unit_dirs" lineno="745"> <summary> Allow the specified domain to search systemd user runtime unit directories. @@ -122655,7 +123399,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_list_user_runtime_unit_dirs" lineno="717"> +<interface name="systemd_list_user_runtime_unit_dirs" lineno="764"> <summary> Allow the specified domain to list the contents of systemd user runtime unit directories. @@ -122666,7 +123410,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_status_user_runtime_units" lineno="735"> +<interface name="systemd_status_user_runtime_units" lineno="782"> +<summary> +Allow the specified domain to get the status of systemd user runtime units. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_get_user_runtime_units_status" lineno="797"> <summary> Allow the specified domain to get the status of systemd user runtime units. </summary> @@ -122676,7 +123430,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_start_user_runtime_units" lineno="754"> +<interface name="systemd_start_user_runtime_units" lineno="816"> <summary> Allow the specified domain to start systemd user runtime units. </summary> @@ -122686,7 +123440,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stop_user_runtime_units" lineno="773"> +<interface name="systemd_stop_user_runtime_units" lineno="835"> <summary> Allow the specified domain to stop systemd user runtime units. </summary> @@ -122696,7 +123450,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_reload_user_runtime_units" lineno="792"> +<interface name="systemd_reload_user_runtime_units" lineno="854"> <summary> Allow the specified domain to reload systemd user runtime units. </summary> @@ -122706,7 +123460,79 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_log_parse_environment" lineno="812"> +<interface name="systemd_read_user_transient_units_files" lineno="873"> +<summary> +Allow the specified domain to read systemd user transient unit files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_search_user_transient_unit_dirs" lineno="893"> +<summary> +Allow the specified domain to search systemd user transient unit +directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_list_user_transient_unit_dirs" lineno="912"> +<summary> +Allow the specified domain to list the contents of systemd +user transient unit directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_get_user_transient_units_status" lineno="930"> +<summary> +Allow the specified domain to get the status of systemd user transient units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_start_user_transient_units" lineno="949"> +<summary> +Allow the specified domain to start systemd user transient units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_stop_user_transient_units" lineno="968"> +<summary> +Allow the specified domain to stop systemd user transient units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_reload_user_transient_units" lineno="987"> +<summary> +Allow the specified domain to reload systemd user transient units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_log_parse_environment" lineno="1007"> <summary> Make the specified type usable as an log parse environment type. @@ -122717,7 +123543,7 @@ Type to be used as a log parse environment type. </summary> </param> </interface> -<interface name="systemd_use_nss" lineno="832"> +<interface name="systemd_use_nss" lineno="1027"> <summary> Allow domain to use systemd's Name Service Switch (NSS) module. This module provides UNIX user and group name resolution for dynamic users @@ -122729,7 +123555,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="systemd_PrivateDevices" lineno="859"> +<interface name="systemd_PrivateDevices" lineno="1054"> <summary> Allow domain to be used as a systemd service with a unit that uses PrivateDevices=yes in section [Service]. @@ -122740,7 +123566,17 @@ Domain allowed access </summary> </param> </interface> -<interface name="systemd_read_hwdb" lineno="876"> +<interface name="systemd_rw_homework_semaphores" lineno="1071"> +<summary> +Read and write systemd-homework semaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access +</summary> +</param> +</interface> +<interface name="systemd_read_hwdb" lineno="1089"> <summary> Allow domain to read udev hwdb file </summary> @@ -122750,7 +123586,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_map_hwdb" lineno="894"> +<interface name="systemd_map_hwdb" lineno="1107"> <summary> Allow domain to map udev hwdb file </summary> @@ -122760,7 +123596,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_read_logind_pids" lineno="912"> +<interface name="systemd_read_logind_pids" lineno="1125"> <summary> Read systemd_login PID files. (Deprecated) </summary> @@ -122770,7 +123606,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_logind_pid_pipes" lineno="927"> +<interface name="systemd_manage_logind_pid_pipes" lineno="1140"> <summary> Manage systemd_login PID pipes. (Deprecated) </summary> @@ -122780,7 +123616,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_logind_pid_pipes" lineno="942"> +<interface name="systemd_write_logind_pid_pipes" lineno="1155"> <summary> Write systemd_login named pipe. (Deprecated) </summary> @@ -122790,7 +123626,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_watch_logind_runtime_dirs" lineno="957"> +<interface name="systemd_watch_logind_runtime_dirs" lineno="1170"> <summary> Watch systemd-logind runtime dirs. </summary> @@ -122800,7 +123636,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_logind_runtime_files" lineno="976"> +<interface name="systemd_read_logind_runtime_files" lineno="1189"> <summary> Read systemd-logind runtime files. </summary> @@ -122810,7 +123646,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_logind_runtime_pipes" lineno="996"> +<interface name="systemd_manage_logind_runtime_pipes" lineno="1209"> <summary> Manage systemd-logind runtime pipes. </summary> @@ -122820,7 +123656,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_logind_runtime_pipes" lineno="1015"> +<interface name="systemd_write_logind_runtime_pipes" lineno="1228"> <summary> Write systemd-logind runtime named pipe. </summary> @@ -122830,7 +123666,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_use_logind_fds" lineno="1036"> +<interface name="systemd_use_logind_fds" lineno="1249"> <summary> Use inherited systemd logind file descriptors. @@ -122841,7 +123677,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_watch_logind_sessions_dirs" lineno="1054"> +<interface name="systemd_watch_logind_sessions_dirs" lineno="1267"> <summary> Watch logind sessions dirs. </summary> @@ -122851,7 +123687,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_logind_sessions_files" lineno="1073"> +<interface name="systemd_read_logind_sessions_files" lineno="1286"> <summary> Read logind sessions files. </summary> @@ -122861,7 +123697,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1094"> +<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1307"> <summary> Write inherited logind sessions pipes. </summary> @@ -122871,7 +123707,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1114"> +<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1327"> <summary> Write inherited logind inhibit pipes. </summary> @@ -122881,7 +123717,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_dbus_chat_logind" lineno="1135"> +<interface name="systemd_dbus_chat_logind" lineno="1348"> <summary> Send and receive messages from systemd logind over dbus. @@ -122892,7 +123728,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_status_logind" lineno="1155"> +<interface name="systemd_status_logind" lineno="1368"> <summary> Get the system status information from systemd_login </summary> @@ -122902,7 +123738,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_signull_logind" lineno="1174"> +<interface name="systemd_signull_logind" lineno="1387"> <summary> Send systemd_login a null signal. </summary> @@ -122912,7 +123748,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_userdb_runtime_dirs" lineno="1192"> +<interface name="systemd_manage_userdb_runtime_dirs" lineno="1405"> <summary> Manage systemd userdb runtime directories. </summary> @@ -122922,7 +123758,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1210"> +<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1423"> <summary> Manage socket files under /run/systemd/userdb . </summary> @@ -122932,7 +123768,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stream_connect_userdb" lineno="1228"> +<interface name="systemd_stream_connect_userdb" lineno="1441"> <summary> Connect to /run/systemd/userdb/io.systemd.DynamicUser . </summary> @@ -122942,7 +123778,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_machines" lineno="1249"> +<interface name="systemd_read_machines" lineno="1463"> <summary> Allow reading /run/systemd/machines </summary> @@ -122952,7 +123788,7 @@ Domain that can access the machines files </summary> </param> </interface> -<interface name="systemd_connect_machined" lineno="1268"> +<interface name="systemd_connect_machined" lineno="1482"> <summary> Allow connecting to /run/systemd/userdb/io.systemd.Machine socket </summary> @@ -122962,7 +123798,7 @@ Domain that can access the socket </summary> </param> </interface> -<interface name="systemd_dbus_chat_machined" lineno="1287"> +<interface name="systemd_dbus_chat_machined" lineno="1501"> <summary> Send and receive messages from systemd machined over dbus. @@ -122973,7 +123809,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_dbus_chat_hostnamed" lineno="1308"> +<interface name="systemd_dbus_chat_hostnamed" lineno="1522"> <summary> Send and receive messages from systemd hostnamed over dbus. @@ -122984,7 +123820,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_use_passwd_agent_fds" lineno="1328"> +<interface name="systemd_use_passwd_agent_fds" lineno="1542"> <summary> allow systemd_passwd_agent to inherit fds </summary> @@ -122994,7 +123830,7 @@ Domain that owns the fds </summary> </param> </interface> -<interface name="systemd_run_passwd_agent" lineno="1351"> +<interface name="systemd_run_passwd_agent" lineno="1565"> <summary> allow systemd_passwd_agent to be run by admin </summary> @@ -123009,7 +123845,7 @@ role that it runs in </summary> </param> </interface> -<interface name="systemd_use_passwd_agent" lineno="1372"> +<interface name="systemd_use_passwd_agent" lineno="1586"> <summary> Allow a systemd_passwd_agent_t process to interact with a daemon that needs a password from the sysadmin. @@ -123020,7 +123856,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1396"> +<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1610"> <summary> Transition to systemd_passwd_runtime_t when creating dirs </summary> @@ -123030,9 +123866,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1417"> +<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1631"> <summary> -Transition to systemd_userdb_runtime_t when +Transition to systemd_userdbd_runtime_t when creating the userdb directory inside an init runtime directory. </summary> @@ -123042,7 +123878,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1435"> +<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1649"> <summary> Allow to domain to create systemd-passwd symlink </summary> @@ -123052,7 +123888,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_watch_passwd_runtime_dirs" lineno="1453"> +<interface name="systemd_watch_passwd_runtime_dirs" lineno="1667"> <summary> Allow a domain to watch systemd-passwd runtime dirs. </summary> @@ -123062,7 +123898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_all_units" lineno="1471"> +<interface name="systemd_manage_all_units" lineno="1685"> <summary> manage systemd unit dirs and the files in them (Deprecated) </summary> @@ -123072,7 +123908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_list_journal_dirs" lineno="1486"> +<interface name="systemd_list_journal_dirs" lineno="1700"> <summary> Allow domain to list the contents of systemd_journal_t dirs </summary> @@ -123082,7 +123918,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_journal_files" lineno="1504"> +<interface name="systemd_read_journal_files" lineno="1718"> <summary> Allow domain to read systemd_journal_t files </summary> @@ -123092,7 +123928,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_journal_files" lineno="1523"> +<interface name="systemd_manage_journal_files" lineno="1737"> <summary> Allow domain to create/manage systemd_journal_t files </summary> @@ -123102,7 +123938,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_watch_journal_dirs" lineno="1543"> +<interface name="systemd_watch_journal_dirs" lineno="1757"> <summary> Allow domain to add a watch on systemd_journal_t directories </summary> @@ -123112,7 +123948,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_journal_dirs" lineno="1561"> +<interface name="systemd_relabelto_journal_dirs" lineno="1775"> <summary> Relabel to systemd-journald directory type. </summary> @@ -123122,7 +123958,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_journal_files" lineno="1580"> +<interface name="systemd_relabelto_journal_files" lineno="1794"> <summary> Relabel to systemd-journald file type. </summary> @@ -123132,7 +123968,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_networkd_units" lineno="1600"> +<interface name="systemd_read_networkd_units" lineno="1814"> <summary> Allow domain to read systemd_networkd_t unit files </summary> @@ -123142,7 +123978,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_networkd_units" lineno="1620"> +<interface name="systemd_manage_networkd_units" lineno="1834"> <summary> Allow domain to create/manage systemd_networkd_t unit files </summary> @@ -123152,7 +123988,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_enabledisable_networkd" lineno="1640"> +<interface name="systemd_enabledisable_networkd" lineno="1854"> <summary> Allow specified domain to enable systemd-networkd units </summary> @@ -123162,7 +123998,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_startstop_networkd" lineno="1659"> +<interface name="systemd_startstop_networkd" lineno="1873"> <summary> Allow specified domain to start systemd-networkd units </summary> @@ -123172,7 +124008,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_dbus_chat_networkd" lineno="1679"> +<interface name="systemd_dbus_chat_networkd" lineno="1893"> <summary> Send and receive messages from systemd networkd over dbus. @@ -123183,7 +124019,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_status_networkd" lineno="1699"> +<interface name="systemd_status_networkd" lineno="1913"> <summary> Allow specified domain to get status of systemd-networkd </summary> @@ -123193,7 +124029,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1718"> +<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1932"> <summary> Relabel systemd_networkd tun socket. </summary> @@ -123203,7 +124039,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1736"> +<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1950"> <summary> Read/Write from systemd_networkd netlink route socket. </summary> @@ -123213,7 +124049,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_list_networkd_runtime" lineno="1754"> +<interface name="systemd_list_networkd_runtime" lineno="1968"> <summary> Allow domain to list dirs under /run/systemd/netif </summary> @@ -123223,7 +124059,7 @@ domain permitted the access </summary> </param> </interface> -<interface name="systemd_watch_networkd_runtime_dirs" lineno="1773"> +<interface name="systemd_watch_networkd_runtime_dirs" lineno="1987"> <summary> Watch directories under /run/systemd/netif </summary> @@ -123233,7 +124069,7 @@ Domain permitted the access </summary> </param> </interface> -<interface name="systemd_read_networkd_runtime" lineno="1792"> +<interface name="systemd_read_networkd_runtime" lineno="2006"> <summary> Allow domain to read files generated by systemd_networkd </summary> @@ -123243,7 +124079,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_read_logind_state" lineno="1811"> +<interface name="systemd_read_logind_state" lineno="2025"> <summary> Allow systemd_logind_t to read process state for cgroup file </summary> @@ -123253,7 +124089,19 @@ Domain systemd_logind_t may access. </summary> </param> </interface> -<interface name="systemd_start_user_manager_units" lineno="1831"> +<interface name="systemd_create_logind_linger_dir" lineno="2046"> +<summary> +Allow the specified domain to create +the systemd-logind linger directory with +the correct context. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_start_user_manager_units" lineno="2066"> <summary> Allow the specified domain to start systemd user manager units (systemd --user). @@ -123264,7 +124112,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stop_user_manager_units" lineno="1851"> +<interface name="systemd_stop_user_manager_units" lineno="2086"> <summary> Allow the specified domain to stop systemd user manager units (systemd --user). @@ -123275,7 +124123,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_reload_user_manager_units" lineno="1871"> +<interface name="systemd_reload_user_manager_units" lineno="2106"> <summary> Allow the specified domain to reload systemd user manager units (systemd --user). @@ -123286,7 +124134,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_status_user_manager_units" lineno="1891"> +<interface name="systemd_get_user_manager_units_status" lineno="2126"> <summary> Get the status of systemd user manager units (systemd --user). @@ -123297,7 +124145,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_start_power_units" lineno="1910"> +<interface name="systemd_start_power_units" lineno="2145"> <summary> Allow specified domain to start power units </summary> @@ -123307,7 +124155,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="systemd_status_power_units" lineno="1929"> +<interface name="systemd_status_power_units" lineno="2164"> <summary> Get the system status information about power units </summary> @@ -123317,7 +124165,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stream_connect_socket_proxyd" lineno="1948"> +<interface name="systemd_stream_connect_socket_proxyd" lineno="2183"> <summary> Allows connections to the systemd-socket-proxyd's socket. </summary> @@ -123327,7 +124175,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_tmpfiles_conf_file" lineno="1967"> +<interface name="systemd_tmpfiles_conf_file" lineno="2202"> <summary> Make the specified type usable for systemd tmpfiles config files. @@ -123338,7 +124186,7 @@ Type to be used for systemd tmpfiles config files. </summary> </param> </interface> -<interface name="systemd_tmpfiles_creator" lineno="1988"> +<interface name="systemd_tmpfiles_creator" lineno="2223"> <summary> Allow the specified domain to create the tmpfiles config directory with @@ -123350,7 +124198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_tmpfiles_conf_filetrans" lineno="2024"> +<interface name="systemd_tmpfiles_conf_filetrans" lineno="2259"> <summary> Create an object in the systemd tmpfiles config directory, with a private type @@ -123377,7 +124225,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="systemd_list_tmpfiles_conf" lineno="2043"> +<interface name="systemd_list_tmpfiles_conf" lineno="2278"> <summary> Allow domain to list systemd tmpfiles config directory </summary> @@ -123387,7 +124235,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2061"> +<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2296"> <summary> Allow domain to relabel to systemd tmpfiles config directory </summary> @@ -123397,7 +124245,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2079"> +<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2314"> <summary> Allow domain to relabel to systemd tmpfiles config files </summary> @@ -123407,7 +124255,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_tmpfilesd_managed" lineno="2097"> +<interface name="systemd_tmpfilesd_managed" lineno="2332"> <summary> Allow systemd_tmpfiles_t to manage filesystem objects </summary> @@ -123417,7 +124265,18 @@ Type of object to manage </summary> </param> </interface> -<interface name="systemd_dbus_chat_resolved" lineno="2124"> +<interface name="systemd_stream_connect_resolved" lineno="2359"> +<summary> +Connect to systemd resolved over +/run/systemd/resolve/io.systemd.Resolve . +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_dbus_chat_resolved" lineno="2380"> <summary> Send and receive messages from systemd resolved over dbus. @@ -123428,7 +124287,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_resolved_runtime" lineno="2144"> +<interface name="systemd_read_resolved_runtime" lineno="2400"> <summary> Allow domain to read resolv.conf file generated by systemd_resolved </summary> @@ -123438,7 +124297,17 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_getattr_updated_runtime" lineno="2162"> +<interface name="systemd_exec_systemctl" lineno="2422"> +<summary> +Execute the systemctl program. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_getattr_updated_runtime" lineno="2453"> <summary> Allow domain to getattr on .updated file (generated by systemd-update-done </summary> @@ -123448,7 +124317,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_search_all_user_keys" lineno="2180"> +<interface name="systemd_search_all_user_keys" lineno="2471"> <summary> Search keys for the all systemd --user domains. </summary> @@ -123458,7 +124327,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_create_all_user_keys" lineno="2198"> +<interface name="systemd_create_all_user_keys" lineno="2489"> <summary> Create keys for the all systemd --user domains. </summary> @@ -123468,7 +124337,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_all_user_keys" lineno="2216"> +<interface name="systemd_write_all_user_keys" lineno="2507"> <summary> Write keys for the all systemd --user domains. </summary> @@ -123478,7 +124347,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_domtrans_sysusers" lineno="2235"> +<interface name="systemd_domtrans_sysusers" lineno="2526"> <summary> Execute systemd-sysusers in the systemd sysusers domain. @@ -123489,7 +124358,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_run_sysusers" lineno="2260"> +<interface name="systemd_run_sysusers" lineno="2551"> <summary> Run systemd-sysusers with a domain transition. </summary> @@ -123505,7 +124374,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="systemd_use_inherited_machined_ptys" lineno="2280"> +<interface name="systemd_use_inherited_machined_ptys" lineno="2571"> <summary> receive and use a systemd_machined_devpts_t file handle </summary> @@ -123523,6 +124392,13 @@ Enable support for systemd-tmpfiles to manage all non-security files. </p> </desc> </tunable> +<tunable name="systemd_networkd_dhcp_server" dftval="false"> +<desc> +<p> +Allow systemd-networkd to run its DHCPd server component +</p> +</desc> +</tunable> <tunable name="systemd_nspawn_labeled_namespace" dftval="false"> <desc> <p> @@ -124675,7 +125551,7 @@ is the prefix for user_t). </summary> </param> </template> -<template name="userdom_login_user_template" lineno="954"> +<template name="userdom_login_user_template" lineno="958"> <summary> The template for creating a login user. </summary> @@ -124693,7 +125569,7 @@ is the prefix for user_t). </summary> </param> </template> -<template name="userdom_restricted_user_template" lineno="1077"> +<template name="userdom_restricted_user_template" lineno="1081"> <summary> The template for creating a unprivileged login user. </summary> @@ -124711,7 +125587,7 @@ is the prefix for user_t). </summary> </param> </template> -<template name="userdom_restricted_xwindows_user_template" lineno="1118"> +<template name="userdom_restricted_xwindows_user_template" lineno="1122"> <summary> The template for creating a unprivileged xwindows login user. </summary> @@ -124732,7 +125608,7 @@ is the prefix for user_t). </summary> </param> </template> -<template name="userdom_unpriv_user_template" lineno="1201"> +<template name="userdom_unpriv_user_template" lineno="1205"> <summary> The template for creating a unprivileged user roughly equivalent to a regular linux user. @@ -124755,7 +125631,7 @@ is the prefix for user_t). </summary> </param> </template> -<template name="userdom_admin_user_template" lineno="1321"> +<template name="userdom_admin_user_template" lineno="1325"> <summary> The template for creating an administrative user. </summary> @@ -124784,7 +125660,7 @@ is the prefix for sysadm_t). </summary> </param> </template> -<interface name="userdom_security_admin_template" lineno="1501"> +<interface name="userdom_security_admin_template" lineno="1505"> <summary> Allow user to run as a secadm </summary> @@ -124810,7 +125686,7 @@ The role of the object to create. </summary> </param> </interface> -<template name="userdom_xdg_user_template" lineno="1604"> +<template name="userdom_xdg_user_template" lineno="1608"> <summary> Allow user to interact with xdg content types </summary> @@ -124831,7 +125707,7 @@ Domain allowed access. </summary> </param> </template> -<interface name="userdom_user_application_type" lineno="1653"> +<interface name="userdom_user_application_type" lineno="1657"> <summary> Make the specified type usable as a user application domain type. @@ -124842,7 +125718,7 @@ Type to be used as a user application domain. </summary> </param> </interface> -<interface name="userdom_user_application_domain" lineno="1674"> +<interface name="userdom_user_application_domain" lineno="1678"> <summary> Make the specified type usable as a user application domain. @@ -124858,7 +125734,7 @@ Type to be used as the domain entry point. </summary> </param> </interface> -<interface name="userdom_user_home_content" lineno="1691"> +<interface name="userdom_user_home_content" lineno="1695"> <summary> Make the specified type usable in a user home directory. @@ -124870,7 +125746,7 @@ user home directory. </summary> </param> </interface> -<interface name="userdom_user_tmp_file" lineno="1717"> +<interface name="userdom_user_tmp_file" lineno="1721"> <summary> Make the specified type usable as a user temporary file. @@ -124882,7 +125758,7 @@ temporary directories. </summary> </param> </interface> -<interface name="userdom_user_tmpfs_file" lineno="1734"> +<interface name="userdom_user_tmpfs_file" lineno="1738"> <summary> Make the specified type usable as a user tmpfs file. @@ -124894,7 +125770,7 @@ tmpfs directories. </summary> </param> </interface> -<interface name="userdom_attach_admin_tun_iface" lineno="1749"> +<interface name="userdom_attach_admin_tun_iface" lineno="1753"> <summary> Allow domain to attach to TUN devices created by administrative users. </summary> @@ -124904,7 +125780,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_setattr_user_ptys" lineno="1768"> +<interface name="userdom_setattr_user_ptys" lineno="1772"> <summary> Set the attributes of a user pty. </summary> @@ -124914,7 +125790,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_create_user_pty" lineno="1786"> +<interface name="userdom_create_user_pty" lineno="1790"> <summary> Create a user pty. </summary> @@ -124924,7 +125800,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_getattr_user_home_dirs" lineno="1804"> +<interface name="userdom_getattr_user_home_dirs" lineno="1808"> <summary> Get the attributes of user home directories. </summary> @@ -124934,7 +125810,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1823"> +<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1827"> <summary> Do not audit attempts to get the attributes of user home directories. </summary> @@ -124944,7 +125820,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_search_user_home_dirs" lineno="1841"> +<interface name="userdom_search_user_home_dirs" lineno="1845"> <summary> Search user home directories. </summary> @@ -124954,7 +125830,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1868"> +<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1872"> <summary> Do not audit attempts to search user home directories. </summary> @@ -124972,7 +125848,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="userdom_list_user_home_dirs" lineno="1886"> +<interface name="userdom_list_user_home_dirs" lineno="1890"> <summary> List user home directories. </summary> @@ -124982,7 +125858,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1905"> +<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1909"> <summary> Do not audit attempts to list user home subdirectories. </summary> @@ -124992,7 +125868,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_create_user_home_dirs" lineno="1923"> +<interface name="userdom_create_user_home_dirs" lineno="1927"> <summary> Create user home directories. </summary> @@ -125002,7 +125878,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_dirs" lineno="1941"> +<interface name="userdom_manage_user_home_dirs" lineno="1945"> <summary> Manage user home directories. </summary> @@ -125012,7 +125888,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabelto_user_home_dirs" lineno="1959"> +<interface name="userdom_relabelto_user_home_dirs" lineno="1963"> <summary> Relabel to user home directories. </summary> @@ -125022,7 +125898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_home_filetrans_user_home_dir" lineno="1983"> +<interface name="userdom_home_filetrans_user_home_dir" lineno="1987"> <summary> Create directories in the home dir root with the user home directory type. @@ -125038,7 +125914,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_home_domtrans" lineno="2020"> +<interface name="userdom_user_home_domtrans" lineno="2024"> <summary> Do a domain transition to the specified domain when executing a program in the @@ -125067,7 +125943,7 @@ Domain to transition to. </summary> </param> </interface> -<interface name="userdom_dontaudit_search_user_home_content" lineno="2040"> +<interface name="userdom_dontaudit_search_user_home_content" lineno="2044"> <summary> Do not audit attempts to search user home content directories. </summary> @@ -125077,7 +125953,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_list_all_user_home_content" lineno="2058"> +<interface name="userdom_list_all_user_home_content" lineno="2062"> <summary> List all users home content directories. </summary> @@ -125087,7 +125963,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_list_user_home_content" lineno="2077"> +<interface name="userdom_list_user_home_content" lineno="2081"> <summary> List contents of users home directory. </summary> @@ -125097,7 +125973,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_dirs" lineno="2096"> +<interface name="userdom_manage_user_home_content_dirs" lineno="2100"> <summary> Create, read, write, and delete directories in a user home subdirectory. @@ -125108,7 +125984,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_home_content_dirs" lineno="2115"> +<interface name="userdom_delete_all_user_home_content_dirs" lineno="2119"> <summary> Delete all user home content directories. </summary> @@ -125118,7 +125994,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_home_content_dirs" lineno="2135"> +<interface name="userdom_delete_user_home_content_dirs" lineno="2139"> <summary> Delete directories in a user home subdirectory. </summary> @@ -125128,7 +126004,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2153"> +<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2157"> <summary> Set attributes of all user home content directories. </summary> @@ -125138,7 +126014,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2173"> +<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2177"> <summary> Do not audit attempts to set the attributes of user home files. @@ -125149,7 +126025,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_map_user_home_content_files" lineno="2191"> +<interface name="userdom_map_user_home_content_files" lineno="2195"> <summary> Map user home files. </summary> @@ -125159,7 +126035,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_mmap_user_home_content_files" lineno="2209"> +<interface name="userdom_mmap_user_home_content_files" lineno="2213"> <summary> Mmap user home files. </summary> @@ -125169,7 +126045,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_read_user_home_content_files" lineno="2228"> +<interface name="userdom_read_user_home_content_files" lineno="2232"> <summary> Read user home files. </summary> @@ -125179,7 +126055,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2247"> +<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2251"> <summary> Do not audit attempts to read user home files. </summary> @@ -125189,7 +126065,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_all_user_home_content" lineno="2266"> +<interface name="userdom_read_all_user_home_content" lineno="2270"> <summary> Read all user home content, including application-specific resources. </summary> @@ -125199,7 +126075,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="userdom_manage_all_user_home_content" lineno="2288"> +<interface name="userdom_manage_all_user_home_content" lineno="2292"> <summary> Manage all user home content, including application-specific resources. </summary> @@ -125209,7 +126085,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="userdom_map_all_user_home_content_files" lineno="2310"> +<interface name="userdom_map_all_user_home_content_files" lineno="2314"> <summary> Map all user home content, including application-specific resources. </summary> @@ -125219,7 +126095,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2328"> +<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2332"> <summary> Do not audit attempts to append user home files. </summary> @@ -125229,7 +126105,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2346"> +<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2350"> <summary> Do not audit attempts to write user home files. </summary> @@ -125239,7 +126115,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_delete_all_user_home_content_files" lineno="2364"> +<interface name="userdom_delete_all_user_home_content_files" lineno="2368"> <summary> Delete all user home content files. </summary> @@ -125249,7 +126125,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_home_content_files" lineno="2384"> +<interface name="userdom_delete_user_home_content_files" lineno="2388"> <summary> Delete files in a user home subdirectory. </summary> @@ -125259,7 +126135,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_generic_user_home_dirs" lineno="2402"> +<interface name="userdom_relabel_generic_user_home_dirs" lineno="2406"> <summary> Relabel generic user home dirs. </summary> @@ -125269,7 +126145,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_generic_user_home_files" lineno="2420"> +<interface name="userdom_relabel_generic_user_home_files" lineno="2424"> <summary> Relabel generic user home files. </summary> @@ -125279,7 +126155,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2438"> +<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2442"> <summary> Do not audit attempts to relabel user home files. </summary> @@ -125289,7 +126165,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_user_home_content_symlinks" lineno="2456"> +<interface name="userdom_read_user_home_content_symlinks" lineno="2460"> <summary> Read user home subdirectory symbolic links. </summary> @@ -125299,7 +126175,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_exec_user_home_content_files" lineno="2476"> +<interface name="userdom_exec_user_home_content_files" lineno="2480"> <summary> Execute user home files. </summary> @@ -125310,7 +126186,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2503"> +<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2507"> <summary> Do not audit attempts to execute user home files. </summary> @@ -125320,7 +126196,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_files" lineno="2522"> +<interface name="userdom_manage_user_home_content_files" lineno="2526"> <summary> Create, read, write, and delete files in a user home subdirectory. @@ -125331,7 +126207,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2543"> +<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2547"> <summary> Do not audit attempts to create, read, write, and delete directories in a user home subdirectory. @@ -125342,7 +126218,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_symlinks" lineno="2562"> +<interface name="userdom_manage_user_home_content_symlinks" lineno="2566"> <summary> Create, read, write, and delete symbolic links in a user home subdirectory. @@ -125353,7 +126229,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2582"> +<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2586"> <summary> Delete all user home content symbolic links. </summary> @@ -125363,7 +126239,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_home_content_symlinks" lineno="2602"> +<interface name="userdom_delete_user_home_content_symlinks" lineno="2606"> <summary> Delete symbolic links in a user home directory. </summary> @@ -125373,7 +126249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_pipes" lineno="2621"> +<interface name="userdom_manage_user_home_content_pipes" lineno="2625"> <summary> Create, read, write, and delete named pipes in a user home subdirectory. @@ -125384,7 +126260,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_sockets" lineno="2642"> +<interface name="userdom_manage_user_home_content_sockets" lineno="2646"> <summary> Create, read, write, and delete named sockets in a user home subdirectory. @@ -125395,7 +126271,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_user_home_dir_filetrans" lineno="2679"> +<interface name="userdom_user_home_dir_filetrans" lineno="2683"> <summary> Create objects in a user home directory with an automatic type transition to @@ -125422,7 +126298,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_home_content_filetrans" lineno="2716"> +<interface name="userdom_user_home_content_filetrans" lineno="2720"> <summary> Create objects in a directory located in a user home directory with an @@ -125450,7 +126326,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2747"> +<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2751"> <summary> Automatically use the user_cert_t label for selected resources created in a users home directory @@ -125471,7 +126347,7 @@ Name of the resource that is being created </summary> </param> </interface> -<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2777"> +<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2781"> <summary> Create objects in a user home directory with an automatic type transition to @@ -125493,7 +126369,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_exec_user_bin_files" lineno="2796"> +<interface name="userdom_exec_user_bin_files" lineno="2800"> <summary> Execute user executable files. </summary> @@ -125503,7 +126379,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_bin" lineno="2816"> +<interface name="userdom_manage_user_bin" lineno="2820"> <summary> Manage user executable files. </summary> @@ -125513,7 +126389,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_read_user_certs" lineno="2838"> +<interface name="userdom_read_user_certs" lineno="2842"> <summary> Read user SSL certificates. </summary> @@ -125524,7 +126400,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="userdom_dontaudit_manage_user_certs" lineno="2861"> +<interface name="userdom_dontaudit_manage_user_certs" lineno="2865"> <summary> Do not audit attempts to manage the user SSL certificates. @@ -125536,7 +126412,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="userdom_manage_user_certs" lineno="2881"> +<interface name="userdom_manage_user_certs" lineno="2885"> <summary> Manage user SSL certificates. </summary> @@ -125546,7 +126422,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_write_user_tmp_sockets" lineno="2902"> +<interface name="userdom_write_user_tmp_sockets" lineno="2906"> <summary> Write to user temporary named sockets. </summary> @@ -125556,7 +126432,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_list_user_tmp" lineno="2922"> +<interface name="userdom_list_user_tmp" lineno="2926"> <summary> List user temporary directories. </summary> @@ -125566,7 +126442,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_list_user_tmp" lineno="2944"> +<interface name="userdom_dontaudit_list_user_tmp" lineno="2948"> <summary> Do not audit attempts to list user temporary directories. @@ -125577,7 +126453,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_delete_user_tmp_dirs" lineno="2962"> +<interface name="userdom_delete_user_tmp_dirs" lineno="2966"> <summary> Delete users temporary directories. </summary> @@ -125587,7 +126463,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2981"> +<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2985"> <summary> Do not audit attempts to manage users temporary directories. @@ -125598,7 +126474,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_user_tmp_files" lineno="2999"> +<interface name="userdom_read_user_tmp_files" lineno="3003"> <summary> Read user temporary files. </summary> @@ -125608,7 +126484,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_map_user_tmp_files" lineno="3020"> +<interface name="userdom_map_user_tmp_files" lineno="3024"> <summary> Map user temporary files. </summary> @@ -125618,7 +126494,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3039"> +<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3043"> <summary> Do not audit attempts to read users temporary files. @@ -125629,7 +126505,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3058"> +<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3062"> <summary> Do not audit attempts to append users temporary files. @@ -125640,7 +126516,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_rw_user_tmp_files" lineno="3076"> +<interface name="userdom_rw_user_tmp_files" lineno="3080"> <summary> Read and write user temporary files. </summary> @@ -125650,7 +126526,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_tmp_files" lineno="3097"> +<interface name="userdom_delete_user_tmp_files" lineno="3101"> <summary> Delete users temporary files. </summary> @@ -125660,7 +126536,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3116"> +<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3120"> <summary> Do not audit attempts to manage users temporary files. @@ -125671,7 +126547,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_user_tmp_symlinks" lineno="3134"> +<interface name="userdom_read_user_tmp_symlinks" lineno="3138"> <summary> Read user temporary symbolic links. </summary> @@ -125681,7 +126557,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_tmp_symlinks" lineno="3155"> +<interface name="userdom_delete_user_tmp_symlinks" lineno="3159"> <summary> Delete users temporary symbolic links. </summary> @@ -125691,7 +126567,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_dirs" lineno="3174"> +<interface name="userdom_manage_user_tmp_dirs" lineno="3178"> <summary> Create, read, write, and delete user temporary directories. @@ -125702,7 +126578,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_tmp_named_pipes" lineno="3194"> +<interface name="userdom_delete_user_tmp_named_pipes" lineno="3198"> <summary> Delete users temporary named pipes. </summary> @@ -125712,7 +126588,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_files" lineno="3213"> +<interface name="userdom_manage_user_tmp_files" lineno="3217"> <summary> Create, read, write, and delete user temporary files. @@ -125723,7 +126599,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_tmp_named_sockets" lineno="3233"> +<interface name="userdom_delete_user_tmp_named_sockets" lineno="3237"> <summary> Delete users temporary named sockets. </summary> @@ -125733,7 +126609,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_symlinks" lineno="3252"> +<interface name="userdom_manage_user_tmp_symlinks" lineno="3256"> <summary> Create, read, write, and delete user temporary symbolic links. @@ -125744,7 +126620,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3273"> +<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3277"> <summary> Do not audit attempts to read and write temporary pipes. @@ -125755,7 +126631,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_pipes" lineno="3292"> +<interface name="userdom_manage_user_tmp_pipes" lineno="3296"> <summary> Create, read, write, and delete user temporary named pipes. @@ -125766,7 +126642,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_sockets" lineno="3313"> +<interface name="userdom_manage_user_tmp_sockets" lineno="3317"> <summary> Create, read, write, and delete user temporary named sockets. @@ -125777,7 +126653,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_user_tmp_filetrans" lineno="3350"> +<interface name="userdom_user_tmp_filetrans" lineno="3354"> <summary> Create objects in a user temporary directory with an automatic type transition to @@ -125804,7 +126680,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_tmp_filetrans_user_tmp" lineno="3382"> +<interface name="userdom_tmp_filetrans_user_tmp" lineno="3386"> <summary> Create objects in the temporary directory with an automatic type transition to @@ -125826,7 +126702,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_map_user_tmpfs_files" lineno="3400"> +<interface name="userdom_map_user_tmpfs_files" lineno="3404"> <summary> Map user tmpfs files. </summary> @@ -125836,7 +126712,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_read_user_tmpfs_files" lineno="3418"> +<interface name="userdom_read_user_tmpfs_files" lineno="3422"> <summary> Read user tmpfs files. </summary> @@ -125846,7 +126722,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3438"> +<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3442"> <summary> dontaudit Read attempts of user tmpfs files. </summary> @@ -125856,7 +126732,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3457"> +<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3461"> <summary> relabel to/from user tmpfs dirs </summary> @@ -125866,7 +126742,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_tmpfs_files" lineno="3476"> +<interface name="userdom_relabel_user_tmpfs_files" lineno="3480"> <summary> relabel to/from user tmpfs files </summary> @@ -125876,7 +126752,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_user_runtime_content" lineno="3498"> +<interface name="userdom_user_runtime_content" lineno="3502"> <summary> Make the specified type usable in the directory /run/user/%{USERID}/. @@ -125888,7 +126764,7 @@ user_runtime_content_dir_t. </summary> </param> </interface> -<interface name="userdom_search_user_runtime" lineno="3518"> +<interface name="userdom_search_user_runtime" lineno="3522"> <summary> Search users runtime directories. </summary> @@ -125898,7 +126774,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_search_user_runtime_root" lineno="3537"> +<interface name="userdom_search_user_runtime_root" lineno="3541"> <summary> Search user runtime root directories. </summary> @@ -125908,7 +126784,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3557"> +<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3561"> <summary> Do not audit attempts to search user runtime root directories. @@ -125919,7 +126795,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_manage_user_runtime_root_dirs" lineno="3576"> +<interface name="userdom_manage_user_runtime_root_dirs" lineno="3580"> <summary> Create, read, write, and delete user runtime root dirs. @@ -125930,7 +126806,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3595"> +<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3599"> <summary> Relabel to and from user runtime root dirs. </summary> @@ -125940,7 +126816,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_runtime_dirs" lineno="3614"> +<interface name="userdom_manage_user_runtime_dirs" lineno="3618"> <summary> Create, read, write, and delete user runtime dirs. @@ -125951,7 +126827,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_mounton_user_runtime_dirs" lineno="3634"> +<interface name="userdom_mounton_user_runtime_dirs" lineno="3638"> <summary> Mount a filesystem on user runtime dir directories. @@ -125962,7 +126838,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabelto_user_runtime_dirs" lineno="3652"> +<interface name="userdom_relabelto_user_runtime_dirs" lineno="3656"> <summary> Relabel to user runtime directories. </summary> @@ -125972,7 +126848,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3670"> +<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3674"> <summary> Relabel from user runtime directories. </summary> @@ -125982,7 +126858,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_runtime_files" lineno="3688"> +<interface name="userdom_delete_user_runtime_files" lineno="3692"> <summary> delete user runtime files </summary> @@ -125992,7 +126868,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_search_all_user_runtime" lineno="3707"> +<interface name="userdom_search_all_user_runtime" lineno="3711"> <summary> Search users runtime directories. </summary> @@ -126002,7 +126878,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_list_all_user_runtime" lineno="3726"> +<interface name="userdom_list_all_user_runtime" lineno="3730"> <summary> List user runtime directories. </summary> @@ -126012,7 +126888,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_dirs" lineno="3745"> +<interface name="userdom_delete_all_user_runtime_dirs" lineno="3749"> <summary> delete user runtime directories </summary> @@ -126022,7 +126898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_files" lineno="3763"> +<interface name="userdom_delete_all_user_runtime_files" lineno="3767"> <summary> delete user runtime files </summary> @@ -126032,7 +126908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3781"> +<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3785"> <summary> delete user runtime symlink files </summary> @@ -126042,7 +126918,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3799"> +<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3803"> <summary> delete user runtime fifo files </summary> @@ -126052,7 +126928,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3817"> +<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3821"> <summary> delete user runtime socket files </summary> @@ -126062,7 +126938,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3835"> +<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3839"> <summary> delete user runtime blk files </summary> @@ -126072,7 +126948,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3853"> +<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3857"> <summary> delete user runtime chr files </summary> @@ -126082,7 +126958,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3883"> +<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3887"> <summary> Create objects in the pid directory with an automatic type transition to @@ -126104,7 +126980,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3910"> +<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3914"> <summary> Create objects in the runtime directory with an automatic type transition to @@ -126126,7 +127002,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_runtime_filetrans" lineno="3946"> +<interface name="userdom_user_runtime_filetrans" lineno="3950"> <summary> Create objects in a user runtime directory with an automatic type @@ -126154,7 +127030,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3977"> +<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3981"> <summary> Create objects in the user runtime directory with an automatic type transition to @@ -126176,7 +127052,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4007"> +<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4011"> <summary> Create objects in the user runtime root directory with an automatic type transition @@ -126198,7 +127074,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_run_filetrans_user_runtime" lineno="4038"> +<interface name="userdom_user_run_filetrans_user_runtime" lineno="4042"> <summary> Create objects in the user runtime root directory with an automatic type transition @@ -126220,7 +127096,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_rw_user_tmpfs_files" lineno="4056"> +<interface name="userdom_rw_user_tmpfs_files" lineno="4060"> <summary> Read and write user tmpfs files. </summary> @@ -126230,7 +127106,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_tmpfs_files" lineno="4077"> +<interface name="userdom_delete_user_tmpfs_files" lineno="4081"> <summary> Delete user tmpfs files. </summary> @@ -126240,7 +127116,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmpfs_files" lineno="4096"> +<interface name="userdom_manage_user_tmpfs_files" lineno="4100"> <summary> Create, read, write, and delete user tmpfs files. </summary> @@ -126250,7 +127126,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_getattr_user_ttys" lineno="4116"> +<interface name="userdom_getattr_user_ttys" lineno="4120"> <summary> Get the attributes of a user domain tty. </summary> @@ -126260,7 +127136,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4134"> +<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4138"> <summary> Do not audit attempts to get the attributes of a user domain tty. </summary> @@ -126270,7 +127146,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_setattr_user_ttys" lineno="4152"> +<interface name="userdom_setattr_user_ttys" lineno="4156"> <summary> Set the attributes of a user domain tty. </summary> @@ -126280,7 +127156,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4170"> +<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4174"> <summary> Do not audit attempts to set the attributes of a user domain tty. </summary> @@ -126290,7 +127166,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_use_user_ttys" lineno="4188"> +<interface name="userdom_use_user_ttys" lineno="4192"> <summary> Read and write a user domain tty. </summary> @@ -126300,7 +127176,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_user_ptys" lineno="4206"> +<interface name="userdom_use_user_ptys" lineno="4210"> <summary> Read and write a user domain pty. </summary> @@ -126310,7 +127186,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_inherited_user_terminals" lineno="4241"> +<interface name="userdom_use_inherited_user_terminals" lineno="4245"> <summary> Read and write a user TTYs and PTYs. </summary> @@ -126336,7 +127212,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="userdom_use_user_terminals" lineno="4282"> +<interface name="userdom_use_user_terminals" lineno="4286"> <summary> Read, write and open a user TTYs and PTYs. </summary> @@ -126368,7 +127244,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="userdom_dontaudit_use_user_terminals" lineno="4298"> +<interface name="userdom_dontaudit_use_user_terminals" lineno="4302"> <summary> Do not audit attempts to read and write a user domain tty and pty. @@ -126379,7 +127255,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_spec_domtrans_all_users" lineno="4319"> +<interface name="userdom_spec_domtrans_all_users" lineno="4323"> <summary> Execute a shell in all user domains. This is an explicit transition, requiring the @@ -126391,7 +127267,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4342"> +<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4346"> <summary> Execute an Xserver session in all user domains. This is an explicit transition, requiring the @@ -126403,7 +127279,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_spec_domtrans_unpriv_users" lineno="4365"> +<interface name="userdom_spec_domtrans_unpriv_users" lineno="4369"> <summary> Execute a shell in all unprivileged user domains. This is an explicit transition, requiring the @@ -126415,7 +127291,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4388"> +<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4392"> <summary> Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the @@ -126427,7 +127303,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_rw_unpriv_user_semaphores" lineno="4409"> +<interface name="userdom_rw_unpriv_user_semaphores" lineno="4413"> <summary> Read and write unpriviledged user SysV sempaphores. </summary> @@ -126437,7 +127313,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_unpriv_user_semaphores" lineno="4427"> +<interface name="userdom_manage_unpriv_user_semaphores" lineno="4431"> <summary> Manage unpriviledged user SysV sempaphores. </summary> @@ -126447,7 +127323,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4446"> +<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4450"> <summary> Read and write unpriviledged user SysV shared memory segments. @@ -126458,7 +127334,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4465"> +<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4469"> <summary> Manage unpriviledged user SysV shared memory segments. @@ -126469,7 +127345,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4485"> +<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4489"> <summary> Execute bin_t in the unprivileged user domains. This is an explicit transition, requiring the @@ -126481,7 +127357,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4508"> +<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4512"> <summary> Execute all entrypoint files in unprivileged user domains. This is an explicit transition, requiring the @@ -126493,7 +127369,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_search_user_home_content" lineno="4529"> +<interface name="userdom_search_user_home_content" lineno="4533"> <summary> Search users home directories. </summary> @@ -126503,7 +127379,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_signull_unpriv_users" lineno="4548"> +<interface name="userdom_signull_unpriv_users" lineno="4552"> <summary> Send signull to unprivileged user domains. </summary> @@ -126513,7 +127389,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_signal_unpriv_users" lineno="4566"> +<interface name="userdom_signal_unpriv_users" lineno="4570"> <summary> Send general signals to unprivileged user domains. </summary> @@ -126523,7 +127399,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_unpriv_users_fds" lineno="4584"> +<interface name="userdom_use_unpriv_users_fds" lineno="4588"> <summary> Inherit the file descriptors from unprivileged user domains. </summary> @@ -126533,7 +127409,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4612"> +<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4616"> <summary> Do not audit attempts to inherit the file descriptors from unprivileged user domains. @@ -126553,7 +127429,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="userdom_dontaudit_use_user_ptys" lineno="4630"> +<interface name="userdom_dontaudit_use_user_ptys" lineno="4634"> <summary> Do not audit attempts to use user ptys. </summary> @@ -126563,7 +127439,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_relabelto_user_ptys" lineno="4648"> +<interface name="userdom_relabelto_user_ptys" lineno="4652"> <summary> Relabel files to unprivileged user pty types. </summary> @@ -126573,7 +127449,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4667"> +<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4671"> <summary> Do not audit attempts to relabel files from user pty types. @@ -126584,7 +127460,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_write_user_tmp_files" lineno="4685"> +<interface name="userdom_write_user_tmp_files" lineno="4689"> <summary> Write all users files in /tmp </summary> @@ -126594,7 +127470,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4704"> +<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4708"> <summary> Do not audit attempts to write users temporary files. @@ -126605,7 +127481,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_dontaudit_use_user_ttys" lineno="4722"> +<interface name="userdom_dontaudit_use_user_ttys" lineno="4726"> <summary> Do not audit attempts to use user ttys. </summary> @@ -126615,7 +127491,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_all_users_state" lineno="4740"> +<interface name="userdom_read_all_users_state" lineno="4744"> <summary> Read the process state of all user domains. </summary> @@ -126625,7 +127501,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_getattr_all_users" lineno="4760"> +<interface name="userdom_getattr_all_users" lineno="4764"> <summary> Get the attributes of all user domains. </summary> @@ -126635,7 +127511,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_all_users_fds" lineno="4778"> +<interface name="userdom_use_all_users_fds" lineno="4782"> <summary> Inherit the file descriptors from all user domains </summary> @@ -126645,7 +127521,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_use_all_users_fds" lineno="4797"> +<interface name="userdom_dontaudit_use_all_users_fds" lineno="4801"> <summary> Do not audit attempts to inherit the file descriptors from any user domains. @@ -126656,7 +127532,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_signal_all_users" lineno="4815"> +<interface name="userdom_signal_all_users" lineno="4819"> <summary> Send general signals to all user domains. </summary> @@ -126666,7 +127542,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_sigchld_all_users" lineno="4833"> +<interface name="userdom_sigchld_all_users" lineno="4837"> <summary> Send a SIGCHLD signal to all user domains. </summary> @@ -126676,7 +127552,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_read_all_users_keys" lineno="4851"> +<interface name="userdom_read_all_users_keys" lineno="4855"> <summary> Read keys for all user domains. </summary> @@ -126686,7 +127562,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_write_all_users_keys" lineno="4869"> +<interface name="userdom_write_all_users_keys" lineno="4873"> <summary> Write keys for all user domains. </summary> @@ -126696,7 +127572,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_rw_all_users_keys" lineno="4887"> +<interface name="userdom_rw_all_users_keys" lineno="4891"> <summary> Read and write keys for all user domains. </summary> @@ -126706,7 +127582,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_create_all_users_keys" lineno="4905"> +<interface name="userdom_create_all_users_keys" lineno="4909"> <summary> Create keys for all user domains. </summary> @@ -126716,7 +127592,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_all_users_keys" lineno="4923"> +<interface name="userdom_manage_all_users_keys" lineno="4927"> <summary> Manage keys for all user domains. </summary> @@ -126726,7 +127602,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dbus_send_all_users" lineno="4941"> +<interface name="userdom_dbus_send_all_users" lineno="4945"> <summary> Send a dbus message to all user domains. </summary> @@ -126736,7 +127612,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_chr_files" lineno="4963"> +<interface name="userdom_manage_user_tmp_chr_files" lineno="4967"> <summary> Create, read, write, and delete user temporary character files. @@ -126747,7 +127623,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_certs" lineno="4984"> +<interface name="userdom_relabel_user_certs" lineno="4988"> <summary> Allow relabeling resources to user_cert_t </summary> @@ -126757,7 +127633,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5007"> +<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5011"> <summary> Do not audit attempts to read and write unserdomain stream. |