summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--Makefile20
-rw-r--r--ipa-server/ipa-gui/ipa_webgui27
-rwxr-xr-xipa-server/ipa-server.spec6
-rw-r--r--ipa-server/ipa-server.spec.in6
-rw-r--r--ipa-server/selinux/Makefile26
-rw-r--r--ipa-server/selinux/ipa-server-selinux.spec80
-rw-r--r--ipa-server/selinux/ipa-server-selinux.spec.in80
-rw-r--r--ipa-server/selinux/ipa_kpasswd/ipa_kpasswd.fc1
-rw-r--r--ipa-server/selinux/ipa_kpasswd/ipa_kpasswd.te51
-rw-r--r--ipa-server/selinux/ipa_webgui/ipa_webgui.fc11
-rw-r--r--ipa-server/selinux/ipa_webgui/ipa_webgui.te92
11 files changed, 387 insertions, 13 deletions
diff --git a/Makefile b/Makefile
index 41b590ea6..b9fab5f2a 100644
--- a/Makefile
+++ b/Makefile
@@ -49,6 +49,13 @@ RADIUS_ADMINTOOLS_VERSION=$(RADIUS_ADMINTOOLS_MAJOR).$(RADIUS_ADMINTOOLS_MINOR).
RADIUS_ADMINTOOLS_TARBALL_PREFIX=$(PRJ_PREFIX)-radius-admintools-$(RADIUS_ADMINTOOLS_VERSION)
RADIUS_ADMINTOOLS_TARBALL=$(RADIUS_ADMINTOOLS_TARBALL_PREFIX).tgz
+SERV_SELINUX_MAJOR=0
+SERV_SELINUX_MINOR=6
+SERV_SELINUX_RELEASE=0
+SERV_SELINUX_VERSION=$(SERV_SELINUX_MAJOR).$(SERV_SELINUX_MINOR).$(SERV_SELINUX_RELEASE)
+SERV_SELINUX_TARBALL_PREFIX=$(PRJ_PREFIX)-server-selinux-$(SERV_SELINUX_VERSION)
+SERV_SELINUX_TARBALL=$(SERV_SELINUX_TARBALL_PREFIX).tgz
+
LIBDIR ?= /usr/lib
all: bootstrap-autogen
@@ -97,6 +104,9 @@ version-update:
sed s/VERSION/$(RADIUS_ADMINTOOLS_VERSION)/ ipa-radius-admintools/ipa-radius-admintools.spec.in \
> ipa-radius-admintools/ipa-radius-admintools.spec
+ sed s/VERSION/$(SERV_SELINUX_VERSION)/ ipa-server/selinux/ipa-server-selinux.spec.in \
+ > ipa-server/selinux/ipa-server-selinux.spec
+
archive:
-mkdir -p dist
@@ -152,6 +162,9 @@ tarballs:
cd dist; tar cfz sources/$(RADIUS_ADMINTOOLS_TARBALL) $(RADIUS_ADMINTOOLS_TARBALL_PREFIX)
rm -fr dist/$(RADIUS_ADMINTOOLS_TARBALL_PREFIX)
+ # ipa-server/selinux
+ cp dist/sources/$(SERV_TARBALL) dist/sources/$(SERV_SELINUX_TARBALL)
+
rpmroot:
mkdir -p $(RPMBUILD)/BUILD
@@ -200,8 +213,13 @@ rpm-ipa-radius-admintools:
cp rpmbuild/RPMS/noarch/$(PRJ_PREFIX)-radius-admintools-$(RADIUS_ADMINTOOLS_VERSION)-*.rpm dist/rpms/
cp rpmbuild/SRPMS/$(PRJ_PREFIX)-radius-admintools-$(RADIUS_ADMINTOOLS_VERSION)-*.src.rpm dist/srpms/
+rpm-ipa-server-selinux:
+ cp dist/sources/$(SERV_SELINUX_TARBALL) $(RPMBUILD)/SOURCES/.
+ rpmbuild --define "_topdir $(RPMBUILD)" -ba ipa-server/selinux/ipa-server-selinux.spec
+ cp rpmbuild/RPMS/*/$(PRJ_PREFIX)-server-selinux-$(SERV_SELINUX_VERSION)-*.rpm dist/rpms/
+ cp rpmbuild/SRPMS/$(PRJ_PREFIX)-server-selinux-$(SERV_SELINUX_VERSION)-*.src.rpm dist/srpms/
-rpms: rpmroot rpmdistdir rpm-ipa-server rpm-ipa-admin rpm-ipa-python rpm-ipa-client rpm-ipa-radius-server rpm-ipa-radius-admintools
+rpms: rpmroot rpmdistdir rpm-ipa-server rpm-ipa-admin rpm-ipa-python rpm-ipa-client rpm-ipa-radius-server rpm-ipa-radius-admintools rpm-ipa-server-selinux
repodata:
-createrepo -p dist
diff --git a/ipa-server/ipa-gui/ipa_webgui b/ipa-server/ipa-gui/ipa_webgui
index 96558d570..7489073aa 100644
--- a/ipa-server/ipa-gui/ipa_webgui
+++ b/ipa-server/ipa-gui/ipa_webgui
@@ -19,7 +19,6 @@
import os, sys, pwd, grp
from optparse import OptionParser
-import ipa.config
import traceback
import logging
@@ -38,8 +37,7 @@ def parse_options():
parser.add_option("--usage", action="store_true",
help="Program usage")
- args = ipa.config.init_config(sys.argv)
- options, args = parser.parse_args(args)
+ options, args = parser.parse_args(sys.argv)
return options, args
@@ -104,13 +102,13 @@ def main():
if os.path.exists(os.path.join(os.path.dirname(__file__), "Makefile.am")):
devel = True
foreground = True
- logging.basicConfig(level=loglevel,
- stream=sys.stderr)
- else:
- # This log file name needs to be kept in sync with the one in
- # ipa_webgui.cfg
- logging.basicConfig(level=loglevel,
- filename='/var/log/ipa_error.log')
+
+ if not foreground:
+ try:
+ daemonize()
+ except Exception, e:
+ sys.stderr.write("error becoming daemon: " + str(e))
+ sys.exit(1)
if not foreground:
try:
@@ -140,6 +138,15 @@ def main():
except OSError, e:
log.error("Could not set effective user id: %s" % e)
+ if devel:
+ logging.basicConfig(level=loglevel,
+ stream=sys.stderr)
+ else:
+ # This log file name needs to be kept in sync with the one in
+ # ipa_webgui.cfg
+ logging.basicConfig(level=loglevel,
+ filename='/var/log/ipa_error.log')
+
sys.path.append("/usr/share/ipa")
# this must be after sys.path is changed to work correctly
diff --git a/ipa-server/ipa-server.spec b/ipa-server/ipa-server.spec
index a49ea4cd9..d27fbfc74 100755
--- a/ipa-server/ipa-server.spec
+++ b/ipa-server/ipa-server.spec
@@ -1,6 +1,6 @@
Name: ipa-server
Version: 0.6.0
-Release: 7%{?dist}
+Release: 8%{?dist}
Summary: IPA authentication server
Group: System Environment/Base
@@ -17,6 +17,7 @@ BuildRequires: krb5-devel
BuildRequires: nss-devel
BuildRequires: libcap-devel
+Requires: ipa-server-selinux
Requires: ipa-python
Requires: ipa-admintools
Requires: fedora-ds-base >= 1.1
@@ -147,6 +148,9 @@ fi
%attr(700,apache,apache) %dir %{_localstatedir}/cache/ipa/sessions
%changelog
+* Thu Feb 6 2008 Karl MacMillan <kmacmill@redhat.com> = 0.6.0-8
+- Add requirement on ipa-server-selinux
+
* Thu Jan 31 2008 Rob Crittenden <rcritten@redhat.com> = 0.6.0-7
- Marked with wrong license. IPA is GPLv2.
diff --git a/ipa-server/ipa-server.spec.in b/ipa-server/ipa-server.spec.in
index 3b1391a88..bd6f443a8 100644
--- a/ipa-server/ipa-server.spec.in
+++ b/ipa-server/ipa-server.spec.in
@@ -1,6 +1,6 @@
Name: ipa-server
Version: VERSION
-Release: 7%{?dist}
+Release: 8%{?dist}
Summary: IPA authentication server
Group: System Environment/Base
@@ -17,6 +17,7 @@ BuildRequires: krb5-devel
BuildRequires: nss-devel
BuildRequires: libcap-devel
+Requires: ipa-server-selinux
Requires: ipa-python
Requires: ipa-admintools
Requires: fedora-ds-base >= 1.1
@@ -147,6 +148,9 @@ fi
%attr(700,apache,apache) %dir %{_localstatedir}/cache/ipa/sessions
%changelog
+* Thu Feb 6 2008 Karl MacMillan <kmacmill@redhat.com> = 0.6.0-8
+- Add requirement on ipa-server-selinux
+
* Thu Jan 31 2008 Rob Crittenden <rcritten@redhat.com> = 0.6.0-7
- Marked with wrong license. IPA is GPLv2.
diff --git a/ipa-server/selinux/Makefile b/ipa-server/selinux/Makefile
new file mode 100644
index 000000000..9fb5bbe40
--- /dev/null
+++ b/ipa-server/selinux/Makefile
@@ -0,0 +1,26 @@
+SUBDIRS = ipa_webgui ipa_kpasswd
+POLICY_MAKEFILE = /usr/share/selinux/devel/Makefile
+POLICY_DIR = $(DESTDIR)/usr/share/selinux/targeted
+
+all:
+ if [ ! -e $(POLICY_MAKEFILE) ]; then echo "You need to install the SELinux development tools (selinux-policy-devel)" && exit 1; fi
+
+ @for subdir in $(SUBDIRS); do \
+ (cd $$subdir && $(MAKE) -f $(POLICY_MAKEFILE) $@) || exit 1; \
+ done
+
+clean:
+ @for subdir in $(SUBDIRS); do \
+ (cd $$subdir && $(MAKE) -f $(POLICY_MAKEFILE) $@) || exit 1; \
+ done
+
+maintainer-clean: clean
+
+distclean: clean
+
+install: all
+ install -m 644 ipa_webgui/ipa_webgui.pp $(POLICY_DIR)
+ install -m 644 ipa_kpasswd/ipa_kpasswd.pp $(POLICY_DIR)
+
+load:
+ /usr/sbin/semodule -i ipa_webgui/ipa_webgui.pp ipa_kpasswd/ipa_kpasswd.pp
diff --git a/ipa-server/selinux/ipa-server-selinux.spec b/ipa-server/selinux/ipa-server-selinux.spec
new file mode 100644
index 000000000..729dd6e5c
--- /dev/null
+++ b/ipa-server/selinux/ipa-server-selinux.spec
@@ -0,0 +1,80 @@
+%define POLICYCOREUTILSVER 1.33.12-1
+
+Name: ipa-server-selinux
+Version: 0.6.0
+Release: 1%{?dist}
+Summary: IPA server SELinux policies
+
+Group: System Environment/Base
+License: GPLv2
+URL: http://www.freeipa.org
+Source0: ipa-server-%{version}.tgz
+BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
+BuildArch: noarch
+
+BuildRequires: selinux-policy-devel m4 make policycoreutils >= %{POLICYCOREUTILSVER}
+Requires(pre): policycoreutils >= %{POLICYCOREUTILSVER} libsemanage
+
+%description
+SELinux policy for ipa-server
+
+%prep
+%setup -n ipa-server-%{version} -q
+
+%build
+cd selinux
+make
+
+%clean
+%{__rm} -fR %{buildroot}
+
+%install
+%{__rm} -fR %{buildroot}
+cd selinux
+install -d %{buildroot}/%{_usr}/share/selinux/targeted/
+make DESTDIR=%{buildroot} install
+
+%files
+%{_usr}/share/selinux/targeted/ipa_webgui.pp
+%{_usr}/share/selinux/targeted/ipa_kpasswd.pp
+
+
+%define saveFileContext() \
+if [ -s /etc/selinux/config ]; then \
+ . %{_sysconfdir}/selinux/config; \
+ FILE_CONTEXT=%{_sysconfdir}/selinux/%1/contexts/files/file_contexts; \
+ if [ "${SELINUXTYPE}" == %1 -a -f ${FILE_CONTEXT} ]; then \
+ cp -f ${FILE_CONTEXT} ${FILE_CONTEXT}.%{name}; \
+ fi \
+fi;
+
+%define relabel() \
+. %{_sysconfdir}/selinux/config; \
+FILE_CONTEXT=%{_sysconfdir}/selinux/%1/contexts/files/file_contexts; \
+selinuxenabled; \
+if [ $? == 0 -a "${SELINUXTYPE}" == %1 -a -f ${FILE_CONTEXT}.%{name} ]; then \
+ fixfiles -C ${FILE_CONTEXT}.%{name} restore; \
+ rm -f ${FILE_CONTEXT}.%name; \
+fi;
+
+%pre
+%saveFileContext targeted
+
+%post
+semodule -s targeted -i /usr/share/selinux/targeted/ipa_webgui.pp /usr/share/selinux/targeted/ipa_kpasswd.pp
+%relabel targeted
+
+%preun
+if [ $1 = 0 ]; then
+%saveFileContext targeted
+fi
+
+%postun
+if [ $1 = 0 ]; then
+semodule -s targeted -r ipa_webgui ipa_kpasswd
+%relabel targeted
+fi
+
+%changelog
+* Thu Jan 17 2008 Karl MacMillan <kmacmill@redhat.com> - 0.6.0-1
+- Initial version
diff --git a/ipa-server/selinux/ipa-server-selinux.spec.in b/ipa-server/selinux/ipa-server-selinux.spec.in
new file mode 100644
index 000000000..efbf036e7
--- /dev/null
+++ b/ipa-server/selinux/ipa-server-selinux.spec.in
@@ -0,0 +1,80 @@
+%define POLICYCOREUTILSVER 1.33.12-1
+
+Name: ipa-server-selinux
+Version: VERSION
+Release: 1%{?dist}
+Summary: IPA server SELinux policies
+
+Group: System Environment/Base
+License: GPLv2
+URL: http://www.freeipa.org
+Source0: ipa-server-%{version}.tgz
+BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
+BuildArch: noarch
+
+BuildRequires: selinux-policy-devel m4 make policycoreutils >= %{POLICYCOREUTILSVER}
+Requires(pre): policycoreutils >= %{POLICYCOREUTILSVER} libsemanage
+
+%description
+SELinux policy for ipa-server
+
+%prep
+%setup -n ipa-server-%{version} -q
+
+%build
+cd selinux
+make
+
+%clean
+%{__rm} -fR %{buildroot}
+
+%install
+%{__rm} -fR %{buildroot}
+cd selinux
+install -d %{buildroot}/%{_usr}/share/selinux/targeted/
+make DESTDIR=%{buildroot} install
+
+%files
+%{_usr}/share/selinux/targeted/ipa_webgui.pp
+%{_usr}/share/selinux/targeted/ipa_kpasswd.pp
+
+
+%define saveFileContext() \
+if [ -s /etc/selinux/config ]; then \
+ . %{_sysconfdir}/selinux/config; \
+ FILE_CONTEXT=%{_sysconfdir}/selinux/%1/contexts/files/file_contexts; \
+ if [ "${SELINUXTYPE}" == %1 -a -f ${FILE_CONTEXT} ]; then \
+ cp -f ${FILE_CONTEXT} ${FILE_CONTEXT}.%{name}; \
+ fi \
+fi;
+
+%define relabel() \
+. %{_sysconfdir}/selinux/config; \
+FILE_CONTEXT=%{_sysconfdir}/selinux/%1/contexts/files/file_contexts; \
+selinuxenabled; \
+if [ $? == 0 -a "${SELINUXTYPE}" == %1 -a -f ${FILE_CONTEXT}.%{name} ]; then \
+ fixfiles -C ${FILE_CONTEXT}.%{name} restore; \
+ rm -f ${FILE_CONTEXT}.%name; \
+fi;
+
+%pre
+%saveFileContext targeted
+
+%post
+semodule -s targeted -i /usr/share/selinux/targeted/ipa_webgui.pp /usr/share/selinux/targeted/ipa_kpasswd.pp
+%relabel targeted
+
+%preun
+if [ $1 = 0 ]; then
+%saveFileContext targeted
+fi
+
+%postun
+if [ $1 = 0 ]; then
+semodule -s targeted -r ipa_webgui ipa_kpasswd
+%relabel targeted
+fi
+
+%changelog
+* Thu Jan 17 2008 Karl MacMillan <kmacmill@redhat.com> - 0.6.0-1
+- Initial version
diff --git a/ipa-server/selinux/ipa_kpasswd/ipa_kpasswd.fc b/ipa-server/selinux/ipa_kpasswd/ipa_kpasswd.fc
new file mode 100644
index 000000000..2d00253c8
--- /dev/null
+++ b/ipa-server/selinux/ipa_kpasswd/ipa_kpasswd.fc
@@ -0,0 +1 @@
+/usr/sbin/ipa_kpasswd -- gen_context(system_u:object_r:ipa_kpasswd_exec_t,s0)
diff --git a/ipa-server/selinux/ipa_kpasswd/ipa_kpasswd.te b/ipa-server/selinux/ipa_kpasswd/ipa_kpasswd.te
new file mode 100644
index 000000000..81fbad277
--- /dev/null
+++ b/ipa-server/selinux/ipa_kpasswd/ipa_kpasswd.te
@@ -0,0 +1,51 @@
+policy_module(ipa_kpasswd, 1.0)
+
+########################################
+#
+# Declarations
+#
+
+type ipa_kpasswd_t;
+type ipa_kpasswd_exec_t;
+type ipa_kpasswd_var_run_t;
+init_daemon_domain(ipa_kpasswd_t, ipa_kpasswd_exec_t)
+
+########################################
+#
+# IPA kpasswd local policy
+#
+
+allow ipa_kpasswd_t self:tcp_socket create_stream_socket_perms;
+allow ipa_kpasswd_t self:udp_socket create_socket_perms;
+
+files_read_etc_files(ipa_kpasswd_t)
+files_search_usr(ipa_kpasswd_t)
+
+files_pid_file(ipa_kpasswd_var_run_t);
+allow ipa_kpasswd_t ipa_kpasswd_var_run_t:file manage_file_perms;
+files_pid_filetrans(ipa_kpasswd_t,ipa_kpasswd_var_run_t,file)
+
+auth_use_nsswitch(ipa_kpasswd_t)
+
+libs_use_ld_so(ipa_kpasswd_t)
+libs_use_shared_libs(ipa_kpasswd_t)
+
+logging_send_syslog_msg(ipa_kpasswd_t)
+
+miscfiles_read_localization(ipa_kpasswd_t)
+
+kerberos_use(ipa_kpasswd_t)
+
+corenet_tcp_sendrecv_all_if(ipa_kpasswd_t)
+corenet_udp_sendrecv_all_if(ipa_kpasswd_t)
+corenet_raw_sendrecv_all_if(ipa_kpasswd_t)
+corenet_tcp_sendrecv_all_nodes(ipa_kpasswd_t)
+corenet_udp_sendrecv_all_nodes(ipa_kpasswd_t)
+corenet_raw_sendrecv_all_nodes(ipa_kpasswd_t)
+corenet_tcp_sendrecv_all_ports(ipa_kpasswd_t)
+corenet_udp_sendrecv_all_ports(ipa_kpasswd_t)
+corenet_all_recvfrom_unlabeled(ipa_kpasswd_t)
+corenet_tcp_bind_all_nodes(ipa_kpasswd_t)
+corenet_udp_bind_all_nodes(ipa_kpasswd_t)
+corenet_tcp_bind_kerberos_admin_port(ipa_kpasswd_t)
+corenet_udp_bind_kerberos_admin_port(ipa_kpasswd_t)
diff --git a/ipa-server/selinux/ipa_webgui/ipa_webgui.fc b/ipa-server/selinux/ipa_webgui/ipa_webgui.fc
new file mode 100644
index 000000000..dea6105ef
--- /dev/null
+++ b/ipa-server/selinux/ipa_webgui/ipa_webgui.fc
@@ -0,0 +1,11 @@
+#
+# /usr
+#
+/usr/sbin/ipa_webgui -- gen_context(system_u:object_r:ipa_webgui_exec_t,s0)
+
+
+#
+# /var
+#
+/var/log/ipa_error\.log -- gen_context(system_u:object_r:ipa_webgui_log_t,s0)
+/var/cache/ipa(/.*)? gen_context(system_u:object_r:ipa_cache_t,s0)
diff --git a/ipa-server/selinux/ipa_webgui/ipa_webgui.te b/ipa-server/selinux/ipa_webgui/ipa_webgui.te
new file mode 100644
index 000000000..e2fd6d187
--- /dev/null
+++ b/ipa-server/selinux/ipa_webgui/ipa_webgui.te
@@ -0,0 +1,92 @@
+policy_module(ipa_webgui, 1.0)
+
+########################################
+#
+# Declarations
+#
+
+type ipa_webgui_t;
+type ipa_webgui_exec_t;
+type ipa_webgui_var_run_t;
+type ipa_cache_t;
+files_type(ipa_cache_t)
+init_daemon_domain(ipa_webgui_t, ipa_webgui_exec_t)
+
+type ipa_webgui_log_t;
+logging_log_file(ipa_webgui_log_t)
+
+########################################
+#
+# IPA webgui local policy
+#
+
+allow ipa_webgui_t self:tcp_socket create_stream_socket_perms;
+allow ipa_webgui_t self:udp_socket create_socket_perms;
+allow ipa_webgui_t self:process setfscreate;
+
+# This is how the kerberos credential cache is passed to
+# the ipa_webgui process. Unfortunately, the kerberos
+# libraries seem to insist that it be open rw. To top it
+# all off there is no interface for this either.
+require {
+ type httpd_tmp_t;
+}
+allow ipa_webgui_t httpd_tmp_t:file read_file_perms;
+dontaudit ipa_webgui_t httpd_tmp_t:file write;
+
+apache_search_sys_content(ipa_webgui_t)
+apache_read_config(ipa_webgui_t)
+
+corecmd_list_bin(ipa_webgui_t)
+
+miscfiles_read_localization(ipa_webgui_t)
+
+files_list_usr(ipa_webgui_t)
+files_read_etc_files(ipa_webgui_t)
+files_read_usr_files(ipa_webgui_t)
+files_read_usr_symlinks(ipa_webgui_t)
+files_search_etc(ipa_webgui_t)
+files_search_tmp(ipa_webgui_t)
+
+files_pid_file(ipa_webgui_var_run_t)
+allow ipa_webgui_t ipa_webgui_var_run_t:file manage_file_perms;
+files_pid_filetrans(ipa_webgui_t,ipa_webgui_var_run_t,file)
+
+kerberos_read_config(ipa_webgui_t)
+
+kernel_read_system_state(ipa_webgui_t)
+
+auth_use_nsswitch(ipa_webgui_t)
+
+libs_use_ld_so(ipa_webgui_t)
+libs_use_shared_libs(ipa_webgui_t)
+
+logging_search_logs(ipa_webgui_t)
+logging_log_filetrans(ipa_webgui_t,ipa_webgui_log_t,file)
+allow ipa_webgui_t ipa_webgui_log_t:file rw_file_perms;
+
+allow ipa_webgui_t self:capability { setgid setuid };
+
+# /var/cache/ipa/sessions
+files_type(ipa_cache_t)
+manage_dirs_pattern(ipa_webgui_t, ipa_cache_t, ipa_cache_t)
+manage_files_pattern(ipa_webgui_t, ipa_cache_t, ipa_cache_t)
+files_var_filetrans(ipa_webgui_t, ipa_cache_t,dir)
+
+userdom_dontaudit_search_sysadm_home_dirs(ipa_webgui_t)
+
+corenet_tcp_sendrecv_all_if(ipa_webgui_t)
+corenet_udp_sendrecv_all_if(ipa_webgui_t)
+corenet_raw_sendrecv_all_if(ipa_webgui_t)
+corenet_tcp_sendrecv_all_nodes(ipa_webgui_t)
+corenet_udp_sendrecv_all_nodes(ipa_webgui_t)
+corenet_raw_sendrecv_all_nodes(ipa_webgui_t)
+corenet_tcp_sendrecv_all_ports(ipa_webgui_t)
+corenet_udp_sendrecv_all_ports(ipa_webgui_t)
+corenet_all_recvfrom_unlabeled(ipa_webgui_t)
+corenet_tcp_bind_all_nodes(ipa_webgui_t)
+corenet_udp_bind_all_nodes(ipa_webgui_t)
+corenet_tcp_bind_http_cache_port(ipa_webgui_t)
+corenet_tcp_connect_http_cache_port(ipa_webgui_t)
+corenet_tcp_connect_ldap_port(ipa_webgui_t)
+