1chroot_user_selinux(8)    SELinux Policy chroot_user    chroot_user_selinux(8)
2
3
4

NAME

6       chroot_user_selinux   -   Security   Enhanced   Linux  Policy  for  the
7       chroot_user processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the chroot_user processes via  flexible
11       mandatory access control.
12
13       The  chroot_user processes execute with the chroot_user_t SELinux type.
14       You can check if you have these processes running by executing  the  ps
15       command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep chroot_user_t
20
21
22

PROCESS TYPES

24       SELinux defines process types (domains) for each process running on the
25       system
26
27       You can see the context of a process using the -Z option to ps
28
29       Policy governs the access confined processes have  to  files.   SELinux
30       chroot_user  policy  is  very  flexible  allowing  users to setup their
31       chroot_user processes in as secure a method as possible.
32
33       The following process types are defined for chroot_user:
34
35       chroot_user_t
36
37       Note: semanage permissive -a chroot_user_t can  be  used  to  make  the
38       process  type chroot_user_t permissive. SELinux does not deny access to
39       permissive process types, but the AVC (SELinux  denials)  messages  are
40       still generated.
41
42

BOOLEANS

44       SELinux   policy  is  customizable  based  on  least  access  required.
45       chroot_user policy is extremely flexible and has several booleans  that
46       allow  you to manipulate the policy and run chroot_user with the tight‐
47       est access possible.
48
49
50
51       If you want to deny any process from ptracing or  debugging  any  other
52       processes,  you  must  turn  on  the  deny_ptrace  boolean.  Enabled by
53       default.
54
55       setsebool -P deny_ptrace 1
56
57
58
59       If you want to allow any process  to  mmap  any  file  on  system  with
60       attribute  file_type,  you must turn on the domain_can_mmap_files bool‐
61       ean. Enabled by default.
62
63       setsebool -P domain_can_mmap_files 1
64
65
66
67       If you want to allow all domains write to kmsg_device, while kernel  is
68       executed  with  systemd.log_target=kmsg parameter, you must turn on the
69       domain_can_write_kmsg boolean. Disabled by default.
70
71       setsebool -P domain_can_write_kmsg 1
72
73
74
75       If you want to allow all domains to use other domains file descriptors,
76       you must turn on the domain_fd_use boolean. Enabled by default.
77
78       setsebool -P domain_fd_use 1
79
80
81
82       If  you  want to allow all domains to have the kernel load modules, you
83       must  turn  on  the  domain_kernel_load_modules  boolean.  Disabled  by
84       default.
85
86       setsebool -P domain_kernel_load_modules 1
87
88
89
90       If you want to allow all domains to execute in fips_mode, you must turn
91       on the fips_mode boolean. Enabled by default.
92
93       setsebool -P fips_mode 1
94
95
96
97       If you want to enable reading of urandom for all domains, you must turn
98       on the global_ssp boolean. Disabled by default.
99
100       setsebool -P global_ssp 1
101
102
103
104       If you want to allow ssh with chroot env to read and write files in the
105       user home directories, you  must  turn  on  the  ssh_chroot_rw_homedirs
106       boolean. Disabled by default.
107
108       setsebool -P ssh_chroot_rw_homedirs 1
109
110
111
112       If  you want to allow a user to login as an unconfined domain, you must
113       turn on the unconfined_login boolean. Enabled by default.
114
115       setsebool -P unconfined_login 1
116
117
118
119       If you want to support ecryptfs home directories, you must turn on  the
120       use_ecryptfs_home_dirs boolean. Disabled by default.
121
122       setsebool -P use_ecryptfs_home_dirs 1
123
124
125
126       If  you  want  to support fusefs home directories, you must turn on the
127       use_fusefs_home_dirs boolean. Disabled by default.
128
129       setsebool -P use_fusefs_home_dirs 1
130
131
132
133       If you want to support NFS home  directories,  you  must  turn  on  the
134       use_nfs_home_dirs boolean. Disabled by default.
135
136       setsebool -P use_nfs_home_dirs 1
137
138
139
140       If  you  want  to  support SAMBA home directories, you must turn on the
141       use_samba_home_dirs boolean. Disabled by default.
142
143       setsebool -P use_samba_home_dirs 1
144
145
146

MANAGED FILES

148       The SELinux process type chroot_user_t can manage  files  labeled  with
149       the  following  file types.  The paths listed are the default paths for
150       these file types.  Note the processes UID still need to have  DAC  per‐
151       missions.
152
153       cifs_t
154
155
156       ecryptfs_t
157
158            /home/[^/]+/.Private(/.*)?
159            /home/[^/]+/.ecryptfs(/.*)?
160
161       fusefs_t
162
163            /var/run/user/[^/]*/gvfs
164
165       nfs_t
166
167
168       user_home_t
169
170            /home/[^/]+/.+
171
172

COMMANDS

174       semanage  fcontext  can also be used to manipulate default file context
175       mappings.
176
177       semanage permissive can also be used to manipulate  whether  or  not  a
178       process type is permissive.
179
180       semanage  module can also be used to enable/disable/install/remove pol‐
181       icy modules.
182
183       semanage boolean can also be used to manipulate the booleans
184
185
186       system-config-selinux is a GUI tool available to customize SELinux pol‐
187       icy settings.
188
189

AUTHOR

191       This manual page was auto-generated using sepolicy manpage .
192
193

SEE ALSO

195       selinux(8),   chroot_user(8),   semanage(8),  restorecon(8),  chcon(1),
196       sepolicy(8) , setsebool(8)
197
198
199
200chroot_user                        19-04-25             chroot_user_selinux(8)
Impressum