1condor_master_selinux(8) SELinux Policy condor_master condor_master_selinux(8)
2
3
4

NAME

6       condor_master_selinux  -  Security  Enhanced  Linux Policy for the con‐
7       dor_master processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the condor_master processes via  flexi‐
11       ble mandatory access control.
12
13       The  condor_master  processes  execute with the condor_master_t SELinux
14       type. You can check if you have these processes  running  by  executing
15       the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep condor_master_t
20
21
22

ENTRYPOINTS

24       The  condor_master_t  SELinux  type  can be entered via the condor_mas‐
25       ter_exec_t file type.
26
27       The default entrypoint paths for the  condor_master_t  domain  are  the
28       following:
29
30       /usr/sbin/condor_master
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       condor_master  policy  is  very  flexible allowing users to setup their
40       condor_master processes in as secure a method as possible.
41
42       The following process types are defined for condor_master:
43
44       condor_master_t
45
46       Note: semanage permissive -a condor_master_t can be used  to  make  the
47       process  type  condor_master_t permissive. SELinux does not deny access
48       to permissive process types, but the AVC (SELinux denials) messages are
49       still generated.
50
51

BOOLEANS

53       SELinux  policy  is  customizable based on least access required.  con‐
54       dor_master policy is extremely flexible and has several  booleans  that
55       allow  you  to  manipulate  the  policy  and run condor_master with the
56       tightest access possible.
57
58
59
60       If you want to allow users to resolve user passwd entries directly from
61       ldap  rather  then  using  a  sssd server, you must turn on the authlo‐
62       gin_nsswitch_use_ldap boolean. Disabled by default.
63
64       setsebool -P authlogin_nsswitch_use_ldap 1
65
66
67
68       If you want to determine whether Condor  can  connect  to  the  network
69       using  TCP,  you  must  turn on the condor_tcp_network_connect boolean.
70       Disabled by default.
71
72       setsebool -P condor_tcp_network_connect 1
73
74
75
76       If you want to allow all daemons to write corefiles to /, you must turn
77       on the daemons_dump_core boolean. Disabled by default.
78
79       setsebool -P daemons_dump_core 1
80
81
82
83       If  you  want  to enable cluster mode for daemons, you must turn on the
84       daemons_enable_cluster_mode boolean. Enabled by default.
85
86       setsebool -P daemons_enable_cluster_mode 1
87
88
89
90       If you want to allow all daemons to use tcp wrappers, you must turn  on
91       the daemons_use_tcp_wrapper boolean. Disabled by default.
92
93       setsebool -P daemons_use_tcp_wrapper 1
94
95
96
97       If  you  want to allow all daemons the ability to read/write terminals,
98       you must turn on the daemons_use_tty boolean. Disabled by default.
99
100       setsebool -P daemons_use_tty 1
101
102
103
104       If you want to deny any process from ptracing or  debugging  any  other
105       processes,  you  must  turn  on  the  deny_ptrace  boolean.  Enabled by
106       default.
107
108       setsebool -P deny_ptrace 1
109
110
111
112       If you want to allow any process  to  mmap  any  file  on  system  with
113       attribute  file_type,  you must turn on the domain_can_mmap_files bool‐
114       ean. Enabled by default.
115
116       setsebool -P domain_can_mmap_files 1
117
118
119
120       If you want to allow all domains write to kmsg_device, while kernel  is
121       executed  with  systemd.log_target=kmsg parameter, you must turn on the
122       domain_can_write_kmsg boolean. Disabled by default.
123
124       setsebool -P domain_can_write_kmsg 1
125
126
127
128       If you want to allow all domains to use other domains file descriptors,
129       you must turn on the domain_fd_use boolean. Enabled by default.
130
131       setsebool -P domain_fd_use 1
132
133
134
135       If  you  want to allow all domains to have the kernel load modules, you
136       must  turn  on  the  domain_kernel_load_modules  boolean.  Disabled  by
137       default.
138
139       setsebool -P domain_kernel_load_modules 1
140
141
142
143       If you want to allow all domains to execute in fips_mode, you must turn
144       on the fips_mode boolean. Enabled by default.
145
146       setsebool -P fips_mode 1
147
148
149
150       If you want to enable reading of urandom for all domains, you must turn
151       on the global_ssp boolean. Disabled by default.
152
153       setsebool -P global_ssp 1
154
155
156
157       If  you  want  to allow confined applications to run with kerberos, you
158       must turn on the kerberos_enabled boolean. Enabled by default.
159
160       setsebool -P kerberos_enabled 1
161
162
163
164       If you want to allow system to run with  NIS,  you  must  turn  on  the
165       nis_enabled boolean. Disabled by default.
166
167       setsebool -P nis_enabled 1
168
169
170
171       If  you  want to allow confined applications to use nscd shared memory,
172       you must turn on the nscd_use_shm boolean. Disabled by default.
173
174       setsebool -P nscd_use_shm 1
175
176
177

MANAGED FILES

179       The SELinux process type condor_master_t can manage files labeled  with
180       the  following  file types.  The paths listed are the default paths for
181       these file types.  Note the processes UID still need to have  DAC  per‐
182       missions.
183
184       cluster_conf_t
185
186            /etc/cluster(/.*)?
187
188       cluster_var_lib_t
189
190            /var/lib/pcsd(/.*)?
191            /var/lib/cluster(/.*)?
192            /var/lib/openais(/.*)?
193            /var/lib/pengine(/.*)?
194            /var/lib/corosync(/.*)?
195            /usr/lib/heartbeat(/.*)?
196            /var/lib/heartbeat(/.*)?
197            /var/lib/pacemaker(/.*)?
198
199       cluster_var_run_t
200
201            /var/run/crm(/.*)?
202            /var/run/cman_.*
203            /var/run/rsctmp(/.*)?
204            /var/run/aisexec.*
205            /var/run/heartbeat(/.*)?
206            /var/run/corosync-qnetd(/.*)?
207            /var/run/corosync-qdevice(/.*)?
208            /var/run/cpglockd.pid
209            /var/run/corosync.pid
210            /var/run/rgmanager.pid
211            /var/run/cluster/rgmanager.sk
212
213       condor_conf_t
214
215            /etc/condor(/.*)?
216
217       condor_log_t
218
219            /var/log/condor(/.*)?
220
221       condor_master_tmp_t
222
223
224       condor_var_lib_t
225
226            /var/lib/condor(/.*)?
227            /var/lib/condor/spool(/.*)?
228            /var/lib/condor/execute(/.*)?
229
230       condor_var_lock_t
231
232            /var/lock/condor(/.*)?
233
234       condor_var_run_t
235
236            /var/run/condor(/.*)?
237
238       root_t
239
240            /sysroot/ostree/deploy/.*-atomic.*/deploy(/.*)?
241            /
242            /initrd
243
244

FILE CONTEXTS

246       SELinux requires files to have an extended attribute to define the file
247       type.
248
249       You can see the context of a file using the -Z option to ls
250
251       Policy governs the access  confined  processes  have  to  these  files.
252       SELinux  condor_master  policy is very flexible allowing users to setup
253       their condor_master processes in as secure a method as possible.
254
255       STANDARD FILE CONTEXT
256
257       SELinux defines the file context types for the  condor_master,  if  you
258       wanted  to store files with these types in a diffent paths, you need to
259       execute the semanage command to sepecify alternate  labeling  and  then
260       use restorecon to put the labels on disk.
261
262       semanage  fcontext -a -t condor_master_tmp_t '/srv/mycondor_master_con‐
263       tent(/.*)?'
264       restorecon -R -v /srv/mycondor_master_content
265
266       Note: SELinux often uses regular expressions  to  specify  labels  that
267       match multiple files.
268
269       The following file types are defined for condor_master:
270
271
272
273       condor_master_exec_t
274
275       -  Set files with the condor_master_exec_t type, if you want to transi‐
276       tion an executable to the condor_master_t domain.
277
278
279
280       condor_master_tmp_t
281
282       - Set files with the condor_master_tmp_t type, if  you  want  to  store
283       condor master temporary files in the /tmp directories.
284
285
286
287       Note:  File context can be temporarily modified with the chcon command.
288       If you want to permanently change the file context you need to use  the
289       semanage fcontext command.  This will modify the SELinux labeling data‐
290       base.  You will need to use restorecon to apply the labels.
291
292

COMMANDS

294       semanage fcontext can also be used to manipulate default  file  context
295       mappings.
296
297       semanage  permissive  can  also  be used to manipulate whether or not a
298       process type is permissive.
299
300       semanage module can also be used to enable/disable/install/remove  pol‐
301       icy modules.
302
303       semanage boolean can also be used to manipulate the booleans
304
305
306       system-config-selinux is a GUI tool available to customize SELinux pol‐
307       icy settings.
308
309

AUTHOR

311       This manual page was auto-generated using sepolicy manpage .
312
313

SEE ALSO

315       selinux(8),  condor_master(8),  semanage(8),  restorecon(8),  chcon(1),
316       sepolicy(8) , setsebool(8)
317
318
319
320condor_master                      19-04-25           condor_master_selinux(8)
Impressum