1sandbox_min_client_selinSuExL(i8n)ux Policy sandbox_min_scalnidebnotx_min_client_selinux(8)
2
3
4

NAME

6       sandbox_min_client_selinux  -  Security  Enhanced  Linux Policy for the
7       sandbox_min_client processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the  sandbox_min_client  processes  via
11       flexible mandatory access control.
12
13       The  sandbox_min_client processes execute with the sandbox_min_client_t
14       SELinux type. You can check if you have these processes running by exe‐
15       cuting the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep sandbox_min_client_t
20
21
22

ENTRYPOINTS

24       The sandbox_min_client_t SELinux type can be entered via the file_type,
25       sandbox_exec_t file types.
26
27       The default entrypoint paths for the  sandbox_min_client_t  domain  are
28       the following:
29
30       all files on the system, /usr/share/sandbox/start
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       sandbox_min_client  policy  is  very  flexible  allowing users to setup
40       their sandbox_min_client processes in as secure a method as possible.
41
42       The following process types are defined for sandbox_min_client:
43
44       sandbox_min_client_t
45
46       Note: semanage permissive -a sandbox_min_client_t can be used  to  make
47       the process type sandbox_min_client_t permissive. SELinux does not deny
48       access to permissive process types, but the AVC (SELinux denials)  mes‐
49       sages are still generated.
50
51

BOOLEANS

53       SELinux  policy  is customizable based on least access required.  sand‐
54       box_min_client policy is extremely flexible and  has  several  booleans
55       that allow you to manipulate the policy and run sandbox_min_client with
56       the tightest access possible.
57
58
59
60       If you want to deny user domains applications to map a memory region as
61       both  executable  and  writable,  this  is dangerous and the executable
62       should be reported in bugzilla, you must turn on the deny_execmem bool‐
63       ean. Enabled by default.
64
65       setsebool -P deny_execmem 1
66
67
68
69       If  you  want  to deny any process from ptracing or debugging any other
70       processes, you  must  turn  on  the  deny_ptrace  boolean.  Enabled  by
71       default.
72
73       setsebool -P deny_ptrace 1
74
75
76
77       If  you  want  to  allow  any  process  to mmap any file on system with
78       attribute file_type, you must turn on the  domain_can_mmap_files  bool‐
79       ean. Enabled by default.
80
81       setsebool -P domain_can_mmap_files 1
82
83
84
85       If  you want to allow all domains write to kmsg_device, while kernel is
86       executed with systemd.log_target=kmsg parameter, you must turn  on  the
87       domain_can_write_kmsg boolean. Disabled by default.
88
89       setsebool -P domain_can_write_kmsg 1
90
91
92
93       If you want to allow all domains to use other domains file descriptors,
94       you must turn on the domain_fd_use boolean. Enabled by default.
95
96       setsebool -P domain_fd_use 1
97
98
99
100       If you want to allow all domains to have the kernel load  modules,  you
101       must  turn  on  the  domain_kernel_load_modules  boolean.  Disabled  by
102       default.
103
104       setsebool -P domain_kernel_load_modules 1
105
106
107
108       If you want to allow all domains to execute in fips_mode, you must turn
109       on the fips_mode boolean. Enabled by default.
110
111       setsebool -P fips_mode 1
112
113
114
115       If you want to enable reading of urandom for all domains, you must turn
116       on the global_ssp boolean. Disabled by default.
117
118       setsebool -P global_ssp 1
119
120
121
122       If you want to support fusefs home directories, you must  turn  on  the
123       use_fusefs_home_dirs boolean. Disabled by default.
124
125       setsebool -P use_fusefs_home_dirs 1
126
127
128
129       If  you  want  to  support  NFS  home directories, you must turn on the
130       use_nfs_home_dirs boolean. Disabled by default.
131
132       setsebool -P use_nfs_home_dirs 1
133
134
135
136       If you want to support SAMBA home directories, you  must  turn  on  the
137       use_samba_home_dirs boolean. Disabled by default.
138
139       setsebool -P use_samba_home_dirs 1
140
141
142

MANAGED FILES

144       The  SELinux process type sandbox_min_client_t can manage files labeled
145       with the following file types.  The paths listed are the default  paths
146       for  these  file  types.  Note the processes UID still need to have DAC
147       permissions.
148
149       cifs_t
150
151
152       fusefs_t
153
154            /var/run/user/[^/]*/gvfs
155
156       mozilla_plugin_tmpfs_t
157
158
159       nfs_t
160
161
162       sandbox_file_t
163
164
165       sandbox_min_client_tmpfs_t
166
167
168       security_t
169
170            /selinux
171
172

COMMANDS

174       semanage fcontext can also be used to manipulate default  file  context
175       mappings.
176
177       semanage  permissive  can  also  be used to manipulate whether or not a
178       process type is permissive.
179
180       semanage module can also be used to enable/disable/install/remove  pol‐
181       icy modules.
182
183       semanage boolean can also be used to manipulate the booleans
184
185
186       system-config-selinux is a GUI tool available to customize SELinux pol‐
187       icy settings.
188
189

AUTHOR

191       This manual page was auto-generated using sepolicy manpage .
192
193

SEE ALSO

195       selinux(8),    sandbox_min_client(8),    semanage(8),    restorecon(8),
196       chcon(1), sepolicy(8) , setsebool(8)
197
198
199
200sandbox_min_client                 19-04-25      sandbox_min_client_selinux(8)
Impressum