1rsync_selinux(8)             SELinux Policy rsync             rsync_selinux(8)
2
3
4

NAME

6       rsync_selinux - Security Enhanced Linux Policy for the rsync processes
7

DESCRIPTION

9       Security-Enhanced Linux secures the rsync processes via flexible manda‐
10       tory access control.
11
12       The rsync processes execute with the  rsync_t  SELinux  type.  You  can
13       check  if  you have these processes running by executing the ps command
14       with the -Z qualifier.
15
16       For example:
17
18       ps -eZ | grep rsync_t
19
20
21

ENTRYPOINTS

23       The rsync_t SELinux type can be entered via the rsync_exec_t file type.
24
25       The default entrypoint paths for the rsync_t domain are the following:
26
27       /usr/bin/rsync
28

PROCESS TYPES

30       SELinux defines process types (domains) for each process running on the
31       system
32
33       You can see the context of a process using the -Z option to ps
34
35       Policy  governs  the  access confined processes have to files.  SELinux
36       rsync policy is very flexible allowing users to setup their rsync  pro‐
37       cesses in as secure a method as possible.
38
39       The following process types are defined for rsync:
40
41       rsync_t
42
43       Note:  semanage  permissive  -a rsync_t can be used to make the process
44       type rsync_t permissive. SELinux does not  deny  access  to  permissive
45       process  types, but the AVC (SELinux denials) messages are still gener‐
46       ated.
47
48

BOOLEANS

50       SELinux policy is customizable based on least access  required.   rsync
51       policy is extremely flexible and has several booleans that allow you to
52       manipulate the policy and run rsync with the tightest access possible.
53
54
55
56       If you want to allow rsync to run as a client, you  must  turn  on  the
57       rsync_client boolean. Disabled by default.
58
59       setsebool -P rsync_client 1
60
61
62
63       If  you  want to allow rsync to export any files/directories read only,
64       you must turn on the rsync_export_all_ro boolean. Disabled by default.
65
66       setsebool -P rsync_export_all_ro 1
67
68
69
70       If you want to allow rsync server to manage  all  files/directories  on
71       the system, you must turn on the rsync_full_access boolean. Disabled by
72       default.
73
74       setsebool -P rsync_full_access 1
75
76
77
78       If you want to allow users to resolve user passwd entries directly from
79       ldap  rather  then  using  a  sssd server, you must turn on the authlo‐
80       gin_nsswitch_use_ldap boolean. Disabled by default.
81
82       setsebool -P authlogin_nsswitch_use_ldap 1
83
84
85
86       If you want to allow all domains to execute in fips_mode, you must turn
87       on the fips_mode boolean. Enabled by default.
88
89       setsebool -P fips_mode 1
90
91
92
93       If  you  want  to allow confined applications to run with kerberos, you
94       must turn on the kerberos_enabled boolean. Enabled by default.
95
96       setsebool -P kerberos_enabled 1
97
98
99
100       If you want to allow system to run with  NIS,  you  must  turn  on  the
101       nis_enabled boolean. Disabled by default.
102
103       setsebool -P nis_enabled 1
104
105
106
107       If  you  want to allow confined applications to use nscd shared memory,
108       you must turn on the nscd_use_shm boolean. Disabled by default.
109
110       setsebool -P nscd_use_shm 1
111
112
113

PORT TYPES

115       SELinux defines port types to represent TCP and UDP ports.
116
117       You can see the types associated with a port  by  using  the  following
118       command:
119
120       semanage port -l
121
122
123       Policy  governs  the  access  confined  processes  have to these ports.
124       SELinux rsync policy is very flexible allowing  users  to  setup  their
125       rsync processes in as secure a method as possible.
126
127       The following port types are defined for rsync:
128
129
130       rsync_port_t
131
132
133
134       Default Defined Ports:
135                 tcp 873
136                 udp 873
137

MANAGED FILES

139       The SELinux process type rsync_t can manage files labeled with the fol‐
140       lowing file types.  The paths listed are the default  paths  for  these
141       file types.  Note the processes UID still need to have DAC permissions.
142
143       cifs_t
144
145
146       cluster_conf_t
147
148            /etc/cluster(/.*)?
149
150       cluster_var_lib_t
151
152            /var/lib/pcsd(/.*)?
153            /var/lib/cluster(/.*)?
154            /var/lib/openais(/.*)?
155            /var/lib/pengine(/.*)?
156            /var/lib/corosync(/.*)?
157            /usr/lib/heartbeat(/.*)?
158            /var/lib/heartbeat(/.*)?
159            /var/lib/pacemaker(/.*)?
160
161       cluster_var_run_t
162
163            /var/run/crm(/.*)?
164            /var/run/cman_.*
165            /var/run/rsctmp(/.*)?
166            /var/run/aisexec.*
167            /var/run/heartbeat(/.*)?
168            /var/run/corosync-qnetd(/.*)?
169            /var/run/corosync-qdevice(/.*)?
170            /var/run/corosync.pid
171            /var/run/cpglockd.pid
172            /var/run/rgmanager.pid
173            /var/run/cluster/rgmanager.sk
174
175       ecryptfs_t
176
177            /home/[^/]+/.Private(/.*)?
178            /home/[^/]+/.ecryptfs(/.*)?
179
180       fusefs_t
181
182            /var/run/user/[^/]*/gvfs
183
184       modules_object_t
185
186            /lib/modules(/.*)?
187            /usr/lib/modules(/.*)?
188
189       nfs_t
190
191
192       non_auth_file_type
193
194
195       public_content_rw_t
196
197            /var/spool/abrt-upload(/.*)?
198
199       root_t
200
201            /sysroot/ostree/deploy/.*-atomic/deploy(/.*)?
202            /
203            /initrd
204
205       rsync_data_t
206
207
208       rsync_log_t
209
210            /var/log/rsync.*
211
212       rsync_tmp_t
213
214
215       rsync_var_run_t
216
217            /var/run/rsyncd.lock
218            /var/run/swift_server.lock
219
220       semanage_store_t
221
222            /etc/selinux/([^/]*/)?policy(/.*)?
223            /etc/selinux/(minimum|mls|targeted)/active(/.*)?
224            /etc/selinux/([^/]*/)?modules/(active|tmp|previous)(/.*)?
225            /var/lib/selinux(/.*)?
226            /etc/share/selinux/mls(/.*)?
227            /etc/share/selinux/targeted(/.*)?
228
229       swift_data_t
230
231            /srv/node(/.*)?
232            /var/lib/swift(/.*)?
233            /srv/loopback-device(/.*)?
234
235       swift_lock_t
236
237            /var/lock/swift.*
238
239

FILE CONTEXTS

241       SELinux requires files to have an extended attribute to define the file
242       type.
243
244       You can see the context of a file using the -Z option to ls
245
246       Policy governs the access  confined  processes  have  to  these  files.
247       SELinux  rsync  policy  is  very flexible allowing users to setup their
248       rsync processes in as secure a method as possible.
249
250       STANDARD FILE CONTEXT
251
252       SELinux defines the file context types for the rsync, if you wanted  to
253       store  files  with  these types in a diffent paths, you need to execute
254       the semanage command  to  sepecify  alternate  labeling  and  then  use
255       restorecon to put the labels on disk.
256
257       semanage fcontext -a -t rsync_var_run_t '/srv/myrsync_content(/.*)?'
258       restorecon -R -v /srv/myrsync_content
259
260       Note:  SELinux  often  uses  regular expressions to specify labels that
261       match multiple files.
262
263       The following file types are defined for rsync:
264
265
266
267       rsync_data_t
268
269       - Set files with the rsync_data_t type, if you want to treat the  files
270       as rsync content.
271
272
273
274       rsync_etc_t
275
276       - Set files with the rsync_etc_t type, if you want to store rsync files
277       in the /etc directories.
278
279
280
281       rsync_exec_t
282
283       - Set files with the rsync_exec_t type, if you want  to  transition  an
284       executable to the rsync_t domain.
285
286
287
288       rsync_log_t
289
290       - Set files with the rsync_log_t type, if you want to treat the data as
291       rsync log data, usually stored under the /var/log directory.
292
293
294
295       rsync_tmp_t
296
297       - Set files with the rsync_tmp_t type, if you want to store rsync  tem‐
298       porary files in the /tmp directories.
299
300
301
302       rsync_var_run_t
303
304       -  Set  files  with  the rsync_var_run_t type, if you want to store the
305       rsync files under the /run or /var/run directory.
306
307
308       Paths:
309            /var/run/rsyncd.lock, /var/run/swift_server.lock
310
311
312       Note: File context can be temporarily modified with the chcon  command.
313       If  you want to permanently change the file context you need to use the
314       semanage fcontext command.  This will modify the SELinux labeling data‐
315       base.  You will need to use restorecon to apply the labels.
316
317

SHARING FILES

319       If  you  want to share files with multiple domains (Apache, FTP, rsync,
320       Samba), you can set a file context of public_content_t and  public_con‐
321       tent_rw_t.   These  context  allow any of the above domains to read the
322       content.  If you want a particular domain to write to  the  public_con‐
323       tent_rw_t domain, you must set the appropriate boolean.
324
325       Allow rsync servers to read the /var/rsync directory by adding the pub‐
326       lic_content_t file type to the directory  and  by  restoring  the  file
327       type.
328
329       semanage fcontext -a -t public_content_t "/var/rsync(/.*)?"
330       restorecon -F -R -v /var/rsync
331
332       Allow rsync servers to read and write /var/rsync/incoming by adding the
333       public_content_rw_t type to the directory and  by  restoring  the  file
334       type.  You also need to turn on the rsync_anon_write boolean.
335
336       semanage fcontext -a -t public_content_rw_t "/var/rsync/incoming(/.*)?"
337       restorecon -F -R -v /var/rsync/incoming
338       setsebool -P rsync_anon_write 1
339
340
341       If  you want to allow rsync to modify public files used for public file
342       transfer  services.   Files/Directories  must  be  labeled  public_con‐
343       tent_rw_t., you must turn on the rsync_anon_write boolean.
344
345       setsebool -P rsync_anon_write 1
346
347

COMMANDS

349       semanage  fcontext  can also be used to manipulate default file context
350       mappings.
351
352       semanage permissive can also be used to manipulate  whether  or  not  a
353       process type is permissive.
354
355       semanage  module can also be used to enable/disable/install/remove pol‐
356       icy modules.
357
358       semanage port can also be used to manipulate the port definitions
359
360       semanage boolean can also be used to manipulate the booleans
361
362
363       system-config-selinux is a GUI tool available to customize SELinux pol‐
364       icy settings.
365
366

AUTHOR

368       This manual page was auto-generated using sepolicy manpage .
369
370

SEE ALSO

372       selinux(8),  rsync(8),  semanage(8),  restorecon(8),  chcon(1),  sepol‐
373       icy(8), setsebool(8)
374
375
376
377rsync                              19-05-30                   rsync_selinux(8)
Impressum