1remote_login_selinux(8)   SELinux Policy remote_login  remote_login_selinux(8)
2
3
4

NAME

6       remote_login_selinux   -   Security   Enhanced  Linux  Policy  for  the
7       remote_login processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the remote_login processes via flexible
11       mandatory access control.
12
13       The  remote_login  processes  execute  with  the remote_login_t SELinux
14       type. You can check if you have these processes  running  by  executing
15       the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep remote_login_t
20
21
22

ENTRYPOINTS

24       The  remote_login_t  SELinux  type  can be entered via the login_exec_t
25       file type.
26
27       The default entrypoint paths for the remote_login_t domain are the fol‐
28       lowing:
29
30       /bin/login, /usr/bin/login, /usr/kerberos/sbin/login.krb5
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       remote_login  policy  is  very  flexible  allowing users to setup their
40       remote_login processes in as secure a method as possible.
41
42       The following process types are defined for remote_login:
43
44       remote_login_t
45
46       Note: semanage permissive -a remote_login_t can be  used  to  make  the
47       process type remote_login_t permissive. SELinux does not deny access to
48       permissive process types, but the AVC (SELinux  denials)  messages  are
49       still generated.
50
51

BOOLEANS

53       SELinux   policy  is  customizable  based  on  least  access  required.
54       remote_login policy is extremely flexible and has several booleans that
55       allow you to manipulate the policy and run remote_login with the tight‐
56       est access possible.
57
58
59
60       If you want to allow all domains to execute in fips_mode, you must turn
61       on the fips_mode boolean. Enabled by default.
62
63       setsebool -P fips_mode 1
64
65
66
67       If  you  want  to allow confined applications to run with kerberos, you
68       must turn on the kerberos_enabled boolean. Disabled by default.
69
70       setsebool -P kerberos_enabled 1
71
72
73
74       If you want to allow system to run with  NIS,  you  must  turn  on  the
75       nis_enabled boolean. Disabled by default.
76
77       setsebool -P nis_enabled 1
78
79
80
81       If you want to enable polyinstantiated directory support, you must turn
82       on the polyinstantiation_enabled boolean. Disabled by default.
83
84       setsebool -P polyinstantiation_enabled 1
85
86
87

MANAGED FILES

89       The SELinux process type remote_login_t can manage files  labeled  with
90       the  following  file types.  The paths listed are the default paths for
91       these file types.  Note the processes UID still need to have  DAC  per‐
92       missions.
93
94       auth_cache_t
95
96            /var/cache/coolkey(/.*)?
97
98       auth_home_t
99
100            /root/.yubico(/.*)?
101            /root/.google_authenticator
102            /root/.google_authenticator~
103            /home/[^/]+/.yubico(/.*)?
104            /home/[^/]+/.google_authenticator
105            /home/[^/]+/.google_authenticator~
106
107       cgroup_t
108
109            /sys/fs/cgroup
110
111       faillog_t
112
113            /var/log/btmp.*
114            /var/log/faillog.*
115            /var/log/tallylog.*
116            /var/run/faillock(/.*)?
117
118       initrc_var_run_t
119
120            /var/run/utmp
121            /var/run/random-seed
122            /var/run/runlevel.dir
123            /var/run/setmixer_flag
124
125       kdbusfs_t
126
127
128       lastlog_t
129
130            /var/log/lastlog.*
131
132       pam_var_console_t
133
134            /var/run/console(/.*)?
135
136       pam_var_run_t
137
138            /var/(db|adm)/sudo(/.*)?
139            /var/lib/sudo(/.*)?
140            /var/run/sudo(/.*)?
141            /var/run/motd.d(/.*)?
142            /var/run/pam_ssh(/.*)?
143            /var/run/sepermit(/.*)?
144            /var/run/pam_mount(/.*)?
145            /var/run/pam_timestamp(/.*)?
146            /var/run/motd
147
148       security_t
149
150            /selinux
151
152       var_auth_t
153
154            /var/ace(/.*)?
155            /var/rsa(/.*)?
156            /var/lib/abl(/.*)?
157            /var/lib/rsa(/.*)?
158            /var/lib/pam_ssh(/.*)?
159            /var/lib/pam_shield(/.*)?
160            /var/opt/quest/vas/vasd(/.*)?
161            /var/lib/google-authenticator(/.*)?
162
163       wtmp_t
164
165            /var/log/wtmp.*
166
167

COMMANDS

169       semanage  fcontext  can also be used to manipulate default file context
170       mappings.
171
172       semanage permissive can also be used to manipulate  whether  or  not  a
173       process type is permissive.
174
175       semanage  module can also be used to enable/disable/install/remove pol‐
176       icy modules.
177
178       semanage boolean can also be used to manipulate the booleans
179
180
181       system-config-selinux is a GUI tool available to customize SELinux pol‐
182       icy settings.
183
184

AUTHOR

186       This manual page was auto-generated using sepolicy manpage .
187
188

SEE ALSO

190       selinux(8),   remote_login(8),  semanage(8),  restorecon(8),  chcon(1),
191       sepolicy(8), setsebool(8)
192
193
194
195remote_login                       20-05-05            remote_login_selinux(8)
Impressum