1remote_login_selinux(8)   SELinux Policy remote_login  remote_login_selinux(8)
2
3
4

NAME

6       remote_login_selinux   -   Security   Enhanced  Linux  Policy  for  the
7       remote_login processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the remote_login processes via flexible
11       mandatory access control.
12
13       The  remote_login  processes  execute  with  the remote_login_t SELinux
14       type. You can check if you have these processes  running  by  executing
15       the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep remote_login_t
20
21
22

ENTRYPOINTS

24       The  remote_login_t  SELinux  type  can be entered via the login_exec_t
25       file type.
26
27       The default entrypoint paths for the remote_login_t domain are the fol‐
28       lowing:
29
30       /bin/login, /usr/bin/login, /usr/kerberos/sbin/login.krb5
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       remote_login  policy  is  very  flexible  allowing users to setup their
40       remote_login processes in as secure a method as possible.
41
42       The following process types are defined for remote_login:
43
44       remote_login_t
45
46       Note: semanage permissive -a remote_login_t can be  used  to  make  the
47       process type remote_login_t permissive. SELinux does not deny access to
48       permissive process types, but the AVC (SELinux  denials)  messages  are
49       still generated.
50
51

BOOLEANS

53       SELinux   policy  is  customizable  based  on  least  access  required.
54       remote_login policy is extremely flexible and has several booleans that
55       allow you to manipulate the policy and run remote_login with the tight‐
56       est access possible.
57
58
59
60       If you want to allow all domains to execute in fips_mode, you must turn
61       on the fips_mode boolean. Enabled by default.
62
63       setsebool -P fips_mode 1
64
65
66
67       If  you  want  to allow confined applications to run with kerberos, you
68       must turn on the kerberos_enabled boolean. Disabled by default.
69
70       setsebool -P kerberos_enabled 1
71
72
73
74       If you want to allow system to run with  NIS,  you  must  turn  on  the
75       nis_enabled boolean. Disabled by default.
76
77       setsebool -P nis_enabled 1
78
79
80
81       If you want to enable polyinstantiated directory support, you must turn
82       on the polyinstantiation_enabled boolean. Disabled by default.
83
84       setsebool -P polyinstantiation_enabled 1
85
86
87

MANAGED FILES

89       The SELinux process type remote_login_t can manage files  labeled  with
90       the  following  file types.  The paths listed are the default paths for
91       these file types.  Note the processes UID still need to have  DAC  per‐
92       missions.
93
94       auth_cache_t
95
96            /var/cache/coolkey(/.*)?
97
98       auth_home_t
99
100            /root/.yubico(/.*)?
101            /root/.config/Yubico(/.*)?
102            /root/.google_authenticator
103            /root/.google_authenticator~
104            /home/[^/]+/.yubico(/.*)?
105            /home/[^/]+/.config/Yubico(/.*)?
106            /home/[^/]+/.google_authenticator
107            /home/[^/]+/.google_authenticator~
108
109       cgroup_t
110
111            /sys/fs/cgroup
112
113       faillog_t
114
115            /var/log/btmp.*
116            /var/log/faillog.*
117            /var/log/tallylog.*
118            /var/run/faillock(/.*)?
119
120       initrc_var_run_t
121
122            /var/run/utmp
123            /var/run/random-seed
124            /var/run/runlevel.dir
125            /var/run/setmixer_flag
126
127       lastlog_t
128
129            /var/log/lastlog.*
130
131       pam_var_console_t
132
133            /var/run/console(/.*)?
134
135       pam_var_run_t
136
137            /var/(db|adm)/sudo(/.*)?
138            /var/lib/sudo(/.*)?
139            /var/run/sudo(/.*)?
140            /var/run/motd.d(/.*)?
141            /var/run/pam_ssh(/.*)?
142            /var/run/sepermit(/.*)?
143            /var/run/pam_mount(/.*)?
144            /var/run/pam_timestamp(/.*)?
145            /var/run/motd
146
147       security_t
148
149            /selinux
150
151       var_auth_t
152
153            /var/ace(/.*)?
154            /var/rsa(/.*)?
155            /var/lib/abl(/.*)?
156            /var/lib/rsa(/.*)?
157            /var/lib/pam_ssh(/.*)?
158            /var/lib/pam_shield(/.*)?
159            /var/opt/quest/vas/vasd(/.*)?
160            /var/lib/google-authenticator(/.*)?
161
162       wtmp_t
163
164            /var/log/wtmp.*
165
166

COMMANDS

168       semanage  fcontext  can also be used to manipulate default file context
169       mappings.
170
171       semanage permissive can also be used to manipulate  whether  or  not  a
172       process type is permissive.
173
174       semanage  module can also be used to enable/disable/install/remove pol‐
175       icy modules.
176
177       semanage boolean can also be used to manipulate the booleans
178
179
180       system-config-selinux is a GUI tool available to customize SELinux pol‐
181       icy settings.
182
183

AUTHOR

185       This manual page was auto-generated using sepolicy manpage .
186
187

SEE ALSO

189       selinux(8),   remote_login(8),  semanage(8),  restorecon(8),  chcon(1),
190       sepolicy(8), setsebool(8)
191
192
193
194remote_login                       21-03-26            remote_login_selinux(8)
Impressum