1unconfined_sendmail_selSiEnLuixn(u8x)Policy unconfined_suenncdomnafiilned_sendmail_selinux(8)
2
3
4

NAME

6       unconfined_sendmail_selinux  -  Security  Enhanced Linux Policy for the
7       unconfined_sendmail processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the unconfined_sendmail  processes  via
11       flexible mandatory access control.
12
13       The  unconfined_sendmail  processes  execute  with the unconfined_send‐
14       mail_t SELinux type. You can check if you have these processes  running
15       by executing the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep unconfined_sendmail_t
20
21
22

ENTRYPOINTS

24       The  unconfined_sendmail_t  SELinux  type  can be entered via the send‐
25       mail_exec_t file type.
26
27       The default entrypoint paths for the unconfined_sendmail_t  domain  are
28       the following:
29
30       /usr/sbin/sendmail(.sendmail)?,     /usr/bin/esmtp,    /usr/sbin/rmail,
31       /usr/sbin/ssmtp,       /usr/lib/sendmail,       /usr/bin/esmtp-wrapper,
32       /var/qmail/bin/sendmail, /usr/sbin/sendmail.postfix
33

PROCESS TYPES

35       SELinux defines process types (domains) for each process running on the
36       system
37
38       You can see the context of a process using the -Z option to ps
39
40       Policy governs the access confined processes have  to  files.   SELinux
41       unconfined_sendmail  policy  is  very  flexible allowing users to setup
42       their unconfined_sendmail processes in as secure a method as possible.
43
44       The following process types are defined for unconfined_sendmail:
45
46       unconfined_sendmail_t
47
48       Note: semanage permissive -a unconfined_sendmail_t can be used to  make
49       the  process  type  unconfined_sendmail_t  permissive. SELinux does not
50       deny access to permissive process types, but the AVC (SELinux  denials)
51       messages are still generated.
52
53

BOOLEANS

55       SELinux  policy is customizable based on least access required.  uncon‐
56       fined_sendmail policy is extremely flexible and  has  several  booleans
57       that  allow  you  to  manipulate the policy and run unconfined_sendmail
58       with the tightest access possible.
59
60
61
62       If you want to deny user domains applications to map a memory region as
63       both  executable  and  writable,  this  is dangerous and the executable
64       should be reported in bugzilla, you must turn on the deny_execmem bool‐
65       ean. Enabled by default.
66
67       setsebool -P deny_execmem 1
68
69
70
71       If  you  want  to control the ability to mmap a low area of the address
72       space, as configured by /proc/sys/vm/mmap_min_addr, you  must  turn  on
73       the mmap_low_allowed boolean. Disabled by default.
74
75       setsebool -P mmap_low_allowed 1
76
77
78
79       If  you  want  to  disable  kernel module loading, you must turn on the
80       secure_mode_insmod boolean. Enabled by default.
81
82       setsebool -P secure_mode_insmod 1
83
84
85
86       If you want to allow unconfined executables to make their  heap  memory
87       executable.   Doing  this  is  a  really bad idea. Probably indicates a
88       badly coded executable, but could indicate an attack.  This  executable
89       should   be   reported  in  bugzilla,  you  must  turn  on  the  selin‐
90       uxuser_execheap boolean. Disabled by default.
91
92       setsebool -P selinuxuser_execheap 1
93
94
95
96       If you want to allow unconfined executables to make  their  stack  exe‐
97       cutable.   This  should  never, ever be necessary. Probably indicates a
98       badly coded executable, but could indicate an attack.  This  executable
99       should  be reported in bugzilla, you must turn on the selinuxuser_exec‐
100       stack boolean. Disabled by default.
101
102       setsebool -P selinuxuser_execstack 1
103
104
105

MANAGED FILES

107       The SELinux process type unconfined_sendmail_t can manage files labeled
108       with  the following file types.  The paths listed are the default paths
109       for these file types.  Note the processes UID still need  to  have  DAC
110       permissions.
111
112       file_type
113
114            all files on the system
115
116

COMMANDS

118       semanage  fcontext  can also be used to manipulate default file context
119       mappings.
120
121       semanage permissive can also be used to manipulate  whether  or  not  a
122       process type is permissive.
123
124       semanage  module can also be used to enable/disable/install/remove pol‐
125       icy modules.
126
127       semanage boolean can also be used to manipulate the booleans
128
129
130       system-config-selinux is a GUI tool available to customize SELinux pol‐
131       icy settings.
132
133

AUTHOR

135       This manual page was auto-generated using sepolicy manpage .
136
137

SEE ALSO

139       selinux(8),    unconfined_sendmail(8),    semanage(8),   restorecon(8),
140       chcon(1), sepolicy(8), setsebool(8)
141
142
143
144unconfined_sendmail                21-03-26     unconfined_sendmail_selinux(8)
Impressum