1openvpn_unconfined_sScErLiipntu_xsePloilniucxy(8o)penvpn_uonpceonnvfpinn_eudn_csocnrfiipnted_script_selinux(8)
2
3
4

NAME

6       openvpn_unconfined_script_selinux  - Security Enhanced Linux Policy for
7       the openvpn_unconfined_script processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the openvpn_unconfined_script processes
11       via flexible mandatory access control.
12
13       The openvpn_unconfined_script processes execute with the openvpn_uncon‐
14       fined_script_t SELinux type. You can check if you have these  processes
15       running by executing the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep openvpn_unconfined_script_t
20
21
22

ENTRYPOINTS

24       The  openvpn_unconfined_script_t  SELinux  type  can be entered via the
25       openvpn_unconfined_script_exec_t, shell_exec_t file types.
26
27       The default entrypoint paths for the openvpn_unconfined_script_t domain
28       are the following:
29
30       /etc/openvpn/scripts(/.*)?,    /bin/d?ash,    /bin/ksh.*,   /bin/zsh.*,
31       /usr/bin/d?ash, /usr/bin/ksh.*,  /usr/bin/zsh.*,  /bin/esh,  /bin/bash,
32       /bin/fish,  /bin/mksh,  /bin/sash,  /bin/tcsh,  /bin/yash,  /bin/bash2,
33       /usr/bin/esh,     /sbin/nologin,     /usr/bin/bash,      /usr/bin/fish,
34       /usr/bin/mksh,     /usr/bin/sash,     /usr/bin/tcsh,     /usr/bin/yash,
35       /usr/bin/bash2,  /usr/sbin/sesh,   /usr/sbin/smrsh,   /usr/bin/scponly,
36       /usr/libexec/sesh,        /usr/sbin/nologin,        /usr/bin/git-shell,
37       /usr/sbin/scponlyc,  /usr/libexec/sudo/sesh,   /usr/bin/cockpit-bridge,
38       /usr/libexec/cockpit-agent, /usr/libexec/git-core/git-shell
39

PROCESS TYPES

41       SELinux defines process types (domains) for each process running on the
42       system
43
44       You can see the context of a process using the -Z option to ps
45
46       Policy governs the access confined processes have  to  files.   SELinux
47       openvpn_unconfined_script  policy  is  very  flexible allowing users to
48       setup their openvpn_unconfined_script processes in as secure  a  method
49       as possible.
50
51       The following process types are defined for openvpn_unconfined_script:
52
53       openvpn_unconfined_script_t
54
55       Note: semanage permissive -a openvpn_unconfined_script_t can be used to
56       make the process type openvpn_unconfined_script_t  permissive.  SELinux
57       does  not deny access to permissive process types, but the AVC (SELinux
58       denials) messages are still generated.
59
60

BOOLEANS

62       SELinux policy is customizable based on least access  required.   open‐
63       vpn_unconfined_script  policy  is  extremely  flexible  and has several
64       booleans that allow you to manipulate the policy and run openvpn_uncon‐
65       fined_script with the tightest access possible.
66
67
68
69       If you want to deny user domains applications to map a memory region as
70       both executable and writable, this  is  dangerous  and  the  executable
71       should be reported in bugzilla, you must turn on the deny_execmem bool‐
72       ean. Disabled by default.
73
74       setsebool -P deny_execmem 1
75
76
77
78       If you want to control the ability to mmap a low area  of  the  address
79       space,  as  configured  by /proc/sys/vm/mmap_min_addr, you must turn on
80       the mmap_low_allowed boolean. Disabled by default.
81
82       setsebool -P mmap_low_allowed 1
83
84
85
86       If you want to disable kernel module loading, you must turn on the  se‐
87       cure_mode_insmod boolean. Disabled by default.
88
89       setsebool -P secure_mode_insmod 1
90
91
92
93       If  you  want to allow unconfined executables to make their heap memory
94       executable.  Doing this is a really  bad  idea.  Probably  indicates  a
95       badly  coded  executable, but could indicate an attack. This executable
96       should be reported in bugzilla, you must turn  on  the  selinuxuser_ex‐
97       echeap boolean. Disabled by default.
98
99       setsebool -P selinuxuser_execheap 1
100
101
102
103       If  you  want  to allow unconfined executables to make their stack exe‐
104       cutable.  This should never, ever be necessary.  Probably  indicates  a
105       badly  coded  executable, but could indicate an attack. This executable
106       should be reported in bugzilla, you must turn on the  selinuxuser_exec‐
107       stack boolean. Enabled by default.
108
109       setsebool -P selinuxuser_execstack 1
110
111
112

MANAGED FILES

114       The  SELinux  process type openvpn_unconfined_script_t can manage files
115       labeled with the following file types.  The paths listed  are  the  de‐
116       fault paths for these file types.  Note the processes UID still need to
117       have DAC permissions.
118
119       file_type
120
121            all files on the system
122
123

FILE CONTEXTS

125       SELinux requires files to have an extended attribute to define the file
126       type.
127
128       You can see the context of a file using the -Z option to ls
129
130       Policy  governs  the  access  confined  processes  have to these files.
131       SELinux openvpn_unconfined_script  policy  is  very  flexible  allowing
132       users to setup their openvpn_unconfined_script processes in as secure a
133       method as possible.
134
135       STANDARD FILE CONTEXT
136
137       SELinux  defines  the  file  context  types  for   the   openvpn_uncon‐
138       fined_script,  if  you wanted to store files with these types in a dif‐
139       ferent paths, you need to execute the semanage command to  specify  al‐
140       ternate labeling and then use restorecon to put the labels on disk.
141
142       semanage  fcontext  -a  -t openvpn_unconfined_script_exec_t '/srv/open‐
143       vpn_unconfined_script/content(/.*)?'
144       restorecon -R -v /srv/myopenvpn_unconfined_script_content
145
146       Note: SELinux often uses regular expressions  to  specify  labels  that
147       match multiple files.
148
149       The following file types are defined for openvpn_unconfined_script:
150
151
152
153       openvpn_unconfined_script_exec_t
154
155       - Set files with the openvpn_unconfined_script_exec_t type, if you want
156       to transition an executable to the openvpn_unconfined_script_t domain.
157
158
159
160       Note: File context can be temporarily modified with the chcon  command.
161       If  you want to permanently change the file context you need to use the
162       semanage fcontext command.  This will modify the SELinux labeling data‐
163       base.  You will need to use restorecon to apply the labels.
164
165

COMMANDS

167       semanage  fcontext  can also be used to manipulate default file context
168       mappings.
169
170       semanage permissive can also be used to manipulate  whether  or  not  a
171       process type is permissive.
172
173       semanage  module can also be used to enable/disable/install/remove pol‐
174       icy modules.
175
176       semanage boolean can also be used to manipulate the booleans
177
178
179       system-config-selinux is a GUI tool available to customize SELinux pol‐
180       icy settings.
181
182

AUTHOR

184       This manual page was auto-generated using sepolicy manpage .
185
186

SEE ALSO

188       selinux(8),  openvpn_unconfined_script(8),  semanage(8), restorecon(8),
189       chcon(1), sepolicy(8), setsebool(8)
190
191
192
193openvpn_unconfined_script          23-10-20openvpn_unconfined_script_selinux(8)
Impressum