1user_selinux(8) user SELinux Policy documentation user_selinux(8)
2
3
4
6 user_u - Generic unprivileged user - Security Enhanced Linux Policy
7
8
10 user_u is an SELinux User defined in the SELinux policy. SELinux users
11 have default roles, user_r. The default role has a default type,
12 user_t, associated with it.
13
14 The SELinux user will usually login to a system with a context that
15 looks like:
16
17 user_u:user_r:user_t:s0
18
19 Linux users are automatically assigned an SELinux users at login.
20 Login programs use the SELinux User to assign initial context to the
21 user's shell.
22
23 SELinux policy uses the context to control the user's access.
24
25 By default all users are assigned to the SELinux user via the
26 __default__ flag
27
28 On Targeted policy systems the __default__ user is assigned to the
29 unconfined_u SELinux user.
30
31 You can list all Linux User to SELinux user mapping using:
32
33 semanage login -l
34
35 If you wanted to change the default user mapping to use the user_u
36 user, you would execute:
37
38 semanage login -m -s user_u __default__
39
40
41
43 The SELinux user user_u is defined in policy as a unprivileged user.
44 SELinux prevents unprivileged users from doing administration tasks
45 without transitioning to a different role.
46
47
50 The SELinux user user_u is able to X Windows login.
51
52
54 The SELinux user user_u is able to listen on the following tcp ports.
55
56 6000-6150
57
58 1178
59
60 8765
61
62 1720
63
64 16509,16514
65
66 9911
67
68 49152-49216
69
70 7100
71
72 8002
73
74 5404,5405
75
76 2628
77
78 6363
79
80 8081
81
82 1755
83
84 31416
85
86 11371
87
88 8099
89
90 4444
91
92 1314
93
94 all ports with out defined types
95
96 5988
97
98 5900-5999
99
100 1721,7000
101
102 1194
103
104 1213
105
106 9010
107
108 9418
109
110 27017-27019,28017-28019
111
112 5703
113
114 3493
115
116 4190
117
118 8891,8893
119
120 7390
121
122 1229
123
124 5989
125
126 6379
127
128 3261
129
130 5149,40040,50006-50008
131
132 4379
133
134 2005
135
136 3000,3001
137
138 6969,9001,9030,9051
139
140 24007-24027,38465-38469
141
142 13180,13701,13443-13446
143
144 8084
145
146 8036
147
148 9618
149
150 3128,8080,8118,8123,10001-10010
151
152 4690
153
154 7888,7889
155
156 5432
157
158 3401,4827
159
160 9080
161
162 11180,11701,11443-11446
163
164 3260
165
166 9103
167
168 7634
169
170 6667
171
172 3690
173
174 10031
175
176 51235
177
178 1433,1434
179
180 7410
181
182 2401
183
184 10050
185
186 1241
187
188 60000
189
190 5252
191
192 9696
193
194 10051
195
196 2126,3198
197
198 2600-2604,2606
199
200 11111
201
202 9090
203
204 9875
205
206 5679
207
208 3632
209
210 3874
211
212 1701
213
214 2083
215
216 6767,6769,6780-6799
217
218 6081,6082
219
220 11211
221
222 5060,5061
223
224 4713
225
226 3205
227
228 1863
229
230 1521,2483,2484
231
232 1358
233
234 1050
235
236 9050
237
238 49000
239
240 4330
241
242 5347
243
244 9191
245
246 3052
247
248 all ports > 500 and < 1024
249
250 10026
251
252 8140
253
254 1128,1129
255
256 2273
257
258 5323
259
260 4743
261
262 9225
263
264 3551
265
266 2947
267
268 3528,3529
269
270 1228
271
272 9292
273
274 5298
275
276 4500
277
278 5222,5223
279
280 2000,3905
281
282 5190-5193
283
284 1186,3306,63132-63164
285
286 3310
287
288 12888,12889
289
290 3129
291
292 1234
293
294 8021
295
296 9125
297
298 10080-10083
299
300 10024
301
302 8000,9433,16001
303
304 5335
305
306 2049,20048-20049
307
308 3636
309
310 4949
311
312 10025
313
314 8787
315
316 5445,5455
317
318 20048
319
320 5269
321
322 2040
323
324 5671,5672
325
326 6600
327
328 4712,4447,7600,9123,9990,9999,18001
329
330 25151
331
332 5000,5001,4331
333
334 1782,2207,2208,8290,50000,50002,8292,9100,9101,9102,9220,9221,9222,9280,9281,9282,9290,9291
335
336 5050
337
338 2501
339
340 7890
341
342 10180,10701,10443-10446
343
344 16851
345
346 5858
347
348 2703
349
350
351 The SELinux user user_u is able to connect to the following tcp ports.
352
353 389,636,3268
354
355 53
356
357 all ports
358
359 all ports with out defined types
360
361 all ports < 1024
362
363 5432
364
365 9080
366
367 88,750
368
369 111
370
371
372 The SELinux user user_u is able to listen on the following udp ports.
373
374 all ports with out defined types
375
376 all ports > 500 and < 1024
377
378
379 The SELinux user user_u is able to connect to the following tcp ports.
380
381 389,636,3268
382
383 53
384
385 all ports
386
387 all ports with out defined types
388
389 all ports < 1024
390
391 5432
392
393 9080
394
395 88,750
396
397 111
398
399
401 SELinux policy is customizable based on least access required. user
402 policy is extremely flexible and has several booleans that allow you to
403 manipulate the policy and run user with the tightest access possible.
404
405
406
407 If you want to allow regular users direct dri device access, you must
408 turn on the user_direct_dri boolean. Enabled by default.
409
410 setsebool -P user_direct_dri 1
411
412
413
414 If you want to allow regular users direct mouse access, you must turn
415 on the user_direct_mouse boolean. Disabled by default.
416
417 setsebool -P user_direct_mouse 1
418
419
420
421 If you want to control users use of ping and traceroute, you must turn
422 on the user_ping boolean. Enabled by default.
423
424 setsebool -P user_ping 1
425
426
427
428 If you want to allow user to r/w files on filesystems that do not have
429 extended attributes (FAT, CDROM, FLOPPY), you must turn on the
430 user_rw_noexattrfile boolean. Enabled by default.
431
432 setsebool -P user_rw_noexattrfile 1
433
434
435
436 If you want to allow user processes to change their priority, you must
437 turn on the user_setrlimit boolean. Enabled by default.
438
439 setsebool -P user_setrlimit 1
440
441
442
443 If you want to allow users to run TCP servers (bind to ports and accept
444 connection from the same domain and outside users) disabling this
445 forces FTP passive mode and may change other protocols, you must turn
446 on the user_tcp_server boolean. Disabled by default.
447
448 setsebool -P user_tcp_server 1
449
450
451
452 If you want to allow w to display everyone, you must turn on the
453 user_ttyfile_stat boolean. Disabled by default.
454
455 setsebool -P user_ttyfile_stat 1
456
457
458
459 If you want to allow direct login to the console device. Required for
460 System 390, you must turn on the allow_console_login boolean. Enabled
461 by default.
462
463 setsebool -P allow_console_login 1
464
465
466
467 If you want to allow all domains to use other domains file descriptors,
468 you must turn on the allow_domain_fd_use boolean. Enabled by default.
469
470 setsebool -P allow_domain_fd_use 1
471
472
473
474 If you want to allow unconfined executables to map a memory region as
475 both executable and writable, this is dangerous and the executable
476 should be reported in bugzilla), you must turn on the allow_execmem
477 boolean. Enabled by default.
478
479 setsebool -P allow_execmem 1
480
481
482
483 If you want to allow all unconfined executables to use libraries
484 requiring text relocation that are not labeled textrel_shlib_t), you
485 must turn on the allow_execmod boolean. Enabled by default.
486
487 setsebool -P allow_execmod 1
488
489
490
491 If you want to allow unconfined executables to make their stack exe‐
492 cutable. This should never, ever be necessary. Probably indicates a
493 badly coded executable, but could indicate an attack. This executable
494 should be reported in bugzilla), you must turn on the allow_execstack
495 boolean. Enabled by default.
496
497 setsebool -P allow_execstack 1
498
499
500
501 If you want to allow confined applications to run with kerberos, you
502 must turn on the allow_kerberos boolean. Enabled by default.
503
504 setsebool -P allow_kerberos 1
505
506
507
508 If you want to allow sysadm to debug or ptrace all processes, you must
509 turn on the allow_ptrace boolean. Disabled by default.
510
511 setsebool -P allow_ptrace 1
512
513
514
515 If you want to allow users to connect to mysql, you must turn on the
516 allow_user_mysql_connect boolean. Disabled by default.
517
518 setsebool -P allow_user_mysql_connect 1
519
520
521
522 If you want to allow users to connect to PostgreSQL, you must turn on
523 the allow_user_postgresql_connect boolean. Disabled by default.
524
525 setsebool -P allow_user_postgresql_connect 1
526
527
528
529 If you want to allows clients to write to the X server shared memory
530 segments, you must turn on the allow_write_xshm boolean. Disabled by
531 default.
532
533 setsebool -P allow_write_xshm 1
534
535
536
537 If you want to allow system to run with NIS, you must turn on the
538 allow_ypbind boolean. Disabled by default.
539
540 setsebool -P allow_ypbind 1
541
542
543
544 If you want to allow all domains to have the kernel load modules, you
545 must turn on the domain_kernel_load_modules boolean. Disabled by
546 default.
547
548 setsebool -P domain_kernel_load_modules 1
549
550
551
552 If you want to allow all domains to execute in fips_mode, you must turn
553 on the fips_mode boolean. Enabled by default.
554
555 setsebool -P fips_mode 1
556
557
558
559 If you want to determine whether calling user domains can execute Git
560 daemon in the git_session_t domain, you must turn on the git_ses‐
561 sion_users boolean. Disabled by default.
562
563 setsebool -P git_session_users 1
564
565
566
567 If you want to enable reading of urandom for all domains, you must turn
568 on the global_ssp boolean. Disabled by default.
569
570 setsebool -P global_ssp 1
571
572
573
574 If you want to allow httpd cgi support, you must turn on the
575 httpd_enable_cgi boolean. Enabled by default.
576
577 setsebool -P httpd_enable_cgi 1
578
579
580
581 If you want to unify HTTPD handling of all content files, you must turn
582 on the httpd_unified boolean. Disabled by default.
583
584 setsebool -P httpd_unified 1
585
586
587
588 If you want to allow confined applications to use nscd shared memory,
589 you must turn on the nscd_use_shm boolean. Enabled by default.
590
591 setsebool -P nscd_use_shm 1
592
593
594
595 If you want to allow pppd to be run for a regular user, you must turn
596 on the pppd_for_user boolean. Disabled by default.
597
598 setsebool -P pppd_for_user 1
599
600
601
602 If you want to enabling secure mode disallows programs, such as new‐
603 role, from transitioning to administrative user domains, you must turn
604 on the secure_mode boolean. Disabled by default.
605
606 setsebool -P secure_mode 1
607
608
609
610 If you want to allow ssh logins as sysadm_r:sysadm_t, you must turn on
611 the ssh_sysadm_login boolean. Disabled by default.
612
613 setsebool -P ssh_sysadm_login 1
614
615
616
617 If you want to support NFS home directories, you must turn on the
618 use_nfs_home_dirs boolean. Disabled by default.
619
620 setsebool -P use_nfs_home_dirs 1
621
622
623
624 If you want to support SAMBA home directories, you must turn on the
625 use_samba_home_dirs boolean. Disabled by default.
626
627 setsebool -P use_samba_home_dirs 1
628
629
630
631 If you want to allow xdm logins as sysadm, you must turn on the
632 xdm_sysadm_login boolean. Disabled by default.
633
634 setsebool -P xdm_sysadm_login 1
635
636
637
638 If you want to support X userspace object manager, you must turn on the
639 xserver_object_manager boolean. Disabled by default.
640
641 setsebool -P xserver_object_manager 1
642
643
644
646 The SELinux user user_u is able execute home content files.
647
648
650 Three things can happen when user_t attempts to execute a program.
651
652 1. SELinux Policy can deny user_t from executing the program.
653
654
655
656 2. SELinux Policy can allow user_t to execute the program in the cur‐
657 rent user type.
658
659 Execute the following to see the types that the SELinux user
660 user_t can execute without transitioning:
661
662 sesearch -A -s user_t -c file -p execute_no_trans
663
664
665
666 3. SELinux can allow user_t to execute the program and transition to a
667 new type.
668
669 Execute the following to see the types that the SELinux user
670 user_t can execute and transition:
671
672 $ sesearch -A -s user_t -c process -p transition
673
674
675
677 The SELinux process type user_t can manage files labeled with the fol‐
678 lowing file types. The paths listed are the default paths for these
679 file types. Note the processes UID still need to have DAC permissions.
680
681 anon_inodefs_t
682
683
684 auth_cache_t
685
686 /var/cache/coolkey(/.*)?
687
688 cgroup_t
689
690 /cgroup(/.*)?
691
692 chrome_sandbox_tmpfs_t
693
694
695 cifs_t
696
697
698 games_data_t
699
700 /var/games(/.*)?
701 /var/lib/games(/.*)?
702
703 git_user_content_t
704
705 /home/[^/]*/public_git(/.*)?
706 /home/[^/]*/.gitconfig
707 /home/staff/public_git(/.*)?
708 /home/staff/.gitconfig
709
710 gpg_agent_tmp_t
711
712
713 httpd_user_content_t
714
715 /home/[^/]*/((www)|(web)|(public_html))(/.+)?
716 /home/staff/((www)|(web)|(public_html))(/.+)?
717
718 httpd_user_htaccess_t
719
720
721 httpd_user_ra_content_t
722
723
724 httpd_user_rw_content_t
725
726
727 httpd_user_script_exec_t
728
729
730 iceauth_home_t
731
732 /home/[^/]*/.DCOP.*
733 /home/[^/]*/.ICEauthority.*
734 /home/staff/.DCOP.*
735 /home/staff/.ICEauthority.*
736
737 initrc_tmp_t
738
739
740 mail_spool_t
741
742 /var/mail(/.*)?
743 /var/spool/mail(/.*)?
744 /var/spool/imap(/.*)?
745
746 mnt_t
747
748 /mnt(/[^/]*)
749 /mnt(/[^/]*)?
750 /rhev(/[^/]*)?
751 /media(/[^/]*)
752 /media(/[^/]*)?
753 /etc/rhgb(/.*)?
754 /media/.hal-.*
755 /net
756 /afs
757 /rhev
758 /misc
759
760 mqueue_spool_t
761
762 /var/spool/(client)?mqueue(/.*)?
763
764 nfsd_rw_t
765
766
767 noxattrfs
768
769 all files on file systems which do not support extended attributes
770
771 sandbox_file_t
772
773
774 sandbox_tmpfs_type
775
776 all sandbox content in tmpfs file systems
777
778 screen_home_t
779
780 /root/.screen(/.*)?
781 /home/[^/]*/.screen(/.*)?
782 /home/[^/]*/.screenrc
783 /home/staff/.screen(/.*)?
784 /home/staff/.screenrc
785
786 screen_var_run_t
787
788 /var/run/screen(/.*)?
789
790 security_t
791
792
793 tmp_t
794
795 /tmp
796 /usr/tmp
797 /var/tmp
798 /tmp-inst
799 /var/tmp-inst
800 /var/tmp/vi.recover
801
802 usbfs_t
803
804
805 user_fonts_cache_t
806
807 /home/[^/]*/.fonts/auto(/.*)?
808 /home/[^/]*/.fontconfig(/.*)?
809 /home/[^/]*/.fonts.cache-.*
810 /home/staff/.fonts/auto(/.*)?
811 /home/staff/.fontconfig(/.*)?
812 /home/staff/.fonts.cache-.*
813
814 user_fonts_t
815
816 /home/[^/]*/.fonts(/.*)?
817 /home/staff/.fonts(/.*)?
818
819 user_home_type
820
821 all user home files
822
823 user_tmp_t
824
825 /tmp/gconfd-.*
826 /tmp/gconfd-staff
827
828 user_tmpfs_t
829
830 /dev/shm/mono.*
831 /dev/shm/pulse-shm.*
832
833 xauth_home_t
834
835 /root/.Xauth.*
836 /root/.xauth.*
837 /root/.serverauth.*
838 /var/lib/pqsql/.xauth.*
839 /var/lib/pqsql/.Xauthority.*
840 /var/lib/nxserver/home/.xauth.*
841 /var/lib/nxserver/home/.Xauthority.*
842 /home/[^/]*/.xauth.*
843 /home/[^/]*/.Xauthority.*
844 /home/[^/]*/.serverauth.*
845 /home/staff/.xauth.*
846 /home/staff/.Xauthority.*
847 /home/staff/.serverauth.*
848
849 xdm_tmp_t
850
851 /tmp/.X11-unix(/.*)?
852 /tmp/.ICE-unix(/.*)?
853 /tmp/.X0-lock
854
855 xserver_tmpfs_t
856
857
858
860 semanage fcontext can also be used to manipulate default file context
861 mappings.
862
863 semanage permissive can also be used to manipulate whether or not a
864 process type is permissive.
865
866 semanage module can also be used to enable/disable/install/remove pol‐
867 icy modules.
868
869 semanage boolean can also be used to manipulate the booleans
870
871
872 system-config-selinux is a GUI tool available to customize SELinux pol‐
873 icy settings.
874
875
877 This manual page was auto-generated using sepolicy manpage .
878
879
881 selinux(8), user(8), semanage(8), restorecon(8), chcon(1) , setse‐
882 bool(8), user_dbusd_selinux(8), user_dbusd_selinux(8),
883 user_execmem_selinux(8), user_execmem_selinux(8), user_java_selinux(8),
884 user_java_selinux(8), user_mail_selinux(8), user_mail_selinux(8),
885 user_mono_selinux(8), user_mono_selinux(8), user_openoffice_selinux(8),
886 user_openoffice_selinux(8), user_screen_selinux(8),
887 user_screen_selinux(8), user_seunshare_selinux(8), user_seun‐
888 share_selinux(8), user_ssh_agent_selinux(8), user_ssh_agent_selinux(8),
889 user_wine_selinux(8), user_wine_selinux(8)
890
891
892
893mgrepl@redhat.com user user_selinux(8)