1openvpn_unconfined_sScErLiipntu_xsePloilniucxy(8o)penvpn_uonpceonnvfpinn_eudn_csocnrfiipnted_script_selinux(8)
2
3
4
6 openvpn_unconfined_script_selinux - Security Enhanced Linux Policy for
7 the openvpn_unconfined_script processes
8
10 Security-Enhanced Linux secures the openvpn_unconfined_script processes
11 via flexible mandatory access control.
12
13 The openvpn_unconfined_script processes execute with the openvpn_uncon‐
14 fined_script_t SELinux type. You can check if you have these processes
15 running by executing the ps command with the -Z qualifier.
16
17 For example:
18
19 ps -eZ | grep openvpn_unconfined_script_t
20
21
22
24 The openvpn_unconfined_script_t SELinux type can be entered via the
25 file_type, shell_exec_t, unlabeled_t, proc_type, filesystem_type, open‐
26 vpn_unconfined_script_exec_t, mtrr_device_t, sysctl_type file types.
27
28 The default entrypoint paths for the openvpn_unconfined_script_t domain
29 are the following:
30
31 all files on the system, /bin/d?ash, /bin/zsh.*, /bin/ksh.*, /bin/sash,
32 /bin/tcsh, /bin/yash, /bin/mksh, /bin/fish, /bin/bash, /bin/bash2,
33 /usr/bin/fish, /sbin/nologin, /usr/sbin/sesh, /usr/sbin/smrsh,
34 /usr/bin/scponly, /usr/libexec/sesh, /usr/sbin/scponlyc, /usr/bin/git-
35 shell, /usr/libexec/git-core/git-shell, /etc/openvpn/scripts(/.*)?,
36 /dev/cpu/mtrr
37
39 SELinux defines process types (domains) for each process running on the
40 system
41
42 You can see the context of a process using the -Z option to ps
43
44 Policy governs the access confined processes have to files. SELinux
45 openvpn_unconfined_script policy is very flexible allowing users to
46 setup their openvpn_unconfined_script processes in as secure a method
47 as possible.
48
49 The following process types are defined for openvpn_unconfined_script:
50
51 openvpn_unconfined_script_t
52
53 Note: semanage permissive -a openvpn_unconfined_script_t can be used to
54 make the process type openvpn_unconfined_script_t permissive. SELinux
55 does not deny access to permissive process types, but the AVC (SELinux
56 denials) messages are still generated.
57
58
60 SELinux policy is customizable based on least access required. open‐
61 vpn_unconfined_script policy is extremely flexible and has several
62 booleans that allow you to manipulate the policy and run openvpn_uncon‐
63 fined_script with the tightest access possible.
64
65
66
67 If you want to allow all domains to use other domains file descriptors,
68 you must turn on the allow_domain_fd_use boolean. Enabled by default.
69
70 setsebool -P allow_domain_fd_use 1
71
72
73
74 If you want to allow unconfined executables to make their heap memory
75 executable. Doing this is a really bad idea. Probably indicates a
76 badly coded executable, but could indicate an attack. This executable
77 should be reported in bugzilla, you must turn on the allow_execheap
78 boolean. Disabled by default.
79
80 setsebool -P allow_execheap 1
81
82
83
84 If you want to allow unconfined executables to map a memory region as
85 both executable and writable, this is dangerous and the executable
86 should be reported in bugzilla), you must turn on the allow_execmem
87 boolean. Enabled by default.
88
89 setsebool -P allow_execmem 1
90
91
92
93 If you want to allow all unconfined executables to use libraries
94 requiring text relocation that are not labeled textrel_shlib_t), you
95 must turn on the allow_execmod boolean. Enabled by default.
96
97 setsebool -P allow_execmod 1
98
99
100
101 If you want to allow unconfined executables to make their stack exe‐
102 cutable. This should never, ever be necessary. Probably indicates a
103 badly coded executable, but could indicate an attack. This executable
104 should be reported in bugzilla), you must turn on the allow_execstack
105 boolean. Enabled by default.
106
107 setsebool -P allow_execstack 1
108
109
110
111 If you want to allow sysadm to debug or ptrace all processes, you must
112 turn on the allow_ptrace boolean. Disabled by default.
113
114 setsebool -P allow_ptrace 1
115
116
117
118 If you want to allow all domains to have the kernel load modules, you
119 must turn on the domain_kernel_load_modules boolean. Disabled by
120 default.
121
122 setsebool -P domain_kernel_load_modules 1
123
124
125
126 If you want to allow all domains to execute in fips_mode, you must turn
127 on the fips_mode boolean. Enabled by default.
128
129 setsebool -P fips_mode 1
130
131
132
133 If you want to enable reading of urandom for all domains, you must turn
134 on the global_ssp boolean. Disabled by default.
135
136 setsebool -P global_ssp 1
137
138
139
140 If you want to allow certain domains to map low memory in the kernel,
141 you must turn on the mmap_low_allowed boolean. Disabled by default.
142
143 setsebool -P mmap_low_allowed 1
144
145
146
147 If you want to allow openvpn to run unconfined scripts, you must turn
148 on the openvpn_run_unconfined boolean. Disabled by default.
149
150 setsebool -P openvpn_run_unconfined 1
151
152
153
154 If you want to boolean to determine whether the system permits loading
155 policy, setting enforcing mode, and changing boolean values. Set this
156 to true and you have to reboot to set it back, you must turn on the
157 secure_mode_policyload boolean. Disabled by default.
158
159 setsebool -P secure_mode_policyload 1
160
161
162
163 If you want to support X userspace object manager, you must turn on the
164 xserver_object_manager boolean. Disabled by default.
165
166 setsebool -P xserver_object_manager 1
167
168
169
171 The SELinux process type openvpn_unconfined_script_t can manage files
172 labeled with the following file types. The paths listed are the
173 default paths for these file types. Note the processes UID still need
174 to have DAC permissions.
175
176 file_type
177
178 all files on the system
179
180
182 SELinux requires files to have an extended attribute to define the file
183 type.
184
185 You can see the context of a file using the -Z option to ls
186
187 Policy governs the access confined processes have to these files.
188 SELinux openvpn_unconfined_script policy is very flexible allowing
189 users to setup their openvpn_unconfined_script processes in as secure a
190 method as possible.
191
192 The following file types are defined for openvpn_unconfined_script:
193
194
195
196 openvpn_unconfined_script_exec_t
197
198 - Set files with the openvpn_unconfined_script_exec_t type, if you want
199 to transition an executable to the openvpn_unconfined_script_t domain.
200
201
202
203 Note: File context can be temporarily modified with the chcon command.
204 If you want to permanently change the file context you need to use the
205 semanage fcontext command. This will modify the SELinux labeling data‐
206 base. You will need to use restorecon to apply the labels.
207
208
210 semanage fcontext can also be used to manipulate default file context
211 mappings.
212
213 semanage permissive can also be used to manipulate whether or not a
214 process type is permissive.
215
216 semanage module can also be used to enable/disable/install/remove pol‐
217 icy modules.
218
219 semanage boolean can also be used to manipulate the booleans
220
221
222 system-config-selinux is a GUI tool available to customize SELinux pol‐
223 icy settings.
224
225
227 This manual page was auto-generated using sepolicy manpage .
228
229
231 selinux(8), openvpn_unconfined_script(8), semanage(8), restorecon(8),
232 chcon(1) , setsebool(8)
233
234
235
236openvpn_unconfined_script 15-06-03openvpn_unconfined_script_selinux(8)