1updpwd_selinux(8) SELinux Policy updpwd updpwd_selinux(8)
2
3
4
6 updpwd_selinux - Security Enhanced Linux Policy for the updpwd pro‐
7 cesses
8
10 Security-Enhanced Linux secures the updpwd processes via flexible
11 mandatory access control.
12
13 The updpwd processes execute with the updpwd_t SELinux type. You can
14 check if you have these processes running by executing the ps command
15 with the -Z qualifier.
16
17 For example:
18
19 ps -eZ | grep updpwd_t
20
21
22
24 The updpwd_t SELinux type can be entered via the updpwd_exec_t file
25 type.
26
27 The default entrypoint paths for the updpwd_t domain are the following:
28
29 /sbin/unix_update, /usr/sbin/unix_update, /usr/sbin/pwhistory_helper
30
32 SELinux defines process types (domains) for each process running on the
33 system
34
35 You can see the context of a process using the -Z option to ps
36
37 Policy governs the access confined processes have to files. SELinux
38 updpwd policy is very flexible allowing users to setup their updpwd
39 processes in as secure a method as possible.
40
41 The following process types are defined for updpwd:
42
43 updpwd_t
44
45 Note: semanage permissive -a updpwd_t can be used to make the process
46 type updpwd_t permissive. SELinux does not deny access to permissive
47 process types, but the AVC (SELinux denials) messages are still gener‐
48 ated.
49
50
52 SELinux policy is customizable based on least access required. updpwd
53 policy is extremely flexible and has several booleans that allow you to
54 manipulate the policy and run updpwd with the tightest access possible.
55
56
57
58 If you want to allow users to resolve user passwd entries directly from
59 ldap rather then using a sssd server, you must turn on the authlo‐
60 gin_nsswitch_use_ldap boolean. Disabled by default.
61
62 setsebool -P authlogin_nsswitch_use_ldap 1
63
64
65
66 If you want to deny any process from ptracing or debugging any other
67 processes, you must turn on the deny_ptrace boolean. Enabled by
68 default.
69
70 setsebool -P deny_ptrace 1
71
72
73
74 If you want to allow any process to mmap any file on system with
75 attribute file_type, you must turn on the domain_can_mmap_files bool‐
76 ean. Enabled by default.
77
78 setsebool -P domain_can_mmap_files 1
79
80
81
82 If you want to allow all domains write to kmsg_device, while kernel is
83 executed with systemd.log_target=kmsg parameter, you must turn on the
84 domain_can_write_kmsg boolean. Disabled by default.
85
86 setsebool -P domain_can_write_kmsg 1
87
88
89
90 If you want to allow all domains to use other domains file descriptors,
91 you must turn on the domain_fd_use boolean. Enabled by default.
92
93 setsebool -P domain_fd_use 1
94
95
96
97 If you want to allow all domains to have the kernel load modules, you
98 must turn on the domain_kernel_load_modules boolean. Disabled by
99 default.
100
101 setsebool -P domain_kernel_load_modules 1
102
103
104
105 If you want to allow all domains to execute in fips_mode, you must turn
106 on the fips_mode boolean. Enabled by default.
107
108 setsebool -P fips_mode 1
109
110
111
112 If you want to enable reading of urandom for all domains, you must turn
113 on the global_ssp boolean. Disabled by default.
114
115 setsebool -P global_ssp 1
116
117
118
119 If you want to allow Apache to use mod_auth_pam, you must turn on the
120 httpd_mod_auth_pam boolean. Disabled by default.
121
122 setsebool -P httpd_mod_auth_pam 1
123
124
125
126 If you want to allow confined applications to run with kerberos, you
127 must turn on the kerberos_enabled boolean. Enabled by default.
128
129 setsebool -P kerberos_enabled 1
130
131
132
133 If you want to allow nagios/nrpe to call sudo from NRPE utils scripts,
134 you must turn on the nagios_run_sudo boolean. Disabled by default.
135
136 setsebool -P nagios_run_sudo 1
137
138
139
140 If you want to allow system to run with NIS, you must turn on the
141 nis_enabled boolean. Disabled by default.
142
143 setsebool -P nis_enabled 1
144
145
146
147 If you want to allow confined applications to use nscd shared memory,
148 you must turn on the nscd_use_shm boolean. Disabled by default.
149
150 setsebool -P nscd_use_shm 1
151
152
153
155 The SELinux process type updpwd_t can manage files labeled with the
156 following file types. The paths listed are the default paths for these
157 file types. Note the processes UID still need to have DAC permissions.
158
159 etc_t
160
161 /etc/.*
162 /usr/etc(/.*)?
163 /var/ftp/etc(/.*)?
164 /var/lib/openshift/.limits.d(/.*)?
165 /var/lib/openshift/.openshift-proxy.d(/.*)?
166 /var/lib/openshift/.stickshift-proxy.d(/.*)?
167 /var/lib/stickshift/.limits.d(/.*)?
168 /var/lib/stickshift/.stickshift-proxy.d(/.*)?
169 /var/named/chroot/etc(/.*)?
170 /etc/ipsec.d/examples(/.*)?
171 /var/spool/postfix/etc(/.*)?
172 /etc
173 /etc/cups/client.conf
174
175 passwd_file_t
176
177 /etc/group[-+]?
178 /etc/passwd[-+]?
179 /etc/passwd.adjunct.*
180 /etc/ptmptmp
181 /etc/.pwd.lock
182 /etc/group.lock
183 /etc/passwd.OLD
184 /etc/passwd.lock
185
186 shadow_t
187
188 /etc/shadow.*
189 /etc/gshadow.*
190 /etc/nshadow.*
191 /var/db/shadow.*
192 /etc/security/opasswd
193 /etc/security/opasswd.old
194
195
197 SELinux requires files to have an extended attribute to define the file
198 type.
199
200 You can see the context of a file using the -Z option to ls
201
202 Policy governs the access confined processes have to these files.
203 SELinux updpwd policy is very flexible allowing users to setup their
204 updpwd processes in as secure a method as possible.
205
206 The following file types are defined for updpwd:
207
208
209
210 updpwd_exec_t
211
212 - Set files with the updpwd_exec_t type, if you want to transition an
213 executable to the updpwd_t domain.
214
215
216 Paths:
217 /sbin/unix_update, /usr/sbin/unix_update, /usr/sbin/pwhis‐
218 tory_helper
219
220
221 Note: File context can be temporarily modified with the chcon command.
222 If you want to permanently change the file context you need to use the
223 semanage fcontext command. This will modify the SELinux labeling data‐
224 base. You will need to use restorecon to apply the labels.
225
226
228 semanage fcontext can also be used to manipulate default file context
229 mappings.
230
231 semanage permissive can also be used to manipulate whether or not a
232 process type is permissive.
233
234 semanage module can also be used to enable/disable/install/remove pol‐
235 icy modules.
236
237 semanage boolean can also be used to manipulate the booleans
238
239
240 system-config-selinux is a GUI tool available to customize SELinux pol‐
241 icy settings.
242
243
245 This manual page was auto-generated using sepolicy manpage .
246
247
249 selinux(8), updpwd(8), semanage(8), restorecon(8), chcon(1), sepol‐
250 icy(8) , setsebool(8)
251
252
253
254updpwd 19-04-25 updpwd_selinux(8)