1sandbox_min_client_selinSuExL(i8n)ux Policy sandbox_min_scalnidebnotx_min_client_selinux(8)
2
3
4

NAME

6       sandbox_min_client_selinux  -  Security  Enhanced  Linux Policy for the
7       sandbox_min_client processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the  sandbox_min_client  processes  via
11       flexible mandatory access control.
12
13       The  sandbox_min_client processes execute with the sandbox_min_client_t
14       SELinux type. You can check if you have these processes running by exe‐
15       cuting the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep sandbox_min_client_t
20
21
22

ENTRYPOINTS

24       The  sandbox_min_client_t  SELinux  type  can  be entered via the sand‐
25       box_exec_t file type.
26
27       The default entrypoint paths for the  sandbox_min_client_t  domain  are
28       the following:
29
30       /usr/share/sandbox/start
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       sandbox_min_client  policy  is  very  flexible  allowing users to setup
40       their sandbox_min_client processes in as secure a method as possible.
41
42       The following process types are defined for sandbox_min_client:
43
44       sandbox_min_client_t
45
46       Note: semanage permissive -a sandbox_min_client_t can be used  to  make
47       the process type sandbox_min_client_t permissive. SELinux does not deny
48       access to permissive process types, but the AVC (SELinux denials)  mes‐
49       sages are still generated.
50
51

BOOLEANS

53       SELinux  policy  is customizable based on least access required.  sand‐
54       box_min_client policy is extremely flexible and  has  several  booleans
55       that allow you to manipulate the policy and run sandbox_min_client with
56       the tightest access possible.
57
58
59
60       If you want to deny user domains applications to map a memory region as
61       both  executable  and  writable,  this  is dangerous and the executable
62       should be reported in bugzilla, you must turn on the deny_execmem bool‐
63       ean. Enabled by default.
64
65       setsebool -P deny_execmem 1
66
67
68
69       If you want to allow all domains to execute in fips_mode, you must turn
70       on the fips_mode boolean. Enabled by default.
71
72       setsebool -P fips_mode 1
73
74
75

MANAGED FILES

77       The SELinux process type sandbox_min_client_t can manage files  labeled
78       with  the following file types.  The paths listed are the default paths
79       for these file types.  Note the processes UID still need  to  have  DAC
80       permissions.
81
82       cifs_t
83
84
85       fusefs_t
86
87            /var/run/user/[^/]*/gvfs
88
89       mozilla_plugin_tmpfs_t
90
91
92       nfs_t
93
94
95       sandbox_file_t
96
97
98       sandbox_min_client_tmpfs_t
99
100
101       security_t
102
103            /selinux
104
105

COMMANDS

107       semanage  fcontext  can also be used to manipulate default file context
108       mappings.
109
110       semanage permissive can also be used to manipulate  whether  or  not  a
111       process type is permissive.
112
113       semanage  module can also be used to enable/disable/install/remove pol‐
114       icy modules.
115
116       semanage boolean can also be used to manipulate the booleans
117
118
119       system-config-selinux is a GUI tool available to customize SELinux pol‐
120       icy settings.
121
122

AUTHOR

124       This manual page was auto-generated using sepolicy manpage .
125
126

SEE ALSO

128       selinux(8),    sandbox_min_client(8),    semanage(8),    restorecon(8),
129       chcon(1), sepolicy(8), setsebool(8)
130
131
132
133sandbox_min_client                 19-10-08      sandbox_min_client_selinux(8)
Impressum