1condor_startd_ssh_selinuSxE(L8i)nux Policy condor_startdc_osnsdhor_startd_ssh_selinux(8)
2
3
4

NAME

6       condor_startd_ssh_selinux - Security Enhanced Linux Policy for the con‐
7       dor_startd_ssh processes
8

DESCRIPTION

10       Security-Enhanced Linux secures  the  condor_startd_ssh  processes  via
11       flexible mandatory access control.
12
13       The  condor_startd_ssh  processes  execute with the condor_startd_ssh_t
14       SELinux type. You can check if you have these processes running by exe‐
15       cuting the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep condor_startd_ssh_t
20
21
22

ENTRYPOINTS

24       The  condor_startd_ssh_t SELinux type can be entered via the ssh_exec_t
25       file type.
26
27       The default entrypoint paths for the condor_startd_ssh_t domain are the
28       following:
29
30       /usr/bin/ssh, /usr/libexec/nm-ssh-service
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       condor_startd_ssh policy is very flexible allowing users to setup their
40       condor_startd_ssh processes in as secure a method as possible.
41
42       The following process types are defined for condor_startd_ssh:
43
44       condor_startd_ssh_t
45
46       Note: semanage permissive -a condor_startd_ssh_t can be  used  to  make
47       the  process type condor_startd_ssh_t permissive. SELinux does not deny
48       access to permissive process types, but the AVC (SELinux denials)  mes‐
49       sages are still generated.
50
51

BOOLEANS

53       SELinux  policy  is  customizable based on least access required.  con‐
54       dor_startd_ssh policy is extremely flexible and  has  several  booleans
55       that  allow you to manipulate the policy and run condor_startd_ssh with
56       the tightest access possible.
57
58
59
60       If you want to allow users to resolve user passwd entries directly from
61       ldap  rather  then  using  a  sssd server, you must turn on the authlo‐
62       gin_nsswitch_use_ldap boolean. Disabled by default.
63
64       setsebool -P authlogin_nsswitch_use_ldap 1
65
66
67
68       If you want to allow all domains to execute in fips_mode, you must turn
69       on the fips_mode boolean. Enabled by default.
70
71       setsebool -P fips_mode 1
72
73
74
75       If  you  want  to allow confined applications to run with kerberos, you
76       must turn on the kerberos_enabled boolean. Enabled by default.
77
78       setsebool -P kerberos_enabled 1
79
80
81
82       If you want to allow system to run with  NIS,  you  must  turn  on  the
83       nis_enabled boolean. Disabled by default.
84
85       setsebool -P nis_enabled 1
86
87
88
89       If  you  want to allow confined applications to use nscd shared memory,
90       you must turn on the nscd_use_shm boolean. Disabled by default.
91
92       setsebool -P nscd_use_shm 1
93
94
95

MANAGED FILES

97       The SELinux process type condor_startd_ssh_t can manage  files  labeled
98       with  the following file types.  The paths listed are the default paths
99       for these file types.  Note the processes UID still need  to  have  DAC
100       permissions.
101
102       condor_var_lib_t
103
104            /var/lib/condor(/.*)?
105            /var/lib/condor/spool(/.*)?
106            /var/lib/condor/execute(/.*)?
107
108       ssh_home_t
109
110            /var/lib/[^/]+/.ssh(/.*)?
111            /root/.ssh(/.*)?
112            /var/lib/one/.ssh(/.*)?
113            /var/lib/pgsql/.ssh(/.*)?
114            /var/lib/openshift/[^/]+/.ssh(/.*)?
115            /var/lib/amanda/.ssh(/.*)?
116            /var/lib/stickshift/[^/]+/.ssh(/.*)?
117            /var/lib/gitolite/.ssh(/.*)?
118            /var/lib/nocpulse/.ssh(/.*)?
119            /var/lib/gitolite3/.ssh(/.*)?
120            /var/lib/openshift/gear/[^/]+/.ssh(/.*)?
121            /root/.shosts
122            /home/[^/]+/.ssh(/.*)?
123            /home/[^/]+/.ansible/cp/.*
124            /home/[^/]+/.shosts
125
126       user_tmp_t
127
128            /dev/shm/mono.*
129            /var/run/user(/.*)?
130            /tmp/.ICE-unix(/.*)?
131            /tmp/.X11-unix(/.*)?
132            /dev/shm/pulse-shm.*
133            /tmp/.X0-lock
134            /tmp/hsperfdata_root
135            /var/tmp/hsperfdata_root
136            /home/[^/]+/tmp
137            /home/[^/]+/.tmp
138            /tmp/gconfd-[^/]+
139
140

COMMANDS

142       semanage  fcontext  can also be used to manipulate default file context
143       mappings.
144
145       semanage permissive can also be used to manipulate  whether  or  not  a
146       process type is permissive.
147
148       semanage  module can also be used to enable/disable/install/remove pol‐
149       icy modules.
150
151       semanage boolean can also be used to manipulate the booleans
152
153
154       system-config-selinux is a GUI tool available to customize SELinux pol‐
155       icy settings.
156
157

AUTHOR

159       This manual page was auto-generated using sepolicy manpage .
160
161

SEE ALSO

163       selinux(8), condor_startd_ssh(8), semanage(8), restorecon(8), chcon(1),
164       sepolicy(8), setsebool(8)
165
166
167
168condor_startd_ssh                  19-05-30       condor_startd_ssh_selinux(8)
Impressum