1ssh_keygen_selinux(8) SELinux Policy ssh_keygen ssh_keygen_selinux(8)
2
3
4
6 ssh_keygen_selinux - Security Enhanced Linux Policy for the ssh_keygen
7 processes
8
10 Security-Enhanced Linux secures the ssh_keygen processes via flexible
11 mandatory access control.
12
13 The ssh_keygen processes execute with the ssh_keygen_t SELinux type.
14 You can check if you have these processes running by executing the ps
15 command with the -Z qualifier.
16
17 For example:
18
19 ps -eZ | grep ssh_keygen_t
20
21
22
24 The ssh_keygen_t SELinux type can be entered via the ssh_keygen_exec_t
25 file type.
26
27 The default entrypoint paths for the ssh_keygen_t domain are the fol‐
28 lowing:
29
30 /usr/bin/ssh-keygen
31
33 SELinux defines process types (domains) for each process running on the
34 system
35
36 You can see the context of a process using the -Z option to ps
37
38 Policy governs the access confined processes have to files. SELinux
39 ssh_keygen policy is very flexible allowing users to setup their
40 ssh_keygen processes in as secure a method as possible.
41
42 The following process types are defined for ssh_keygen:
43
44 ssh_keygen_t
45
46 Note: semanage permissive -a ssh_keygen_t can be used to make the
47 process type ssh_keygen_t permissive. SELinux does not deny access to
48 permissive process types, but the AVC (SELinux denials) messages are
49 still generated.
50
51
53 SELinux policy is customizable based on least access required.
54 ssh_keygen policy is extremely flexible and has several booleans that
55 allow you to manipulate the policy and run ssh_keygen with the tightest
56 access possible.
57
58
59
60 If you want to allow users to resolve user passwd entries directly from
61 ldap rather then using a sssd server, you must turn on the authlo‐
62 gin_nsswitch_use_ldap boolean. Disabled by default.
63
64 setsebool -P authlogin_nsswitch_use_ldap 1
65
66
67
68 If you want to allow all domains to execute in fips_mode, you must turn
69 on the fips_mode boolean. Enabled by default.
70
71 setsebool -P fips_mode 1
72
73
74
75 If you want to allow confined applications to run with kerberos, you
76 must turn on the kerberos_enabled boolean. Enabled by default.
77
78 setsebool -P kerberos_enabled 1
79
80
81
82 If you want to allow system to run with NIS, you must turn on the
83 nis_enabled boolean. Disabled by default.
84
85 setsebool -P nis_enabled 1
86
87
88
89 If you want to allow confined applications to use nscd shared memory,
90 you must turn on the nscd_use_shm boolean. Disabled by default.
91
92 setsebool -P nscd_use_shm 1
93
94
95
97 The SELinux process type ssh_keygen_t can manage files labeled with the
98 following file types. The paths listed are the default paths for these
99 file types. Note the processes UID still need to have DAC permissions.
100
101 cifs_t
102
103
104 ecryptfs_t
105
106 /home/[^/]+/.Private(/.*)?
107 /home/[^/]+/.ecryptfs(/.*)?
108
109 fusefs_t
110
111 /var/run/user/[^/]*/gvfs
112
113 nfs_t
114
115
116 ssh_home_t
117
118 /var/lib/[^/]+/.ssh(/.*)?
119 /root/.ssh(/.*)?
120 /var/lib/one/.ssh(/.*)?
121 /var/lib/pgsql/.ssh(/.*)?
122 /var/lib/openshift/[^/]+/.ssh(/.*)?
123 /var/lib/amanda/.ssh(/.*)?
124 /var/lib/stickshift/[^/]+/.ssh(/.*)?
125 /var/lib/gitolite/.ssh(/.*)?
126 /var/lib/nocpulse/.ssh(/.*)?
127 /var/lib/gitolite3/.ssh(/.*)?
128 /var/lib/openshift/gear/[^/]+/.ssh(/.*)?
129 /root/.shosts
130 /home/[^/]+/.ssh(/.*)?
131 /home/[^/]+/.ansible/cp/.*
132 /home/[^/]+/.shosts
133
134 ssh_keygen_tmp_t
135
136
137 sshd_key_t
138
139 /etc/ssh/ssh_host.*_key
140 /etc/ssh/ssh_host.*_key.pub
141 /etc/ssh/primes
142
143
145 SELinux requires files to have an extended attribute to define the file
146 type.
147
148 You can see the context of a file using the -Z option to ls
149
150 Policy governs the access confined processes have to these files.
151 SELinux ssh_keygen policy is very flexible allowing users to setup
152 their ssh_keygen processes in as secure a method as possible.
153
154 STANDARD FILE CONTEXT
155
156 SELinux defines the file context types for the ssh_keygen, if you
157 wanted to store files with these types in a diffent paths, you need to
158 execute the semanage command to sepecify alternate labeling and then
159 use restorecon to put the labels on disk.
160
161 semanage fcontext -a -t ssh_keygen_tmp_t '/srv/myssh_keygen_con‐
162 tent(/.*)?'
163 restorecon -R -v /srv/myssh_keygen_content
164
165 Note: SELinux often uses regular expressions to specify labels that
166 match multiple files.
167
168 The following file types are defined for ssh_keygen:
169
170
171
172 ssh_keygen_exec_t
173
174 - Set files with the ssh_keygen_exec_t type, if you want to transition
175 an executable to the ssh_keygen_t domain.
176
177
178
179 ssh_keygen_tmp_t
180
181 - Set files with the ssh_keygen_tmp_t type, if you want to store ssh
182 keygen temporary files in the /tmp directories.
183
184
185
186 Note: File context can be temporarily modified with the chcon command.
187 If you want to permanently change the file context you need to use the
188 semanage fcontext command. This will modify the SELinux labeling data‐
189 base. You will need to use restorecon to apply the labels.
190
191
193 semanage fcontext can also be used to manipulate default file context
194 mappings.
195
196 semanage permissive can also be used to manipulate whether or not a
197 process type is permissive.
198
199 semanage module can also be used to enable/disable/install/remove pol‐
200 icy modules.
201
202 semanage boolean can also be used to manipulate the booleans
203
204
205 system-config-selinux is a GUI tool available to customize SELinux pol‐
206 icy settings.
207
208
210 This manual page was auto-generated using sepolicy manpage .
211
212
214 selinux(8), ssh_keygen(8), semanage(8), restorecon(8), chcon(1), sepol‐
215 icy(8), setsebool(8)
216
217
218
219ssh_keygen 19-05-30 ssh_keygen_selinux(8)