1openvpn_unconfined_sScErLiipntu_xsePloilniucxy(8o)penvpn_uonpceonnvfpinn_eudn_csocnrfiipnted_script_selinux(8)
2
3
4

NAME

6       openvpn_unconfined_script_selinux  - Security Enhanced Linux Policy for
7       the openvpn_unconfined_script processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the openvpn_unconfined_script processes
11       via flexible mandatory access control.
12
13       The openvpn_unconfined_script processes execute with the openvpn_uncon‐
14       fined_script_t SELinux type. You can check if you have these  processes
15       running by executing the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep openvpn_unconfined_script_t
20
21
22

ENTRYPOINTS

24       The  openvpn_unconfined_script_t  SELinux  type  can be entered via the
25       shell_exec_t, openvpn_unconfined_script_exec_t file types.
26
27       The default entrypoint paths for the openvpn_unconfined_script_t domain
28       are the following:
29
30       /bin/d?ash,  /bin/ksh.*,  /bin/zsh.*,  /usr/bin/d?ash,  /usr/bin/ksh.*,
31       /usr/bin/zsh.*, /bin/esh, /bin/bash, /bin/fish,  /bin/mksh,  /bin/sash,
32       /bin/tcsh,    /bin/yash,   /bin/bash2,   /usr/bin/esh,   /sbin/nologin,
33       /usr/bin/bash,     /usr/bin/fish,     /usr/bin/mksh,     /usr/bin/sash,
34       /usr/bin/tcsh,     /usr/bin/yash,    /usr/bin/bash2,    /usr/sbin/sesh,
35       /usr/sbin/smrsh, /usr/bin/scponly,  /usr/libexec/sesh,  /usr/sbin/nolo‐
36       gin,  /usr/bin/git-shell,  /usr/sbin/scponlyc,  /usr/libexec/sudo/sesh,
37       /usr/bin/cockpit-bridge, /usr/libexec/cockpit-agent,  /usr/libexec/git-
38       core/git-shell, /etc/openvpn/scripts(/.*)?
39

PROCESS TYPES

41       SELinux defines process types (domains) for each process running on the
42       system
43
44       You can see the context of a process using the -Z option to ps
45
46       Policy governs the access confined processes have  to  files.   SELinux
47       openvpn_unconfined_script  policy  is  very  flexible allowing users to
48       setup their openvpn_unconfined_script processes in as secure  a  method
49       as possible.
50
51       The following process types are defined for openvpn_unconfined_script:
52
53       openvpn_unconfined_script_t
54
55       Note: semanage permissive -a openvpn_unconfined_script_t can be used to
56       make the process type openvpn_unconfined_script_t  permissive.  SELinux
57       does  not deny access to permissive process types, but the AVC (SELinux
58       denials) messages are still generated.
59
60

BOOLEANS

62       SELinux policy is customizable based on least access  required.   open‐
63       vpn_unconfined_script  policy  is  extremely  flexible  and has several
64       booleans that allow you to manipulate the policy and run openvpn_uncon‐
65       fined_script with the tightest access possible.
66
67
68
69       If you want to deny user domains applications to map a memory region as
70       both executable and writable, this  is  dangerous  and  the  executable
71       should be reported in bugzilla, you must turn on the deny_execmem bool‐
72       ean. Enabled by default.
73
74       setsebool -P deny_execmem 1
75
76
77
78       If you want to allow all domains to execute in fips_mode, you must turn
79       on the fips_mode boolean. Enabled by default.
80
81       setsebool -P fips_mode 1
82
83
84
85       If  you  want  to control the ability to mmap a low area of the address
86       space, as configured by /proc/sys/vm/mmap_min_addr, you  must  turn  on
87       the mmap_low_allowed boolean. Disabled by default.
88
89       setsebool -P mmap_low_allowed 1
90
91
92
93       If  you  want to allow openvpn to run unconfined scripts, you must turn
94       on the openvpn_run_unconfined boolean. Disabled by default.
95
96       setsebool -P openvpn_run_unconfined 1
97
98
99
100       If you want to disable kernel module loading,  you  must  turn  on  the
101       secure_mode_insmod boolean. Enabled by default.
102
103       setsebool -P secure_mode_insmod 1
104
105
106
107       If  you  want to allow unconfined executables to make their heap memory
108       executable.  Doing this is a really  bad  idea.  Probably  indicates  a
109       badly  coded  executable, but could indicate an attack. This executable
110       should  be  reported  in  bugzilla,  you  must  turn  on   the   selin‐
111       uxuser_execheap boolean. Disabled by default.
112
113       setsebool -P selinuxuser_execheap 1
114
115
116
117       If  you  want  to allow unconfined executables to make their stack exe‐
118       cutable.  This should never, ever be necessary.  Probably  indicates  a
119       badly  coded  executable, but could indicate an attack. This executable
120       should be reported in bugzilla, you must turn on the  selinuxuser_exec‐
121       stack boolean. Enabled by default.
122
123       setsebool -P selinuxuser_execstack 1
124
125
126

MANAGED FILES

128       The  SELinux  process type openvpn_unconfined_script_t can manage files
129       labeled with the following  file  types.   The  paths  listed  are  the
130       default  paths for these file types.  Note the processes UID still need
131       to have DAC permissions.
132
133       file_type
134
135            all files on the system
136
137

FILE CONTEXTS

139       SELinux requires files to have an extended attribute to define the file
140       type.
141
142       You can see the context of a file using the -Z option to ls
143
144       Policy  governs  the  access  confined  processes  have to these files.
145       SELinux openvpn_unconfined_script  policy  is  very  flexible  allowing
146       users to setup their openvpn_unconfined_script processes in as secure a
147       method as possible.
148
149       The following file types are defined for openvpn_unconfined_script:
150
151
152
153       openvpn_unconfined_script_exec_t
154
155       - Set files with the openvpn_unconfined_script_exec_t type, if you want
156       to transition an executable to the openvpn_unconfined_script_t domain.
157
158
159
160       Note:  File context can be temporarily modified with the chcon command.
161       If you want to permanently change the file context you need to use  the
162       semanage fcontext command.  This will modify the SELinux labeling data‐
163       base.  You will need to use restorecon to apply the labels.
164
165

COMMANDS

167       semanage fcontext can also be used to manipulate default  file  context
168       mappings.
169
170       semanage  permissive  can  also  be used to manipulate whether or not a
171       process type is permissive.
172
173       semanage module can also be used to enable/disable/install/remove  pol‐
174       icy modules.
175
176       semanage boolean can also be used to manipulate the booleans
177
178
179       system-config-selinux is a GUI tool available to customize SELinux pol‐
180       icy settings.
181
182

AUTHOR

184       This manual page was auto-generated using sepolicy manpage .
185
186

SEE ALSO

188       selinux(8), openvpn_unconfined_script(8),  semanage(8),  restorecon(8),
189       chcon(1), sepolicy(8), setsebool(8)
190
191
192
193openvpn_unconfined_script          19-06-18openvpn_unconfined_script_selinux(8)
Impressum