1openvpn_unconfined_sScErLiipntu_xsePloilniucxy(8o)penvpn_uonpceonnvfpinn_eudn_csocnrfiipnted_script_selinux(8)
2
3
4
6 openvpn_unconfined_script_selinux - Security Enhanced Linux Policy for
7 the openvpn_unconfined_script processes
8
10 Security-Enhanced Linux secures the openvpn_unconfined_script processes
11 via flexible mandatory access control.
12
13 The openvpn_unconfined_script processes execute with the openvpn_uncon‐
14 fined_script_t SELinux type. You can check if you have these processes
15 running by executing the ps command with the -Z qualifier.
16
17 For example:
18
19 ps -eZ | grep openvpn_unconfined_script_t
20
21
22
24 The openvpn_unconfined_script_t SELinux type can be entered via the
25 shell_exec_t, openvpn_unconfined_script_exec_t file types.
26
27 The default entrypoint paths for the openvpn_unconfined_script_t domain
28 are the following:
29
30 /bin/d?ash, /bin/ksh.*, /bin/zsh.*, /usr/bin/d?ash, /usr/bin/ksh.*,
31 /usr/bin/zsh.*, /bin/esh, /bin/bash, /bin/fish, /bin/mksh, /bin/sash,
32 /bin/tcsh, /bin/yash, /bin/bash2, /usr/bin/esh, /sbin/nologin,
33 /usr/bin/bash, /usr/bin/fish, /usr/bin/mksh, /usr/bin/sash,
34 /usr/bin/tcsh, /usr/bin/yash, /usr/bin/bash2, /usr/sbin/sesh,
35 /usr/sbin/smrsh, /usr/bin/scponly, /usr/libexec/sesh, /usr/sbin/nolo‐
36 gin, /usr/bin/git-shell, /usr/sbin/scponlyc, /usr/libexec/sudo/sesh,
37 /usr/bin/cockpit-bridge, /usr/libexec/cockpit-agent, /usr/libexec/git-
38 core/git-shell, /etc/openvpn/scripts(/.*)?
39
41 SELinux defines process types (domains) for each process running on the
42 system
43
44 You can see the context of a process using the -Z option to ps
45
46 Policy governs the access confined processes have to files. SELinux
47 openvpn_unconfined_script policy is very flexible allowing users to
48 setup their openvpn_unconfined_script processes in as secure a method
49 as possible.
50
51 The following process types are defined for openvpn_unconfined_script:
52
53 openvpn_unconfined_script_t
54
55 Note: semanage permissive -a openvpn_unconfined_script_t can be used to
56 make the process type openvpn_unconfined_script_t permissive. SELinux
57 does not deny access to permissive process types, but the AVC (SELinux
58 denials) messages are still generated.
59
60
62 SELinux policy is customizable based on least access required. open‐
63 vpn_unconfined_script policy is extremely flexible and has several
64 booleans that allow you to manipulate the policy and run openvpn_uncon‐
65 fined_script with the tightest access possible.
66
67
68
69 If you want to deny user domains applications to map a memory region as
70 both executable and writable, this is dangerous and the executable
71 should be reported in bugzilla, you must turn on the deny_execmem bool‐
72 ean. Enabled by default.
73
74 setsebool -P deny_execmem 1
75
76
77
78 If you want to allow all domains to execute in fips_mode, you must turn
79 on the fips_mode boolean. Enabled by default.
80
81 setsebool -P fips_mode 1
82
83
84
85 If you want to control the ability to mmap a low area of the address
86 space, as configured by /proc/sys/vm/mmap_min_addr, you must turn on
87 the mmap_low_allowed boolean. Disabled by default.
88
89 setsebool -P mmap_low_allowed 1
90
91
92
93 If you want to allow openvpn to run unconfined scripts, you must turn
94 on the openvpn_run_unconfined boolean. Disabled by default.
95
96 setsebool -P openvpn_run_unconfined 1
97
98
99
100 If you want to disable kernel module loading, you must turn on the
101 secure_mode_insmod boolean. Enabled by default.
102
103 setsebool -P secure_mode_insmod 1
104
105
106
107 If you want to allow unconfined executables to make their heap memory
108 executable. Doing this is a really bad idea. Probably indicates a
109 badly coded executable, but could indicate an attack. This executable
110 should be reported in bugzilla, you must turn on the selin‐
111 uxuser_execheap boolean. Disabled by default.
112
113 setsebool -P selinuxuser_execheap 1
114
115
116
117 If you want to allow unconfined executables to make their stack exe‐
118 cutable. This should never, ever be necessary. Probably indicates a
119 badly coded executable, but could indicate an attack. This executable
120 should be reported in bugzilla, you must turn on the selinuxuser_exec‐
121 stack boolean. Enabled by default.
122
123 setsebool -P selinuxuser_execstack 1
124
125
126
128 The SELinux process type openvpn_unconfined_script_t can manage files
129 labeled with the following file types. The paths listed are the
130 default paths for these file types. Note the processes UID still need
131 to have DAC permissions.
132
133 file_type
134
135 all files on the system
136
137
139 SELinux requires files to have an extended attribute to define the file
140 type.
141
142 You can see the context of a file using the -Z option to ls
143
144 Policy governs the access confined processes have to these files.
145 SELinux openvpn_unconfined_script policy is very flexible allowing
146 users to setup their openvpn_unconfined_script processes in as secure a
147 method as possible.
148
149 The following file types are defined for openvpn_unconfined_script:
150
151
152
153 openvpn_unconfined_script_exec_t
154
155 - Set files with the openvpn_unconfined_script_exec_t type, if you want
156 to transition an executable to the openvpn_unconfined_script_t domain.
157
158
159
160 Note: File context can be temporarily modified with the chcon command.
161 If you want to permanently change the file context you need to use the
162 semanage fcontext command. This will modify the SELinux labeling data‐
163 base. You will need to use restorecon to apply the labels.
164
165
167 semanage fcontext can also be used to manipulate default file context
168 mappings.
169
170 semanage permissive can also be used to manipulate whether or not a
171 process type is permissive.
172
173 semanage module can also be used to enable/disable/install/remove pol‐
174 icy modules.
175
176 semanage boolean can also be used to manipulate the booleans
177
178
179 system-config-selinux is a GUI tool available to customize SELinux pol‐
180 icy settings.
181
182
184 This manual page was auto-generated using sepolicy manpage .
185
186
188 selinux(8), openvpn_unconfined_script(8), semanage(8), restorecon(8),
189 chcon(1), sepolicy(8), setsebool(8)
190
191
192
193openvpn_unconfined_script 19-06-18openvpn_unconfined_script_selinux(8)