1sandbox_net_selinux(8)    SELinux Policy sandbox_net    sandbox_net_selinux(8)
2
3
4

NAME

6       sandbox_net_selinux  -  Security  Enhanced  Linux  Policy for the sand‐
7       box_net processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the sandbox_net processes via  flexible
11       mandatory access control.
12
13       The  sandbox_net processes execute with the sandbox_net_t SELinux type.
14       You can check if you have these processes running by executing  the  ps
15       command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep sandbox_net_t
20
21
22

PROCESS TYPES

24       SELinux defines process types (domains) for each process running on the
25       system
26
27       You can see the context of a process using the -Z option to ps
28
29       Policy governs the access confined processes have  to  files.   SELinux
30       sandbox_net policy is very flexible allowing users to setup their sand‐
31       box_net processes in as secure a method as possible.
32
33       The following process types are defined for sandbox_net:
34
35       sandbox_net_t, sandbox_net_client_t
36
37       Note: semanage permissive -a sandbox_net_t can  be  used  to  make  the
38       process  type sandbox_net_t permissive. SELinux does not deny access to
39       permissive process types, but the AVC (SELinux  denials)  messages  are
40       still generated.
41
42

MCS Constrained

44       The  SELinux process type sandbox_net_t is an MCS (Multi Category Secu‐
45       rity) constrained type.  Sometimes this separation is  referred  to  as
46       sVirt.  These types are usually used for securing multi-tenant environ‐
47       ments, such as virtualization, containers or separation of users.   The
48       tools used to launch MCS types, pick out a different MCS label for each
49       process group.
50
51       For example one process might be launched with  sandbox_net_t:s0:c1,c2,
52       and  another  process launched with sandbox_net_t:s0:c3,c4. The SELinux
53       kernel only allows these processes can only write  to  content  with  a
54       matching  MCS  label,  or a MCS Label of s0. A process running with the
55       MCS level of s0:c1,c2 is not allowed to write to content with  the  MCS
56       label of s0:c3,c4
57
58

BOOLEANS

60       SELinux  policy  is customizable based on least access required.  sand‐
61       box_net policy is extremely flexible  and  has  several  booleans  that
62       allow  you to manipulate the policy and run sandbox_net with the tight‐
63       est access possible.
64
65
66
67       If you want to deny user domains applications to map a memory region as
68       both  executable  and  writable,  this  is dangerous and the executable
69       should be reported in bugzilla, you must turn on the deny_execmem bool‐
70       ean. Enabled by default.
71
72       setsebool -P deny_execmem 1
73
74
75

MANAGED FILES

77       The  SELinux  process  type sandbox_net_t can manage files labeled with
78       the following file types.  The paths listed are the default  paths  for
79       these  file  types.  Note the processes UID still need to have DAC per‐
80       missions.
81
82       fusefs_t
83
84            /var/run/user/[^/]*/gvfs
85
86       mozilla_plugin_rw_t
87
88            /usr/lib/mozilla/plugins-wrapped(/.*)?
89
90       sandbox_file_t
91
92
93       sandbox_net_client_tmpfs_t
94
95
96       security_t
97
98            /selinux
99
100

COMMANDS

102       semanage fcontext can also be used to manipulate default  file  context
103       mappings.
104
105       semanage  permissive  can  also  be used to manipulate whether or not a
106       process type is permissive.
107
108       semanage module can also be used to enable/disable/install/remove  pol‐
109       icy modules.
110
111       semanage boolean can also be used to manipulate the booleans
112
113
114       system-config-selinux is a GUI tool available to customize SELinux pol‐
115       icy settings.
116
117

AUTHOR

119       This manual page was auto-generated using sepolicy manpage .
120
121

SEE ALSO

123       selinux(8),  sandbox_net(8),  semanage(8),   restorecon(8),   chcon(1),
124       sepolicy(8),    setsebool(8),    sandbox_net_client_selinux(8),   sand‐
125       box_net_client_selinux(8)
126
127
128
129sandbox_net                        20-05-05             sandbox_net_selinux(8)
Impressum