1netutils_selinux(8)         SELinux Policy netutils        netutils_selinux(8)
2
3
4

NAME

6       netutils_selinux - Security Enhanced Linux Policy for the netutils pro‐
7       cesses
8

DESCRIPTION

10       Security-Enhanced Linux secures the  netutils  processes  via  flexible
11       mandatory access control.
12
13       The  netutils  processes  execute with the netutils_t SELinux type. You
14       can check if you have these processes running by executing the ps  com‐
15       mand with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep netutils_t
20
21
22

ENTRYPOINTS

24       The netutils_t SELinux type can be entered via the netutils_exec_t file
25       type.
26
27       The default entrypoint paths for the netutils_t domain are the  follow‐
28       ing:
29
30       /bin/arping, /sbin/arping, /usr/sbin/arping, /usr/sbin/tcpdump
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       netutils policy is very flexible allowing users to setup their netutils
40       processes in as secure a method as possible.
41
42       The following process types are defined for netutils:
43
44       netutils_t
45
46       Note: semanage permissive -a netutils_t can be used to make the process
47       type  netutils_t permissive. SELinux does not deny access to permissive
48       process types, but the AVC (SELinux denials) messages are still  gener‐
49       ated.
50
51

BOOLEANS

53       SELinux  policy  is customizable based on least access required.  netu‐
54       tils policy is extremely flexible and has several booleans  that  allow
55       you  to manipulate the policy and run netutils with the tightest access
56       possible.
57
58
59
60       If you want to deny all system processes and Linux users to  use  blue‐
61       tooth wireless technology, you must turn on the deny_bluetooth boolean.
62       Enabled by default.
63
64       setsebool -P deny_bluetooth 1
65
66
67
68       If you want to allow all domains to execute in fips_mode, you must turn
69       on the fips_mode boolean. Enabled by default.
70
71       setsebool -P fips_mode 1
72
73
74

MANAGED FILES

76       The  SELinux  process type netutils_t can manage files labeled with the
77       following file types.  The paths listed are the default paths for these
78       file types.  Note the processes UID still need to have DAC permissions.
79
80       krb5_host_rcache_t
81
82            /var/tmp/krb5_0.rcache2
83            /var/cache/krb5rcache(/.*)?
84            /var/tmp/nfs_0
85            /var/tmp/DNS_25
86            /var/tmp/host_0
87            /var/tmp/imap_0
88            /var/tmp/HTTP_23
89            /var/tmp/HTTP_48
90            /var/tmp/ldap_55
91            /var/tmp/ldap_487
92            /var/tmp/ldapmap1_0
93
94       netutils_tmp_t
95
96
97

FILE CONTEXTS

99       SELinux requires files to have an extended attribute to define the file
100       type.
101
102       You can see the context of a file using the -Z option to ls
103
104       Policy governs the access  confined  processes  have  to  these  files.
105       SELinux  netutils policy is very flexible allowing users to setup their
106       netutils processes in as secure a method as possible.
107
108       STANDARD FILE CONTEXT
109
110       SELinux defines the file context types for the netutils, if you  wanted
111       to store files with these types in a diffent paths, you need to execute
112       the semanage command to sepecify alternate labeling and  then  use  re‐
113       storecon to put the labels on disk.
114
115       semanage fcontext -a -t netutils_tmp_t '/srv/mynetutils_content(/.*)?'
116       restorecon -R -v /srv/mynetutils_content
117
118       Note:  SELinux  often  uses  regular expressions to specify labels that
119       match multiple files.
120
121       The following file types are defined for netutils:
122
123
124
125       netutils_exec_t
126
127       - Set files with the netutils_exec_t type, if you want to transition an
128       executable to the netutils_t domain.
129
130
131       Paths:
132            /bin/arping, /sbin/arping, /usr/sbin/arping, /usr/sbin/tcpdump
133
134
135       netutils_tmp_t
136
137       - Set files with the netutils_tmp_t type, if you want to store netutils
138       temporary files in the /tmp directories.
139
140
141
142       Note: File context can be temporarily modified with the chcon  command.
143       If  you want to permanently change the file context you need to use the
144       semanage fcontext command.  This will modify the SELinux labeling data‐
145       base.  You will need to use restorecon to apply the labels.
146
147

COMMANDS

149       semanage  fcontext  can also be used to manipulate default file context
150       mappings.
151
152       semanage permissive can also be used to manipulate  whether  or  not  a
153       process type is permissive.
154
155       semanage  module can also be used to enable/disable/install/remove pol‐
156       icy modules.
157
158       semanage boolean can also be used to manipulate the booleans
159
160
161       system-config-selinux is a GUI tool available to customize SELinux pol‐
162       icy settings.
163
164

AUTHOR

166       This manual page was auto-generated using sepolicy manpage .
167
168

SEE ALSO

170       selinux(8),  netutils(8),  semanage(8), restorecon(8), chcon(1), sepol‐
171       icy(8), setsebool(8)
172
173
174
175netutils                           21-06-09                netutils_selinux(8)
Impressum