1openvpn_unconfined_sScErLiipntu_xsePloilniucxy(8o)penvpn_uonpceonnvfpinn_eudn_csocnrfiipnted_script_selinux(8)
2
3
4
6 openvpn_unconfined_script_selinux - Security Enhanced Linux Policy for
7 the openvpn_unconfined_script processes
8
10 Security-Enhanced Linux secures the openvpn_unconfined_script processes
11 via flexible mandatory access control.
12
13 The openvpn_unconfined_script processes execute with the openvpn_uncon‐
14 fined_script_t SELinux type. You can check if you have these processes
15 running by executing the ps command with the -Z qualifier.
16
17 For example:
18
19 ps -eZ | grep openvpn_unconfined_script_t
20
21
22
24 The openvpn_unconfined_script_t SELinux type can be entered via the
25 shell_exec_t, openvpn_unconfined_script_exec_t file types.
26
27 The default entrypoint paths for the openvpn_unconfined_script_t domain
28 are the following:
29
30 /bin/d?ash, /bin/ksh.*, /bin/zsh.*, /usr/bin/d?ash, /usr/bin/ksh.*,
31 /usr/bin/zsh.*, /bin/esh, /bin/bash, /bin/fish, /bin/mksh, /bin/sash,
32 /bin/tcsh, /bin/yash, /bin/bash2, /usr/bin/esh, /sbin/nologin,
33 /usr/bin/bash, /usr/bin/fish, /usr/bin/mksh, /usr/bin/sash,
34 /usr/bin/tcsh, /usr/bin/yash, /usr/bin/bash2, /usr/sbin/sesh,
35 /usr/sbin/smrsh, /usr/bin/scponly, /usr/libexec/sesh, /usr/sbin/nolo‐
36 gin, /usr/bin/git-shell, /usr/sbin/scponlyc, /usr/libexec/sudo/sesh,
37 /usr/bin/cockpit-bridge, /usr/libexec/cockpit-agent, /usr/libexec/git-
38 core/git-shell, /etc/openvpn/scripts(/.*)?
39
41 SELinux defines process types (domains) for each process running on the
42 system
43
44 You can see the context of a process using the -Z option to ps
45
46 Policy governs the access confined processes have to files. SELinux
47 openvpn_unconfined_script policy is very flexible allowing users to
48 setup their openvpn_unconfined_script processes in as secure a method
49 as possible.
50
51 The following process types are defined for openvpn_unconfined_script:
52
53 openvpn_unconfined_script_t
54
55 Note: semanage permissive -a openvpn_unconfined_script_t can be used to
56 make the process type openvpn_unconfined_script_t permissive. SELinux
57 does not deny access to permissive process types, but the AVC (SELinux
58 denials) messages are still generated.
59
60
62 SELinux policy is customizable based on least access required. open‐
63 vpn_unconfined_script policy is extremely flexible and has several
64 booleans that allow you to manipulate the policy and run openvpn_uncon‐
65 fined_script with the tightest access possible.
66
67
68
69 If you want to deny user domains applications to map a memory region as
70 both executable and writable, this is dangerous and the executable
71 should be reported in bugzilla, you must turn on the deny_execmem bool‐
72 ean. Enabled by default.
73
74 setsebool -P deny_execmem 1
75
76
77
78 If you want to control the ability to mmap a low area of the address
79 space, as configured by /proc/sys/vm/mmap_min_addr, you must turn on
80 the mmap_low_allowed boolean. Disabled by default.
81
82 setsebool -P mmap_low_allowed 1
83
84
85
86 If you want to disable kernel module loading, you must turn on the se‐
87 cure_mode_insmod boolean. Enabled by default.
88
89 setsebool -P secure_mode_insmod 1
90
91
92
93 If you want to allow unconfined executables to make their heap memory
94 executable. Doing this is a really bad idea. Probably indicates a
95 badly coded executable, but could indicate an attack. This executable
96 should be reported in bugzilla, you must turn on the selinuxuser_ex‐
97 echeap boolean. Disabled by default.
98
99 setsebool -P selinuxuser_execheap 1
100
101
102
103 If you want to allow unconfined executables to make their stack exe‐
104 cutable. This should never, ever be necessary. Probably indicates a
105 badly coded executable, but could indicate an attack. This executable
106 should be reported in bugzilla, you must turn on the selinuxuser_exec‐
107 stack boolean. Enabled by default.
108
109 setsebool -P selinuxuser_execstack 1
110
111
112
114 The SELinux process type openvpn_unconfined_script_t can manage files
115 labeled with the following file types. The paths listed are the de‐
116 fault paths for these file types. Note the processes UID still need to
117 have DAC permissions.
118
119 file_type
120
121 all files on the system
122
123
125 SELinux requires files to have an extended attribute to define the file
126 type.
127
128 You can see the context of a file using the -Z option to ls
129
130 Policy governs the access confined processes have to these files.
131 SELinux openvpn_unconfined_script policy is very flexible allowing
132 users to setup their openvpn_unconfined_script processes in as secure a
133 method as possible.
134
135 The following file types are defined for openvpn_unconfined_script:
136
137
138
139 openvpn_unconfined_script_exec_t
140
141 - Set files with the openvpn_unconfined_script_exec_t type, if you want
142 to transition an executable to the openvpn_unconfined_script_t domain.
143
144
145
146 Note: File context can be temporarily modified with the chcon command.
147 If you want to permanently change the file context you need to use the
148 semanage fcontext command. This will modify the SELinux labeling data‐
149 base. You will need to use restorecon to apply the labels.
150
151
153 semanage fcontext can also be used to manipulate default file context
154 mappings.
155
156 semanage permissive can also be used to manipulate whether or not a
157 process type is permissive.
158
159 semanage module can also be used to enable/disable/install/remove pol‐
160 icy modules.
161
162 semanage boolean can also be used to manipulate the booleans
163
164
165 system-config-selinux is a GUI tool available to customize SELinux pol‐
166 icy settings.
167
168
170 This manual page was auto-generated using sepolicy manpage .
171
172
174 selinux(8), openvpn_unconfined_script(8), semanage(8), restorecon(8),
175 chcon(1), sepolicy(8), setsebool(8)
176
177
178
179openvpn_unconfined_script 21-11-19openvpn_unconfined_script_selinux(8)