1NetworkManager_diSsEpLaitncuhxerP_ocluisctyomN_estewloNirenktuMwxao(nr8ak)gMearn_adgiesrp_adticshpeart_cchuesrt_ocmustom_selinux(8)
2
3
4

NAME

6       NetworkManager_dispatcher_custom_selinux - Security Enhanced Linux Pol‐
7       icy for the NetworkManager_dispatcher_custom processes
8

DESCRIPTION

10       Security-Enhanced Linux  secures  the  NetworkManager_dispatcher_custom
11       processes via flexible mandatory access control.
12
13       The  NetworkManager_dispatcher_custom  processes  execute with the Net‐
14       workManager_dispatcher_custom_t SELinux type. You can check if you have
15       these  processes running by executing the ps command with the -Z quali‐
16       fier.
17
18       For example:
19
20       ps -eZ | grep NetworkManager_dispatcher_custom_t
21
22
23

ENTRYPOINTS

25       The NetworkManager_dispatcher_custom_t SELinux type can be entered  via
26       the NetworkManager_dispatcher_script_t file type.
27
28       The default entrypoint paths for the NetworkManager_dispatcher_custom_t
29       domain are the following:
30
31       /etc/NetworkManager/dispatcher.d(/.*)?,    /usr/lib/NetworkManager/dis‐
32       patcher.d(/.*)?
33

PROCESS TYPES

35       SELinux defines process types (domains) for each process running on the
36       system
37
38       You can see the context of a process using the -Z option to ps
39
40       Policy governs the access confined processes have  to  files.   SELinux
41       NetworkManager_dispatcher_custom policy is very flexible allowing users
42       to setup their NetworkManager_dispatcher_custom processes in as  secure
43       a method as possible.
44
45       The   following  process  types  are  defined  for  NetworkManager_dis‐
46       patcher_custom:
47
48       NetworkManager_dispatcher_custom_t
49
50       Note: semanage permissive -a NetworkManager_dispatcher_custom_t can  be
51       used  to  make the process type NetworkManager_dispatcher_custom_t per‐
52       missive. SELinux does not deny access to permissive process types,  but
53       the AVC (SELinux denials) messages are still generated.
54
55

BOOLEANS

57       SELinux  policy  is  customizable based on least access required.  Net‐
58       workManager_dispatcher_custom policy is extremely flexible and has sev‐
59       eral  booleans that allow you to manipulate the policy and run Network‐
60       Manager_dispatcher_custom with the tightest access possible.
61
62
63
64       If you want to allow all domains to execute in fips_mode, you must turn
65       on the fips_mode boolean. Enabled by default.
66
67       setsebool -P fips_mode 1
68
69
70

MANAGED FILES

72       The  SELinux process type NetworkManager_dispatcher_custom_t can manage
73       files labeled with the following file types.  The paths listed are  the
74       default  paths for these file types.  Note the processes UID still need
75       to have DAC permissions.
76
77       systemd_passwd_var_run_t
78
79            /var/run/systemd/ask-password(/.*)?
80            /var/run/systemd/ask-password-block(/.*)?
81
82

COMMANDS

84       semanage fcontext can also be used to manipulate default  file  context
85       mappings.
86
87       semanage  permissive  can  also  be used to manipulate whether or not a
88       process type is permissive.
89
90       semanage module can also be used to enable/disable/install/remove  pol‐
91       icy modules.
92
93       semanage boolean can also be used to manipulate the booleans
94
95
96       system-config-selinux is a GUI tool available to customize SELinux pol‐
97       icy settings.
98
99

AUTHOR

101       This manual page was auto-generated using sepolicy manpage .
102
103

SEE ALSO

105       selinux(8), NetworkManager_dispatcher_custom(8), semanage(8),  restore‐
106       con(8), chcon(1), sepolicy(8), setsebool(8)
107
108
109
110NetworkManager_dispatcher_custom   2N2e-t0w5o-r2k7Manager_dispatcher_custom_selinux(8)
Impressum