1chroot_user_selinux(8)    SELinux Policy chroot_user    chroot_user_selinux(8)
2
3
4

NAME

6       chroot_user_selinux  -  Security  Enhanced  Linux  Policy  for  the ch‐
7       root_user processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the chroot_user processes via  flexible
11       mandatory access control.
12
13       The  chroot_user processes execute with the chroot_user_t SELinux type.
14       You can check if you have these processes running by executing  the  ps
15       command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep chroot_user_t
20
21
22

PROCESS TYPES

24       SELinux defines process types (domains) for each process running on the
25       system
26
27       You can see the context of a process using the -Z option to ps
28
29       Policy governs the access confined processes have  to  files.   SELinux
30       chroot_user  policy  is very flexible allowing users to setup their ch‐
31       root_user processes in as secure a method as possible.
32
33       The following process types are defined for chroot_user:
34
35       chroot_user_t
36
37       Note: semanage permissive -a chroot_user_t can  be  used  to  make  the
38       process  type chroot_user_t permissive. SELinux does not deny access to
39       permissive process types, but the AVC (SELinux  denials)  messages  are
40       still generated.
41
42

BOOLEANS

44       SELinux  policy  is  customizable  based on least access required.  ch‐
45       root_user policy is extremely flexible and has  several  booleans  that
46       allow  you to manipulate the policy and run chroot_user with the tight‐
47       est access possible.
48
49
50
51       If you want to allow all domains to execute in fips_mode, you must turn
52       on the fips_mode boolean. Enabled by default.
53
54       setsebool -P fips_mode 1
55
56
57
58       If you want to allow ssh with chroot env to read and write files in the
59       user home directories, you  must  turn  on  the  ssh_chroot_rw_homedirs
60       boolean. Disabled by default.
61
62       setsebool -P ssh_chroot_rw_homedirs 1
63
64
65
66       If  you  want  to support fusefs home directories, you must turn on the
67       use_fusefs_home_dirs boolean. Disabled by default.
68
69       setsebool -P use_fusefs_home_dirs 1
70
71
72
73       If you want to support NFS home  directories,  you  must  turn  on  the
74       use_nfs_home_dirs boolean. Disabled by default.
75
76       setsebool -P use_nfs_home_dirs 1
77
78
79
80       If  you  want  to  support SAMBA home directories, you must turn on the
81       use_samba_home_dirs boolean. Disabled by default.
82
83       setsebool -P use_samba_home_dirs 1
84
85
86

MANAGED FILES

88       The SELinux process type chroot_user_t can manage  files  labeled  with
89       the  following  file types.  The paths listed are the default paths for
90       these file types.  Note the processes UID still need to have  DAC  per‐
91       missions.
92
93       cifs_t
94
95
96       ecryptfs_t
97
98            /home/[^/]+/.Private(/.*)?
99            /home/[^/]+/.ecryptfs(/.*)?
100
101       fusefs_t
102
103            /var/run/user/[0-9]+/gvfs
104
105       nfs_t
106
107
108

COMMANDS

110       semanage  fcontext  can also be used to manipulate default file context
111       mappings.
112
113       semanage permissive can also be used to manipulate  whether  or  not  a
114       process type is permissive.
115
116       semanage  module can also be used to enable/disable/install/remove pol‐
117       icy modules.
118
119       semanage boolean can also be used to manipulate the booleans
120
121
122       system-config-selinux is a GUI tool available to customize SELinux pol‐
123       icy settings.
124
125

AUTHOR

127       This manual page was auto-generated using sepolicy manpage .
128
129

SEE ALSO

131       selinux(8),  chroot_user(8),  semanage(8), restorecon(8), chcon(1), se‐
132       policy(8), setsebool(8)
133
134
135
136chroot_user                        23-10-20             chroot_user_selinux(8)
Impressum