1guest_selinux(8) guest SELinux Policy documentation guest_selinux(8)
2
3
4
6 guest_u - Least privileged terminal user role. - Security Enhanced
7 Linux Policy
8
9
11 guest_u is an SELinux User defined in the SELinux policy. SELinux users
12 have default roles, guest_r. The default role has a default type,
13 guest_t, associated with it.
14
15 The SELinux user will usually login to a system with a context that
16 looks like:
17
18 guest_u:guest_r:guest_t:s0
19
20 Linux users are automatically assigned an SELinux users at login. Lo‐
21 gin programs use the SELinux User to assign initial context to the
22 user's shell.
23
24 SELinux policy uses the context to control the user's access.
25
26 By default all users are assigned to the SELinux user via the __de‐
27 fault__ flag
28
29 On Targeted policy systems the __default__ user is assigned to the un‐
30 confined_u SELinux user.
31
32 You can list all Linux User to SELinux user mapping using:
33
34 semanage login -l
35
36 If you wanted to change the default user mapping to use the guest_u
37 user, you would execute:
38
39 semanage login -m -s guest_u __default__
40
41
42 If you want to map the one Linux user (joe) to the SELinux user guest,
43 you would execute:
44
45 $ semanage login -a -s guest_u joe
46
47
48
50 The SELinux user guest_u is defined in policy as a unprivileged user.
51 SELinux prevents unprivileged users from doing administration tasks
52 without transitioning to a different role.
53
54
57 The SELinux user guest_u is not able to X Windows login.
58
59
61 The SELinux user guest_u is able to listen on the following tcp ports.
62
63 1716
64
65
66 The SELinux user guest_u is able to connect to the following tcp ports.
67
68 9080
69
70 88,750,4444
71
72
73 The SELinux user guest_u is able to connect to the following tcp ports.
74
75 9080
76
77 88,750,4444
78
79
81 SELinux policy is customizable based on least access required. guest
82 policy is extremely flexible and has several booleans that allow you to
83 manipulate the policy and run guest with the tightest access possible.
84
85
86
87 If you want to deny all system processes and Linux users to use blue‐
88 tooth wireless technology, you must turn on the deny_bluetooth boolean.
89 Disabled by default.
90
91 setsebool -P deny_bluetooth 1
92
93
94
95 If you want to deny user domains applications to map a memory region as
96 both executable and writable, this is dangerous and the executable
97 should be reported in bugzilla, you must turn on the deny_execmem bool‐
98 ean. Disabled by default.
99
100 setsebool -P deny_execmem 1
101
102
103
104 If you want to allow all domains to execute in fips_mode, you must turn
105 on the fips_mode boolean. Enabled by default.
106
107 setsebool -P fips_mode 1
108
109
110
111 If you want to allow httpd cgi support, you must turn on the httpd_en‐
112 able_cgi boolean. Enabled by default.
113
114 setsebool -P httpd_enable_cgi 1
115
116
117
118 If you want to unify HTTPD handling of all content files, you must turn
119 on the httpd_unified boolean. Disabled by default.
120
121 setsebool -P httpd_unified 1
122
123
124
125 If you want to allow confined applications to run with kerberos, you
126 must turn on the kerberos_enabled boolean. Enabled by default.
127
128 setsebool -P kerberos_enabled 1
129
130
131
132 If you want to allow unconfined executables to make their stack exe‐
133 cutable. This should never, ever be necessary. Probably indicates a
134 badly coded executable, but could indicate an attack. This executable
135 should be reported in bugzilla, you must turn on the selinuxuser_exec‐
136 stack boolean. Enabled by default.
137
138 setsebool -P selinuxuser_execstack 1
139
140
141
142 If you want to allow user to use ssh chroot environment, you must turn
143 on the selinuxuser_use_ssh_chroot boolean. Disabled by default.
144
145 setsebool -P selinuxuser_use_ssh_chroot 1
146
147
148
149 If you want to support NFS home directories, you must turn on the
150 use_nfs_home_dirs boolean. Disabled by default.
151
152 setsebool -P use_nfs_home_dirs 1
153
154
155
156 If you want to support SAMBA home directories, you must turn on the
157 use_samba_home_dirs boolean. Disabled by default.
158
159 setsebool -P use_samba_home_dirs 1
160
161
162
164 The SELinux user guest_u is able execute home content files.
165
166
168 Three things can happen when guest_t attempts to execute a program.
169
170 1. SELinux Policy can deny guest_t from executing the program.
171
172
173
174 2. SELinux Policy can allow guest_t to execute the program in the cur‐
175 rent user type.
176
177 Execute the following to see the types that the SELinux user
178 guest_t can execute without transitioning:
179
180 sesearch -A -s guest_t -c file -p execute_no_trans
181
182
183
184 3. SELinux can allow guest_t to execute the program and transition to a
185 new type.
186
187 Execute the following to see the types that the SELinux user
188 guest_t can execute and transition:
189
190 $ sesearch -A -s guest_t -c process -p transition
191
192
193
195 The SELinux process type guest_t can manage files labeled with the fol‐
196 lowing file types. The paths listed are the default paths for these
197 file types. Note the processes UID still need to have DAC permissions.
198
199 alsa_home_t
200
201 /home/[^/]+/.asoundrc
202
203 auth_cache_t
204
205 /var/cache/coolkey(/.*)?
206
207 cifs_t
208
209
210 httpd_user_content_t
211
212 /home/[^/]+/((www)|(web)|(public_html))(/.+)?
213
214 httpd_user_htaccess_t
215
216 /home/[^/]+/((www)|(web)|(public_html))(/.*)?/.htaccess
217
218 httpd_user_ra_content_t
219
220 /home/[^/]+/((www)|(web)|(public_html))(/.*)?/logs(/.*)?
221
222 httpd_user_rw_content_t
223
224
225 httpd_user_script_exec_t
226
227 /home/[^/]+/((www)|(web)|(public_html))/cgi-bin(/.+)?
228
229 nfs_t
230
231
232 user_home_type
233
234 all user home files
235
236 user_tmp_type
237
238 all user tmp files
239
240
242 semanage fcontext can also be used to manipulate default file context
243 mappings.
244
245 semanage permissive can also be used to manipulate whether or not a
246 process type is permissive.
247
248 semanage module can also be used to enable/disable/install/remove pol‐
249 icy modules.
250
251 semanage boolean can also be used to manipulate the booleans
252
253
254 system-config-selinux is a GUI tool available to customize SELinux pol‐
255 icy settings.
256
257
259 This manual page was auto-generated using sepolicy manpage .
260
261
263 selinux(8), guest(8), semanage(8), restorecon(8), chcon(1), sepol‐
264 icy(8), setsebool(8)
265
266
267
268mgrepl@redhat.com guest guest_selinux(8)