1sandbox_selinux(8)          SELinux Policy sandbox          sandbox_selinux(8)
2
3
4

NAME

6       sandbox_selinux  -  Security Enhanced Linux Policy for the sandbox pro‐
7       cesses
8

DESCRIPTION

10       Security-Enhanced Linux secures  the  sandbox  processes  via  flexible
11       mandatory access control.
12
13       The  sandbox processes execute with the sandbox_t SELinux type. You can
14       check if you have these processes running by executing the  ps  command
15       with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep sandbox_t
20
21
22

PROCESS TYPES

24       SELinux defines process types (domains) for each process running on the
25       system
26
27       You can see the context of a process using the -Z option to ps
28
29       Policy governs the access confined processes have  to  files.   SELinux
30       sandbox  policy  is very flexible allowing users to setup their sandbox
31       processes in as secure a method as possible.
32
33       The following process types are defined for sandbox:
34
35       sandbox_t, sandbox_xserver_t, sandbox_min_t, sandbox_min_client_t, sandbox_x_t, sandbox_x_client_t, sandbox_web_t, sandbox_web_client_t, sandbox_net_t, sandbox_net_client_t
36
37       Note: semanage permissive -a sandbox_t can be used to make the  process
38       type  sandbox_t  permissive. SELinux does not deny access to permissive
39       process types, but the AVC (SELinux denials) messages are still  gener‐
40       ated.
41
42

MCS Constrained

44       The  SELinux process type sandbox_t is an MCS (Multi Category Security)
45       constrained type.  Sometimes this separation is referred to  as  sVirt.
46       These  types  are  usually used for securing multi-tenant environments,
47       such as virtualization, containers or separation of users.   The  tools
48       used  to  launch  MCS  types,  pick  out a different MCS label for each
49       process group.
50
51       For example one process might be launched with sandbox_t:s0:c1,c2,  and
52       another  process  launched  with sandbox_t:s0:c3,c4. The SELinux kernel
53       only allows these processes can only write to content with  a  matching
54       MCS  label,  or a MCS Label of s0. A process running with the MCS level
55       of s0:c1,c2 is not allowed to write to content with the  MCS  label  of
56       s0:c3,c4
57
58

BOOLEANS

60       SELinux policy is customizable based on least access required.  sandbox
61       policy is extremely flexible and has several booleans that allow you to
62       manipulate  the  policy and run sandbox with the tightest access possi‐
63       ble.
64
65
66
67       If you want to deny user domains applications to map a memory region as
68       both  executable  and  writable,  this  is dangerous and the executable
69       should be reported in bugzilla, you must turn on the deny_execmem bool‐
70       ean. Disabled by default.
71
72       setsebool -P deny_execmem 1
73
74
75

FILE CONTEXTS

77       SELinux requires files to have an extended attribute to define the file
78       type.
79
80       You can see the context of a file using the -Z option to ls
81
82       Policy governs the access  confined  processes  have  to  these  files.
83       SELinux  sandbox  policy is very flexible allowing users to setup their
84       sandbox processes in as secure a method as possible.
85
86       STANDARD FILE CONTEXT
87
88       SELinux defines the file context types for the sandbox, if  you  wanted
89       to  store files with these types in a different paths, you need to exe‐
90       cute the semanage command to specify alternate labeling  and  then  use
91       restorecon to put the labels on disk.
92
93       semanage fcontext -a -t sandbox_exec_t '/srv/sandbox/content(/.*)?'
94       restorecon -R -v /srv/mysandbox_content
95
96       Note:  SELinux  often  uses  regular expressions to specify labels that
97       match multiple files.
98
99       The following file types are defined for sandbox:
100
101
102
103       sandbox_devpts_t
104
105       - Set files with the sandbox_devpts_t type, if you want  to  treat  the
106       files as sandbox devpts data.
107
108
109
110       sandbox_exec_t
111
112       -  Set files with the sandbox_exec_t type, if you want to transition an
113       executable to the sandbox_t domain.
114
115
116
117       sandbox_file_t
118
119       - Set files with the sandbox_file_t type, if  you  want  to  treat  the
120       files as sandbox content.
121
122
123
124       sandbox_min_client_tmpfs_t
125
126       -  Set  files  with the sandbox_min_client_tmpfs_t type, if you want to
127       store sandbox min client files on a tmpfs file system.
128
129
130
131       sandbox_net_client_tmpfs_t
132
133       - Set files with the sandbox_net_client_tmpfs_t type, if  you  want  to
134       store sandbox net client files on a tmpfs file system.
135
136
137
138       sandbox_web_client_tmpfs_t
139
140       -  Set  files  with the sandbox_web_client_tmpfs_t type, if you want to
141       store sandbox web client files on a tmpfs file system.
142
143
144
145       sandbox_x_client_tmpfs_t
146
147       - Set files with the sandbox_x_client_tmpfs_t  type,  if  you  want  to
148       store sandbox x client files on a tmpfs file system.
149
150
151
152       sandbox_xserver_tmpfs_t
153
154       - Set files with the sandbox_xserver_tmpfs_t type, if you want to store
155       sandbox xserver files on a tmpfs file system.
156
157
158
159       Note: File context can be temporarily modified with the chcon  command.
160       If  you want to permanently change the file context you need to use the
161       semanage fcontext command.  This will modify the SELinux labeling data‐
162       base.  You will need to use restorecon to apply the labels.
163
164

COMMANDS

166       semanage  fcontext  can also be used to manipulate default file context
167       mappings.
168
169       semanage permissive can also be used to manipulate  whether  or  not  a
170       process type is permissive.
171
172       semanage  module can also be used to enable/disable/install/remove pol‐
173       icy modules.
174
175       semanage boolean can also be used to manipulate the booleans
176
177
178       system-config-selinux is a GUI tool available to customize SELinux pol‐
179       icy settings.
180
181

AUTHOR

183       This manual page was auto-generated using sepolicy manpage .
184
185

SEE ALSO

187       selinux(8),  sandbox(8),  semanage(8),  restorecon(8), chcon(1), sepol‐
188       icy(8), setsebool(8),  sandbox_min_selinux(8),  sandbox_min_selinux(8),
189       sandbox_min_client_selinux(8),   sandbox_min_client_selinux(8),   sand‐
190       box_net_selinux(8),            sandbox_net_selinux(8),            sand‐
191       box_net_client_selinux(8),     sandbox_net_client_selinux(8),     sand‐
192       box_web_selinux(8),            sandbox_web_selinux(8),            sand‐
193       box_web_client_selinux(8),     sandbox_web_client_selinux(8),     sand‐
194       box_x_selinux(8),  sandbox_x_selinux(8),   sandbox_x_client_selinux(8),
195       sandbox_x_client_selinux(8),      sandbox_xserver_selinux(8),     sand‐
196       box_xserver_selinux(8)
197
198
199
200sandbox                            23-10-20                 sandbox_selinux(8)
Impressum