1ssh_keysign_selinux(8)    SELinux Policy ssh_keysign    ssh_keysign_selinux(8)
2
3
4

NAME

6       ssh_keysign_selinux   -   Security   Enhanced   Linux  Policy  for  the
7       ssh_keysign processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the ssh_keysign processes via  flexible
11       mandatory access control.
12
13       The  ssh_keysign processes execute with the ssh_keysign_t SELinux type.
14       You can check if you have these processes running by executing  the  ps
15       command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep ssh_keysign_t
20
21
22

ENTRYPOINTS

24       The    ssh_keysign_t    SELinux   type   can   be   entered   via   the
25       ssh_keysign_exec_t file type.
26
27       The default entrypoint paths for the ssh_keysign_t domain are the  fol‐
28       lowing:
29
30       /usr/lib/openssh/ssh-keysign, /usr/libexec/openssh/ssh-keysign
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       ssh_keysign  policy  is  very  flexible  allowing  users to setup their
40       ssh_keysign processes in as secure a method as possible.
41
42       The following process types are defined for ssh_keysign:
43
44       ssh_keysign_t
45
46       Note: semanage permissive -a ssh_keysign_t can  be  used  to  make  the
47       process  type ssh_keysign_t permissive. SELinux does not deny access to
48       permissive process types, but the AVC (SELinux  denials)  messages  are
49       still generated.
50
51

BOOLEANS

53       SELinux   policy  is  customizable  based  on  least  access  required.
54       ssh_keysign policy is extremely flexible and has several booleans  that
55       allow  you to manipulate the policy and run ssh_keysign with the tight‐
56       est access possible.
57
58
59
60       If you want to allow host key based authentication, you  must  turn  on
61       the ssh_keysign boolean. Disabled by default.
62
63       setsebool -P ssh_keysign 1
64
65
66
67       If you want to allow all domains to execute in fips_mode, you must turn
68       on the fips_mode boolean. Enabled by default.
69
70       setsebool -P fips_mode 1
71
72
73
74       If you want to allow confined applications to use nscd  shared  memory,
75       you must turn on the nscd_use_shm boolean. Enabled by default.
76
77       setsebool -P nscd_use_shm 1
78
79
80

FILE CONTEXTS

82       SELinux requires files to have an extended attribute to define the file
83       type.
84
85       You can see the context of a file using the -Z option to ls
86
87       Policy governs the access  confined  processes  have  to  these  files.
88       SELinux  ssh_keysign  policy  is  very flexible allowing users to setup
89       their ssh_keysign processes in as secure a method as possible.
90
91       STANDARD FILE CONTEXT
92
93       SELinux defines the file context types  for  the  ssh_keysign,  if  you
94       wanted  to  store files with these types in a different paths, you need
95       to execute the semanage command to specify alternate labeling and  then
96       use restorecon to put the labels on disk.
97
98       semanage   fcontext  -a  -t  ssh_keysign_exec_t  '/srv/ssh_keysign/con‐
99       tent(/.*)?'
100       restorecon -R -v /srv/myssh_keysign_content
101
102       Note: SELinux often uses regular expressions  to  specify  labels  that
103       match multiple files.
104
105       The following file types are defined for ssh_keysign:
106
107
108
109       ssh_keysign_exec_t
110
111       - Set files with the ssh_keysign_exec_t type, if you want to transition
112       an executable to the ssh_keysign_t domain.
113
114
115       Paths:
116            /usr/lib/openssh/ssh-keysign, /usr/libexec/openssh/ssh-keysign
117
118
119       Note: File context can be temporarily modified with the chcon  command.
120       If  you want to permanently change the file context you need to use the
121       semanage fcontext command.  This will modify the SELinux labeling data‐
122       base.  You will need to use restorecon to apply the labels.
123
124

COMMANDS

126       semanage  fcontext  can also be used to manipulate default file context
127       mappings.
128
129       semanage permissive can also be used to manipulate  whether  or  not  a
130       process type is permissive.
131
132       semanage  module can also be used to enable/disable/install/remove pol‐
133       icy modules.
134
135       semanage boolean can also be used to manipulate the booleans
136
137
138       system-config-selinux is a GUI tool available to customize SELinux pol‐
139       icy settings.
140
141

AUTHOR

143       This manual page was auto-generated using sepolicy manpage .
144
145

SEE ALSO

147       selinux(8),  ssh_keysign(8),  semanage(8), restorecon(8), chcon(1), se‐
148       policy(8), setsebool(8)
149
150
151
152ssh_keysign                        23-10-20             ssh_keysign_selinux(8)
Impressum