1openfortivpn_selinux(8) SELinux Policy openfortivpn openfortivpn_selinux(8)
2
3
4
6 openfortivpn_selinux - Security Enhanced Linux Policy for the open‐
7 fortivpn processes
8
10 Security-Enhanced Linux secures the openfortivpn processes via flexible
11 mandatory access control.
12
13 The openfortivpn processes execute with the openfortivpn_t SELinux
14 type. You can check if you have these processes running by executing
15 the ps command with the -Z qualifier.
16
17 For example:
18
19 ps -eZ | grep openfortivpn_t
20
21
22
24 The openfortivpn_t SELinux type can be entered via the open‐
25 fortivpn_exec_t file type.
26
27 The default entrypoint paths for the openfortivpn_t domain are the fol‐
28 lowing:
29
30 /usr/libexec/nm-fortisslvpn-.*, /usr/bin/openfortivpn
31
33 SELinux defines process types (domains) for each process running on the
34 system
35
36 You can see the context of a process using the -Z option to ps
37
38 Policy governs the access confined processes have to files. SELinux
39 openfortivpn policy is very flexible allowing users to setup their
40 openfortivpn processes in as secure a method as possible.
41
42 The following process types are defined for openfortivpn:
43
44 openfortivpn_t
45
46 Note: semanage permissive -a openfortivpn_t can be used to make the
47 process type openfortivpn_t permissive. SELinux does not deny access to
48 permissive process types, but the AVC (SELinux denials) messages are
49 still generated.
50
51
53 SELinux policy is customizable based on least access required. open‐
54 fortivpn policy is extremely flexible and has several booleans that al‐
55 low you to manipulate the policy and run openfortivpn with the tightest
56 access possible.
57
58
59
60 If you want to determine whether openfortivpn can connect to the TCP
61 network, you must turn on the openfortivpn_can_network_connect boolean.
62 Enabled by default.
63
64 setsebool -P openfortivpn_can_network_connect 1
65
66
67
68 If you want to dontaudit all daemons scheduling requests (setsched,
69 sys_nice), you must turn on the daemons_dontaudit_scheduling boolean.
70 Enabled by default.
71
72 setsebool -P daemons_dontaudit_scheduling 1
73
74
75
76 If you want to allow all domains to execute in fips_mode, you must turn
77 on the fips_mode boolean. Enabled by default.
78
79 setsebool -P fips_mode 1
80
81
82
83 If you want to allow system to run with NIS, you must turn on the
84 nis_enabled boolean. Disabled by default.
85
86 setsebool -P nis_enabled 1
87
88
89
91 The SELinux process type openfortivpn_t can manage files labeled with
92 the following file types. The paths listed are the default paths for
93 these file types. Note the processes UID still need to have DAC per‐
94 missions.
95
96 cluster_conf_t
97
98 /etc/cluster(/.*)?
99
100 cluster_var_lib_t
101
102 /var/lib/pcsd(/.*)?
103 /var/lib/cluster(/.*)?
104 /var/lib/openais(/.*)?
105 /var/lib/pengine(/.*)?
106 /var/lib/corosync(/.*)?
107 /usr/lib/heartbeat(/.*)?
108 /var/lib/heartbeat(/.*)?
109 /var/lib/pacemaker(/.*)?
110
111 cluster_var_run_t
112
113 /var/run/crm(/.*)?
114 /var/run/cman_.*
115 /var/run/rsctmp(/.*)?
116 /var/run/aisexec.*
117 /var/run/heartbeat(/.*)?
118 /var/run/pcsd-ruby.socket
119 /var/run/corosync-qnetd(/.*)?
120 /var/run/corosync-qdevice(/.*)?
121 /var/run/corosync.pid
122 /var/run/cpglockd.pid
123 /var/run/rgmanager.pid
124 /var/run/cluster/rgmanager.sk
125
126 krb5_host_rcache_t
127
128 /var/tmp/krb5_0.rcache2
129 /var/cache/krb5rcache(/.*)?
130 /var/tmp/nfs_0
131 /var/tmp/DNS_25
132 /var/tmp/host_0
133 /var/tmp/imap_0
134 /var/tmp/HTTP_23
135 /var/tmp/HTTP_48
136 /var/tmp/ldap_55
137 /var/tmp/ldap_487
138 /var/tmp/ldapmap1_0
139
140 openfortivpn_var_lib_t
141
142 /var/lib/NetworkManager-fortisslvpn(/.*)?
143
144 root_t
145
146 /sysroot/ostree/deploy/.*-atomic/deploy(/.*)?
147 /
148 /initrd
149
150
152 SELinux requires files to have an extended attribute to define the file
153 type.
154
155 You can see the context of a file using the -Z option to ls
156
157 Policy governs the access confined processes have to these files.
158 SELinux openfortivpn policy is very flexible allowing users to setup
159 their openfortivpn processes in as secure a method as possible.
160
161 STANDARD FILE CONTEXT
162
163 SELinux defines the file context types for the openfortivpn, if you
164 wanted to store files with these types in a different paths, you need
165 to execute the semanage command to specify alternate labeling and then
166 use restorecon to put the labels on disk.
167
168 semanage fcontext -a -t openfortivpn_exec_t '/srv/openfortivpn/con‐
169 tent(/.*)?'
170 restorecon -R -v /srv/myopenfortivpn_content
171
172 Note: SELinux often uses regular expressions to specify labels that
173 match multiple files.
174
175 The following file types are defined for openfortivpn:
176
177
178
179 openfortivpn_exec_t
180
181 - Set files with the openfortivpn_exec_t type, if you want to transi‐
182 tion an executable to the openfortivpn_t domain.
183
184
185 Paths:
186 /usr/libexec/nm-fortisslvpn-.*, /usr/bin/openfortivpn
187
188
189 openfortivpn_var_lib_t
190
191 - Set files with the openfortivpn_var_lib_t type, if you want to store
192 the openfortivpn files under the /var/lib directory.
193
194
195
196 Note: File context can be temporarily modified with the chcon command.
197 If you want to permanently change the file context you need to use the
198 semanage fcontext command. This will modify the SELinux labeling data‐
199 base. You will need to use restorecon to apply the labels.
200
201
203 semanage fcontext can also be used to manipulate default file context
204 mappings.
205
206 semanage permissive can also be used to manipulate whether or not a
207 process type is permissive.
208
209 semanage module can also be used to enable/disable/install/remove pol‐
210 icy modules.
211
212 semanage boolean can also be used to manipulate the booleans
213
214
215 system-config-selinux is a GUI tool available to customize SELinux pol‐
216 icy settings.
217
218
220 This manual page was auto-generated using sepolicy manpage .
221
222
224 selinux(8), openfortivpn(8), semanage(8), restorecon(8), chcon(1), se‐
225 policy(8), setsebool(8)
226
227
228
229openfortivpn 23-10-20 openfortivpn_selinux(8)