1unconfined_sendmail_selSiEnLuixn(u8x)Policy unconfined_suenncdomnafiilned_sendmail_selinux(8)
2
3
4

NAME

6       unconfined_sendmail_selinux  -  Security  Enhanced Linux Policy for the
7       unconfined_sendmail processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the unconfined_sendmail  processes  via
11       flexible mandatory access control.
12
13       The  unconfined_sendmail  processes  execute  with the unconfined_send‐
14       mail_t SELinux type. You can check if you have these processes  running
15       by executing the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep unconfined_sendmail_t
20
21
22

ENTRYPOINTS

24       The  unconfined_sendmail_t  SELinux  type  can be entered via the send‐
25       mail_exec_t file type.
26
27       The default entrypoint paths for the unconfined_sendmail_t  domain  are
28       the following:
29
30       /usr/sbin/sendmail(.sendmail)?,     /usr/bin/esmtp,     /usr/bin/msmtp,
31       /usr/bin/msmtpd,  /usr/sbin/rmail,  /usr/sbin/smtpd,   /usr/sbin/ssmtp,
32       /usr/lib/sendmail,   /usr/bin/esmtp-wrapper,   /var/qmail/bin/sendmail,
33       /usr/sbin/sendmail.postfix
34

PROCESS TYPES

36       SELinux defines process types (domains) for each process running on the
37       system
38
39       You can see the context of a process using the -Z option to ps
40
41       Policy  governs  the  access confined processes have to files.  SELinux
42       unconfined_sendmail policy is very flexible  allowing  users  to  setup
43       their unconfined_sendmail processes in as secure a method as possible.
44
45       The following process types are defined for unconfined_sendmail:
46
47       unconfined_sendmail_t
48
49       Note:  semanage permissive -a unconfined_sendmail_t can be used to make
50       the process type unconfined_sendmail_t  permissive.  SELinux  does  not
51       deny  access to permissive process types, but the AVC (SELinux denials)
52       messages are still generated.
53
54

BOOLEANS

56       SELinux policy is customizable based on least access required.   uncon‐
57       fined_sendmail  policy  is  extremely flexible and has several booleans
58       that allow you to manipulate the  policy  and  run  unconfined_sendmail
59       with the tightest access possible.
60
61
62
63       If you want to deny user domains applications to map a memory region as
64       both executable and writable, this  is  dangerous  and  the  executable
65       should be reported in bugzilla, you must turn on the deny_execmem bool‐
66       ean. Disabled by default.
67
68       setsebool -P deny_execmem 1
69
70
71
72       If you want to control the ability to mmap a low area  of  the  address
73       space,  as  configured  by /proc/sys/vm/mmap_min_addr, you must turn on
74       the mmap_low_allowed boolean. Disabled by default.
75
76       setsebool -P mmap_low_allowed 1
77
78
79
80       If you want to disable kernel module loading, you must turn on the  se‐
81       cure_mode_insmod boolean. Disabled by default.
82
83       setsebool -P secure_mode_insmod 1
84
85
86
87       If  you  want to allow unconfined executables to make their heap memory
88       executable.  Doing this is a really  bad  idea.  Probably  indicates  a
89       badly  coded  executable, but could indicate an attack. This executable
90       should be reported in bugzilla, you must turn  on  the  selinuxuser_ex‐
91       echeap boolean. Disabled by default.
92
93       setsebool -P selinuxuser_execheap 1
94
95
96
97       If  you  want  to allow unconfined executables to make their stack exe‐
98       cutable.  This should never, ever be necessary.  Probably  indicates  a
99       badly  coded  executable, but could indicate an attack. This executable
100       should be reported in bugzilla, you must turn on the  selinuxuser_exec‐
101       stack boolean. Enabled by default.
102
103       setsebool -P selinuxuser_execstack 1
104
105
106

MANAGED FILES

108       The SELinux process type unconfined_sendmail_t can manage files labeled
109       with the following file types.  The paths listed are the default  paths
110       for  these  file  types.  Note the processes UID still need to have DAC
111       permissions.
112
113       file_type
114
115            all files on the system
116
117

COMMANDS

119       semanage fcontext can also be used to manipulate default  file  context
120       mappings.
121
122       semanage  permissive  can  also  be used to manipulate whether or not a
123       process type is permissive.
124
125       semanage module can also be used to enable/disable/install/remove  pol‐
126       icy modules.
127
128       semanage boolean can also be used to manipulate the booleans
129
130
131       system-config-selinux is a GUI tool available to customize SELinux pol‐
132       icy settings.
133
134

AUTHOR

136       This manual page was auto-generated using sepolicy manpage .
137
138

SEE ALSO

140       selinux(8),   unconfined_sendmail(8),    semanage(8),    restorecon(8),
141       chcon(1), sepolicy(8), setsebool(8)
142
143
144
145unconfined_sendmail                23-12-15     unconfined_sendmail_selinux(8)
Impressum