07.06.2014 Views

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

# semanage login -a -s user_u rhertzog<br />

# semanage login -l<br />

Login Name SELinux User MLS/MCS Range<br />

__default__ unconfined_u s0-s0:c0.c1023<br />

rhertzog user_u None<br />

root unconfined_u s0-s0:c0.c1023<br />

system_u system_u s0-s0:c0.c1023<br />

# semanage login -d rhertzog<br />

semanage user -l lists the mapping between SELinux user identities and allowed roles. Adding<br />

a new identity requires to define both the corresponding roles and a labeling prefix which is<br />

used to assign a type to personal files (/home/user/*). The prefix must be picked among user,<br />

staff, and sysadm. The “staff” prefix results in files of type “staff_home_dir_t”. Creating a<br />

new SELinux user identity is done with semanage user -a -R roles -P prefix identity.<br />

Finally, you can remove an SELinux user identity with semanage user -d identity.<br />

# semanage user -a -R 'staff_r user_r' -P staff test_u<br />

# semanage user -l<br />

Labeling MLS/ MLS/<br />

SELinux User Prefix MCS Level MCS Range SELinux Roles<br />

root sysadm s0 s0-s0:c0.c1023 staff_r sysadm_r<br />

➥ system_r<br />

staff_u staff s0 s0-s0:c0.c1023 staff_r sysadm_r<br />

sysadm_u sysadm s0 s0-s0:c0.c1023 sysadm_r<br />

system_u user s0 s0-s0:c0.c1023 system_r<br />

test_u staff s0 s0 staff_r user_r<br />

unconfined_u unconfined s0 s0-s0:c0.c1023 system_r unconfined_r<br />

user_u user s0 s0 user_r<br />

# semanage user -d test_u<br />

14.4.3.3. Managing File Contexts, Ports and Booleans<br />

Each SELinux module provides a set of file labeling rules, but it is also possible to add custom<br />

labeling rules to cater to a specific case. For example, if you want the web server to be able to<br />

read files within the /srv/www/ file hierarchy, you could execute semanage fcontext -a -<br />

t httpd_sys_content_t "/srv/www(/.*)?" followed by restorecon -R /srv/www/. The<br />

former command registers the new labeling rules and the latter resets the file types according<br />

to the current labeling rules.<br />

Chapter 14 — Security<br />

393

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!