Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

setrans.conf(8) [centos man page]

setrans.conf(8) 					    setrans.conf documentation						   setrans.conf(8)

NAME
setrans.conf - translation configuration file for MCS/MLS SELinux systems DESCRIPTION
The /etc/selinux/{SELINUXTYPE}/setrans.conf configuration file specifies the way that SELinux MCS/MLS labels are translated into human readable form by the mcstransd daemon. The default policies support 16 sensitivity levels (s0 through s15) and 1024 categories (c0 through c1023). Multiple categories can be separated with commas (c0,c1,c3,c5) and a range of categories can be shortened using dot notation (c0.c3,c5). Keywords Base once a base is declared, subsequent sensitivity label definitions will have all modifiers applied to them during translation. Sen- sitivity labels defined before the base declaration are immediately cached and no modifiers will be applied these are used as direct translations. Default defines the category bit range that will be used for inverse bits. Domain creates a new domain with the supplied name. Include read and process the contents of the specified configuration file. Join defines a character used to separate members of a modifier group when more than one is specified (ex. USA/AUS). ModifierGroup a means of grouping category bit definitions by how they modify the sensitivity label. Prefix word(s) that may proceed member(s) of a modifier group (ex. REL USA). Suffix word(s) that may follow member(s) of a modifier group (ex. USA EYES ONLY). Whitespace defines the set of acceptable white space characters that may be used in label being translated. Sensitivity Level Definition Examples s0=SystemLow defines a translation of s0 (the lowest sensitivity level) with no categories to SystemLow. s15:c0.c1023=SystemHigh defines a translation of s15:c0.c1023 to SystemHigh. c0.c1023 is shorthand for all categories. A colon separates the sensitivity level and categories. s0-s15:c0.c1023=SystemLow-SystemHigh defines a range translation of of s0-s15:c0.c1023 to SystemLow-SystemHigh. The two range components are separated by a dash. s0:c0=PatientRecord defines a translation of sensitivity s0 with category c0 to PatientRecord. s0:c1=Accounting defines a translation of sensitivity s0 with category c1 to Accounting. s2:c1,c2,c3=Confidential3Categories s2:c1.c3=Confidential3Categories both define a translation of sensitivity s2 with categories c1, c2 and c3 to Confidential3Categories. s5=TopSecret defines a translation of sensitivity s5 with no categories to TopSecret. Constraint Examples c0!c1 if category bits 0 and 1 are both set, the constraint will fail and the original context will be returned. c5.c9>c1 if category bits 5 through 9 are set, bit 1 must also be set or the constraint will fail and the original context will be returned. s1!c5,c9 if category bits 5 and 9 are set and the sensitivity level is s1, the constraint will fail and the original context will be returned. AUTHOR
Written by Joe Nall <joe@nall.com>. Updated by Ted X. Toth <txtoth@gmail.com>. SEE ALSO
selinux(8), mcs(8), mls(8), chcon(1) FILES
/etc/selinux/{SELINUXTYPE}/setrans.conf /usr/share/mcstrans/examples txtoth@gmail.com 13 July 2010 setrans.conf(8)

Check Out this Related Man Page

NEWROLE(1)								NSA								NEWROLE(1)

NAME
newrole - run a shell with a new SELinux role SYNOPSIS
newrole [-r|--role] ROLE [-t|--type] TYPE [-l|--level] LEVEL [-- [ARGS]...] DESCRIPTION
Run a new shell in a new context. The new context is derived from the old context in which newrole is originally executed. If the -r or --role option is specified, then the new context will have the role specified by ROLE. If the -t or --type option is specified, then the new context will have the type (domain) specified by TYPE. If a role is specified, but no type is specified, the default type is derived from the specified role. If the -l or --level option is specified, then the new context will have the sensitivity level specified by LEVEL. If LEVEL is a range, the new context will have the sensitivity level and clearance specified by that range. Additional arguments ARGS may be provided after a -- option, in which case they are supplied to the new shell. In particular, an argument of -- -c will cause the next argument to be treated as a command by most command interpreters. If a command argument is specified to newrole and the command name is found in /etc/selinux/newrole_pam.conf, then the pam service name listed in that file for the command will be used rather than the normal newrole pam configuration. This allows for per-command pam config- uration when invoked via newrole, e.g. to skip the interactive re-authentication phase. The new shell will be the shell specified in the user's entry in the /etc/passwd file. The -V or --version shows the current version of newrole EXAMPLE
Changing role: # id -Z staff_u:staff_r:staff_t:SystemLow-SystemHigh # newrole -r sysadm_r # id -Z staff_u:sysadm_r:sysadm_t:SystemLow-SystemHigh Changing sensitivity only: # id -Z staff_u:sysadm_r:sysadm_t:Unclassified-SystemHigh # newrole -l Secret # id -Z staff_u:sysadm_r:sysadm_t:Secret-SystemHigh Changing sensitivity and clearance: # id -Z staff_u:sysadm_r:sysadm_t:Unclassified-SystemHigh # newrole -l Secret-Secret # id -Z staff_u:sysadm_r:sysadm_t:Secret Running a program in a given role or level: # newrole -r sysadm_r -- -c "/path/to/app arg1 arg2..." # newrole -l Secret -- -c "/path/to/app arg1 arg2..." FILES
/etc/passwd - user account information /etc/shadow - encrypted passwords and age information /etc/selinux/<policy>/contexts/default_type - default types for roles /etc/selinux/<policy>/contexts/securetty_types - securetty types for level changes /etc/selinux/newrole_pam.conf - optional mapping of commands to separate pam service names SEE ALSO
runcon (1) AUTHORS
Anthony Colatrella Tim Fraser Steve Grubb <sgrubb@redhat.com> Darrel Goeddel <DGoeddel@trustedcs.com> Michael Thompson <mcthomps@us.ibm.com> Dan Walsh <dwalsh@redhat.com> Security Enhanced Linux October 2000 NEWROLE(1)
Man Page