Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

tomoyo-savepolicy(8) [debian man page]

TOMOYO-SAVEPOLICY(8)					  System Administration Utilities				      TOMOYO-SAVEPOLICY(8)

NAME
tomoyo-savepolicy - save TOMOYO Linux policy SYNOPSIS
tomoyo-savepolicy [directory] tomoyo-savepolicy [directory] [remote_ip:remote:port] DESCRIPTION
This program saves TOMOYO Linux policy onto disk from kernel memory. The directory /etc/tomoyo/policy/YY-MM-DD.hh:mm:ss is created with four files inside: domain_policy.conf, exception_policy.conf, profile.conf, and manager.conf. The symbolic links /etc/tomoyo/policy/previous and /etc/tomoyo/policy/current are updated to point to the previous and current YY-MM-DD.hh:mm:ss directories respectively. The following symbolic links should exist within the /etc/tomoyo directory: domain_policy.conf -> policy/current/domain_policy.conf exception_policy.conf -> policy/current/exception_policy.conf profile.conf -> policy/current/profile.conf manager.conf -> policy/current/manager.conf policy/current -> policy/YY-MM-DD.hh:mm:ss policy/previous -> policy/YY-MM-DD.hh:mm:ss You can therefore access the current policy files without having to descend into subdirectories, and without having to determine which YY-MM-DD.hh:mm:ss directory is the most recent. If the policy type is specified, this program works similar to cat(1). OPTIONS
-e Print /sys/kernel/security/tomoyo/exception_policy to standard output. -d Print /sys/kernel/security/tomoyo/domain_policy to standard output. -p Print /sys/kernel/security/tomoyo/profile to standard output. -m Print /sys/kernel/security/tomoyo/manager to standard output. -s Print /sys/kernel/security/tomoyo/stat to standard output. directory Save policy to an alternative directory, rather than the default /etc/tomoyo directory. remote_ip:remote_port Save policy on a remote system via an agent waiting at port remote_port on IP address remote_ip. EXAMPLES
Save policy to disk tomoyo-savepolicy Print "/sys/kernel/security/tomoyo/exception_policy" to standard output tomoyo-savepolicy -e Retrieve policy from a remote system and save in a local directory tomoyo-savepolicy /etc/tomoyo/192.168.1.1/ 192.168.1.1:10000 BUGS
If you find any bugs, send an email to <tomoyo-users-en@lists.sourceforge.jp>. AUTHORS
Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp> Main author. Jamie Nguyen <jamie@tomoyolinux.co.uk> Documentation and website. SEE ALSO
tomoyo-editpolicy-agent(8), tomoyo-loadpolicy(8) See <http://tomoyo.sourceforge.jp> for more information. tomoyo-tools 2.5.0 2012-04-14 TOMOYO-SAVEPOLICY(8)

Check Out this Related Man Page

auths(1)							   User Commands							  auths(1)

NAME
auths - print authorizations granted to a user SYNOPSIS
auths [ user ]... DESCRIPTION
The auths command prints on standard output the authorizations that you or the optionally-specified user or role have been granted. Autho- rizations are rights that are checked by certain privileged programs to determine whether a user may execute restricted functionality. Each user may have zero or more authorizations. Authorizations are represented by fully-qualified names, which identify the organization that created the authorization and the functionality that it controls. Following the Java convention, the hierarchical components of an authorization are separated by dots (.), starting with the reverse order Internet domain name of the creating organization, and ending with the specific function within a class of authorizations. An asterisk (*) indicates all authorizations in a class. A user's authorizations are looked up in user_attr(4) and in the /etc/security/policy.conf file (see policy.conf(4)). Authorizations may be specified directly in user_attr(4) or indirectly through prof_attr(4). Authorizations may also be assigned to every user in the system directly as default authorizations or indirectly as default profiles in the /etc/security/policy.conf file. EXAMPLES
Example 1 Sample output The auths output has the following form: example% auths tester01 tester02 tester01 : solaris.system.date,solaris.jobs.admin tester02 : solaris.system.* example% Notice that there is no space after the comma separating the authorization names in tester01. EXIT STATUS
The following exit values are returned: 0 Successful completion. 1 An error occurred. FILES
/etc/user_attr /etc/security/auth_attr /etc/security/policy.conf /etc/security/prof_attr ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsu | +-----------------------------+-----------------------------+ SEE ALSO
profiles(1), roles(1), getauthattr(3SECDB), auth_attr(4), policy.conf(4), prof_attr(4), user_attr(4), attributes(5) SunOS 5.11 25 Mar 2004 auths(1)
Man Page

Featured Tech Videos