From: Chris Richards <gizmo@giz-works.com>
To: gentoo-hardened@lists.gentoo.org
Subject: Re: [gentoo-hardened] SELinux (strict policy) and ssh
Date: Sun, 14 Nov 2010 18:26:02 -0600 [thread overview]
Message-ID: <4CE07E1A.7090906@giz-works.com> (raw)
In-Reply-To: <AANLkTinQ8gaGqLECsc693JOCFhOWgRJGr0XDTCHj+TGU@mail.gmail.com>
On 11/14/2010 06:40 AM, luc nac wrote:
> Is it right that I can still login (or switch to the sysadm_r role)
> via ssh to that machine even if the boolean "ssh_sysadm_login" is set
> "off"?
Sven's reply is correct. ssh_sysadm_login doesn't PREVENT ssh users
from changing to the sysadm_r role once they have logged in; it simply
prevents them from logging directly in as sysadm_r. Essentially, it
enforces the requirement to 'newrole -r' before you can access the
sysadm role.
A little bit more about this can be found here:
http://www.nsa.gov/research/selinux/list-archive/0612/thread_body32.shtml
> What tests can I do to confirm that SELinux is correctly working?
>
Not sure what you're after here?
'sestatus' will give you some information regarding what mode
(permissive, enforcing), what policy (strict, targeted), etc. you are
using, and whether the system is running. 'ls -Z' will give you context
information on a particular file, and you can use 'matchpathcon' to see
what the context of a file should be. 'chcon' will allow you to force
an arbitrary file to an arbitrary context (even one it's not supposed to
have), while 'restorecon', 'setfiles', and 'rlpkg' can all be used to
restore file contexts to their defaults (the different commands have
different options and different effects). 'semodule -l' can be used to
see what modules (other than the base capabilities provided by
selinux-base-policy) are loaded.
HTH
Later,
Gizmo
prev parent reply other threads:[~2010-11-15 1:02 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-11-14 12:40 [gentoo-hardened] SELinux (strict policy) and ssh luc nac
2010-11-14 12:54 ` klondike
2010-11-14 20:23 ` Sven Vermeulen
2010-11-15 0:26 ` Chris Richards [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4CE07E1A.7090906@giz-works.com \
--to=gizmo@giz-works.com \
--cc=gentoo-hardened@lists.gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox