diff options
author | Stephen Smalley <sds@tycho.nsa.gov> | 2013-05-13 12:37:04 -0400 |
---|---|---|
committer | Stephen Smalley <sds@tycho.nsa.gov> | 2013-08-23 08:35:43 -0400 |
commit | 8348d279c7ce1a2453965ba7f05a7b818d58886c (patch) | |
tree | 5bf50a8793a7ad5f6f0bd475c54a72f49c37f7a9 /init/readme.txt | |
parent | 5d8554323caddfa3ca02f31625ea72634312521f (diff) | |
download | core-8348d279c7ce1a2453965ba7f05a7b818d58886c.tar.gz core-8348d279c7ce1a2453965ba7f05a7b818d58886c.tar.bz2 core-8348d279c7ce1a2453965ba7f05a7b818d58886c.zip |
Add support for socket security context specification.
Add an optional argument to the socket option for specifying
a SELinux security context for the socket. Normally the socket
security context is automatically computed from the service security
context or set using the seclabel option, but this facility allows
dealing with two scenarios that cannot be addressed using the existing
mechanisms:
1) Use of logwrapper to wrap a service.
In this case, init cannot determine the service security context
as it does not directly execute it and we do not want logwrapper
to run in the same domain as the service.
2) Situations where a service has multiple sockets and we want to
label them distinctly.
Change-Id: I7ae9088c326a2140e56a8044bfb21a91505aea11
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Diffstat (limited to 'init/readme.txt')
-rw-r--r-- | init/readme.txt | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/init/readme.txt b/init/readme.txt index 7a5997d26..1e8c3920d 100644 --- a/init/readme.txt +++ b/init/readme.txt @@ -70,10 +70,13 @@ disabled setenv <name> <value> Set the environment variable <name> to <value> in the launched process. -socket <name> <type> <perm> [ <user> [ <group> ] ] +socket <name> <type> <perm> [ <user> [ <group> [ <context> ] ] ] Create a unix domain socket named /dev/socket/<name> and pass its fd to the launched process. <type> must be "dgram", "stream" or "seqpacket". User and group default to 0. + Context is the SELinux security context for the socket. + It defaults to the service security context, as specified by seclabel or + computed based on the service executable file security context. user <username> Change to username before exec'ing this service. |