sshd_net_selinux − Security Enhanced Linux Policy for the sshd_net processes
Security-Enhanced Linux secures the sshd_net processes via flexible mandatory access control.
The sshd_net processes execute with the sshd_net_t SELinux type. You can check if you have these processes running by executing the ps command with the −Z qualifier.
For example:
ps -eZ | grep sshd_net_t
SELinux defines process types (domains) for each process running on the system
You can see the context of a process using the −Z option to ps
Policy governs the access confined processes have to files. SELinux sshd_net policy is very flexible allowing users to setup their sshd_net processes in as secure a method as possible.
The following process types are defined for sshd_net:
sshd_net_t
Note: semanage permissive -a sshd_net_t can be used to make the process type sshd_net_t permissive. SELinux does not deny access to permissive process types, but the AVC (SELinux denials) messages are still generated.
SELinux policy is customizable based on least access required. sshd_net policy is extremely flexible and has several booleans that allow you to manipulate the policy and run sshd_net with the tightest access possible.
If you want to allow all domains to execute in fips_mode, you must turn on the fips_mode boolean. Enabled by default.
setsebool -P fips_mode 1
If you want to allow sshd to use tcp wrappers, you must turn on the ssh_use_tcpd boolean. Disabled by default.
setsebool -P ssh_use_tcpd 1
semanage fcontext can also be used to manipulate default file context mappings.
semanage permissive can also be used to manipulate whether or not a process type is permissive.
semanage module can also be used to enable/disable/install/remove policy modules.
semanage boolean can also be used to manipulate the booleans
system-config-selinux is a GUI tool available to customize SELinux policy settings.
This manual page was auto-generated using sepolicy manpage .
selinux(8), sshd_net(8), semanage(8), restorecon(8), chcon(1), sepolicy(8), setsebool(8)