git_session_selinux − Security Enhanced Linux Policy for the git_session processes
Security-Enhanced Linux secures the git_session processes via flexible mandatory access control.
The git_session processes execute with the git_session_t SELinux type. You can check if you have these processes running by executing the ps command with the −Z qualifier.
For example:
ps -eZ | grep git_session_t
The git_session_t SELinux type can be entered via the gitd_exec_t file type.
The default entrypoint paths for the git_session_t domain are the following:
/usr/libexec/git-core/git-daemon
SELinux defines process types (domains) for each process running on the system
You can see the context of a process using the −Z option to ps
Policy governs the access confined processes have to files. SELinux git_session policy is very flexible allowing users to setup their git_session processes in as secure a method as possible.
The following process types are defined for git_session:
git_session_t
Note: semanage permissive -a git_session_t can be used to make the process type git_session_t permissive. SELinux does not deny access to permissive process types, but the AVC (SELinux denials) messages are still generated.
SELinux policy is customizable based on least access required. git_session policy is extremely flexible and has several booleans that allow you to manipulate the policy and run git_session with the tightest access possible.
If you want to determine whether Git session daemon can bind TCP sockets to all unreserved ports, you must turn on the git_session_bind_all_unreserved_ports boolean. Disabled by default.
setsebool -P git_session_bind_all_unreserved_ports 1
If you want to determine whether calling user domains can execute Git daemon in the git_session_t domain, you must turn on the git_session_users boolean. Disabled by default.
setsebool -P git_session_users 1
If you want to allow users to resolve user passwd entries directly from ldap rather then using a sssd server, you must turn on the authlogin_nsswitch_use_ldap boolean. Disabled by default.
setsebool -P authlogin_nsswitch_use_ldap 1
If you want to allow all domains to execute in fips_mode, you must turn on the fips_mode boolean. Enabled by default.
setsebool -P fips_mode 1
If you want to allow confined applications to run with kerberos, you must turn on the kerberos_enabled boolean. Enabled by default.
setsebool -P kerberos_enabled 1
If you want to allow system to run with NIS, you must turn on the nis_enabled boolean. Disabled by default.
setsebool -P nis_enabled 1
If you want to allow confined applications to use nscd shared memory, you must turn on the nscd_use_shm boolean. Enabled by default.
setsebool -P nscd_use_shm 1
If you want to support NFS home directories, you must turn on the use_nfs_home_dirs boolean. Disabled by default.
setsebool -P use_nfs_home_dirs 1
If you want to support SAMBA home directories, you must turn on the use_samba_home_dirs boolean. Disabled by default.
setsebool -P use_samba_home_dirs 1
semanage fcontext can also be used to manipulate default file context mappings.
semanage permissive can also be used to manipulate whether or not a process type is permissive.
semanage module can also be used to enable/disable/install/remove policy modules.
semanage boolean can also be used to manipulate the booleans
system-config-selinux is a GUI tool available to customize SELinux policy settings.
This manual page was auto-generated using sepolicy manpage .
selinux(8), git_session(8), semanage(8), restorecon(8), chcon(1), sepolicy(8), setsebool(8)