named_selinux(8) named SELinux Policy documentation named_selinux(8)NAMEnamed_selinux - Security Enhanced Linux Policy for the named processes
DESCRIPTION
Security-Enhanced Linux secures the named processes via flexible manda‐
tory access control.
BOOLEANS
SELinux policy is customizable based on least access required. named
policy is extremely flexible and has several booleans that allow you to
manipulate the policy and run named with the tightest access possible.
If you want to allow BIND to write the master zone files. Generally
this is used for dynamic DNS or zone transfers, you must turn on the
named_write_master_zones boolean.
setsebool -P named_write_master_zones 1
If you want to allow BIND to bind apache port, you must turn on the
named_bind_http_port boolean.
setsebool -P named_bind_http_port 1
NSSWITCH DOMAIN
If you want to allow users to login using a sssd serve for the names‐
pace_init_t, named_t, you must turn on the authlogin_nsswitch_use_ldap
boolean.
setsebool -P authlogin_nsswitch_use_ldap 1
If you want to allow confined applications to run with kerberos for the
namespace_init_t, named_t, you must turn on the allow_kerberos boolean.
setsebool -P allow_kerberos 1
If you want to allow system to run with NI for the namespace_init_t,
named_t, you must turn on the allow_ypbind boolean.
setsebool -P allow_ypbind 1
FILE CONTEXTS
SELinux requires files to have an extended attribute to define the file
type.
You can see the context of a file using the -Z option to ls
Policy governs the access confined processes have to these files.
SELinux named policy is very flexible allowing users to setup their
named processes in as secure a method as possible.
The following file types are defined for named:
named_cache_t
- Set files with the named_cache_t type, if you want to store the files
under the /var/cache directory.
Paths:
/var/named/chroot/var/named/data(/.*)?,
/var/named/chroot/var/tmp(/.*)?, /var/named/data(/.*)?,
/var/named/chroot/var/named/slaves(/.*)?,
/var/named/dynamic(/.*)?, /var/named/slaves(/.*)?,
/var/named/chroot/var/named/dynamic(/.*)?
named_checkconf_exec_t
- Set files with the named_checkconf_exec_t type, if you want to tran‐
sition an executable to the named_checkconf_t domain.
named_conf_t
- Set files with the named_conf_t type, if you want to treat the files
as named configuration data, usually stored under the /etc directory.
Paths:
/var/named/chroot/etc/named.root.hints, /etc/named.root.hints,
/var/named/chroot(/.*)?, /var/named/named.ca, /etc/unbound(/.*)?,
/var/named/chroot/etc/named.caching-nameserver.conf,
/etc/named.rfc1912.zones, /etc/named.caching-nameserver.conf,
/etc/named.conf, /var/named/chroot/var/named/named.ca,
/var/named/chroot/etc/named.conf, /etc/rndc.*,
/var/named/chroot/etc/named.rfc1912.zones
named_exec_t
- Set files with the named_exec_t type, if you want to transition an
executable to the named_t domain.
Paths:
/usr/sbin/lwresd, /usr/sbin/named, /usr/sbin/unbound
named_initrc_exec_t
- Set files with the named_initrc_exec_t type, if you want to transi‐
tion an executable to the named_initrc_t domain.
Paths:
/etc/rc.d/init.d/named, /etc/rc.d/init.d/unbound
named_keytab_t
- Set files with the named_keytab_t type, if you want to treat the
files as kerberos keytab files.
named_log_t
- Set files with the named_log_t type, if you want to treat the data as
named log data, usually stored under the /var/log directory.
Paths:
/var/log/named.*, /var/named/chroot/var/log/named.*
named_tmp_t
- Set files with the named_tmp_t type, if you want to store named tem‐
porary files in the /tmp directories.
named_unit_file_t
- Set files with the named_unit_file_t type, if you want to treat the
files as named unit content.
Paths:
/usr/lib/systemd/system/unbound.*, /usr/lib/systemd/system/named.*
named_var_run_t
- Set files with the named_var_run_t type, if you want to store the
named files under the /run directory.
Paths:
/var/named/chroot/var/run/named.*, /var/run/ndc,
/var/run/bind(/.*)?, /var/run/named(/.*)?, /var/run/unbound(/.*)?
named_zone_t
- Set files with the named_zone_t type, if you want to treat the files
as named zone data.
Paths:
/var/named/chroot/var/named(/.*)?, /var/named(/.*)?
Note: File context can be temporarily modified with the chcon command.
If you want to permanantly change the file context you need to use the
semanage fcontext command. This will modify the SELinux labeling data‐
base. You will need to use restorecon to apply the labels.
PROCESS TYPES
SELinux defines process types (domains) for each process running on the
system
You can see the context of a process using the -Z option to ps
Policy governs the access confined processes have to files. SELinux
named policy is very flexible allowing users to setup their named pro‐
cesses in as secure a method as possible.
The following process types are defined for named:
named_t, namespace_init_t
Note: semanage permissive -a PROCESS_TYPE can be used to make a process
type permissive. Permissive process types are not denied access by
SELinux. AVC messages will still be generated.
COMMANDS
semanage fcontext can also be used to manipulate default file context
mappings.
semanage permissive can also be used to manipulate whether or not a
process type is permissive.
semanage module can also be used to enable/disable/install/remove pol‐
icy modules.
semanage boolean can also be used to manipulate the booleans
system-config-selinux is a GUI tool available to customize SELinux pol‐
icy settings.
AUTHOR
This manual page was autogenerated by genman.py.
SEE ALSOselinux(8), named(8), semanage(8), restorecon(8), chcon(1) , setse‐
bool(8)dwalsh@redhat.com named named_selinux(8)