From 5ea6d47931e49aa8b87405f5dbd9af4e19785e0e Mon Sep 17 00:00:00 2001 From: Thorsten Kukuk Date: Sun, 18 Jun 2006 08:26:58 +0000 Subject: Relevant BUGIDs: Purpose of commit: cleanup Commit summary: --------------- 2006-06-18 Thorsten Kukuk * modules/pam_selinux/Makefile.am: Include Make.xml.rules. * modules/pam_selinux/pam_selinux.8.xml: New. * modules/pam_selinux/pam_selinux.8: Regenerated from xml file. * modules/pam_selinux/README.xml: New. * modules/pam_selinux/README: Regenerated from xml file. --- modules/pam_selinux/pam_selinux.8 | 134 +++++++++++++++++++++----------------- 1 file changed, 76 insertions(+), 58 deletions(-) (limited to 'modules/pam_selinux/pam_selinux.8') diff --git a/modules/pam_selinux/pam_selinux.8 b/modules/pam_selinux/pam_selinux.8 index 4ccec58c..70ffbecf 100644 --- a/modules/pam_selinux/pam_selinux.8 +++ b/modules/pam_selinux/pam_selinux.8 @@ -1,63 +1,81 @@ -.TH pam_selinux 8 2003/08/26 "Red Hat Linux" "System Administrator's Manual" -.SH NAME -pam_selinux \- set the default security context after login via PAM. -.SH SYNOPSIS -.B session optional /lib/security/pam_selinux.so -.br - -.SH DESCRIPTION -In a nutshell, pam_selinux sets up the default security context for the next execed -shell. - -When an application opens a session using pam_selinux, the shell that gets -executed will be run in the default security context, or if the user chooses -and the pam file allows the selected security context. Also the controlling -tty will have it's security context modified to match the users. - -Adding pam_selinux into a pam file could cause other pam modules to change -their behavior if the exec another application. The close and open option help -mitigate this problem. close option will only cause the close portion of the -pam_selinux to execute, and open will only cause the open portion to run. You -can add pam_selinux to the config file twice. Add the pam_selinux close as the -'first' session entry and open as the 'last' session entry. This way when pam -executes the open pass through the modules, pam_selinux open_session will -happen last. When pam executes the close pass through the modules pam_selinux -close_session will happen first. - -.SH ARGUMENTS -.IP close +.\" Title: pam_selinux +.\" Author: +.\" Generator: DocBook XSL Stylesheets v1.70.1 +.\" Date: 06/18/2006 +.\" Manual: Linux\-PAM Manual +.\" Source: Linux\-PAM Manual +.\" +.TH "PAM_SELINUX" "8" "06/18/2006" "Linux\-PAM Manual" "Linux\-PAM Manual" +.\" disable hyphenation +.nh +.\" disable justification (adjust text to left margin only) +.ad l +.SH "NAME" +pam_selinux \- PAM module to set the default security context +.SH "SYNOPSIS" +.HP 15 +\fBpam_selinux.so\fR [close] [debug] [multiple] [open] [nottys] [verbose] +.SH "DESCRIPTION" +.PP +In a nutshell, pam_selinux sets up the default security context for the next execed shell. +.PP +When an application opens a session using pam_selinux, the shell that gets executed will be run in the default security context, or if the user chooses and the pam file allows the selected security context. Also the controlling tty will have it's security context modified to match the users. +.PP +Adding pam_selinux into a pam file could cause other pam modules to change their behavior if the exec another application. The close and open option help mitigate this problem. close option will only cause the close portion of the pam_selinux to execute, and open will only cause the open portion to run. You can add pam_selinux to the config file twice. Add the pam_selinux close as the executes the open pass through the modules, pam_selinux open_session will happen last. When PAM executes the close pass through the modules pam_selinux close_session will happen first. +.SH "OPTIONS" +.TP 3n +\fBclose\fR Only execute the close_session portion of the module. -.IP debug -turns on debugging via \fBsyslog(3)\fR. -.IP multiple -tells pam_selinux.so to allow the user to select the security context they will -login with, if the user has more than one role. -.IP open +.TP 3n +\fBdebug\fR +Turns on debugging via +\fBsyslog\fR(3). +.TP 3n +\fBmultiple\fR +Tells pam_selinux.so to allow the user to select the security context they will login with, if the user has more than one role. +.TP 3n +\fBopen\fR Only execute the open_session portion of the module. -.IP nottys +.TP 3n +\fBnottys\fR Do not try to setup the ttys security context. -.IP verbose +.TP 3n +\fBverbose\fR attempt to inform the user when security context is set. +.SH "MODULE SERVICES PROVIDED" +.PP +Only the +\fBsession\fR +service is supported. +.SH "RETURN VALUES" +.TP 3n +PAM_AUTH_ERR +Unable to get or set a valid context. +.TP 3n +PAM_SUCCESS +The security context was set successfull. +.TP 3n +PAM_USER_UNKNOWN +The user is not known to the system. +.SH "EXAMPLES" +.sp +.RS 3n +.nf +auth requisite pam_permit.so +auth [success=2 default=ok] pam_selinux.so auth=perm_denied cred=success +auth [default=reset] pam_selinux.so auth=success cred=perm_denied +auth [success=done default=die] pam_selinux.so +auth optional pam_selinux.so auth=perm_denied cred=perm_denied +auth sufficient pam_selinux.so auth=success cred=success + +.fi +.RE +.SH "SEE ALSO" +.PP -.SH EXAMPLE -\fB/etc/pam.d/some-login-program\fP: -.br -auth required /lib/security/pam_unix.so -.br -session required /lib/security/pam_permit.so -session optional /lib/security/pam_selinux.so -.br - -.SH CAVEATS -Setting the following line will cause the login to fail -auth sufficient /lib/security/pam_selinux.so verbose - - -.SH SEE ALSO -pam_selinux_check(8) - -.SH BUGS -Let's hope not, but if you find any, please email the author. - -.SH AUTHOR -Dan Walsh +\fBpam.conf\fR(5), +\fBpam.d\fR(8), +\fBpam\fR(8) +.SH "AUTHOR" +.PP +pam_selinux was written by Dan Walsh . -- cgit v1.2.3