mac.3 (ec05f17e3860f6a50f9bd043e19acb7c42bda4f2) mac.3 (3b29692060f7f4ee8f121c0f0b3b86c348b6fa63)
1.\" Copyright (c) 2001 Networks Associates Technology, Inc.
2.\" All rights reserved.
1.\" Copyright (c) 2001 Networks Associates Technology, Inc.
2.\" All rights reserved.
3.\"
3.\"
4.\" This software was developed for the FreeBSD Project by Chris
5.\" Costello at Safeport Network Services and Network Associates
6.\" Laboratories, the Security Research Division of Network Associates,
7.\" Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part
8.\" of the DARPA CHATS research program.
4.\" This software was developed for the FreeBSD Project by Chris
5.\" Costello at Safeport Network Services and Network Associates
6.\" Laboratories, the Security Research Division of Network Associates,
7.\" Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part
8.\" of the DARPA CHATS research program.
9.\"
9.\"
10.\" Redistribution and use in source and binary forms, with or without
11.\" modification, are permitted provided that the following conditions
12.\" are met:
13.\" 1. Redistributions of source code must retain the above copyright
14.\" notice, this list of conditions and the following disclaimer.
15.\" 2. Redistributions in binary form must reproduce the above copyright
16.\" notice, this list of conditions and the following disclaimer in the
17.\" documentation and/or other materials provided with the distribution.
10.\" Redistribution and use in source and binary forms, with or without
11.\" modification, are permitted provided that the following conditions
12.\" are met:
13.\" 1. Redistributions of source code must retain the above copyright
14.\" notice, this list of conditions and the following disclaimer.
15.\" 2. Redistributions in binary form must reproduce the above copyright
16.\" notice, this list of conditions and the following disclaimer in the
17.\" documentation and/or other materials provided with the distribution.
18.\"
18.\"
19.\" THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
20.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
23.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29.\" SUCH DAMAGE.
19.\" THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
20.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
23.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29.\" SUCH DAMAGE.
30.\"
30.\"
31.\" $FreeBSD$
31.\" $FreeBSD$
32.\"
32.Dd December 21, 2001
33.Dt MAC 3
34.Sh NAME
35.Nm mac
36.Nd introduction to the POSIX.1e MAC security API
37.Sh LIBRARY
38.Lb libc
39.Sh SYNOPSIS

--- 75 unchanged lines hidden (view full) ---

115.Xr mac_text 3 ,
116and may be used to convert a
117.Vt mac_t
118into a text-form MAC label.
119.El
120.Sh IMPLEMENTATION NOTES
121.Fx Ns 's
122support for POSIX.1e interfaces and features
33.Dd December 21, 2001
34.Dt MAC 3
35.Sh NAME
36.Nm mac
37.Nd introduction to the POSIX.1e MAC security API
38.Sh LIBRARY
39.Lb libc
40.Sh SYNOPSIS

--- 75 unchanged lines hidden (view full) ---

116.Xr mac_text 3 ,
117and may be used to convert a
118.Vt mac_t
119into a text-form MAC label.
120.El
121.Sh IMPLEMENTATION NOTES
122.Fx Ns 's
123support for POSIX.1e interfaces and features
123is still under development
124at this time.
124is
125.Ud .
125.Sh SEE ALSO
126.Xr mac_free 3 ,
127.Xr mac_get 3 ,
128.Xr mac_set 3 ,
129.Xr mac_text 3 ,
130.Xr mac 9
131.Sh STANDARDS
132POSIX.1e is described in IEEE POSIX.1e draft 17.
133Discussion of the draft
134continues on the cross-platform POSIX.1e implementation mailing list.
135To join this list, see the
136.Fx
137POSIX.1e implementation page
138for more information.
139.Sh HISTORY
140Support for Mandatory Access Control was introduced in
141.Fx 5.0
126.Sh SEE ALSO
127.Xr mac_free 3 ,
128.Xr mac_get 3 ,
129.Xr mac_set 3 ,
130.Xr mac_text 3 ,
131.Xr mac 9
132.Sh STANDARDS
133POSIX.1e is described in IEEE POSIX.1e draft 17.
134Discussion of the draft
135continues on the cross-platform POSIX.1e implementation mailing list.
136To join this list, see the
137.Fx
138POSIX.1e implementation page
139for more information.
140.Sh HISTORY
141Support for Mandatory Access Control was introduced in
142.Fx 5.0
142as part of the TrustedBSD Project.
143as part of the
144.Tn TrustedBSD
145Project.
143.Sh BUGS
146.Sh BUGS
144The TrustedBSD MAC Framework and associated policies, interfaces, and
147The
148.Tn TrustedBSD
149MAC Framework and associated policies, interfaces, and
145applications are considered to be an experimental feature in
146.Fx .
147Sites considering production deployment should keep the experimental
148status of these services in mind during any deployment process.
149See also
150.Xr mac 9
151for related considerations regarding the kernel framework.
150applications are considered to be an experimental feature in
151.Fx .
152Sites considering production deployment should keep the experimental
153status of these services in mind during any deployment process.
154See also
155.Xr mac 9
156for related considerations regarding the kernel framework.