mac.4 (b9e873d4a03fcd8a3b4fb3b675f6ce8ba9628d57) mac.4 (d29d42d83d6fa3aa27bb3879ce48c0397081268b)
1.\" Copyright (c) 2003 Networks Associates Technology, Inc.
2.\" All rights reserved.
3.\"
4.\" This software was developed for the FreeBSD Project by Chris Costello
5.\" at Safeport Network Services and Network Associates Labs, the
6.\" Security Research Division of Network Associates, Inc. under
7.\" DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
8.\" DARPA CHATS research program.

--- 46 unchanged lines hidden (view full) ---

55.It Xr mac_ifoff 4 Ta "Interface silencing" Ta no Ta any time
56.It Xr mac_lomac 4 Ta "Low-Watermark MAC policy" Ta yes Ta boot only
57.It Xr mac_mls 4 Ta "Confidentiality policy" Ta yes Ta boot only
58.It Xr mac_none 4 Ta "Sample no-op policy" Ta no Ta any time
59.It Xr mac_partition 4 Ta "Process partition policy" Ta yes Ta any time
60.It Xr mac_seeotheruids 4 Ta "See-other-UIDs policy" Ta no Ta any time
61.It Xr mac_test 4 Ta "MAC testing policy" Ta no Ta any time
62.El
1.\" Copyright (c) 2003 Networks Associates Technology, Inc.
2.\" All rights reserved.
3.\"
4.\" This software was developed for the FreeBSD Project by Chris Costello
5.\" at Safeport Network Services and Network Associates Labs, the
6.\" Security Research Division of Network Associates, Inc. under
7.\" DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
8.\" DARPA CHATS research program.

--- 46 unchanged lines hidden (view full) ---

55.It Xr mac_ifoff 4 Ta "Interface silencing" Ta no Ta any time
56.It Xr mac_lomac 4 Ta "Low-Watermark MAC policy" Ta yes Ta boot only
57.It Xr mac_mls 4 Ta "Confidentiality policy" Ta yes Ta boot only
58.It Xr mac_none 4 Ta "Sample no-op policy" Ta no Ta any time
59.It Xr mac_partition 4 Ta "Process partition policy" Ta yes Ta any time
60.It Xr mac_seeotheruids 4 Ta "See-other-UIDs policy" Ta no Ta any time
61.It Xr mac_test 4 Ta "MAC testing policy" Ta no Ta any time
62.El
63.Ss MAC Support for UFS2 File Systems
64By default, file system enforcement of MAC policies relies on a single file
65system label
66(see
67.Sx "MAC Labels" )
68in order to make access control decisions for all the files in a particular
69file system.
70On most systems, this is not the most desirable configuration.
71In order to enable support for labeling files on an individual basis,
72the
73.Dq multilabel
74flag must be enabled on the file system.
75To set the
76.Dq multilabel
77flag, drop to single-user mode and unmount the file system,
78then execute the following command:
79.Pp
80.Dl "tunefs -l enable" Sy filesystem
81.Pp
82where
83.Sy filesystem
84is either the mount point
85(in
86.Xr fstab 5 )
87or the special file
88(in
89.Pa /dev )
90corresponding to the file system on which to enable multilabel support.
63.Ss MAC Labels
64Each system subject (processes, sockets, etc.) and each system object
65(file system objects, sockets, etc.) can carry with it a MAC label.
66MAC labels can contain data in an arbitrary format
67used by the MAC policies in order to help determine how to determine
68access rights for a given operation.
69Most MAC labels on system subjects and objects
70can be modified directly or indirectly by the system

--- 166 unchanged lines hidden ---
91.Ss MAC Labels
92Each system subject (processes, sockets, etc.) and each system object
93(file system objects, sockets, etc.) can carry with it a MAC label.
94MAC labels can contain data in an arbitrary format
95used by the MAC policies in order to help determine how to determine
96access rights for a given operation.
97Most MAC labels on system subjects and objects
98can be modified directly or indirectly by the system

--- 166 unchanged lines hidden ---