*nix Documentation Project
·  Home
 +   man pages
·  Linux HOWTOs
·  FreeBSD Tips
·  *niX Forums

  man pages->FreeBSD man pages -> mac_seeotheruids (4)              
Title
Content
Arch
Section
 

MAC_SEEOTHERUIDS(4)

Contents


NAME    [Toc]    [Back]

     mac_seeotheruids -- simple policy controlling whether users see other
     users

SYNOPSIS    [Toc]    [Back]

     To compile the policy into your kernel, place the following lines in your
     kernel configuration file:

	   options MAC
	   options MAC_SEEOTHERUIDS

     Alternately, to load the module at boot time, place the following line in
     your kernel configuration file:

	   options MAC

     and in loader.conf(5):

	   mac_seeotheruids_load="YES"

DESCRIPTION    [Toc]    [Back]

     The mac_seeotheruids policy module, when enabled, denies users to see
     processes or sockets owned by other users.

     To enable mac_seeotheruids, set the sysctl OID
     security.mac.seeotheruids.enabled to 1.

     To allow users to see processes and sockets owned by the same primary
     group, set the sysctl OID security.mac.seeotheruids.primarygroup_enabled
     to 1.

     To allow processes with a specific group ID to be exempt from the policy,
     set the sysctl OID security.mac.seeotheruids.specificgid_enabled to 1,
     and security.mac.seeotheruids.specificgid to the group ID to be exempted.

   Label Format    [Toc]    [Back]
     No labels are defined for mac_seeotheruids.

SEE ALSO    [Toc]    [Back]

      
      
     mac(4), mac_biba(4), mac_bsdextended(4), mac_ifoff(4), mac_lomac(4),
     mac_mls(4), mac_none(4), mac_partition(4), mac_portacl(4), mac_test(4),
     mac(9)

HISTORY    [Toc]    [Back]

     The mac_seeotheruids policy module first appeared in FreeBSD 5.0 and was
     developed by the TrustedBSD Project.

AUTHORS    [Toc]    [Back]

     This software was contributed to the FreeBSD Project by Network Associates
 Labs, the Security Research Division of Network Associates Inc.
     under DARPA/SPAWAR contract N66001-01-C-8035 (``CBOSS''), as part of the
     DARPA CHATS research program.

BUGS    [Toc]    [Back]

     See mac(9) concerning appropriateness for production use.	The TrustedBSD
     MAC Framework is considered experimental in FreeBSD.

     While the MAC Framework design is intended to support the containment of
     the root user, not all attack channels are currently protected by entry
     point checks.  As such, MAC Framework policies should not be relied on,
     in isolation, to protect against a malicious privileged user.


FreeBSD 5.2.1		       December 8, 2002 		 FreeBSD 5.2.1
[ Back ]
 Similar pages
Name OS Title
whodo HP-UX which users are doing what
wall IRIX write to all users
help OpenBSD help for new users and administrators
help Tru64 Provides information for new users
who Tru64 Identifies users currently logged in
lastb HP-UX indicate last logins of users and ttys
skeyaudit OpenBSD warn users if their S/Key will soon expire
last HP-UX indicate last logins of users and ttys
lastlogin FreeBSD indicate last login time of users
last IRIX indicate last logins of users and terminals
Copyright © 2004-2005 DeniX Solutions SRL
newsletter delivery service