Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

securetty_types(5) [centos man page]

securetty_types(5)					       SELinux configuration						securetty_types(5)

NAME
securetty_types - The SELinux secure tty type configuration file DESCRIPTION
The securetty_types file contains a list of types associated to secure tty type that are defined in the policy for use by SELinux-aware applications. selinux_securetty_types_path(3) will return the active policy path to this file. The default securetty types file is: /etc/selinux/{SELINUXTYPE}/contexts/securetty_types Where {SELINUXTYPE} is the entry from the selinux configuration file config (see selinux_config(5)). selinux_check_securetty_context(3) reads this file to determine if a context is for a secure tty defined in the active policy. SELinux-aware applications such as newrole(1) use this information to check the status of a tty. FILE FORMAT
Each line in the file consists of the following entry: type One or more type entries that are defined in the policy for secure tty devices. EXAMPLE
# ./contexts/securetty_types sysadm_tty_device_t user_tty_device_t staff_tty_device_t SEE ALSO
selinux(8), selinux_securetty_types_path(3), newrole(1), selinux_check_securetty_context(3), selinux_config(5) Security Enhanced Linux 28-Nov-2011 securetty_types(5)

Check Out this Related Man Page

customizable_types(5)					       SELinux configuration					     customizable_types(5)

NAME
customizable_types - The SELinux customizable types configuration file. DESCRIPTION
The customizable_types file contains a list of types that can be customised in some way by SELinux-aware applications. Generally this is a file context type that is usually set on files that need to be shared among certain domains and where the administrator wants to manually manage the type. The use of customizable types is deprecated as the preferred approach is to use semanage fcontext ... (8). However, SELinux-aware appli- cations such as setfiles(8) will use this information to obtain a list of types relating to files that should not be relabeled. selinux_customizable_types_path(3) will return the active policy path to this file. The default customizable types file is: /etc/selinux/{SELINUXTYPE}/contexts/customizable_types Where {SELINUXTYPE} is the entry from the selinux configuration file config (see selinux_config(5)). is_context_customizable(3) reads this file to determine if a context is customisable or not for the active policy. FILE FORMAT
Each line in the file consists of the following: type Where: type The type defined in the policy that can be customised. EXAMPLE
# ./contexts/customizable_types mount_loopback_t public_content_rw_t public_content_t swapfile_t sysadm_untrusted_content_t SEE ALSO
selinux(8), selinux_customizable_types_path(3), is_context_customizable(3), semanage(8), setfiles(8), selinux_config(5) Security Enhanced Linux 28-Nov-2011 customizable_types(5)
Man Page

5 More Discussions You Might Find Interesting

1. Windows & DOS: Issues & Discussions

F-secure application: exporting profile

Is it possible to export your saved profiles in F-secure. I have looked in F-secure's documentation, on google, here, and other places and can't seem to figure out how to do it. It seems like such a simple task... (0 Replies)
Discussion started by: dangral
0 Replies

2. Cybersecurity

is open source more secure ?

Hi Guys, I'd like to know your opinion. A friend of mine claims, an open source OS like linux is more secure than a closed one like AIX because 'if he is hacked, he can do countermeasures'. I believe the opposite is the case - it's more secure if not everybody knows the kernel and is able to... (6 Replies)
Discussion started by: zxmaus
6 Replies

3. Cybersecurity

/var/log/secure* mysteriously empty!

Hello everyone. I'm a newbie and this is my first post, and I'm hoping to get some help understanding what happened on my server. I did as much research as I could, but now I turn to the forums for help :) I've set up a VPS server and I "thought" I had good enough security on it, but all of a... (2 Replies)
Discussion started by: antondev
2 Replies

4. Cybersecurity

Computer secure management

(8 Replies)
Discussion started by: OS-easy
8 Replies

5. UNIX for Advanced & Expert Users

GHOST glibc Security Vulnerability

Hello All, Just FYI please about GHOST glibc Security Vulnerability(not sure if this is posted already) which may help us to secure our systems. Following are the 2 links on same too from Redhat side. https://access.redhat.com/articles/1333353... (0 Replies)
Discussion started by: RavinderSingh13
0 Replies