?????????? ????????? - ??????????????? - /home/agenciai/public_html/cd38d8/selinux.zip
???????
PK �[�wjl l semanage.confnu �[��� # Authors: Jason Tang <jtang@tresys.com> # # Copyright (C) 2004-2005 Tresys Technology, LLC # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, write to the Free Software # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA # # Specify how libsemanage will interact with a SELinux policy manager. # The four options are: # # "source" - libsemanage manipulates a source SELinux policy # "direct" - libsemanage will write directly to a module store. # /foo/bar - Write by way of a policy management server, whose # named socket is at /foo/bar. The path must begin # with a '/'. # foo.com:4242 - Establish a TCP connection to a remote policy # management server at foo.com. If there is a colon # then the remainder is interpreted as a port number; # otherwise default to port 4242. module-store = direct # When generating the final linked and expanded policy, by default # semanage will set the policy version to POLICYDB_VERSION_MAX, as # given in <sepol/policydb.h>. Change this setting if a different # version is necessary. #policy-version = 19 # expand-check check neverallow rules when executing all semanage # commands. There might be a penalty in execution time if this # option is enabled. expand-check=0 # usepasswd check tells semanage to scan all pass word records for home directories # and setup the labeling correctly. If this is turned off, SELinux will label only /home # and home directories of users with SELinux login mappings defined, see # semanage login -l for the list of such users. # If you want to use a different home directory, you will need to use semanage fcontext command. # For example, if you had home dirs in /althome directory you would have to execute # semanage fcontext -a -e /home /althome usepasswd=False bzip-small=true bzip-blocksize=5 ignoredirs=/root;/bin;/boot;/dev;/etc;/lib;/lib64;/proc;/run;/sbin;/sys;/tmp;/usr;/var optimize-policy=true [sefcontext_compile] path = /usr/sbin/sefcontext_compile args = -r $@ [end] PK �[�f .config_backupnu �[��� # This file controls the state of SELinux on the system. # BACKUP_SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. # See also: # https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/using_selinux/changing-selinux-states-and-modes_using-selinux#changing-selinux-modes-at-boot-time_changing-selinux-states-and-modes # # NOTE: Up to RHEL 8 release included, BACKUP_SELINUX=disabled would also # fully disable SELinux during boot. If you need a system with SELinux # fully disabled instead of SELinux running with no policy loaded, you # need to pass selinux=0 to the kernel command line. You can use grubby # to persistently set the bootloader to boot with selinux=0: # # grubby --update-kernel ALL --args selinux=0 # # To revert back to SELinux enabled: # # grubby --update-kernel ALL --remove-args selinux # BACKUP_SELINUX=disabled # BACKUP_SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. BACKUP_SELINUXTYPE=targeted PK �[�6�� � confignu �[��� # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. # See also: # https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/using_selinux/changing-selinux-states-and-modes_using-selinux#changing-selinux-modes-at-boot-time_changing-selinux-states-and-modes # # NOTE: Up to RHEL 8 release included, SELINUX=disabled would also # fully disable SELinux during boot. If you need a system with SELinux # fully disabled instead of SELinux running with no policy loaded, you # need to pass selinux=0 to the kernel command line. You can use grubby # to persistently set the bootloader to boot with selinux=0: # # grubby --update-kernel ALL --args selinux=0 # # To revert back to SELinux enabled: # # grubby --update-kernel ALL --remove-args selinux # SELINUX=disabled # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted PK �[�[�_ _ targeted/setrans.confnu �[��� # # Multi-Category Security translation table for SELinux # # Uncomment the following to disable translation libary # disable=1 # # Objects can be categorized with 0-1023 categories defined by the admin. # Objects can be in more than one category at a time. # Categories are stored in the system as c0-c1023. Users can use this # table to translate the categories into a more meaningful output. # Examples: # s0:c0=CompanyConfidential # s0:c1=PatientRecord # s0:c2=Unclassified # s0:c3=TopSecret # s0:c1,c3=CompanyConfidentialRedHat s0=SystemLow s0-s0:c0.c1023=SystemLow-SystemHigh s0:c0.c1023=SystemHigh PK �[Bv!��5 �5 targeted/policy/policy.33nu �[��� ��|� SE Linux! @ @ w @ � @ @ database getattr create relabelfrom drop relabelto setattr socket getattr create recv_msg relabelfrom sendto bind accept append listen setopt shutdown lock relabelto recvfrom setattr read getopt ioctl write map connect name_bind send_msg x_device getattr create bell remove add manage use destroy get_property setfocus force_cursor freeze grab setattr read write getfocus list_property set_property file getattr create relabelfrom watch_sb watch_with_perm link mounton append watch lock relabelto open swapon watch_reads audit_access setattr rename read execmod ioctl write map execute quotaon unlink watch_mount cap2 mac_override audit_read perfmon bpf wake_alarm checkpoint_restore syslog block_suspend mac_admin cap ipc_owner net_raw sys_rawio fowner sys_nice setpcap mknod net_bind_service sys_pacct kill dac_override sys_resource audit_write net_admin ipc_lock fsetid sys_admin setgid sys_chroot sys_tty_config audit_control sys_ptrace setfcap sys_boot sys_time chown sys_module net_broadcast lease linux_immutable dac_read_search setuid ipc getattr create unix_read destroy unix_write associate setattr read write� � Q netlink_netfilter_socketsocket� @ >