1 .\" Copyright (c) 2003, 2004 Networks Associates Technology, Inc.
2 .\" All rights reserved.
4 .\" This software was developed for the FreeBSD Project by Chris Costello
5 .\" at Safeport Network Services and Network Associates Labs, the
6 .\" Security Research Division of Network Associates, Inc. under
7 .\" DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
8 .\" DARPA CHATS research program.
10 .\" Redistribution and use in source and binary forms, with or without
11 .\" modification, are permitted provided that the following conditions
13 .\" 1. Redistributions of source code must retain the above copyright
14 .\" notice, this list of conditions and the following disclaimer.
15 .\" 2. Redistributions in binary form must reproduce the above copyright
16 .\" notice, this list of conditions and the following disclaimer in the
17 .\" documentation and/or other materials provided with the distribution.
19 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
20 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
23 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38 .Nd set MAC label for a file hierarchy
42 .Oo Fl f Ar specfile Oc ...
43 .Oo Fl s Ar specfile Oc ...
48 utility accepts a list of specification files as input and sets the MAC
49 labels on the specified file system hierarchies.
50 Path names specified will be visited in order as given on the command
51 line, and each tree will be traversed in pre-order.
52 (Generally, it will not be very useful to use relative paths instead of
54 Multiple entries matching a single file will be combined and applied in
57 The following options are available:
58 .Bl -tag -width indent
60 Treat any file systems encountered which do not support MAC labelling as
61 errors, instead of warning and skipping them.
63 Apply the specifications in
65 to the specified paths.
68 NOTE: Only the first entry for each file is applied;
69 all others are disregarded and silently dropped.
73 arguments may be specified to include multiple
76 When a symbolic link is encountered, change the label of the link rather
77 than the file the link points to.
79 Do not print non-fatal warnings during execution.
81 Apply the specifications in
83 but assume the specification format is compatible with the SELinux
88 NOTE: Only the first entry for each file is applied;
89 all others are disregarded and silently dropped.
93 will be automatically prepended to the labels in
97 will be explicitly not relabeled.
98 This permits SEBSD to reuse existing SELinux policy specification files.
100 Increase the degree of verbosity.
102 Do not recurse into new file systems when traversing them.
105 .Bl -tag -width ".Pa /usr/share/security/lomac-policy.contexts" -compact
106 .It Pa /usr/share/security/lomac-policy.contexts
107 Sample specfile containing LOMAC policy entries.
122 This software was contributed to the
124 Project by Network Associates Labs,
125 the Security Research Division of Network Associates
127 under DARPA/SPAWAR contract N66001-01-C-8035
129 as part of the DARPA CHATS research program.