diff options
Diffstat (limited to 'static/netbsd/man9/secmodel_extensions.9 3.html')
| -rw-r--r-- | static/netbsd/man9/secmodel_extensions.9 3.html | 103 |
1 files changed, 0 insertions, 103 deletions
diff --git a/static/netbsd/man9/secmodel_extensions.9 3.html b/static/netbsd/man9/secmodel_extensions.9 3.html deleted file mode 100644 index e5aa5184..00000000 --- a/static/netbsd/man9/secmodel_extensions.9 3.html +++ /dev/null @@ -1,103 +0,0 @@ -<table class="head"> - <tr> - <td class="head-ltitle">SECMODEL_EXTENSIONS(9)</td> - <td class="head-vol">Kernel Developer's Manual</td> - <td class="head-rtitle">SECMODEL_EXTENSIONS(9)</td> - </tr> -</table> -<div class="manual-text"> -<section class="Sh"> -<h1 class="Sh" id="NAME"><a class="permalink" href="#NAME">NAME</a></h1> -<p class="Pp"><code class="Nm">secmodel_extensions</code> — - <span class="Nd">extensions security model</span></p> -</section> -<section class="Sh"> -<h1 class="Sh" id="DESCRIPTION"><a class="permalink" href="#DESCRIPTION">DESCRIPTION</a></h1> -<p class="Pp"><code class="Nm">secmodel_extensions</code> implements extensions - to the traditional security model based on the original - <span class="Ux">4.4BSD</span>. They can be used to grant additional - privileges to ordinary users, or enable specific security measures like - curtain mode.</p> -<p class="Pp">The extensions are described below.</p> -</section> -<section class="Sh"> -<h1 class="Sh" id="Curtain_mode"><a class="permalink" href="#Curtain_mode">Curtain - mode</a></h1> -<p class="Pp">When enabled, all returned objects will be filtered according to - the user-id requesting information about them, preventing users from - accessing objects they do not own.</p> -<p class="Pp">It affects the output of many commands, including - <a class="Xr">fstat(1)</a>, <a class="Xr">netstat(1)</a>, - <a class="Xr">ps(1)</a>, <a class="Xr">sockstat(1)</a>, and - <a class="Xr">w(1)</a>.</p> -<p class="Pp">This extension is enabled by setting - <span class="Pa">security.models.extensions.curtain</span> or - <span class="Pa">security.curtain</span> <a class="Xr">sysctl(7)</a> to a - non-zero value.</p> -<p class="Pp">It can be enabled at any time, but cannot be disabled anymore when - the <i class="Em">securelevel</i> of the system is above 0.</p> -</section> -<section class="Sh"> -<h1 class="Sh" id="Non-superuser_mounts"><a class="permalink" href="#Non-superuser_mounts">Non-superuser - mounts</a></h1> -<p class="Pp">When enabled, it allows file-systems to be mounted by an ordinary - user who owns the point <var class="Ar">node</var> and has at least read - access to the <var class="Ar">special</var> device - <a class="Xr">mount(8)</a> arguments. Note that the - <code class="Cm">nosuid</code> and <code class="Cm">nodev</code> flags must - be given for non-superuser mounts.</p> -<p class="Pp">This extension is enabled by setting - <span class="Pa">security.models.extensions.usermount</span> or - <span class="Pa">vfs.generic.usermount</span> <a class="Xr">sysctl(7)</a> to - a non-zero value.</p> -<p class="Pp">It can be disabled at any time, but cannot be enabled anymore when - the <i class="Em">securelevel</i> of the system is above 0.</p> -</section> -<section class="Sh"> -<h1 class="Sh" id="Non-superuser_control_of_CPU_sets"><a class="permalink" href="#Non-superuser_control_of_CPU_sets">Non-superuser - control of CPU sets</a></h1> -<p class="Pp">When enabled, an ordinary user is allowed to control the CPU - <a class="Xr">affinity(3)</a> of the processes and threads they own.</p> -<p class="Pp">This extension is enabled by setting - <span class="Pa">security.models.extensions.user_set_cpu_affinity</span> - <a class="Xr">sysctl(7)</a> to a non-zero value.</p> -<p class="Pp">It can be disabled at any time, but cannot be enabled anymore when - the <i class="Em">securelevel</i> of the system is above 0.</p> -</section> -<section class="Sh"> -<h1 class="Sh" id="Hardlink_restrictions"><a class="permalink" href="#Hardlink_restrictions">Hardlink - restrictions</a></h1> -<p class="Pp">Prevent hardlinks to files that the user does not own or has group - access to.</p> -<p class="Pp">To enable user ownership checks, set the - <a class="Xr">sysctl(7)</a> variable - <span class="Pa">security.models.extensions.hardlink_check_uid</span> to a - non-zero value.</p> -<p class="Pp">To enable group membership checks, set the - <a class="Xr">sysctl(7)</a> variable - <span class="Pa">security.models.extensions.hardlink_check_gid</span> to a - non-zero value.</p> -<p class="Pp">These variables can be enabled anytime, but cannot be disabled - anymore when the <i class="Em">securelevel</i> of the system is above 0.</p> -</section> -<section class="Sh"> -<h1 class="Sh" id="SEE_ALSO"><a class="permalink" href="#SEE_ALSO">SEE - ALSO</a></h1> -<p class="Pp"><a class="Xr">affinity(3)</a>, <a class="Xr">sched(3)</a>, - <a class="Xr">sysctl(7)</a>, <a class="Xr">kauth(9)</a>, - <a class="Xr">secmodel(9)</a>, <a class="Xr">secmodel_bsd44(9)</a>, - <a class="Xr">secmodel_securelevel(9)</a>, - <a class="Xr">secmodel_suser(9)</a></p> -</section> -<section class="Sh"> -<h1 class="Sh" id="AUTHORS"><a class="permalink" href="#AUTHORS">AUTHORS</a></h1> -<p class="Pp"><span class="An">Elad Efrat</span> - <<a class="Mt" href="mailto:elad@NetBSD.org">elad@NetBSD.org</a>></p> -</section> -</div> -<table class="foot"> - <tr> - <td class="foot-date">March 27, 2022</td> - <td class="foot-os">NetBSD 10.1</td> - </tr> -</table> |
