<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.rsbac.org/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://www.rsbac.org/feed.php">
        <title>RSBAC: Extending Linux Security Beyond the Limits wiki:experiences:igraltist:rc</title>
        <description></description>
        <link>https://www.rsbac.org/</link>
        <image rdf:resource="https://www.rsbac.org/lib/tpl/rsbac/images/favicon.ico" />
       <dc:date>2026-05-12T22:24:55+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://www.rsbac.org/wiki/experiences/igraltist/rc/apache2?rev=1241291414&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/wiki/experiences/igraltist/rc/create_rc_policy_from_scratch?rev=1336894242&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/wiki/experiences/igraltist/rc/create_rc_types?rev=1345299705&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/wiki/experiences/igraltist/rc/default_services?rev=1241312849&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/wiki/experiences/igraltist/rc/local_login?rev=1241190007&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/wiki/experiences/igraltist/rc/login?rev=1241313258&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/wiki/experiences/igraltist/rc/testing?rev=1336888759&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://www.rsbac.org/lib/tpl/rsbac/images/favicon.ico">
        <title>RSBAC: Extending Linux Security Beyond the Limits</title>
        <link>https://www.rsbac.org/</link>
        <url>https://www.rsbac.org/lib/tpl/rsbac/images/favicon.ico</url>
    </image>
    <item rdf:about="https://www.rsbac.org/wiki/experiences/igraltist/rc/apache2?rev=1241291414&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-05-02T19:10:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wiki:experiences:igraltist:rc:apache2</title>
        <link>https://www.rsbac.org/wiki/experiences/igraltist/rc/apache2?rev=1241291414&amp;do=diff</link>
        <description>Back to igraltist&#039;s experiences / RC Modules

Apache2

What should protect with this setup?

This files and directories are taken from default installation on GNU/Linux Debian.

	*  Configurationfiles
		*  /etc/apache2

	*  Apaches Logfiles
		*  /var/log/apache2

	*  Datas to server
		*  /var/www</description>
    </item>
    <item rdf:about="https://www.rsbac.org/wiki/experiences/igraltist/rc/create_rc_policy_from_scratch?rev=1336894242&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-05-13T07:30:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wiki:experiences:igraltist:rc:create_rc_policy_from_scratch</title>
        <link>https://www.rsbac.org/wiki/experiences/igraltist/rc/create_rc_policy_from_scratch?rev=1336894242&amp;do=diff</link>
        <description>Back to igraltist&#039;s experiences /RSBAC RC

Info

Here I try to collect all information to setup sshd RC policies.

I do use some linux tools which I don&#039;t explain.

Search for open files

Each distribution use his own plan where to place an how to name files and directories.

There for I use the tool strace to search all opened files. This task is usually needed for the initial role.
The initial role does reads the configuration files.</description>
    </item>
    <item rdf:about="https://www.rsbac.org/wiki/experiences/igraltist/rc/create_rc_types?rev=1345299705&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-08-18T14:21:45+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wiki:experiences:igraltist:rc:create_rc_types</title>
        <link>https://www.rsbac.org/wiki/experiences/igraltist/rc/create_rc_types?rev=1345299705&amp;do=diff</link>
        <description>Back to igraltist&#039;s experiences booting

Creating RC type file

I use a python script  and put all configuration stuff in a dict.


#! /usr/bin/env python

&quot;&quot;&quot;
2012
Setup routine for basic RC rc_fd_types.
&quot;&quot;&quot;

rc_fd_types = {</description>
    </item>
    <item rdf:about="https://www.rsbac.org/wiki/experiences/igraltist/rc/default_services?rev=1241312849&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-05-03T01:07:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wiki:experiences:igraltist:rc:default_services</title>
        <link>https://www.rsbac.org/wiki/experiences/igraltist/rc/default_services?rev=1241312849&amp;do=diff</link>
        <description>Back to igraltist&#039;s experiences / RC Modules

Syslog-ng

Syslog

Create a Role ``Syslog`` and apply it to the syslog binary.

rc_set_item ROLE 10 name &quot;Syslog&quot;
attr_set_file_dir FILE &quot;/usr/sbin/syslog-ng&quot; rc_initial_role 10
Create ``rc_type_fd`` and assign it RC role 10.
rc_set_item TYPE 10 type_fd_name &quot;Syslog_FD&quot;
rc_set_item ROLE 10 def_fd_create_type 10
rc_set_item ROLE 10 def_fd_ind_create_type 10 10
rc_set_item ROLE 10 def_unixsock_create_type 10</description>
    </item>
    <item rdf:about="https://www.rsbac.org/wiki/experiences/igraltist/rc/local_login?rev=1241190007&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-05-01T15:00:07+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wiki:experiences:igraltist:rc:local_login</title>
        <link>https://www.rsbac.org/wiki/experiences/igraltist/rc/local_login?rev=1241190007&amp;do=diff</link>
        <description>Local Login

For local login i create a new rc-role login and assign this to ``/bin/login``
rc_set_item ROLE 5 name &quot;Login&quot;
attr_set_file_dir FILE &quot;/bin/login&quot; rc_initial_role 5
attr_set_file_dir FILE &quot;/bin/login&quot; rc_force_role 5
Permission to set:
rc_set_item ROLE 5 type_comp_fd 0 GET_PERMISSIONS_DATA GET_STATUS_DATA READ READ_OPEN SEARCH TRUNCATE MAP_EXEC IOCTL</description>
    </item>
    <item rdf:about="https://www.rsbac.org/wiki/experiences/igraltist/rc/login?rev=1241313258&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-05-03T01:14:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wiki:experiences:igraltist:rc:login</title>
        <link>https://www.rsbac.org/wiki/experiences/igraltist/rc/login?rev=1241313258&amp;do=diff</link>
        <description>Back to igraltist&#039;s experiences / RC Modules

Local

Local Login

Only if such setup needed.

To local login only the ``security-user`` and ``root-user`` are allowed.

For local login Iam creating a new RC role ``Login`` and assign this to ``/bin/login``
rc_set_item ROLE 5 name &quot;Login&quot;
attr_set_file_dir FILE &quot;/bin/login&quot; rc_initial_role 5
attr_set_file_dir FILE &quot;/bin/login&quot; rc_force_role 4294967295</description>
    </item>
    <item rdf:about="https://www.rsbac.org/wiki/experiences/igraltist/rc/testing?rev=1336888759&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-05-13T05:59:19+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wiki:experiences:igraltist:rc:testing</title>
        <link>https://www.rsbac.org/wiki/experiences/igraltist/rc/testing?rev=1336888759&amp;do=diff</link>
        <description>Back to igraltist&#039;s experiences / RC Modules

Test Login

Login

To test if its works, login and type,
rc_get_current_role
it&#039;s should show the assigned Role of the user.

Next is to test if the correct filepermission is obtain when create a file in the user homedirectory.
touch create_test
ls -la create_test</description>
    </item>
</rdf:RDF>
