From owner-p4-projects@FreeBSD.ORG Thu May 6 12:35:04 2004 Return-Path: Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id 5707D16A4D0; Thu, 6 May 2004 12:35:04 -0700 (PDT) Delivered-To: perforce@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 31EAC16A4CE for ; Thu, 6 May 2004 12:35:04 -0700 (PDT) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id 0B62A43D3F for ; Thu, 6 May 2004 12:35:04 -0700 (PDT) (envelope-from areisse@nailabs.com) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.12.10/8.12.10) with ESMTP id i46JZ3Ge072722 for ; Thu, 6 May 2004 12:35:03 -0700 (PDT) (envelope-from areisse@nailabs.com) Received: (from perforce@localhost) by repoman.freebsd.org (8.12.10/8.12.10/Submit) id i46JZ32m072719 for perforce@freebsd.org; Thu, 6 May 2004 12:35:03 -0700 (PDT) (envelope-from areisse@nailabs.com) Date: Thu, 6 May 2004 12:35:03 -0700 (PDT) Message-Id: <200405061935.i46JZ32m072719@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to areisse@nailabs.com using -f From: Andrew Reisse To: Perforce Change Reviews Subject: PERFORCE change 52372 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 06 May 2004 19:35:04 -0000 http://perforce.freebsd.org/chv.cgi?CH=52372 Change 52372 by areisse@areisse_ibook on 2004/05/06 12:34:35 clean up usage section Affected files ... .. //depot/projects/trustedbsd/sedarwin73/README#4 edit Differences ... ==== //depot/projects/trustedbsd/sedarwin73/README#4 (text+ko) ==== @@ -35,16 +35,20 @@ Usage: Following the build instructions will yield a system with sedarwin installed, and the sample TE policy configured. To test some functionality, enable -enforcing mode (by default, the TE module runs in permissive mode, logging -access control failures but not enforcing them) and set some file labels: +enforcing mode by running "sudo nvram kenv_sebsd_enforce=1" from the shell +(by default, the TE module runs in permissive mode, logging +access control failures but not enforcing them) and set some file labels. +TE labels are of the form user:role:type. When passed to or from the +system, labels begin with the name of the policy module (in this case, +sebsd). Objects use the object_r "role". + $ getpmac sebsd/andrew:user_r:user_d -(TE labels are of the form user:role:type. The sebsd/ indicates that the -label is for the sebsd policy module. Objects use the object_r "role".) $ touch test_readonly $ setfmac sebsd/andrew:object_r:readonly_t test_readonly $ echo > test_readonly test_readonly: Permission denied + $ touch test_secret $ setfmac sebsd/andrew:object_r:secret_t test_secret $ cat test_secret @@ -56,7 +60,9 @@ sebsd/andrew:user_r:protected_d 2$ echo $$ 700 -In the original shell, +Back in the original shell, +$ getpmac +sebsd/andrew:user_r:user_d $ kill 700 -bash: kill (700) - Operation not permitted $