Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

List of Trusted Extensions Man Pages

Trusted Extensions is a configuration of the Oracle Solaris OS. This appendix provides a description of the man pages that include Trusted Extensions information.

Trusted Extensions Man Pages in Alphabetical Order

The following man pages are relevant only on a system that is configured with Trusted Extensions. The description includes links to examples or explanations of these features in the Trusted Extensions document set.

Trusted Extensions Man Page

Purpose and Links to Additional Information

add_allocatable(1M)

Enables a device to be allocated by adding the device to device allocation databases. By default, removable devices are allocatable.

See How to Configure a Device by Using the Device Manager in Trusted Extensions.

atohexlabel(1M)

Converts a human-readable label to its internal text equivalent.

For an example, see How to Obtain the Hexadecimal Equivalent for a Label.

blcompare(3TSOL)

Compares binary labels.

blminmax(3TSOL)

Determines the bound of two labels.

chk_encodings(1M)

Checks the label encodings file syntax.

For examples, see How to Debug a label_encodings File in Trusted Extensions Label Administration and Example 4–1.

fgetlabel(2)

Gets the file's label

getlabel(1)

Displays the label of the selected files or directories.

For an example, see How to Display the Labels of Mounted Files.

getlabel(2)

Gets the label of a file

getpathbylabel(3TSOL)

Gets the zone pathname

getplabel(3TSOL)

Gets the label of a process

getuserrange(3TSOL)

Gets the label range of a user

getzoneidbylabel(3TSOL)

Gets zone ID from zone label

getzonelabelbyid(3TSOL)

Gets zone label from zone ID

getzonelabelbyname(3TSOL)

Gets zone label from zone name

getzonepath(1)

Displays the root path of the zone that corresponds to the specified label.

Acquiring a Sensitivity Label in Trusted Extensions Developer’s Guide

getzonerootbyid(3TSOL)

Gets zone root pathname from zone root ID

getzonerootbylabel(3TSOL)

Gets zone root pathname from zone label

getzonerootbyname(3TSOL)

Gets zone root pathname from zone name

hextoalabel(1M)

Converts an internal text label to its human-readable equivalent

For an example, see How to Obtain a Readable Label From Its Hexadecimal Form.

labeladm(1M)

Enables and disables the Trusted Extensions labeling service and can set the label_encodings file

labelclipping(3TSOL)

Translates a binary label and clips the label to the specified width

label_encodings(4)

Describes the label encodings file

label_to_str(3TSOL)

Converts labels to human-readable strings

labels(5)

Describes Trusted Extensions label attributes

libtsnet(3LIB)

Is the Trusted Extensions network library

libtsol(3LIB)

Is the Trusted Extensions library

m_label(3TSOL)

Allocates and frees resources for a new label

pam_tsol_account(5)

Checks account limitations that are due to labels

For an example of its use, see How to Log In and Administer a Remote Trusted Extensions System.

plabel(1)

Gets the label of a process

remove_allocatable(1M)

Prevents allocation of a device by removing its entry from device allocation databases

For an example, see How to Configure a Device by Using the Device Manager in Trusted Extensions.

sel_config(4)

Is the selection rules for copy, cut, paste, and drag-and-drop operations

See Rules When Changing the Level of Security for Data.

setflabel(3TSOL)

Moves a file to a zone with the corresponding sensitivity label

setlabel(1)

Relabels the selected item. Requires the solaris.label.file.downgrade or solaris.label.file.upgrade authorization. These authorizations are in the Object Label Management rights profile.

str_to_label(3TSOL)

Parses human-readable strings to a label

tncfg(1M)

Manages the trusted network databases. An alternative to the txzonmgr GUI for managing the trusted network. The list subcommand displays the security characteristics of network interfaces. tncfg provides more complete information than the tninfo command.

For many examples, see Chapter 16, Managing Networks in Trusted Extensions.

tnctl(1M)

Configures Trusted Extensions network parameters. You can also use the tncfg command.

For an example, see Example 12–1.

tnd(1M)

Executes the trusted network daemon when the LDAP naming service is enabled.

tninfo(1M)

Displays kernel-level Trusted Extensions network information and statistics.

How to Debug the Trusted Extensions Network. You can also use the tncfg command and the txzonemgr GUI.

For a comparison with the tncfg command, see How to Troubleshoot Mount Failures in Trusted Extensions.

trusted_extensions(5)

Introduces Trusted Extensions

txzonemgr(1M)

Manages labeled zones and network interfaces. Command-line options enable automatic creation of two zones. This command accepts a configuration file as input and enables the deletion of zones. txzonemgr is a zenity (1) script.

See Creating Labeled Zones and Troubleshooting the Trusted Network.

TrustedExtensionsPolicy(4)

Is the configuration file for Trusted Extensions X Server Extension

tsol_getrhtype(3TSOL)

Gets the host type from Trusted Extensions network information

tgnome-selectlabel utility

Enables you to create a label builder GUI

For more information, see tgnome-selectlabel Utility in Trusted Extensions Developer’s Guide .

updatehome(1)

Updates the home directory copy and link files for the current label

See How to Configure Startup Files for Users in Trusted Extensions.

XTSOLgetClientAttributes(3XTSOL)

Gets the label attributes of an X client

XTSOLgetPropAttributes(3XTSOL)

Gets the label attributes of a window property

XTSOLgetPropLabel(3XTSOL)

Gets the label of a window property

XTSOLgetPropUID(3XTSOL)

Gets the UID of a window property

XTSOLgetResAttributes(3XTSOL)

Gets all label attributes of a window or a pixmap

XTSOLgetResLabel(3XTSOL)

Gets the label of a window, a pixmap, or a colormap

XTSOLgetResUID(3XTSOL)

Gets the UID of a window or a pixmap

XTSOLgetSSHeight(3XTSOL)

Gets the height of the screen stripe

XTSOLgetWorkstationOwner(3XTSOL)

Gets the ownership of the workstation

XTSOLIsWindowTrusted(3XTSOL)

Determines if a window is created by a trusted client

XTSOLMakeTPWindow(3XTSOL)

Make this window a Trusted Path window

XTSOLsetPolyInstInfo(3XTSOL)

Sets polyinstantiation information

XTSOLsetPropLabel(3XTSOL)

Sets the label of a window property

XTSOLsetPropUID(3XTSOL)

Sets the UID of a window property

XTSOLsetResLabel(3XTSOL)

Sets the label of a window or a pixmap

XTSOLsetResUID(3XTSOL)

Sets the UID of a window, a pixmap, or a colormap

XTSOLsetSessionHI(3XTSOL)

Sets the session high sensitivity label to the window server

XTSOLsetSessionLO(3XTSOL)

Sets the session low sensitivity label to the window server

XTSOLsetSSHeight(3XTSOL)

Sets the height of the screen stripe

XTSOLsetWorkstationOwner(3XTSOL)

Sets the ownership of the workstation

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Trusted Extensions adds information to the following Oracle Solaris man pages.

Oracle Solaris Man Page

Trusted Extensions Modification and Links to Additional Information

allocate(1)

Adds options to support allocating a device in a zone and cleaning the device in a windowed environment. In Trusted Extensions, regular users do not use this command.

For the user procedure, see How to Allocate a Device in Trusted Extensions in Trusted Extensions User’s Guide .

auditconfig(1M)

Adds the window policy, audit classes, audit events, and audit tokens for labeled information.

auditreduce(1M)

Adds the –l option to select audit records by label.

For examples, see Selecting Audit Events to Be Displayed in Managing Auditing in Oracle Solaris 11.2 .

auth_attr(4)

Adds label authorizations

automount(1M)

Adds the capability to mount, and therefore view, lower-level home directories. Modifies the names and contents of auto_home maps to account for zone names and zone visibility from higher labels.

For more information, see Changes to the Automounter in Trusted Extensions.

deallocate(1)

Adds options to support deallocating a device in a zone, cleaning the device in a windowed environment, and specifying the type of device to deallocate. In Trusted Extensions, regular users do not use this command.

For the user procedure, see How to Allocate a Device in Trusted Extensions in Trusted Extensions User’s Guide .

device_clean(5)

Is invoked by default in Trusted Extensions

getpflags(2)

Recognizes the NET_MAC_AWARE and NET_MAC_AWARE_INHERIT process flags

getsockopt(3SOCKET)

Gets the mandatory access control status, SO_MAC_EXEMPT, of the socket

getsockopt(3XNET)

Gets the mandatory access control status, SO_MAC_EXEMPT, of the socket

ikeadm(1M)

Adds a debug flag, 0x0400, for labeled IKE processes.

ike.config(4)

Adds the label_aware global parameter and three Phase 1 transform keywords, single_label, multi_label, and wire_label

in.iked(1M)

Supports the negotiation of labeled security associations through multilevel UDP ports 500 and 4500 in the global zone.

Also, see the ike.config(4) man page.

ipadm(1M)

Adds the all-zones interface as a permanent property value.

For an example, see How to Verify That a System's Interfaces Are Up.

ipseckey(1M)

Adds the label, outer-label, and implicit-label extensions. These extensions associate Trusted Extensions labels with the traffic that is carried inside a security association.

is_system_labeled(3C)

Determines whether the system is configured with Trusted Extensions

ldaplist(1)

Adds Trusted Extensions network databases in LDAP

list_devices(1)

Adds attributes, such as labels, that are associated with a device. Adds the –a option to display device attributes, such as authorizations and labels. Adds the –d option to display the default attributes of an allocated device type. Adds the –z option to display available devices that can be allocated to a labeled zone.

netstat(1M)

Adds the –R option to display extended security attributes for sockets and routing table entries..

For an example, see How to Troubleshoot Mount Failures in Trusted Extensions.

pf_key(7P)

Adds labels to IPsec security associations (SAs)

privileges(5)

Adds Trusted Extensions privileges, such as PRIV_FILE_DOWNGRADE_SL

prof_attr(4)

Adds rights profiles, such as Object Label Management

route(1M)

Adds the –secattr option to add extended security attributes to a route. Adds the –secattr option to display the security attributes of the route: cipso, doi, max_sl, and min_sl.

For an example, see How to Troubleshoot Mount Failures in Trusted Extensions.

setpflags(2)

Sets the NET_MAC_AWARE per-process flag

setsockopt(3SOCKET)

Sets the SO_MAC_EXEMPT option

setsockopt(3XNET)

Sets the mandatory access control, SO_MAC_EXEMPT, on the socket

socket.h(3HEAD)

Supports the SO_MAC_EXEMPT option for unlabeled peers

tar(1)

Adds the –T option to archive and extract files and directories that are labeled.

See How to Back Up Files in Trusted Extensions and How to Restore Files in Trusted Extensions.

tar.h(3HEAD)

Adds attribute types that are used in labeled tar files

ucred_getlabel(3C)

Adds getting the label value on a user credential

user_attr(4)

Adds the clearance and min_label user security attributes that are specific to Trusted Extensions

See Planning User Security in Trusted Extensions.