From babae0ae2d48995241b88b9274eea99667941ec2 Mon Sep 17 00:00:00 2001 From: Chin-San Huang Date: Wed, 27 Jun 2007 11:49:40 +0000 Subject: Remove the deprecated description about MAC. Noticed by: kevlo, vanilla (via irc) --- en_US.ISO8859-1/books/handbook/mac/chapter.sgml | 86 ------------------------- 1 file changed, 86 deletions(-) (limited to 'en_US.ISO8859-1/books/handbook') diff --git a/en_US.ISO8859-1/books/handbook/mac/chapter.sgml b/en_US.ISO8859-1/books/handbook/mac/chapter.sgml index 0b93f16ad6..4f6fa68844 100644 --- a/en_US.ISO8859-1/books/handbook/mac/chapter.sgml +++ b/en_US.ISO8859-1/books/handbook/mac/chapter.sgml @@ -764,92 +764,6 @@ test: biba/high of this chapter. - - - Controlling MAC with Tunables - - Without any modules loaded, there are still some parts - of MAC which may be configured using - the sysctl interface. These tunables - are described below and in all cases the number one (1) - means enabled while the number zero (0) means - disabled: - - - - security.mac.enforce_fs defaults to - one (1) and enforces MAC file system - policies on the file systems. - - - - security.mac.enforce_kld defaults to - one (1) and enforces MAC kernel linking - policies on the dynamic kernel linker (see - &man.kld.4;). - - - - security.mac.enforce_network defaults - to one (1) and enforces MAC network - policies. - - - - security.mac.enforce_pipe defaults - to one (1) and enforces MAC policies - on pipes. - - - - security.mac.enforce_process defaults - to one (1) and enforces MAC policies - on processes which utilize inter-process - communication. - - - - security.mac.enforce_socket defaults - to one (1) and enforces MAC policies - on sockets (see the &man.socket.2; manual page). - - - - security.mac.enforce_system defaults - to one (1) and enforces MAC policies - on system activities such as accounting and - rebooting. - - - - security.mac.enforce_vm defaults - to one (1) and enforces MAC policies - on the virtual memory system. - - - - - Every policy or MAC option supports - tunables. These usually hang off of the - security.mac.<policyname> tree. - To view all of the tunables from MAC - use the following command: - - &prompt.root; sysctl -da | grep mac - - - This should be interpreted as all of the basic - MAC policies are enforced by default. - If the modules were built into the kernel the system - would be extremely locked down and most likely unable to - communicate with the local network or connect to the Internet, - etc. This is why building the modules into the kernel is not - completely recommended. Not because it limits the ability to - disable features on the fly with sysctl, - but it permits the administrator to instantly switch the - policies of a system without the requirement of rebuilding - and reinstalling a new system. - -- cgit v1.2.3