open_init_pty

SELinux core policy utilities (newrole application for RBAC/MLS)

Install

All systems
curl cmd.cat/open_init_pty.sh
Debian Debian
apt-get install newrole
Ubuntu
apt-get install newrole
image/svg+xml Kali Linux
apt-get install newrole
CentOS
yum install policycoreutils
Fedora
dnf install policycoreutils
Windows (WSL2)
sudo apt-get update sudo apt-get install newrole
Raspbian
apt-get install newrole

newrole

SELinux core policy utilities (newrole application for RBAC/MLS)

Security-enhanced Linux is a patch of the Linux® kernel and a number of utilities with enhanced security functionality designed to add mandatory access controls to Linux. The Security-enhanced Linux kernel contains new architectural components originally developed to improve the security of the Flask operating system. These architectural components provide general support for the enforcement of many kinds of mandatory access control policies, including those based on the concepts of Type Enforcement®, Role-based Access Control, and Multi-level Security. RBAC/MLS policy machines require newrole as a way of changing the role or level of a logged in user. This package contains newrole to switch roles, run_init to run /etc/init.d scripts in the proper context.

policycoreutils

SELinux core policy utilities

Security-enhanced Linux is a patch of the Linux? kernel and a number of utilities with enhanced security functionality designed to add mandatory access controls to Linux. The Security-enhanced Linux kernel contains new architectural components originally developed to improve the security of the Flask operating system. These architectural components provide general support for the enforcement of many kinds of mandatory access control policies, including those based on the concepts of Type Enforcement?, Role-based Access Control, and Multi-level Security. This package contains the core policy utilities that are required for basic operation of an SELinux system. These utilities include load_policy to load policies, setfiles to label filesystems, newrole to switch roles, run_init to run /etc/init.d scripts in the proper context, and restorecond to restore contexts of files that often get the wrong context. It also includes the mcstransd to map a maching readable sensitivity label to a human readable form. The sensitivity label is comprised of a sensitivity level (always s0 for MCS and anything from s0 to s15 for MLS) and a set of categories. A ranged sensitivity label will have a low level and a high level where the high level will dominate the low level. Categories are numbered from c0 to c1023. Names such as s0 and c1023 and not easily readable by humans, so mcstransd translated them to human readable labels such as SystemLow and SystemHigh.