This file is indexed.

/usr/share/doc/libpam-doc/html/sag-pam_selinux.html is in libpam-doc 1.1.3-7ubuntu2.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>6.29. pam_selinux - set the default security context</title><meta name="generator" content="DocBook XSL Stylesheets V1.76.1"><link rel="home" href="Linux-PAM_SAG.html" title="The Linux-PAM System Administrators' Guide"><link rel="up" href="sag-module-reference.html" title="Chapter 6. A reference guide for available modules"><link rel="prev" href="sag-pam_securetty.html" title="6.28. pam_securetty - limit root login to special devices"><link rel="next" href="sag-pam_shells.html" title="6.30. pam_shells - check for valid login shell"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">6.29. pam_selinux - set the default security context</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="sag-pam_securetty.html">Prev</a> </td><th width="60%" align="center">Chapter 6. A reference guide for available modules</th><td width="20%" align="right"> <a accesskey="n" href="sag-pam_shells.html">Next</a></td></tr></table><hr></div><div class="section" title="6.29. pam_selinux - set the default security context"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sag-pam_selinux"></a>6.29. pam_selinux - set the default security context</h2></div></div></div><div class="cmdsynopsis"><p><code class="command">pam_selinux.so</code>  [
	close
      ] [
	debug
      ] [
	open
      ] [
	nottys
      ] [
	verbose
      ] [
	select_context
      ] [
	env_params
      ] [
	use_current_range
      ]</p></div><div class="section" title="6.29.1. DESCRIPTION"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_selinux-description"></a>6.29.1. DESCRIPTION</h3></div></div></div><p>
      In a nutshell, pam_selinux sets up the default security context for the
      next execed shell.
    </p><p>
      When an application opens a session using pam_selinux, the  shell  that
      gets  executed  will  be run in the default security context, or if the
      user chooses and the pam file allows  the  selected  security  context.
      Also  the  controlling  tty will have it's security context modified to
      match the users.
    </p><p>
      Adding pam_selinux into a pam file could cause  other  pam  modules  to
      change  their  behavior if the exec another application.  The close and
      open option help mitigate this problem.  close option will  only  cause
      the  close  portion  of  the pam_selinux to execute, and open will only
      cause the open portion to run.  You can add pam_selinux to  the  config
      file  twice.   Add  the pam_selinux close as the executes the open pass
      through the modules,  pam_selinux open_session will happen last.
      When PAM executes the close pass through the modules pam_selinux
      close_session will happen first.
    </p></div><div class="section" title="6.29.2. OPTIONS"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_selinux-options"></a>6.29.2. OPTIONS</h3></div></div></div><div class="variablelist"><dl><dt><span class="term">
          <code class="option">close</code>
        </span></dt><dd><p>
            Only execute the close_session portion of the module.
          </p></dd><dt><span class="term">
          <code class="option">debug</code>
        </span></dt><dd><p>
           Turns on debugging via
	    <span class="citerefentry"><span class="refentrytitle">syslog</span>(3)</span>.
          </p></dd><dt><span class="term">
          <code class="option">open</code>
        </span></dt><dd><p>
            Only execute the open_session portion of the module.
          </p></dd><dt><span class="term">
          <code class="option">nottys</code>
        </span></dt><dd><p>
            Do not try to setup the ttys security context.
          </p></dd><dt><span class="term">
          <code class="option">verbose</code>
        </span></dt><dd><p>
            attempt to inform the user when security context is set.
          </p></dd><dt><span class="term">
          <code class="option">select_context</code>
        </span></dt><dd><p>
            Attempt to ask the user for a custom security context role.
            If MLS is on ask also for sensitivity level.
          </p></dd><dt><span class="term">
          <code class="option">env_params</code>
        </span></dt><dd><p>
            Attempt to obtain a custom security context role from PAM environment.
            If MLS is on obtain also sensitivity level. This option and the
            select_context option are mutually exclusive. The respective PAM
            environment variables are <span class="emphasis"><em>SELINUX_ROLE_REQUESTED</em></span>,
            <span class="emphasis"><em>SELINUX_LEVEL_REQUESTED</em></span>, and
            <span class="emphasis"><em>SELINUX_USE_CURRENT_RANGE</em></span>. The first two variables
            are self describing and the last one if set to 1 makes the PAM module behave as
            if the use_current_range was specified on the command line of the module.
          </p></dd><dt><span class="term">
          <code class="option">use_current_range</code>
        </span></dt><dd><p>
            Use the sensitivity level of the current process for the user context
            instead of the default level. Also suppresses asking of the
            sensitivity level from the user or obtaining it from PAM environment.
          </p></dd></dl></div></div><div class="section" title="6.29.3. MODULE TYPES PROVIDED"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_selinux-types"></a>6.29.3. MODULE TYPES PROVIDED</h3></div></div></div><p>
      Only the <code class="option">session</code> module type is provided.
    </p></div><div class="section" title="6.29.4. RETURN VALUES"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_selinux-return_values"></a>6.29.4. RETURN VALUES</h3></div></div></div><div class="variablelist"><dl><dt><span class="term">PAM_AUTH_ERR</span></dt><dd><p>
            Unable to get or set a valid context.
          </p></dd><dt><span class="term">PAM_SUCCESS</span></dt><dd><p>
            The security context was set successfully.
          </p></dd><dt><span class="term">PAM_USER_UNKNOWN</span></dt><dd><p>
            The user is not known to the system.
          </p></dd></dl></div></div><div class="section" title="6.29.5. EXAMPLES"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_selinux-examples"></a>6.29.5. EXAMPLES</h3></div></div></div><pre class="programlisting">
auth     required  pam_unix.so
session  required  pam_permit.so
session  optional  pam_selinux.so
    </pre></div><div class="section" title="6.29.6. AUTHOR"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_selinux-author"></a>6.29.6. AUTHOR</h3></div></div></div><p>
        pam_selinux was written by Dan Walsh &lt;dwalsh@redhat.com&gt;.
      </p></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="sag-pam_securetty.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="sag-module-reference.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="sag-pam_shells.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">6.28. pam_securetty - limit root login to special devices </td><td width="20%" align="center"><a accesskey="h" href="Linux-PAM_SAG.html">Home</a></td><td width="40%" align="right" valign="top"> 6.30. pam_shells - check for valid login shell</td></tr></table></div></body></html>