The Mandatory Access Control, or MAC, framework allows administrators to
finely control system security by providing for a loadable security policy
It is important to note that due to its nature, MAC security policies may
only restrict access relative to one another and the base system policy;
they cannot override traditional
security provisions such as file permissions and superuser checks.
Currently, the following MAC policy modules are shipped with
Each system subject (processes, sockets, etc.) and each system object
(file system objects, sockets, etc.) can carry with it a MAC label.
MAC labels contain data in an arbitrary format
taken into consideration in making access control decisions
for a given operation.
Most MAC labels on system subjects and objects
can be modified directly or indirectly by the system
The format for a given policy's label may vary depending on the type
of object or subject being labeled.
More information on the format for MAC labels can be found in the
MAC Support for UFS2 File Systems
By default, file system enforcement of labeled MAC policies relies on
a single file system label
Sx MAC Labels )
in order to make access control decisions for all the files in a particular
With some policies, this configuration may not allow administrators to take
full advantage of features.
In order to enable support for labeling files on an individual basis
for a particular file system,
flag must be enabled on the file system.
To set the
flag, drop to single-user mode and unmount the file system,
then execute the following command:
"tunefs -l enable" filesystem
is either the mount point
or the special file
corresponding to the file system on which to enable multilabel support.
Policy enforcement is divided into the following areas of the system:
File system mounts, modifying directories, modifying files, etc.
Loading, unloading, and retrieving statistics on loaded kernel modules
implementation first appeared in
and was developed by the
This software was contributed to the
Fx Project by Network Associates Labs,
the Security Research Division of Network Associates
under DARPA/SPAWAR contract N66001-01-C-8035
as part of the DARPA CHATS research program.
concerning appropriateness for production use.
MAC Framework is considered experimental in
While the MAC Framework design is intended to support the containment of
the root user, not all attack channels are currently protected by entry
As such, MAC Framework policies should not be relied on, in isolation,
to protect against a malicious privileged user.