diff options
author | Robert Watson <rwatson@FreeBSD.org> | 2002-12-10 16:20:34 +0000 |
---|---|---|
committer | Robert Watson <rwatson@FreeBSD.org> | 2002-12-10 16:20:34 +0000 |
commit | eba0370d9028d9b36bc36dea083f1ae6a0592e73 (patch) | |
tree | b774321cf04143cea01bca6620f4f94b6edbc651 /sys/security | |
parent | 749142ecbf0e4026b4ccef9dd9b42e2bc5637b60 (diff) | |
download | src-eba0370d9028d9b36bc36dea083f1ae6a0592e73.tar.gz src-eba0370d9028d9b36bc36dea083f1ae6a0592e73.zip |
Default policies to on: if you load them or compile them into your
kernel, you should expect them to do something, so now they do. This
doesn't affect users who don't load or explicitly compile in the
policies.
Approved by: re (jhb)
Obtained from: TrustedBSD Project
Sponsored by: DARPA, Network Associates Laboratories
Notes
Notes:
svn path=/head/; revision=107731
Diffstat (limited to 'sys/security')
-rw-r--r-- | sys/security/mac_biba/mac_biba.c | 2 | ||||
-rw-r--r-- | sys/security/mac_lomac/mac_lomac.c | 2 | ||||
-rw-r--r-- | sys/security/mac_mls/mac_mls.c | 2 | ||||
-rw-r--r-- | sys/security/mac_none/mac_none.c | 2 | ||||
-rw-r--r-- | sys/security/mac_seeotheruids/mac_seeotheruids.c | 2 | ||||
-rw-r--r-- | sys/security/mac_stub/mac_stub.c | 2 | ||||
-rw-r--r-- | sys/security/mac_test/mac_test.c | 2 |
7 files changed, 7 insertions, 7 deletions
diff --git a/sys/security/mac_biba/mac_biba.c b/sys/security/mac_biba/mac_biba.c index 74a279e1d320..f9db7dd93cd0 100644 --- a/sys/security/mac_biba/mac_biba.c +++ b/sys/security/mac_biba/mac_biba.c @@ -85,7 +85,7 @@ static int mac_biba_label_size = sizeof(struct mac_biba); SYSCTL_INT(_security_mac_biba, OID_AUTO, label_size, CTLFLAG_RD, &mac_biba_label_size, 0, "Size of struct mac_biba"); -static int mac_biba_enabled = 0; +static int mac_biba_enabled = 1; SYSCTL_INT(_security_mac_biba, OID_AUTO, enabled, CTLFLAG_RW, &mac_biba_enabled, 0, "Enforce MAC/Biba policy"); TUNABLE_INT("security.mac.biba.enabled", &mac_biba_enabled); diff --git a/sys/security/mac_lomac/mac_lomac.c b/sys/security/mac_lomac/mac_lomac.c index a531f25e0caf..55603af34e0a 100644 --- a/sys/security/mac_lomac/mac_lomac.c +++ b/sys/security/mac_lomac/mac_lomac.c @@ -91,7 +91,7 @@ static int mac_lomac_label_size = sizeof(struct mac_lomac); SYSCTL_INT(_security_mac_lomac, OID_AUTO, label_size, CTLFLAG_RD, &mac_lomac_label_size, 0, "Size of struct mac_lomac"); -static int mac_lomac_enabled = 0; +static int mac_lomac_enabled = 1; SYSCTL_INT(_security_mac_lomac, OID_AUTO, enabled, CTLFLAG_RW, &mac_lomac_enabled, 0, "Enforce MAC/LOMAC policy"); TUNABLE_INT("security.mac.lomac.enabled", &mac_lomac_enabled); diff --git a/sys/security/mac_mls/mac_mls.c b/sys/security/mac_mls/mac_mls.c index df81135ef857..f82993d5c6d8 100644 --- a/sys/security/mac_mls/mac_mls.c +++ b/sys/security/mac_mls/mac_mls.c @@ -85,7 +85,7 @@ static int mac_mls_label_size = sizeof(struct mac_mls); SYSCTL_INT(_security_mac_mls, OID_AUTO, label_size, CTLFLAG_RD, &mac_mls_label_size, 0, "Size of struct mac_mls"); -static int mac_mls_enabled = 0; +static int mac_mls_enabled = 1; SYSCTL_INT(_security_mac_mls, OID_AUTO, enabled, CTLFLAG_RW, &mac_mls_enabled, 0, "Enforce MAC/MLS policy"); TUNABLE_INT("security.mac.mls.enabled", &mac_mls_enabled); diff --git a/sys/security/mac_none/mac_none.c b/sys/security/mac_none/mac_none.c index 99440dbfd706..328f07d537e8 100644 --- a/sys/security/mac_none/mac_none.c +++ b/sys/security/mac_none/mac_none.c @@ -77,7 +77,7 @@ SYSCTL_DECL(_security_mac); SYSCTL_NODE(_security_mac, OID_AUTO, none, CTLFLAG_RW, 0, "TrustedBSD mac_none policy controls"); -static int mac_none_enabled = 0; +static int mac_none_enabled = 1; SYSCTL_INT(_security_mac_none, OID_AUTO, enabled, CTLFLAG_RW, &mac_none_enabled, 0, "Enforce none policy"); diff --git a/sys/security/mac_seeotheruids/mac_seeotheruids.c b/sys/security/mac_seeotheruids/mac_seeotheruids.c index 11de57b66699..8ceb2c29329a 100644 --- a/sys/security/mac_seeotheruids/mac_seeotheruids.c +++ b/sys/security/mac_seeotheruids/mac_seeotheruids.c @@ -70,7 +70,7 @@ SYSCTL_DECL(_security_mac); SYSCTL_NODE(_security_mac, OID_AUTO, seeotheruids, CTLFLAG_RW, 0, "TrustedBSD mac_seeotheruids policy controls"); -static int mac_seeotheruids_enabled = 0; +static int mac_seeotheruids_enabled = 1; SYSCTL_INT(_security_mac_seeotheruids, OID_AUTO, enabled, CTLFLAG_RW, &mac_seeotheruids_enabled, 0, "Enforce seeotheruids policy"); diff --git a/sys/security/mac_stub/mac_stub.c b/sys/security/mac_stub/mac_stub.c index 99440dbfd706..328f07d537e8 100644 --- a/sys/security/mac_stub/mac_stub.c +++ b/sys/security/mac_stub/mac_stub.c @@ -77,7 +77,7 @@ SYSCTL_DECL(_security_mac); SYSCTL_NODE(_security_mac, OID_AUTO, none, CTLFLAG_RW, 0, "TrustedBSD mac_none policy controls"); -static int mac_none_enabled = 0; +static int mac_none_enabled = 1; SYSCTL_INT(_security_mac_none, OID_AUTO, enabled, CTLFLAG_RW, &mac_none_enabled, 0, "Enforce none policy"); diff --git a/sys/security/mac_test/mac_test.c b/sys/security/mac_test/mac_test.c index 26f6a55bea20..0ffd0cf36044 100644 --- a/sys/security/mac_test/mac_test.c +++ b/sys/security/mac_test/mac_test.c @@ -73,7 +73,7 @@ SYSCTL_DECL(_security_mac); SYSCTL_NODE(_security_mac, OID_AUTO, test, CTLFLAG_RW, 0, "TrustedBSD mac_test policy controls"); -static int mac_test_enabled = 0; +static int mac_test_enabled = 1; SYSCTL_INT(_security_mac_test, OID_AUTO, enabled, CTLFLAG_RW, &mac_test_enabled, 0, "Enforce test policy"); |