This section discusses common configuration issues.
multilabel
cannot be enabled on /Themultilabel
flag does not stay enabled on my root
(/) partition!
The following steps may resolve this transient error:
Edit /etc/fstab and set the root partition to ro
for read-only.
Reboot into single user mode.
Run tunefs -l enable
on /.
Reboot the system.
Run mount -urw
/ and change the ro
back to rw
in /etc/fstab and reboot the
system again.
Double-check the output from mount to ensure that
multilabel
has been properly set on the root file
system.
After establishing a secure environment with MAC, I am no longer able to start Xorg!
This could be caused by the MAC partition policy or by a mislabeling in one of the MAC labeling policies. To debug, try the following:
Check the error message; if the user is in the insecure class, the partition policy may be the culprit. Try setting the user's class back to the default class and rebuild the database with cap_mkdb. If this does not alleviate the problem, go to step two.
Double-check the label policies. Ensure that the policies are set correctly for the user, the Xorg application, and the /dev entries.
If neither of these resolve the problem, send the error message and a description of the environment to the FreeBSD general questions mailing list mailing list.
When a user attempts to switch from the root user to another user in the system, the error message “_secure_path: unable to state .login_conf” appears.
This message is usually shown when the user has a higher label setting than that
of the user they are attempting to become. For instance, joe has a default label of biba/low
. The root user, who has a
label of biba/high
, cannot view joe's home directory. This will happen whether or not root has used su to become joe as the Biba integrity model will not permit root to view objects set at a lower integrity level.
In normal or even single user mode, the root is not recognized, whoami returns 0 (zero), and su returns “who are you?”.
This can happen if a labeling policy has been disabled, either by a sysctl(8) or the
policy module was unloaded. If the policy is disabled, the login capabilities
database needs to be reconfigured with label
removed.
Double check login.conf to ensure that all label
options have been removed and rebuild the database with
cap_mkdb.
This may also happen if a policy restricts access to master.passwd. This is usually caused by an administrator altering the file under a label which conflicts with the general policy being used by the system. In these cases, the user information would be read by the system and access would be blocked as the file has inherited the new label. Disable the policy using sysctl(8) and everything should return to normal.