false
Allow making anonymous memory executable, e.g. for runtime-code generation or executable stack.
false
Allow making a modified private file mapping executable (text relocation).
false
Allow making the stack executable via mprotect. Also requires allow_execmem.
false
Allow gpg executable stack
false
Allow system to run with kerberos
false
allow host key based authentication
false
Allow users to connect to mysql
false
Allow system to run with NIS
false
Allow system cron jobs to relabel filesystem for restoring file contexts.
false
Enable extra rules in the cron domain to support fcron.
false
Allow BIND to write the master zone files. Generally this is used for dynamic DNS.
false
Allow reading of default_t files.
false
Allow applications to read untrusted content If this is disallowed, Internet content has to be manually relabeled for read access to be granted
false
Allow ssh to run from inetd instead of as a daemon.
false
Allow squid to connect to all ports, not just HTTP, FTP, and Gopher ports.
false
Allow ssh logins as sysadm_r:sysadm_t
false
Allow staff_r users to search the sysadm home dir and read files (such as ~/.bashrc)
false
Support NFS home directories
false
Support SAMBA home directories
false
Allow regular users direct mouse access
false
Allow users to read system messages.
false
Allow users to control network interfaces (also needs USERCTL=true)
false
Control users use of ping and traceroute
false
Allow user to r/w noextattrfile (FAT, CDROM, FLOPPY)
false
Allow users to rw usb devices
false
Allow users to run TCP servers (bind to ports and accept connection from the same domain and outside users) disabling this forces FTP passive mode and may change other protocols.
false
Allow w to display everyone
false
Allow applications to write untrusted content If this is disallowed, no Internet content will be stored.