When SELinux is enabled, the Samba server (smbd
) runs confined by default. Confined services run in their own domains, and are separated from other confined services. The following example demonstrates the smbd
process running in its own domain. This example assumes the samba package is installed:
Run getenforce
to confirm SELinux is running in enforcing mode:
$ getenforce
Enforcing
The getenforce
command returns Enforcing
when SELinux is running in enforcing mode.
Run service smbd start
as the root user to start smbd
:
service smb start
Starting SMB services: [ OK ]
Run ps -eZ | grep smb
to view the smbd
processes:
$ ps -eZ | grep smb
unconfined_u:system_r:smbd_t:s0 16420
? 00:00:00 smbd
unconfined_u:system_r:smbd_t:s0 16422
? 00:00:00 smbd
The SELinux context associated with the smbd
processes is unconfined_u:system_r:smbd_t:s0
. The second last part of the context, smbd_t
, is the type. A type defines a domain for processes and a type for files. In this case, the smbd
processes are running in the smbd_t domain.
Files must be labeled correctly to allow smbd
to access and share them. For example, smbd
can read and write to files labeled with the samba_share_t
type, but by default, can not access files labeled with the httpd_sys_content_t
type, which is intended for use by the Apache HTTP Server. Booleans must be turned on to allow certain behavior, such as allowing home directories and NFS file systems to be exported through Samba, as well as to allow Samba to act as a domain controller.