mac_ifoff(4)
NAME
mac_ifoff - interface silencing policy
SYNOPSIS
To compile the interface silencing policy into your kernel, place the following lines in your kernel configuration file: options MAC options MAC_IFOFF Alternately, to load the interface silencing policy module at boot time, place the following line in your kernel configuration file: options MAC and in loader.conf(5): mac_ifoff_load="YES"
DESCRIPTION
- The mac_ifoff interface silencing module allows administra
- tors to enable and disable incoming and outgoing data flow on system net
- work interfaces via the sysctl(8) interface.
- To disable network traffic over the loopback (lo(4)) inter
- face, set the sysctl(8) OID security.mac.ifoff.lo_enabled to 0 (default
- 1).
- To enable network traffic over other interfaces, set the
- sysctl(8) OID security.mac.ifoff.other_enabled to 1 (default 0).
- To allow BPF traffic to be received, even while other traf
- fic is disabled, set the sysctl(8) OID
- security.mac.ifoff.bpfrecv_enabled to 1 (default 0).
- Label Format
- No labels are defined.
SEE ALSO
- mac(4), mac_bsdextended(4), mac_lomac(4), mac_mls(4),
- mac_none(4), mac_partition(4), mac_portacl(4), mac_seeotheruids(4),
- mac_test(4), mac(9)
HISTORY
- The mac_ifoff policy module first appeared in FreeBSD 5.0
- and was developed by the TrustedBSD Project.
AUTHORS
- This software was contributed to the FreeBSD Project by Net
- work Associates Labs, the Security Research Division of Network Associ
- ates Inc. under DARPA/SPAWAR contract N66001-01-C-8035 (``CBOSS''), as
- part of the DARPA CHATS research program.
BUGS
- See mac(9) concerning appropriateness for production use.
- The TrustedBSD MAC Framework is considered experimental in FreeBSD.
- While the MAC Framework design is intended to support the
- containment of the root user, not all attack channels are currently pro
- tected by entry point checks. As such, MAC Framework policies should not be
- relied on, in isolation, to protect against a malicious privileged us
- er.
- BSD December 10, 2002