Configuring Security Subsystems

Presence of the SELinux enhanced security subsystem in the OS as well as the use of mandatory access control systems, such as PARSEC—as opposed to the classical discretionary model used by UNIX—causes problems in the work of Dr.Web for UNIX File Servers when its default settings are used. To ensure correct operation of Dr.Web for UNIX File Servers in this case, it is necessary to make additional changes to the settings of the security subsystem and/or to the settings of Dr.Web for UNIX File Servers.

This section discusses the following settings that ensure correct operation of Dr.Web for UNIX File Servers:

configuring SELinux Security Policies,

configuring the launch in the CSE (Closed Software Environment) mode (OS Astra Linux SE 1.6 and 1.7).

Configuring the permissions of the PARSEC mandatory access control system for Dr.Web for UNIX File Servers will allow the components of Dr.Web for UNIX File Servers to bypass the restrictions of the set security policies and to get access to the files that belong to different privilege levels.

Even if you have not configured the permissions of the PARSEC mandatory access control system for Dr.Web for UNIX File Servers, you still will be able to launch file scanning directly from the command line. To do this, use the drweb-ctl command in the autonomous mode, by specifying the --Autonomous option in the command call. When scanning is launched this way, it is possible to scan only those files that can be accessed with the privileges not exceeding those of the user who launched the scanning.

This mode has several features.

To run an autonomous copy, you need a valid key file, working in the centralized protection mode is not supported (an option to install the key file, exported from centralized protection server, is available). In this case, even if Dr.Web for UNIX File Servers is connected to the centralized protection server, the autonomous copy does not notify the centralized protection server of the threats detected in the autonomous copy mode.

All additional components that support the functioning of the autonomous copy, will be launched under the current user and will work with specially generated configuration file.

All temporary files and UNIX sockets are created only in the directory with an unique name, which is created when the autonomous copy is launched. The unique temporary directory is created in the system directory for temporary files (path to this directory is available in the TMPDIR environment variable).

All the required paths to virus databases, the scan engine and executable files used during scanning are defined by default or retrieved from the special environment variables.

The number of the autonomous copies working simultaneously is not limited.

When the autonomous copy is terminated, the set of supporting components also terminates.