During the development stage, a few users reported problems with normal configuration. Some of these problems are listed below:
multilabel option cannot be enabled on 	/The multilabel flag does not stay 	enabled on my root
(/) partition!
It seems that one out of every fifty users has this problem, indeed, we had this problem during our initial configuration. Further observation of this so called “bug” has lead me to believe that it is a result of either incorrect documentation or misinterpretation of the documentation. Regardless of why it happened, the following steps may be taken to resolve it:
Edit /etc/fstab and set the root 	 partition at ro for read-only.
Reboot into single user mode.
Run tunefs -l enable 	 on /.
Reboot the system into normal mode.
Run mount -urw 	 / and change the ro 	 back to rw in /etc/fstab 	 and reboot the
system again.
Double-check the output from the 	 mount to ensure that
	 multilabel has been properly set on the 	 root file
system.
After establishing a secure environment with MAC, I am no longer able to start X!
This could be caused by the MAC partition policy or by a mislabeling in one of the MAC labeling policies. To debug, try the following:
Check the error message; if the user is in the insecure class, the partition policy may be the culprit. Try setting the user's class back to the default class and rebuild the database with the cap_mkdb command. If this does not alleviate the problem, go to step two.
Double-check the label policies. Ensure that the policies are set correctly for the user in question, the X11 application, and the /dev entries.
If neither of these resolve the problem, send the error message and a description of your environment to the TrustedBSD discussion lists located at the TrustedBSD website or to the FreeBSD general questions mailing list mailing list.
When I attempt to switch from the root user to another user in the system, the error message “_secure_path: unable to state .login_conf” appears.
This message is usually shown when the user has a higher 	label setting then that
of the user whom they are attempting to 	become. For instance a user on the system,
	joe, has a	default label of 	biba/low. The root user, 	who has a
label of biba/high, cannot view 	joe's home directory. This will happen 	regardless if root has used the 	su command to
become joe, 	or not. In this scenario, the Biba integrity
model will not 	permit root to view objects set at a lower
	integrity level.
In normal or even single user mode, the root is not recognized. The whoami command returns 0 (zero) and su returns “who are you?”. What could be going on?
This can happen if a labeling policy has been disabled, 	either by a sysctl(8) or the
policy module was unloaded. 	If the policy is being disabled or has been temporarily
	disabled, then the login capabilities database needs to be 	reconfigured with
the label option being 	removed. Double check the login.conf 	file to ensure that all label options have 	been removed and rebuild the database with
the 	cap_mkdb command.
This may also happen if a policy restricts access to the master.passwd file or database. Usually caused by an administrator altering the file under a label which conflicts with the general policy being used by the system. In these cases, the user information would be read by the system and access would be blocked as the file has inherited the new label. Disable the policy via a sysctl(8) and everything should return to normal.