Table of Contents
Introduction to the Red Hat SELinux Guide .................................................................................... i
1. What Is SELinux? .................................................................................................................. i
2. Prerequisites for This Guide ................................................................................................. ii
3. Conventions for SELinux Directories and Files ..................................................................iii
4. Document Conventions........................................................................................................iii
5. Code Presentation Conventions ........................................................................................... vi
6. Activate Your Subscription ................................................................................................. vii
6.1. Provide a Red Hat Login...................................................................................... vii
6.2. Provide Your Subscription Number ....................................................................viii
6.3. Connect Your System..........................................................................................viii
7. More to Come ....................................................................................................................viii
7.1. Send in Your Feedback .......................................................................................viii
I. Understanding SELinux .................................................................................................................. i
1. SELinux Architectural Overview.......................................................................................... 1
1.1. Flask Security Architecture and SELinux.............................................................. 1
1.2. SELinux, an Implementation of Flask ................................................................... 3
2. SELinux Policy Overview..................................................................................................... 5
2.1. What Is Policy? ...................................................................................................... 5
2.2. Where is the Policy? .............................................................................................. 6
2.3. Policy Role in Boot................................................................................................ 7
2.4. File System Security Contexts ............................................................................... 8
2.5. Object Classes and Permissions........................................................................... 10
2.6. TE Rules Attributes ........................................................................................... 12
2.7. TE Rules Types.................................................................................................. 17
2.8. TE Rules Access Vectors................................................................................... 19
2.9. Policy Macros ...................................................................................................... 21
2.10. SELinux Users and Roles .................................................................................. 24
2.11. TE Rules Constraints ....................................................................................... 26
2.12. Special Interfaces and File Systems................................................................... 27
3. Targeted Policy Overview ................................................................................................... 29
3.1. What is the Targeted Policy?................................................................................ 29
3.2. Files and Directories of the Targeted Policy ........................................................ 30
3.3. Understanding the File Contexts Files ................................................................. 38
3.4. Common Macros in the Targeted Policy.............................................................. 39
3.5. Understanding the Roles and Users in the Targeted Policy ................................. 42
4. Example Policy Reference
dhcpd
.................................................................................... 47
4.1. Policy File Locations ........................................................................................... 47
4.2. Policy Types
dhcpd
........................................................................................... 47
4.3. Boolean Values for
dhcpd
................................................................................... 51
II. Working With SELinux............................................................................................................... 53
5. Controlling and Maintaining SELinux ............................................................................... 55
5.1. End User Control of SELinux.............................................................................. 55
5.2. Administrator Control of SELinux ...................................................................... 61
5.3. Analyst Control of SELinux ................................................................................ 70
5.4. Policy Writer Control of SELinux ....................................................................... 71
6. Tools for Manipulating and Analyzing SELinux................................................................ 73
6.1. Information Gathering Tools................................................................................ 73
6.2. Using seaudit for Audit Log Analysis................................................................. 76
6.3. Using apol for Policy Analysis............................................................................ 83
6.4. Performance Tuning............................................................................................. 89
7. Compiling SELinux Policy ................................................................................................. 91
7.1. Policy Compile Procedure ................................................................................... 91
7.2. What Happens During Policy Build .................................................................... 93
footer
Our partners:
PHP: Hypertext Preprocessor Best Web Hosting
Java Web Hosting
Inexpensive Web Hosting
Jsp Web Hosting
Cheapest Web Hosting
Jsp Hosting
Cheap Hosting
Visionwebhosting.net Business web hosting division of Web
Design Plus. All rights reserved