Table of Contents
Introduction to the Red Hat SELinux Guide .................................................................................... i
1. What Is SELinux? .................................................................................................................. i
2. Prerequisites for This Guide ................................................................................................. ii
3. Conventions for SELinux Directories and Files ..................................................................iii
4. Document Conventions........................................................................................................iii
5. Code Presentation Conventions ........................................................................................... vi
6. Activate Your Subscription ................................................................................................. vii
6.1. Provide a Red Hat Login...................................................................................... vii
6.2. Provide Your Subscription Number ....................................................................viii
6.3. Connect Your System..........................................................................................viii
7. More to Come ....................................................................................................................viii
7.1. Send in Your Feedback .......................................................................................viii
I. Understanding SELinux .................................................................................................................. i
1. SELinux Architectural Overview.......................................................................................... 1
1.1. Flask Security Architecture and SELinux.............................................................. 1
1.2. SELinux, an Implementation of Flask ................................................................... 3
2. SELinux Policy Overview..................................................................................................... 5
2.1. What Is Policy? ...................................................................................................... 5
2.2. Where is the Policy? .............................................................................................. 6
2.3. Policy Role in Boot................................................................................................ 7
2.4. File System Security Contexts ............................................................................... 8
2.5. Object Classes and Permissions........................................................................... 10
2.6. TE Rules   Attributes ........................................................................................... 12
2.7. TE Rules   Types.................................................................................................. 17
2.8. TE Rules   Access Vectors................................................................................... 19
2.9. Policy Macros ...................................................................................................... 21
2.10. SELinux Users and Roles .................................................................................. 24
2.11. TE Rules   Constraints ....................................................................................... 26
2.12. Special Interfaces and File Systems................................................................... 27
3. Targeted Policy Overview ................................................................................................... 29
3.1. What is the Targeted Policy?................................................................................ 29
3.2. Files and Directories of the Targeted Policy ........................................................ 30
3.3. Understanding the File Contexts Files ................................................................. 38
3.4. Common Macros in the Targeted Policy.............................................................. 39
3.5. Understanding the Roles and Users in the Targeted Policy ................................. 42
4. Example Policy Reference  
dhcpd
.................................................................................... 47
4.1. Policy File Locations ........................................................................................... 47
4.2. Policy Types  
dhcpd
........................................................................................... 47
4.3. Boolean Values for
dhcpd
................................................................................... 51
II. Working With SELinux............................................................................................................... 53
5. Controlling and Maintaining SELinux ............................................................................... 55
5.1. End User Control of SELinux.............................................................................. 55
5.2. Administrator Control of SELinux ...................................................................... 61
5.3. Analyst Control of SELinux ................................................................................ 70
5.4. Policy Writer Control of SELinux ....................................................................... 71
6. Tools for Manipulating and Analyzing SELinux................................................................ 73
6.1. Information Gathering Tools................................................................................ 73
6.2. Using seaudit for Audit Log Analysis................................................................. 76
6.3. Using apol for Policy Analysis............................................................................ 83
6.4. Performance Tuning............................................................................................. 89
7. Compiling SELinux Policy ................................................................................................. 91
7.1. Policy Compile Procedure ................................................................................... 91
7.2. What Happens During Policy Build .................................................................... 93






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

adult web hosting

 

Our partners: PHP: Hypertext Preprocessor Best Web Hosting Java Web Hosting Inexpensive Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Jsp Hosting Cheap Hosting

Visionwebhosting.net Business web hosting division of Web Design Plus. All rights reserved