Line 25: | Line 25: | ||
* [[SELinux|SELinux]] | * [[SELinux|SELinux]] | ||
* [[SELinux/Understanding|Understanding SELinux]] | * [[SELinux/Understanding|Understanding SELinux]] | ||
** [http://www.redhat.com/v/swf/SELinux/ Try this excellent Flash presentation by Red Hat SELinux developer, Dan Walsh] | |||
* [[SELinux/MCS|Multi Category Security/MCS]] | * [[SELinux/MCS|Multi Category Security/MCS]] | ||
* [[SELinux/MLS|Multi Level Security/MLS]] | * [[SELinux/MLS|Multi Level Security/MLS]] | ||
Line 49: | Line 50: | ||
* http://docs.fedoraproject.org/selinux-faq | * http://docs.fedoraproject.org/selinux-faq | ||
* http://selinuxnews.org/ | * http://selinuxnews.org/ | ||
* http://www.tresys.com/education.php | |||
NSA References - | NSA References - | ||
Line 54: | Line 56: | ||
* [http://www.nsa.gov/selinux/ NSA SELinux main website] | * [http://www.nsa.gov/selinux/ NSA SELinux main website] | ||
* [http://www.nsa.gov/selinux/info/faq.cfm NSA SELinux FAQ] | * [http://www.nsa.gov/selinux/info/faq.cfm NSA SELinux FAQ] | ||
* [http://www.nsa.gov/research/selinux/ NSA SELinux Research] | |||
Recommended Textbook - | Recommended Textbook - |
Revision as of 05:55, 27 December 2010
SELinux Guide
Documentation Summary:
Purpose: How to accomplish specific tasks with SELinux in the desktop environment. This requires a major expansion of the content beyond the SELinux FAQ which will be amalgamated into this guide in use case scenarios.
A user who finishes reading this guide should be able to:
- Understand how the Linux kernel, policy, and user tools work together to implement SELinux in Fedora
- Understand the differences and interactions between legacy UNIX access controls and SELinux
- Determine, set, and understand the operational mode of SELinux in a Fedora system
- Determine, set, and understand object and file labels
- Understand how to perform an automatic relabeling of a file system
Audience: Individuals who are unfamiliar with SELinux and who need to learn how to function in an environment with SELinux enabled.
Approach: This document explains basic principles by explaining one principle at a time. The document assumes some familiarity with Linux/UNIX-specific terminology or concepts. Functionality is also compared, where appropriate, to what the reader may know from other OSes, particularly Microsoft Windows.
Assumptions: The reader has a standard Desktop class installation of Fedora with, including a user account with the default settings. The reader does have access to the root password. (We changed this "non-root access" assumption so that we can include more coverage of regular software updates and the installation of alternate packages and desktops.)
Related Documents:
- SELinux
- Understanding SELinux
- Multi Category Security/MCS
- Multi Level Security/MLS
- Loadable Modules
- Policies -
- Discussion of Policies
- Policy Generation Tools
- SELinux Policy Grammar language
- Writing SE Linux policy HOWTO
- Troubleshooting -
- FAQs -
- SELinux FAQs
- Fedora 13 - Security-Enhanced Linux User Guide
- Fedora 13 - SELinux FAQ
- Fedora 13 - Managing Confined Services Guide
Additional Web Site References -
- http://danwalsh.livejournal.com/
- http://james-morris.livejournal.com/
- http://docs.fedoraproject.org/selinux-faq
- http://selinuxnews.org/
- http://www.tresys.com/education.php
NSA References -
Recommended Textbook -
- SELinux By Example: Using Security Enhanced Linux by Frank Mayer, Karl MacMillan, David Caplan - Prentice Hall, 2007
Possibly Dated Content References -
Lead Writer:
Writers: MarcWiriadisastra