Close

SELinux

SELinux Summary

The policy book can be thought of as a really big text book, which contains 3 chapters. Chapter 1 – Contains a list of all available security attributes. There are actually 4 lists, one for each type of the differnt types of suecurity attributes user:role:type:level. In the targeted policy, the […]

Read More

SELinux Log Files

Overview By the end of this article you should be able to answer the following questions: When you are having SELinux access problems one of the first things to investigate are the log files. The auditd service is responsible for writing SELinux logs, so first we need to make sure […]

Read More

SELinux Overview

Overview By the end of this article you should be able to answer the following questions: What is SELinux? SELinux is a system that is primarily used for protecting your machine from potential attacks from the internet. For example there are a lot of programs, e.g. apache that comes with […]

Read More

SELinux Modes

Overview By the end of this article you should be able to answer the following questions: SELinux can be disabled, or running in either “passive” (i.e. permissive) or enforcing (i.e. active) modes. So before you can start understanding/using SELinux, you need to understand these modes when to use them. SELinux […]

Read More

Viewing SELinux Contexts

Overview By the end of this article you should be able to answer the following questions: A lot of commands have an option “-Z” that that is specifically for displaying an object’s security context. Here’s a quick overview of the main ones. Viewing a user’s SELinux context This is done […]

Read More