• Table of Contents
• Index
• Reviews
• Reader Reviews
• Errata
• Academic
SELinux
By Bill McCarty
Publisher: OReilly
Pub Date: October 2004
ISBN: 0-596-00716-7
Pages: 254
Copyright
Preface
Organization of This Book
Conventions Used in This Book
Using Code Examples
How to Contact Us
Acknowledgments
Chapter 1. Introducing SELinux
Section 1.1. Software Threats and the Internet
Section 1.2. SELinux Features
Section 1.3. Applications of SELinux
Section 1.4. SELinux History
Section 1.5. Web and FTP Sites
Chapter 2. Overview of the SELinux Security Model
Section 2.1. Subjects and Objects
Section 2.2. Security Contexts
Section 2.3. Transient and Persistent Objects
Section 2.4. Access Decisions
Section 2.5. Transition Decisions
Section 2.6. SELinux Architecture
Chapter 3. Installing and Initially Configuring SELinux
Section 3.1. SELinux Versions
Section 3.2. Installing SELinux
Section 3.3. Linux Distributions Supporting SELinux
Section 3.4. Installation Overview
Section 3.5. Installing SELinux from Binary or Source Packages
Section 3.6. Installing from Source
Chapter 4. Using and Administering SELinux
Section 4.1. System Modes and SELinux Tuning
Section 4.2. Controlling SELinux
Section 4.3. Routine SELinux System Use and Administration
Section 4.4. Monitoring SELinux
Section 4.5. Troubleshooting SELinux
Chapter 5. SELinux Policy and Policy Language Overview
Section 5.1. The SELinux Policy
Section 5.2. Two Forms of an SELinux Policy
Section 5.3. Anatomy of a Simple SELinux Policy Domain
Section 5.4. SELinux Policy Structure
Chapter 6. Role-Based Access Control
Section 6.1. The SELinux Role-Based Access Control Model
Section 6.2. Railroad Diagrams
Section 6.3. SELinux Policy Syntax
Section 6.4. User Declarations
Section 6.5. Role-Based Access Control Declarations
Chapter 7. Type Enforcement
Section 7.1. The SELinux Type-Enforcement Model
Section 7.2. Review of SELinux Policy Syntax
Section 7.3. Type-Enforcement Declarations
Section 7.4. Examining a Sample Policy
Chapter 8. Ancillary Policy Statements
Section 8.1. Constraint Declarations
Section 8.2. Other Context-Related Declarations
Section 8.3. Flask-Related Declarations
Chapter 9. Customizing SELinux Policies
Section 9.1. The SELinux Policy Source Tree
Section 9.2. On the Topics of Difficulty and Discretion
Section 9.3. Using the SELinux Makefile
Section 9.4. Creating an SELinux User
Section 9.5. Customizing Roles
Section 9.6. Adding Permissions
Section 9.7. Allowing a User Access to an Existing Domain
Section 9.8. Creating a New Domain
Section 9.9. Using Audit2allow
Section 9.10. Policy Management Tools
Section 9.11. The Road Ahead
Appendix A. Security Object Classes
Appendix B. SELinux Operations
Appendix C. SELinux Macros Defined in src/policy/macros
Appendix D. SELinux General Types
Appendix E. SELinux Type Attributes
Colophon
Index