|
NOTE: CentOS Enterprise Linux is built from the Red Hat Enterprise Linux source code. Other than logo and name changes CentOS Enterprise Linux is compatible with the equivalent Red Hat version. This document applies equally to both Red Hat and CentOS Enterprise Linux.
Index
- access vector rule
-
- syntax, TE Rules - Access
Vectors
- access vectors, TE Rules
- Access Vectors
- activating your subscription, Activate Your Subscription
- analysis
-
- see tools
- see policy analysis
- dumping or viewing the logs, Dump and View
Logs
- dumping or viewing the policy, Dump or View
Policy
- logs, Controlling and
Maintaining SELinux
- analyzing
-
- kernel audit message, Enable Kernel
Auditing
- macros, How To
Backtrack a Rule
- apol
-
- how to use, Using apol
for Policy Analysis
- architecture
-
- SELinux, SELinux Architectural
Overview
- archiving files and directories, Make Backups
or Archives That Retain Security Contexts
- assuming a new role or type
-
- how to, Assume a New
Role
- attribute declaration
-
- syntax, TE Rules -
Attributes
- attributes, TE Rules -
Attributes
- auditing
-
- how to enable kernel auditing, Enable Kernel
Auditing
- AV
-
- see access vectors
- AVC statistics
-
- how to view, Viewing AVC
Statistics
- avc: denied
-
- explained, Understanding
an avc: denied Message
- troubleshooting, Troubleshoot
User Problems With SELinux
- CGI scripts
-
- how to run from a mounted directory, Specifying the
Security Context of Entire File Systems
- changing a Boolean
-
- how to, Change a
Boolean Setting
- changing the policy
-
- how to, Change the
Policy
- checking status
-
- how to, View the
Status of SELinux
- checkpolicy
-
- how to use, What Happens
During Policy Build
- command line tools
-
- avcstat, Viewing AVC
Statistics, Information
Gathering Tools
- checkpolicy, What Happens
During Policy Build
- enabling or disabling enforcement, Enable or
Disable Enforcement
- newrole, Assume a New
Role
- runcon, Run a Command
in a Specified Security Context
- seinfo, Information
Gathering Tools
- sesearch, Information
Gathering Tools
- sestatus, View the
Status of SELinux
- setting Booleans, Change a
Boolean Setting
- useful for shell scripts, Useful
Commands for Scripts
- commands with SELinux options
-
- cp, Move or Copy
Files
- id, Check the
Security Context of a Process, User, or File Object
- ls, Check the
Security Context of a Process, User, or File Object
- mount, Specifying the
Security Context of Entire File Systems
- mv, Move or Copy
Files
- ps, Check the
Security Context of a Process, User, or File Object
- compiling
-
- SELinux, Compiling
SELinux Policy
- compiling policy
-
- how to, Policy Compile
Procedure
- constraints, TE Rules -
Constraints
- controlling SELinux, Controlling and Maintaining
SELinux
-
- administrators, Administrator Control of
SELinux
- analysts, Enable Kernel
Auditing
- end users, End User
Control of SELinux
- conventions
-
- document, Document
Conventions
- cp command
-
- using with SELinux, Move or Copy
Files
- customizing policy
-
- how to, Customizing and
Writing Policy
- DAC
-
- definition, Brief
Background and History of SELinux
- definition of
-
- DAC, Brief Background
and History of SELinux
- MAC, Brief Background
and History of SELinux
- object classes, Object
Classes and Permissions
- permissions, Object
Classes and Permissions
- targeted policy, What is the
Targeted Policy?
- direct information flow
-
- see information flow
- directories
-
- policy files and directories, Files and Directories of the Targeted
Policy
- directories for SELinux
-
- what are, Conventions for
SELinux Directories and Files
- where are, Where is the
Policy?
- directory access
-
- how to, Grant Access
to a Directory or a Tree
- directory presentation, Conventions for SELinux Directories and
Files
- disable
-
- enforcement, Enable or
Disable Enforcement
- SELinux, Enable or
Disable Enforcement
- SELinux protection of a daemon, Enable or
Disable Enforcement
- discretionary access control
-
- see DAC
- documentation references
-
- see references
- domain transition analysis, Domain
Transition Analysis
- domains
-
- attributes, TE Rules -
Attributes
- dhcpd, Policy Types -
dhcpd
- domain transition analysis, Domain
Transition Analysis
- dumping logs
-
- how to, Dump and View
Logs
- dumping policy
-
- how to, Dump or View
Policy
- enable
-
- enforcement, Enable or
Disable Enforcement
- kernel auditing, Enable Kernel
Auditing
- SELinux, Enable or
Disable Enforcement
- SELinux protection of a daemon, Enable or
Disable Enforcement
- end users
-
- controlling and maintaining SELinux, End User
Control of SELinux
- troubleshooting user problems, Troubleshoot
User Problems With SELinux
- example
-
- file contexts files, Understanding the File Contexts
Files
- network declaration, Files and Directories of the Targeted
Policy
- role allow, SELinux
Roles
- role declaration, SELinux
Roles
- history
-
- SELinux, Brief
Background and History of SELinux
- how to
-
- administrator tasks, Administrator Control of
SELinux
- analyze a macro, How To
Backtrack a Rule
- archive files and directories, Make Backups
or Archives That Retain Security Contexts
- assume a new role or type, Assume a New
Role
- backtrack a rule, How To
Backtrack a Rule
- backup files, Make Backups
or Archives That Retain Security Contexts
- change a Boolean setting, Change a
Boolean Setting
- change the policy, Change the
Policy
- compile policy, Policy Compile
Procedure
- dump or view logs, Dump and View
Logs
- dump or view policy, Dump or View
Policy
- enable kernel auditing, Enable Kernel
Auditing
- enable or disable enforcement, Enable or
Disable Enforcement
- enable or disable SELinux protection of a daemon, Enable or
Disable Enforcement
- end user tasks, End User
Control of SELinux
- grant access to a directory, Grant Access
to a Directory or a Tree
- install a policy package, Load a
Policy
- know when to compile, Policy Compile
Procedure
- know when to reboot, When to
Reboot
- load a binary policy, Load a
Policy
- manage NFS home directories, Managing NFS Home
Directories
- performance tune, Performance Tuning
- relabel a file or directory, Relabel a File
or Directory's Security Context
- relabel a file system, Relabel a File
System
- run a CGI script, Specifying the
Security Context of Entire File Systems
- run a command in a specified context, Run a Command
in a Specified Security Context
- run a different policy, Change the
Policy
- serve Web content from a mounted directory, Specifying the
Security Context of Entire File Systems
- set context for a file system, Specifying the
Security Context of Entire File Systems
- troubleshoot SELinux, Troubleshoot
User Problems With SELinux
- use apol, Using apol for
Policy Analysis
- use checkpolicy, What
Happens During Policy Build
- use seaudit, Using
seaudit for Audit Log Analysis
- validate a policy, What
Happens During Policy Build
- view AVC statistics, Viewing AVC
Statistics
- view SELinux status, View the
Status of SELinux
- write new policy for a daemon, Writing New Policy for a Daemon
- labeling, File System
Security Contexts
-
- mountpoint labeling, File
System Security Contexts
- setting label option on mount, File System Security
Contexts
- single label for entire file system, File System Security
Contexts
- links
-
- see references
- Linux Security Modules
-
- see LSM
- loading a binary policy
-
- how to, Load a
Policy
- log
-
- analysis, Controlling and
Maintaining SELinux
- ls command
-
- using with SELinux, Check the
Security Context of a Process, User, or File Object
- LSM
-
- and SELinux, SELinux, an
Implementation of Flask, Brief Background and History of
SELinux
- m4
-
- see macros
- MAC
-
- definition, Brief
Background and History of SELinux
- macro
-
- analysis, How To
Backtrack a Rule
- macro usage
-
- example, Policy
Macros
- macros, Policy
Macros
-
- common, Common Macros in
the Targeted Policy
- maintaining SELinux, Controlling and Maintaining
SELinux
-
- administrators, Administrator Control of
SELinux
- end users, End User
Control of SELinux
- making a directory accessible
-
- how to, Grant Access
to a Directory or a Tree
- mandatory access control
-
- see MAC
- MLS
-
- MAC, SELinux Architectural
Overview
- mount options
-
- genfs labeling, File
System Security Contexts
- mounting file systems
-
- and security labeling, File System Security
Contexts
- mountpoint labeling, File
System Security Contexts
- multi-level security
-
- see MLS
- mv command
-
- using with SELinux, Move or Copy
Files
- performance tuning, Tools
for Manipulating and Analyzing SELinux
-
- how to, Performance
Tuning
- permissions
-
- common sets, Object
Classes and Permissions
- definition, Object
Classes and Permissions
- policy
-
- boot, Policy Role in
Boot
- files and directories, Where is the Policy?
- how it works, SELinux
Policy Overview
- internal functions, SELinux Policy Overview
- overview, SELinux Policy
Overview
-
- targeted, Targeted Policy
Overview
- required packages, SELinux Policy Overview
- system start-up
-
- see boot
- writing policy, Writing New
Policy for a Daemon
- policy analysis
-
- direct information flow, Direct and
Transitive Information Flow
- domain transition analysis, Domain
Transition Analysis
- policy components, Policy
Component Analysis
- TE rule analysis, TE Rule
Analysis
- TE rules, Policy
Component Analysis
- tools
-
- apol, Using apol for
Policy Analysis
- seaudit, Using seaudit
for Audit Log Analysis
- policy and
-
- roles, SELinux Users and
Roles
- users, SELinux Users and
Roles
- policy build
-
- what is, What Happens
During Policy Build
- prerequisite knowledge, Prerequisites for This Guide
- ps command
-
- using with SELinux, Check the
Security Context of a Process, User, or File Object
- rebooting
-
- how to know when to reboot, When to
Reboot
- references, References
-
- Flask, References
- NSA, References
- SELinux, References
- registering your subscription, Activate Your Subscription
- relabeling
-
- entire file systems, Relabel a File
System
- files or directories, Relabel a File
or Directory's Security Context
- roles, SELinux Users and
Roles
-
- assuming a new role, Assume a New
Role
- targeted policy members, Understanding the Roles and Users in
the Targeted Policy
- roles and user
-
- targeted policy, Understanding the Roles and Users in
the Targeted Policy
- rule analysis
-
- see TE rule analysis
- running a command in a specific context
-
- how to, Run a Command
in a Specified Security Context
- running a different policy
-
- how to, Change the
Policy
- seaudit
-
- how to use, Using seaudit
for Audit Log Analysis
- security contexts
-
- and the kernel, Security
Contexts and the Kernel
- file systems, File System
Security Contexts
- security types
-
- dhcpd, Policy Types -
dhcpd
- security.selinux, File
System Security Contexts
- SELinux
-
- see explained
- and Flask, SELinux, an
Implementation of Flask
- and LSM, SELinux, an
Implementation of Flask
- architecture, SELinux
Architectural Overview
- compiling, Compiling
SELinux Policy
- control methods, Controlling and Maintaining
SELinux
- documentation references
- see references
- history of, Brief
Background and History of SELinux
- maintenance, Controlling
and Maintaining SELinux
- tools, Tools for
Manipulating and Analyzing SELinux
- what is, What Is
SELinux?
- SELinux files and directories, Files and Directories of the Targeted
Policy
-
- what are, Conventions for
SELinux Directories and Files
- SELinux status
-
- how to, View the
Status of SELinux
- selinuxfs file system, Special Interfaces and File
Systems
- setting the context for a file system
-
- how to, Specifying the
Security Context of Entire File Systems
- shell scripts
-
- enabling or disabling SELinux, Enable or
Disable Enforcement
- useful commands, Useful
Commands for Scripts
- start-up
-
- see boot
- start-up procedure
-
- see boot
- subscription registration, Activate Your Subscription
- summary
-
- policy, SELinux Policy
Overview
- syntax
-
- access vector rule, TE
Rules - Access Vectors
- attribute declaration, TE
Rules - Attributes
- avc: denied message, Understanding
an avc: denied Message
- constraint, TE Rules -
Constraints
- file context description, Understanding the File Contexts
Files
- network declaration, Files and Directories of the Targeted
Policy
- neverallow rule, TE Rules
- Access Vectors
- object class access vector definitions, Object Classes and
Permissions
- object class sets, Object
Classes and Permissions
- role allow, SELinux
Roles
- role declaration, SELinux
Roles
- type declaration, TE
Rules - Types
- type transition, TE Rules
- Types
- system administrators
-
- controlling and maintaining SELinux, Administrator Control of
SELinux
- targeted policy
-
- common macros, Common
Macros in the Targeted Policy
- defined, What is the
Targeted Policy?
- roles and users, Understanding the Roles and Users in
the Targeted Policy
- TE rule analysis, TE Rule
Analysis
- tools
-
- for users, Controlling
and Maintaining SELinux
- SELinux, Tools for
Manipulating and Analyzing SELinux
- transition analysis
-
- see domain transition analysis
- transitive information flow
-
- see information flow
- troubleshooting SELinux
-
- how to, Troubleshoot
User Problems With SELinux
- tunables
-
- AVC cache threshold, Performance Tuning
- type declarations, TE
Rules - Types
-
- syntax, TE Rules -
Types
- Type Enforcement
-
- access vectors, TE Rules
- Access Vectors
- type transition
-
- syntax, TE Rules -
Types
- types
-
- assuming a new type, Assume a New
Role
- attributes, TE Rules -
Attributes
- Web content
-
- how to serve from a mounted directory, Specifying the
Security Context of Entire File Systems
- what are
-
- access vectors, TE Rules
- Access Vectors
- administrator tasks, Administrator Control of
SELinux
- attributes, TE Rules -
Attributes
- directories for SELinux, Conventions for SELinux Directories and
Files
- end user tasks, End User
Control of SELinux
- file labels, File System
Security Contexts
- files and directories used by SELinux, Files and Directories of the Targeted
Policy
- macros, Policy
Macros
- object classes, Object
Classes and Permissions
- roles, SELinux Users and
Roles
- security contexts, File
System Security Contexts
- security labels, File
System Security Contexts
- types, TE Rules -
Types
- users, SELinux Users and
Roles
- what happens
-
- during policy build, What
Happens During Policy Build
- what is
-
- $SELINUX_POLICY/, Conventions
for SELinux Directories and Files
- $SELINUX_SRC/, Conventions for
SELinux Directories and Files
- avc: denied, Understanding
an avc: denied Message
- labeling, File System
Security Contexts
- mountpoint labeling, File
System Security Contexts
- policy, SELinux Policy
Overview
- policy build, What
Happens During Policy Build
- policy role in boot, Policy Role in Boot
- SELinux, What Is
SELinux?
- selinuxfs file system, Special Interfaces and File
Systems
- targeted policy, What is the
Targeted Policy?
- the architecture of SELinux, Flask Security
Architecture and SELinux
- what you should know, Prerequisites for This Guide
- when to
-
- compile, Policy Compile
Procedure
- reboot, When to
Reboot
- where are
-
- files and directories for SELinux, Where is the Policy?
- writing policy
-
- how to, Customizing and
Writing Policy
|
|