Book description
The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include:
A readable and concrete explanation of SELinux concepts and the SELinux security model
Installation instructions for numerous distributions
Basic system and user administration
A detailed dissection of the SELinux policy language
Examples and guidelines for altering and adding policies
With SELinux, a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
Table of contents
-
SELinux
- Preface
- 1. Introducing SELinux
- 2. Overview of the SELinux Security Model
- 3. Installing and Initially Configuring SELinux
-
4. Using and Administering SELinux
- System Modes and SELinux Tuning
- Controlling SELinux
- Routine SELinux System Use and Administration
- Monitoring SELinux
- Troubleshooting SELinux
- 5. SELinux Policy and Policy Language Overview
- 6. Role-Based Access Control
- 7. Type Enforcement
- 8. Ancillary Policy Statements
-
9. Customizing SELinux Policies
- The SELinux Policy Source Tree
- On the Topics of Difficulty and Discretion
- Using the SELinux Makefile
- Creating an SELinux User
- Customizing Roles
- Adding Permissions
- Allowing a User Access to an Existing Domain
-
Creating a New Domain
- Determine What Files Are Related to the Domain
- Determine the Security Contexts of the Files
- Decide on Appropriate Security Contexts for the New Domain
- Create a Basic TE File
- Create a Basic FC File
- Delete Conflicting Specifications from Other FC Files
- Load the Revised Policy and Label the Domains
- Test and Revise the TE and FC Files as Needed
- Using Audit2allow
- Policy Management Tools
- The Road Ahead
- A. Security Object Classes
- B. SELinux Operations
- C. SELinux Macros Defined in src/policy/macros
- D. SELinux General Types
- E. SELinux Type Attributes
- Index
- Colophon
Product information
- Title: SELinux
- Author(s):
- Release date: October 2004
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596007164
You might also like
book
SELinux Cookbook
Over 70 hands-on recipes to develop fully functional policies to confine your applications and users using …
book
SELinux by Example: Using Security Enhanced Linux
SELinux: Bring World-Class Security to Any Linux Environment! SELinux offers Linux/UNIX integrators, administrators, and developers a …
book
SELinux System Administration - Second Edition
Ward off traditional security permissions and effectively secure your Linux systems with SELinux Key Features Leverage …
book
SELinux System Administration - Third Edition
Enhance Linux security, application platforms, and virtualization solutions with SELinux 3 to work within your boundaries, …