Getting Started with SELinux--Linux Security Books

|

1. Preface
Introduction 1.1. Feedback 1.2. Disclaimer 1.3. New features of the new SE Linux 1.4. Policy source directory for Fedora users

2. Overview 2.1. Why SE Linux? 2.2. Terminology used 2.2.1 identity 2.2.2 domain 2.2.3 type 2.2.4 role 2.2.5 security context 2.2.6 transition 2.2.7 policy

3. Installation 3.1. Installing base packages for Debian 3.1.1 Modified Debian package management tools 3.2. Using SELinux with Fedora Core 3 or later 3.3. Intalling base packages for Fedora 3.4. Installing SE Linux related packages 3.4.1 Installing the LSM kernel image 3.4.2 Installing the selinux-policy-default package 3.4.3 Editing your /etc/fstab file and creating the /selinux mount point 3.4.4 Running make relabel 3.4.5 Editing /etc/pam.d/login and /etc/pam.d/ssh 3.4.6 Adding users

4. Logging in 4.1. Supplying a user context at login 4.2. Changing context with the newrole -r command 4.3. Running commands in the sysadm_t domain 4.4. Permissive and Enforcing mode 4.5. Comparison of running commands in different roles

5. Creating user accounts 5.1. Creating a new user 5.2. Assigning roles to users and applying the changes 5.3. Setting the default security context for users 5.4. Relabelling the user's home directory

6. Adding a new user domain 6.1. Editing the user domains file 6.2. Creating a new test user (again)

7. Explanation of log file messages

8. Resources

0 comment:

Post a Comment

 

©2009 computer technology World | Template Blue by TNB