SELinux by Example: Using Security Enhanced Linux

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

emergency policy development tools,

encapsulation, reference policy modularity,

entrypoint (UL) permission,

entrypoint accesses,

entrypoint permission, 2nd

eq (equals) security levels,

eq operator

     constrain statement

     misconstrain statement

     misvalidatetrans statement

     validatetrans statement

equals (eq) security levels,

etc/selinux/config files, system management,

example policies

     adding additional access

     build processes methods

     creating labeling policy

     declaring types

     domain transitions

     initial policy module

     obtaining

         historical policies

         recent patches

         RHEL4 (Red Hat Enterprise Linux 4)

         strict example policy for FC4

     strict example policy

         build options

         policy module

         source file structure

     system policy integration with initial policy

     targeted example policy

examply policy, allowing initial restrictive access,

execheap permission,

execmem permission,

execmod* permission,

execstack permission,

execute permission, 2nd 3rd

execute_no_trans* permission,

expressions, conditional statement,

extended attribute mechanisms, file-related object labeling,

     labeling behavior

     managing security contexts

Категории