SELinux by Example: Using Security Enhanced Linux

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

rawip_socket object class,

rawip_socket permissions,

RBAC (role-based access control) 2nd

     basics

     privilege management

read permission, 2nd

recv_mesg permission,

recvfrom permission,

Red Hat Enterprise Linux 4 (RHEL4)

     example policy support

     target policy

Red Hat Fedora Core 5, reference policy,

Red Hat, Fedora Core Web site,

reference monitors, operating system access control,

reference policies

     adding additional access

     allowing initial restrictive access

    build options

         build.conf file

         modules.conf file

     creating labeling policy

     declaring types

    design principles

         layering

         modularity

     domain transitions

    file structure

         build and support files

         core policy files

     goals

     initial policy module

     module example

     obtaining

         Red Hat Fedora Core 5

         Tresys Technology open source project site

     system policy integration with initial policy

reference validation mechanisms,

Reinhold, Van Nostran, Building a Secure Computer System,

relabelfrom permission, 2nd

relabelto permission, 2nd

rename permission, 2nd

require statements,

resources

     Hardened Gentoo

     NSA (National Security Agency)

     open source projects

     Red Hat Fedora Core site

     related security information

     SELinux IRC channel

     SELinux mailing list

     SELinux symposium

     Tresys Technology

restorecon tool,

restrictions, MLS (multilevel security),

restrictive access, initial policy module,

     example policy

     reference policy

revocation, access,

RHEL4 (Red Hat Enterprise Linux 4)

     example policy support

     target policy

rlimitnh permission,

role allow rules, 2nd

role declaration statement, 2nd

role dominance statement,

role transition rules,

role-based access control (RBAC), 2nd

     basics

     privilege management

roles

    users

         apol

         identifiers

         RBAC (role-based access control)

         role allow rule

         role declaration statement

         role dominance statement

         transition rules

     versus user domain types

rule lists, conditional statement,

rules, TE (type enforcement)

     access vector rules

     aliases

     apol

     associating types and attributes

     attributes

     basics

     declaring types

     type rules

Rules.modular files, reference policy,

run_init tool,

runcon tool,

runtime conditionals,

Категории