SELinux by Example: Using Security Enhanced Linux

In this chapter

  • 10.1 Introduction to Object Labeling

  • 10.2 File-Related Object Labeling

  • 10.3 Network and Socket Object Labeling

  • 10.4 System V IPC

  • 10.5 Miscellaneous Object Labeling

  • 10.6 Initial Security Identifiers

  • 10.7 Exploring Object Labeling with Apol

  • 10.8 Summary

  • Exercises

page 206

page 208

page 221

page 228

page 228

page 230

page 233

page 235

page 236

For the SELinux policy to work, all object instances must be labeled with a security context. In this chapter, we discuss the various means of applying security contexts to object instances, including how security contexts are assigned when objects are created and the later modification of those labels (called relabeling).

Категории