Selinux: NSAs Open Source Security Enhanced Linux

     
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

packages, installing

packet_perms macro

packet_socket (object security class) 2nd

pam program

parent and child processes 2nd

parsing log messages

passwd (object security class) 2nd

passwd command 2nd 3rd

passwords

        setting for users

patch cycles and 0-day vulnerabilities

PaX project

permissions

        adding

        associated with classes

        associated with file-like objects

        extending to processes in domain

        restricting, with constraint declarations

        special notations for

permissive mode

        booting system into

        curtailing unnecessary logging

        dynamically setting operating mode

        setting, before using Audit2allow

persistent labels

        filesystems not supporting

        filesystems supporting

persistent objects

persistent security identifiers (PSIDs), storing on filesystems

pidfile type attribute

ping command, controlling access to

ping.fc file, examining sample policy

ping.te file

        basic policy elements

        conditional statement declaration in

        domain_auto_trans macro, invoked in

        examining sample policy

        role type declarations in

pipefs (pseudofilesystem with pipe)

policy Booleans

        initializing in ping.te file

        setting via SELinux filesystem

        tuning SELinux via

Policy Components tab (Apol window) 2nd

policy constraint declarations

policy database of SELinux security server

policy elements

        and associated files

        list of 2nd

        subelements appearing in

policy files 2nd [See also SELinux policy]

        browsing/editing with SePCuT

        checkpolicy command 2nd

        choosing to delete

        compiling

        compiling from source

        creating/loading

policy Makefile target 2nd

policy management tools

Policy Modules tab (Sepcut window)

Policy Rules tab (Apol window) 2nd

policy source directory files

policy source tree 2nd

policy structure of SELinux

policy.<Emphasis>??<Default Para Font> file 2nd

policy.conf file 2nd

        analyzing, with Apol tool

        checkpolicy command and

policy.conf tab (Apol window)

policy.spec file

policy_config_t type

policy_src_t type

poly_t type

pop_port_t type

port_t type

port_type type attribute

portcon declarations

ppp_device_t type

principle of least privilege

        authorizing Nmap access and

        Fedora Core SELinux implementation and

        mandatory access control

        network declarations and

print_spool_t type

priv_system_role type attribute

privfd type attribute

privhome type attribute

privileges, escalating

privlog type attribute 2nd

privmail type attribute

privmem type attribute

privmodule type attribute

privowner type attribute

privrole type attribute

privuser type attribute

/proc, types related to

proc_kcore_t type

proc_kmsg_t type

proc_t type

process (object security class) 2nd

processes

        child/parent 2nd

        choosing security contexts

        creating

        and programs, distinctions between

        RBAC (role-based access control)

        reporting security context of

        security context of

procfs.te file

program execution problems, troubleshooting

program subdirectory

        domains directory 2nd

        file_contexts directory 2nd

        macros directory 2nd

Propolice project

protecting memory from 0-day attacks

ps command 2nd 3rd

pseudofilesystems, mounting 2nd

pseudoterminal filesystem (devpts)

PSIDs (persistent security identifiers), storing on filesystems

ptrace facility

        exploited during Apache OpenSSL attack 2nd 3rd

pty_slave_label macro

ptyfile type attribute 2nd

 

Категории