Selinux: NSAs Open Source Security Enhanced Linux

     
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

sambafs_t type

sample policy, examining

sandboxes

        protecting memory with

sbin_t type

scanner_device_t type

SCC (Secure Computing Corporation)

scmp_packet_t type

scsi_generic_device_t type

search operation

Seaudit tool 2nd 3rd

SeCmds tool

Secure Computing Corporation (SCC)

secure_levels macro

security (object security class) 2nd

security attributes

        associated with subjects/objects

        naming conventions for

security contexts 2nd

        assigned to filesystems by Genfs declarations

        assigning to new users

        changing permissions, to prevent denial messages

        elements of

        of files, determining

        for new domain

        of hosts , specifying

        of local ports, specifying

        of network interfaces, specifying

        of objects having initial SIDs

        specifying, when starting programs

        starting init scripts in correct

        viewing

        for Snort- related directories/files

security identifiers (SIDs)

        flask /initial_sids file

security model for SELinux, overview of

security object classes 2nd

security policy for SELinux

        associating users with nondefault roles

        enforcing mode vs. permissive mode

        loading

        roles defined by

        rules for dynamically setting operating mode

security.te file

security_classes file in flask subdirectory 2nd

security_t type

SELinux

        applications of

        architecture of

       commands

                for administration/use

                modified Linux commands

                supplementary

        Fedora Core 2 support of

        FTP sites for

        history of

        installing [See installing SELinux]

        kernel-level code

        limiting rate of log entries

        Linux 2.4/2.6 versions of 2nd

        log message format

        LSM (Linux Security Modules) feature and 2nd

        LSM-based version of

        monitoring

        operations

        overview of security model

        policy structure

        roles

                entering a different role

                newrole command

        security policy [See security policy for SELinux]

        source files

        switching modes

        tools in

        troubleshooting

        types related to

        User -Mode Linux (UML) and

        versions of

        web sites for

        using X with

/selinux filesystem

SELinux policy 2nd [See also entries under policy]

        examining sample policy

        FC (file context) files

        source tree

        syntax of

        TE (type enforcement) files

        two forms of

SELinux policy compiler 2nd

selinux-policy-default package

sem (object security class) 2nd

send operation

send_msg operation

sendto operation

Sepcut tool 2nd 3rd

server_pty type attribute

serviceusers file 2nd

sestatus command

setattr operation

setbool command 2nd

setcap operation

setenforce command 2nd 3rd

setfiles command

setfiles utility

        labeling/relabeling filesystems 2nd 3rd

        relabeling problem scripts with

        repairing file labels

        troubleshooting login problems with

setfscreate operation

setgid operation

setopt operation

setpcap operation

setpgid operation

setrlimit operation

setsched operation

setuid operation 2nd

Seuserx tool 2nd 3rd

shadow_t type

share operation

shared library in SELinux

shell_exec_t type

shlib_t type

shm (object security class) 2nd

shm (pseudofilesystem with shared memory object)

show_bools command

shutdown operation

Sid (Debian GNU/Linux 3.0 unstable)

sid_to_context operation

SIDs (security identifiers)

        flask/initial_sids file

sigchld operation

siginh operation

sigkill operation

signal operation

signal_perms macro

signull operation

sigstop operation

single_userdomain macro

Smalley, Stephen 2nd

snapshots of current processes

Snort intrusion detection application, files associated with

snort.fc file

snort.te file

sock_file (object security class) 2nd

socket (object security class) 2nd

socket_class_set macro 2nd

socket_type type attribute

sockfs (pseudofilesystem with socket)

software complexity, contributing to software threats

software threats and the Internet

sound_device_t type

source files for SELinux

        checkpolicy command and 2nd

SPEC file

special notations for types/classes/permissions

special tokens in regular expressions

src_t type

ssh program

ssh_sysadm_login macro

SSHd program, troubleshooting

sshd_t domain

stack canaries

stacks, nonexecutable

staff_r role 2nd

        authorizing users to access domain

        limiting permissions available to users

staff_read_sysadm_file macro

startx domain (domains/misc subdirectory)

stat_file_perms macro

status information, viewing with sestatus command

stream_socket_class_set macro 2nd

subjects

subtraction (special notation)

SUSE Linux

        installing SELinux using RPM packages

swapfile_t type

swapon operation

switching SELinux modes

        troubleshooting program execution programs

syntax diagrams

sys_admin operation

sys_boot operation

sys_chroot operation

sys_module operation

sys_nice operation

sys_pacct operation

sys_ptrace operation

sys_rawio operation

sys_resource operation

sys_time operation

sys_tty_config operation

sysadm_r role

        changing user_r role to

        customizing

        transitioning to

sysadmfile type attribute

sysctl_dev_t type

sysctl_fs_t type

sysctl_hotplug_t type

sysctl_irq_t type

sysctl_kernel_t type

sysctl_kernel_writer type attribute

sysctl_modprobe_t type

sysctl_net_t type

sysctl_net_unix_t type

sysctl_net_writer type attribute

sysctl_rpc_t type

sysctl_t type

sysctl_type type attribute

sysctl_vm_t type

sysfs_t type

syslog_console operation

syslog_mod operation

syslog_read operation

syslogd domain definition

syslogd_t type

system (object security class) 2nd

system administrators, adding

system_domain macro

system_map_t type

system_r role 2nd

 

Категории