Index
- access vector rule
  
- syntax,
    TE Rules - Access Vectors
  
 
 
- access vectors,
    TE Rules - Access Vectors
  
- activating your subscription,
    Activate Your Subscription
  
- analysis
  
- see tools
- see policy analysis
- dumping or viewing the logs,
    Dump and View Logs
  
- dumping or viewing the policy,
    Dump or View Policy
  
- logs,
    Controlling and Maintaining SELinux
  
 
- analyzing
  
- kernel audit message,
    Enable Kernel Auditing
  
 
- macros,
    How To Backtrack a Rule
  
 
 
- apol
  
- how to use,
    Using apol for Policy Analysis
  
 
 
- architecture
  
- SELinux,
    SELinux Architectural Overview
  
 
 
- archiving files and directories,
    Make Backups or Archives That Retain Security Contexts
  
- assuming a new role or type
  
- how to,
    Assume a New Role
  
 
 
- attribute declaration
  
- syntax,
    TE Rules - Attributes
  
 
 
- attributes,
    TE Rules - Attributes
  
- auditing
  
- how to enable kernel auditing,
    Enable Kernel Auditing
  
 
 
- AV
  
- see access vectors
 
- AVC statistics
  
- how to view,
    Viewing AVC Statistics
  
 
 
- avc:  denied
  
- explained,
    Understanding an avc:  denied         Message
  
 
- troubleshooting,
    Troubleshoot User Problems With SELinux
  
 
 
- CGI scripts
  
- how to run from a mounted directory,
    Specifying the Security Context of Entire File Systems
  
 
 
- changing a Boolean
  
- how to,
    Change a Boolean Setting
  
 
 
- changing the policy
  
- how to,
    Change the Policy
  
 
 
- checking status
  
- how to,
    View the Status of SELinux
  
 
 
- checkpolicy
  
- how to use,
    What Happens During Policy Build
  
 
 
- command line tools
  
- avcstat,
    Viewing AVC Statistics,
    Information Gathering Tools
  
 
- checkpolicy,
    What Happens During Policy Build
  
 
- enabling or disabling enforcement,
    Enable or Disable Enforcement
  
 
- newrole,
    Assume a New Role
  
 
- runcon,
    Run a Command in a Specified Security Context
  
 
- seinfo,
    Information Gathering Tools
  
 
- sesearch,
    Information Gathering Tools
  
 
- sestatus,
    View the Status of SELinux
  
 
- setting Booleans,
    Change a Boolean Setting
  
 
- useful for shell scripts,
    Useful Commands for Scripts
  
 
 
- commands with SELinux options
  
- cp,
    Move or Copy Files
  
 
- id,
    Check the Security Context of a Process, User, or File         Object
  
 
- ls,
    Check the Security Context of a Process, User, or File         Object
  
 
- mount,
    Specifying the Security Context of Entire File Systems
  
 
- mv,
    Move or Copy Files
  
 
- ps,
    Check the Security Context of a Process, User, or File         Object
  
 
 
- compiling
  
- SELinux,
    Compiling SELinux Policy
  
 
 
- compiling policy
  
- how to,
    Policy Compile Procedure
  
 
 
- constraints,
    TE Rules - Constraints
  
- controlling SELinux,
    Controlling and Maintaining SELinux
  
- administrators,
    Administrator Control of SELinux
  
 
- analysts,
    Enable Kernel Auditing
  
 
- end users,
    End User Control of SELinux
  
 
 
- conventions
  
- document,
    Document Conventions
  
 
 
- cp command
  
- using with SELinux,
    Move or Copy Files
  
 
 
- customizing policy
  
- how to,
    Customizing and Writing Policy
  
 
 
- DAC
  
- definition,
    Brief Background and History of SELinux
  
 
 
- definition of
  
- DAC,
    Brief Background and History of SELinux
  
 
- MAC,
    Brief Background and History of SELinux
  
 
- object classes,
    Object Classes and Permissions
  
 
- permissions,
    Object Classes and Permissions
  
 
- targeted policy,
    What is the Targeted Policy?
  
 
 
- direct information flow
  
- see information flow
 
- directories
  
- policy files and directories,
    Files and Directories of the Targeted Policy
  
 
 
- directories for SELinux
  
- what are,
    Conventions for SELinux Directories and Files
  
 
- where are,
    Where is the Policy?
  
 
 
- directory access
  
- how to,
    Grant Access to a Directory or a Tree
  
 
 
- directory presentation,
    Conventions for SELinux Directories and Files
  
- disable
  
- enforcement,
    Enable or Disable Enforcement
  
 
-  SELinux,
    Enable or Disable Enforcement
  
 
- SELinux protection of a daemon,
    Enable or Disable Enforcement
  
 
 
- discretionary access control
  
- see DAC
 
- documentation references
  
- see references
 
- domain transition analysis,
    Domain Transition Analysis
  
- domains
  
- attributes,
    TE Rules - Attributes
  
 
- dhcpd,
    Policy Types - dhcpd
  
 
- domain transition analysis,
    Domain Transition Analysis
  
 
 
- dumping logs
  
- how to,
    Dump and View Logs
  
 
 
- dumping policy
  
- how to,
    Dump or View Policy
  
 
 
- enable
  
- enforcement,
    Enable or Disable Enforcement
  
 
- kernel auditing,
    Enable Kernel Auditing
  
 
- SELinux,
    Enable or Disable Enforcement
  
 
- SELinux protection of a daemon,
    Enable or Disable Enforcement
  
 
 
- end users
  
- controlling and maintaining SELinux,
    End User Control of SELinux
  
 
- troubleshooting user problems,
    Troubleshoot User Problems With SELinux
  
 
 
- example
  
- file contexts files,
    Understanding the File Contexts Files
  
 
- network declaration,
    Files and Directories of the Targeted Policy
  
 
- role allow,
    SELinux Roles
  
 
- role declaration,
    SELinux Roles
  
 
 
- history
  
- SELinux,
    Brief Background and History of SELinux
  
 
 
- how to
  
- administrator tasks,
    Administrator Control of SELinux
  
 
- analyze a macro,
    How To Backtrack a Rule
  
 
- archive files and directories,
    Make Backups or Archives That Retain Security Contexts
  
 
- assume a new role or type,
    Assume a New Role
  
 
- backtrack a rule,
    How To Backtrack a Rule
  
 
- backup files,
    Make Backups or Archives That Retain Security Contexts
  
 
- change a Boolean setting,
    Change a Boolean Setting
  
 
- change the policy,
    Change the Policy
  
 
- compile policy,
    Policy Compile Procedure
  
 
- dump or view logs,
    Dump and View Logs
  
 
- dump or view policy,
    Dump or View Policy
  
 
- enable kernel auditing,
    Enable Kernel Auditing
  
 
- enable or disable enforcement,
    Enable or Disable Enforcement
  
 
- enable or disable SELinux protection of a daemon,
    Enable or Disable Enforcement
  
 
- end user tasks,
    End User Control of SELinux
  
 
- grant access to a directory,
    Grant Access to a Directory or a Tree
  
 
- install a policy package,
    Load a Policy
  
 
- know when to compile,
    Policy Compile Procedure
  
 
- know when to reboot,
    When to Reboot
  
 
- load a binary policy,
    Load a Policy
  
 
- manage NFS home directories,
    Managing NFS Home Directories
  
 
- performance tune,
    Performance Tuning
  
 
- relabel a file or directory,
    Relabel a File or Directory's Security Context
  
 
- relabel a file system,
    Relabel a File System
  
 
- run a CGI script,
    Specifying the Security Context of Entire File Systems
  
 
- run a command in a specified context,
    Run a Command in a Specified Security Context
  
 
- run a different policy,
    Change the Policy
  
 
- serve Web content from a mounted directory,
    Specifying the Security Context of Entire File Systems
  
 
- set context for a file system,
    Specifying the Security Context of Entire File Systems
  
 
- troubleshoot SELinux,
    Troubleshoot User Problems With SELinux
  
 
- use apol,
    Using apol for Policy Analysis
  
 
- use checkpolicy,
    What Happens During Policy Build
  
 
- use seaudit,
    Using seaudit for Audit Log Analysis
  
 
- validate a policy,
    What Happens During Policy Build
  
 
- view AVC statistics,
    Viewing AVC Statistics
  
 
- view SELinux status,
    View the Status of SELinux
  
 
- write new policy for a daemon,
    Writing New Policy for a Daemon
  
 
 
- labeling,
    File System Security Contexts
  
- mountpoint labeling,
    File System Security Contexts
  
 
- setting label option on mount,
    File System Security Contexts
  
 
- single label for entire file system,
    File System Security Contexts
  
 
 
- links
  
- see references
 
- Linux Security Modules
  
- see LSM
 
- loading a binary policy
  
- how to,
    Load a Policy
  
 
 
- log
  
- analysis,
    Controlling and Maintaining SELinux
  
 
 
- ls command
  
- using with SELinux,
    Check the Security Context of a Process, User, or File         Object
  
 
 
- LSM
  
- and SELinux,
    SELinux, an Implementation of Flask,
    Brief Background and History of SELinux
  
 
 
- m4
  
- see macros
 
- MAC
  
- definition,
    Brief Background and History of SELinux
  
 
 
- macro
  
- analysis,
    How To Backtrack a Rule
  
 
 
- macro usage
  
- example,
    Policy Macros
  
 
 
- macros,
    Policy Macros
  
- common,
    Common Macros in the Targeted Policy
  
 
 
- maintaining SELinux,
    Controlling and Maintaining SELinux
  
- administrators,
    Administrator Control of SELinux
  
 
- end users,
    End User Control of SELinux
  
 
 
- making a directory accessible
  
- how to,
    Grant Access to a Directory or a Tree
  
 
 
- mandatory access control
  
- see MAC
 
- MLS
  
- MAC,
    SELinux Architectural Overview
  
 
 
- mount options
  
- genfs labeling,
    File System Security Contexts
  
 
 
- mounting file systems
  
- and security labeling,
    File System Security Contexts
  
 
 
- mountpoint labeling,
    File System Security Contexts
  
- multi-level security
  
- see MLS
 
- mv command
  
- using with SELinux,
    Move or Copy Files
  
 
 
- performance tuning,
    Tools for Manipulating and Analyzing SELinux
  
- how to,
    Performance Tuning
  
 
 
- permissions
  
- common sets,
    Object Classes and Permissions
  
 
- definition,
    Object Classes and Permissions
  
 
 
- policy
  
- boot,
    Policy Role in Boot
  
 
- files and directories,
    Where is the Policy?
  
 
- how it works,
    SELinux Policy Overview
  
 
- internal functions,
    SELinux Policy Overview
  
 
- overview,
    SELinux Policy Overview
  
- targeted,
    Targeted Policy Overview
  
 
- required packages,
    SELinux Policy Overview
  
 
- system start-up
  
- see boot
 
- writing policy,
    Writing New Policy for a Daemon
  
 
 
- policy analysis
  
- direct information flow,
    Direct and Transitive Information Flow
  
 
- domain transition analysis,
    Domain Transition Analysis
  
 
- policy components,
    Policy Component Analysis
  
 
- TE rule analysis,
    TE Rule Analysis
  
 
- TE rules,
    Policy Component Analysis
  
 
- tools
  
- apol,
    Using apol for Policy Analysis
  
- seaudit,
    Using seaudit for Audit Log Analysis
  
 
 
- policy and
  
- roles,
    SELinux Users and Roles
  
 
- users,
    SELinux Users and Roles
  
 
 
- policy build
  
- what is,
    What Happens During Policy Build
  
 
 
- prerequisite knowledge,
    Prerequisites for This Guide
  
- ps command
  
- using with SELinux,
    Check the Security Context of a Process, User, or File         Object
  
 
 
- rebooting
  
- how to know when to reboot,
    When to Reboot
  
 
 
- references,
    References
  
- Flask,
    References
  
 
- NSA,
    References
  
 
- SELinux,
    References
  
 
 
- registering your subscription,
    Activate Your Subscription
  
- relabeling
  
- entire file systems,
    Relabel a File System
  
 
- files or directories,
    Relabel a File or Directory's Security Context
  
 
 
- roles,
    SELinux Users and Roles
  
- assuming a new role,
    Assume a New Role
  
 
- targeted policy members,
    Understanding the Roles and Users in the Targeted Policy
  
 
 
- roles and user
  
- targeted policy,
    Understanding the Roles and Users in the Targeted Policy
  
 
 
- rule analysis
  
- see TE rule analysis
 
- running a command in a specific context
  
- how to,
    Run a Command in a Specified Security Context
  
 
 
- running a different policy
  
- how to,
    Change the Policy
  
 
 
- seaudit
  
- how to use,
    Using seaudit for Audit Log Analysis
  
 
 
- security contexts
  
- and the kernel,
    Security Contexts and the Kernel
  
 
- file systems,
    File System Security Contexts
  
 
 
- security types
  
- dhcpd,
    Policy Types - dhcpd
  
 
 
- security.selinux,
    File System Security Contexts
  
- SELinux
  
- see explained
- and Flask,
    SELinux, an Implementation of Flask
  
- and LSM,
    SELinux, an Implementation of Flask
  
- architecture,
    SELinux Architectural Overview
  
- compiling,
    Compiling SELinux Policy
  
- control methods,
    Controlling and Maintaining SELinux
  
- documentation references
  
- see references
- history of,
    Brief Background and History of SELinux
  
- maintenance,
    Controlling and Maintaining SELinux
  
- tools,
    Tools for Manipulating and Analyzing SELinux
  
- what is,
    What Is SELinux?
  
 
- SELinux files and directories,
    Files and Directories of the Targeted Policy
  
- what are,
    Conventions for SELinux Directories and Files
  
 
 
- SELinux status
  
- how to,
    View the Status of SELinux
  
 
 
- selinuxfs file system,
    Special Interfaces and File Systems
  
- setting the context for a file system
  
- how to,
    Specifying the Security Context of Entire File Systems
  
 
 
- shell scripts
  
- enabling or disabling SELinux,
    Enable or Disable Enforcement
  
 
- useful commands,
    Useful Commands for Scripts
  
 
 
- start-up
  
- see boot
 
- start-up procedure
  
- see boot
 
- subscription registration,
    Activate Your Subscription
  
- summary
  
- policy,
    SELinux Policy Overview
  
 
 
- syntax
  
- access vector rule,
    TE Rules - Access Vectors
  
 
- attribute declaration,
    TE Rules - Attributes
  
 
- avc:  denied           message,
    Understanding an avc:  denied         Message
  
 
- constraint,
    TE Rules - Constraints
  
 
- file context description,
    Understanding the File Contexts Files
  
 
- network declaration,
    Files and Directories of the Targeted Policy
  
 
- neverallow rule,
    TE Rules - Access Vectors
  
 
- object class access vector definitions,
    Object Classes and Permissions
  
 
- object class sets,
    Object Classes and Permissions
  
 
- role allow,
    SELinux Roles
  
 
- role declaration,
    SELinux Roles
  
 
- type declaration,
    TE Rules - Types
  
 
- type transition,
    TE Rules - Types
  
 
 
- system administrators
  
- controlling and maintaining SELinux,
    Administrator Control of SELinux
  
 
 
- targeted policy
  
- common macros,
    Common Macros in the Targeted Policy
  
 
- defined,
    What is the Targeted Policy?
  
 
- roles and users,
    Understanding the Roles and Users in the Targeted Policy
  
 
 
- TE rule analysis,
    TE Rule Analysis
  
- tools
  
- for users,
    Controlling and Maintaining SELinux
  
 
- SELinux,
    Tools for Manipulating and Analyzing SELinux
  
 
 
- transition analysis
  
- see domain transition analysis
 
- transitive information flow
  
- see information flow
 
- troubleshooting SELinux
  
- how to,
    Troubleshoot User Problems With SELinux
  
 
 
- tunables
  
- AVC cache threshold,
    Performance Tuning
  
 
 
- type declarations,
    TE Rules - Types
  
- syntax,
    TE Rules - Types
  
 
 
- Type Enforcement
  
- access vectors,
    TE Rules - Access Vectors
  
 
 
- type transition
  
- syntax,
    TE Rules - Types
  
 
 
- types
  
- assuming a new type,
    Assume a New Role
  
 
- attributes,
    TE Rules - Attributes
  
 
 
- Web content
  
- how to serve from a mounted directory,
    Specifying the Security Context of Entire File Systems
  
 
 
- what are
  
- access vectors,
    TE Rules - Access Vectors
  
 
- administrator tasks,
    Administrator Control of SELinux
  
 
- attributes,
    TE Rules - Attributes
  
 
- directories for SELinux,
    Conventions for SELinux Directories and Files
  
 
- end user tasks,
    End User Control of SELinux
  
 
- file labels,
    File System Security Contexts
  
 
- files and directories used by SELinux,
    Files and Directories of the Targeted Policy
  
 
- macros,
    Policy Macros
  
 
- object classes,
    Object Classes and Permissions
  
 
- roles,
    SELinux Users and Roles
  
 
- security contexts,
    File System Security Contexts
  
 
- security labels,
    File System Security Contexts
  
 
- types,
    TE Rules - Types
  
 
- users,
    SELinux Users and Roles
  
 
 
- what happens
  
- during policy build,
    What Happens During Policy Build
  
 
 
- what is
  
- $SELINUX_POLICY/,
    Conventions for SELinux Directories and Files
  
 
- $SELINUX_SRC/,
    Conventions for SELinux Directories and Files
  
 
- avc:  denied,
    Understanding an avc:  denied         Message
  
 
- labeling,
    File System Security Contexts
  
 
- mountpoint labeling,
    File System Security Contexts
  
 
- policy,
    SELinux Policy Overview
  
 
- policy build,
    What Happens During Policy Build
  
 
- policy role in boot,
    Policy Role in Boot
  
 
- SELinux,
    What Is SELinux?
  
 
- selinuxfs file system,
    Special Interfaces and File Systems
  
 
- targeted policy,
    What is the Targeted Policy?
  
 
- the architecture of SELinux,
    Flask Security Architecture and SELinux
  
 
 
- what you should know,
    Prerequisites for This Guide
  
- when to
  
- compile,
    Policy Compile Procedure
  
 
- reboot,
    When to Reboot
  
 
 
- where are
  
- files and directories for SELinux,
    Where is the Policy?
  
 
 
- writing policy
  
- how to,
    Customizing and Writing Policy