Search Engine

Loading

Sallar

Sallar
RedhatEnterpriseLinux Blog
Showing posts with label SELinux. Show all posts
Showing posts with label SELinux. Show all posts

Protecting Against Intruders with Security- Enhanced Linux



On a system without Security-Enhanced Linux (SELinux) enabled, discretionary access control (DAC) is used for file security. Basic file permissions are used to grant file access to users. Users and programs alike are allowed to grant insecure file permissions to others. For users, there is no way for an administrator to prevent a user from granting world-readable and world writable permissions to his files. For programs, the file operations are performed as the owner of the process, which can be the root user, giving the program access to any file on the system.
SELinux is a mandatory access control (MAC) mechanism, implemented in the kernel. Programs protected by SELinux are only allowed access to parts of the filesystem they require to function properly, meaning that if a program intentionally or unintentionally tries to access or modify a file not necessary for it to function or a file not in a directory controlled by the program, file access is denied and the action is logged. The ability to protect files with SELinux is implemented in the kernel. Exactly what files and directories are protected and to what extent they are protected is defined by the SELinux policy. This section gives instructions on how to enable the SELinux protection mechanism, describes the SELinux policies available in Red Hat Enterprise Linux, tells you how to read the SELinux permissions of a file, shows how the SELinux Troubleshooting Tool alerts you of SELinux errors, and steps you through how to change the security context of files.

NFS and SELinux Configuration


NFS and SELinux
In Red Hat Enterprise Linux 5 & 6, NFS is protected by the default Security-Enhanced Linux (SELinux) policy, known as the targeted policy. By default, this targeted policy allows NFS connections to the server by setting the nfs_export_all_ro and nfs_export_all_rw SELinux booleans to 1.
If you are sharing home directories over NFS while using SELinux, you must set
use_nfs_home_dirs boolean to 1 on each client connecting to the NFS server sharing the home directories. Execute the following command as root:

Powered by Blogger.

Ads

 
Copyright © Redhat Enterprise linux. Original Concept and Design by My Blogger Themes
My name is Abdul Razaq but people call me Raziq. Here is my home page: www.redhatenterpriselinux.blogspot.com I live in Quetta, Pakistan and work as an IT-Engineer.