Difference between revisions of "User Resources"
(→FAQs and Documentation) |
(Added a book link) |
||
(27 intermediate revisions by 6 users not shown) | |||
Line 1: | Line 1: | ||
+ | == Guides == | ||
+ | |||
+ | * [https://docs.fedoraproject.org/en-US/Fedora/19/html/Security_Guide/ch09.html SELinux] | ||
+ | * [https://docs.fedoraproject.org/en-US/Fedora/19/html/Security_Guide/ch10.html Managing Confined Services] | ||
+ | |||
== FAQs and Documentation == | == FAQs and Documentation == | ||
− | [http:// | + | [http://www.slideshare.net/PaulWay/selinux-for-everyday-users SELinux for Everyday Users] (Slides by Paul Wayper) |
− | [http:// | + | [http://www.slideshare.net/PaulWay/slug-2009-06-selinux-for-sysadmins SELinux for SysAdmins] (Slides by Paul Wayper) |
− | [http:// | + | [http://userspace.selinuxproject.org/trac/wiki/SelinuxTools SELinux Tools] (canonical list with explanations) |
[http://www.nsa.gov/research/selinux/faqs.shtml NSA SELinux FAQ] | [http://www.nsa.gov/research/selinux/faqs.shtml NSA SELinux FAQ] | ||
Line 32: | Line 37: | ||
[http://magazine.redhat.com/2007/08/21/a-step-by-step-guide-to-building-a-new-selinux-policy-module/ A step by step guide to building a new SELinux policy module] Red Hat Magazine article by Dan Walsh. | [http://magazine.redhat.com/2007/08/21/a-step-by-step-guide-to-building-a-new-selinux-policy-module/ A step by step guide to building a new SELinux policy module] Red Hat Magazine article by Dan Walsh. | ||
+ | |||
+ | [http://www.redhat.com/magazine/001nov04/features/selinux/ What is Security-Enhanced Linux?] Red Hat Magazine article by Russell Coker. | ||
[http://www.ibm.com/developerworks/linux/library/l-lxc-security/index.html Secure Linux containers cookbook] by Serge Hallyn of IBM. | [http://www.ibm.com/developerworks/linux/library/l-lxc-security/index.html Secure Linux containers cookbook] by Serge Hallyn of IBM. | ||
Line 55: | Line 62: | ||
[http://oss.tresys.com/projects/refpolicy/wiki/ObjectClassesPerms SELinux object classes and permissions reference] | [http://oss.tresys.com/projects/refpolicy/wiki/ObjectClassesPerms SELinux object classes and permissions reference] | ||
− | [http://oss.tresys.com/docs/refpolicy/api/ SELinux interface reference] | + | [http://oss.tresys.com/docs/refpolicy/api/ SELinux reference policy interface reference] |
[http://code.google.com/p/sepgsql/wiki/Apache_SELinux_plus SELinux plus introduction] | [http://code.google.com/p/sepgsql/wiki/Apache_SELinux_plus SELinux plus introduction] | ||
Line 61: | Line 68: | ||
[http://www.selinuxbyexample.com/ SELinux by example] | [http://www.selinuxbyexample.com/ SELinux by example] | ||
− | + | [http://www.linuxsecurity.com/content/view/120622 Hacks From Pax: SELinux And Access Decisions] by Pax Dickinson. | |
− | [http://www. | + | [http://www.linuxsecurity.com/content/view/120567/49/ Hacks From Pax: Security Enhanced Linux and Mandatory Access Control] by Pax Dickinson. |
− | [http://www. | + | [http://www.linuxsecurity.com/content/view/120837/169/ Hacks From Pax: SELinux Policy Development] by Pax Dickinson. |
− | [http:// | + | [http://www.linuxjournal.com/article/9542 Paranoid Penguin - Introduction to SELinux, Part II] by Mick Bauer. |
− | [http:// | + | [http://www.linuxjournal.com/article/9500 Paranoid Penguin - Introduction to SELinux] by Mick Bauer. |
− | [http:// | + | [http://www.linuxjournal.com/article/9408 Multi-Category Security in SELinux in Fedora Core 5] by Russell Coker. |
− | [http://www. | + | [http://www.nsa.gov/research/_files/selinux/papers/policy2/t1.shtml Configuring the SELinux Policy] |
− | [ | + | [[ObjectClassesPerms | Object Classes and Permissions descriptions]] |
− | + | == Books == | |
− | [ | + | * [https://www.packtpub.com/networking-and-servers/selinux-system-administration-second-edition SELinux System Administration - Second Edition] by Sven Vermeulen, Packt. |
− | == IRC == | + | == Mailing lists and IRC == |
− | [ | + | [[User_Help | Mailing lists and IRC channels]] |
− | [ | + | == Blogs == |
+ | |||
+ | * [http://selinuxnews.org SELinux Community News] | ||
+ | * [http://selinuxnews.org/planet Planet SELinux] - Aggregates all of the blogs below (plus some more) | ||
+ | ** [http://danwalsh.livejournal.com/ Dan Walsh] | ||
+ | ** [http://selinux-mac.blogspot.com/ Dominick Grift] | ||
+ | ** [http://eparis.livejournal.com/ Eric Paris] | ||
+ | ** [http://blog.namei.org/ James Morris] | ||
+ | ** [http://securityblog.org/brindle/ Joshua Brindle] | ||
+ | ** [http://paulmoore.livejournal.com/ Paul Moore] | ||
== Websites == | == Websites == | ||
[http://wiki.russianfedora.ru/index.php/SELinux Russian Fedora SELinux Wiki] | [http://wiki.russianfedora.ru/index.php/SELinux Russian Fedora SELinux Wiki] | ||
− | |||
− | |||
− | |||
− | |||
[http://www.nsa.gov/research/selinux/index.shtml NSA SELinux website] | [http://www.nsa.gov/research/selinux/index.shtml NSA SELinux website] | ||
Line 160: | Line 172: | ||
[http://linux.die.net/man/8/run_init run_init(8)] | [http://linux.die.net/man/8/run_init run_init(8)] | ||
+ | |||
+ | [http://linux.die.net/man/1/runcon runcon(1)] | ||
+ | |||
+ | [http://linux.die.net/man/8/restorecond restorecond(8)] | ||
system-config-selinux | system-config-selinux | ||
Line 196: | Line 212: | ||
[http://linux.die.net/man/8/ypbind_selinux ypbind_selinux(8)] | [http://linux.die.net/man/8/ypbind_selinux ypbind_selinux(8)] | ||
+ | |||
+ | == Topics == | ||
+ | |||
+ | |||
+ | [[SELinux_models|SELinux security models and concepts]] |
Revision as of 10:07, 17 January 2017
Contents
Guides
FAQs and Documentation
SELinux for Everyday Users (Slides by Paul Wayper)
SELinux for SysAdmins (Slides by Paul Wayper)
SELinux Tools (canonical list with explanations)
Reference policy documentation
Understanding SELinux memory protection controls
Explanation of text relocations and a description of how to find the reason and how to fix them
Portuguese Documentation Hardening Linux Usando Controle de Acesso Mandatório
SELinux Booleans Documentation at the Centos Wiki
Writing policy for confined SELinux users Red Hat Magazine article by Dan Walsh.
Fedora 9 and summit preview: Confining the user with SELinux Red Hat Magazine article by Dan Walsh.
What's new in SELinux for Red Hat Enterprise Linux 5 Red Hat Magazine article by Dan Walsh.
A step by step guide to building a new SELinux policy module Red Hat Magazine article by Dan Walsh.
What is Security-Enhanced Linux? Red Hat Magazine article by Russell Coker.
Secure Linux containers cookbook by Serge Hallyn of IBM.
Role-based access control in SELinux: Learn your way around this admin-friendly security administration layer by Serge Hallyn of IBM.
SELinux from scratch: Build an SELinux-ready Gentoo system by Serge Hallyn from IBM.
Polyinstantiation of directories in an SELinux system by Russell Coker.
Taking advantage of SELinux in Red Hat Enterprise Linux Red Hat Magazine article by Faye Coker and Russell Coker.
Red Hat Enterprise Linux 4 SELinux user guide
Summary of SELinux articles on Red Hat knowledge base
Fedora SELinux Policy Module Packaging (draft)
SELinux object classes and permissions reference
SELinux reference policy interface reference
Hacks From Pax: SELinux And Access Decisions by Pax Dickinson.
Hacks From Pax: Security Enhanced Linux and Mandatory Access Control by Pax Dickinson.
Hacks From Pax: SELinux Policy Development by Pax Dickinson.
Paranoid Penguin - Introduction to SELinux, Part II by Mick Bauer.
Paranoid Penguin - Introduction to SELinux by Mick Bauer.
Multi-Category Security in SELinux in Fedora Core 5 by Russell Coker.
Configuring the SELinux Policy
Object Classes and Permissions descriptions
Books
- SELinux System Administration - Second Edition by Sven Vermeulen, Packt.
Mailing lists and IRC
Mailing lists and IRC channels
Blogs
- SELinux Community News
- Planet SELinux - Aggregates all of the blogs below (plus some more)
Websites
Hardened Gentoo's SELinux project page
OpenSolaris Flexible MAC project
Public forum for the NSA Security-Enhanced Linux project
Tools
system-config-selinux
Cross Domain Solution Framework