Difference between revisions of "User Resources"
(→FAQs and Documentation) |
(→FAQs and Documentation) |
||
Line 63: | Line 63: | ||
[http://www.selinuxbyexample.com/ SELinux by example] | [http://www.selinuxbyexample.com/ SELinux by example] | ||
− | [http://www.linuxsecurity.com/content/view/120622 Hacks From Pax: SELinux And Access Decisions] | + | [http://www.linuxsecurity.com/content/view/120622 Hacks From Pax: SELinux And Access Decisions] Pax Dickinson. |
− | [http://www.linuxsecurity.com/content/view/120567/49/ Hacks From Pax: Security Enhanced Linux and Mandatory Access Control] | + | [http://www.linuxsecurity.com/content/view/120567/49/ Hacks From Pax: Security Enhanced Linux and Mandatory Access Control] Pax Dickinson. |
− | [http://www.linuxsecurity.com/content/view/120837/169/ Hacks From Pax: SELinux Policy Development] | + | [http://www.linuxsecurity.com/content/view/120837/169/ Hacks From Pax: SELinux Policy Development] Pax Dickinson. |
[http://www.linuxjournal.com/article/9542 Paranoid Penguin - Introduction to SELinux, Part II] by Mick Bauer. | [http://www.linuxjournal.com/article/9542 Paranoid Penguin - Introduction to SELinux, Part II] by Mick Bauer. |
Revision as of 17:03, 25 June 2009
FAQs and Documentation
SELinux Tools (canonical list with explanations)
Managing SELinux confined services (draft)
Reference policy documentation
Understanding SELinux memory protection controls
Explanation of text relocations and a description of how to find the reason and how to fix them
Portuguese Documentation Hardening Linux Usando Controle de Acesso Mandatório
SELinux Booleans Documentation at the Centos Wiki
Writing policy for confined SELinux users Red Hat Magazine article by Dan Walsh.
Fedora 9 and summit preview: Confining the user with SELinux Red Hat Magazine article by Dan Walsh.
What's new in SELinux for Red Hat Enterprise Linux 5 Red Hat Magazine article by Dan Walsh.
A step by step guide to building a new SELinux policy module Red Hat Magazine article by Dan Walsh.
What is Security-Enhanced Linux? Red Hat Magazine article by Russell Coker.
Secure Linux containers cookbook by Serge Hallyn of IBM.
Role-based access control in SELinux: Learn your way around this admin-friendly security administration layer by Serge Hallyn of IBM.
SELinux from scratch: Build an SELinux-ready Gentoo system by Serge Hallyn from IBM.
Polyinstantiation of directories in an SELinux system by Russell Coker.
Taking advantage of SELinux in Red Hat Enterprise Linux Red Hat Magazine article by Faye Coker and Russell Coker.
Red Hat Enterprise Linux 4 SELinux user guide
Summary of SELinux articles on Red Hat knowledge base
Fedora SELinux Policy Module Packaging (draft)
SELinux object classes and permissions reference
SELinux reference policy interface reference
Hacks From Pax: SELinux And Access Decisions Pax Dickinson.
Hacks From Pax: Security Enhanced Linux and Mandatory Access Control Pax Dickinson.
Hacks From Pax: SELinux Policy Development Pax Dickinson.
Paranoid Penguin - Introduction to SELinux, Part II by Mick Bauer.
Paranoid Penguin - Introduction to SELinux by Mick Bauer.
Mailing lists
NSA SELinux mailing list (Unofficial searchable list archive)
Fedora SELinux mailing list (Fedora SELinux list archive)
Debian SELinux announcement mailing list (Debian SELinux announcement list archive)
Debian SELinux devel mailing list (Debian SELinux devel list archive)
Debian SELinux user mailing list (Debian SELinux user list archive)
Gentoo Hardened mailing list (Gentoo Hardened list archive)
Ubuntu Hardened mailing list (Ubuntu Hardened list archive)
OpenSolaris FMAC mailing list (OpenSolaris FMAC list archive)
Tresys SELinux Reference Policy development mailing list (Tresys SELinux Reference Policy development list archive)
IRC
irc.freenode.org channel #selinux
irc.freenode.org channel #fedora-selinux
Websites
Hardened Gentoo's SELinux project page
OpenSolaris Flexible MAC project
Public forum for the NSA Security-Enhanced Linux project
Tools
system-config-selinux
Cross Domain Solution Framework