diff --git a/_posts/2025-12-17-why-you-should-use-SELinux-and-how.md b/_posts/2025-12-17-why-you-should-use-SELinux-and-how.md index b1ca3b8..a93f307 100644 --- a/_posts/2025-12-17-why-you-should-use-SELinux-and-how.md +++ b/_posts/2025-12-17-why-you-should-use-SELinux-and-how.md @@ -3,6 +3,8 @@ layout: post author: Sam Hadow --- +In this blog post I'll explain why you should use SELinux (or at least an implementation of Mandatory Access Control) and how you can use SELinux, administer it, install it on an existing system. + # SELinux origin ## History @@ -56,13 +58,14 @@ unconfined_u:object_r:config_home_t:s0 ``` What each field means + | Field | Meaning | | :- | :- | | **user** | SELinux user (different from UNIX users) | **role** | Mainly used with MLS policies | **type** | The most important element as it's used by the **type enforcement** | **level** | MLS/MCS levels, for example `s0:c1,c2` -| + In the targeted policy (which we'll see later in the policies section), only the type really matters. @@ -119,7 +122,7 @@ To inspect the active policy, several tools exist. You might need to install the | **semanage** | SELinux user (different from UNIX users) | **sesearch** | Searching a specific rules in the policy | **seinfo** | Getting statistics on the policy -| + For example: