12.07.2015 Views

Red Hat Enterprise Linux 5 Administration Unleashed

Red Hat Enterprise Linux 5 Administration Unleashed

Red Hat Enterprise Linux 5 Administration Unleashed

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 23Protecting AgainstIntruders with Security-Enhanced <strong>Linux</strong>IN THIS CHAPTER. Selecting an SE<strong>Linux</strong> Mode. Selecting and Customizing theSE<strong>Linux</strong> Policy. Utilizing the SE<strong>Linux</strong>Troubleshooting Tool. Working with Security ContextsOn a system without Security-Enhanced <strong>Linux</strong> (SE<strong>Linux</strong>)enabled, discretionary access control (DAC) is used for filesecurity. Basic file permissions as discussed in Chapter 4,“Understanding <strong>Linux</strong> Concepts,” and optionally accesscontrol lists as described in Chapter 7, “Managing Storage,”are used to grant file access to users. Users and programsalike are allowed to grant insecure file permissions toothers. For users, there is no way for an administrator toprevent a user from granting world-readable and worldwritablepermissions to his files. For programs, the fileoperations are performed as the owner of the process,which can be the root user, giving the program access toany file on the system.SE<strong>Linux</strong> is a mandatory access control (MAC) mechanism,implemented in the kernel. Programs protected by SE<strong>Linux</strong>are only allowed access to parts of the filesystem theyrequire to function properly, meaning that if a programintentionally or unintentionally tries to access or modify afile not necessary for it to function or a file not in a directorycontrolled by the program, file access is denied andthe action is logged.The ability to protect files with SE<strong>Linux</strong> is implemented inthe kernel. Exactly what files and directories are protectedand to what extent they are protected is defined by theSE<strong>Linux</strong> policy. This chapter gives instructions on how toenable the SE<strong>Linux</strong> protection mechanism, describes theSE<strong>Linux</strong> policies available in <strong>Red</strong> <strong>Hat</strong> <strong>Enterprise</strong> <strong>Linux</strong>, tellsyou how to read the SE<strong>Linux</strong> permissions of a file, showshow the SE<strong>Linux</strong> Troubleshooting Tool alerts you ofSE<strong>Linux</strong> errors, and steps you through how to change thesecurity context of files.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!