


Red Hat Boosts SELinux With RHEL 5 175
E. Stride writes "Many IT managers find Security Enhanced Linux, or SELinux, to be wildly complex. The mandatory access controls originally developed by the NSA have developed a reputation for being too complicated to deal with, and many IT shops simply turn the feature off. However, Red Hat's Dan Walsh says it's the only way to ensure 100% protection in the data center."
100%? (Score:5, Informative)
Re:100%? (Score:5, Informative)
The main disadvantage of AppArmor is that it relies on file paths, not the inodes. All you need to do is be able to create a hard link in the right directory to get around it.
Re: (Score:3, Informative)
Re: (Score:2)
Of course you wouldn't unless your manager, out of fear and ignorance, forces you to disable it as step one following installation. This is the same manager that has root access which I must constantly go behind to fix things he's mes
Re:100%? (Score:5, Informative)
Enforcing mode = Security policy decisions are enforced, policy violations are logged.
Permissive mode = Security policy decisions are not enforced, policy violations are logged.
Disabled = Security policy decisions are not computed.
Re: (Score:3, Informative)
Where it gets tricky is when permissive allows something to happen that triggers another violation, whereas enforcing would have stopped things earlier in the chain. Things can look a little inconsistent in that way.
Re:100%? (Score:5, Informative)
I wholeheartedly agree.
Step 1: Install RHEL, disable SELinux
Step 2: Install and configure your stack (apache, jboss, tomcat, mysql, whatever)
Step 3: Enable permissive mode, light up the stack, watch logs
Step 4: Tweak the rules, repeat step 3 until the logs are clean.
Step 5: Enable Enforcing Mode
You can now rest a little bit easier knowing that you have SELinux enabled. The only drawback is that you sometimes have to repeat the process as new versions of your stack are released (mysql, jboss). It's basically a monthly process.
BBH
Re: (Score:3, Informative)
Unfortunately, there's also a whole bunch of people who naively thought permissive mode would only log and not interfere with anything, spent two days troubleshooting some problem, finally _disabled_ SELinux and had it work perfectly from the default two days ago.
I'm sure there were perfectly logical reasons for it to happen, but it's that kind of random, seemingly inexplicable and above all, unlogged problems that turn people off of MAC
Re: (Score:3, Interesting)
As far as your comment on error codes and 'Permission denied by MAC policy', quite a few (if not most) of app developers do not handle all possible error codes returned by the OS and do not have a "catch-all"
Re:100%? (Score:5, Informative)
AppArmor's main approach is somewhat less broad. It is more like putting certain applications into a MAC container to limit what an application can do, no matter who the user using the application is. A great example of this that most Slashdot readers should look into is putting the browser into a safety container. I've been using Linux since right before 2.4 came out, and I can't count the number of times I've heard 'Linux is more secure because even if your account gets hacked the system isn't hacked' While there is certainly truth to that from the perspective of the full system, it fails to mention that the only data I actually give a rat's ass about is the data in my account, I can always get the rest of the crap from CD/downloading! AppArmor can help fix this by saying: Hey Firefox, just because you are running as user CajunArson, you DON'T get to do everything CajunArson can do, we will only let you operate on some files, and you can't get full access to his data, you can't fork/exec any ol' program that CajunArson can, and in general you are limited to doing what you are supposed to do: Browse the Web. The underlying concepts are still based on the MAC used by SELinux, but the implementation, while not as air-tight theoretically, is also easier to adjust. If there is something I really need firefox to do that the profile will not allow, AppArmor makes the process of tweaking the security easier than SELinux in general (although RedHat could be working on better SELinux tools to fix that).
Sorry for the long post, but remember: the next time someone says Linux is more secure than Windows, remember that things like SELinux and AppArmor really are what make it better, not just because it has a mean looking penguin!
AppArmor (Score:4, Informative)
Some time ago, I wrote a review of AppArmor [osreviews.net], finding that it solves problems that don't exist. Looking at your browser example, the functionality provided by AppArmor can be implemented completely by setting up a different user and setting appropriate file ACLs.
For the real problems AppArmor provides little help. Can you confine network usage of a program, meaning your internal network cannot be accessed once your browser has been hacked? No. Can you limit the syscalls a program may use, reducing the risk of successful kernel exploits? No.
As long as it stays this way, I recommend to everyone to use SELinux, even though it is much more difficult to setup and configure.
Re: (Score:3, Insightful)
Can you confirm that the situation is still like you described? I have no clue at all (been using openSUSE for less than a month now), but I won't take any advise from anyone who points to a year old article about a project under active (heavy) development.
Re:100%? (Score:5, Informative)
Good GUIs are a wonderful thing, but I want to emphasize that SELinux isn't really all that difficult to begin with. High quality SELinux rules shipped with solid distributions such as RHEL 5 eliminate many of the problems that early adopters faced; indeed, that's more or less the subject of this article.
Many people (such as myself) consider SELinux much less of a "patch job" than AppArmor. For instance, with AppArmor security attributes are not stored with the filesystem inodes, but are specified according to path name. That might simplify AppArmor's implementation a bit, but consider what happens to the security policy when you have two different path names hard linked to the same inode...
Those of us who are partial to SELinux's implementation of mandatory access controls are thrilled to see the strides that Red Hat has made in their latest enterprise release.
Re: (Score:2, Insightful)
Not difficult? I guess that's why *on a stock Fedora system* SELinux prevents my desktop computer from writing back the time to the hardware clock. Or why SELinux prevents UDEV from creating
If it isn't difficult how come the guys who cobble together the distro can't get it right?
I just turn it off and life is soooo much easier.
Re: (Score:3, Funny)
Re:100%? (Score:4, Insightful)
Everybody says that app-armor sucks with hard links, but I just don't see it. If your configuration looks like
allow all
deny read,write
then you have a problem with hard links, but it isn't relevant. In that case you have already decided to try to solve the impossible problem of listing every important file on the system. Anyone interested in security would write:
deny all
allow read
allow read,write
Then I don't have to attempt to list all the secure files on the system. All I have to do is decide what I want to grant the daemon access to. If there is a hard link to
Storing the labels in the filesystem only works if you are the distribution maintainer. If all the programs that create a particular kind of file don't agree on the label, the on-disk labels can get messed up. The simple config file in app-armor allows easy auditing.
That said, I like the possibility of securing dbus and X with the same framework as the filesystem. I'm hoping that we will see a document file access daemon for linux that allows the user to securely load and save files from a sandboxed firefox or openoffice process. Until selinux gets used for this type of desktop security instead of just network daemon security, the added power of selinux is mostly useless.
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
Why is learning something new so horrid? I know a lot of admins (sorry, most are windows admins) that are very troubled when they can't fully understand something in 10 seconds. These same guys will sit there staring at a progress bar for two hours during a windows update though (wtf?). Some things worth learning _will_ take time, and some things you learn won't be worth it. You need to take that risk sometimes, even if it seems to suck
Re: (Score:2)
SELinux is a good thing (Score:5, Insightful)
Re:SELinux is a good thing (Score:5, Insightful)
For example, consider the typical LAMP server (linux + apache + mysql + php) that hosts a web application. What does it need to protect ? It needs to protect the database with all the user data, the publicly accessible html documents and php scripts and possibly the log files.
You may also argue that it needs to protect the overall system from compromises involving using the system as a zombie or irc server etc. but in that situation a well managed server could simply have the software reinstalled. If the admins are competent and have access to spare servers they could configure the replacement machine and do a swap without incurring any downtime at all.
In this situation SE Linux might just be total overkill. The extra paranoid could have the publicly accessible html docs + php scripts on a read-only partition. This is a production environment we're talking about so the need to upload new documents will only be when upgrading software versions. If the web application allows users to upload data then that will need to be handled separately. A cron job could change file permissions on newly updated documents so apache no longer has write access. The log files can be moved to a separate location once per day when they're rotated where apache (or any other services) don't have access to them. MySQL can run chrooted, only bind to 127.0.0.1 and the database files can only have read/write access from the mysql user. Daily, or even hourly, backups of the database to read-only media can be implemented. This is on top of running an intrusion detection system, installing security updates asap, and doing all of your other post-install locking down before the network cable is even plugged in to the machine (setting up your ssh keys, firewalls, uninstalling unnecessary software - including compilers - and obviously unused daemons and anything else the paranoid admin does before the machine goes live etc.)
We're already talking about way more security than most LAMP based servers out there.
I agree that the setup could still benefit from SE Linux, particularly for the database since it's still the weakest link and one of the areas in the most need of protection. MySQL needs to read/write to the database on a regular basis and so you need to allow write access to the data files, trust your software, trust your mysql binaries (all binary files and static config files can be on read-only partitions) and nothing is preventing a root process from changing the file permissions or corrupting the data. However, for most people this setup would be more than adequate and SE Linux would be total overkill.
Re: (Score:3, Interesting)
I agree that SELinux is a good idea, but how do we get vendors to "play nicely" with it? I'm a Linux sysadmin working on a lot of Oracle database servers. Oracle says I have to
Re: (Score:2)
just how good is this? (Score:3, Interesting)
Is it better for my personal linux box to have this or is Iptables enough?
Re:just how good is this? (Score:5, Informative)
The slightly longer version: IPtables is about network access, firewalls, et cetera. SELinux is about ensuring the integrity and access rights of software on your system. It's designed to prevent, say, one process on your machine from overwriting a file it should be able to. There's a pretty good explanation of exactly what it buys you here [nsa.gov]. (Warning: government site. They're watching youuuuuu!)
The problem with SELinux is that up until recently it has been a royal pain in the ass to configure. You'd go, "Sure, this sounds like a good idea", turn it on, and then curse it roundly when you tried updating MySQL from the version that ships with RHEL to the most recent supported release from MySQL. As a result, most folks just turned it off - they figured it wasn't worth the hassle.
RHEL 5 apparently includes tools (see the article) for figuring out what's wrong with your SELinux configuration. Definitely worth looking into. But if you're not concerned with validating application integrity on your home box... and let's face it, it's a home box... probably not worth it for you until it becomes dead simple.
accursed beer makes me typo (Score:2)
Obviously rather than "prevent one process on your machine from overwriting a file it should be able to," I meant "shouldn't". Feh.
Re: (Score:2)
Never damn beer, I believe it positively enhances the slashdot experience
Re: (Score:2)
I don't use it on my personal laptop... actually, that makes me wonder -- I don't know, does Ubuntu even use it by default?
Re: (Score:2)
I know that Debian Etch does and the user selects the level of protection during install. From then on I guess it does its own thing. There is no man page and I haven't gotten around to reading up on it so I have no clue as to what it is or is not doing. I would guess that Ubuntu uses SELinux in a similar fashion. See if /etc/selinux and /usr/share/selinux exist.
Re: (Score:2)
$ aptitude search selinux
v libselinux-dev -
i libselinux1 - SELinux shared libraries
p libselinux1-dev - SELinux development headers
p python-selinux - Python bindings to SELinux shared
Re:just how good is this? (Score:5, Funny)
It's designed to prevent, say, one process on your machine from overwriting a file it should be able to.
Yeah, that pretty much sums up my experience too.
Re: (Score:3)
I haven't tried SELinux recently. Basically, it adds a whole lot more permissions and group types and hierarchies to the 3x3 standard "rwx" for user, group, world. You get permissions like "append allowed but no other writes allowed", and "editors running under your account can write to your source code files, but no other apps running under your account can write to those files". Unfortunately, managing all those permissions isn't as easy as running some chmod type of utility. Another knock against suc
Re: (Score:2)
How relevant? (Score:2)
I've looked over a few setup guides recently for MythTV on Fedora or Ubuntu (sorry but the urls are on my home machine). They nearly all say "turn SELinux off and save days of configuration pain".
I can't see the point of persisting with it if you have a SPI router and something like Firestarter.
Re: (Score:3, Informative)
I've looked over a few setup guides recently for MythTV on Fedora or Ubuntu (sorry but the urls are on my home machine). They nearly all say "turn SELinux off and save days of configuration pain".
I think those guides may be a bit outdated. SELinux were a royal PITA back in the days, but you almost never run into it on the newer Fedoras. Fedora 7 even has a little icon popping up in the notification area when SELinux denied some access request. For me it have just happened after suspend and hibernate, and then it was only two blocked file accesses.
I'm actually surprised how well Fedora 7 works. I installed it on my Dell Latitude D810 laptop yesterday, and both wireless network with WPA2, 3D deskt
100% Secure (Score:5, Interesting)
Ignoring for now that nowhere in the article does he claim that SELinux provides or is required for "100% security", there's no such damn thing. Unless you pull out the power cord, of course.
Yes, we disable SELinux at our shop. As the article mentions, it's a pain in the ass, and the tools to manage it are not mature enough. If all you have is RHEL, and you have nothing else to do, you can look at configuring it. If you have a bunch of corporate mucky-mucks breathing down your neck, and you have to get the latest version of GnuWhatever compiled for 5 different OSs, there's no time to deal with this nonsense.
SELinux probably works just great for what it was designed for - NSA top-secret systems. There's always a tradeoff between security and usability, and right now, SELinux is just above yanking the power cord.
Re: (Score:2)
If it's for a webserver/ftpserver/mailserver with ssh access it's pretty trivial to set up and use. If it's for something running a commercial *nix app that uses a dozen ports for weird undocumented stuff plus NFS disk access via amd it then becomes a pain.
Re: (Score:2)
SELinux is NOT one step above yanking the power cord -- how did this get moderated so high?
I know, I must be new here.
Re: (Score:2)
How the hell did you get a boss with a clue?
Re: (Score:2)
Re: (Score:2)
Maybe because it was, back in the days. :)
In other words, maybe some people need to update their opinions a bit. They install new releases of their distributions, but turn off SELinux just like last time without even looking at the new SELinux configuration tools, etc.
SE Linux is rarely noticable and easy to fix (Score:3, Informative)
Stuff can get painful if you go grabbing 3rd-party crap from proprietary developers without neither a clue nor a care.
Even there though, the popular stuff has already been figured out. For example, suppose you want acroread or flash or vmware. Use google, and search for the stuff being spewed into the log. Skip past the idiots who just disable SE Linux; it may help to add "chcon" (an SE Linux command that
Re: (Score:2)
It may also be easier to remember the chcon command if you know that it means CHange CONtext.
example: text relocations (Score:4, Informative)
When you make this kind of screw-up, you cause something called "text relocations". These don't even work on non-x86 and Debian bans them anyway for reasons related to memory usage. A text relocation means that the loader patches the code itself, rather slowly, when loading the shared library. This requires memory to be both writable and executable, which is a no-no for security against buffer overflows. SE Linux is usually set up to prohibit this by default.
If your broken shit runs as a server or gets loaded into a web browser, you greatly decrease security. You suck. Fix your shit.
I'm a developer too. I've upped my standards. Up yours!
Re: (Score:2)
I simply yank the network cable instead.
Some good network security tools that I use. [cableorganizer.com]
Better, but still a way to go. (Score:2, Interesting)
nope, SE Linux solves that (Score:2)
First of all, don't make the compiler have setuid-like rights and don't give it arbitrary write control over a home directory. That was pure idiocy.
For ages, UNIX-like systems have used setgid (not setuid) to solve this for game high-score files. It does allow a bug in the game (an exploit perhaps) to corrupt the files, but your favored solution doesn't fix that either. Linux adds append-only files, which might be desirable for the compiler log example.
SE Linux is
Re: (Score:2)
Linux adds append-only files, which might be desirable for the compiler log example
Linux adds them? They've been in BSD since 4.4BSD, when running at securelevel 1 or above. See man chflags.
When it comes to security, I much prefer the systrace approach to SE Linux (or SE BSD). It can be turned on on a per-process basis, and simply validates system call arguments, either denying, allowing, or allowing with elevated privilege each one. It's trivial with systrace to let your web server, running as an unprivileged user, bind to port 80, for example, and to enforce a limited chroot, wher
SELinux is a problem (Score:2, Interesting)
Just the other day, I tried to install "rt" on a brand new RHEL 5 box for a demo (we're looking into new ticket systems). I found that "yum install mysql-server" hung forever. Same with the apache install. It turns out the SELinux thinks that useradd being run by the mysql rpm (to add user "mysql") was trying to attack
Re: (Score:3, Informative)
disclaimer -- I may be completely off base because I don't use it in a production environment, I di
Re: (Score:2)
Re: (Score:2)
Maybe because it isn't meant to be turned off when installing packages? I've never been bitten by SELinux while installing packages, but of course, I don't use SELinux in a production environment (just on my home desktop and my work laptop) since I haven't yet managed to convince my colleagues to even evaluate if we could turn it on for at least some systems.
SELinux - set permissive temporarily (Score:2)
You can set it to temporarily permissive with setenforce 0.
Ironically enough when I install systems I leave it enabled, but our security administrator turns it off. He used to try to leave it on but after pulling out what little hair he had, he is opting for the easy solution these days. Fortunately he doesn't set many machines up. I think he'll go back to using it as we move to RHEL 5 since it seems to be more sanely configured.
You can find a nice note on it at: http://preview.tinyurl.com/yqjmfv [tinyurl.com] which is
Re: (Score:2)
I hope that he just sets it to permissive, as disabling it altogether usually causes a (time-consuming) relabel of the entire filesystem, though maybe only on next reboot.
doubt this is true (Score:2)
That's with the default policy. The strict policy is harder, but not by much. You just need to log in with the correct role; this is a RTFM problem.
Re: (Score:2)
You think I'm making it up? Well, I can prove it with logs:
May 21 07:56:34 mimir setroubleshoot: SELinux is preventing /usr/sbin/usera
dd (useradd_t) "read" to random (random_device_t). For complete SELinux mes
sages. run sealert -l 918e1f4a-e9d6-4703-8b36-29d2a444339a
And I didn't even notice this until just now when I was greping the log:
May 21 10:01:38 mimir setroubleshoot: SELinux prevented /usr/bin/procmail f
rom reading files stored on a NFS filesytem. For complete SELinux m
Re: (Score:2)
Try "restorecon
Better yet, run "man restorecon" and then decide what to type.
Re: (Score:2)
Re: (Score:2)
In case you hadn't noticed, "ls -Z" and "ps -M" are helpful.
Re: (Score:2)
RHEL5 is based on Fedora Core 6.
Containers.... (Score:2)
Just disable it for certain apps (Score:5, Informative)
With SELinux enabled, by detault Apache will be prevented from accessing files other than those of very basic web apps, it cannot open sockets to other hosts, etc.
For IntErnet applications this is quite reasonable and with the machine on the most hostile network around you really should use SELinux. It won't stop a break in but it can seriously curtail the effects of one.
For an IntrAnet application that is trying to write to custom log files and talk to LDAP servers and such, SELinux is not going to let you do that. At this point you have two choices - 1) tweek SELinux properties to allow only the specific functionality required by the application or 2) disable SELinux for that entire application. Considering an IntrAnet affords some physical protection, SELinux is less important in that environment and therefore, in this scenario, if you're really not savvy with SELinux and you don't have the time to get into it, I recommend just disabling it for entire application using it.
For example, to disable SELinux just for Apache you do:
# setsebool -P httpd_disable_trans 1
# service httpd restart
Note that SELinux uses db files that remember these changes so they will persist across reboots and there are no config files to edit. It's a nice system because it's easy to add these commands to install scripts and such.
So don't get bent about SELinux. Learn enough to disable it for specific apps and then turn it on all over. Keep an eye on the log files. If SELinux is stopping access to things by apps it will report it in the log file. Then determine if the app should be doing that and if so disable SELinux just for that app.
Less complex alternatives exist to SELinux. (Score:5, Interesting)
Redhat is not going to get much traction from this unless there is a very easy to use tool (preferably with GUI) to configure and customize SELinux, out of the box. The default tools on RHEL allow a few options during install time, but it is truly primitive.
There really doesn't need to be this huge love/hate relationship with SELinux, in fact why not just throw it out and use something far simpler and neater? There are several options out there. Off the top of my head I can think of GRSEC : http://www.grsecurity.net/ [grsecurity.net]
We've been using this on two of our server farms and it's been doing a superb job, and it is very very easy to customize compared to the SElinux nightmare.
Re: (Score:2)
Something you may not be thinking about -- understanding where you need your permissions on your systems is something that I'd personally recommend REGARDLESS of SELinux.
SE Linux creating problems. (Score:2)
On the issue of security. There are some Network and Domain Level hiccups. Ideally, all Linux applications should support Kerberos for their Single Sign on facility. However, in a lapse of forethought, there are some
Applications need to be reworked for SELinux (Score:2)
We know how to do serious security. Programs have to be divided into big parts that are untrusted, and small parts that are trusted. Only the latter get much in the way of privileges. The key concept is that only a small fraction of the code is trusted, and you make that code simple, paranoid, and well reviewed.
That's the application model for which SELinux is designed. This was all figured out in the early 1980s and used in a few systems in the DoD community, but the commercial community wasn't worr
SELinux locks out self-modifying code (Score:2)
Of course, SELinux does nothing about the problem that a rogue program could pipe out to gdb, a program flagged for ptrace(), and do that stuff anyway.
Re: (Score:2)
Both right (Score:4, Insightful)
Yes, there are alternatives.
Yes, some of them are easier to understand.
No, none of them give you the level and sophistication of SELinux, not even close.
No, that's not likely to change very much. Security is hard to do.
Basic idea (Score:2)
The big problem here is that SELinux is overly cryptic to configure and that the logging regarding access failures are extremely cryptic. This results in a situation where SELinux is often considered more of a problem than an enhancement. The designers of SELinux seems to have forgotten that the log files often are read by humans and that humans act upon the data from the log files and responses from commands issued.
One such ex
Re: (Score:2)
windows with it's constant prompts to do stuff while performing the same task gets very annoying and will quickly train the user to just click the allow, rendering it practically pointless.
in my experiance, other implimentations of this will prompt once in a given task and also encourage the user to think a little more as they prompt for their password (yes, i know windows can do this, but it doesn't by default)
Re: (Score:3, Funny)
windows with it's constant prompts to do stuff while performing the same task gets very annoying and will quickly train the user to just click the allow, rendering it practically pointless.
Clearly, in order to make users think about this, a 5 second delay has to be introduced before the Allow/Deny buttons are active...
Vastly different... (Score:2)
AVC is a way for an end-administrator to customize policy (or get hints on what files or network features to label for access by a service). Generally, the system administrator SHOULD NOT have to create policy unless the administrator is deploying a novel service. And its' not interactive; you don't use it during normal use, you use it during test
Re: (Score:2, Funny)
Re: (Score:2)
Re: (Score:2)
Let me introduce you to the -c option of cp, also known as --preserve=context.
Here's the thing, cp -a implies -p or --preserve=context as you put it. So the parent was doing just as you described.
/var, at this point I archived /var. I added a new virtual disk, forma
It's not just Apache that will refuse to start after you've archived a mountpoint and moved it to a different device or location. I had a similar experience using RHEL with SELinux enabled. I cloned a RHEL template in VMWare virtual center. Then I went into single user mode, and stopped remaining services writing to
Re: (Score:3, Interesting)
SELinux makes sure things that are set up don't get arbitrarily changed. It isn't prescient to know that YOU have proper authority to make those changes. You have to tell it that.
So, with SELinux you have one more step when you make substantive changes. Tell SELinux about it.
Simply moving folders or files around as root and modifying prog
Re: (Score:2)
So -p does not preserve contexts; -c does. Hint: backwards compatibility.
Re: (Score:2)
Where in the manual of cp, coreutils documentation, or SELinux documentation, does it say context preservation has anything to do with SELinux?
Re: (Score:2)
I guess you didn't use tar --selinux? From the tar manual page:
Re: (Score:2)
Re:anecdotes... (Score:2)
Re: (Score:2)
If that directory does not exist or is chmoded 000, it is still not going to work -- that might require further administrative action to correct, but it doesn't mean that Linux or Apache have anything wrong with them; that is just how the system works.
SELinux works in much the same way, except there are policy files you can edit that will automatically apply permissi
Re: (Score:2)
So you claim that SELinux, to be a well-designed system, needs to be able to read every config file format in the world so that it can "understand" that you just moved your document root and that it should update its context automatically?
May I suggest you move to Windows instead? Unix has a philosophy that does not seem to fit your mindset.
Re: (Score:2)
# ls -laZ
drwxr-xr-x root root system_u:object_r:var_log_t
drwxr-xr-x root root system_u:object_r:var_t
-rw-r----- root root user_u:object_r:var_log_t acpid
-rw------- ro
Re: (Score:3, Insightful)
Of course, it sounds like many of your uses don't call for it, but really, what's next? Saying "I yelled at the PC to copy my files -- it didn't. Until they work this out, I consider it broken."
Re: (Score:2)
SELinux is hard to use. The amount of energy required by my brain to contemplate MAC policies for all the types of situations I run into, is not w
Re: (Score:2)
The features are properly implemented in those places from what I
Re: (Score:2)
I haven't been mucking around with SELinux, but my personal guess is that you need to set the right SELinux context for the new document tree. SELinux contexts may not be copied automatically by cp, I don't know. There is a --preserve argument to cp that claims to preserve security contexts according to the manual page.
Re: (Score:2)
Maybe true: "over 1100 packages which make up RHEL5"
Not true: anywhere near 1100 server applications in RHEL5
RHEL5 probably ships about two dozen server applications. That's plenty. What, you need a gopher server?
Re: (Score:2)
No, but it is with server applications that it can be most useful, since they are the main entry port for crackers and worms. Properly configured SELinux policies prevent such attacks from succeeding.
Of course, SELinux does not protect computers from the biggest hole, the wetware between the keyboard and chair. :)
Re: (Score:2, Funny)
So where do I go to sign up for one of those consultants jobs then. I'm sure I could turn off SELinux just as well as anyone else.
Re: (Score:2)
Re: (Score:2)
It is possible to write SElinux policies for Cpanel. Perhaps no one has done it yet.
Like anything, it's all about the appropriate tool for the job. For my home desktop? Don't need it. For my nothing-really-important-hosted-here dedicated server? Don't need it. For the server at work which has confidential information on it? Absolutely. I sleep better at night knowing that regardless of your Un
Re: (Score:2)
I wish I had mod points or the time to address the post on the merits of all 3 points. I'm going to go with Stupid Poster, because that seems to be a good median place for the ~6bn people on earth!
Re: (Score:2)
Re: (Score:2)
That is because SELinux is completely orthogonal to automatic update functionality. SELinux is a fine-grained mandatory access control system that controls access to files and other resources like network ports.
Re: (Score:2)
Re: (Score:2)