7.2 Review of SELinux Policy Syntax

     

As explained in Chapter 6, an SELinux policy consists of 11 elements, several of which are optional:


classes

Defines the security object classes recognized by SELinux.


initial_sids

Defines initial SIDs for important security objects.


access_vectors

Defines access vectors associated with each security object class.


mls

Defines MLS configuration (optional).


te_rbac

Defines type-enforcement and role-based access control configuration.


users

Defines the user configuration.


constraints

Defines constraints that the security policy must observe (optional).


initial_sid_contexts

Defines the security contexts of important security objects.


fs_use

Defines the method of labeling of filesystem inodes.


genfs_contexts

Defines security contexts for filesystems lacking persistent labels (optional).


net_contexts

Defines security contexts for network objects.

The te_rbac element specifies both the role-based access control policies and the type-enforcement policies. Within the element, role-based access control and type-enforcement declarations can be freely intermingled. The following section explains the SELinux type-enforcement declarations.



SELinux. NSA's Open Source Security Enhanced Linux
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors: Bill McCarty

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net