index_P

     
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

packages, installing
packet_perms macro
packet_socket (object security class) 2nd
pam program
parent and child processes 2nd
parsing log messages
passwd (object security class) 2nd
passwd command 2nd 3rd
passwords
        setting for users
patch cycles and 0-day vulnerabilities
PaX project
permissions
        adding
        associated with classes
        associated with file-like objects
        extending to processes in domain
        restricting, with constraint declarations
        special notations for
permissive mode
        booting system into
        curtailing unnecessary logging
        dynamically setting operating mode
        setting, before using Audit2allow
persistent labels
        filesystems not supporting
        filesystems supporting
persistent objects
persistent security identifiers (PSIDs), storing on filesystems
pidfile type attribute
ping command, controlling access to
ping.fc file, examining sample policy
ping.te file
        basic policy elements
        conditional statement declaration in
        domain_auto_trans macro, invoked in
        examining sample policy
        role type declarations in
pipefs (pseudofilesystem with pipe)
policy Booleans
        initializing in ping.te file
        setting via SELinux filesystem
        tuning SELinux via
Policy Components tab (Apol window) 2nd
policy constraint declarations
policy database of SELinux security server
policy elements
        and associated files
        list of 2nd
        subelements appearing in
policy files 2nd [See also SELinux policy]
        browsing/editing with SePCuT
        checkpolicy command 2nd
        choosing to delete
        compiling
        compiling from source
        creating/loading
policy Makefile target 2nd
policy management tools
Policy Modules tab (Sepcut window)
Policy Rules tab (Apol window) 2nd
policy source directory files
policy source tree 2nd
policy structure of SELinux
policy.<Emphasis>??<Default Para Font> file 2nd
policy.conf file 2nd
        analyzing, with Apol tool
        checkpolicy command and
policy.conf tab (Apol window)
policy.spec file
policy_config_t type
policy_src_t type
poly_t type
pop_port_t type
port_t type
port_type type attribute
portcon declarations
ppp_device_t type
principle of least privilege
        authorizing Nmap access and
        Fedora Core SELinux implementation and
        mandatory access control
        network declarations and
print_spool_t type
priv_system_role type attribute
privfd type attribute
privhome type attribute
privileges, escalating
privlog type attribute 2nd
privmail type attribute
privmem type attribute
privmodule type attribute
privowner type attribute
privrole type attribute
privuser type attribute
/proc, types related to
proc_kcore_t type
proc_kmsg_t type
proc_t type
process (object security class) 2nd
processes
        child/parent 2nd
        choosing security contexts
        creating
        and programs, distinctions between
        RBAC (role-based access control)
        reporting security context of
        security context of
procfs.te file
program execution problems, troubleshooting
program subdirectory
        domains directory 2nd
        file_contexts directory 2nd
        macros directory 2nd
Propolice project
protecting memory from 0-day attacks
ps command 2nd 3rd
pseudofilesystems, mounting 2nd
pseudoterminal filesystem (devpts)
PSIDs (persistent security identifiers), storing on filesystems
ptrace facility
        exploited during Apache OpenSSL attack 2nd 3rd
pty_slave_label macro
ptyfile type attribute 2nd

 


SELinux. NSA's Open Source Security Enhanced Linux
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors: Bill McCarty

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net