packages, installing packet_perms macro packet_socket (object security class) 2nd pam program parent and child processes 2nd parsing log messages passwd (object security class) 2nd passwd command 2nd 3rd passwords setting for users patch cycles and 0-day vulnerabilities PaX project permissions adding associated with classes associated with file-like objects extending to processes in domain restricting, with constraint declarations special notations for permissive mode booting system into curtailing unnecessary logging dynamically setting operating mode setting, before using Audit2allow persistent labels filesystems not supporting filesystems supporting persistent objects persistent security identifiers (PSIDs), storing on filesystems pidfile type attribute ping command, controlling access to ping.fc file, examining sample policy ping.te file basic policy elements conditional statement declaration in domain_auto_trans macro, invoked in examining sample policy role type declarations in pipefs (pseudofilesystem with pipe) policy Booleans initializing in ping.te file setting via SELinux filesystem tuning SELinux via Policy Components tab (Apol window) 2nd policy constraint declarations policy database of SELinux security server policy elements and associated files list of 2nd subelements appearing in policy files 2nd [See also SELinux policy] browsing/editing with SePCuT checkpolicy command 2nd choosing to delete compiling compiling from source creating/loading policy Makefile target 2nd policy management tools Policy Modules tab (Sepcut window) Policy Rules tab (Apol window) 2nd policy source directory files policy source tree 2nd policy structure of SELinux policy.<Emphasis>??<Default Para Font> file 2nd policy.conf file 2nd analyzing, with Apol tool checkpolicy command and policy.conf tab (Apol window) policy.spec file policy_config_t type policy_src_t type poly_t type pop_port_t type port_t type port_type type attribute portcon declarations ppp_device_t type principle of least privilege authorizing Nmap access and Fedora Core SELinux implementation and mandatory access control network declarations and print_spool_t type priv_system_role type attribute privfd type attribute privhome type attribute privileges, escalating privlog type attribute 2nd privmail type attribute privmem type attribute privmodule type attribute privowner type attribute privrole type attribute privuser type attribute /proc, types related to proc_kcore_t type proc_kmsg_t type proc_t type process (object security class) 2nd processes child/parent 2nd choosing security contexts creating and programs, distinctions between RBAC (role-based access control) reporting security context of security context of procfs.te file program execution problems, troubleshooting program subdirectory domains directory 2nd file_contexts directory 2nd macros directory 2nd Propolice project protecting memory from 0-day attacks ps command 2nd 3rd pseudofilesystems, mounting 2nd pseudoterminal filesystem (devpts) PSIDs (persistent security identifiers), storing on filesystems ptrace facility exploited during Apache OpenSSL attack 2nd 3rd pty_slave_label macro ptyfile type attribute 2nd