web/html/docs/selinux-faq-fc5 index.php,1.6,1.7

Karsten Wade (kwade) fedora-websites-list at redhat.com
Thu Jun 8 22:34:23 UTC 2006


Author: kwade

Update of /cvs/fedora/web/html/docs/selinux-faq-fc5
In directory cvs-int.fedora.redhat.com:/tmp/cvs-serv5536

Modified Files:
	index.php 
Log Message:
Publishing results of fixes for bz #193535 and #193540.


View full diff with command:
/usr/bin/cvs -f diff  -kk -u -N -r 1.6 -r 1.7 index.php
Index: index.php
===================================================================
RCS file: /cvs/fedora/web/html/docs/selinux-faq-fc5/index.php,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- index.php	6 Jun 2006 19:28:13 -0000	1.6
+++ index.php	8 Jun 2006 22:34:21 -0000	1.7
@@ -1,20 +1,3576 @@
 <?
-include("site.inc");
 
+include("site.inc");
 $template = new Page;
-$template->initCommon();
-
+$template->initCommon(); 
 $template->displayHeader();
 
 ?>
-<h1>SELinux FAQ for Fedora Core 5</h1>
 
-<p>The SELinux FAQ, a compendium of common questions regarding SELinux in Fedora Core 5, is available in the following languages:</p>
+<div class="article" lang="en">
+<div class="titlepage">
+<div>
+<div><h1 class="title">
+<a name="selinux-faq"></a>Fedora Core 5 SELinux FAQ</h1></div>
+<div><div class="authorgroup">
+<div class="author"><h3 class="author">
+<span class="firstname">Karsten</span> <span class="surname">Wade</span>
+</h3></div>
+<div class="author"><h3 class="author">
+<span class="firstname">Chad</span> <span class="surname">Sellers</span>
+</h3></div>
+</div></div>
+<div><p class="othercredit"><span class="firstname">Francesco</span> <span class="surname">Tombolini</span></p></div>
+<div><p class="copyright">Copyright © 2004, 2005 Red Hat, Inc., Karsten Wade</p></div>
+<div><p class="copyright">Copyright © 2006 Chad Sellers, Paul W. Frields</p></div>
+<div><div class="legalnotice">
+<a name="legalnotice-opl"></a><p><a name="opl.permission"></a>
+    Permission is granted to copy, distribute, and/or modify this
+    document under the terms of the Open Publication Licence, Version
+    1.0, or any later version. The terms of the OPL are set out below.
+  </p>
+<div class="orderedlist">
+<a name="opl.terms"></a><ol type="I">
+<li>
+<a name="opl.require"></a><h2>
+<a name="id2991430"></a>REQUIREMENTS ON BOTH UNMODIFIED AND MODIFIED
+	VERSIONS</h2>
+<p>
+	Open Publication works may be reproduced and distributed in
+	whole or in part, in any medium physical or electronic, provided
+	that the terms of this license are adhered to, and that this
+	license or an incorporation of it by reference (with any options
+	elected by the author(s) and/or publisher) is displayed in the
+	reproduction.
+      </p>
+<p>
+	Proper form for an incorporation by reference is as follows:
+      </p>
+<p>
+	Copyright (c) <year> by <author's name or designee>.
+	This material may be distributed only subject to the terms and
+	conditions set forth in the Open Publication License, vX.Y or
+	later (the latest version is presently available at <a href="http://www.opencontent.org/openpub/" target="_top">http://www.opencontent.org/openpub/</a>).
+      </p>
+<p>
+	The reference must be immediately followed with any options
+	elected by the author(s) and/or publisher of the document (see
+	section VI). Commercial redistribution of Open
+	Publication-licensed material is permitted. Any publication in
+	standard (paper) book form shall require the citation of the
+	original publisher and author. The publisher and author's names
+	shall appear on all outer surfaces of the book. On all outer
+	surfaces of the book the original publisher's name shall be as
+	large as the title of the work and cited as possessive with
+	respect to the title.
+      </p>
+</li>
+<li>
+<a name="opl.copyright"></a><h2>
+<a name="id3010536"></a>COPYRIGHT</h2>
+<p>
+	The copyright to each Open Publication is owned by its author(s)
+	or designee.
+      </p>
+</li>
+<li>
+<a name="opl.scope"></a><h2>
+<a name="id3001093"></a>SCOPE OF LICENSE</h2>
+<p>
+	The following license terms apply to all Open Publication works,
+	unless otherwise explicitly stated in the document.
+      </p>
+<p>
+	Mere aggregation of Open Publication works or a portion of an
+	Open Publication work with other works or programs on the same
+	media shall not cause this license to apply to those other
+	works. The aggregate work shall contain a notice specifying the
+	inclusion of the Open Publication material and appropriate
+	copyright notice.
+      </p>
+<p>
+	SEVERABILITY. If any part of this license is found to be
+	unenforceable in any jurisdiction, the remaining portions of the
+	license remain in force.
+      </p>
+<p>
+	NO WARRANTY. Open Publication works are licensed and provided
+	"as is" without warranty of any kind, express or implied,
+	including, but not limited to, the implied warranties of
+	merchantability and fitness for a particular purpose or a
+	warranty of non-infringement.
+      </p>
+</li>
+<li>
+<a name="opl.modified.works"></a><h2>
+<a name="id3006930"></a>REQUIREMENTS ON MODIFIED WORKS</h2>
+<p>
+	All modified versions of documents covered by this license,
+	including translations, anthologies, compilations and partial
+	documents, must meet the following requirements:
+      </p>
+<div class="orderedlist"><ol type="1">
+<li><p>
+	    The modified version must be labeled as such.
+	  </p></li>
+<li><p>
+	    The person making the modifications must be identified and
+	    the modifications dated.
+	  </p></li>
+<li><p>
+	    Acknowledgement of the original author and publisher if
+	    applicable must be retained according to normal academic
+	    citation practices.
+	  </p></li>
+<li><p>
+	    The location of the original unmodified document must be
+	    identified.
+	  </p></li>
+<li><p>
+	    The original author's (or authors') name(s) may not be used
+	    to assert or imply endorsement of the resulting document
+	    without the original author's (or authors') permission.
+	  </p></li>
+</ol></div>
+</li>
+<li>
+<a name="opl.good-practice"></a><h2>
+<a name="id2994932"></a>GOOD-PRACTICE RECOMMENDATIONS</h2>
+<p>
+	In addition to the requirements of this license, it is requested
+	from and strongly recommended of redistributors that:
+      </p>
+<div class="orderedlist"><ol type="1">
+<li><p>
+	    If you are distributing Open Publication works on hardcopy
+	    or CD-ROM, you provide email notification to the authors of
+	    your intent to redistribute at least thirty days before your
+	    manuscript or media freeze, to give the authors time to
+	    provide updated documents. This notification should describe
+	    modifications, if any, made to the document.
+	  </p></li>
+<li><p>
+	    All substantive modifications (including deletions) be
+	    either clearly marked up in the document or else described
+	    in an attachment to the document.
+	  </p></li>
+<li><p>
+	    Finally, while it is not mandatory under this license, it is
+	    considered good form to offer a free copy of any hardcopy
+	    and CD-ROM expression of an Open Publication-licensed work
+	    to its author(s).
+	  </p></li>
+</ol></div>
+</li>
+<li>
+<a name="opl.options"></a><h2>
+<a name="id3008214"></a>LICENSE OPTIONS</h2>
+<p>
+	The author(s) and/or publisher of an Open Publication-licensed
+	document may elect certain options by appending language to the
+	reference to or copy of the license. These options are
+	considered part of the license instance and must be included
+	with the license (or its incorporation by reference) in derived
+	works.
+      </p>
+<p>
+	A. To prohibit distribution of substantively modified versions
+	without the explicit permission of the author(s). "Substantive
+	modification" is defined as a change to the semantic content of
+	the document, and excludes mere changes in format or
+	typographical corrections.
+      </p>
+<p>
+	To accomplish this, add the phrase 'Distribution of
+	substantively modified versions of this document is prohibited
+	without the explicit permission of the copyright holder.' to the
[...3191 lines suppressed...]
+<p>
+	      For files, <code class="computeroutput">relabelfrom</code> means "Can
+	      domain D relabel a file from (i.e. currently in) type T1?" and
+	      <code class="computeroutput">relabelto</code> means "Can domain D
+	      relabel a file to type T2?", so both checks are applied upon a
+	      file relabeling, where T1 is the original type of the type and T2
+	      is the new type specified by the program.
+	    </p>
+<p>
+	      Useful documents to look at: 
+	    </p>
+<div class="itemizedlist"><ul type="disc">
+<li><p>
+	          Object class and permission summary by Tresys <a href="http://tresys.com/selinux/obj_perms_help.shtml" target="_top">http://tresys.com/selinux/obj_perms_help.shtml</a>
+	        </p></li>
+<li><p>
+	          Implementing SELinux as an LSM technical report (describes
+	          permission checks on a per-hook basis) <a href="http://www.nsa.gov/selinux/papers/module-abs.cfm" target="_top">http://www.nsa.gov/selinux/papers/module-abs.cfm</a>.
+		  This is also available in the selinux-doc package
+		  (and more up-to-date there).
+	        </p></li>
+<li><p>
+		  Integrating Flexible Support for Security Policies into the
+		  Linux Operating System - technical report (describes original
+		  design and implementation, including summary tables of
+		  classes, permissions, and what permission checks are applied
+		  to what system calls. It is not entirely up-to-date with
+		  current implementation, but a good resource nonetheless).
+		  <a href="http://www.nsa.gov/selinux/papers/slinux-abs.cfm" target="_top">http://www.nsa.gov/selinux/papers/slinux-abs.cfm</a>
+		</p></li>
+</ul></div>
+</td>
+</tr>
+<tr class="qandadiv"><td align="left" valign="top" colspan="2">
+<a name="faq-div-deploying-selinux"></a><h4 class="title">
+<a name="faq-div-deploying-selinux"></a>1.4. Deploying SELinux</h4>
+</td></tr>
+<tr class="toc" colspan="2"><td align="left" valign="top" colspan="2"><dl>
+<dt>Q: <a href="#id2964994">
+              What file systems can I use for SELinux?
+            </a>
+</dt>
+<dt>Q: <a href="#id2965028">
+              How does SELinux impact system performance?
+            </a>
+</dt>
+<dt>Q: <a href="#id2965059">
+              What types of deployments, applications, and systems should I
+	      leverage SELinux in?
+            </a>
+</dt>
+<dt>Q: <a href="#id2965128">
+              How does SELinux affect third-party applications?
+            </a>
+</dt>
+</dl></td></tr>
+<tr class="question">
+<td align="left" valign="top">
+<a name="id2964994"></a><a name="id2964996"></a><b>Q:</b>
+</td>
+<td align="left" valign="top"><p>
+              What file systems can I use for SELinux?
+            </p></td>
+</tr>
+<tr class="answer">
+<td align="left" valign="top"><b>A:</b></td>
+<td align="left" valign="top">
+<p>
+              The file system must support
+              <code class="computeroutput">xattr</code> labels in the right
+              <em class="parameter"><code>security.*</code></em> namespace.  In addition to
+              ext2/ext3, XFS has recently added support for the necessary
+              labels.
+            </p>
+<p>
+	      Note that XFS SELinux support is broken in upstream kernel
+	      2.6.14 and 2.6.15, but fixed (worked around)
+	      in 2.6.16.  Your kernel must include this fix if
+	      you choose to use XFS with SELinux.
+	    </p>
+</td>
+</tr>
+<tr class="question">
+<td align="left" valign="top">
+<a name="id2965028"></a><a name="id2965035"></a><b>Q:</b>
+</td>
+<td align="left" valign="top"><p>
+              How does SELinux impact system performance?
+            </p></td>
+</tr>
+<tr class="answer">
+<td align="left" valign="top"><b>A:</b></td>
+<td align="left" valign="top"><p>
+              This is a variable that is hard to measure, and is heavily
+	      dependent on the tuning and usage of the system running SELinux.
+	      When performance was last measured, the impact was around 7% for
+	      completely untuned code.  Subsequent changes in system components
+	      such as networking are likely to have made that worse in some
+	      cases.  SELinux performance tuning continues to be a priority of the
+	      development team.
+            </p></td>
+</tr>
+<tr class="question">
+<td align="left" valign="top">
+<a name="id2965059"></a><a name="id2965061"></a><b>Q:</b>
+</td>
+<td align="left" valign="top"><p>
+              What types of deployments, applications, and systems should I
+	      leverage SELinux in?
+            </p></td>
+</tr>
+<tr class="answer">
+<td align="left" valign="top"><b>A:</b></td>
+<td align="left" valign="top">
+<p>
+              Initially, SELinux has been used on Internet facing servers that are
+	      performing a few specialized functions, where it is critical to
+	      keep extremely tight security.  Administrators typically strip
+	      such a box of all extra software and services, and run a very
+	      small, focused set of services.  A Web server or mail server is a
+	      good example.
+            </p>
+<p>
+              In these edge servers, you can lock down the policy very tightly.
+	      The smaller number of interactions with other components makes
+	      such a lock down easier.  A dedicated system running a specialized
+	      third-party application would also be a good candidate.
+            </p>
+<p>
+              In the future, SELinux will be targeted at all environments. In
+	      order to achieve this goal, the community and
+	      <em class="firstterm">independent software vendors</em>
+	      (<span class="abbrev">ISV</span>s) must work with the SELinux developers to
+	      produce the necessary policy. So far, a very restrictive
+	      <em class="firstterm">strict policy</em> has been written, as well as
+	      a <em class="firstterm">targeted policy</em> that focuses on specific,
+	      vulnerable daemons.
+            </p>
+<p>For more information about these policies, refer to <a href="#qa-whatis-policy">What is SELinux policy?</a> and <a href="#qa-whatis-targeted-policy">What is the    SELinux targeted policy?</a>.
+	    </p>
+</td>
+</tr>
+<tr class="question">
+<td align="left" valign="top">
+<a name="id2965128"></a><a name="id2965130"></a><b>Q:</b>
+</td>
+<td align="left" valign="top"><p>
+              How does SELinux affect third-party applications?
+            </p></td>
+</tr>
+<tr class="answer">
+<td align="left" valign="top"><b>A:</b></td>
+<td align="left" valign="top">
+<p>
+              One goal of implementing a targeted SELinux policy in Fedora Core is to
+	      allow third-party applications to work without modification.  The
+	      targeted policy is transparent to those unaddressed applications,
+	      and it falls back on standard Linux DAC security.  These
+	      applications, however, will not be running in an extra-secure
+	      manner. You or another provider must write policy to protect these
+	      applications with MAC security.
+            </p>
+<p>
+              It is impossible to predict how every third-party application
+	      might behave with SELinux, even running the targeted policy.  You
+	      may be able to fix issues that arise by changing the policy.  You
+	      may find that SELinux exposes previously unknown security issues
+	      with your application.  You may have to modify the  application to
+	      work under SELinux.
+            </p>
+<p>
+              Note that with the addition of <a href="#faq-entry-whatare-policy-modules">Policy Modules</a>, it is now possible
+	      for third-party developers to include policy modules with their
+	      application. If you are a third-party developer or a
+	      package-maintainer, please consider including a policy module
+	      in your package. This will allow you to secure the behavior
+	      of your application with the power of SELinux for any user
+	      installing your package.
+           </p>
+<p>
+              One important value that Fedora Core testers and users bring to the
+	      community is extensive testing of third-party applications. With
+	      that in mind, please bring your experiences to the appropriate
+	      mailing list, such as the fedora-selinux list, for discussion. For
+	      more information about that list, refer to <a href="http://www.redhat.com/mailman/listinfo/fedora-selinux-list/" target="_top">http://www.redhat.com/mailman/listinfo/fedora-selinux-list/</a>.
+            </p>
+</td>
+</tr>
+</tbody>
+</table>
+</div>
+</div>
+</div>
 
 <?
 
 $template->displayFooter('$Date$');
 
 ?>
+




More information about the Fedora-websites-list mailing list