LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
SELinux
Want to know how to make Linux really secure? Security Enhanced Linux (SE Linux), a system of security policies developed by the NSA, let you secure Linux at every level from the kernel up. Find out how EnGarde Secure Linux and others build and maintain a truly secure server environment.


SELinux and Fedora  30 July 2008 
Source: lwn.net - Posted by Bill Keys   
Red Hat has undoubtedly done more to make SELinux usable than any other organization, but has it actually reached the point where it can be enabled by default for all desktops? The Fedora project clearly thinks so. Not only is SELinux enabled, but the installer no longer has an option to disable it or to put it into "permissive" mode. Most of the posts in a thread on the fedora-devel mailing list see that as the right choice, but some are not so sure. This article looks at how SELinux is working on the Fedora desktop. It brings up a interesting question on how useful is SELinux on a Linux Desktop? What do you think?
 
Principle of Least Privilege Prevails, Says Red Hat Security Expert  16 July 2008 
Source: searchenterpriselinux - Posted by Bill Keys   
Linux security may seem daunting, but there are a host of best practices to simplify the maze. Recently, Steve Grubb of Red Hat Inc. outlined some important security principles, including minimizing admin access, the increasing sophistication of SELinux and the importance of auditing systems. Like many when I think about least privileges, I think about SELinux. What do you think about? This article is a interview with a Red Hat expert that answers questions about SELinux and least privileges.
 
Ruby Bindings for libselinux  11 July 2008 
Source: SELinux News - Posted by Bill Keys   
Dan Walsh has announced preliminary Ruby support for libselinux (the core SELinux management library). This is to enable the integration of the Puppet systems management tool with SELinux, and should also allow other Ruby applications to be similarly integrated. I can see some uses for this but how many ruby applications will be using these binding for libselinux? Will we see more programming language having binding to this SELinux library?
 
Reference Policy 20080702 Released  03 July 2008 
Source: SELinuxNews - Posted by Bill Keys   
Chris PeBenito has announced the latest release of Reference Policy. Notable changes in this release include the ability to specify SELinux roles in loadable policy modules, improved labeled networking support, and new policy modules for virtualization packages. This release improved the functionality of SELinux loadable policy modules. With this update SELinux seems to be in the right direction, what do you think?
 
Take a look at NetLabel Tools 0.18  30 June 2008 
Source: SELinuxNews - Posted by Bill Keys   
Paul Moore of HP has announced the release of version 0.18 of NetLabel Tools, a suite for managing explict labeled networking (i.e. attaching labels to packets via IP options) under Linux. This release adds support for static and fallback labels in the 2.6.25 kernel, in addition to several bugfixes and enhancements. Do you use SELinux for on your system to improve it's security and use NetLabel? If so what do you think about it? Does it help make managing a SELinux installed machine?
 
Core SELinux Version R080611 Released  12 June 2008 
Source: SELinux News - Posted by Bill Keys   
The NSA have announced the release of updated version of the core SELinux code, available from their web site. This release includes support for permissive domains (allowing permissive mode on a per-domain basis), user and role mapping via sepol, and various minor fixes and enhancements.
 
SELinux and Ubuntu  03 June 2008 
Source: help.ubuntu.com - Posted by Bill Keys   
Security-enhanced Linux (SELinux) was originally developed as a research prototype of the Linux® kernel and a number of utilities with enhanced security functionality designed to demonstrate the value of mandatory access controls to the Linux community and how such controls could be added to Linux. Today SELinux is integrated into the mainline Linux 2.6 kernel series and several Linux distributions. The Security-enhanced Linux kernel contains new architectural components originally developed to improve the security of the Flask operating system. Have you used the latest Ubuntu version with SELinux enabled? If so what was your experience? This article is a step by step guide to learning how-to setup SELinux with Ubuntu. Test it out and let us know how it goes.
 
User Access Control in Drupal 6  14 April 2008 
Source: Packt Publishing - Posted by Eckie Silapaswang   
In this article by David Mercer, we will look at an entirely different aspect of running a Drupal website. Once we have added the functionality to the site, we now have to give some thoughts about how this functionality is to be accessed, or by whom. As the site grows, you will most likely feel the need to delegate certain responsibilities to various people. Alternatively, you might organize a team of people to work on specific aspects of the site. Whatever is required, at some stage you will have to make decisions about who can do what, and Drupal makes sure that it is possible to do precisely this.

This article on access control in Drupal has many similarities to implementing policies in SELinux. For those of you who are new to SELinux and are unsure of how "it works", this article may provide insight through a practical example of roles and permissions in a microcosm CMS world.

 
2008 SELinux Developer Summit Call for Participation  08 April 2008 
Source: selinuxproject - Posted by Bill Keys   
The SELinux Developer Summit will be a one day summit intended to provide a forum for focused technical discussion regarding current and future development plans for SELinux and related Flask/TE projects. The intended audience will consist of current SELinux developers, system/security administrators, distribution organizers/packagers, and power users. The format will be a mix of presentations and moderated discussion, including a panel where attendees will be invited to submit questions and feedback. The SELinux Developer Summit is looking for people to take part in the action. Will you be one of them?
 
Reference Policy 20080402 Is Here  04 April 2008 
Source: SELinuxNews - Posted by Bill Keys   
Tresys have announced the release of the latest version of Reference Policy. A notable highlight in this release is the addition of core infrastructure for X window (XACE/XSELinux). There’s also new support for wireshark, policy refinements for several already supported applications, and general enhancements including 64-bit capability support and updates for labeled networking. One interesting part of this release is XSELinux. Do you think this will improve the usability and security of x-windows? I personal don't have any experience with (XACE/XSELinux) so if anyone does feel free on make a comment about it.
 
<< Start < Prev 1 2 3 Next > End >>

Results 21 - 30 of 88
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
USB is now UEC (use with extreme caution)
iPhone Encryption and the Return of the Crypto Wars
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.