SELinux is a set of kernel modifications and user-space tools that have been added to various Linux distributions.
FactSnippet No. 1,251,929 |
SELinux is a set of kernel modifications and user-space tools that have been added to various Linux distributions.
FactSnippet No. 1,251,929 |
The key concepts underlying SELinux can be traced to several earlier projects by the United States National Security Agency .
FactSnippet No. 1,251,930 |
From a purist perspective, SELinux provides a hybrid of concepts and capabilities drawn from mandatory access controls, mandatory integrity controls, role-based access control, and type enforcement architecture.
FactSnippet No. 1,251,931 |
SELinux was designed to demonstrate the value of mandatory access controls to the Linux community and how such controls could be added to Linux.
FactSnippet No. 1,251,932 |
Originally, the patches that make up SELinux had to be explicitly applied to the Linux kernel source; SELinux was merged into the Linux kernel mainline in the 2.
FactSnippet No. 1,251,933 |
Comprehensive list of the original and external contributors to SELinux was hosted at the NSA website until maintenance ceased, sometime 2009.
FactSnippet No. 1,251,934 |
For every current user or process, SELinux assigns a three string context consisting of a username, role, and domain .
FactSnippet No. 1,251,935 |
SELinux adds the -Z switch to the shell commands ls, ps, and some others, allowing the security context of the files or process to be seen.
FactSnippet No. 1,251,936 |
SELinux is popular in systems based on linux containers, such as CoreOS Container Linux and rkt.
FactSnippet No. 1,251,937 |
SELinux is available since 2005 as part of Red Hat Enterprise Linux version 4 and all future releases.
FactSnippet No. 1,251,938 |
SELinux represents one of several possible approaches to the problem of restricting the actions that installed software can take.
FactSnippet No. 1,251,939 |