O'Reilly logo

SELinux by Example: Using Security Enhanced Linux by David Caplan, Karl MacMillan, Frank Mayer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Obtaining SELinux Sample Policies

In this chapter

• A.1 Example Policy

• A.2 Reference Policy

This appendix provides instructions about how to obtain the sample policy source files discussed in this book. All the policies are freely available for use. Community support is available from many places, but the easiest methods are the SELinux mailing lists (see Appendix B, “Participation and Further Information”).

A.1 Example Policy

The example policy (both strict and targeted) we discuss in Chapter 11, “Original Example Policy,” is available from several sources. At the time of this writing, a version of the example policy was still available from the upstream SELinux source tree, but the National Security Agency (NSA) has announced ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required