Skip to Main Content
SELinux by Example: Using Security Enhanced Linux
book

SELinux by Example: Using Security Enhanced Linux

by Frank Mayer, Karl MacMillan, David Caplan
July 2006
Intermediate to advanced content levelIntermediate to advanced
456 pages
9h 45m
English
Pearson
Content preview from SELinux by Example: Using Security Enhanced Linux

Appendix A. Obtaining SELinux Sample Policies

In this chapter

• A.1 Example Policy

• A.2 Reference Policy

This appendix provides instructions about how to obtain the sample policy source files discussed in this book. All the policies are freely available for use. Community support is available from many places, but the easiest methods are the SELinux mailing lists (see Appendix B, “Participation and Further Information”).

A.1 Example Policy

The example policy (both strict and targeted) we discuss in Chapter 11, “Original Example Policy,” is available from several sources. At the time of this writing, a version of the example policy was still available from the upstream SELinux source tree, but the National Security Agency (NSA) has announced ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Linux Security Cookbook

Linux Security Cookbook

Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes

Publisher Resources

ISBN: 0131963694Purchase book