@@ -8,7 +8,7 @@ was enhanced by the NSA and released as open source software (see:
8
8
< https://www.nsa.gov/what-we-do/research/selinux/ > ).
9
9
10
10
Each of the sections that follow will describe a component of SELinux,
11
- and hopefully they are is some form of logical order.
11
+ and hopefully they are in some form of logical order.
12
12
13
13
Note: When SELinux is installed, there are three well defined directory
14
14
locations referenced. Two of these will change with the old and new
@@ -24,7 +24,7 @@ The SELinux filesystem that interfaces with the kernel based security server. Th
24
24
25
25
There are many views on the usefulness of SELinux on Linux based
26
26
systems, this section gives a brief view of what SELinux is good at and
27
- what it is not (because its not designed to do it).
27
+ what it is not (because it's not designed to do it).
28
28
29
29
SELinux is not just for military or high security systems where
30
30
Multi-Level Security (MLS) is required (for functionality such as 'no
@@ -55,8 +55,8 @@ and limited to the mimimum privileges required to do their job, so in a
55
55
SELinux may contain any damage that maybe done intentional or
56
56
otherwise. For example if an application is allowed to delete all of
57
57
its data files or database entries and the bug, virus or malicious
58
- user gains these privileges then it would be able to do the same,
59
- however the good news is that if the policy 'confined' the
58
+ user gains these privileges then it would be able to do the same.
59
+ However the good news is that if the policy 'confined' the
60
60
application and data, all your other data should still be there.
61
61
7 . User login sessions can be confined to their own domains. This
62
62
allows clients they run to be given only the privileges they need
@@ -68,17 +68,17 @@ and limited to the mimimum privileges required to do their job, so in a
68
68
sandboxing services.
69
69
9 . SELinux will not stop memory leaks or buffer over-runs (because its
70
70
not designed to do this), however it may contain the damage that may
71
- be done .
72
- 10 . SELinux will not stop all viruses/malware getting into the system
73
- ( as there are many ways they could be introduced (including by
71
+ be caused by these flaws .
72
+ 10 . SELinux will not stop all viruses/malware getting into the system,
73
+ as there are many ways they could be introduced (including
74
74
legitimate users), however it should limit the damage or leaks they
75
75
cause.
76
76
11 . SELinux will not stop kernel vulnerabilities, however it may limit
77
77
their effects.
78
- 12 . It is easy to add new rules to an SELinux policy using tools such as
79
- *** audit2allow** (1)* if a user has the relevant permissions, however
80
- be aware that this may start opening holes, so check what rules are
81
- really required .
78
+ 12 . If a user has the relevant permissions it is easy to add new rules
79
+ to a SELinux policy using tools such as *** audit2allow** (1)* .
80
+ Nevertheless be aware that this may start opening holes, so do
81
+ double check the necessity of a given rule .
82
82
13 . Finally, SELinux cannot stop anything allowed by the security
83
83
policy, so good design is important.
84
84
0 commit comments