Skip to content

Commit 3882444

Browse files
ikerexxepcmoore
authored andcommitted
overview: fix some minor issues
- Change is for in - Add missing apostrophe - Change comma for period - Rewrite sentence - Change bracket for comma - Rewrite whole paragraph to make it more understandable Signed-off-by: Iker Pedrosa [email protected] [PM: add a proper subject line] Signed-off-by: Paul Moore <[email protected]>
1 parent 002499a commit 3882444

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

src/selinux_overview.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ was enhanced by the NSA and released as open source software (see:
88
<https://www.nsa.gov/what-we-do/research/selinux/>).
99

1010
Each of the sections that follow will describe a component of SELinux,
11-
and hopefully they are is some form of logical order.
11+
and hopefully they are in some form of logical order.
1212

1313
Note: When SELinux is installed, there are three well defined directory
1414
locations referenced. Two of these will change with the old and new
@@ -24,7 +24,7 @@ The SELinux filesystem that interfaces with the kernel based security server. Th
2424

2525
There are many views on the usefulness of SELinux on Linux based
2626
systems, this section gives a brief view of what SELinux is good at and
27-
what it is not (because its not designed to do it).
27+
what it is not (because it's not designed to do it).
2828

2929
SELinux is not just for military or high security systems where
3030
Multi-Level Security (MLS) is required (for functionality such as 'no
@@ -55,8 +55,8 @@ and limited to the mimimum privileges required to do their job, so in a
5555
SELinux may contain any damage that maybe done intentional or
5656
otherwise. For example if an application is allowed to delete all of
5757
its data files or database entries and the bug, virus or malicious
58-
user gains these privileges then it would be able to do the same,
59-
however the good news is that if the policy 'confined' the
58+
user gains these privileges then it would be able to do the same.
59+
However the good news is that if the policy 'confined' the
6060
application and data, all your other data should still be there.
6161
7. User login sessions can be confined to their own domains. This
6262
allows clients they run to be given only the privileges they need
@@ -68,17 +68,17 @@ and limited to the mimimum privileges required to do their job, so in a
6868
sandboxing services.
6969
9. SELinux will not stop memory leaks or buffer over-runs (because its
7070
not designed to do this), however it may contain the damage that may
71-
be done.
72-
10. SELinux will not stop all viruses/malware getting into the system
73-
(as there are many ways they could be introduced (including by
71+
be caused by these flaws.
72+
10. SELinux will not stop all viruses/malware getting into the system,
73+
as there are many ways they could be introduced (including
7474
legitimate users), however it should limit the damage or leaks they
7575
cause.
7676
11. SELinux will not stop kernel vulnerabilities, however it may limit
7777
their effects.
78-
12. It is easy to add new rules to an SELinux policy using tools such as
79-
***audit2allow**(1)* if a user has the relevant permissions, however
80-
be aware that this may start opening holes, so check what rules are
81-
really required.
78+
12. If a user has the relevant permissions it is easy to add new rules
79+
to a SELinux policy using tools such as ***audit2allow**(1)*.
80+
Nevertheless be aware that this may start opening holes, so do
81+
double check the necessity of a given rule.
8282
13. Finally, SELinux cannot stop anything allowed by the security
8383
policy, so good design is important.
8484

0 commit comments

Comments
 (0)