Book Image

Linux: Powerful Server Administration

By : Jonathan Hobson, William Leemans, Uday Sawant, Oliver Pelz
Book Image

Linux: Powerful Server Administration

By: Jonathan Hobson, William Leemans, Uday Sawant, Oliver Pelz

Overview of this book

Linux servers are frequently selected over other server operating systems for their stability, security and flexibility advantages.This Learning Path will teach you how to get up and running with three of the most popular Linux server distros: Ubuntu Server, CentOS 7 Server, and RHEL 7 Server. We will begin with the Ubuntu Server and show you how to make the most of Ubuntu’s advanced functionalities. Moving on, we will provide you with all the knowledge that will give you access to the inner workings of the latest CentOS version 7. Finally, touching RHEL 7, we will provide you with solutions to common RHEL 7 Server challenges.This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products: 1)Ubuntu Server Cookbook 2)CentOS 7 Linux Server Cookbook, Second Edition 3)Red Hat Enterprise Linux Server Cookbook
Table of Contents (6 chapters)

Chapter 14. Working with SELinux

In this chapter, we will cover the following topics:

  • Installing and configuring important SELinux tools
  • Working with SELinux security contexts
  • Working with policies
  • Troubleshooting SELinux

Introduction

This chapter is a collection of recipes that strive to demystify Security-Enhanced Linux (SELinux), a mature technology for hardening your Linux system using additional security features added to the basic security system. It has been around for many years in the CentOS world but nevertheless is a somewhat little-known and confusing topic for a lot of system administrators.

Installing and configuring important SELinux tools

The most significant security feature of any Linux system is providing access control—often called Discretionary Access Control (DAC)—which allows the owner of an object (such as a file) to set security attributes for it (for example, deciding who can read or write to a file using the chown and chmod commands). While...