![]() ![]() ![]() In the recent setools versions, this can be selectively used on either source (using -ds) or target (using -dt). ![]() In the previous setools versions, this behavior can be disabled with the -d option. For instance, when querying information related to the java_domain attribute, it will also display rules of all types that have this attribute. The sesearch application can deal with indirect source or target information. The sesearch application allows us to not just query rules based on the rule type, but also filter out those rules that match a given source expression using –source (-s) and/or target expression using –target (-t). These are Tools for analysing security policy on SELinux systems. setools is: Security-enhanced Linux is a patch of the Linux kernel and a number of utilities with enhanced security functionality designed to add mandatory access controls to Linux. We have been using the sesearch application to query standard allow rules (type enforcement related access controls) as well as the impact of SELinux booleans on these allow rules. In this tutorial we learn how to install setools on Ubuntu 21.10. You may try installing the below package as per your choice of distribution. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |