User:SwifT/Installation

SELinux is a mandatory access control system which enables a more fine-grained mechanism where the security administrator defines what a user can do. Unlike the standard discretionary access control in place for Linux (where the end user can still decide for himself how his resources are accessed by others) a mandatory access control system is fully governed through a security policy. With SELinux, enforcement of the access controls is done by the Linux kernel, governed through a security policy that is loaded at start of the system.

Introduction
Linux has a well-known discretionary access control system, based on the permission mask set on resources and the ownership of the resource versus the run-time privileges of a process. Some additional security features are available as well, such as capabilities and extended ACLs, which allow administrators to fine-tune the secure state of their system. But even all those features still prove to be discretionary in their model.

A discretionary model means that the owner of a resource can still decide how the resource is shared on the system. A directory can be made world-writable by its owner, and from that point onwards all processes on the system can write to the directory. With a mandatory access control system, the access to resources is governed through a mandatory system that cannot be worked around from. With SELinux, this is the SELinux security subsystem running in the Linux kernel.

SELinux in Gentoo
The integration of SELinux in Gentoo is handled by the SELinux subproject of the Gentoo Hardened project.


 * SELinux userspace
 * Upstream: 2.3-rc1 (testing), 2.2 (stable)
 * Gentoo: 2.3-rc1 (~arch), 2.2 (stable)
 * SELinux policies
 * Upstream: 20140311
 * Gentoo: 20140311 (stable)