From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1QHLxB-0006Ab-Om for garchives@archives.gentoo.org; Tue, 03 May 2011 20:12:18 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id A82101C001; Tue, 3 May 2011 20:12:10 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id 689431C001 for ; Tue, 3 May 2011 20:12:10 +0000 (UTC) Received: from pelican.gentoo.org (unknown [66.219.59.40]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 793C51B4053 for ; Tue, 3 May 2011 20:12:09 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by pelican.gentoo.org (Postfix) with ESMTP id DD94980505 for ; Tue, 3 May 2011 20:12:08 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <37823f895ec2add96e802cedcf0d13d909bfa08e.SwifT@gentoo> Subject: [gentoo-commits] proj/hardened-docs:master commit in: xml/selinux/ X-VCS-Repository: proj/hardened-docs X-VCS-Files: xml/selinux/hb-intro-concepts.xml xml/selinux/hb-using-install.xml X-VCS-Directories: xml/selinux/ X-VCS-Committer: SwifT X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: 37823f895ec2add96e802cedcf0d13d909bfa08e Date: Tue, 3 May 2011 20:12:08 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: quoted-printable X-Archives-Salt: X-Archives-Hash: b730b6293322a2c03065c5e3999f82a1 commit: 37823f895ec2add96e802cedcf0d13d909bfa08e Author: Sven Vermeulen siphos be> AuthorDate: Tue May 3 20:09:22 2011 +0000 Commit: Sven Vermeulen siphos be> CommitDate: Tue May 3 20:09:22 2011 +0000 URL: http://git.overlays.gentoo.org/gitweb/?p=3Dproj/hardened-docs= .git;a=3Dcommit;h=3D37823f89 Add information on ubac USE flag as well as other SELinux-related USE fla= gs --- xml/selinux/hb-intro-concepts.xml | 9 ++++- xml/selinux/hb-using-install.xml | 56 +++++++++++++++++++++++++++++++= ++++- 2 files changed, 61 insertions(+), 4 deletions(-) diff --git a/xml/selinux/hb-intro-concepts.xml b/xml/selinux/hb-intro-con= cepts.xml index f1cbc71..4a3ea90 100644 --- a/xml/selinux/hb-intro-concepts.xml +++ b/xml/selinux/hb-intro-concepts.xml @@ -7,8 +7,8 @@ =20 -3 -2011-04-15 +4 +2011-05-03 =20
Introduction @@ -510,6 +510,11 @@ which has write access to the domain of the file, bu= t can still not write to the file because the SELinux users' differ.

=20 +

+At this moment, Gentoo Hardened SELinux' supports both policies with and +without UBAC. This is controlled through the ubac USE flag. +

+
diff --git a/xml/selinux/hb-using-install.xml b/xml/selinux/hb-using-inst= all.xml index 30dc495..a6a61a3 100644 --- a/xml/selinux/hb-using-install.xml +++ b/xml/selinux/hb-using-install.xml @@ -197,14 +197,66 @@ installation is completed. =20

+Don't update your system yet - we will need to install a couple of packa= ges in a +particular order which Portage isn't aware of in the next couple of sect= ions.=20 +

+ + + + +Update make.conf + + +

Edit your /etc/make.conf file and set FEATURES=3D"-loadpolicy". The current SELinux profile enables the loadpolicy feature, but this isn't supported anymore so can be safely ig= nored.

=20

-Don't update your system yet - we will need to install a couple of packa= ges in a -particular order which Portage isn't aware of in the next couple of sect= ions.=20 +Next, take a look at the following USE flags and decide if you want to e= nable +or disable them. +

+ + + + + + + + + peer_perms + Enabled + + The peer_perms capability controls the SELinux policy network peer c= ontrols. + If set, the access control mechanisms that SELinux uses for network = based + labelling are consolidated. This setting is recommended as the polic= y is + also updated to reflect this. If not set, the old mechanisms (NetLab= el and + Labeled IPsec) are used side by side. + + + + open_perms + Disabled + + The open_perms capability enables the SELinux permission "open" for = files + and file-related classes.=20 + + + + ubac + Disabled + + When enabled, the SELinux policy is built with user-based access con= trol + enabled. This is optional as it introduces constraints that might be + difficult to notice at first when you hit them. + + +
USE flagDefault ValueDescription
+ +

+Make your choice and update the USE variable in +/etc/make.conf.

=20