[ale] October meeting topic - SELinux

Jim Kinney jim.kinney at gmail.com
Wed Aug 25 16:12:18 EDT 2010


hopefully the bells will be joined with other attire.

On Wed, Aug 25, 2010 at 3:29 PM, Richard Faulkner <rfaulkner at 34thprs.org>wrote:

>  I second that on "anything" that could be covered in 90-120 minutes.  I
> know "zilch"
> about SELinux so have a fertile mind for new information on the topic.  I
> would be
> there with bells on....
>
> Rich in Lilburn
>
>
>
> -----Original Message-----
> *From*: Michael B. Trausch <mike at trausch.us<%22Michael%20B.%20Trausch%22%20%3cmike at trausch.us%3e>
> >
> *Reply-to*: Atlanta Linux Enthusiasts - Yes! We run Linux! <ale at ale.org>
> *To*: Atlanta Linux Enthusiasts - Yes! We run Linux! <ale at ale.org<Atlanta%20Linux%20Enthusiasts%20-%20Yes%21%20We%20run%20Linux%21%20%3cale at ale.org%3e>
> >
> *Subject*: Re: [ale] October meeting topic - SELinux
> *Date*: Tue, 24 Aug 2010 13:49:58 -0400
>
> On Tue, 2010-08-24 at 11:14 -0400, Jim Kinney wrote:
> > I have informed Aaron I will give a meeting in October on SELinux. I
> > am tinkering with SEPostgres - yes, that's SELinux extensions for
> > PostgreSQL! - and wanted a feel for interest, i.e. how far down the
> > rabbit hole should I look at for the talk?
> >
> > NOTE: My talks are notoriously long - I think the last one was 90
> > minutes - and this one will likely be no different.
> >
> > I'm looking at an overview of SELinux and how to work with it, uses of
> > the multi-level, multi-category security model (much more than the
> > "strict" mode) and a practical example of a database using it natively
> > (along with the process of patch -n- build, etc).
>
> I, for one, would be interested in anything that you can reasonably
> cover in a 90 to 120 minute window, even if I have to read 120,000 words
> of text afterwards to understand it all.  :-)
>
> That said, here are a few things that I can think of that I would like
> to know:
>
>   * WRT implementing SELinux on an existing system, is there some method
>     of determining what rules would be good to implement by scanning the
>     system?
>   * Is there a method of remote management of SELinux rules?
>   * Can it do things like require that a cryptographic key is used to
>     access a system over a username and password, particularly for
>     privileged operations?
>   * Along the same lines as the last question, how high-level can
>     SELinux requirements get?
>   * Is it worthwhile for use in a small network (< 5 servers)?
>   * Is it useful inside of virtual machines (for example, are there
>     SELinux "namespaces" that can be used inside of something like LXC
>     so that all that has to happen for SELinux to work in the containers
>     is to have the SELinux modules loaded on the host?
>   * Assuming that the last question is answered in the affirmative,
>     is it also possible to have SELinux used on the host to do something
>     like say "VMs can do whatever, bound by their own SELinux policies,
>     as long as they don't break out into the host system?"
>
> I could probably ask 100 questions, but these are the biggest ones that
> I can think of that I would like answers to (or pointers to answers to).
>
> 	--- Mike
>
> _______________________________________________
> Ale mailing listAle at ale.orghttp://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists athttp://mail.ale.org/mailman/listinfo
>
>
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>
>


-- 
-- 
James P. Kinney III
I would rather stumble along in freedom than walk effortlessly in chains.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.ale.org/pipermail/ale/attachments/20100825/66cf1338/attachment-0001.html 


More information about the Ale mailing list