I am totally new to Linux yet your video made it extremely simple. I wish all instructors would take some lessons from you :) Thanks so much!!!
@redhat11 жыл бұрын
Hi Randall, See Thomas's reply below. Pleas go to the Red Hat Summit website, you can find them there. Thanks for checking out the video!
@ManvirSinghP4L6 жыл бұрын
Link to the slides: people.redhat.com/tcameron/Summit2012/SELinux/cameron_w_120_selinux_for_mere_mortals.pdf
@Dirtbag35910 жыл бұрын
This video was a life saver. The chcon command was driving me nuts because I didn't quite understand what I was doing when I was using it. All I knew was at times there would be instructions giving me a chcon command to enter verbatim into to the terminal which is easy enough when its given to you but if I was in a situation where it wasn't laid out for me I was screwed. Now at the very least I know what types I need to be looking for when using chcon if I want a file to possess certain attributes. Not to mention when I use ls -Z I don't feel like a complete idiot. Obviously I still have a lot more to learn but a lot of the key fundamentals for SELinux clicked with this lecture. So in short many thanks for having this lecture posted on the channel.
@nikikovacs19237 жыл бұрын
I used to turn off SELinux on RHEL/CentOS for a few years, but this presentation really made me want to dive into it and get a grasp. Thanks a lot, Thomas Cameron!
@ThomasCameron11 жыл бұрын
Hi Abhijit - You could use regular old permissions (DAC) to grant access to files in /proc. Then if you are still getting avc denials, use the steps I described in the video to grant privileges.
@iandennison471610 жыл бұрын
Would be nice to hear the questions asked by audience members (or see a transcript on screen), but very good presentation.
@hannahs20589 жыл бұрын
This was extremely helpful, thank you very much.
@XSFlanger11 жыл бұрын
Thank you for comprehensive and entertaining presentation! I was also always scared about whole this MAC concept, but sometime you've got to learn and use it :)
@ElTebe7 жыл бұрын
I like this helpful & clear presentation. @Thomas Cameron thank you!
@KumbaIvor7 жыл бұрын
Excellent. This made SELinux so easy for me to deal with.
@moltenaluminium10 жыл бұрын
Dear camera man, If he's pointing at / reading the screen, It probably is something you shuold want to point the camera at.
@ThomasCameron12 жыл бұрын
Look at the Red Hat Summit web site, the slides are available there.
@SonnetGomes7 жыл бұрын
Thank you so much for explaining it so simply. It really isnt' as confusing as it seemed to be. Thank you for simplifying the core concepts so well :-)
@DanBowkley11 жыл бұрын
This has come a really long way since I last played with it. Mayne I won't get a headache this time! :D
@BillyPuzaras9 жыл бұрын
This is SO GOOD that I wish I could give it a 100 thumbs up
@ThomasCameron8 жыл бұрын
+Billy “NotFromBrooklyn” Puzaras Thank you very much, that means a lot!
@1337flite11 жыл бұрын
One area that SE Liniux can have an impact is really time sensitive stuff. A guy I worked with ran into it with network connections for cross site RAC. Even in permissive mode - as the permissive mode is still running the checks.
@ameyamagashe6 жыл бұрын
Simply superb! I liked the video very much
@robertstein684710 жыл бұрын
The presenter did an excellent job with describing each area thoroughly to ensure the simplest person can understand it and kept my attention throughout. This has been an excellent overview of SELinux and I feel much more confident tackling it in the future. Thank You Thomas. Is it possible to get the PowerPoint presentation?
@ThomasCameron9 жыл бұрын
+Robert Stein people.redhat.com/tcameron/
@brianredbeard11 жыл бұрын
One important thing to note: the logging location for most selinux events is no longer /var/log/messages but /var/log/audit/audit.log? Want to do a quick check? # grep AVC /var/log/audit/audit.log
@ThomasCameron9 жыл бұрын
+Brian Redbeard pretty sure I talked about that in the slides. Good to hear from you, man!
@gw00tw00t11 жыл бұрын
Great talk Thomas. Made me accept to get along with SELinux.
@CTimmerman8 жыл бұрын
Does it not suffice to use Linux's built-in DAC to allow httpd to only read its own data and only write its own logs?
@mojola210 жыл бұрын
I wish the director would leave up the slides -- where the useful information is. Not much point in seeing the speaker.
@flizbarg11 жыл бұрын
I had mentioned a location for slides that turned out to be for an older presentation. The slides for this one can be found using the concatentation of these path components without any spaces: rhsummit.files.wordpress. com /2012/03/ cameron_selinux_for_mere_mortals.pdf When I cut'n'paste path strings from these comments I end up with extraneous junk in them not visible in the actual comments...? It's easy to remove as each instance is typically a percent char followed by 2 hex chars.
@redhat12 жыл бұрын
Thanks, brainst0rmVideo!
@Caddy66611 жыл бұрын
If possible, could you guys subtitle the question? i can't hear them....
@adefwrrea11 жыл бұрын
This was needed, thank you
@doge-coin8 жыл бұрын
Very clear. Thank you so much sir.
@ChrisLindbergh9 жыл бұрын
Thank you Charles Atlas!! ;)
@achak0111 жыл бұрын
Hey Thomas!! thanks for the session. I really wouldlike t oknow one thing here. Isit really possible to read or set any modes on the /proc file ssytem so that i can grant privilege to a non root user to check the pfiles ?
@traviseddy238610 жыл бұрын
Can you put a link to those slides in your videos description/info? thanks
@ThomasCameron9 жыл бұрын
+Travis Eddy people.redhat.com/tcameron/
@gabe123212 жыл бұрын
change xom and put com and remove the extra space for the correct link
It's funny, because I use to deride anyone who was paranoid about selinux and suggest they learn the code.. but after hearing about the NSA's work with hard drive vendors and the possible inclusion of bacdoors in closed source firmware it got me thinking - wouldn't it be entirely feasible to trigger the installation, from the firmware, of a backdoor when a very specific policy violation is fired? I mean, daemons like Apache are open to the entire web.. from that perspective you could read all the code you want.. you won't find anything obvious. I really want a fully open platform - all devices.. keyboards.. the lot.
@ThomasCameron11 жыл бұрын
If we were talking about closed source binaries, I might concur. But in this case, it's all Open Source. The code is thoroughly analyzed by Red Hat engineers and the greater Open Source community - folks who are NOT fans of the NSA. If there were any back doors, they would be found pretty quickly. Imagine your reputation if you were the security guy who found nefarious NSA code! There are a TON of folks digging through the code. It's safe.
@LemonPieLoL11 жыл бұрын
Thomas Cameron I think you have misread my comment. Firmware in hard drives IS closed source. Your brain just went into auto pilot I think.
@ThomasCameron10 жыл бұрын
LemonPieLoL I think you misread my response. It was to TheKetsa.
@joeyofblades7 жыл бұрын
Camera guy please, look at the god damned slides... holyshit
@GuitarsAndSynths7 жыл бұрын
SELinux unfortunately does not play well with Oracle!
@machinelearningid39313 жыл бұрын
I understand selinux now
@chuckmccarty353610 жыл бұрын
Camera guy.... Get a clue! WE WANT TO SEE AAALLLL OF THE SLIDES!!!!!