@@ -8,7 +8,7 @@ was enhanced by the NSA and released as open source software (see:
88< https://www.nsa.gov/what-we-do/research/selinux/ > ).
99
1010Each of the sections that follow will describe a component of SELinux,
11- and hopefully they are is some form of logical order.
11+ and hopefully they are in some form of logical order.
1212
1313Note: When SELinux is installed, there are three well defined directory
1414locations referenced. Two of these will change with the old and new
@@ -24,7 +24,7 @@ The SELinux filesystem that interfaces with the kernel based security server. Th
2424
2525There are many views on the usefulness of SELinux on Linux based
2626systems, this section gives a brief view of what SELinux is good at and
27- what it is not (because its not designed to do it).
27+ what it is not (because it's not designed to do it).
2828
2929SELinux is not just for military or high security systems where
3030Multi-Level Security (MLS) is required (for functionality such as 'no
@@ -55,8 +55,8 @@ and limited to the mimimum privileges required to do their job, so in a
5555 SELinux may contain any damage that maybe done intentional or
5656 otherwise. For example if an application is allowed to delete all of
5757 its data files or database entries and the bug, virus or malicious
58- user gains these privileges then it would be able to do the same,
59- however the good news is that if the policy 'confined' the
58+ user gains these privileges then it would be able to do the same.
59+ However the good news is that if the policy 'confined' the
6060 application and data, all your other data should still be there.
61617 . User login sessions can be confined to their own domains. This
6262 allows clients they run to be given only the privileges they need
@@ -68,17 +68,17 @@ and limited to the mimimum privileges required to do their job, so in a
6868 sandboxing services.
69699 . SELinux will not stop memory leaks or buffer over-runs (because its
7070 not designed to do this), however it may contain the damage that may
71- be done .
72- 10 . SELinux will not stop all viruses/malware getting into the system
73- ( as there are many ways they could be introduced (including by
71+ be caused by these flaws .
72+ 10 . SELinux will not stop all viruses/malware getting into the system,
73+ as there are many ways they could be introduced (including
7474 legitimate users), however it should limit the damage or leaks they
7575 cause.
767611 . SELinux will not stop kernel vulnerabilities, however it may limit
7777 their effects.
78- 12 . It is easy to add new rules to an SELinux policy using tools such as
79- *** audit2allow** (1)* if a user has the relevant permissions, however
80- be aware that this may start opening holes, so check what rules are
81- really required .
78+ 12 . If a user has the relevant permissions it is easy to add new rules
79+ to a SELinux policy using tools such as *** audit2allow** (1)* .
80+ Nevertheless be aware that this may start opening holes, so do
81+ double check the necessity of a given rule .
828213 . Finally, SELinux cannot stop anything allowed by the security
8383 policy, so good design is important.
8484
0 commit comments