SELinux ‐ Deepdive with Red Hat - lpcyber1/SEC440 GitHub Wiki
Guided lab #1
-
Changed selinux setting to permissive
-
Changed it back to enforcing
-
Rebooted to check setting again
Guided lab #2
-
Start lab
-
Made custom directory and index file
-
Edit http.conf file
-
Enabled httpd
-
No permissions
-
Added permissions
-
Browsed to the page
Guided lab #3
-
Started lab
-
Edited Apache feature for editing content from home directory
-
Created student index.html file
-
Edited permissions for home directory
-
No access
-
Changed selinx settings to allow access
-
Allowed access
Guided lab #4
-
Started lab
-
No access
-
Found error and command to run
-
Set selinux properly to allow access
- Access
Module Lab
-
Started lab, no permissions
-
Finding reason, and latest instance of error with
less /var/log/messages
and searching forsealert
-
Ran the proper commands to add access so httpd content can be served
-
Have access
-
Grade
Reflection
- I feel like this was a great lab for many reasons. I haven't had many issues with selinux permissions or erros from it in general in previous classes. This was the first class where I had to change things with it so it is great experience to understand how to track down errors it could have through logs. I also got to see other selinux content outside of relation to this lab within my system specifically other settings related to it. So I have an idea of what selinux could hold in the future.