1 |
On Mon, Jan 10, 2011 at 08:44:06AM -0500, Chris PeBenito wrote: |
2 |
> On 1/6/2011 5:32 PM, Sven Vermeulen wrote: |
3 |
> > I've been working on bringing the SELinux handbook as currently available on |
4 |
> > http://www.gentoo.org/proj/en/hardened/selinux/selinux-handbook.xml more |
5 |
> > up2date. It's somewhat of a rewrite, but with all elements of the original |
6 |
> > SELinux handbook still inside it (apart from the troubleshooting as I guess |
7 |
> > those are quite outdated, being from 2006 and older). |
8 |
> |
9 |
> The troubleshooting is not outdated, though there could be a few additions. |
10 |
|
11 |
Yup, Chris Richards already mentioned that. It should be available in the |
12 |
current draft already. |
13 |
|
14 |
> I looked through section 1 and 2 of the pdf version, and here are my |
15 |
> notes so far: |
16 |
|
17 |
Thanks for the feedback, really appreciated. I've incorporated most (if not |
18 |
all) of your comments. |
19 |
|
20 |
> 1.2.2 I don't understand the point of this section |
21 |
[... Section on OS Security ...] |
22 |
> 1.2.3 I'd say this is not appropriate for this document. |
23 |
[... Section on security best practices ...] |
24 |
|
25 |
I wanted to give some pointers to the readers how they should position |
26 |
SELinux within security. Using SELinux isn't effective if other aspects of a |
27 |
secure system aren't looked at. |
28 |
|
29 |
The reason I put that in the first part was because it shouldn't be |
30 |
described further (users that are interested should then start looking for |
31 |
other resources), but (imho) gives users the impression where they |
32 |
should position SELinux within their own security strategy. |
33 |
|
34 |
I've commented out the two sections for now. |
35 |
|
36 |
Again, thanks for the feedback! |
37 |
|
38 |
Wkr, |
39 |
Sven Vermeulen |