<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Implementing Mandatory Access Control with SELinux or AppArmor in Linux	</title>
	<atom:link href="https://www.tecmint.com/mandatory-access-control-with-selinux-or-apparmor-linux/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.tecmint.com/mandatory-access-control-with-selinux-or-apparmor-linux/</link>
	<description>Tecmint - Linux Howtos, Tutorials, Guides, News, Tips and Tricks.</description>
	<lastBuildDate>Sat, 27 Sep 2025 06:03:29 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: vivek koul		</title>
		<link>https://www.tecmint.com/mandatory-access-control-with-selinux-or-apparmor-linux/comment-page-1/#comment-990085</link>

		<dc:creator><![CDATA[vivek koul]]></dc:creator>
		<pubDate>Mon, 07 May 2018 07:06:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.tecmint.com/?p=20938#comment-990085</guid>

					<description><![CDATA[&lt;strong&gt;semanage fcontext -a -t httpd_sys_content_t &#039;/websrv/sites/gabriel/public_html(/.*)?&#039;&lt;/strong&gt;
Instead of using double quotation we have to use single quotations while changing the context of the file &lt;strong&gt;index.html&lt;/strong&gt;]]></description>
			<content:encoded><![CDATA[<p><strong>semanage fcontext -a -t httpd_sys_content_t &#8216;/websrv/sites/gabriel/public_html(/.*)?&#8217;</strong><br />
Instead of using double quotation we have to use single quotations while changing the context of the file <strong>index.html</strong></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Rick Rakin		</title>
		<link>https://www.tecmint.com/mandatory-access-control-with-selinux-or-apparmor-linux/comment-page-1/#comment-923226</link>

		<dc:creator><![CDATA[Rick Rakin]]></dc:creator>
		<pubDate>Sun, 15 Oct 2017 17:05:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.tecmint.com/?p=20938#comment-923226</guid>

					<description><![CDATA[Thanks for another great write-up Gabriel. There isn&#039;t much out there on &lt;strong&gt;AppArmor&lt;/strong&gt; and how it may apply to the LFCS exam and your article is a huge help. I&#039;d like to add that as of Ubuntu 16.04, in order to run the commands &lt;strong&gt;aa-enforce&lt;/strong&gt; and &lt;strong&gt;aa-complain&lt;/strong&gt;, you&#039;ll need to first install the package named &lt;strong&gt;apparmor-utils&lt;/strong&gt;. 

Once this package is installed, it also provides the command &lt;strong&gt;aa-status&lt;/strong&gt;, which does the same thing as apparmor_status.

Thanks again!]]></description>
			<content:encoded><![CDATA[<p>Thanks for another great write-up Gabriel. There isn&#8217;t much out there on <strong>AppArmor</strong> and how it may apply to the LFCS exam and your article is a huge help. I&#8217;d like to add that as of Ubuntu 16.04, in order to run the commands <strong>aa-enforce</strong> and <strong>aa-complain</strong>, you&#8217;ll need to first install the package named <strong>apparmor-utils</strong>. </p>
<p>Once this package is installed, it also provides the command <strong>aa-status</strong>, which does the same thing as apparmor_status.</p>
<p>Thanks again!</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Nick		</title>
		<link>https://www.tecmint.com/mandatory-access-control-with-selinux-or-apparmor-linux/comment-page-1/#comment-832004</link>

		<dc:creator><![CDATA[Nick]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 09:45:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.tecmint.com/?p=20938#comment-832004</guid>

					<description><![CDATA[Very useful, thanks. 

Do you also need to use &lt;strong&gt;restorecon&lt;/strong&gt; to apply the policy change for the SSH example?

I&#039;ve recently encountered an instance of SELinux blocking access to &lt;strong&gt;krb5.conf&lt;/strong&gt; when trying to setup and configure Kerberos authentication (CentOS 7). At the time I wasn&#039;t aware of SELinux, and rebooting the server had no effect on updating the newly installed packages. 

I was unable to log in physically or SSH in with a Kerberos user account, but could use SU to switch to a Kerberos user account if I logged into a local account first. This all looked PAM realted.

It turned out that disabling and re-enabling SELinux updated the SELinux policy somehow, so I didn&#039;t leave it disabled or permissive (rebooted, temporarily disabled selinux in grub by applying &lt;strong&gt;selinux=0&lt;/strong&gt; to the boot line, logged in with an account using Kerberos, then rebooted again without disabling selinux). 

I&#039;ll play again in due course with a fresh installation, and see if the commands here reveal anything interesting.]]></description>
			<content:encoded><![CDATA[<p>Very useful, thanks. </p>
<p>Do you also need to use <strong>restorecon</strong> to apply the policy change for the SSH example?</p>
<p>I&#8217;ve recently encountered an instance of SELinux blocking access to <strong>krb5.conf</strong> when trying to setup and configure Kerberos authentication (CentOS 7). At the time I wasn&#8217;t aware of SELinux, and rebooting the server had no effect on updating the newly installed packages. </p>
<p>I was unable to log in physically or SSH in with a Kerberos user account, but could use SU to switch to a Kerberos user account if I logged into a local account first. This all looked PAM realted.</p>
<p>It turned out that disabling and re-enabling SELinux updated the SELinux policy somehow, so I didn&#8217;t leave it disabled or permissive (rebooted, temporarily disabled selinux in grub by applying <strong>selinux=0</strong> to the boot line, logged in with an account using Kerberos, then rebooted again without disabling selinux). </p>
<p>I&#8217;ll play again in due course with a fresh installation, and see if the commands here reveal anything interesting.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Gabriel A. Cánepa		</title>
		<link>https://www.tecmint.com/mandatory-access-control-with-selinux-or-apparmor-linux/comment-page-1/#comment-799193</link>

		<dc:creator><![CDATA[Gabriel A. Cánepa]]></dc:creator>
		<pubDate>Thu, 14 Jul 2016 11:58:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.tecmint.com/?p=20938#comment-799193</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.tecmint.com/mandatory-access-control-with-selinux-or-apparmor-linux/comment-page-1/#comment-798956&quot;&gt;Anon&lt;/a&gt;.

@Anon,
Debian is not one of the distributions that you can choose to take the exam. In Ubuntu, you can use AppArmor.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a target="_blank" href="https://www.tecmint.com/mandatory-access-control-with-selinux-or-apparmor-linux/comment-page-1/#comment-798956">Anon</a>.</p>
<p>@Anon,<br />
Debian is not one of the distributions that you can choose to take the exam. In Ubuntu, you can use AppArmor.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Anon		</title>
		<link>https://www.tecmint.com/mandatory-access-control-with-selinux-or-apparmor-linux/comment-page-1/#comment-798956</link>

		<dc:creator><![CDATA[Anon]]></dc:creator>
		<pubDate>Wed, 13 Jul 2016 11:46:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.tecmint.com/?p=20938#comment-798956</guid>

					<description><![CDATA[Show Debian/Ubuntu based distributions examples, please.]]></description>
			<content:encoded><![CDATA[<p>Show Debian/Ubuntu based distributions examples, please.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
