The “targeted” policy confines certain network daemons to run in their own specific “security domain”. These daemons include dhcpd, httpd (apache), named, nscd, ntpd, portmap, snmpd, squid, and syslogd.
When I setup apache on a system where it wil be utilized, I have a habit of not using /var/www/html as my starting point for document roots, but rather create a dir at /home/websites and place my document roots in there. In the good ol’ days of Discretionary Access Controls (DAC) just making sure that apache had the perms it needed to read the documents in there was enough (using chmod, chown, and the like).
Not so with SELinux enabled. In addition to the regular DAC we’re all used to, we now have Mandatory Access Controls (MAC) that define security contexts for files/directories etc. Turns out it looks like by default, apache only has access to /var/www/html when it’s fired up…. I’m guessing that and probably /var/log/httpd (which is exactly as it should be). To enable apache to view my files in /home/websites, I had to apply a new security context to these files. The answer to this is the chcon command. To be brief, the full command I executed was:
chcon -R -t httpd_sys_content_t /home/websites
After executing this, apache could read my files.
I like where this SELinux thing is going. Permissions done right, for sure. This doesn’t come with out growing pains though. It’s complex (or so it seems to me after only working with it for a couple days) and will take some time to learn. I’m prepared for some frustration….
Now many of you are probably asking yourself why would anyone (let alone me) want to bother with this? Well I think a simple example of one of the cool things is that even though something like /etc/passwd has DAC octal perms of 644 (rw-r–r–), apache still can’t read it because that file is not with in apache’s security context. So any users on your system can’t write a little script that reads your /etc/passwd file and basically posts it on a web page for the world to see (giving potential crackers a list of valid user accounts on the system).
Actually this is a little bit extra security that provide by SELinux e.g. Security Enhanced!
Ohh, one more tips to change the direcotry live…
chcon --reference=/var/www <your website directory> chcon --reference=/var/www/html <your public_html directory>
I suggest you to make a shell script to put it together… with following commands…
useradd <your website user name> #password and other necessary staff to point home directory chmod --reference=/var/www /home/<your website user name> mkdir /home/<your website user name>/public_html # most probably the following line need not to execute chmod --reference=/var/www/html /home/<your website user name>/public_html # then do other necessary staff for your website suppose add virtual host, ftp user, database user etc.
nJoy…
I normally don’t comment with my schedule but your article nailed selinux and the safety of it. It’s the reason why I chose redhat systems over Ubuntu. selinux is NSA so its solid.
no doubt selinux is NSA and its solid… thanks for your comment