Summary
In this chapter, we looked at various methods for analyzing SELinux policies.
We started with single-step analysis, using the sesearch
and seinfo
tools that we've already used throughout the book. In it, we discovered that those tools have a lot of information to offer to administrators who want to analyze the active SELinux policy.
Next, we used the apol
, sedta
, and seinfoflow
tools to perform more in-depth analysis of the SELinux policy. These tools offered us insight into domain transitions (which domains are reachable from other domains) and information flow analysis (which information can eventually--given the right actions and perhaps vulnerabilities in the software--be made available without SELinux preventing the flows).
We ended the chapter with a few other analytical utilities. One of these was the use of the sediff
command, which displays the differences between two policy files, allowing administrators to ascertain whether an active policy on one system resembles another...