Solved

SE Linux management > Is it best set to Enforcing mode . Disabled? (fedora 14)  - Linux n00b

Posted on 2011-03-22
3
419 Views
Last Modified: 2012-05-11

Mate set it like this on a test box.

Should I revert to Permissive or enforcing?

HAving no joy setting up SWAT and Im wondering if this is the spanner in the setup works.

0
Comment
Question by:fcek
3 Comments
 
LVL 31

Accepted Solution

by:
farzanj earned 167 total points
Comment Utility
Enforcing is good but you have to know what you are doing.  If you are using GUI and SELinux tools, it gives you tips what to do.

Set it to permissive and make sure everything is running that way it is running.  Make sure to check the logs and SELinux messages in Permissive mode that informs about issues.  Once all the issues are resolved, set it to enforcing.

Most people in the Linux world don't know how to use SELinux and therefore hate it.  It is a very good tool provided that you know how to use it and you can reap the full range of security benefits if you can write your own policies!

If you don't care about this extra layer of security and want to avoid hassle, you may simply disable it.
0
 
LVL 29

Assisted Solution

by:fosiul01
fosiul01 earned 167 total points
Comment Utility
You should use Permissive or disabled...

best is just disabled it.

you will have to be really really good in linux to use selinux with every services....

I hardly see people use selinux  , and most of the time you will see linux base software is saying, turn off the selinux ..

example. if you go for Virtual server, selinux will be off straight way..

so dont worry about selinux.. just disable it for time being.

0
 
LVL 76

Assisted Solution

by:arnold
arnold earned 166 total points
Comment Utility
SELinux is a tool that helps secure one's system from different type of attacks. And in an event when an attack gets on the server, selinux in some cases will make it harder for the attacker to further damage/compromise the system.

0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

I am a long time windows user and for me it is normal to have spaces in directory and file names. Changing to Linux I found myself frustrated when I moved my windows data over to my new Linux computer. The problem occurs when at the command line.…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now