2013 Red Hat Summit: SELinux for Mere Mortals

preview_player
Показать описание
While Security-Enhanced Linux (SELinux) is an incredibly powerful tool for securing Linux servers, it has a reputation for being difficult to configure. As a result, many system administrators simply turn it off. Fortunately, the incredible amount of work completed by the SELinux community in recent years has made SELinux system administrator-friendly. In this session, Thomas Cameron covers the basics of SELinux.

This session was part of the application & platform infrastructure track.

Рекомендации по теме
Комментарии
Автор


It's easier in order to follow the talk properly.

MightyCreak
Автор

You can find ALL the stuff from the specialist (T_Cameron) at his Red Hat page. He's saying it (this same thing) at the begining of every presentation.

NikTh
Автор

"thanks" for the awesome job camera operator :(

ricardoxmit
Автор

WHY did we need to see the guy and not the screen?

abjt
Автор

Chris Crosby, check on redhat com / summit / 2013 / presentations

Alejandrocortina
Автор

For subsequent presentations, instead of focusing on the speaker, effort should be made to keep the camera on the screen as it is more important and more interesting than looking at the person giving the presentation. This is a a very useful presentation, handled by a consummate professional.

c.i.armstrong
Автор

Does anyone have a pdf of the slides form the presentation? A link to the 2012 version was posted on the 2012 SELinux for Mere Mortals video. Would be great to have an updated copy.

strykker
Автор

N$A is our friend? Let's not tell that to Yoda so it don't kill him!

igrewold
Автор

Great 'quick' SELinux overview, but too many times the camera is focused on the presenter and not what he's presenting. Would've been even better otherwise.

JosephBAxenroth
Автор

Good material - thank you. Next time, please consider less camera movement; maybe best to just stay focussed on the overhead, with only very occasional shots of the speaker.

flizbarg
Автор

I know why don't you try to get your code correct in the first place like OpenBSD does (compare # of CVE in base vs nearly any linux distro) instead of closing the stable door after the horse has bolted like SELinux does. SELinux is always 100x more likely to silently break valid use cases than to actually stop a determined attacker. It might have its place on a single purpose internet facing server whose software rarely changes (though an software security update will probably still break things at least once on the server) but other than that waste of time. Not to mention grsecurity is a better RBAC system regardless.

fukRiaa
Автор

I hate this camera operator. Every time I NEED the screen, he's pointing at the guy, I don't care about the guy, I care about the slides and what he has to SAY about the slides. Please fire that camera guy.

alaskascooter