A
A
avp2018-03-28 11:37:23
linux
avp, 2018-03-28 11:37:23

Am I editing the selinux policy correctly?

sealert after parsing the audit.log suggests actions via audit2allow or setsebool. I have read that it is not safe to use audit2allow. Is it so?

Answer the question

In order to leave comments, you need to log in

1 answer(s)
A
alexander, 2018-03-28
@beza2000

I think setsebool is safe.
audit2allow is dangerous. You just need to understand what you allow. Usually all requests to something are allowed, which is dangerous and in some cases tantamount to disabling selinux.
But usually - you have no other choice: either all you need is to allow, or rebuild / reconfigure your subsystem in a different way, so as not to use audit2allow, or whether to develop your own policy for yourself (requires a deeper understanding of selinux).

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question