Tom Brown wrote:
> tell said managers to open the coffers and pay for support if they are
> that worried
Well, it hasn't happened to me (yet). I just thought that it might be
why some people seem to be somewhat worried.
Regards
Ingemar
___
CentOS mai
Tom Brown wrote:
> why is everyone getting so jumpy - its only a domain name thats at
> stake, he's been AWOL for a year or more and the project has been OK
>
> people should worry less
I understand the worries. The news have reached the front page of
Slashdot, and thus might reach certain tec
Jim Perrin wrote:
With CentOS 5, you don't really need the selinux module source
anymore. It's usually enough to clear the logs and in permissive mode,
run the offending application. Then 'grep yourapp
/var/log/audit/audit.log | audit2allow -M localmodname'. Check the
module for sanity and make
Hi.
I'm trying to figure out where the SELinux policy modules shipped with
the system live, and how they work. The modules listed by 'semodule -l'
are the same as those available in
/etc/selinux/targeted/modules/active/modules, but those are not part of
any package, and are presumably added a
Fajar Priyanto wrote:
On Tuesday 15 April 2008 16:13:55 William L. Maltby wrote:
How sensitive is the data and how critical are the functions that that
could be disrupted? What is the scope of exposure to intrusion from
outside the organization (LAN, firewalls, in place, etc.).
For example rsy
Ingemar Nilsson wrote:
/etc/selinux/targeted/contexts/files/file_contexts.local works fine
for me. Did you use restorecon afterwards to relabel the relevant
files/directories?
It works now, I don't know what mistake I made. Thanks anyway.
It only works when using the
Daniel de Kok wrote:
On Mon, Apr 14, 2008 at 5:05 PM, Ingemar Nilsson <[EMAIL PROTECTED]> wrote:
but rather put one or more similar files somewhere. A file_contexts.d
firectory would be nice, but it isn't available. Just creating your own
file_contexts.local file does not work, I al
Hi.
Do anyone know of some place to put custom SELinux file context
specifications? I would prefer not to append lines to
/etc/selinux/targeted/contexts/files/file_contexts
but rather put one or more similar files somewhere. A file_contexts.d
firectory would be nice, but it isn't available.
Tim Alberts wrote:
I got keys setup so I know
I'm talking to my server.
This is probably not what he meant. You can use a key pair to
authenticate with the SSH server and turn off password authentication
entirely. That makes password guessing attacks utterly impossible,
because the server w
9 matches
Mail list logo