• mholiv@lemmy.world
    link
    fedilink
    arrow-up
    24
    arrow-down
    1
    ·
    1 day ago

    I like the fact that it is a solid mandatory access control system. With SELinux you are substantially more safe than without.

    For example. Let’s say you are running a compromised version of OpenSSH. Threw a XZ style back door a hacker gets in as OpenSSH (which runs as root).

    Without SELinux the system is fully owned. With SELinux the attacker can only access what OpenSSH needs to access even if they have root. They can’t just chmod files and folders wherever. That means your photos and application data are still secure. With the pre written SELinux policies this applies not just for OpenSSH but for every piece of software installed on your system. Everything is limited to the exact folders, ports, and system capabilities that it needs and no more. Even stuff like seperate websites being served under Nginx. You can have Nginx-subgroup-1 and Nginx-subgroup-2 where the applications can’t see each other even though they are being run as the Nginx user.

    I don’t trust any Linux distro without this security layer.

    It’s a little difficult to learn and master, but it’s totally worth it if you care about security.

    Redhat put out a comic about it a few years ago explaining the basics. https://people.redhat.com/duffy/selinux/selinux-coloring-book_A4-Stapled.pdf