Author: mwiriadi
Update of /cvs/docs/selinux-faq/F-8/en_US In directory cvs-int.fedora.redhat.com:/tmp/cvs-serv14053/en_US
Modified Files: selinux-faq.xml Log Message: Altered website links, system-config-selinux, and general transitions to Fedora 8.
Index: selinux-faq.xml =================================================================== RCS file: /cvs/docs/selinux-faq/F-8/en_US/selinux-faq.xml,v retrieving revision 1.1 retrieving revision 1.2 diff -u -r1.1 -r1.2 --- selinux-faq.xml 16 Nov 2007 13:05:07 -0000 1.1 +++ selinux-faq.xml 17 Nov 2007 01:56:07 -0000 1.2 @@ -65,22 +65,20 @@ <listitem> <para> Writing traditional SE Linux policy HOWTO — <ulink - url="https://sourceforge.net/docman/display_doc.php?docid=21959&group_id=2126..." + url="http://www.lurking-grue.org/writingselinuxpolicyHOWTO.html" /> </para> </listitem> <listitem> <para> Reference Policy (the new policy found in &FC; 5) — <ulink - url="http://serefpolicy.sourceforge.net/" + url="http://oss.tresys.com/projects/refpolicy" /> </para> </listitem> <listitem> <para> SELinux policy development training courses — <ulink - url="http://tresys.com/services/training.shtml" - /> and <ulink url="https://www.redhat.com/training/security/courses/rhs429.html" /> </para> @@ -89,7 +87,7 @@ <para> Getting Started with SE Linux HOWTO: the new SE Linux (Debian) — <ulink - url="https://sourceforge.net/docman/display_doc.php?docid=20372&group_id=2126..." /> + url="http://www.lurking-grue.org/selinuxHOWTO.html" /> </para> </listitem> <listitem> @@ -117,7 +115,7 @@ <title>Making changes/additions to the &FED; &SEL; FAQ</title> <para> This FAQ is available at <ulink - url="http://fedora.redhat.com/docs/selinux-faq-fc5/%22%3Ehttp://fedora.redhat.com...</ulink>. + url="http://fedora.redhat.com/docs/selinux-faq-fc8/%22%3Ehttp://fedora.redhat.com...</ulink>. </para> <para> For changes or additions to the &FED; &SEL; FAQ, use this <ulink @@ -346,7 +344,7 @@ <para> For more information on enabling or disabling targeted policy on each of the specific daemons, refer to <xref - linkend="qa-using-s-c-securitylevel"/>. + linkend="qa-using-s-c-selinux"/>. </para> <para> More information on the different policies available in SELinux @@ -492,7 +490,7 @@ <para> To make the strict policy easier to use, &SEL; developers have tried to make the change from one policy to the other easier. - For example, <command>system-config-securitylevel</command> builds + For example, <command>system-config-selinux</command> builds a relabel into the startup scripts. </para> <para> @@ -540,7 +538,7 @@ understand. To do this, it uses the concepts of modularity, abstraction, and well-defined interfaces. Refer to <ulink - url="http://serefpolicy.sourceforge.net/%22/%3E + url="http://oss.tresys.com/projects%22/%3E for more information on the Reference Policy. </para> <para> @@ -740,7 +738,7 @@ are many booleans that can be set in Fedora, and they allow an administrator to configure SELinux to a great degree. To view the available booleans and modify their settings, - use <command>system-config-securitylevel</command> or the + use <command>system-config-selinux</command> or the command line tool <command>setsebool</command>. </para> </listitem> @@ -790,7 +788,7 @@ </variablelist> </answer> </qandaentry> - <qandaentry id="qa-using-s-c-securitylevel" xreflabel="How to use system-config-securitylevel"> + <qandaentry id="qa-using-s-c-selinux" xreflabel="How to use system-config-selinux"> <question> <para> How do I enable/disable &SEL; protection on specific daemons under @@ -799,13 +797,13 @@ </question> <answer> <para> - Use <command>system-config-securitylevel</command>, also known as - the <application>Security Level Configuration</application> + Use <command>system-config-selinux</command>, also known as + the <application>SELinux Management</application> graphical tool, to control the Boolean values of specific daemons. For example, if you need to disable &SEL; for Apache to run correctly in your environment, you can disable the value in - <command>system-config-securitylevel</command>. This change + <command>system-config-selinux</command>. This change disables the transition to the policy defined in <filename>apache.te</filename>, allowing <command>httpd</command> to remain under regular Linux DAC security. @@ -1066,7 +1064,7 @@ <para> Another new resource is the Writing SE Linux policy HOWTO, located online at <ulink - url="https://sourceforge.net/docman/display_doc.php?docid=21959&group_id=2126.... + url="http://www.lurking-grue.org/writingselinuxpolicyHOWTO.html%22/%3E. </para> </listitem> </itemizedlist> @@ -1182,7 +1180,7 @@ <guisubmenu>System Settings</guisubmenu> <guimenuitem>Security level</guimenuitem> </menuchoice>, or from a terminal, run - <command>system-config-securitylevel</command>. Change the + <command>system-config-selinux</command>. Change the policy as desired and ensure that the <guilabel>Relabel on next reboot</guilabel> option is enabled. </para> @@ -1379,7 +1377,7 @@ Your static webpages should now be served correctly. If you continue to have errors, ensure that the Boolean which enables user home directories is enabled. You can set it using - <command>system-config-securitylevel</command>. Select + <command>system-config-selinux</command>. Select the <guilabel>&SEL;</guilabel> tab, and then select the <guilabel>Modify &SEL; Policy</guilabel> area. Select <computeroutput>Allow HTTPD to read home @@ -1671,7 +1669,7 @@ </para> <para> If you are having trouble getting a specific application like - Apache to work, refer to <xref linkend="qa-using-s-c-securitylevel"/> + Apache to work, refer to <xref linkend="qa-using-s-c-selinux"/> for information on disabling enforcement just for that application. </para> @@ -2011,7 +2009,7 @@ <para> When debugging a daemon, you may want to turn off the transition of the daemon to its specific domain. You can do this using - <command>system-config-securitylevel</command> or + <command>system-config-selinux</command> or <command>setsebool</command> on the command line. </para> <para>