med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

364
active users

#selinux

1 post1 participant0 posts today
Tris<p>If there's any job opening related to <a href="https://chaos.social/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a>, let me know :) </p><p><a href="https://chaos.social/tags/getfedihired" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>getfedihired</span></a> <a href="https://chaos.social/tags/redhat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhat</span></a></p>
openSUSE Linux<p>Find out what happened in this <a href="https://fosstodon.org/tags/oSC25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oSC25</span></a> talk about the switch of <a href="https://fosstodon.org/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> as the default MAC system in <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> Tumbleweed, This talk will explore the shift from <a href="https://fosstodon.org/tags/AppArmor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppArmor</span></a> and the lessons learned. A must-watch for those following system security! 🐧 <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> <a href="https://youtu.be/8wBLbhSjDwE?si=1fOBIHkq1KkU5ynV" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/8wBLbhSjDwE?si=1fOBIH</span><span class="invisible">kq1KkU5ynV</span></a></p>
Richard Chamberlain<p>Tried integrating ROS2 on Oracle Linux with SELinux—no go.<br>Switched to AppArmor on Ubuntu—easier, yes. Effective? Not quite.</p><p>colcon and AppArmor don’t play well together. Turns out, AppArmor’s simplicity can limit it in complex dev environments.</p><p>Here’s my story, what didn’t work, and where I’m heading next:<br>🔗 <a href="https://richard-sebos.github.io/sebostechnology/posts/AppArmor-ROS2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">richard-sebos.github.io/sebost</span><span class="invisible">echnology/posts/AppArmor-ROS2/</span></a></p><p>Boosts appreciated if you think secure ROS2 needs better tooling. 🧵</p><p><a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.social/tags/ROS2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ROS2</span></a> <a href="https://mastodon.social/tags/AppArmor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppArmor</span></a> <a href="https://mastodon.social/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> <a href="https://mastodon.social/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Robotics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Robotics</span></a></p>
openSUSE Linux<p><a href="https://fosstodon.org/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> becomes default on openSUSE! Learn how Mandatory Access Control evolves for Tumbleweed at the <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> Conference. 🔐 <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://events.opensuse.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">events.opensuse.org/</span><span class="invisible"></span></a></p>
ricardo :mastodon:<p>Fortifying <a href="https://fosstodon.org/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> With <a href="https://fosstodon.org/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> by Enforcing Mandatory Access Control for Ultimate System Security </p><p><a href="https://www.linuxjournal.com/content/fortifying-debian-selinux-enforcing-mandatory-access-control-ultimate-system-security" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linuxjournal.com/content/forti</span><span class="invisible">fying-debian-selinux-enforcing-mandatory-access-control-ultimate-system-security</span></a></p>
Rasmus Lindegaard<p>I am experimenting with MicroOS running btrfs and SELinux. </p><p>I have some storage i use for Minecraft server data for instance, on the partition i have a directory with readonly snapshots. The server will not boot properly, because it's running auto relabeling and cannot relabel the readonly stuff. </p><p>What's the correct way to handle this? I've tried mounting the partition in different locations, but it seems everything is targeted by the relabel</p><p><a href="https://fosstodon.org/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a> <a href="https://fosstodon.org/tags/microos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microos</span></a> <a href="https://fosstodon.org/tags/OpenSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSUSE</span></a></p>
TZL<p>Anyone currently have a take on the <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> concerns of <a href="https://mstdn.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mstdn.social/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> user <a href="https://mstdn.social/tags/namespaces" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>namespaces</span></a> <a href="https://mstdn.social/tags/usernamespaces" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>usernamespaces</span></a>? I have been rereading into it wondering whether enabling or disabling is the best approach. They seem rather insignificant with considerable surface area for attack, from my understanding. However, more applications check for/need them nowadays.</p><p>I think kernel <a href="https://mstdn.social/tags/hardening" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardening</span></a> advice is still to disable. Makes me wonder if should e.g. be considered only if <a href="https://mstdn.social/tags/AppArmor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppArmor</span></a> / <a href="https://mstdn.social/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> is active.</p>
Jan ☕🎼🎹☁️🏋️‍♂️<p>Been testing out the <a href="https://fedi.kcore.org/tags/virtiofs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virtiofs</span></a> support now baked into <a href="https://fedi.kcore.org/tags/proxmoxVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmoxVE</span></a>. It works, had to do some <a href="https://fedi.kcore.org/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a> adjustments on <a href="https://fedi.kcore.org/tags/fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedora</span></a> to allow my <a href="https://fedi.kcore.org/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a> containers to use the mountpoint. Added this policy</p><p>```<br>(allow container_t unlabeled_t ( dir ( read write )))<br>```</p><p>In raw speed it is definitely not a winner - <a href="https://fedi.kcore.org/tags/nfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nfs</span></a> is easily double the speed. But on this particular VM I don't need the speed - it is nice that this is all self-contained now, and I can actually remove NFS altogether.</p><p><a href="https://fedi.kcore.org/tags/proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmox</span></a></p>
FurbyOnSteroids<p>Ah.. nothing beats spending 2 hour trying to create a simple <a href="https://ohai.social/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a> service + timer + bash script to back up an sqlite database every week and it just not working because random permission issues just for selinux to be the culprit. Love how you need another tool to actually understand wtf <a href="https://ohai.social/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> wants from you. <a href="https://ohai.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
Scott Williams 🐧<p>I recently read my 8 year old daughter the <a href="https://mastodon.online/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> coloring book before school. I'm training up the next generation of <a href="https://mastodon.online/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> adventurers!</p><p><a href="https://mastodon.online/tags/parenting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>parenting</span></a> <a href="https://mastodon.online/tags/RedHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedHat</span></a></p>
Marcus "MajorLinux" Summers<p>Just had my first disagreement with a coworker.</p><p>It was all about <a href="https://toot.majorshouse.com/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a>.</p><p>Come to find out, the issue wasn't even about that.</p><p>A file was just missing.</p><p>I'm now sitting in my comfy chair trying to calm down.</p>
Hacker Public Radio<p>New Episode: hpr4328 :: Use SELinux the easy way</p><p>You don't have to be an expert on SELinux to use it effectively</p><p>Hosted by Klaatu on Wednesday, 2025-03-05 is flagged as Clean and is released under a CC-BY-SA license.</p><p>Tags: <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a>, <a href="https://infosec.exchange/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a>, <a href="https://infosec.exchange/tags/permissions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>permissions</span></a>. </p><p>Today on the <a href="https://infosec.exchange/tags/HackerPublicRadio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerPublicRadio</span></a> <a href="https://infosec.exchange/tags/Community" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Community</span></a> <a href="https://infosec.exchange/tags/Podcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcast</span></a>​</p><p><a href="https://infosec.exchange/tags/HPR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HPR</span></a> ❤️ <a href="https://infosec.exchange/tags/CreativeCommons" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CreativeCommons</span></a></p><p><a href="https://hackerpublicradio.org/eps/hpr4328/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackerpublicradio.org/eps/hpr4</span><span class="invisible">328/index.html</span></a></p>
Danathar<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@Htbaa" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Htbaa</span></a></span> Don’t make Dan Walsh cry! </p><p><a href="https://stopdisablingselinux.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">stopdisablingselinux.com/</span><span class="invisible"></span></a></p><p>I’m told he answers questions about selinux.</p><p><a href="https://twit.social/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a> <a href="https://twit.social/tags/redhat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhat</span></a> <a href="https://twit.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
Christiaan Kras<p>Ugh <a href="https://fosstodon.org/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> is the worst. I'm sure it's 100% my lack of understanding it though. I have my installation scripts all worked out with <a href="https://fosstodon.org/tags/Rex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rex</span></a>. At first for <a href="https://fosstodon.org/tags/AlmaLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlmaLinux</span></a> 8 but also adapted it to 9.</p><p>I had it all working properly under 9, but this new VPS somehow mounts the root disk in read-only mode after a reboot when SELinux has been enabled.</p><p>I'm *really* tempted to just keep it in permissive mode and ignore it for the rest of my life.</p><p><a href="https://fosstodon.org/tags/VPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPS</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
Verfassungklage@troet.cafe<p>Newsupdate 02/25 - <a href="https://troet.cafe/tags/Python3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python3</span></a>.14, <a href="https://troet.cafe/tags/FOSDEM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSDEM</span></a> 2025, <a href="https://troet.cafe/tags/GNOME48" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GNOME48</span></a> Beta, <a href="https://troet.cafe/tags/KDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDE</span></a> <a href="https://troet.cafe/tags/Plasma6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Plasma6</span></a>.3, <a href="https://troet.cafe/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> und <a href="https://troet.cafe/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> - <a href="https://troet.cafe/tags/FOCUS_ON" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOCUS_ON</span></a>: <a href="https://troet.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> - <a href="https://troet.cafe/tags/Podcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcast</span></a>: </p><p>Python 3.14 und KDE Plasma 6.3 erscheinen, während sich der Umfang des kommenden GNOME 48 abzeichnet. Das SELFHTML-Projekt wird 30 Jahre alt und mit RePebble wird einem längst totgesagtem Projekt neues Leben eingehaucht. In der Kernel-Mailingliste entfacht ein Streit über Rust - mit Auswirkungen für das Kernel- und Asahi Linux-Projekt. </p><p><a href="https://focusonlinux.podigee.io/147-newsupdate-0225-python-314-fosdem-2025-gnome-48-beta-kde-plasma-63-opensuse-und-selinux" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">focusonlinux.podigee.io/147-ne</span><span class="invisible">wsupdate-0225-python-314-fosdem-2025-gnome-48-beta-kde-plasma-63-opensuse-und-selinux</span></a></p>
openSUSE Linux<p>February brought big changes to <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> Tumbleweed! <a href="https://fosstodon.org/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> is now the default MAC for new installs, while <a href="https://fosstodon.org/tags/Mesa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mesa</span></a> 25.0 adds <a href="https://fosstodon.org/tags/Vulkan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulkan</span></a> 1.4 support. Plus, <a href="https://fosstodon.org/tags/KDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDE</span></a> Plasma 6.3 enhances fractional scaling and drawing tablet settings. 🎨🔍 <a href="https://news.opensuse.org/2025/02/27/tw-monthly-update-february/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.opensuse.org/2025/02/27/t</span><span class="invisible">w-monthly-update-february/</span></a></p>
Linux Magazine<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@opensuse" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>opensuse</span></a></span> Tumbleweed rolling release moves from AppArmor to SELinux for its underlying security layer<br><a href="https://www.linux-magazine.com/Online/News/openSUSE-Tumbleweed-Ditches-AppArmor-for-SELinux" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/Online/News</span><span class="invisible">/openSUSE-Tumbleweed-Ditches-AppArmor-for-SELinux</span></a><br><a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> <a href="https://fosstodon.org/tags/Tumbleweed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tumbleweed</span></a> <a href="https://fosstodon.org/tags/AppArmor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppArmor</span></a> <a href="https://fosstodon.org/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://fosstodon.org/tags/distro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>distro</span></a> <a href="https://fosstodon.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
in ♥️ with PDA (and 🐧)<p>So <a href="https://chaos.social/tags/opensuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensuse</span></a> switched to <a href="https://chaos.social/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a>. Changing my systems works. Only Steam is not running, because selinux blocks boolean.<br>I have to admit, that I don't understand selinux. Is there a easy to understand tutorial? I don't want to mess around.<br>In the suse forum I found this solution:<br>sudo setsebool selinuxuser_execmod 1<br>..but with hint: If you understand the risks.</p><p>I don't understand the risc :)</p>
Who Let The Dogs Out 🐾<p><a href="https://mastodon.ml/tags/tar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tar</span></a> <a href="https://mastodon.ml/tags/rsync" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rsync</span></a> <a href="https://mastodon.ml/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a></p><p>При работе с tar-ом на сервере (например бэкапы), не забывайте, что этот архиватор может сохранять расширенные атрибуты файлов. </p><p>Например вот так:<br>```sh<br># tar --selinux --acls --xattrs -cvf backup.tar /var/www/user/data<br>```</p><p>```sh<br># tar --no-acls --no-selinux --no-xattrs -xvf backup.tar<br>```</p><p>Помните об этих параметрах при работе с сервером, где включён selinux.</p><p>rsync, также умеет работать с расширенными атрибутами файлов: -A для acl и -X для selinux:</p><p>```sh<br>$ rsync -e ssh -aAXHPv /home/user/web root@server.com:/var/www/user/data/<br>```</p>
LinuxNews.de<p>Neues von openSUSE<br><a href="https://linuxnews.de/neues-von-opensuse/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxnews.de/neues-von-opensus</span><span class="invisible">e/</span></a> <a href="https://social.anoxinon.de/tags/opensuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensuse</span></a> <a href="https://social.anoxinon.de/tags/sles" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sles</span></a> <a href="https://social.anoxinon.de/tags/tumbleweed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tumbleweed</span></a> <a href="https://social.anoxinon.de/tags/apparmor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apparmor</span></a> <a href="https://social.anoxinon.de/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a> <a href="https://social.anoxinon.de/tags/uefi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uefi</span></a></p>