Understanding SELinux Basics
- WHAT?
This article provides basic information about Security-Enhanced Linux.
- WHY?
You want to understand SELinux and how to configure it on SUSE Linux Micro.
- EFFORT
It takes approximately 40 minutes to read this article.
1 About SELinux #
SELinux was developed as an additional Linux security solution that uses the security framework in the Linux kernel. The purpose was to allow for a more granular security policy that goes beyond the standard Discretionary Access Controls (DAC), the traditional file permissions of owner/group/world, and read/write/execute.
SELinux uses labels attached to objects (for example, files and network sockets) to make access control decisions.
The default action of SELinux is to deny any access. SELinux allows only actions that were specifically allowed in the SELinux policy. Another feature of SELinux that increases security is that SELinux allows strict confinement of processes up to the point where the processes cannot access files of other processes on the same system.
SELinux was designed to enhance existing security solutions, not to replace them. For example, discretionary access control (DAC) is still applied, even if the system is using SELinux. If DAC denies access first, SELinux is then not used as the access was already blocked by another mechanism.
2 Getting SELinux #
SELinux is present on the pre-built images by default. However, in rare cases when SELinux is not set up on your system, run the following command to install it:
# transactional-update setup-selinux
Reboot your system after the command has finished. The command installs the
SELinux policy if it is not installed, sets the
enforcing SELinux mode and rebuilds
initrd.
3 SELinux modes #
SELinux can run in one of three modes: disabled,
permissive or enforcing.
Using the disabled mode means that no rules from the
SELinux policy are applied and your system is not protected. Therefore, we
do not recommend using the disabled mode.
In the permissive mode, SELinux is active, the security
policy is loaded, the file system is labeled and access denial entries are
logged. However, the policy is not enforced and thus no access is actually
denied.
In the enforced mode, the security policy is applied.
Each access that is not explicitly allowed by the policy is denied.
For information about switching between SELinux modes, refer to Section 3.1, “Changing the SELinux mode”.
3.1 Changing the SELinux mode #
You can switch the SELinux mode temporarily or permanently.
3.1.1 Changing the SELinux mode temporarily #
To set SELinux to the permissive or
enforcing mode temporarily, use the command
setenforce.
The setenforce command has the following syntax:
# setenforce MODE_ID
where MODE_ID is 0
for the permissive mode or
1 for the enforced mode.
Remember that you cannot disable SELinux using the
setenforce command.
3.1.2 Changing the SELinux mode permanently #
To perform changes to the SELinux mode that persists rebooting of the
system, edit the /etc/selinux/config configuration
file. In this file, you can also disable SELinux on your system. However,
this action is not recommended. If SELinux is possibly causing issues to
your system, switch to the permissive mode instead and
debug your system.
In the file /etc/selinux/config, change the value of
SELINUX to permissive, or enforced as follows:
SELINUX=permissive
The changes in the file are applied after the next reboot.
disabled mode
If you disable SELinux on your system and then enable it later, make
sure that you relabel your system. When SELinux is disabled and you
perform changes to your file system, the changes are not reflected in
the context anymore (for example, new files do not have any context).
Therefore, you need to relabel your system by using the
restorecon command, using the
autorelabel boot parameter, or by creating a file
that will trigger relabeling on the next boot. To create the file, run
the following command:
# touch /etc/selinux/.autorelabel
After reboot, the file /etc/selinux/.autorelabel
is replaced with another flag file,
/etc/selinux/.relabelled, to prevent relabeling on
subsequent reboots.
3.1.3 Verifying the active SELinux mode #
To verify the mode, run the following command:
# getenforce
The command should return permissive or
enforced, depending on the provided
MODE_ID.
3.2 Verifying that SELinux is functional #
If you are performing configuration changes, it may be useful to switch to permissive mode. During this time, users might label files incorrectly, and thus cause problems when switching back to enforcing mode.
To return the system back to its secured state, perform the following steps:
Reset the security context:
>sudorestorecon -R /Switch to enforcing mode by setting
SELINUX=enforcingin the/etc/selinux/config.Reboot the system and log in again.
Run the
sestatus -vcommand. It should give you an output similar to the following one:>sudosestatus -vSELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: enforcing Mode from config file: enforcing Policy MLS status: enabled Policy deny_unknown status: allowed Memory protection checking: requested(insecure) Max kernel policy version: 33 Process contexts: Current context: unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 Init context: system_u:system_r:init_t:s0 /usr/sbin/sshd system_u:system_r:sshd_t:s0-s0:c0.c1023 File contexts: Controlling terminal: unconfined_u:object_r:user_tty_device_t:s0 /etc/passwd system_u:object_r:passwd_file_t:s0 /etc/shadow system_u:object_r:shadow_t:s0 /bin/bash system_u:object_r:shell_exec_t:s0 \ -> system_u:object_r:shell_exec_t:s0 /bin/login system_u:object_r:login_exec_t:s0 /bin/sh system_u:object_r:bin_t:s0 \ -> system_u:object_r:shell_exec_t:s0 /sbin/agetty system_u:object_r:bin_t:s0 \ -> system_u:object_r:getty_exec_t:s0 /sbin/init system_u:object_r:bin_t:s0 -> \ system_u:object_r:init_exec_t:s0 /usr/sbin/sshd system_u:object_r:sshd_exec_t:s0If the system is not working properly, check the log files in
/var/log/audit/audit.log. For more details, refer to SELinux troubleshooting.
4 SELinux security context #
The security context is a set of information assigned to a file or a process. It consists of SELinux user, role, type, level and category. This information is used to make access control decisions.
- SELinux user
An identity defined in the policy that is authorized for a specific set of roles and for a specific level range. Each Linux user is mapped to only one SELinux user. However, one SELinux user can have several roles.
SELinux does not use the list of user accounts maintained by Linux in
/etc/passwd, but uses its own database and mapping. By convention, the identity name is suffixed with_u, for example,user_u.When a new Linux account is created and the SELinux user is not assigned to the account, the default SELinux user is used. Usually, the default value is
unconfined_u. For a procedure on how to change the default value, refer to Section 7.5.2, “Thesemanage logincommand”.- role
Defines a set of permissions that a user can be granted. A role defines which types a user assigned to this role can access. By convention, the role name is suffixed with
_r, for example,system_r.- type
The type conveys information on how particular files and processes can interact. A process consists of files with a concrete SELinux type, and it cannot access files outside of this type. By convention, the type name is suffixed with
_t, for example,var_t.- level
An optional attribute that specifies the range of levels of clearance in the multilevel security.
- category
An optional attribute that allows you to add categories to processes, files and users. A user can then access files that have the same category.
Here is an example of an SELinux context:
allow user_t bin_t:file {read execute gettattr};
This example rule states that the user who has the context type
user_t (this user is called the
source object) is allowed to access objects of the class
file with the context type bin_t
(the target), using the permissions read,
execute and getattr.
5 SELinux policy overview #
The policy is the key component in SELinux. Your SELinux policy defines rules that specify which objects can access which files, directories, ports and processes on a system. To do this, a security context is defined for all of these.
An SELinux policy contains a huge number of rules. To make it more manageable, policies are often split into modules. This allows the administrator to switch protection on or off for different parts of the system.
When compiling the policy for your system, you will have a choice to either work with a modular policy, or a monolithic policy, where one huge policy is used to protect everything on your system. We strongly recommend using a modular policy and not a monolithic policy. Modular policies are much easier to manage.
SUSE Linux Micro is shipped with the targeted SELinux
policy.
5.1 Working with SELinux modules #
As an administrator, you can switch modules on or off. This can be useful if you want to disable only a part of the SELinux policy and you do not want to run a specific service without SELinux protection.
To view all SELinux policy modules in use, run the command:
semodule -lAfter you get the name of the module you want to switch off, run the command:
>sudosemodule -d MODULENAME
To switch on the policy module, run the command:
>sudosemodule -e MODULENAME
5.2 Creating policies for containers #
SUSE Linux Micro is delivered with a policy that, by default, does not
allow containers to access files outside the container data. On the other
hand, all network access is allowed. Typically, containers are created with
bind mounts and should be able to access other directories, like
/home or /var. You may want a
possibility to allow access to these directories or, on the contrary,
restrict some ports to the container even if SELinux is used on your
system. In this case, you need to create new policy rules that enable or
disable the access. SUSE Linux Micro provides the Udica tool for this
purpose.
The following procedure describes how to create a custom policy for your containers:
Make sure that SELinux is in the enforcing mode. For details, refer to Section 3.1, “Changing the SELinux mode”.
Start a container using the following parameters:
#podman run -v /home:/home:rw -v /var/:/var/:rw -p 21:21 -it sle15 bashThe container runs with the default policy that does not allow access to the mount points but does not restrict other ports.
You can exit the container.
Obtain the container ID:
#podman ps -a CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES e59f9d0f86f2 registry.opensuse.org/devel/bci/tumbleweed/containerfile/opensuse/bci/ruby:latest /bin/bash 8 minutes ago Up 8 seconds ago 0.0.0.0:21->21/tcp zen_ramanujanCreate a JSON file that Udica will use to create a custom policy for the container:
#podman inspect e59f9d0f86f2 > OUTPUT_JSON_FILEFor example, substitute OUTPUT_JSON_FILE with
container.json.Run Udica to generate a policy according to the container parameters:
#udica -j OUTPUT_JSON_FILE CUSTOM_CONTAINER_POLICYFor example:
#udica -j container.json custom_policyAccording to the provided instructions, load the policy modules by running:
#semodule -i custom_policy.cil /usr/share/udica/templates/{base_container.cil,net_container.cil,home_container.cil}Run a container with the new policy module by using the
--security-optoption as follows:#podman run --security-opt label=type:custom_policy.process -v /home:/home:rw -v /var/:/var/:rw -p 21:21 -it sle15 bash
6 SELinux Booleans #
SELinux Booleans support a flexible policy management approach. For example, Booleans enable you to disable a particular policy on one server, while keeping the same policy active on another one. In other words, a Boolean can be understood as a switch for a policy rule. Instead of changing a particular policy, you can switch it off. In the policy code, Booleans are called a tunable. Because Booleans are included in the policy, they are available as soon as a policy is loaded.
The changes to the Booleans value may be persistent or temporary, lasting until the end of the session.
SELinux offers tools that enable you to list and view details or change the state of Booleans. See the following sections for details.
6.1 Working with Booleans #
6.1.1 Listing Booleans #
You can use the getsebool or
semanage command to list currently defined Booleans.
To list all currently defined Booleans, along with their state, run the
following command:
# getsebool -a
abrt_anon_write --> off
abrt_handle_event --> off
abrt_upload_watch_anon_write --> on
...
To get more details about particular Booleans, you can use the
semanage command as follows:
# semanage boolean -l
SELinux boolean State Default Description
abrt_anon_write (off , off) Allow abrt to anon write
abrt_handle_event (off , off) Allow abrt to handle event
abrt_upload_watch_anon_write (on , on) Allow abrt to upload watch anon writeTo get the status of an individual Boolean, you can use the following command:
# getsebool BOOLEAN_NAME
Alternatively, you can just use the grep command on
the semanage boolean output:
# semanage boolean -l | grep BOOLEAN_NAME6.1.2 Toggling Booleans #
The commands setsebool and semanage
can be used to toggle the value of Booleans. You can change the Boolean status
persistently or just temporarily until the session ends. To change a
Boolean value temporarily, run the following command:
# setsebool BOOLEAN_NAME BOOLEAN_VALUE
where BOOLEAN_VALUE is either
on or off.
To change a Boolean value persistently, run one of the following two commands:
# setsebool -P BOOLEAN_NAME BOOLEAN_VALUE
Alternatively, using the semanage command:
# semanage boolean -m --BOOLEAN_VALUE BOOLEAN_NAME
where BOOLEAN_VALUE is either
on or off.
A single Boolean can enable or disable several policy rules. To see
which policy rules are enabled or disabled by specific Booleans,
use the sedispol tool to analyze the policy file:
# sedispol /etc/selinux/targeted/policy/policy.32
As the policy rules are usually huge, we recommend setting an output file
by selecting the f and specifying a file name. After
specifying the file name, press 6. Then you can inspect
the file.
7 Tools for managing SELinux #
SUSE Linux Micro provides you with tools to manage SELinux on your system. If the below described tools are not installed on your system, install the tools by running:
# transactional-update pkg install policycoreutils-python-utilsAfter successful installation, reboot the system.
7.1 Using the Z option #
Where SELinux is installed and configured, you can use the
-Z to regular commands like ls,
id or ps. Using this option, you
can display the security context of files or processes. For example, with the
ls command:
> ls -Z /etc/shadow
system_u:object_r:shadow_t:s0 /etc/shadow7.2 The chcon command #
The command name chcon stands for change context. The
command can change the full security context of a file to the value
provided on the CLI, or it can change parts of the context.
Alternatively, you can provide a file that serves as a reference.
To change the full security context of a file, the command syntax looks as follows:
# chcon SECURITY_CONTEXT FILENAMEwhere:
SECURITY_CONTEXT is in the format: SELinux_USER:ROLE:TYPE:LEVEL:CATEGORY. For example, the context could be: system_u:object_r:httpd_config_t:s0.
FILENAME is a path to the file whose context should be changed.
To set a security context according to a provided file that serves as a
reference, run chcon as follows:
# chcon --reference=REFERENCE_FILE FILENAMEwhere:
REFERENCE_FILE is a path to a file that should be used as a reference.
FILENAME is a path to the file whose context should be changed.
Alternatively, you can change only one part of the security context. The
general syntax of the chcon command is as follows:
# chcon CONTEXT_OPTION CONTEXT_PART FILENAMEThe options and arguments have the following meaning:
depending on the context part, CONTEXT_OPTION can be any of the following:
-uresp--userdenotes that an SELinux user context will be changed on the provided file:
#chcon -u system_u logind.conf-rresp--roleonly the role part will be changed in the context of the provided file:
#chcon -r object_r logind.conf-tresp--typeonly the type part will be changed in the context of the provided file:
#chcon -t etc_t logind.conf-lresp--rangeonly the range part of the security context will be changed:
#chcon -l s0 logind.conf
CONTEXT_PART is the particular value of the security context to be set.
FILENAME is a path to the file whose context will be changed.
chcon on symbolic links
By default, when you change the security context on a symbolic link,
the context of the link target is changed and the symbolic link context
is not changed. To force
chcon to change the context of the symbolic link and
not the link target, use the --no-dereference option
as shown below:
# chcon --no-dereference -u system_u -t etc_t network.confYou can change the context of all files in a directory by using the recursive option:
# chcon --recursive system_u:object_r:httpd_config_t:s0 conf.d7.3 getenforce and setenforce commands #
The getenforce command returns the current SELinux
mode: Enforcing, Permissive or
Disabled.
# getenforce
Permissive
The setenforce command temporarily changes the SELinux
mode to enforcing or permissive. You cannot use this command to disable
SELinux. Remember that the change persists only until the next reboot. To
change the state permanently, follow the description in
Section 3.1, “Changing the SELinux mode”.
# setenforce MODE_ID
where MODE_ID is 0
for the permissive mode or
1 for the enforced mode.
7.4 The fixfiles script #
The script enables you to perform the following tasks with the security context:
check if the context is correct
change any incorrect file context labels
relabel your system if you added a new policy
The script syntax is as follows:
# fixfiles [OPTIONS] ARGUMENTwhere:
OPTIONS can be the following:
-lLOGFILEsaves the output to the provided file
-oOUTPUT_FILEsaves to the provided output file the names of all files whose file context differs from the default
-Fforces a reset of context
ARGUMENT can be one of the following:
checkshows previous and current file context for an incorrect label without performing any changes
relabelrelabels incorrect file contexts according to the currently loaded policy
restorerestores incorrect file contexts to the default values
verifylists all files with incorrect file context labels without performing any changes
7.5 The semanage command #
The semanage command can be used to configure parts of
the policy without the need to recompile the policy from sources. The
command enables you to perform the following tasks:
manage Booleans by using the
booleanargument. For details about Booleans, refer to Section 6.1, “Working with Booleans”.adjust the context of files by using the
fcontextargumentmanage user mappings using the
loginargumentmanage SELinux users using the
userargumentmanage SELinux policy modules using the
moduleargument
The general command syntax looks as follows:
# semanage ARGUMENT OPTIONS [OBJECT_NAME]where:
ARGUMENT is one of the following:
login,user,fcontext,boolean,module.OPTIONS depends on the provided ARGUMENT. Common options are described in Common options.
OBJECT_NAME, depending on the provided ARGUMENT, can be a login name, module name, file name or SELinux user.
-a,--addadds a provided object
-h,--helpprints the command help
- --extract
displays commands that were used to change the system (Booleans, file context, and so on)
-l,--listlists all objects
-m,--modifymodifies the provided object
-n,--noheadingmodifies the output of the listing operation by omitting headings
-s,--seuserspecifies the SELinux user
Other options are specific to particular semanage
commands and are described in corresponding sections.
7.5.1 The semanage fcontext command #
Using the semanage fcontext command, you can perform
the following tasks:
query file context definitions
add contexts on files
add your own rules
Changes performed to the file context using the semanage
fcontext command do not require modifications or
recompilation of the policy.
On top of the common options described in
Common options, the semanage
fcontext command takes the following options:
-e,--equalThe option enables you to use the context of the provided path context to label files in a different directory (the provided target path). For example, you want to assign the same context as
/homehas to an alternative home directory/export/home. If you use this option, you need to provide the source path and the target path:#semanage fcontext -a -e /home /export/home-f,--ftypeTo specify a file type. Use one of the following values:
a- all files, which is also the default valueb- a block devicec- a character deviced- a directoryf- regular filesl- a symbolic linkp- a named pipes- a socket
7.5.2 The semanage login command #
The semanage login enables you the perform the
following tasks:
Mapping of Linux users on a particular SELinux user. For example, to map the Linux user tux on
sysadm_u, run the command:#semanage login -a -s sysadm_u tuxMapping of a group of Linux users on a particular SELinux user. For example, to map users of the writers group on
user_u, run the command:#semanage login -a -s user_u %writersThe group is then listed in the output of
semanage login -l, prefixed with the % character.Keep in mind that the user group should be primary because mapping SELinux users on supplementary groups may result in incompatible mappings.
#semanage login -m -s staff_u %writersMapping of Linux users on a particular SELinux MLS/MCS security range.
Modifying of the already created mapping. For this purpose, just replace the
-aoption with-min the previous commands.Setting the default SELinux user for new Linux users. The usual default SELinux user is
unconfined_u. To change the value tostaff_u, run the command:#semanage login -m -s staff_u __default__
7.5.3 The semanage boolean command #
The semanage boolean command is used to control
Booleans in the SELinux policy.
The command synopsis looks as follows:
semanage boolean [-h] [-n] [ --extract |
--deleteall | --list [-C] | --modify ( --on | --off | -1 | -0 ) boolean ]
On top of the common options, you can use the following ones specific
to the semanage boolean command:
- --list -C
To display a list of local modifications to Booleans.
- -m --on | -1
To switch the provided Boolean on.
- -m --off | -0
To switch the provided Boolean off.
- -D, --deleteall
To delete all local modifications to Booleans.
The most common usage of the command is to switch on or off a
particular Boolean. For example, to switch on the
authlogin_yubikey Boolean, run:
#semanage boolean -m on authlogin_yubikey
7.5.4 The semanage user command #
The semanage user command controls the mapping
between the SELinux user and the roles and MLS/MCS levels.
On top of the common options described in
Common options, the semanage
user command takes the following options:
- -R [ROLES], --roles [ROLES]
A list of SELinux roles. You can enclose multiple roles within double quotes and separate them by spaces, or you can use the
-Rseveral times.
Using this command, you can perform the following tasks:
Listing the mapping of SELinux users on roles by running:
#semanage user -lChanging the roles assigned to the
user_uSELinux user:#semanage user -m -R "system_r unconfined_r user_r"Assigning to
admin_uthe rolestaff_rand a categorys0:#semanage user -a -R "staff_r -r s0 admin_uCreating a new SELinux user, for example,
admin_uwith thestaff_rrole. You also need to define the labeling prefix for this user by using the-P:#semanage user -a -R "staff_r" -P admin admin_u
7.5.5 The semanage module command #
The semanage module command can install, remove,
disable or enable SELinux policy modules.
On top of the common options described in
Common options, the semanage
fcontext command takes the following options:
-d,--disableTo disable the provided SELinux policy module:
#semanage module --disable MODULE_NAME-e,--enableTo enable the provided SELinux policy module:
#semanage module --enable MODULE_NAME
7.6 The sestatus command #
The sestatus gets the status of a system where SELinux
is running.
The generic syntax of the command looks as follows:
sestatus [OPTION]
When run without any options and arguments, the command outputs the following information:
#sestatusSELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: enforcing Mode from config file: enforcing Policy MLS status: enabled Policy deny_unknown status: allowed Memory protection checking: requested (insecure) Max kernel policy version: 33
The command can take the following options:
- -b
Displays the status of Booleans on the system.
- -v
Displays the security context of files and processes listed in the
/etc/sestatus.conffile.
8 Legal Notice #
Copyright© 2006–2025 SUSE LLC and contributors. All rights reserved.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”.
For SUSE trademarks, see https://www.suse.com/company/legal/. All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its affiliates. Asterisks (*) denote third-party trademarks.
All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors, nor the translators shall be held liable for possible errors or the consequences thereof.