<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.rsbac.org/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://www.rsbac.org/feed.php">
        <title>RSBAC: Extending Linux Security Beyond the Limits documentation:administration_examples</title>
        <description></description>
        <link>https://www.rsbac.org/</link>
        <image rdf:resource="https://www.rsbac.org/lib/tpl/rsbac/images/favicon.ico" />
       <dc:date>2026-04-27T17:09:09+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/administration_examples/network_access_control?rev=1146577225&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/administration_examples/pm?rev=1146577225&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/administration_examples/protection_against_execution?rev=1146577225&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/administration_examples/rsbac_samples?rev=1146577225&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/administration_examples/syslog-ng?rev=1146577225&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/administration_examples/tampering_protection_for_exec?rev=1146577225&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/administration_examples/tips?rev=1146577225&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.rsbac.org/documentation/administration_examples/user_management?rev=1146577225&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://www.rsbac.org/lib/tpl/rsbac/images/favicon.ico">
        <title>RSBAC: Extending Linux Security Beyond the Limits</title>
        <link>https://www.rsbac.org/</link>
        <url>https://www.rsbac.org/lib/tpl/rsbac/images/favicon.ico</url>
    </image>
    <item rdf:about="https://www.rsbac.org/documentation/administration_examples/network_access_control?rev=1146577225&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-05-02T13:40:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:administration_examples:network_access_control</title>
        <link>https://www.rsbac.org/documentation/administration_examples/network_access_control?rev=1146577225&amp;do=diff</link>
        <description>Basics

Due to the short lived nature of network connections and their related network objects, a scheme of Network Templates has been developed in RSBAC.

Network templates describe a set of connection endpoints, which shall be controlled together. Administration is done on the templates instead of the individual network endpoints. Each endpoint inherits the access control settings of the first template it matches. Templates are checked from lowest to highest index number.</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/administration_examples/pm?rev=1146577225&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-05-02T13:40:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:administration_examples:pm</title>
        <link>https://www.rsbac.org/documentation/administration_examples/pm?rev=1146577225&amp;do=diff</link>
        <description>For demonstration purposes a simple application example has been developed together with Simone Fischer-Hübner. Although several modules are used, our focus clearly lay on the privacy model, being the most complex and powerful. Other modules are used for special purposes.</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/administration_examples/protection_against_execution?rev=1146577225&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-05-02T13:40:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:administration_examples:protection_against_execution</title>
        <link>https://www.rsbac.org/documentation/administration_examples/protection_against_execution?rev=1146577225&amp;do=diff</link>
        <description>Administration Goals

	*  Protect against execution of uncontrolled files or libraries

Common steps for all models

	*  Identify all directories containing executables and all single executables in other directories. Also, identify all directories containing dynamically linked libraries and all such single library files in other directories. As long as the most important directories, e.g. /sbin, /bin, /usr/sbin, /usr/bin, and files, e.g. /lib/*.so* and /usr/lib/*.so* are included, you can find …</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/administration_examples/rsbac_samples?rev=1146577225&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-05-02T13:40:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:administration_examples:rsbac_samples</title>
        <link>https://www.rsbac.org/documentation/administration_examples/rsbac_samples?rev=1146577225&amp;do=diff</link>
        <description>There are some simple things you can do, which already increase desktop user 
as well as server security without interaction:

JAIL

	*  Start Mozilla, etc. in an RSBAC jail without chroot: it will hide all other processes from Mozilla and disallow dirty networking tricks. Try</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/administration_examples/syslog-ng?rev=1146577225&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-05-02T13:40:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:administration_examples:syslog-ng</title>
        <link>https://www.rsbac.org/documentation/administration_examples/syslog-ng?rev=1146577225&amp;do=diff</link>
        <description>You can use syslog-ng to log RSBAC log messages.

Setting up syslog-ng

Disable logging to system log with the “rsbac_nosyslog” kernel flag, or
echo “debug nosyslog 1” &gt; /proc/rsbac-info/debug at runtime.
You need the kernel option “CONFIG_RSBAC_RMSG_NOSYSLOG</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/administration_examples/tampering_protection_for_exec?rev=1146577225&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-05-02T13:40:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:administration_examples:tampering_protection_for_exec</title>
        <link>https://www.rsbac.org/documentation/administration_examples/tampering_protection_for_exec?rev=1146577225&amp;do=diff</link>
        <description>Administration Goal

Protect all executables, e.g. below /sbin, against tampering
Common steps for all models

	*  Identify all directories containing executables and all single executables in other directories. As long as the most important directories, e.g. /sbin, /bin, /usr/sbin, /usr/bin, are included, you can find the rest with trial and error later.</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/administration_examples/tips?rev=1146577225&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-05-02T13:40:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:administration_examples:tips</title>
        <link>https://www.rsbac.org/documentation/administration_examples/tips?rev=1146577225&amp;do=diff</link>
        <description>Want to know -on the fly- if the softmode has been enabled ?

Simple with bash:


PROMPT_COMMAND=&#039;cat /proc/rsbac-info/active|grep SOFTMODE &gt; /dev/null \
               &amp;&amp; mode=$(echo -e &quot;\e[31;01m&quot;) \
               || mode=$(echo -e &quot;\e[34;01m&quot;)&#039;
PS1=&#039;\[\033[32;01m\]\u@$mode\h\[\033[0;m\]:\w\$ &#039;</description>
    </item>
    <item rdf:about="https://www.rsbac.org/documentation/administration_examples/user_management?rev=1146577225&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-05-02T13:40:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>documentation:administration_examples:user_management</title>
        <link>https://www.rsbac.org/documentation/administration_examples/user_management?rev=1146577225&amp;do=diff</link>
        <description>Problems of traditional Linux user management subsystem

The traditional Linux user management, specially the common passwd/shadow scheme with PAM, has several security problems:

	*  PAM libraries running in process context: The PAM libraries are mapped into every process, which has to authenticate users or change user accounts. This means that every single such process must have read or even write access to sensitive authentication data, and an exploit in only one of them reveals all this sens…</description>
    </item>
</rdf:RDF>
