How to create an SELinux custom RPM package
Last Modified: 2021-08-31 14:52:50 Etc/GMT
Affected Products
Languages:
This article is available in the following languages:
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
As of May 14, 2024, Knowledge Base (KB) articles will only be published and updated in our new Trellix Thrive Knowledge space.
Log in to the Thrive Portal using your OKTA credentials and start searching the new space. Legacy KB IDs are indexed and you will be able to find them easily just by typing the legacy KB ID.
How to create an SELinux custom RPM package
Technical Articles ID:
KB94454
Last Modified: 2021-08-31 14:52:50 Etc/GMT Environment
McAfee Agent (MA) 5.7.x Security-Enhanced Linux (SELinux) Summary
This article provides steps to build an SELinux custom RPM package with McAfee Agent. The package contains an SELinux policy, so that the McAfee Agent process can read, write, and execute in a custom folder path. IMPORTANT:
McAfeeAgent-selinux-5.7.0-ReleasePackages/MFEma-selinux-5.7.0-1.src.rpm McAfeeAgent-selinux-5.7.0-ReleasePackages/MFEma-selinux-5.7.0-1.el7.noarch.rpm McAfeeAgent-selinux-5.7.0-ReleasePackages/MFEma-selinux-5.7.0-1.el8.noarch.rpm
0 drwxrwxr-x. 2 500 500 131 Feb 11 12:51 . 0 drwxr-xr-x. 3 root root 111 May 26 10:39 .. 64 -. 1 500 500 62564 Feb 11 12:51 MFEma-selinux-5.7.0-1.el7.noarch.rpm 56 -. 1 500 500 55692 Feb 11 12:51 MFEma-selinux-5.7.0-1.el8.noarch.rpm 40 -. 1 500 500 40675 Feb 11 12:51 MFEma-selinux-5.7.0-1.src.rpm
NOTE: If we’re giving the SA replication path as
Example: Screen Output Example drwxr-xr-x. 3 root root unconfined_u:object_r:admin_home_t:s0 240 May 26 11:05 . drwxr-xr-x. 8 root root unconfined_u:object_r:admin_home_t:s0 89 Jan 20 11:01 -. 1 bserver bserver unconfined_u:object_r:admin_home_t:s0 53454 Feb 11 12:50 license.txt
0 drwxr-xr-x. 3 root root 240 May 26 11:05 0 drwxr-xr-x. 8 root root 89 Jan 20 11:01 56 -. 1 bserver bserver 53454 Feb 11 12:50 license.txt 4 -. 1 bserver bserver 1711 Feb 11 12:50 Makefile 8 -. 1 bserver bserver 5890 Feb 11 12:50 mfe_ma.fc 20 -. 1 bserver bserver 19039 Feb 11 12:50 mfe_ma.if 4 -. 1 bserver bserver 935 Feb 11 12:50 mfe_ma_perm.if 4 -. 1 bserver bserver 1041 Feb 11 12:50 mfe_ma_rt.fc 8 -. 1 bserver bserver 4735 Feb 11 12:50 mfe_ma_rt.if 4 -. 1 bserver bserver 2186 Feb 11 12:50 mfe_ma_rt.te 0 drwxr-xr-x. 2 root root 6 May 14 12:17 MFEma-selinux 4 -. 1 bserver bserver 1034 Feb 11 12:50 MFEma-selinux.tar.gz 52 -. 1 bserver bserver 50456 Feb 11 12:50 mfe_ma.te 4 -. 1 bserver bserver 3566 Feb 11 12:50 README.md
class passwd all_passwd_perms; type unconfined_service_t, crond_t, crontab_exec_t, crontab_t, user_cron_spool_t, crond_var_run_t, systemd_unit_file_t, useradd_t, groupadd_t, shell_exec_t, usr_t, var_t, etc_t, ldconfig_cache_t, rhsmcertd_t, system_dbusd_t, system_dbusd_var_run_t, rpm_script_t, net_conf_t, sysfs_t, pstore_t, configfs_t, sysctl_fs_t, binfmt_misc_fs_t, system_map_t;' ) After defining: 1. Required class passwd all_passwd_perms; type root_t, unconfined_service_t, crond_t, crontab_exec_t, crontab_t, user_cron_spool_t, crond_var_run_t, systemd_unit_file_t, useradd_t, groupadd_t, shell_exec_t, usr_t, var_t, etc_t, ldconfig_cache_t, rhsmcertd_t, system_dbusd_t, system_dbusd_var_run_t, rpm_script_t, net_conf_t, sysfs_t, pstore_t, configfs_t, sysctl_fs_t, binfmt_misc_fs_t, system_map_t; ')
Screen Output Example
TARGETS is mfe_ma.pp mfe_ma_rt.pp
[root@root noarch] ls MFEma-selinux-5.7.0-2.noarch.rpm Version #.#.# must be greater than the already installed version.
Affected ProductsLanguages:This article is available in the following languages: |
|