Difference between revisions of "Apache SELinux configuration"
(Created page with "=apache SELinux configuration= ==Apache SELinux contexts== Apache process runs with SELinux context '<tt>unconfined_u:system_r:httpd_t:s0</tt>'. Files used by apache can h...") |
m |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
[[Main Page|Home]] > [[CentOS]] > [[CentOS 6.x]] > [[SELinux configuration]] > [[Apache SELinux configuration]] | |||
Line 89: | Line 88: | ||
Learned from http://beginlinux.com/index.php/server_training/web-server/117-web-server/976-apache-and-selinux | Learned from http://beginlinux.com/index.php/server_training/web-server/117-web-server/976-apache-and-selinux | ||
[[Main Page|Home]] > [[CentOS]] > [[CentOS 6.x]] > [[SELinux configuration]] > [[Apache SELinux configuration]] |
Latest revision as of 13:27, 14 July 2022
Home > CentOS > CentOS 6.x > SELinux configuration > Apache SELinux configuration
Apache SELinux contexts
Apache process runs with SELinux context 'unconfined_u:system_r:httpd_t:s0'. Files used by apache can have following contexts based on requirements:
Context | Meaning |
httpd_sys_content_t | Set files with httpd_sys_content_t for content which is available from all httpd scripts and the daemon. |
httpd_sys_script_exec_t | Set cgi scripts with httpd_sys_script_exec_t to allow them to run with access to all sys types. |
httpd_sys_script_ro_t | Set files with httpd_sys_script_ro_t if you want httpd_sys_script_exec_t scripts to read the data, and disallow other sys scripts from access. |
httpd_sys_script_rw_t | Set files with httpd_sys_script_rw_t if you want httpd_sys_script_exec_t scripts to read/write the data, and disallow other non sys scripts from access. |
httpd_sys_script_ra_t | Set files with httpd_sys_script_ra_t if you want httpd_sys_script_exec_t scripts to read/append to the file, and disallow other non sys scripts from access. |
httpd_unconfined_script_exec_t | Set cgi scripts with httpd_unconfined_script_exec_t to allow them to run without any SELinux protection. This should only be used for a very complex httpd scripts, after exhausting all other options. It is better to use this script rather than turning off SELinux protection for httpd. |
SELinux booleans
Enable CGI
To enable CGI applications we can use
setsebool -P httpd_enable_cgi 1
Note that we should also change the context of applications to one of the above listed contexts for it to work. Just changing boolean is not enough
Enable UserDir
To enable UserDir we can use
setsebool -P httpd_enable_homedirs 1
It is still necessary to change the type of file to 'httpd_sys_content_t' using something like
chcon -R -t httpd_sys_content_t ~user/public_html
so that it can be accessed by apache.
SELinux ports
By default apache can listen only on ports 80, 443, 488, 8008, 8009, 8443 using TCP. If we try to setup apache on different port it will not work. To add or remove port to/from this list we can use following methods
Use
semanage port -l | grep http
to see all apache related ports
To add port on which apache can listen
To add port to list on which apache can listen, use
semanage port -a -t http_port_t -p tcp <additional_port_number>
To remove port on which apache can listen
To remove port from list on which apache can listen, use
semanage port -d -t http_port_t -p tcp <port_number>
Learned from http://beginlinux.com/index.php/server_training/web-server/117-web-server/976-apache-and-selinux
Home > CentOS > CentOS 6.x > SELinux configuration > Apache SELinux configuration