<div dir="ltr">I'd suggest checking the selinux policies for openstack in RedHat and/or Fedora.<div>-bryan</div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Mon, Nov 18, 2013 at 5:15 PM, Kausum Kumar <span dir="ltr"><<a href="mailto:Kausum_Kumar@symantec.com" target="_blank">Kausum_Kumar@symantec.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang="EN-US" link="blue" vlink="purple"><div><p class="MsoNormal">Hi All,<u></u><u></u></p><p class="MsoNormal"><u></u> <u></u></p>
<p class="MsoNormal">I am trying to map what configuration and input files are been accessed by what processes and how. I am looking from a security perspective, as to what process/application/user can access for read and/or write certain files.<u></u><u></u></p>
<p class="MsoNormal"><u></u> <u></u></p><p class="MsoNormal">Is there such a mapping available somewhere beside the obvious process access configurations?<u></u><u></u></p><p class="MsoNormal"><u></u> <u></u></p><p class="MsoNormal">
Thanks,<u></u><u></u></p><p class="MsoNormal">Kausum <u></u><u></u></p></div></div><br>_______________________________________________<br>
Openstack-security mailing list<br>
<a href="mailto:Openstack-security@lists.openstack.org">Openstack-security@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security</a><br>
<br></blockquote></div><br></div>