toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

274
active users

#selinux

1 post1 participant0 posts today
openSUSE Linux<p><a href="https://fosstodon.org/tags/Leap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Leap</span></a> 16.0 now defaults to <a href="https://fosstodon.org/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a>, <a href="https://fosstodon.org/tags/Myrlyn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Myrlyn</span></a> + <a href="https://fosstodon.org/tags/Cockpit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cockpit</span></a> step in for <a href="https://fosstodon.org/tags/YaST" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YaST</span></a>, &amp; <a href="https://fosstodon.org/tags/zypper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zypper</span></a> has parallel <a href="https://fosstodon.org/tags/repo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>repo</span></a> downloads. <a href="https://fosstodon.org/tags/Xfce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xfce</span></a> users on <a href="https://fosstodon.org/tags/Wayland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wayland</span></a> can enjoy greetd/gtkgreet instead of <a href="https://fosstodon.org/tags/LightDM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LightDM</span></a>—ideal for modern minimalists. <a href="https://news.opensuse.org/2025/08/04/leap-16-rc/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.opensuse.org/2025/08/04/l</span><span class="invisible">eap-16-rc/</span></a></p>
Jan Wildeboer 😷:krulorange:<p>Welcome to the family, OpenSUSE Leap! Finally :) The 16.0 Release Candidate makes it official. <a href="https://social.wildeboer.net/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> becomes the default.</p><p><a href="https://news.opensuse.org/2025/08/04/leap-16-rc/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.opensuse.org/2025/08/04/l</span><span class="invisible">eap-16-rc/</span></a></p>
Nicola Fioretti :gnu: :linux:<p>🚀 :linux: Linux 6.16 è qui!<br>Principali novità: <a href="https://mastodon.uno/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenVPN</span></a> DCO, TCP Zero-Copy da DMABUF, Paginazione a cinque livelli universale, Ottimizzazioni Filesystem <a href="https://mastodon.uno/tags/Ext4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ext4</span></a> e <a href="https://mastodon.uno/tags/xfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xfs</span></a> miglioramenti per processori Intel e USB Audio Offload, supporto Hardware esteso, supporto per Apple Magic Mouse 2 e tanto altro!<br>Miglioramenti nella gestione dei coredump e aggiornamenti a <a href="https://mastodon.uno/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a> <br>Continua l'espansione dei driver basati su <a href="https://mastodon.uno/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> </p><p><a href="https://mastodon.uno/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.uno/tags/Kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kernel</span></a> <a href="https://mastodon.uno/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a></p><p><a href="https://linuxiac.com/linux-kernel-6-16-released-this-is-whats-new/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxiac.com/linux-kernel-6-16</span><span class="invisible">-released-this-is-whats-new/</span></a></p><p><span class="h-card" translate="no"><a href="https://diggita.com/c/linux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>linux</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.uno/@opensource" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>opensource</span></a></span></p>
9Lukas5 🚂 🐧Fedora SELinux
Tris<p>If there's any job opening related to <a href="https://chaos.social/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a>, let me know :) </p><p><a href="https://chaos.social/tags/getfedihired" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>getfedihired</span></a> <a href="https://chaos.social/tags/redhat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhat</span></a></p>
openSUSE Linux<p>Find out what happened in this <a href="https://fosstodon.org/tags/oSC25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oSC25</span></a> talk about the switch of <a href="https://fosstodon.org/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> as the default MAC system in <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> Tumbleweed, This talk will explore the shift from <a href="https://fosstodon.org/tags/AppArmor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppArmor</span></a> and the lessons learned. A must-watch for those following system security! 🐧 <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> <a href="https://youtu.be/8wBLbhSjDwE?si=1fOBIHkq1KkU5ynV" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/8wBLbhSjDwE?si=1fOBIH</span><span class="invisible">kq1KkU5ynV</span></a></p>
ricardo :mastodon:<p>Fortifying <a href="https://fosstodon.org/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> With <a href="https://fosstodon.org/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> by Enforcing Mandatory Access Control for Ultimate System Security </p><p><a href="https://www.linuxjournal.com/content/fortifying-debian-selinux-enforcing-mandatory-access-control-ultimate-system-security" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linuxjournal.com/content/forti</span><span class="invisible">fying-debian-selinux-enforcing-mandatory-access-control-ultimate-system-security</span></a></p>
Rasmus Lindegaard<p>I am experimenting with MicroOS running btrfs and SELinux. </p><p>I have some storage i use for Minecraft server data for instance, on the partition i have a directory with readonly snapshots. The server will not boot properly, because it's running auto relabeling and cannot relabel the readonly stuff. </p><p>What's the correct way to handle this? I've tried mounting the partition in different locations, but it seems everything is targeted by the relabel</p><p><a href="https://fosstodon.org/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a> <a href="https://fosstodon.org/tags/microos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microos</span></a> <a href="https://fosstodon.org/tags/OpenSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSUSE</span></a></p>
Jeff Fortin T. (風の庭園のNekohayo)<p>As <a href="https://mastodon.social/tags/NetworkManager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkManager</span></a>'s <a href="https://mastodon.social/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> VPN/tunnel plugin has now been ported to GTK4 and works directly from the <a href="https://mastodon.social/tags/GNOME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GNOME</span></a> Control Center panel, I thought I'd finally try it out.</p><p>Once you figure out that you must only fill the gateway field, leave all IPs fields alone, tweak stuff in the Advanced dialog to have a working SOCKS proxy with "no tunnel", then it "works"… as long as you use the standard SSH port.</p><p>With SSH server ports other than 22, it fails on <a href="https://mastodon.social/tags/Fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fedora</span></a>… due to <a href="https://mastodon.social/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> 🤦</p><p><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1808435#c10" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bugzilla.redhat.com/show_bug.c</span><span class="invisible">gi?id=1808435#c10</span></a></p>
Devin Prater :blind:<p>Fuck you too, SELinux.</p><p>SELinux is preventing brltty from getattr access on the chr_file /dev/bus/usb/003/073.</p><p><a href="https://tweesecake.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://tweesecake.social/tags/SeLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SeLinux</span></a> <a href="https://tweesecake.social/tags/fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedora</span></a> <a href="https://tweesecake.social/tags/blind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blind</span></a> <a href="https://tweesecake.social/tags/brltty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>brltty</span></a> <a href="https://tweesecake.social/tags/accessibility" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accessibility</span></a></p>
FurbyOnSteroids<p>Ah.. nothing beats spending 2 hour trying to create a simple <a href="https://ohai.social/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a> service + timer + bash script to back up an sqlite database every week and it just not working because random permission issues just for selinux to be the culprit. Love how you need another tool to actually understand wtf <a href="https://ohai.social/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> wants from you. <a href="https://ohai.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
Scott Williams 🐧<p>I recently read my 8 year old daughter the <a href="https://mastodon.online/tags/SELinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SELinux</span></a> coloring book before school. I'm training up the next generation of <a href="https://mastodon.online/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> adventurers!</p><p><a href="https://mastodon.online/tags/parenting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>parenting</span></a> <a href="https://mastodon.online/tags/RedHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedHat</span></a></p>
LinuxNews.de<p>Dieser Montag ist zu ruhig:</p><p>- 39 ungelesene Mails<br>- DATEV fully operational 😳<br>- Monitoring still<br>- Keine weinenden User 🙁</p><p>So kann die <a href="https://social.anoxinon.de/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> nicht arbeiten, wir brauchen den Kick und Erfolgserlebnisse! </p><p>Tages-Spiel-Projekt: <a href="https://social.anoxinon.de/tags/selinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selinux</span></a> <a href="https://social.anoxinon.de/tags/mls" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mls</span></a>. Wer da durchsteigt, bekommt diesen Monat 500€ Prämie aufs Gehalt. Manchmal muss man sich eben eine Beschäftigung aus den Fingern saugen 😅</p><p>Let the hunger games begin 😈</p><p><a href="https://stopdisablingselinux.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">stopdisablingselinux.com/</span><span class="invisible"></span></a></p>
Replied in thread

@kde@floss.social @kde@lemmy.kde.social

Thx for the info, then it is like that.

Here is the goal proposal

phabricator.kde.org/T17370

Tbh, #bubblewrap would need to be fixed drastically to be as secure as the #Android #sandbox. And (I am not sure yet) I think even #Snaps are more secure (on #Ubuntu with #Apparmor patches) than #Flatpak with the current system.

As far as I understood, sandboxing needs to happen in #userspace, with tools like #fuse doing the work while being restricted by #MAC like #SELinux or Apparmor.

phabricator.kde.org⚓ T17370 Sandbox all the things!