Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Archives
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets
Publications
Related Links
|
SELinux Mailing ListRe: [RFC][PATCH] Control ability to have a writable executable mapping
From: Joshua Brindle <jbrindle_at_tresys.com>
Date: Tue, 09 Nov 2004 18:15:23 -0500
>I know that the PAX/selinux integration patch approaches this That said, I know the current implementation breaks the current domain source, target object type model, and it would be better to make it the same for no better reason than consistancy. On the other hand, you are right, it does impose a higher cost on policy writing. However, it isn't clear that SELinux facilitates this sort of flag setting via permissions well, since SELinux will deny by default all the flags would be off (!) which is less secure.
>Please note that this patch does NOT provide the functionality of PAX,
>Constructive comments welcome. Joshua Brindle -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Tue 9 Nov 2004 - 18:15:38 EST |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |