Research
.
Skip Search Box

SELinux Mailing List

Re: Question about SELinux

From: Stephen Smalley <sds_at_tislabs.com>
Date: Thu, 4 Oct 2001 09:07:55 -0400 (EDT)

On Thu, 4 Oct 2001, sunil wrote:

> 2. The users should be able to run only well-behaved programs on the server.
> A well-behaved program would be one that uses reasonable amounts of
> CPU,
> disk, network and memory resources and does not try to compromise the
> security of the system.
> Therefore, malicious programs of any kind should be quietly terminated.

SELinux provides flexible and fine-grained nondiscretionary access controls, so you can use it to provide separation and confinement of these untrusted users and their programs. However, SELinux does not currently provide any additional controls over resource usage beyond what is already present in Linux. Also, the SELinux access controls don't terminate processes that violate the policy - they merely deny access and optionally audit such access denials. Of course, this may yield the same effect in many cases, since many programs simply exit upon error.

--
Stephen D. Smalley, NAI Labs
ssmalley@nai.com




--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Thu 4 Oct 2001 - 09:21:31 EDT
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service