CAP_SYS_ADMIN: the new root
CAP_SYS_ADMIN: the new root
Posted Mar 15, 2012 16:00 UTC (Thu) by dpquigl (guest, #52852)In reply to: CAP_SYS_ADMIN: the new root by mjthayer
Parent article: CAP_SYS_ADMIN: the new root
Posted Mar 15, 2012 16:12 UTC (Thu)
by mjthayer (guest, #39183)
[Link] (5 responses)
So you are saying that the key feature of MAC in SELinux which PolicyKit is lacking is that it allows you to say "this action can only be performed by this user or set of users in combination with this binary or set of binaries", rather than just the first part of that? I realise of course that you will wince at the way I formulated that.
Posted Mar 15, 2012 17:19 UTC (Thu)
by dpquigl (guest, #52852)
[Link] (4 responses)
Posted Mar 15, 2012 17:25 UTC (Thu)
by dpquigl (guest, #52852)
[Link] (1 responses)
Posted Mar 16, 2012 0:17 UTC (Fri)
by filteredperception (guest, #5692)
[Link]
+1. Yeah yeah yeah I should proofread more before hitting submit, but still... (Not saying that on a tight budget that LWN probably has they should dedicated a lot of resources. Just saying, if somebody has that itch, +1 more person would be gratified)
Posted Mar 16, 2012 5:18 UTC (Fri)
by mjthayer (guest, #39183)
[Link] (1 responses)
Posted Mar 16, 2012 9:11 UTC (Fri)
by mjthayer (guest, #39183)
[Link]
CAP_SYS_ADMIN: the new root
> Central administration of security policy is just one property of MAC. The other more important one in SELinux is binding permissions to code and not user identity.
CAP_SYS_ADMIN: the new root
CAP_SYS_ADMIN: the new root
CAP_SYS_ADMIN: the new root
CAP_SYS_ADMIN: the new root
CAP_SYS_ADMIN: the new root
