LWN: Comments on "OpenSUSE Tumbleweed switches to SELinux" https://lwn.net/Articles/1009522/ This is a special feed containing comments posted to the individual LWN article titled "OpenSUSE Tumbleweed switches to SELinux". en-us Sun, 19 Oct 2025 07:34:37 +0000 Sun, 19 Oct 2025 07:34:37 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net SELinux/AppArmor https://lwn.net/Articles/1010854/ https://lwn.net/Articles/1010854/ PastyAndroid <div class="FormattedComment"> I personally feel they both have a good set of pros and cons depending on your use case. For example; in a 'professional' setup for servers and such like, I'll take SELinux with a strict policy - it's important that the systems stay secure. That, and you always know (or should) what is running, what it should be doing and why, so making and maintaining your policies to match this is easier. So, for those systems I always go the SELinux route.<br> <p> On the other hand, I tried SELinux on my personal Gentoo a couple of years ago.... it was just so much work for a simple desktop setup that in the end I threw in the towel and went AppArmor instead. I can make policies quickly and have things protected by within a few minutes. For a regular desktop setup AppArmor can be 'enough'.<br> <p> So, really both have their pros and cons, in my view. So, I do hope that both continue to be maintained.<br> </div> Wed, 19 Feb 2025 14:36:53 +0000 Simpler is usually more secure, but incentives are for complexity https://lwn.net/Articles/1010593/ https://lwn.net/Articles/1010593/ raven667 <div class="FormattedComment"> I think this is the best most succinct diagnosis of the downsides of SELinux that I've seen, that goes to the heart of _why_ crafting/auditing policy with it is hard for most people, although I don't think the cause is CISOs _trying_ to make things more complex as some sort of policy goal, my guess is that SELinux is well used enough on widely deployed systems with an ecosystem of log analysis and policy documentation around it that it's the "safe" option, it may not be the best for all cases but it has critical mass, which is often a larger consideration for long term maintenance. Maybe another theory can help explain its popularity along with its polarizing character.<br> </div> Tue, 18 Feb 2025 14:01:20 +0000 SELinux is better for containers https://lwn.net/Articles/1010453/ https://lwn.net/Articles/1010453/ DemiMarie <div class="FormattedComment"> The problem is that containers generally have complete control over what the filesystem namespace looks like within the container. <br> SELinux doesn’t care about paths. It cares about labels, and those aren’t under container control.<br> </div> Mon, 17 Feb 2025 20:03:40 +0000 SELinux is better for containers https://lwn.net/Articles/1010218/ https://lwn.net/Articles/1010218/ cschaufler <div class="FormattedComment"> MCS (multiple compartment security) is a minor component of SELinux, and you can't get it by itself. You have to accept all of the SELinux policy overhead to get MCS. Smack, on the other hand, supports compartments trivially, with much less other policy baggage. If MCS is really the only reason for you to use SELinux you may find it isn't your best alternative.<br> <p> </div> Sun, 16 Feb 2025 22:40:58 +0000 Ubuntu next? https://lwn.net/Articles/1010154/ https://lwn.net/Articles/1010154/ jond <div class="FormattedComment"> And Debian. <br> </div> Sun, 16 Feb 2025 09:49:41 +0000 Ubuntu next? https://lwn.net/Articles/1010150/ https://lwn.net/Articles/1010150/ jrjohansen <div class="FormattedComment"> There is overlap, but each has elements that do not translate well to the other. So it will very much depend on what is being confined and what type of policy you are trying to achieve.<br> <p> </div> Sun, 16 Feb 2025 08:44:36 +0000 SELinux is better for containers https://lwn.net/Articles/1010149/ https://lwn.net/Articles/1010149/ jrjohansen <div class="FormattedComment"> With AppArmor you put each container into a different instance of a profile. It is closer to the udica approach.<br> </div> Sun, 16 Feb 2025 08:40:47 +0000 SELinux is better for containers https://lwn.net/Articles/1010087/ https://lwn.net/Articles/1010087/ DemiMarie <div class="FormattedComment"> SELinux is a much better choice for containers because of MCS, which provides protection in the event a resource from one container gets leaked into another somehow.<br> </div> Sat, 15 Feb 2025 19:07:36 +0000 Ubuntu next? https://lwn.net/Articles/1010059/ https://lwn.net/Articles/1010059/ cschaufler <div class="FormattedComment"> You would have to create an SELinux policy that covers not only the problem at hand, but all system resources. You would also have to add pathname based controls to SELinux. So no, you can't implement AppArmor controls with SELinux policy.<br> </div> Sat, 15 Feb 2025 17:25:07 +0000 Ubuntu next? https://lwn.net/Articles/1010001/ https://lwn.net/Articles/1010001/ jengelh <div class="FormattedComment"> <span class="QuotedText">&gt;There are many cases where the extreme fine grained controls of SELinux are not a good match for the problem at hand</span><br> <p> If it's fine-grained, surely SELinux can represent AppArmor rules, and it's just a matter of someone writing a translator, is it not?<br> </div> Sat, 15 Feb 2025 11:22:30 +0000 Ubuntu next? https://lwn.net/Articles/1009854/ https://lwn.net/Articles/1009854/ Cyberax <div class="FormattedComment"> Yes. Let's converge on the new standard: disabled SELinux.<br> </div> Fri, 14 Feb 2025 17:36:44 +0000 Ubuntu next? https://lwn.net/Articles/1009829/ https://lwn.net/Articles/1009829/ cschaufler <div class="FormattedComment"> As the maintainer of a MAC enforcing LSM I am disappointed whenever a distribution goes into the SELinux camp. There are many cases where the extreme fine grained controls of SELinux are not a good match for the problem at hand. The other MAC implementations exist because of this. I understand that it would be convenient if there was only one MAC implementation, but then it would be convenient if there was one disk driver, one memory manager, one CPU architecture, one graphics implementation and so on.<br> </div> Fri, 14 Feb 2025 17:05:21 +0000 Simpler is usually more secure, but incentives are for complexity https://lwn.net/Articles/1009685/ https://lwn.net/Articles/1009685/ walex <div class="FormattedComment"> The simpler a security-related system the better security because it is less likely to be misconfigured or even entirely disabled, and SELinux has the huge flaw that it operates at an abstract level above actual system resources, so requires extensive mappings between the two levels and requires a lot of maintenance and to understand what a configuration actually does is quite hard; instead AppArmor operates directly at the system resource level, so it is much easier to configure and to understand what a configuration does (even if AppArmor configurations on Ubuntu have become more complex with time). My impression is that SELinux adoption is driven by the incentives of corporate security officers to add complexity.<br> </div> Fri, 14 Feb 2025 11:50:42 +0000 Ubuntu next? https://lwn.net/Articles/1009677/ https://lwn.net/Articles/1009677/ lobachevsky <div class="FormattedComment"> That leaves Ubuntu as the last one standing using Apparmor? Maybe all the big distros that use MAC can finally get behind a single thing. <br> </div> Fri, 14 Feb 2025 09:52:41 +0000 Leap 16 already changed to SELinux https://lwn.net/Articles/1009532/ https://lwn.net/Articles/1009532/ corbet Apologies, that was confusing; I just tweaked the wording to make it clear that <i>Leap 15</i> is not changing. Thu, 13 Feb 2025 16:06:31 +0000 microOS derived openSUSE Distributions https://lwn.net/Articles/1009529/ https://lwn.net/Articles/1009529/ SFalken <div class="FormattedComment"> the microOS derived openSUSE Distributions have been SELinux Enforcing by default for a few years now. It's been pretty pain free.<br> </div> Thu, 13 Feb 2025 16:03:46 +0000 Leap 16 already changed to SELinux https://lwn.net/Articles/1009524/ https://lwn.net/Articles/1009524/ Conan_Kudo This already was done for openSUSE Leap 16. It was done there first. Thu, 13 Feb 2025 15:37:05 +0000