[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9d732d950706131435s636b852di98026aed1d9a6ac6@mail.gmail.com>
Date: Thu, 14 Jun 2007 06:35:17 +0900
From: "Toshiharu Harada" <haradats@...il.com>
To: "Rik van Riel" <riel@...hat.com>
Cc: "Stephen Smalley" <sds@...ho.nsa.gov>,
"Toshiharu Harada" <haradats@...data.co.jp>,
linux-kernel@...r.kernel.org, linux-security-module@...r.kernel.org
Subject: Re: [RFC] TOMOYO Linux
2007/6/14, Rik van Riel <riel@...hat.com>:
> > So I think pathname based call chains are advantages for
> > at least auditing and profiling.
>
> SELinux audit logs (well, whatever is in /var/log/audit on
> my system) does show the path names of objects that fail to
> be accessed as well as the name and context of the processes
> trying to access them.
>
> This is with standard Fedora and RHEL installations.
Thank you for your comment.
SELinux has a well designed robust and flexible functions.
So it should be used for everywhere. I understand it.
As you mentioned one can analyze the system (process)
behaviors from AVC logs. But the maintenance cost is not trivial.
If logging with process context is the only purpose,
current TOMOYO Linux can do it with no hustle at all.
Installation takes just 15 minutes. Please think it as something like
TOYOTA Prius. It's a compact and economical car.
Volvo is known by its security, but we don't have to use only Volvo.
TOMOYO Linux and its underlying idea are free and
you don't have to find a garage. :-)
Cheers,
Toshiharu Harada
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists