Re: Secure-linux and standard kernel

Mike (ford@omnicron.com)
Thu, 25 Jun 98 13:42:05 -0700


Just FYI, on where to store capability information for programs:

SVR4.1/ES and SVR4.2/ES/MP (Unixware 2.0) store this information in a
single, system-wide regular file and copy the information from that file
into the kernel at boot time. The commands which manipulate the
privileges of programs both modify the stored file and pass the
information to the kernel. The kernel keeps all the per-program
privilege information in memory only.

It struck me as a bit kludgeish but it does enable an easy security
audit of stored privileges at any time by cating that file.

-=] Ford [=-

"Well, he didn't know what to do, so (In Real Life: Mike Ditto)
he decided to look at the government, ford@omnicron.com
to see what they did, and scale it http://www.omnicron.com/~ford/ford.html
down and run his life that way." -- Laurie Anderson

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu