Dean Anderson wrote:
Michael Sprague wrote:
...couldn't you use something like grsecurity or selinux to prevent
even root from doing anything bad to the network attached storage?

"No, they won't help if root can't be trusted". The reason is that once
you have kernel loader privilege, you can alter the kernel to circumvent
whatever security has been added to it...

Your answer may be correct, but I'm not sure it is relevant in the context of the original question.

If the original question is about providing access to a file system over a network where the remote *clients* don't have a secure and trusted root, then obtaining "kernel loader privilege" on the server is not likely to happen.

Where SELinux comes into play is if you want to retain some of the behaviors you get when you configure NFS to be cooperative with root users on the client machines, but want finer grain control over what those users can do. In this case you use SELinux to clamp down on what the NFS server is capable of doing, and the clients can't bypass that security as long as the server isn't breached.

 -Tom

--
Tom Metro
Venture Logic, Newton, MA, USA
"Enterprise solutions through open source."
Professional Profile: http://tmetro.venturelogic.com/

_______________________________________________
bblisa mailing list
[email protected]
http://www.bblisa.org/mailman/listinfo/bblisa

Reply via email to