On Sunday 27 May 2007 10:49, Németh Tamás <[EMAIL PROTECTED]> wrote:
> Does Debin Etch have some extra chroot
> restrictions, /dev/mem, /dev/kmem, /dev/port, /proc/<PID>/stat,
> /proc/<PID>maps, Linux privileged I/O related or other security
> enhancements beyond to the security of the vanilla Linux kernel?

The SE Linux support in Etch will address some of your requirements in this 
regard.

SE Linux is not based on chroot but on the "domain" of the program in 
question.  So a program can be run without chroot but still have great 
restrictions applied to it.

-- 
[EMAIL PROTECTED]
http://etbe.coker.com.au/          My Blog

http://www.coker.com.au/sponsorship.html Sponsoring Free Software development

Reply via email to