On 11/15/2009 11:22 AM, Dirk Heinrichs wrote:

SELinux allows to spread the tasks root needs to do or can do accross several
roles. Of course, if only one single person has root access to the system this
doesn't make sense. But we're talking about cases where several people (incl.
the malicious attacker) have root access. So you can very well configure a
(SE-)Linux system so that "root" can't do everything.

So how do you get your machine back if you forbid yourself to change its configuration then?


Reply via email to