On Mon 10 Mar 2014 12:14:28 NZDT +1300, Kent Fredric wrote:

> On 10 March 2014 11:41, C. Falconer <[email protected]> wrote:
> 
> > Drop a message in the log file, if nothing else.

> I would imagine if you logged everywhere read access failed due to
> security, you'd have a log file so deep you would quickly run out of
> diskspace.

I have not used selinux because I get apparmor out of the box, so I
can't speak for selinux. However, apparmor behaves as I described, it
prevents access if the access isn't permitted by one of its apparmor
rules. Failures are logged, they should trigger your alarm (if you have
the system correctly configured). For configuration you put the system
into trial mode, which is the as-shipped state. Here, all accesses
denied by rules are logged and permitted, so you set up your rule base.

The level of control with apparmor rules puts filesystem rules to shame.
Once you are on a production server you start apparmor during early
boot, after which it can not be disabled. root has no special
privileges.

This sounds like a sensible system to me, to overcome the historic state
of the *ix permission system, which was primitive when designed and is
not really that adequate today. It's even more true for filesystem
permissions, hence complex (and IMHO barely usable) afterthoughts like
ACLs, which I find frequently unusable because they don't give me things
like "if the file is under this directory, I want permissions XYZ",
especially after being copied there. Perhaps extended attributes and
capabilities go some way towards apparmor/selinux, but obviously not far
enough or server vendors wouldn't have developed apparmor and selinux.

Perhaps it's just that selinux sucks compared with apparmor...? ;-)

Volker

-- 
Volker Kuhlmann
http://volker.top.geek.nz/      Please do not CC list postings to me.
_______________________________________________
Linux-users mailing list
[email protected]
http://lists.canterbury.ac.nz/mailman/listinfo/linux-users

Reply via email to