Why Do You Want To Write A Linux Security Module? We already have terrific security
3
When Is A Linux Security Module The Right Choice? Add access control Things controlled by
4
Restrictive Controls
5
When Is A Linux Security Module The Wrong Choice?
6
What Are The Alternatives?
7
Security Module Don'ts
8
What Do You Want To Protect?
9
What Do You Want To Protect it From?
10
The Hooks And Blobs Of A Linux Security Module
11
Access Control Hooks
12
Hooks Are Bail On Fail
13
State Maintenance Hooks
14
Access Hook Return values
15
Infrastructure Managed Security Blobs
16
Module Details
17
Setting Blob Sizes
18
The Blob, the Secid and the Secctx
19
Lifecycle Management Of A secctx
20
Credentials
21
Tasks
22
proc//attr
23
Object Based Hooks
24
Inodes
25
Traditional File Security Attributes
26
Extended Attributes
27
IPC objects and Keys
28
CONFIG_SECURITY_PATH
29
Aliases
30
Symlinks
31
Hardlinks
32
Mounts
33
Mount Namespaces
34
Network Hooks
35
Network Labels - Secmark
36
Network Labels - NetLabel
Description:
Explore the fundamentals of creating a Linux Security Module (LSM) in this comprehensive tutorial led by Casey Schaufler from Intel, joined by experts Paul Moore and John Johansen. Learn when to implement an LSM, its capabilities and limitations, and alternatives such as mainline changes and namespaces. Dive into security module data management conventions, filesystem, process, networking, and audit interfaces. Gain insights on proper implementation techniques for upstream acceptance, understanding LSM infrastructure, and mastering essential concepts like hooks, blobs, and access control. Cover topics including security attribute management, credential handling, task management, object-based hooks, and network security labels. Acquire the knowledge needed to enhance Linux kernel security through expert guidance in this 95-minute session.