Главная
Study mode:
on
1
Intro
2
Simplified Mandatory Access Control Kernel
3
Compared To SELinux
4
Compared To AppArmor
5
Smack is not a privilege system
6
Built In Smack Access Rules
7
Specified Smack Access Rules
8
Access Modes
9
Access Quirks
10
The Reference Threat
11
Complications
12
Choosing A Use Case
13
Tooling Considerations
14
Choosing A Distribution
15
The Three Domain Model
16
Toolbox
17
What Accesses Are Unwanted?
18
Simple Configuration
19
Transmuting Directories
20
var/lib/apt
21
Graphically
22
With Implicit Access
23
With Privileged Access
24
And Shared Data
25
To Consider
26
Work To Be Done For The Distribution
Description:
Explore the development of a Smack reference policy in this 45-minute conference talk by Casey Schaufler, author of the Simplified Mandatory Access Control Kernel (Smack) Linux security module. Learn about Smack's functionality, its differences from SELinux and AppArmor, and the ongoing effort to create a reference set of Smack rules for a major Linux distribution. Discover the three-domain approach to threat protection, the process of selecting a target distribution, and the challenges faced in implementing the policy. Gain insights into Smack's built-in and specified access rules, access modes, and quirks. Understand the reference threat model, tooling considerations, and the proposed simple configuration for various system components. Engage with the project's current state, identified challenges, and future work required for distribution integration.

Smack Reference Policy: Creating a Rule Set for Linux Distributions

Linux Foundation
Add to list
0:00 / 0:00