Главная
Study mode:
on
1
Intro
2
Casey Schaufler Kernel developer from the 19705
3
Linux Security Module Collection of security hook
4
Security Module Stack A collection of security modules
5
Major Security Module
6
Stacking as of 4.18
7
Security Blobs
8
Stacking with infrastructure managed blobs
9
32 bits allows one module's data
10
Identify which to use
11
Unrecognized Option
12
Packet Labeling
13
Pushed attributes
14
Netlabel Configuration
15
Granularity
16
Redundant purpose
17
User Space
18
Networking
19
Process Attributes
20
Think twice about using secids
21
Be careful with state
Description:
Explore the intricacies of security module stacking in Linux systems with kernel developer Casey Schaufler from Intel. Learn about the new flexibility in configuring system security, potential risks of combining security models, and how to avoid pitfalls. Discover the configuration of existing modules, known conflicts, and best practices for new modules to reduce potential conflicts. Gain insights into networking security challenges and their solutions. Delve into topics such as Linux Security Modules, security blobs, packet labeling, Netlabel configuration, and process attributes. Benefit from Schaufler's extensive experience in Unix kernels, access control systems, and Linux security infrastructure as he shares valuable knowledge on creating robust and useful security module stacks.

Security Module Stacks: Flexibility and Pitfalls in System Security Configuration

Linux Foundation
Add to list
0:00 / 0:00