Главная
Study mode:
on
1
Intro
2
Blob pointers
3
SEC IDs
4
Format Options
5
Netlabel
6
Stacking
7
Tips for Stacking
8
How to Bug
9
Friendly Heperm
10
Stacks
Description:
Explore security module stacking in Linux systems through this informative conference talk. Learn about the potential risks and pitfalls of combining security models, and discover strategies to avoid conflicts when configuring system security. Gain insights into the configuration of existing modules, known conflicts, and best practices for developing new modules using the infrastructure. Delve into networking security challenges and their implications. Benefit from the expertise of Casey Schaufler, the module stacking developer, as he shares his extensive experience in Unix kernels, access control systems, and Linux Security Modules. Understand key concepts such as Blob pointers, SEC IDs, Format Options, Netlabel, and Stacking. Acquire practical tips for effective stacking and troubleshooting techniques. Conclude with an exploration of Friendly Heperm Stacks to enhance your understanding of security module implementation in Linux environments.

Security Module Stacks That Don't Fall Over

Linux Foundation
Add to list
0:00 / 0:00