Language Selection

English French German Italian Portuguese Spanish

Overview of Linux Kernel Security Features

Filed under
Linux

In this article, we'll take a high-level look at the security features of the Linux kernel. We'll start with a brief overview of traditional Unix security, and the rationale for extending that for Linux, then we'll discuss the Linux security extensions.

Unix Security – Discretionary Access Control

Linux was initially developed as a clone of the Unix operating system in the early 1990s. As such, it inherits the core Unix security model—a form of Discretionary Access Control (DAC). The security features of the Linux kernel have evolved significantly to meet modern requirements, although Unix DAC remains as the core model.

Briefly, Unix DAC allows the owner of an object (such as a file) to set the security policy for that object—which is why it's called a discretionary scheme. As a user, you can, for example, create a new file in your home directory and decide who else may read or write the file. This policy is implemented as permission bits attached to the file's inode, which may be set by the owner of the file. Permissions for accessing the file, such as read and write, may be set separately for the owner, a specific group, and other (i.e. everyone else). This is a relatively simple form of access control lists (ACLs).

rest here




More in Tux Machines

Server: Data Centres, Google, SDN, Amazon, and Microsoft

  • Data Center Networking Performance: New Apps Bring New Requirements
    Large cloud services providers such as Amazon, Google, Baidu, and Tencent have reinvented the way in which IT services can be delivered, with capabilities that go beyond scale in terms of sheer size to also include scale as it pertains to speed and agility. That’s put traditional carriers on notice: John Donovan, chief strategy officer and group president at AT&T technology and operations, for instance, said last year that AT&T wants to be the “most aggressive IT company in the world.” He noted that in a world where over-the-top (OTT) offerings have become commonplace, application and services development can no longer be defined by legacy processes.
  • Google Reveals a Powerful New AI Chip and Supercomputer
    The announcement reflects how rapidly artificial intelligence is transforming Google itself, and it is the surest sign yet that the company plans to lead the development of every relevant aspect of software and hardware. Perhaps most importantly, for those working in machine learning at least, the new processor not only executes at blistering speed, it can also be trained incredibly efficiently. Called the Cloud Tensor Processing Unit, the chip is named after Google’s open-source TensorFlow machine-learning framework.
  • Google's AlphaGo AI is about to face off against the world's best Go player

    This week, the matter will be settled once and for all. Ke Jie and AlphaGo will face off in a three-game match in Wuzhen, China, as part of the Future of Go Summit being held by Google.

  • Keynote: Cloud Native Networking- Amin Vahdat, Fellow & Technical Lead For Networking, Google
  • Google's Networking Lead Talks SDN Challenges for the Next Decade
  • Peace, love and SDN
    Virtualization has been a blessing for data centers – thanks to the humble hypervisor, we can create, move and rearrange computers on a whim, without thinking about the physical infrastructure. The simplicity and efficiency of VMs has prompted network engineers to envision a programmable, flexible network based on open protocols and REST APIs that could be managed from a single interface, without worrying about each router and switch.
  • Bryan Cantrill on Integrity

    Amazon has 14 leadership principles and integrity is not on it.

  • Bankrupt school ITT pleads 'don't let Microsoft wipe our cloud data!'
    The estate of bankrupt US trade school ITT Technical Institutes is today asking a court to stop Microsoft from erasing its cloud data. In a filing [PDF] to the US District Bankruptcy Court of Southern Indiana, the caretakers of the defunct for-profit university seek an order to bar the Redmond giant from wiping the contents of ITT's Office 365 and webmail accounts for students, faculty, and administrators.

Security Leftovers: WannaCry, Windows in Linux, Windows 7, Windows 10 is Spyware

Android Leftovers

Gaming News: SHOGUN, Reus, Two Worlds and More