Koozali.org: home of the SME Server

lomac security?

hanscees

lomac security?
« on: January 05, 2001, 07:04:27 PM »
At
http://www.pgp.com/research/nailabs/secure-execution/lomac.asp
there is a paper on lomac:

It seems to be easily installed. Could it be useful for e-smith?

hc


Several projects have demonstrated that kernel-resident Mandatory
              Access Control (MAC) mechanisms can protect the integrity of Free
              UNIX systems from malicious code and users. However, implementations
              of these mechanisms have traditionally required invasive kernel
              modifications, sometimes coupled with supporting modifications of
              user-space utilities, as well. This requirement has hindered the
              adoption of MAC mechanisms in the mainstream Free UNIX community.
              Adoption has been further discouraged by the difficulty of starting small and evolving towards a complete MAC solution - in general,
              the complete set of extensive modifications must be made before
              MAC can provide any useful protection.
LOMAC is an attempt to make an easily-adoptable form of MAC integrity protection available to the Free UNIX community without the discouraging necessity of kernel modifications. LOMAC implements a simple form
              of MAC integrity protection based on Biba's Low Water-Mark model
              in a Linux Loadable Kernel Module (LKM). Although it trades off
              some of the advanced MAC features found in traditional MAC implementations,
              LOMAC provides useful integrity protection without any modifications
              to the kernel, applications, or their existing configurations. LOMAC
              is designed to be compatible with existing software, and ships with
              a one-size-fits-all default configuration. LOMAC may be used to
              harden currently-deployed Linux systems simply by loading the LKM
              into the kernel shortly after boot time.