Once upon a time, Tomas Hozza <tho...@redhat.com> said:
> That's where seccomp kicks in, it acts as a 2nd wall of defence. In case
> of a security hole being present in the server process, it goes further
> than a chroot, it prevents the attacker from making socket connections
> orexecuting his code, as his "playing field" is significantly reduced.
> There's very little he can do.”

How is that different from an SELinux policy?  How is the additional
resitrction handled (if it isn't SELinux, what mechanism is used to do
the restriction)?
-- 
Chris Adams <li...@cmadams.net>
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to