http://www.ibm.com/developerworks/linux/library/l-posixcap.html
This covers part of what you are talking about.  Least authority exec.
 Its one of the cures to the SUID bit problem.

Wonder if the exec bit would be better done with a normal posix
capabilities flag saying that this is on offer.  void
fdoc_set_exec_pola(); replaced by a posix capabilities security flag
on exec of program telling about the usage of this feature.  So
scanning applications its simple to find what ones are using this
feature.  This also allows optimization.  No on avoid code.

Even possibly a second flag forbin or allow the transfer of
permissions down the line ie forbin from using this feature. This
might be a feature shared with posix file capablities.

Note each access right passed need to have a option of pass to no one else.

Yes I would say prototype in LSM.   Feature like this with work could
endup in main line too.  The module you are very much laying out is
the default kernel model of application controlled security.

Peter Dolding
-
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to