Language Selection

English French German Italian Portuguese Spanish

Overview of Linux Kernel Security Features

Filed under
Linux

In this article, we'll take a high-level look at the security features of the Linux kernel. We'll start with a brief overview of traditional Unix security, and the rationale for extending that for Linux, then we'll discuss the Linux security extensions.

Unix Security – Discretionary Access Control

Linux was initially developed as a clone of the Unix operating system in the early 1990s. As such, it inherits the core Unix security model—a form of Discretionary Access Control (DAC). The security features of the Linux kernel have evolved significantly to meet modern requirements, although Unix DAC remains as the core model.

Briefly, Unix DAC allows the owner of an object (such as a file) to set the security policy for that object—which is why it's called a discretionary scheme. As a user, you can, for example, create a new file in your home directory and decide who else may read or write the file. This policy is implemented as permission bits attached to the file's inode, which may be set by the owner of the file. Permissions for accessing the file, such as read and write, may be set separately for the owner, a specific group, and other (i.e. everyone else). This is a relatively simple form of access control lists (ACLs).

rest here




More in Tux Machines

Today in Techrights

Linux Kernel and Linux Event

Red Hat News

Leftovers: Software and HowTos

  • Top Software
    The number of open source applications and tools that are available on today’s popular operating systems is simply mind-blowing. They come in all forms. Small scripts and console tools that can be easily integrated into large projects, feature-rich applications that offer everything a complete solution, well designed tools, games that encourage real participation, and eye catching candy. Open source software holds many compelling advantages over proprietary software. Open source improves the quality of the code, keeps costs down, encourages innovation and collaboration, combined with superior security, freedom, flexibility, interoperability, business agility, and much more.
  • Kodi 17.0 "Krypton" Release Candidate 3 Updates Estuary Skin, Fixes More Bugs
    The wait is almost over, and you'll finally be able to enjoy a much modern, improved, and full of new technologies Kodi media center on your PC or HTPC device, be it an Apple TV or Raspberry Pi. Martijn Kaijser announced the third Release Candidate (RC) development version for the Kodi 17.0 "Krypton" media center, and it looks to us like these pre-releases are getting smaller by the day, the RC3 build including only seven changes listed on the release notes attached to the official announcement.
  • Accessing Bingo Sites through Linux
  • Fedora - linux and shell.
  • Getting started with shell scripting