TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

SELinux, Seccomp, Falco, and You: A Technical Discussion

85 点作者 davideschiera超过 8 年前

4 条评论

motoboi超过 8 年前
I fought for years against the culture of just turning off SELinux. I read every doc trying to Do The Right Thing when configuring the likes of vsftpd, samba or kvm.<p>Didn&#x27;t manage to keep them working jerks-free long enough without disabling it. Daemons always find a way to break with selinux on with me.<p>After years, I just gave up. I feel sad about it, but just after install, I SELINUX=disabled them.<p>Is Selinux too hard? Or am I too incompetent? I really don&#x27;t know.
评论 #13143805 未加载
评论 #13144633 未加载
评论 #13143516 未加载
评论 #13143187 未加载
评论 #13143180 未加载
评论 #13146560 未加载
LinuxBender超过 8 年前
Visibility is good, but I have found SELinux to be rather simple. Most applications can be automatically configured and supported by Ansible with SELinux enabled. Most community chef cookbooks also support SELinux to some degree (depending on how much you customize things). The default policy is &quot;Targeted&quot; which only protects Redhat supported applications by default. They even added the concept of unconfined users and types which makes management of the systems even easier. It&#x27;s when folks try to overlay their custom apps into Redhat space that they get stuck. Overlaying your apps can be done, but you have to add the appropriate labels via semanage to the system. You can even add these custom rules in your custom rpm&#x27;s.<p>If you want to see the original complexity of SELinux, use the MLS policies, remove the unconfined users and types. That is the SELinux that the NSA wrote that folks mentioned here. Dan W. at Redhat made it significantly easier. Now you can even pass the soft errors from Permissive mode into tools like audit2why or audit2allow that will suggest Boolean you can enable, or rules you might create. He also adapted it to support systemd and containers to a degree.
aomix超过 8 年前
I do like it when security polices are compiled into the program and like it even better when they are impossible to disable. That way programs avoid getting out of sync with best security practices since they will start crashing for all users&#x2F;developers. Not just users of X but not Y. However programs that try to work with pledge&#x2F;capsicum&#x2F;seccomp&#x2F;others are great but always going to be in a very small minority. So something like SELinux and Apparmor being able to enforce policies on arbitrary software seems like a necessary seatbelt.
contingencies超过 8 年前
I used SELinux commercially in 2000 on an embedded surveillance platform project. I&#x27;ve never used it since, because it&#x27;s such a hassle to deal with. Special snowflake systems are just so rarely the right thing to do.<p>I do believe this type of approach will become easier as CI&#x2F;CD becomes the norm, but that&#x27;s gonna be awhile yet.<p>IMHO to date you will often get more value for time invested out of alternate strategies like thinning down a kernel and userspace, running a server diskless with frequent reboots, adding a second server for failover, using a grsec kernel, or running a decently maintained and tuned IDS&#x2F;firewall combo.