Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Out of those, the only things that aren't covered by SELinux are things that would be expected to be set by wrapper/launcher process (modifying namespaces - which covers nspawn and setting cgroups). Everything else, i.e. actual run-time access decisions, is more fine grained and controllable through SELinux, including level of access control like whether a program can listen on a socket or bind a socket, while still permitting it to connect.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: