Having implemented ACLs twice on Unix and Unix-like systems, I don't seeBecause instead of having an all-powerful account (which we so lovingly know as root), you can separate specific roles to different accounts. To use Windows' ACLs as an example:
what the fetish some people have for them. Frankly juts about anything
you can do with ACLs (and anything you should want to do) you can do
with users/groups and the standard Unix/Linux permissions. Why add
unneeded cruft to the kernel.
I know that some spooks think you have toUm.. Forgive me for a second, but are you suggesting that a Linux system running a service(s) under full root privileges (such as Apache) is just as secure as a Linux system running the same process but with compartmentalisation to make sure that each service has access to just the files and directories it needs, achieved (currently) via AppArmor, SELinux, or a similar ACL system? If you really do think that, you may want to read a few more papers and/or books. If Apache is bound to port 80 as root and is not restricted (via ACLs) to just the directories, files, libraries and whatnot that it needs access to, and it is compromised, then the attacker has full control over your server. If you have ACLs in place, the attacker can only access the files that Apache has access to, thus protecting all other files on the server (and thus greatly decreasing the chances of the attacker implementing a hard-to-detect kernel rootkit, or some other malware).
have ACLs to have a trusted system, but these are the same people who
think you need to violate my freedoms to protect them.