On Sun, Apr 13, 2008 at 06:41:19PM -0700, Crispin Cowan wrote:That's not true. Both AppArmor and SELinux Targeted Policy address confinement of both root and non-root applications. Examples:
Rather, it is "can write to /tmp/ntpd/*". You *grant* permissions. You do *not* throw deny rules.So primarily we're concerned here with things that are running as root,
daemons and the like. Normal unix file permissions (or ACLs, if you
must) are adequate to handle anything not running as uid 0.
I don't see what apparmour and tomoya buy us that namespaces can't.Controlled overlap. You can use AppArmor to confine every *individual* piece of a web site shopping cart, and yet they still can interact with each other by sharing files. You cannot do that with namespaces.
Maybe a nicer interface, but that's something that a nice userspaceNot true. Ease of management of access control is about the security model. Cute GUIs help, but not much.
management interface can handle.
Create an empty namespace. Create /tmp/ntpd in it. Bind the outsideNow get ntpd to show you that you need to do this, in one pass. If you already know all of the files to be accessed, and you are going to write the security policy by hand, then the two approaches might be kind of comparable. But that's not how AppArmor policies are created. This is not a minor distinction.
/tmp/ntpd onto that directory. Presto, the equivalent to an allow-rule
of 'can write to /tmp/ntpd/*'.
The equivalent of 'can read, but not write /home/crispin/.ssh/id_rsa.pub'See above. The major classes of things that namespaces can't do are:
will need r-o bind mounts, which Miklos seems to have become distracted
from by working on the hooks for TOMOYA.
Do you have a good example of something that apparmour can protect against
that namespaces can't?