[...]
> I've implemented this in another operating system before. Permissions are
> handled by a security manager daemon which holds the various keys that the
> machine trusts and what they are trusted with. Executables are signed by
> one or more keys, and the executable contains the permission
> information.
And each time a random executable is run the hash for the executable and
any libraries it might use are computed? Sounds expensive...
-- Dr. Horst H. von Brand mailto:vonbrand@inf.utfsm.cl Departamento de Informatica Fono: +56 32 654431 Universidad Tecnica Federico Santa Maria +56 32 654239 Casilla 110-V, Valparaiso, Chile Fax: +56 32 797513- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/