Overview
Explore security module stacking in Linux systems through this informative conference talk. Learn about the potential risks and pitfalls of combining security models, and discover strategies to avoid conflicts when configuring system security. Gain insights into the configuration of existing modules, known conflicts, and best practices for developing new modules using the infrastructure. Delve into networking security challenges and their implications. Benefit from the expertise of Casey Schaufler, the module stacking developer, as he shares his extensive experience in Unix kernels, access control systems, and Linux Security Modules. Understand key concepts such as Blob pointers, SEC IDs, Format Options, Netlabel, and Stacking. Acquire practical tips for effective stacking and troubleshooting techniques. Conclude with an exploration of Friendly Heperm Stacks to enhance your understanding of security module implementation in Linux environments.
Syllabus
Intro
Blob pointers
SEC IDs
Format Options
Netlabel
Stacking
Tips for Stacking
How to Bug
Friendly Heperm
Stacks
Taught by
Linux Foundation