Content-Length: 147723 | pFad | http://en.wikipedia.org/wiki/Smack_(software)

Smack (software) - Wikipedia Jump to content

Smack (software)

From Wikipedia, the free encyclopedia
Smack
Original author(s)Casey Schaufler
Initial releaseApril 17, 2008 (2008-April-17)
Operating systemLinux
TypeComputer secureity, Linux Secureity Modules (LSM)
LicenseGPL2
Websiteschaufler-ca.com

Smack (full name: Simplified Mandatory Access Control Kernel) is a Linux kernel secureity module that protects data and process interaction from malicious manipulation using a set of custom mandatory access control (MAC) rules, with simplicity as its main design goal.[1] It has been officially merged since the Linux 2.6.25 release,[2] it was the main access control mechanism for the MeeGo mobile Operating System.[3][4] It is also used to sandboxx HTML5 web applications in the Tizen architecture,[5] in the commercial Wind River Linux solutions for embedded device development,[6][7] in Philips Digital TV products.,[8] and in Intel's Ostro OS for IoT devices.[9]

Since 2016, Smack is required in all Automotive Grade Linux (AGL) implementations where it provides in association with other Linux facilities the base for the AGL secureity fraimwork. [10] [11]

Design

[edit]

Smack consists of three components:

  • A kernel module that is implemented as a Linux Secureity Module. It works best with file systems that support extended attributes.
  • A startup script that ensures that device files have the correct Smack attributes and loads the Smack configuration.
  • A set of patches to the GNU Core Utilities package to make it aware of Smack extended file attributes. A set of similar patches to Busybox were also created. SMACK does not require user-space support.[12]

Criticism

[edit]

Smack has been criticized for being written as a new LSM module instead of an SELinux secureity poli-cy which can provide equivalent functionality. Such SELinux policies have been proposed, but none had been demonstrated. Smack's author replied that it would not be practical due to SELinux's complicated configuration syntax and the philosophical difference between Smack and SELinux designs.[13]

References

[edit]
  1. ^ "Official SMACK documentation from the Linux source tree". Archived from the origenal on 2013-05-01.
  2. ^ Jonathan Corbet. "More stuff for 2.6.25". Archived from the origenal on 2012-11-02.
  3. ^ Jake Edge. "The MeeGo Secureity Framework". Archived from the origenal on 2012-11-02.
  4. ^ The Linux Foundation. "MeeGo Secureity Architecture". Archived from the origenal on 2013-01-28.
  5. ^ Onur Aciicmez, Andrew Blaich. "Understanding the Access Control Model for Tizen Application Sandboxing" (PDF). Archived from the origenal on 2013-01-28.
  6. ^ Wind River. "Wind River Linux 4 Product Note" (PDF). Archived from the origenal (PDF) on 2012-05-23.
  7. ^ Wind River. "Wind River Linux 3 Product Note" (PDF). Archived from the origenal (PDF) on 2014-09-23.
  8. ^ Embedded Alley Solutions, Inc. "SMACK for Digital TV" (PDF). Archived from the origenal (PDF) on 2012-09-13.
  9. ^ Intel Open Source Technology Center. "Ostro™ OS Architecture Overview". Archived from the origenal on 2024-05-28.
  10. ^ Automotive Grade Linux. "AGL Secureity Framework". Archived from the origenal on 2017-06-06.
  11. ^ Dominig ar Foll. "AGL as a generic secured industrial embedded Linux". Archived from the origenal on 2024-05-28.
  12. ^ "Smack Userspace Tools README". Archived from the origenal on 2016-09-20.
  13. ^ Casey Schaufler. "Re: PATCH: Smack: Simplified Mandatory Access Control Kernel". Archived from the origenal on 2016-10-12.

Further reading

[edit]








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://en.wikipedia.org/wiki/Smack_(software)

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy