- 论坛徽章:
- 0
|
这个问题有点意思. 从理论上说, 6楼的说法不对. 因为SELINUX是为了实现 MANDATORY ACCESS CONTROL. 而不是传统的DAC(Discretionary Access Control). 也就是说,即使是ROOT,有些东西如果被禁止了的话,他也是不能改的.
下面这段COPY自WIKI: http://en.wikipedia.org/wiki/SELinux
A Linux kernel integrating SELinux enforces mandatory access control policies that confine user programs and system servers to the minimum amount of privilege they require to do their jobs. This reduces or eliminates the ability of these programs and daemons to cause harm when compromised (via buffer overflows or misconfigurations, for example). This confinement mechanism operates independently of the traditional Linux access control mechanisms. It has no concept of a "root" super-user, and does not share the well-known shortcomings of the traditional Linux security mechanisms (such as a dependence on setuid/setgid binaries).
不过从操作上来说, 总有方法来停止SELIUNX的. 如果没有,那么一旦启动起来就没法改了么? 这个我就不清楚了. 不过我记得SELINUX是可以被禁止的.
另外,有时光取得ROOT权限还不够. 要找到KERNEL的漏洞,然后在KERNEL里注入代码,这时你才是控制了整个"世界". 不过用户还可以用VMM OR HYPERVISOR OR HARDWAER 来保护他的KERNEL.所以这时只控制一个KERNEL也是不够的 |
|