have you looked at linux security modules? the patches are at
http://lsm.immunix.org. it pushes security policy into modules so you can
try different modules to see which policy you prefer.
> Local security/control isn't much of an issue and most likly won't be
> for a while. Remote security and protection from server deamons that
> have buffer problems are high priority to get the best protection for.
note, non-executable stack does not prevent buffer overflow attacks.
the exploit just needs to change. check out tools like libsafe and
StackGuard as well for buffer overflow protection.
thanks,
-chris
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/