[tomoyo-users-en 705] Re: Harbinger of a shift in Linux Security Modules

Back to archive index
Tetsuo Handa pengu****@I-lov*****
Tue Mar 5 23:11:00 JST 2019


Hello.

Since Linux 5.0 was released, I refreshed the tarballs.
There is no change except supporting the latest kernels.

  ccs-patch-1.8.5-20190305.tar.gz           MD5:44445f53d2299643329699055e995656
  akari-1.0.38-20190305.tar.gz              MD5:9999f7af036162cb6b16b8a9527ce9d7
  caitsith-patch-0.2-20190305.tar.gz        MD5:dddd0b2ebc987fb9418ea67faa12eb46

Since TOMOYO 2.x will become TOMOYO 2.6 in Linux 5.1, I added
manuals and uploaded userspace tools for TOMOYO 2.6.

  tomoyo-tools-2.6.0-20190305.tar.gz        MD5:9999759f18b0ade9532120fef7b9b3a5

Most notable change is that you will be able to enable both TOMOYO 2.6 and
one of SELinux/Smack/AppArmor at the same time. To make this change possible,
how to specify "default LSM module to enable" at kernel build time and how to
specify "LSM module to actually enable" at kernel boot command line option will
change. In particular, the security= kernel boot command line option becomes
deprecated and the lsm= kernel boot command line option should be used instead.
For more information, please check https://tomoyo.osdn.jp/2.6/chapter-3.html .

Another bit of improvement in TOMOYO 2.6 is that you will be able to specify
multiple use_group entries to each domain (like TOMOYO 1.8 does). In other words,
you can define up to 256 acl_group entries for each namespace at exception policy
and include them for that namespace using use_group entries at domain policy.

TOMOYO 2.6 started undergoing fuzzing tests by syzbot, for we no longer need to
assign instances for testing TOMOYO 2.6 because TOMOYO 2.6 can run on instances
assigned for SELinux/Smack/AppArmor.

Please let me know if you found any problems.




More information about the tomoyo-users-en mailing list
Back to archive index