|Main Archive Page > Month Archives > linux-kernel archives|
On Wed, Oct 03, 2007 at 01:12:46AM +0100, Alan Cox wrote:
> The value of SELinux (or indeed any system compartmentalising access and
> limiting damage) comes into play when you get breakage - eg via a web
> browser exploit.
well, being sick of the number of times one has to upgrade the browser for exploits, I addressed it in a different way.
I ran firefox setuid to a different (not my main user), uid+gid, gave my main account that gid as a supplemental group, and gave that uid access to the X magic cookie.
... which only changes the nature of any exploit that might occur - any injected code would have to go via X to attack my main account.
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to firstname.lastname@example.org More majordomo info at http://vger.kernel.org/majordomo-info.html