Difference between revisions of "Grsecurity"
(New page: There is a huge demand from people for support of grsecurity on OpenVZ. However, unfortunately, grsecurity patch doesn't work as is (nor even applies) with OpenVZ kernel. There were some e...) |
(No difference)
|
Revision as of 18:28, 7 November 2007
There is a huge demand from people for support of grsecurity on OpenVZ. However, unfortunately, grsecurity patch doesn't work as is (nor even applies) with OpenVZ kernel. There were some efforts of supporting grsec in bug #607, but failed and the grsecurity patch was never stable with OpenVZ.
So instead OpenVZ team selected another approach. We port the features of grsecurity most requested by users and add them, maintain, document and support.
TPE (Trusted Path Execution)
Starting from 2.6.18-028stab047.1 stable kernels OpenVZ kernels support TPE grsecurity feature out of the box. Which means root user can configure TPE inside VE as usually accessing the following /proc files:
- /proc/sys/kernel/grsecurity/grsec_lock
- /proc/sys/kernel/grsecurity/tpe
- /proc/sys/kernel/grsecurity/tpe_gid
- /proc/sys/kernel/grsecurity/tpe_restrict_all
To enable TPE feature standart way just type:
# echo <GID> > /proc/sys/kernel/grsecurity/tpe_gid # echo 1 > /proc/sys/kernel/grsecurity/tpe ' lock grsecurity settings # echo 1 > /proc/sys/kernel/grsecurity/grsec_lock