[SGVLUG] Reverse Engineering / Analyzing the SELinux Kernel Source
Code?
sean at seanodonnell.com
sean at seanodonnell.com
Fri May 19 15:30:04 PDT 2006
All this talk of SELinux reminds of a question I've never really known
how/who/where to ask...
Q?: Has anyone reverse engineered the SELinux Kernel? Or analyzed the
source code for possible rootkits or 'undocumented features'??
I've always avoided using that 'hardened' kernel due to privacy
concerns in regards to (possible) circumvention capabilities by the NSA.
My confidence-level in the NSA in terms of (innocent civilian)
privacy/security has been at a state of FUD for years, and with the
recent turn of publicized events (which only confirmed my prior
assumptions), that concern has not receded.
I don't know enough about kernel programming in general to determine
whether or not such circumvention is even possible, although I assume
it would be.
I'm sure this has been thought-through and discussed by others before
me, (hopefully by those who actually understand kernel architecture),
but I was just curious.
Anyone?
Thanks,
Sean O'Donnell
South Pasadena, CA
sean at seanodonnell.com
http://seanodonnell.com
PGP Public Key: 0x5A74AC15
PGP Public Key Server: http://pgp.mit.edu
More information about the SGVLUG
mailing list