Peformance in detriement of security
Posted: Tue Jun 01, 2010 5:02 am
Hey all,
This topic is a bit offtopic regarding grsecurity but is about security in general within Linux.
The more I read news about the kernel, the more I am concerned about the decision.
In order to improve performance or to _simplify_, features are not pushed inside the kernel itself.
Eg: KMS, netfilter (with a growing number of patch).
However, it makes the kernel bigger and bigger.
And everything running in the kernelland has the maximum privilege.
A sound security would be to process features in the userland as much as possible, and forward result to the kernel.
As a user (selecting option and compiling the kernel), what can I do in order to push to lighten the kernel and use more userland?
Thanks
This topic is a bit offtopic regarding grsecurity but is about security in general within Linux.
The more I read news about the kernel, the more I am concerned about the decision.
In order to improve performance or to _simplify_, features are not pushed inside the kernel itself.
Eg: KMS, netfilter (with a growing number of patch).
However, it makes the kernel bigger and bigger.
And everything running in the kernelland has the maximum privilege.
A sound security would be to process features in the userland as much as possible, and forward result to the kernel.
As a user (selecting option and compiling the kernel), what can I do in order to push to lighten the kernel and use more userland?
Thanks