As I understand SELinux, mandatory access controls and labels, the security administrator can set up a security policy that will lock root out of everything. Granted that is not very useful, but it is a demonstration of separation of privilege, and severely restricts what a person can do. The goal of this requirement is to prevent an attacker who may have gained root from reading the mail queue. George Toft, CISSP, MSIS 623-203-1760 "That which does not kill us makes us stronger." Darrin Chandler wrote: > George Toft wrote: > >>Requirements: >>2. Files owned by vpopmail:vchkpw can only be read by said user:group - >>this includes root. We need to lock root (and every other user) out of >>the messages. >> > > >>#2 sounds like a job for SELinux. Alternatives are welcome :) >> > > > You mean keep out junior sysadmins who have root access, or really keep > root out? I don't know of any way to really keep root out. Root has > access to everything. Period. Crypto can't solve it, unless the system > only has access to the cyphertext (if you encrypt/decrypt locally then > root can read the plaintext from memory, and/or get the key and read > everything). Different schemes have been proposed and implemented so > that root can't do this or that but none that I know of really work > against a sophisticated attacker, because in *nix "root == the system." > > If you (wisely) take it as a given that root can compromise your box, > then your problem becomes locking down root access. There are pretty > effective, well known ways to do that. > > --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change you mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss