Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
RSBAC
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Verification|date=August 2023}}{{Short description|Access control framework for Linux kernel}} '''Rule-set-based access control''' ('''RSBAC''') is an open source [[access control]] framework for current [[Linux kernel]]s, which has been in stable production use since January 2000 (version 1.0.9a). ==Features== * Free open source GNU General Public License ([[GNU General Public License|GPL]]) Linux kernel security extension * Independent of governments and big companies * Several well-known and new security models, e.g. mandatory access control ([[Mandatory access control|MAC]]), access control list ([[Access control list|ACL]]), and role compatibility (RC) * On-access virus scanning with Dazuko interface * Detailed control over individual user and program network accesses * Fully [[Access control|access controlled]] kernel level user management * Any combination of security models possible * Easily extensible: write your own model for runtime registration * Support for latest kernels * Stable for production use * Easily portable to other operating systems The RSBAC system architecture has been derived and extended from the Generalized Framework for Access Control ([[GFAC]]) by Marshall Abrams and Leonard La Padula. RSBAC means "ruleset based access control" and is also a role-based access control ([[Role-based access control|RBAC]]) solution. The two acronyms can cause confusion. In his essay "Rule Set Modeling of a Trusted Computer System", [[Bell–LaPadula model|Leonard LaPadula]] describes how the Generalized Framework for Access Control (GFAC) approach could be implemented in the [[UNIX System V]] operating system. He introduced the clear separation between Access Enforcement Facility (AEF), Access Decision Facility (ADF) with Access Control Rules (ACR), and Access Control Information (ACI). The AEF as part of the system call function calls the ADF, which uses ACI and the rules to return a decision and a set of new ACI attribute values. The decision is then enforced by the AEF, which also sets the new attribute values and, in case of allowed access, provides object access to the subject. This structure requires all security relevant system calls to be extended by AEF interception, and it needs a well-defined interface between AEF and ADF. For better modeling, a set of request types was used in which all system call functionalities were to be expressed. The general structure of the GFAC has also been included in the ISO standard 10181-3 Security frameworks for open systems: Access control framework and into [[The Open Group]] standard Authorization (AZN) API. The first RSBAC prototype followed La Padula's suggestions and implemented some access control policies briefly described there, namely mandatory access control ([[Mandatory access control|MAC]]), functional control (FC){{Clarify|reason=clarify acronym, define technical term|date=December 2017}} and Security Information Modification (SIM), as well as the Privacy Model by [[Simone Fischer-Hübner]]. Many aspects of the system have changed a lot since then, e.g. the current framework supports more object types, includes generic list management and network access control, contains several additional security models, and supports runtime registration of decision modules and system calls for their administration. == RSBAC and other solutions == RSBAC is very close to Security-Enhanced Linux ([[Security-Enhanced Linux|SELinux]]), as they share a lot more in their design than other access controls{{citation needed|date=March 2012}} such as [[AppArmor]]. However, RSBAC brings its own hooking code instead of relying on the Linux Security Module ([[Linux Security Modules|LSM]]). Due to this, RSBAC is technically a replacement for LSM itself, and implement modules that are similar to SELinux, but with additional functionality.{{citation needed|date=March 2012}} The RSBAC framework incorporates complete object status and has a full knowledge of the kernel state when making decisions, making it more flexible and reliable.{{citation needed|date=March 2012}} However, this comes at the cost of slightly higher overhead in the framework itself. Although SELinux- and RSBAC-enabled systems have similar impact on performance, LSM impact alone is negligible compared to the RSBAC framework alone.{{citation needed|date=March 2012}} For this reason,{{citation needed|date=March 2012}} LSM has been selected as default and unique security-hooking mechanism in the Linux kernel, RSBAC coming as a separate patch only. == History == RSBAC was the first Linux role-based access control ([[Role-based access control|RBAC]]) and mandatory access control ([[Mandatory access control|MAC]]) patch.{{citation needed|date=March 2012}} ==See also== {{Portal|Free and open-source software}} {{columns-list|colwidth=30em| * [[Access control list]] * [[Attribute-based access control]] (ABAC) * [[Context-based access control]] (CBAC) * [[Discretionary access control]] (DAC) * [[Graph-based access control]] (GBAC) * [[Lattice-based access control]] (LBAC) * [[Mandatory access control]] (MAC) * [[Organisation-based access control]] (OrBAC) * [[Role-based access control]] (RBAC) * [[Capability-based security]] * [[Risk-based authentication]] * [[Computer security]] * [[Security-Enhanced Linux]] }} == References == <references /> ==External links== *[http://www.rsbac.org/ RSBAC homepage] *{{usurped|1=[https://web.archive.org/web/20061011090202/http://www.acsa-admin.org/secshelf/book001/09.pdf Leonard LaPadula's essay on GFAC]}} {{Archive url|url=https://web.archive.org/web/20061011090202/http://www.acsa-admin.org/secshelf/book001/09.pdf|date=2006-10-11}} *[https://web.archive.org/web/20090812021016/http://www.gentoo-wiki.info/Access_Control_Comparison_Table Gentoo Wiki Access Control Comparison Table] {{DEFAULTSORT:Rsbac}} [[Category:Operating system security]] [[Category:Linux security software]] [[Category:Linux kernel features]] [[Category:Access control]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Archive url
(
edit
)
Template:Citation needed
(
edit
)
Template:Clarify
(
edit
)
Template:Columns-list
(
edit
)
Template:Portal
(
edit
)
Template:Short description
(
edit
)
Template:Usurped
(
edit
)
Template:Verification
(
edit
)