[SGVLUG] Reverse Engineering / Analyzing the SELinux Kernel Source Code?

sean at seanodonnell.com sean at seanodonnell.com
Fri May 19 15:30:04 PDT 2006


All this talk of SELinux reminds of a question I've never really known  
how/who/where to ask...

Q?: Has anyone reverse engineered the SELinux Kernel? Or analyzed the  
source code for possible rootkits or 'undocumented features'??

I've always avoided using that 'hardened' kernel due to privacy  
concerns in regards to (possible) circumvention capabilities by the NSA.

My confidence-level in the NSA in terms of (innocent civilian)  
privacy/security has been at a state of FUD for years, and with the  
recent turn of publicized events (which only confirmed my prior  
assumptions), that concern has not receded.

I don't know enough about kernel programming in general to determine  
whether or not such circumvention is even possible, although I assume  
it would be.

I'm sure this has been thought-through and discussed by others before  
me, (hopefully by those who actually understand kernel architecture),  
but I was just curious.

Anyone?

Thanks,

Sean O'Donnell
South Pasadena, CA
sean at seanodonnell.com
http://seanodonnell.com

PGP Public Key: 0x5A74AC15
PGP Public Key Server: http://pgp.mit.edu



More information about the SGVLUG mailing list