Sysmask is a powerful and flexible security enhancement package for Linux
systems, featuring interactive security reactions, protection against
both system level and user level networking risks, capability of disarming
many kernel vulnerabilities, etc.
If you want to check the solidity of sysmask protection, check
that resists to arbitrary code executions.
General help topics
- What is sysmask?
- Availability and copyright
- How to install sysmask.
- How secure is sysmask?
- Performance overhead of sysmask
- Design principles of sysmask
- Comparing with other security models
- Customized user authentication schemes based on sysmask
- Future extensions and enhancements
- Bugs and bug reports
- Structure of sysmask, and how it works
- The utility program /bin/sysmask
- List of available masks and their meanings
- Mask triggers
- Exceptions to system call masks
- The log file of sysmask
- Sysmask configuration
- How to configure file access policies
- Socket address to pathname translation
- How to configure sysmask for a software
- Runtime reconfiguration of a token
- Examples of software configuration
- Token switching in the template configuration
- System call risk level classification
- List of system calls by name
- List of system calls by number