On 7/31/19 11:00 AM, Toby Thain wrote: > It may not address "all aspects" since it has been necessary for some > purposes to extend the permission model substantially over time, such > as ACLs, SELinux, etc. I thought that ACLs acted as additional gates / restriction points beyond what standard Unix file system permissions allowed. Meaning that ACLs couldn't /add/ permission, but they could /remove/ permission. I think SELinux behaves similarly. It blocks (removes) existing permissions. Beyond that, I think SELinux is filtering (removing) permissions when comparing what (who) is running combined with what is being run further combined with what it is being run against. So again, removing existing permissions. The only thing that I'm aware of that actually /adds/ permissions is the capability subsystem. It can give an unprivileged user the ability to run a binary that can bind to a port below 1024. -- Grant. . . . unix || die