* James Morris (jmorris@private) wrote: > On Wed, 25 May 2005, Crispin Cowan wrote: > > > What constitutes "inappropriate" here? > > In my view, LSM should be used for significantly enhancing access control > systems. LSM is an access control interface (yeah, James, I know, I'm preaching to the choir). How you squint and draw a line for access control may have some room for debate, but one classic example has been keeping audit separate from access control.
This archive was generated by hypermail 2.1.3 : Wed May 25 2005 - 22:39:38 PDT