xref: /linux/Documentation/admin-guide/LSM/tomoyo.rst (revision 5ea672c752d93ef3cfa9ce3ea1fbf204f7056a33)
1*5ea672c7SKees Cook======
2*5ea672c7SKees CookTOMOYO
3*5ea672c7SKees Cook======
4*5ea672c7SKees Cook
5*5ea672c7SKees CookWhat is TOMOYO?
6*5ea672c7SKees Cook===============
7*5ea672c7SKees Cook
8*5ea672c7SKees CookTOMOYO is a name-based MAC extension (LSM module) for the Linux kernel.
9*5ea672c7SKees Cook
10*5ea672c7SKees CookLiveCD-based tutorials are available at
11*5ea672c7SKees Cook
12*5ea672c7SKees Cookhttp://tomoyo.sourceforge.jp/1.7/1st-step/ubuntu10.04-live/
13*5ea672c7SKees Cookhttp://tomoyo.sourceforge.jp/1.7/1st-step/centos5-live/
14*5ea672c7SKees Cook
15*5ea672c7SKees CookThough these tutorials use non-LSM version of TOMOYO, they are useful for you
16*5ea672c7SKees Cookto know what TOMOYO is.
17*5ea672c7SKees Cook
18*5ea672c7SKees CookHow to enable TOMOYO?
19*5ea672c7SKees Cook=====================
20*5ea672c7SKees Cook
21*5ea672c7SKees CookBuild the kernel with ``CONFIG_SECURITY_TOMOYO=y`` and pass ``security=tomoyo`` on
22*5ea672c7SKees Cookkernel's command line.
23*5ea672c7SKees Cook
24*5ea672c7SKees CookPlease see http://tomoyo.sourceforge.jp/2.3/ for details.
25*5ea672c7SKees Cook
26*5ea672c7SKees CookWhere is documentation?
27*5ea672c7SKees Cook=======================
28*5ea672c7SKees Cook
29*5ea672c7SKees CookUser <-> Kernel interface documentation is available at
30*5ea672c7SKees Cookhttp://tomoyo.sourceforge.jp/2.3/policy-reference.html .
31*5ea672c7SKees Cook
32*5ea672c7SKees CookMaterials we prepared for seminars and symposiums are available at
33*5ea672c7SKees Cookhttp://sourceforge.jp/projects/tomoyo/docs/?category_id=532&language_id=1 .
34*5ea672c7SKees CookBelow lists are chosen from three aspects.
35*5ea672c7SKees Cook
36*5ea672c7SKees CookWhat is TOMOYO?
37*5ea672c7SKees Cook  TOMOYO Linux Overview
38*5ea672c7SKees Cook    http://sourceforge.jp/projects/tomoyo/docs/lca2009-takeda.pdf
39*5ea672c7SKees Cook  TOMOYO Linux: pragmatic and manageable security for Linux
40*5ea672c7SKees Cook    http://sourceforge.jp/projects/tomoyo/docs/freedomhectaipei-tomoyo.pdf
41*5ea672c7SKees Cook  TOMOYO Linux: A Practical Method to Understand and Protect Your Own Linux Box
42*5ea672c7SKees Cook    http://sourceforge.jp/projects/tomoyo/docs/PacSec2007-en-no-demo.pdf
43*5ea672c7SKees Cook
44*5ea672c7SKees CookWhat can TOMOYO do?
45*5ea672c7SKees Cook  Deep inside TOMOYO Linux
46*5ea672c7SKees Cook    http://sourceforge.jp/projects/tomoyo/docs/lca2009-kumaneko.pdf
47*5ea672c7SKees Cook  The role of "pathname based access control" in security.
48*5ea672c7SKees Cook    http://sourceforge.jp/projects/tomoyo/docs/lfj2008-bof.pdf
49*5ea672c7SKees Cook
50*5ea672c7SKees CookHistory of TOMOYO?
51*5ea672c7SKees Cook  Realities of Mainlining
52*5ea672c7SKees Cook    http://sourceforge.jp/projects/tomoyo/docs/lfj2008.pdf
53*5ea672c7SKees Cook
54*5ea672c7SKees CookWhat is future plan?
55*5ea672c7SKees Cook====================
56*5ea672c7SKees Cook
57*5ea672c7SKees CookWe believe that inode based security and name based security are complementary
58*5ea672c7SKees Cookand both should be used together. But unfortunately, so far, we cannot enable
59*5ea672c7SKees Cookmultiple LSM modules at the same time. We feel sorry that you have to give up
60*5ea672c7SKees CookSELinux/SMACK/AppArmor etc. when you want to use TOMOYO.
61*5ea672c7SKees Cook
62*5ea672c7SKees CookWe hope that LSM becomes stackable in future. Meanwhile, you can use non-LSM
63*5ea672c7SKees Cookversion of TOMOYO, available at http://tomoyo.sourceforge.jp/1.7/ .
64*5ea672c7SKees CookLSM version of TOMOYO is a subset of non-LSM version of TOMOYO. We are planning
65*5ea672c7SKees Cookto port non-LSM version's functionalities to LSM versions.
66