Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

The Hurd: Unix Redesigned

Type
Audio
Tags
UNIX
Authors
Neal H Walfield
Event
Chaos Communication Congress 18th (18C3) 2001
Indexed on
Mar 27, 2013
URL
http://ftp.ccc.de/congress/2001/mp3/vortraege/tag2/saal2/Hurd.mp3
File name
Hurd.mp3
File size
14.0 MB
MD5
607fd7c97d493ec151215961a4659974
SHA1
e01fd329753670675b54175ff9f46525fae44f9d

Unix was created more than thirty years ago. It was born from a need: a need to have an operating system that was both powerful and versatile in the vailable, yet extremely limited, environment. The creators were, to say the least, successful in this endeavor. However, after its initial growth during the 1970s and early 1980s, the evolution of Unix's API slowed to a crawl and the tradeoffs of flexibility in favor of performance began to limit the system. The Hurd, a project started by the Free Software Foundation in 1990, undertook the task of redesigning the Unix API. This centered on two important ideas: empowering the user and increasing system security. These two goals, which at first glance appear to be diametrically opposed, could not, in fact, be any closer: the Hurd aims to export as much functionality as possible to the user offering him increased control over the system and, yet, not allowing him to effect other users. This was done by rendering what are traditionally dangerous operations, available only to the superuser, benign. The implication is a dramatic decrease of dependence of normal users and daemons on the system administrator and superuser. This effectively locks down the system by eliminating the window of opportunity for attacks on SUID binaries and daemons running with root privileges.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !