Redox OS Implements Capability-Based Security Using Namespaces and Working Directory as Capabilities

Available in: 中文
2026-03-28T08:51:08.740Z·1 min read
Redox OS, the Rust-written Unix-like operating system, has implemented a new capability-based security model that treats filesystem namespaces and the current working directory (CWD) as security ca...

Redox OS Advances Capability-Based Security Model

Redox OS, the Rust-written Unix-like operating system, has implemented a new capability-based security model that treats filesystem namespaces and the current working directory (CWD) as security capabilities, funded by NGI Zero through the NLnet foundation.

The Concept

In traditional Unix systems, access control relies on user IDs, file permissions, and discretionary access control lists. Redox OS takes a fundamentally different approach inspired by object capability security:

Why Capability-Based Security Matters

Capability security provides two fundamental guarantees:

  1. No ambient authority: A process cannot access resources unless it was explicitly granted a reference to them
  2. Confused deputy prevention: A process cannot trick a privileged helper into performing unauthorized operations on its behalf

Implementation in Redox

Redox leverages Rust's ownership and borrowing system to enforce capability discipline at the language level. The kernel tracks capability references through resource schemes, preventing processes from forging or duplicating capabilities without explicit kernel cooperation.

Impact on Linux and Mainstream OS

While Redox remains a research OS, its capability-based approach influences broader discussions about OS security:

The Redox implementation demonstrates that a complete, general-purpose OS can be built with capability security from the ground up, rather than bolting it onto existing permission systems.

← Previous: China Pork Prices Drop to 7-Year Low Amid Overcapacity CrisisNext: CERN Burns Tiny AI Models into Silicon for Real-Time LHC Collision Filtering →
Comments0