Appendix C. GDAM's Security Model

Security of your system is very important. GDAM grants permission to many resources: it uses memory, disk, cpu and sound devices.

We've added a feature to let you connect to the server without listening on any port; this happens automatically if you run gdam-launcher when no server is running. This is a relatively safe mode of operation.

Currently there are few checks in place for attacks based on using up all available memory, disk or cpu. If you care, use ulimit or nice to change the amount of resources gdam has available to it.

However we've attempted to limit control in two ways:

So how do you make a gdam-server fairly secure?

Root and Realtime