Red Hat to Release Enhanced-Security Linux 326
Klatoo55 writes "According to an article by Techweb, Red Hat will release Red Hat Enterprise Linux 4.0, which includes support for Security-Enhanced Linux, in 2005. Red Hat has been running this system with a published IP address asking for hackers to try to break the security. The last version was defeated within 45 seconds, but this new version (apparently to be the policy for the next Fedora) has yet to be cracked."
Re:45 Seconds?!?! (Score:3, Informative)
Tiemann outlined an instance of how SE Linux is more secure than traditional Linux in his EclipseCon keynote Wednesday. He said that in a security test on a previous version of Red Hat Linux in 1999, it took only 45 seconds for a hacker to break into the system. A recent test on a version of Linux running SE Linux as its security policy still has yet to be cracked, even though the IP address of the system was published to would-be hackers and the root had no IP address.
It is a Big Deal (Score:3, Informative)
Re:I'm Done With Redhat (Score:3, Informative)
Re:Big Deal (Score:3, Informative)
As long as a user can run arbitrary code that opens up network ports and sends data to arbitrary destinations, it will be difficult to completely secure a machine. Per-application egress filtering would go a long way to securing this, but I'm not aware of anything available for Linux that allows you to do so.
Re:All PR and no substance. . . .again (Score:3, Informative)
Re:Invulnerable to MyDoom type virii? (Score:3, Informative)
Not with SELinux or other ACL systems such as grsecurity and LIDS if they're given the right settings, revoke net capabilities from all users and only grant them to the ones that need it.
And will it stop a trojan which asks 'Root password needed to continue:' and then proceeds to use it to screw your system?
SELinux will yea, thats kinda the point of it. They're assuming your box is going to get rooted, and letting you protect it from what root can do to it.
Theres a couple of SELinux demo systems online that let you login as root, one here [gentoo.org]. Yep, anyone, anywhere, given free root, only you can't do anything with it. Normal linux, yep all your arguments stand, bung ACL's on there and its rock solid. Unfortunately its also a royal PITA to run a desktop machine on.
I've not got around to trying selinux yet but was thinking of the posibility of a perl script parsing its error log while its running in non-enforce mode and generating ACL's from that, anyone know if this would be possible? Would certainly make it a lot easier to setup a desktop workstation running SELinux.
Re:Invulnerable to MyDoom type virii? (Score:3, Informative)
Re:Invulnerable to MyDoom type virii? (Score:5, Informative)
SE Linux removes what you might consider to be the "superuser" account (aka 'root' under *nix or 'administrator' under Windows).
You can configure the system to act just as it is now -- having an account that is all-powerful (root or another one), or you can have very limited focus accounts that can not 'see' or use the resources of the others.
The core OS still has the ability to do root-like things and dole out those permissions, though the scope of what needs to be watched is greatly reduced.
By itself, this is not interesting. As a base for a security policy, the increased ability to log who-did-what, and the ability to stop per-process resouce use (not just per 'user'), it becomes very very interesting.
Here are some links on it;
Security-Enhanced Fedora Core 2 [lwn.net]
Looking forward to Fedora Core 2 [lwn.net]
(follow this thread) Re: Proposal: Discourage rpmbuild --sign [redhat.com]
The main SE Linux site [nsa.gov]
Re:Security Enhanced Sure! But... (Score:4, Informative)
qmail security guarantee [cr.yp.to]
SELinux I've heard adds finer grained security features to limit each program's access to exactly what it needs, on top of the user level security, to further limit the damage that can be done by breaking a single program.
Too much security for you! (Score:5, Informative)
Anyone care to share their experiences with SELinux?
Re:Invulnerable to MyDoom type virii? (Score:3, Informative)
Re:Invulnerable to MyDoom type viruses? (Score:2, Informative)
Oh -- I might add that I have never been hit by a virus or a trojan on any of my Windows systems, despite running with Administrator privileges, because I don't do stupid things (like use Outlook or Outlook Express to read email), and I keep all my antivirus software completely up to date.
Tienemen misquotes (Score:3, Informative)
Re:Invulnerable to MyDoom type viruses? (Score:2, Informative)
Although the Windows 2000 runas command is a step in the right direction, it is a far cry from the ease of "su - root" and "sudo ...". Take, for instance, if I want to change the IP address in Windows 2000, but I'm logged on as a non-admin user. To do this, I have to kill my user's explorer.exe process before starting up a new one (by typing it into Task Manager's "Create New Task" dialog box) as the administrator. Only then can I get to the Network Properties in the Control Panel with the privledges necessary to change the IP address.
Your all wrong (Score:4, Informative)
SELinux, if set up properly, is secure, and completely bypasses the inferior UNIX security model. You could say:
* Windows is insecure
* Linux is less insecure
* SELinux is almost secure
IN SELinux there is no root account, or at least it has no privilidges -- user's don't have privilidges in this system. So, you can give root to anyone and they won't be able to do a thing. Gentoo have a machine with public root access for just this purpose.
The difference is that each program is banned from doing anything by default. Reading a file, using the network, whatever... The packagers must explicitly assign each program access to what it minimally needs to do it's job.
So Bind (fairly insecure) might be given read access to it's config file, write access to it's cache directory, and port access only for the ports that it needs to listen on. If you then exploit bind it doesn't buy you very much. You can change the cache files, and answer DNS queries, but you can't even change Bind's own configuration, let alone anything else.
You may have the right as an administrator (nothing to do with root) to run bind, but the programs you run do not inherit your privilidges.
As a user, the privilidges that you have depend solely on the roles that you belong to. That's why root is useless, it is a user not a role.
Although there are many security patches for Linux, SELinux seems to me the only truly sound approach to security out there at the moment. If you combined it with hardening solutions designed to minimise the chance of exploits (binary sandboxes) you would end up with a system that is very difficult to exploit in the first place, and once you do manage it it buys you almost nothing anyway.
Although SELinux is built into Linux 2.6, it must be turned on and manually configured before it is useful. This is currently being done for Fedora, Gentoo, Debian, and other serious Linuxes. I believe this will make Linux the most secure general purpose operating system available. Then we really can lord it over the Windows users.
How to secure a Linux box (Score:5, Informative)
On Red Hat, use chkconfig to set which services start at startup (this is nothing more than a pretty frontend to rename a couple symlinks in
The first thing you should do on a new box is run whatever update mechanism your distro provider uses. Apt-get update;apt-get upgrade, yum update, whatever. There have probably been holes discovered. If security is more important than fully tested reliability, I'd automatically run the update sequence through cron nightly.
If you're extremely paranoid, run syslog to a second machine. If your main machine gets compromised, you have a nice log.
Major Linux oopses I've seen before:
* When using X11, never ever use "xhost +". )"xhost +local:" is still asking for trouble.) I don't care how much of a good idea it seems like, *don't fucking use it*. Don't even do it if you aren't on a network and don't think anyone will ever connect to you. This disables all authentication to X11, and at one point a lot of university hackers (old school) used this when they wanted to run a program from another system. Do not do this. If you're running su'ed as root and root can't display a window on the local X11 server due to lack of authorization, use "xauth merge ~[username logged into X]/.Xauthority". That'll just grab the magic authorization cookie for this session from the local user's auth file and hand it to root, so that root can continue to work. Note that recent releases of Red Hat (perhaps due to changes in XFree86, perhaps due to something clever in root's login scripts) seem to authorize root to poke at local displays. Without this, anyone on the Internet with any inclination can sniff your keyboard, dump your screen, send input to your programs, and generally has full privileges of anyone that uses the X server.
* When using X11 programs from a remote system, use ssh and use X11 tunneling. If you don't do so, your keystrokes will cruise over the network unencrypted.
* Use ssh protocol 2 in preference to 1 unless you are damn sure that doing so is not a good idea (or you want to use protocol 2 only). This is probably already default for your site.
The above two points can be implemented by adding the following to your ~/.ssh/config -- this is what I use:
Host *
Protocol 2,1
ForwardX11 yes
* Don't use FTP. We have scp for a reason. FTP sends passwords in plaintext.
* Don't use plaintext mail authentication. Too many people send out their mail password in plaintext. Someone with a 802.11b-capable laptop and sniffer on a college campus can grab *masses* of email passwords from someone's copy of Outlook trying to grab new mail every ten minutes. Most places with a competent mail admin support at *least* support MD5-hashed passwords (which still exposes your email to anyone listening on your network segment, but is better than nothing in that they can't also get your password). I use fetchmail with SSL enabled.
* (not a vulnerability, just a tip) Most Linux distros today are reasonably secure in terms of enabled services out of box. Used to be, in the Red Hat 5.x era, that finger and telnetd enabled out of box was entirely reasonable. Today, however, many folks don't know how to disable services, and so most distributions ship with things off instead of on.
* Archive your logs (generally, the contents of
* This isn't a Linux-specific suggestion, but use gpg. Linux is one of the few platforms with free mail clients
Re:Big Deal (Score:1, Informative)
But they ARE in the 2.6 kernels
(the buffer overflow protection that is...)
WOOHOO! (Score:3, Informative)
Does this mean they'll actually MD5 the root password?
(Sarcasm-less explanation: During the RedHat installation procedure, the ability to choose to use MD5-encrpted passwords comes *after* you choose your root password, so your root password is encrypted with much weaker encryption until you change it.)
steve