Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Red Hat Software Businesses Security

Red Hat to Release Enhanced-Security Linux 326

Klatoo55 writes "According to an article by Techweb, Red Hat will release Red Hat Enterprise Linux 4.0, which includes support for Security-Enhanced Linux, in 2005. Red Hat has been running this system with a published IP address asking for hackers to try to break the security. The last version was defeated within 45 seconds, but this new version (apparently to be the policy for the next Fedora) has yet to be cracked."
This discussion has been archived. No new comments can be posted.

Red Hat to Release Enhanced-Security Linux

Comments Filter:
  • Security? (Score:3, Interesting)

    by azatht ( 740027 ) on Saturday February 07, 2004 @06:44PM (#8214485) Homepage
    Has they created something by their own to enhance the security, or is it just that they have included some restricitons to the users/administrators? (ie. have they dissabled the root-account?)
  • I'm Done With Redhat (Score:1, Interesting)

    by tealover ( 187148 ) on Saturday February 07, 2004 @06:45PM (#8214490)
    I wiped it off my dual-boot machine (now single boot). They do some good things but they seem lost recently. They're scrambling to come up with a successful business model. Unfortunately, I can't wait for them to figure it out. I need a stable linux platform that I can count on.

    I hope things work out for them because to a large extent, their success (or lack) will be tied to the Open Source movement.
  • by Raster Burn ( 213891 ) on Saturday February 07, 2004 @06:45PM (#8214492)
    The article implies that SE Linux would be more secure that Windows, especially in light of the MyDoom virus. But doesn't the MyDoom virus depend on a dope sysadmin clicking on a binary attachment to spread?

    So how does SE Linux protect systems against trojans?
  • by Animats ( 122034 ) on Saturday February 07, 2004 @07:04PM (#8214632) Homepage
    With mandatory security with levels and compartments going mainstream, we need apps designed to use it properly.

    Mail handling is a good example. Each receive process should be running in a separate jail, with a net connection to the incoming port, a limited connection to the mail database, and no privilege to open files or network connections. Then it doesn't matter what happens in the receive process.

    The software that passes data across security boundaries has to be carefully written and audited. But it doesn't have to do much. Software has to be divided into two kinds - big, untrusted programs that do the work, and little, carefully audited security-critical programs that do very little.

    The job of the OS is to keep each program in its own security box.

    Mail, DNS, and web servers need to be broken up in this way. Now that Red Hat is going with SE Linux, it's time to do this. Get busy.

  • now or later? (Score:2, Interesting)

    by crabpeople ( 720852 ) on Saturday February 07, 2004 @07:14PM (#8214704) Journal
    if you actually did find a hole, wouldnt it be lot more profitable to wait till the os is deployed worldwide and then exploit it?

    i didnt RTFA but the blurb said nothing of compensation if someone did crack it. IF there is a bounty, im sure its not as much as one would make cracking a bank a year from now.

  • by hendridm ( 302246 ) * on Saturday February 07, 2004 @07:38PM (#8214814) Homepage
    Not sure if you're joking or serious, but during the Code Red fiasco I put a Windows machine with IIS online on my cable modem. Thanks to port 80 being forwarded to that machine on my firewall, my computer was infected after I installed Windows in the time it took me to find and install the service pack! From then on, I made sure to remove port forwards before installing updates on newly installed machines :)

    I guess it's no surprise, given the amount of Code Red traffic there was at the time, but I just didn't think of it at the time since I had planned on installing all the updates after reloading.
  • Out of box Security (Score:4, Interesting)

    by niko9 ( 315647 ) on Saturday February 07, 2004 @07:42PM (#8214833)
    2 questions:

    Anybody have more info as to why the last machine was compromised in 45 seconds?

    Anybody know of a guide for the Linux beginer on how to secure (shutting down services not needed for a desktop machine, in an easy to understand way)a out-of-the-box desktop system??

  • by Tony Hoyle ( 11698 ) <tmh@nodomain.org> on Saturday February 07, 2004 @07:49PM (#8214870) Homepage
    Untrue... it's one of the areas that Windows actually makes itself more insecure because of short sightedness.

    Because a privileged app can't setuid, they all have to have their own user + a password hardcoded into the binary (or stored in the registry.. same difference) which can be decoded to plaintext (Windows requires the plaintext password of a user to call LogonUser even if you're an admin). This is why there's the IIS_xxx accounts in Windows so IIS can drop privileges (decoding those passwords is trivial and it's quite fun as you can't change them!).

    Of course if you're a *legal* app then you need the plaintext password. If you're a *virus* then you don't.. you just need enough social engineering to be able to get either write access to a couple of critical registry keys or CreateToken privilege. If you get access to the registry keys, btw. you can create a delegation level access token and use that access to do a network-wide hack (no I'm *not* going into any more detail... I only got away with it because the net admin at work has a sense of humour... like the day I dumped a list of every password on the network on his desk and said 'it's about time people stopped using their first name/girlfriends name as their password!').

    Tony

  • by Dylan Zimmerman ( 607218 ) <Bob_Zimmerman@myrealbox . c om> on Saturday February 07, 2004 @08:11PM (#8215037)
    That's nothing. I installed MS Desktop SQL Server (comes with Visual Studio) on my machine, explicitly denied it access to the Internet, explicitly denied access to it from the Internet (both in my software firewall), and it was infected with Slammer within 15 seconds of connecting over dialup. I'm dead serious. I guess that something could have deactivated my firewall, but it claimed that it was up.
  • by Anonymous Coward on Saturday February 07, 2004 @11:59PM (#8216184)
    Wow, if you listen to the Slashdot crowd, Linux 1.0 is nearly impenetrable, security-wise.

    You're an idiot. It's common knowledge, especially with the Slashdot crowd, that early Linux versions were easy to hack.

    Hell, I got so much root back then (though a lot of that was thanks to SunOS, not just Linux).
  • by 0x0d0a ( 568518 ) on Sunday February 08, 2004 @09:57AM (#8217831) Journal
    When you have piles of packages (source or binary) hosted on single servers run by the same group of people, you're making yourself a really tempting target.

    You know, you probably *are* right -- the FSF's archives didn't get broken into for no reason.

    However, I think that other avenues are more appealing.

    Think about the number of packages in a typical Linux distro. There are a lot -- I currently have about eleven hundred packages installed. Assume that each project has an average of two people with CVS commit access. Many projects do not have rigorous revies of all commits. If someone can compromise the computer of *any* of these 2200 developers and slip a subtle hole in. If someone can submit a patch with a hard-to-find hole, how likely is it that they can manage to slip it in eventually? If they do an anonymous submission, they can keep hammering software projects with evil patches. I have no idea who maintains, say, gkrellm, but how do I know that he's good at ensuring that UNIX software is secure and back-door-free?

    Red Hat probably puts a phenomenal amount of work into securing their distribution servers. A single developer's workstation would be a lot easier to compromise.. Package management is a weakness in that it instroduces a new person with the ability to produce a malicious package -- the packager.

    No, the last thing Linux package management needs is more centralization. What we need is *less* centralization.

    I cannot agree. Mike, I agree with your technical goals in package management (and respect the work that you've done), but I don't find this to be a security argument. A system such as this is weakest-link. Only one system involved in the production, building, and distribution of software must be compromised for the end user's systems to be compromised. More decentralization means more systems to potentially be a weakest link.

    What Linux package management needs to be more secure is for projects to host their own binary packages as they do for source packages. That way if/when breakins occur, the damage is at least limited.

    Mmmf. I can't agree. At least with the RH/Fedora model, there is a long (months long) QA process run on the software ahead of time. If software projects have the power to push updates to the masses without QA...they could cause all *kinds* of problems. Currently, they have only the power to push updates to Red Hat.

    If software projects provided eDonkey links or similar, so that a cryptographic hash of the file is in the wild, that *would* be one more guarantee of security.

    Packagers don't audit the code, you know.

    In general, you're right, but RH has pushed security patches to projects before.
    Bandwidth issues.
  • by 0x0d0a ( 568518 ) on Sunday February 08, 2004 @10:12AM (#8217879) Journal
    Darn, I forgot to include the tidbit that I really *did* want to include, given who you are.

    There is a way that Linux packaging could be used to improve security. Current state-of-the-art Linux packaging systems pretty much operate in "install as root". There's a script run that runs as root and has the ability to do anything. It would be helpful if, packages could contain a standard way of denoting the privileges that a package requires to be installed. (A package manager could place restrictions on what is allowed.) Package managers currently provide very minimal or nonexistant sandboxing capabilities.

    For example, perhaps I do not want to allow an installer to create any SUID files, since I don't want more floating around on my system. Perhaps I want to prevent an installer from modifying any existing files, and only adding the files specified in the package requirements. Perhaps I want to *require* that all executable files be SUID/SGID a new user with no remote login requirements. Perhaps I want to require that all executables that the package installs be started with a limited set of POSIX capabilities.

    Why is this a big deal? Because it's technically possible to produce a sandbox that will let me run and poke at code from a random person on IRC. But no package managers currently do so. It's technically possible to ensure that more SUID binaries don't pop up on my system -- since SUID binaries are one of the few potential security holes on a UNIX system, I'd like to avoid installing any if possible -- but I cannot do so. It's technically possible to force all installed binaries to run SUID/SGID/chrooted. It's possible to ask that packages not touch any system-critical files -- initscripts, PAM, kernel, etc. Basically, when I recieve an RPM currently, I have two choices. I can su to root and install the RPM, giving the install script and package complete and total control over the system. Any malicious stuff in the package or bugs could blow away my system. I can try installing the thing with a different RPM database as a user with different prefixes, but it's a royal pain. I can choose not to install the package. And those are my only real options.

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...