How the NSA Took Linux To the Next Level 172
An anonymous reader brings us IBM Developerworks' recent analysis of how the NSA built SELinux to withstand attacks. The article shows us some of the relevant kernel architecture and compares SELinux to a few other approaches. We've discussed SELinux in the past. Quoting:
"If you have a program that responds to socket requests but doesn't need to access the file system, then that program should be able to listen on a given socket but not have access to the file system. That way, if the program is exploited in some way, its access is explicitly minimized. This type of control is called mandatory access control (MAC). Another approach to controlling access is role-based access control (RBAC). In RBAC, permissions are provided based on roles that are granted by the security system. The concept of a role differs from that of a traditional group in that a group represents one or more users. A role can represent multiple users, but it also represents the permissions that a set of users can perform. SELinux adds both MAC and RBAC to the GNU/Linux operating system."
All very good, but... (Score:4, Informative)
Extensions such as AppArmour (formerly known as SubDomain), are what people should be embracing in order to make practical use of this excellent technology. Whilst using the same kernel hooks, AppArmour allows you to "snapshot" an application's activity and build a ruleset which can then be applied to the process. Much easier than titting around with SElinux policies forever and a day...
Re:All very good, but... (Score:5, Informative)
Long ago, in the days when MLS was just the holy grail, Harris Corporation created the first A1 rated Multi-Level Secure computer system. I can't recall the name given to it, BlackHawk or something overblown like that. It was secure, but utterly unusable. According to some early testers I knew, it took more than 10 minutes just to log on. The command line took, on average, 5 minutes to respond to the simplest command. There were no policy templates, so all permissions and access lists had to be entered manually.
SELinux doesn't look quite so bad in that light, now does it?
Re: (Score:2, Insightful)
Long ago, in the days when MLS was just the holy grail, Harris Corporation created the first A1 rated Multi-Level Secure computer system. I can't recall the name given to it, BlackHawk or something overblown like that. It was secure, but utterly unusable. According to some early testers I knew, it took more than 10 minutes just to log on. The command line took, on average, 5 minutes to respond to the simplest command. There were no policy templates, so all permissions and access lists had to be entered manually.
SELinux doesn't look quite so bad in that light, now does it?
Yeah, yeah, yeah and it took years to calculate by hand before computers and months to travel any distance before airplanes. So what's your point?
SELinux is a pain in the ass. Your comparison is meaningless.
Re: (Score:3, Funny)
Re:All very good, but... (Score:4, Funny)
Re:All very good, but... (Score:4, Funny)
Well, you can get the same experience now, thanks to Symantec Antivirus. Well, except for the whole actual security part.
Re: (Score:2)
Re: (Score:3, Informative)
http://lists.opensuse.org/opensuse-bugs/2007-09/msg02994.html [opensuse.org]
https://bugs.launchpad.net/ubuntu/+bug/156693 [launchpad.net]
Re:All very good, but... (Score:5, Informative)
I used to think so, but IMO, around FC7, F8 and RHEL 5 (ie, last year) the tipping point was reached. setroubleshoot and the tools around it are verbose to the point of telling you what to type so it's neither a problem noticing that there is an selinux denial nor any problem finding out what to do about it anymore.
Many integration problems (applications and libraries doing funky stuff they plain shouldn't be doing, something not unique to selinux) have also been fixed at the appropriate places, leading to far fewer failures.
Switching to MAC security has historically always been a serious pain in the ass (to the point where admins may have been better off implementing security by lack of mains power), but considering how painless it's gotten now I'd say whining about SElinux today says more about the admin than the software...
Re: (Score:2)
I'm not positive my system is any more secure than if it were off, but at least I don't get angry and dismissive about it.
Re: (Score:2)
I've wanted to use it since 2004 or so (back when I was running Gentoo), but while the core functionality was there, I wasn't up to the task of dealing with it.
When we started switching boxes over to CentOS 5 (back in 2007), it came with SELinux enabled out-of-the-box in "targeted" mode. To me, that was the tipping poin
Re: (Score:2)
This illustrates the point that the problem with selinux is the lack of useful userspace tools. This is pretty much the area in which redhate has always excelled. They have the best VM management tool too.
I think I'll be waiting another year or two to move on to selinux. I've tried to jump on it a couple times now, and for the most part, when I try to follow a guide the guide turns out to be shit.
Re:All very good, but... (Score:5, Interesting)
Fine by me.
Means that when it becomes mainstream, anyone who is familiar with how to configure and use it will be in high demand.
Re:All very good, but... (Score:5, Insightful)
If no one's using it, how will it become mainstream?
Re: (Score:3, Interesting)
If no one's using it, how will it become mainstream?
Quite simple really; Government mandate. Some agency will mandate it or make it part of some policy. From there it will spread into private sector via companies that do business with said agency. The Agency I work for is already doing just such a thing for new projects. Any company that is running Linux by contract has to secure their system through multiple methods; including SELinux.
Re:All very good, but... (Score:5, Informative)
A toolkit that allows for easy integration of new applications into SELinux and adaptations of already defined applikations would be useful. There are some around, but none are really good. The best would be if SELinux could allow for a "learning" mode for a single application in addition to the modes it has. Something like the Zonealarm firewall that is a bit noisy in the beginning, but as soon as it has learned what's permitted it goes silent. This will of course require a user-space application listening to the SELinux events. So a mode that allows SELinux to be permissive for a single application while strict for the rest of the system would be a nice thing.
One common problem that I have experienced is that databases like MySQL are defined in SELinux, but it's very common that the data storage is going to be relocated in a production environment. This is a cumbersome process that costs a lot of work and pain.
Another problem is the issue of semantics involved. It's not always clear and takes a lot of time to get familiar with.
And still - SELinux is a "static" security measure, which only controls the permitted access between application and resource. It doesn't consider any frequency or volume. For example - a mail program may do a limited number of connections to port 25 per second, which is a normal situation, but if a higher frequency occurs that means that there may be a problem that has to be checked. OK - It's not easy to be intelligent about things like this, but system behavior pattern is a critical point in security too.
So from a view of security SELinux is still only a step on the way, the threats of tomorrow has to be predicted and handled. This means that SELinux has to be a lot easier to work with for the average person to allow it to become a wide-spread security base.
Re: (Score:2)
Is it? You only have to make sure that the new location has the same security context as the old one, which takes one simple command. Hardly a "cumbersome process".
Re: (Score:2)
And to add to this - if you have a new filesystem, the root of that filesystem has to have an appropriate label t
Re:All very good, but... (Score:4, Informative)
Read up on "seaudit" and creating custom profiles.
(I still think the process could be a bit more human-friendly, but the tools do exist.)
For example - a mail program may do a limited number of connections to port 25 per second, which is a normal situation, but if a higher frequency occurs that means that there may be a problem that has to be checked. OK - It's not easy to be intelligent about things like this, but system behavior pattern is a critical point in security too.
Things like that are better handled in IPTABLES, or in the application itself. Those do not fall under the purview of SELinux which is about controlling access to the resource (not rate limiting or rationing out a resource).
Re: (Score:2)
As for what I wrote - I wanted just the single application to be in learning mode, not the whole system. A slight difference that has an impact for developing larger system solutions.
Re:All very good, but... (Score:5, Insightful)
[ the principle on which selinux works is that when you change "security context", it doesn't matter a damn if you were "god" before, you're now starting from scratch with zero permissions in the new context unless otherwise specified. this is best illustrated with an example of when you go into a military environment, they take your ID badge away from you and issue you with a temporary one that is only relevant inside that building. you can't even leave the building without that temporary badge, and it's been coded to only let you go to the toilet and into the rooms that are associated with your specific purpose for being in that building. and of course, if you forget to get your permanent ID back once you _do_ leave, you'll find it very difficult to get out the country! ]
one of the "rules" that GCHQ and the NSA follow is that it is perfectly acceptable for something to be "insecure" as long as you KNOW that it's insecure: you can then provide a workaround or a fix to ensure that the security vulnerability is never exploited.
the one thing that you absolutely absolutely must not ever have is a situation where you don't KNOW whether something is "secure" or "insecure".
so if AppArmour has wonderful automated rulesets that are impossible to analyse...
the thing about selinux is that policies require that you understand the source code and what the application is doing. for example, one of the guidelines is that applications should use exec rather than fork, because that provides total privilege separation, obviously, between tasks. fork() does not provide such a complete level of privilege separation, and so up until quite recently there was absolutely no way in selinux to even step into a separate security context on a fork() - it just... wasn't
however, it turns out that there were some specific instances why stepping into a different security context on fork() is actually useful (such as in samba) and so it was added in. due to the circumstances under which this could be thoroughly abused, it was decided that it should be provided only via an explict selinux function call (usually, you can just provide an selinux policy statement without any code modifications).
Re: (Score:2, Interesting)
Re: (Score:2)
as opposed to just fork() which then shares some resources and continues to use them - e.g. file handles etc.
Re:All very good, but... (Score:5, Interesting)
None of that is the problem. The problem is in the WAY the access is specified by slicing and dicing the namespace to assign a security context to each object.
If I write an app that needs to access JUST ONE file in /etc and other apps already access it and a few more under a common context, I have two choices. I can allow my new app carte blanche on /etc (bad) or modify the policy of the other apps that may access the file to grant them the new context. Lather, rinse, and repeat until you've made a hash of the policy source (and the admin rips out his last chunk of hair).
Then, now that you've hacked away and sliced and diced enough to grant everything just what it needs and then you do yum update. I swear, you can actually HEAR satan laughing maniacally below as you have to either abort the security update (and be insecure), turn off MAC (and be insecure) or accept that half your system will be broken now (I suppose an app that won't even run IS secure, but now the ADMIN feels insecure).
what's needed is a policy.d directory. Each app is allowed to drop one file there that will be evaluated in isolation from whatever else is there to grant that particular app what it needs without having to understand the rest of the policy (perhaps modified locally anyway). The directory is there, but there's more than one and the files there have to understand the others and the global policy to avoid problems (like preventing the policy from compiling at all).
Most places simply do not wish to pay for the amount of admin time required to make all of that work. In many cases, they're well justified in that, the data on the systems just isn't worth that much.
When it is used, a common pattern is to run the app and then mindlessly add permisssions for whatever was denied until it finally works. The natural result is an overly permissive policy. All the disadvantages to using AppArmour automation plus granting entirely unnecessary access to any files related to the files needed.
My post sounds almost entirely negative, but that would be unfair. In the environment SELinux was developed for, where leaked information can be a real disaster, it makes perfect sense to invest the administrative effort that is required. For the rest of us, it got the kernel code moving in the right direction for MAC and MLS. That makes follow on schemes better suited to the rest of us more likely to happen.
Re: (Score:3, Interesting)
Re: (Score:2)
Forget the pain in the ass nature of the kit. Consider the legality of it. The NSA cannot legally own copyright. Anything they produce is in the public domain. Therefore they cannot legally develop code that is under any license.
They can let contractors own it - happens all the time as a form of corporate socialism. They can also release to the public domain and let it be incorporated into the kernel - the GPL is compatible with the public domain. I really don't know what the NSA has done in this case, but licenses do not have to be an impediment here.
Re: (Score:3, Interesting)
No they can't. They can contract with a contractor to develop a piece of code, but the government cannot develop something and then give it to a corporation. If government employees are building it, it's public domain. That's the nature of US law.
Your statement is fallacious because the co
Re: (Score:2)
No they can't. They can contract with a contractor to develop a piece of code, but the government cannot develop something and then give it to a corporation. If government employees are building it, it's public domain. That's the nature of US law.
You presume that the employees are not employees of a contractor who have been emplaced at the government agency.
There is nothing to be done to release it into the public domain as it's already there. The legal problem comes from the fact that it is a derivative of a GPLed program.
I think you will find that a set of is not a derivative work [digital-law-online.info] because it does not contain the original work.
Re: (Score:2)
Re: (Score:2)
SELinux may have more bells and whistles, but when you simply turn if off because it's a pain in the ass it doesn't really make your system any more secure.
Re:All very good, but... (Score:5, Interesting)
Anyone out there who's used both grsec and SELinux + AppArmour want to favor us with a comparison?
Re:All very good, but... (Score:5, Informative)
audit2allow -a -m local
checkmodule -M -m -o local.m
semodule_package -o local.pp -m local.mod
semodule -i
sequence of commands plus togglesebool has so far accomplished everything I have ever needed. I don't run any hand-written custom policy. And we have web servers, dns, mysql, web dev, and all kinds of other stuff.
It sure is easier than setting up a bunch of iptables commands although I see it as analogous. I rarely hear people talk about what a pain iptables is (and it surely is a pain). I think learning SE Linux was even easier.
I really look forward to more policy being applied to the desktop applications. That work is already well underway thanks to Dan Walsh over at RedHat who has already made a lot of progress in this area:
http://danwalsh.livejournal.com/15700.html [livejournal.com]
http://danwalsh.livejournal.com/18578.html [livejournal.com]
http://danwalsh.livejournal.com/13376.html [livejournal.com]
It is work like this that leads me to believe that Linux is not nearly so likely to become like Windows should it ever achieve a critical mass of desktop users. Security problems on the massive scale of some other operating systems are not inevitable. That is nice to know.
Also, I will be doing a presentation on SE Linux at the Kernel Panic Linux Users Group:
http://www.kernel-panic.org/meetings/general/08-07-10-general-meeting [kernel-panic.org]
on July 10th, 2008. If you are in San Diego please stop by. It's a fun crowd and the after-meeting meeting at Denny's is always lively.
wrong (Score:3, Informative)
No it doesn't. SELinux adds both MAC and RBAC to the Linux kernel.
Re: (Score:2)
Re: (Score:2)
Someone might want to tell the folks who maintain savannah.gnu.org, because there's no mention of it anywhere on their site.
Re: (Score:2)
It doesn't have to be owned by GNU to modify the GNU operating system. Next you'll tell me that the userspace component of a Windows driver isn't really a Windows program unless it's owned by Microsoft.
The Unix-like OS that features the Linux kernel built by the GNU compiler running hundreds of GNU programs (via the GNU dynamic linker) that all communicate with the kernel through GNU libc is GNU/Linux. When the majority of Slack
Re:wrong (Score:4, Funny)
Re: (Score:3, Insightful)
Of course including the Debian people, who made one of the greatest distros so far?
(NOT the greatest, but certainly one of the greatest)
Re: (Score:2)
The whole LiGnuX renaming thing which became the gnu/linux renaming thing on the second attempt really just looked like gnu using linux as an advertising bandwagon from what
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:3, Insightful)
I can't deny that I normally call the combination "Linux" myself, but I don't understand why some people are actively hostile to the concept of calling it "GNU/Linux" instead.
Re: (Score:2, Informative)
Re: (Score:2)
You will find "operating system" defined in textbooks. Using it other ways even for political purposes just confuses and annoys.
Re: (Score:3, Funny)
I prefer to say it more delicately, like "Everyone without a stick up his ass just calls the OS 'Linux'".
I realize that his is also divisive since it could be "stick up her ass", but I hate to make the facts come across as so wordy when you have to say "his or her ass".
Re: (Score:2)
Released? Please, recapture it! (Score:2, Informative)
Re:Released? Please, recapture it! (Score:4, Insightful)
Re: (Score:2)
Silently.
Yah, used to annoy the hell out of me. It's probably leaving a message in some audit log, but that isn't exactly friendly.
With the appropriate daemons and utilities installed you should get a nice syslog message (or even a blinkety desktop icon if it's on your local machine). Then it's basicall
Roles vs Groups? (Score:2)
The concept of a role differs from that of a traditional group in that a group represents one or more users. A role can represent multiple users, but it also represents the permissions that a set of users can perform.
So a role is a group with permissions applied? WTF is the point of a group with no permissions applied?
Now I understand you can have different kinds of groups: email/distro, file access, memory access, execute, etc. But even if you use one group to give all of these, that doesn't really make it different that a group with permissions.
Is it all PHB/Marketing BS or am I missing something?
Re: (Score:2)
The difference is that a traditional group can change the permissions of files that it owns, but with SELinux roles, the permissions can only be changed by the policy administrator. This is actually a primary distinction between DAC security and MAC security.
Re: (Score:2)
The article should educate you a lot more than the summary does. Role-based-access controls tasks, whereas group-based-access controls resource access. SELinux doesn't supplant groups, it augments them.
However, as usual, TFS is mostly PHP/Mareting BS aimed to get you to read the article and/or post in the comment thread.
Learn how to use SELinux without disabling it... (Score:5, Informative)
Re: (Score:2)
Interesting article, but confused definitions (Score:5, Informative)
Discretionary - a user has discretion to decide who has access to what. A common form of discretionary control is access control lists (ACLs), but capabilities are also discretionary. A big problem with discretionary control is the amount of work the user has to do to grant and revoke permissions to everything. This often leads to systems configured with too much permission - the opposite of principle of least privilege.
Mandatory - the system mandates who has access to what by enforcing a policy (a user may set the policy, but can't grant access outside of that policy). Mandatory systems can require less work to administer day-to-day, as authorisation has been automated. But its often a lot of work to set good policies and are obviously less capable of dealing with things that fall outside of normal working practices. Common forms of mandatory control include label based systems like Bell-LaPadula or Biba (e.g. Top Secret: nuclear;projectX) and protection rings in CPUs.
Role-based (RBAC)- the permissions of a user are taken from their role or roles. Lots of people ask why this isn't the same as using groups and access control lists. You can implement bits of RBAC using groups and ACLs, but full RBAC is more abstract than this, and explicitly allows for greater control - like separation of duties. The current "standard" is the NIST RBAC definition http://csrc.nist.gov/groups/SNS/rbac/ [nist.gov])
Note that RBAC can be mandatory or discretionary - it doesn't say how the permissions are allocated to the roles, just how the user gets those permissions through the roles.
Re: (Score:2)
Role-based (RBAC)- the permissions of a user are taken from their role or roles. Lots of people ask why this isn't the same as using groups and access control lists. You can implement bits of RBAC using groups and ACLs, but full RBAC is more abstract than this, and explicitly allows for greater control - like separation of duties.
Couldn't you accomplish separation of duties with groups (by using different groups for different duties) and/or setting up permissions in a less sweeping way in sudoers (not just always using "fubar ALL=(ALL) ALL")? I freely admit I know just enough to be dangerous; but sometimes I wonder if the problem is really just the way user/group permissions have traditionally been used in Linux/Unix.
Re: (Score:2)
You have to be really lazy to disable SELinux (Score:2)
Re: (Score:2)
The problem is that people treat their systems like SELinux wasn't there, e.g. by moving stuff around without checking that the proper SELinux contexts are applied to the new location. Then when it doesn't work, they blame SELinux for not being able to read their minds.
Not MAC? (Score:2)
If you have a program that responds to socket requests but doesn't need to access the file system, then that program should be able to listen on a given socket but not have access to the file system. ... This type of control is called mandatory access control (MAC).
Am I mistaken, or does this have nothing to do with Mandatory Access Control? I was under the impressions that MAC (as opposed to DAC) was based on how the policy is implemented. In MAC the policy is defined by the administrator, whereas in DAC, the policy is defined by the users. The example seems like a policy is not an access control method.
Perhaps the correct way to solve this misconception would be to find some better acronyms/names...
.NET Code Access Security (Score:2)
It is quite easy so configure a set of operations that I want an executable to be able to do, or not to do.
I suppose I will get flamed and modded down for mentioning this
Re:Security vs Functionality tradeoff (Score:5, Informative)
SEL doesn't "run" anything. It's basically access control lists implemented for the Linux kernel. So rather than using only the traditional unix-based filesystem permissions you can finely control what individual processes, groups and users can do in ways not possible with unix filesystem permissions alone.
It's explained not just in TFA but the summary:
"If you have a program that responds to socket requests but doesn't need to access the file system, then that program should be able to listen on a given socket but not have access to the file system. That way, if the program is exploited in some way, its access is explicitly minimized. This type of control is called mandatory access control (MAC). Another approach to controlling access is role-based access control (RBAC). In RBAC, permissions are provided based on roles that are granted by the security system. The concept of a role differs from that of a traditional group in that a group represents one or more users. A role can represent multiple users, but it also represents the permissions that a set of users can perform. SELinux adds both MAC and RBAC to the GNU/Linux operating system."
You can think of SEL as being an "add-on" to the Linux kernel. I realize that the name can be confusing since it kind of implies that it may be a completely different "Linux system" all together. It's really just an implementation of access control lists for Linux and various Linux distrubitions (such as Redhat) ship with it. It doesn't alter what the system can and can't run. It simply provides a tool for the administrator to further control and lock down the system in ways that are otherwise not possible with vanilla kernel.
Re: (Score:2)
Re: (Score:2)
Sure there is. Try any default install of Fedora, CentOS or RHEL, and you will be able to run Firefox just fine with SELinux enabled.
Re: (Score:2)
Microsoft's problem is that they started out with single user (and single tasking) non-networked systems that had NO security at all. Apps programmers just did whatever they liked without any thought for permissions. Then MS just tacked on as little as possible later to add rudimentry multi-user (one at a time) support complete with some dirty hacks to make old software function in that environment, some more hacks to keep users from totally screwing things up, and some access control. They focused so hard
Re: (Score:2)
Re:Do you really want NSA developing your OS? (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
Sorry, but I'm paranoid. What if you're a NSA agent? So I think you're lying me - my CPUs are safe.
Re:Do you really want NSA developing your OS? (Score:5, Funny)
Re: (Score:2)
Re:Do you really want NSA developing your OS? (Score:5, Funny)
But what if YOU have a secret deal with the NSA?
Re: (Score:2)
Re: (Score:2, Insightful)
frankly i think it's wise to not trust the nsa even if you can see the code, because frankly it's just plain misplaced f
Re: (Score:2, Insightful)
Re:Do you really want NSA developing your OS? (Score:5, Insightful)
You're forgetting that Linux development is distributed across the world. Maybe the NSA might conceivably be able to "silence" developers within the USA. But what hold exactly would the NSA have over developers in Europe and Asia? Even if you suppose that the USA's close allies such as Britain and Canada might be persuaded to join in some conspiracy, what would other countries have to gain? You would have to propose a global conspiracy, with governments the world over uniting to, um, stop themselves from finding out about the backdoors that America was using to spy on them? Sorry, but this is the most half-baked conspiracy theory I've ever heard. Leaving aside the clear paranoia that is causing you to characterise the NSA as "malicious", they would have to be not only malicious but downright stupid to put backdoors into open-source code.
For example, the Chinese government uses Linux themselves. It would be foolhardy in the extreme for NSA to assume that they will not have their best security experts scouring the code for backdoors. If they found one, they could use it themselves -- or they could expose it, seriously embarrassing the United States. Not exactly the kind of thing that's likely to result in NSA funding being maintained at its present high level...
Re: (Score:2)
Some smart person in China, Russia, Serbia,
Australia, South Africa, the USA, Germany,
one day reading source code that they are interested in.
They will lol at the quality or think wow this is
neat until they see something out of place.
Then they go the the forum, chat room, blog or web page for 'help'.
Game over back door.
Best to just keep people using MS products.
MS is the backdoor.
Re: (Score:3, Informative)
I've read that code, all of it. There are no back doors to be found there. It's all well structured and very clear. Various access functions in the kernel call into SELinux functions and get a simple Boolean result OK or not OK.
The VFS contains bits to implement the security.* xattrs.
Re: (Score:2)
Re: (Score:2)
It's not perfect.
What does the most harm is when any government agency is given too much power by the laws that are enacted. Then you should point the blame at the legislature and the executive.
Re: (Score:2, Informative)
And how many of those are looking to fix old bugs as opposed to add new features? Bugs can exist in code that lots of people look at for 25 years.
http://it.slashdot.org/article.pl?sid=08/05/11/1339228 [slashdot.org]
Most subtle bugs can't be seen by readi
Re: (Score:3, Funny)
Re: (Score:2)
If it keeps them off my phone line, then I'm all for it!
I hear voices, but they *usually* belong to people.
Re: (Score:3, Insightful)
And aside from that, lets see, they have arguably several hundred to thousands of the best crypto and security people working for them so yeah lets completely ignore what they have to say in favor of some nebulous conspiracy.
Think about this: could such a conspiracy exist with that many people being informed of it? All it takes is one
Re:Do you really want NSA developing your OS? (Score:5, Interesting)
look at the web site. it say "POSIX not good enough for proper security. therefore we make it better so that civil services, and other environments where security matters, have someone to go to to ask 'is this secure to level XYZ?' and get a certification"
the bottom line is: be damn grateful for their involvement because it beefs up linux and allows it to be recommended for deployment in places where it would otherwise be hopelessly outclassed. remember: selinux allows linux to be "certified" as "secure", and mathematically provable as "secure". those certifications are absolutely vital for deployment in certain kinds of environments.
so be glad that linux is getting a leg-up, thanks to the NSA.
Re: (Score:2)
Re:TrustedBSD (Score:5, Informative)
People claims SELinux is difficult, but they often don't understand how insanely powerful it is....
Re:TrustedBSD (Score:5, Informative)
mwahahahah. yeah. nor how much money can be made from being able to program it and set up selinux policies that make normal people's brains bleed
i did a contract for a veeery unusual selinux deployment, involving file transfers from a high security environment to a low security one and vice-versa (secure-ftp). the requirement was that files in "incoming" should be creatable-and-writeable from one side, and from the other side they should be "readable-and-deletable" on the other.
the requirement was nothing to do with UNIX, it was implementing guidelines laid out in a policy document on security and was government-mandated for the type of environment (i wasn't told what that was but it was probably banking).
when my friend analysed the requirements, he did a simple map of POSIX permissions onto the requirements. POSIX merges "write" with "delete". automatically and immediately, pure POSIX permissions made it absolutely impossible to fulfil the requirements. he looked at extended ACLs: that didn't help, either.
on investigation of SElinux permissions, with extended separate permissions on directories as well as files, it was abundantly clear that SElinux fitted the requirements perfectly.
in SElinux, every single OS primitive has its own ACL permission, so there are about twenty five ACLs for files and a further separate and distinct twenty five or so ACLs for subdirectories. thirty or more for sockets. network addresses can be represented in ACLs. it's just
you could, if you were prepared to drive yourself up the wall, implement a per-user firewall for ssh. not using ssh configs but using selinux policy files! you could define the set of IP addresses which become relevant for a particular user context, which gets activated when the user logs in because PAM helps define the user's role, and then the combination of the user's role and the fact that the ssh "context" is entered, then network access is granted or denied because...
it is truly truly absolutely amazing.
Re: (Score:2)
This is what I got from your post: I can define a role that allows its members to access defined sets of resources (files/directories/IP addresses+ports), where access is limited to those operations permitted for each resource, but only when using the application and protocol proscribed for each set.
This will be very useful to my work. Thank you.
Re: (Score:2)
No, it isn't powerful. "Powerful" doesn't just mean being able to get a lot done, it means getting a lot done with little time or effort.
Re: (Score:2)
There is no "copying". They all implement the same features and ideas designed by the same people for the same purpose. From NSA's, DARPA's et al. perspective, this is simply "dual sourcing" — what customers with huge budgets and strict requirements are supposed to do for redundancy.
They need them all for their multitude of servers. But since FreeBSD is better to begin with, you want it for your smaller establishment, unless already "married" to
Re: (Score:2, Informative)
Re: (Score:2, Insightful)
And why would Debian, Red Hat, Ubuntu, and Fedora have it if it were malicious? Despite the fact that the US government could have made Red Hat put it in for Red Hat and Fedora
Re: (Score:2)
Well, if I shoot my foot with a gun, I get a hole in my foot. If I use SELinux, I end up with a pretty secure OS. These are different things.
Now, if you have information that may be able to give me a secure OS using a gun, or perhaps more interestingly a hole in my foot using SELinux, feel free to enlighten me :)
Oh, FWIW, paranoia is great up until the point it becomes easily confused with irrationality. Irrational paranoia is usually reserved for the domain of the mentally ill.
Re:Roles (Score:5, Funny)
Re: (Score:2)
Hey, my own crappy Perl code in which I've build a few dozen web-sites solves potential SQL exploits by running SQL queries using a MySQL user with limited permissions. There's no reason for 95% of database queries to have write access (INSERT) to anything. And some database tables don
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
This should not forbid users to interact with the daemon in the way it was designed to work, in fact this should be totally transparent.
Re: (Score:2)
No, you are screwed if you don't take the competency of the admin into account.
Besides, it's not just a question of competency, it's also a question of time. I'm not going to waste my time on a system designed by people who treat my time as being worthless.
Thinking like yours is the reason why security sucks so badly.