In Dec. 1999, I went to a SANS conference in San Francisco. One of the 
courses that I took was "Securing Linux". There was a section of that 
course where representatives of the NSA presented what they felt needed to 
be done in order to make Linux secure, and they wanted feedback from the 
community on what they felt needed to be done. There were a lot of people 
that had severe reservations about trusting anything that the NSA put out, 
because they are known for building back doors into systems. The response 
to this was simple: " That's not the type of security that we are talking 
about. We're not talking about hardening a distribution, or locking down 
the services that are running, we're talking about hardening the kernel. 
Removing potential buffer overflows, adding access control at the kernel 
level, etc." (that really isn't an exact quote).  One of the main goals was 
to compartmentalize the system so that no one user had complete control 
over the entire system. Basically, there would be no such thing as root. 
Access to resources is granted on an as-needed policy, and inherited rights 
need to be explicitly granted to a user, it is not the rule.

As a result of these things, better overall system security can be 
achieved. You can have an insecure FTP service running, but that doesn't 
mean that the entire system can be compromised. However, you can take 
SELinux as the baseline, and build upward and harden the services as well. 
I know, it's a revolutionary concept to start at the bottom and secure 
upward, rather than start at the top and strip down.

As for why they chose Linux instead of one of the other OS's, they 
considered that to be a no-brainer. Linux allowed for more community input, 
as the community is far more flexible then say, Theo is. As for it being 
impossible to secure Linux, that is just an inept comment from someone who 
hasn't bothered to educate themselves in computer security.

And that is all I have to say about that.

Kenny

-----------------------------------------------------
   Kenneth E. Lussier
   Geek by nature, Linux by choice
   PGP keyID: 0xD71DF198
   Public key available @ http://pgp.mit.edu

At 08:54 AM 3/15/01 -0500, Jeffry Smith wrote:

>Of course, you've carefully examined what SELinux does, and how it
>operates?  I can tell not.  SELinux is not about audit, but about the
>design of a system to be secure in the face of errors.  Specifically it is
>about a means to structure access (via policies), that allows you to
>remove root access entirely!
>
>Yes, I've seen it, I'm on the mailing list, I actually understand
>security.  It's more than just audit.  Much more.  Audit will fix holes.
>This will enable you to be secure despite holes.
>
>Suggest you check out the links there (http://www.nsa.gov/selinux), as 
>well as:
>http://www.niap.nist.gov/cc-scheme/
>http://csrc.nist.gov/publications/secpubs/rainbow/
>
>and educate yourself on security.
>
>(BTW:  the FTP server is NOT part of SELinux, which is only concerned with
>adding the policy pieces to the kernel, and adding the user-space tools to
>manage policy).


**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to