SELinux & AppArmor - Comparison of Secure OSes
|
|
|
- Dominick Farmer
- 10 years ago
- Views:
Transcription
1 SELinux & AppArmor - Comparison of Secure OSes Apr Yuichi Nakamura Research and Development Department Hitachi Software Engineering Co., Ltd. [email protected]
2 Contents 0. Background 1. Introduction of SELinux & AppArmor 2. Comparison 2.1 Feature 2.2 Porting to embedded 2.3 Performance 3. SELinux activities in Japan 2
3 Background Embedded devices are being connected to networks. Attackers can also reach devices Security of embedded devices is similar to Win 95. In some devices All processes are running as root No password What happened to PCs will happen in near future. Worm, virus, crackers Some devices were already exploited 3
4 Threats root can do everything Privilege escalation is known even running as normal user such as bugs in suid programs PDA, mobile phone If browser open malicious page Virus is executed.. Private data is stolen (by wiretap, key logger) Springboard Consumer devices (TV, DVD, audio player etc) Attackers can intrude from network interface Download virus with data Destroy system, disclose data, springboard, wiretap etc 4
5 Requirement for embedded security Embedded devices Restricted resource, Hard to update Security technologies Packet filtering Useful, but can not protect open ports IDS, Anti-virus Consumes resources Need update of pattern file, not effective to zero-day attack Secure OS Simple, effective even without security patch Useful for zero-day attack Hardware independent 5
6 Secure OS Access control feature Assign least privilege to process Example: HTTPD can access only homepage file and configuration file. MAC (Mandatory Access control) No one (including root) can not bypass Implemented in Linux kernel Policy: Important component Configuration of Secure OS: Subject, object, access type Subject object Access type /usr/sbin/httpd /var/www read /usr/sbin/httpd /etc/httpd.d read /usr/sbin/name /var/named/ read d.... 6
7 What Secure OS can do?: Before * Network music player Buy MP3 Remote control Cracked! Network process Player process Virus! Springboard attack etc Install wiretap, steal password etc Attackers can do everything 7
8 What Secure OS can do?: After * Network music player Buy MP3 Remote control Cracked! Difficult to use as springboard, install wiretap Can not exec shell, launch services, write system files etc. Network process Write ok Assign access right Secure OS Player process Read ok No access right for: Springboard attack Install wiretap etc MP3 Virus! Attackers/malwares have limited access right Effective to Zero-day attacks, without security patch 8
9 SELinux and AppArmor Two major Open Source Secure OSes Also two extreme security vs. usability SELinux - Strict security, hard to use Developed by NSA Included in mainline kernel(2.6), Redhat, Fedora AppArmor Not strict security, easy to use Was called Subdomain, developed by Immunix Now maintained by Novell Included in SuSE Linux 9
10 1. Introduction of SELinux & AppArmor
11 Overview of SELinux Access control feature: TE Example of policy 11
12 Main feature : TE (Type Enforcement) Label based access control Domain Identifier for process Type Identifier(label) for resources Controls permission between domain and type Process httpd Domain:httpd_t Permission read Resource File /var/www Type:web_contents_t 12
13 Fine-grained access control File, network(port number, NIC, IP), IPC, user, other privilege.. About 700 permissions 13
14 Configuration of policy The most important feature What domain can access what access to what types? Ex Web server(domain httpd_t :allowing access to homepage allow specify domain, type, permission allow httpd_t web_contents_t file:{ read }; Domain Type Permission Assign label(=type) to resource /var/www( /.*) system_u:object_r:web_contents_t Many lines of allows(10k-100k) are required macro is used Bunch of allows is summarized by macro 14
15 Example of policy bind.te: allowing acces type named_t; type named_exec_t; /etc/rndc.* -- gen_context(system_u:object_r:named_conf_t,s0) init_daemon_domain(named_t,named_exec_t) /etc/rndc\.key -- gen_context(system_u:object_r:dnssec_t,s0) /usr/sbin/lwresd -- gen_context(system_u:object_r:named_exec_t,s0) kernel_read_kernel_sysctls(named_t) /usr/sbin/named -- gen_context(system_u:object_r:named_exec_t,s0) kernel_read_system_state(named_t) /usr/sbin/named-checkconf -- gen_context(system_u:object_r:named_checkconf_exec_t,s0) kernel_read_network_state(named_t) /usr/sbin/r?ndc -- gen_context(system_u:object_r:ndc_exec_t,s0) kernel_tcp_recvfrom(named_t)... /var/log/named.* -- gen_context(system_u:object_r:named_log_t,s0) corenet_tcp_sendrecv_all_if(named_t) corenet_raw_sendrecv_all_if(named_t) /var/run/ndc -s gen_context(system_u:object_r:named_var_run_t,s0) corenet_udp_sendrecv_all_if(named_t) /var/run/bind(/.*)? gen_context(system_u:object_r:named_var_run_t,s0) corenet_tcp_sendrecv_all_nodes(named_t) /var/run/named(/.*)? gen_context(system_u:object_r:named_var_run_t,s0) corenet_udp_sendrecv_all_nodes(named_t) corenet_raw_sendrecv_all_nodes(named_t) corenet_tcp_sendrecv_all_ports(named_t) corenet_udp_sendrecv_all_ports(named_t) corenet_non_ipsec_sendrecv(named_t) corenet_tcp_bind_all_nodes(named_t) corenet_udp_bind_all_nodes(named_t) 293 lines 100 kinds of macros bind.fc:assigning label ifdef(`distro_debian',` /etc/bind(/.*)? gen_context(system_u:object_r:named_zone_t,s0) /etc/bind/named\.conf -- gen_context(system_u:object_r:named_conf_t,s0)...45 Difficult to understand 15
16 Overview of AppArmor Easier than SELinux Implemented as LKM Recently, often compared with SELinux 16
17 Feature 1. Access control Controls file and POSIX capability Path name-based Label is not used Profile = policy 2. GUI Tools Integrated in YaST Generating profile Log report Not so important for embedded 17
18 Path name based access control Path name based: Identify file with path name Easy to understand Example: /usr/sbin/httpd{ /var/www/** r, } /usr/sbin/httpd can read under /var/www 18
19 Permission to file Basic permission: r,w,x,l r read w : write ix : execute l : link(remove file) 19
20 POSIX capability Controls capability Capability Important operation other than file access Example: net_bind_service: bind well-known port net_raw: use raw socket For detail: see $man capabilities 20
21 Configuration for profile Simple, easy to understand /usr/sbin/named { -> path to exectable #include <abstractions/base> Common #include<abstractions/nameservice> capability net_bind_service, Capability capability setgid, capability setuid, <snip> /var/lib/named/** rwl, Access to file /var/run/named.pid wl, } 21
22 2.1 Comparison of feature
23 Common : LSM Both use LSM for implementation LSM: Linux Security Module set of hooks in kernel to check security is included in mainline from 2.6 Using LSM: SELinux, AppArmor, LIDS (for 2.6) Not using TOMOYO Linux, LIDS (for 2.4) 23
24 Difference between SELinux and AppArmor Granularity of permission SELinux: File, network, IPC, POSIX capability etc.. AppArmor File + POSIX capability AppArmor can reach SELinux in theory, because both use LSM. How to identify resource The most fundamental -> next 24
25 How to identify resource Fundamental difference Affects security and usability Label based vs Path name based Label: lower usability, higher security Assign label to file SELinux Path name: higher usability, lower security Identify file with path name AppArmor, TOMOYO Linux Compare them by showing benefit and loss of pathname 25
26 Benefit of path-name High usability, easy to understand No need to extend file system Label base: File system have to be extended to store label Implementing policy generation tool is easier -> Next Nothing happens when i-node number is changed -> Next 26
27 Benefit of path-name: policy generation Example case: PHP trid to write /var/www/html/write/test.txt But, access denied by Secure OS Have to generate policy from log SELinux 1) label under /var/www/html -> httpd_sys_content_t 2) Log says.. httpd_t was denied to write to httpd_sys_content_t 3) Generate policy from log allow httpd_t httpd_sys_content_t:file write; - > allowing write access whole /var/www! Unnecessary access is granted AppArmor 1) log says /usr/sbin/httpd is denied to write /var/www/html/write/test.txt 2) Generate policy(=profile) from log /usr/sbin/httpd{ /var/www/html/write/test.txt w, Unnecessary access is _not_ granted 27
28 Benefit of path-name change of inode number Example /etc/mtab SELinux : Label is lost when inode number is changed Label is associated with inode /etc/mtab vi, rpm changes inode Solution file type transition configuration AppArmor Not easy for beginner Some userland have to be extended Example: rpm,vi No problem! 28
29 Loss by path-name Information flow tmpfiles 29
30 Loss by path-name Information flow analysis -> Who can access the information? Some people say path-name based security is broken because of this Ex: Information flow analysis to password information Initial state: Stored in /etc/shadow If hardlink is created to /etc/shadow, password information can be accessed via hardlink What happens in information flow analysis? Have to traverse whole file tree to find hardlink What if more hardlink is created during travarsal? SELinux: All you have to do is to check what kind of domain can access label for /etc/shadow Label is the same for hardlink 30
31 Loss by path-name tmp files When creating randomly named file under /tmp SELinux Can identify such file by naming label such as httpd_tmp_t AppArmor How to identify randomly named files? result in allowing whole /tmp. 31
32 SELinux Policy Editor(SEEDIT) (1) Tool that makes SELinux easy Open Source: Originally developed by Hitachi Software Included in Fedora repository Main feature: SPDL AppArmor-like syntax to write policy example: domain httpd_t program /usr/sbin/httpd; allow /var/www/** r; path-name configuration This is converted to SELinux policy syntax type var_www_t; label is generated allow httpd_t var_www_t { file dir }: read; 32
33 SELinux Policy Editor(SEEDIT) (2) Still different from AppArmor Inherit drawback from label-based access control change of inode generated policy is label based Inherit good points from SELinux fine-grained permission (IPC, network) no patch to kernel Now, I am porting SPDL to work on embedded device I can demo for you after presentation! I hope I can release in future (not sure when) 33
34 2.2 Porting SELinux/AppArmor to embedded devices
35 Target device Sharp Zaurus SL-C3200 CPU: Intel XScale 416Mhz Memory: 64MB Distro: Open Zaurus rc2 Experiences of porting SELinux and AppArmor 35
36 Kernel SELinux No work is needed! included in mainline AppArmor Have to obtain patch from Very easy to patch diffstat: fs/namespace.c 3 include/linux/audit.h 5 include/linux/namespace.h 3 kernel/audit.c 6 All others: security/apparmor 36
37 File system SELinux: File system must support xattr ext2, ext3 supports xattr after jffs2 supports xattr Fortunately, SL-C3200 uses ext3 AppArmor: No extension needed! 37
38 Userland SELinux Many commands load_policy, setfiles, restorecon, chcon etc.. Might want them to port to BusyBox to reduce size libselinux APIs for SELinux commands AppArmor Only apparmor_parser Profile loader Some helper shell script may needed for convenience cross-compile with minor modification 38
39 Policy SELinux Difficult to use sample policy (refpolicy) Intended for server use Need a lot of customize Difficult to understand, describe I used SELinux Poilcy Editor s simplified policy(spdl) AppArmor Much easier than refpolicy Like SPDL Policy generation tool Not available for both python or perl is required Have to write by hand. 39
40 2.3 Performance
41 Experiment Prepared domain/profile for 7 apps Memory usage Storage usage Unixbench/lmbench Compared with no SELinux/AppArmor kernel 41
42 Memory usage free command AppArmor +1M SELinux +1.7M Both need work (TODO) 42
43 Storage usage Total SELinux + 757k(no tuning) +244k(with tuning) -> Tuning is important AppArmor +157k (tuning not tried yet) 43
44 lmbench simple syscall simple read simple write simple stat simple fstat simple open/close pipe latency process fork+exit process fork+/bin/sh fork+execve -c Overhead of AppArmor(%) Overhead of SELinux(%) AppArmor: overhead in file open, exec SELinux: overhead after file open, exec 44
45 Unixbench DhryStone 2 using register variables Double-Precision Whetstone Execl FileCopy(256buf) 1024buf 4096buf Pipe Throuput Pipe-based context switch Process creation System Shell scripts call overheads Overhead of AppArmor(%) Overhead of SELinux(%) Less overhead than null I/O??? 45
46 3. SELinux activities in Japan
47 Our project Project in Japan SELinux Users Group (JSELUG) Our goal Prepare SELinux platform, development kit for embedded devices 2 projects sebusybox(on going), SEDiet(not public yet) Developers Current active Yuichi, KaiGai, Shinji Some other people are involved in discussion If you are interested in our project: busybox atmark kaigai.gr.jp 47
48 sebusybox Porting SELinux commands to BusyBox Submitted patch to BusyBox upstream Accepted: coreutils, libselinux On going: policycoreutils, netstat, find We found implicit guidelines of BusyBox such as indent rule, usage of libbb Japanese site, sorry: 48
49 SEDiet SEDiet (SELinux Diet): Activity to reduce size of SELinux Reducing size of policy, userland In progress. Submitting patch to diet libselinux More presentation in near future?? 49
50 Summary SELinux -> more security, less usability AppArmor -> less security, more usability SELinux needs more work, but community can change it! Project in progress SELinux Policy Editor can simplify SELinux SELinux community is bigger, upstreamed More eyeballs, better implementation, more reputation Let s contribute 50
51 Questions/Suggestions? Linux is a registered trademark of Linus Torvalds in the US and other countries Red Hat is a registered trademark of Red Hat,Inc in the US and other countries SUSE is a registered trademark of SUSE LINUX AG in the US and other countries AppArmor is a registered trademark of Novell, Inc in the US and other countries. TOMOYO is a registered trademark of NTT Data corporation. Other names of products, services and companies are the trademarks of their respective companies. 51
Safety measures in Linux
S a f e t y m e a s u r e s i n L i n u x Safety measures in Linux Krzysztof Lichota [email protected] A g e n d a Standard Unix security measures: permissions, capabilities, ACLs, chroot Linux kernel
NSA Security-Enhanced Linux (SELinux)
NSA Security-Enhanced Linux (SELinux) http://www.nsa.gov/selinux Stephen Smalley [email protected] Information Assurance Research Group National Security Agency Information Assurance Research Group 1
Laboratory Report. An Appendix to SELinux & grsecurity: A Side-by-Side Comparison of Mandatory Access Control & Access Control List Implementations
Laboratory Report An Appendix to SELinux & grsecurity: A Side-by-Side Comparison of Mandatory Access Control & Access Control List Implementations 1. Hardware Configuration We configured our testbed on
How To Write Security Enhanced Linux On Embedded Systems (Es) On A Microsoft Linux 2.2.2 (Amd64) (Amd32) (A Microsoft Microsoft 2.3.2) (For Microsoft) (Or
Security Enhanced Linux on Embedded Systems: a Hardware-accelerated Implementation Leandro Fiorin, Alberto Ferrante Konstantinos Padarnitsas, Francesco Regazzoni University of Lugano Lugano, Switzerland
Confining the Apache Web Server with Security-Enhanced Linux
Confining the Apache Web Server with Security-Enhanced Linux Michelle J. Gosselin, Jennifer Schommer [email protected], [email protected] Keywords: Operating System Security, Web Server Security, Access
SELinux. Security Enhanced Linux
SELinux Security Enhanced Linux Introduction and brief overview. Copyright 2005 by Paweł J. Sawicki http://www.pawel-sawicki.com/ Agenda DAC Discretionary Access Control ACL Access Control Lists MAC Mandatory
Mandatory Access Control in Linux
Mandatory Access Control in Linux CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ In the early 2000s Root and administrator Many
PARALLELS SERVER 4 BARE METAL README
PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels
Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE
Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE A P P L I C A T I O N V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH
Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Tutorial Amon Ott Contents: 1 Motivation: Why We Need Better Security in the Linux Kernel 2 Overview of RSBAC 3 How
Linux Distributed Security Module 1
Linux Distributed Security Module 1 By Miroslaw Zakrzewski and Ibrahim Haddad This article describes the implementation of Mandatory Access Control through a Linux kernel module that is targeted for Linux
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction
Linux Security on HP Servers: Security Enhanced Linux Technical introduction This white paper -- one in a series of Linux security white papers -- discusses Security Enhanced Linux (SELinux), a mandatory
PARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley
Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.
SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0))
SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0)) Yuichi Nakamura July 3, 2006 Contents 1 What is RBAC 2 1.1 Overview............................... 2 1.2 How RBAC works in SELinux....................
Security Enhanced Linux and the Path Forward
Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary
Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server 12
Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server 12 Craig Gardner Software Engineer SUSE [email protected] Overview What? and Why? New for SUSE Linux Enterprise
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Kernel Intrusion Detection System
Kernel Intrusion Detection System Rodrigo Rubira Branco [email protected] [email protected] Monica's Team!! Brazilian famous H.Q. story Amazon Forest Yeah, Brazilian country! Soccer Brazilian
Networking in NSA Security-Enhanced Linux
Networking in NSA Security-Enhanced Linux James Morris Abstract Break through the complexity of SE Linux with a working example that shows how to add SE Linux protection to a simple network server. This
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Secure computing: SELinux
Secure computing: SELinux Michael Wikberg Helsinki University of Technology [email protected] Abstract Using mandatory access control greatly increases the security of an operating system. SELinux,
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
Automatic updates for Websense data endpoints
Automatic updates for Websense data endpoints Topic 41102 / Updated: 25-Feb-2014 Applies To: Websense Data Security v7.6, v7.7.x, and v7.8 Endpoint auto-update is a feature that lets a network server push
CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure
CSE 120 Principles of Operating Systems Fall 2000 Lecture 3: Operating System Modules, Interfaces, and Structure Geoffrey M. Voelker Modules, Interfaces, Structure We roughly defined an OS as the layer
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Symantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
SUSE Linux Enterprise Desktop 11
FAQ www.novell.com SUSE Linux Enterprise Desktop 11 Frequently Asked Questions March 2009 What is Novell announcing? Novell is announcing the general availability of SUSE Linux Enterprise 11 the most interoperable
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Red Hat Linux Internals
Red Hat Linux Internals Learn how the Linux kernel functions and start developing modules. Red Hat Linux internals teaches you all the fundamental requirements necessary to understand and start developing
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
SUSE Linux Enterprise 10 SP2: Virtualization Technology Support
Technical White Paper LINUX OPERATING SYSTEMS www.novell.com SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Content and modifications. The contents of this document are not part of the
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
CSE543 - Introduction to Computer and Network Security. Module: Operating System Security
CSE543 - Introduction to Computer and Network Security Module: Operating System Security Professor Trent Jaeger 1 OS Security So, you have built an operating system that enables user-space processes to
Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide
Kaspersky Anti-Virus 8.0 for Linux File Server Installation Guide A P P L I C A T I O N V E R S I O N : 8. 0 M P 2 C F 2 Dear User! Thank you for choosing our product. We hope that this documentation will
Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center [email protected]
Common Criteria Evaluation Challenges for SELinux Doc Shankar IBM Linux Technology Center [email protected] Agenda Common Criteria Roadmap/Achievements CAPP/LSPP Overview EAL4 Overview Open Sourcing
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Update 0 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for
The Case for SE Android. Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency
The Case for SE Android Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency 1 Android: What is it? Linux-based software stack for mobile devices. Very divergent from typical
Linux for Embedded and Real-Time Systems
Linux for Embedded and Real-Time Systems Kaiserslautern 9 June 2005 Samir Amiry ([email protected]) Fraunhofer IESE Institut Experimentelles Software Engineering Outlines Introduction. Linux: the
Getting Started Guide. Getting Started With Your Dedicated Server. Setting up and hosting a domain on your Linux Dedicated Server using Plesk 8.0.
Getting Started Guide Getting Started With Your Dedicated Server Setting up and hosting a domain on your Linux Dedicated Server using Plesk 8.0. Getting Started with Your Dedicated Server Plesk 8.0 Version
How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device
Ch.9 Firewalls and Intrusion Prevention Systems Firewalls: effective means of protecting LANs Internet connectivity is essential for every organization and individuals introduces threats from the Internet
Mandatory Access Control
CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server
Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server Marcus Meissner Software Engineer SUSE Craig Gardner Software Engineer SUSE Roman Drahtmueller Software Engineer SUSE
Republic Polytechnic School of Information and Communications Technology C226 Operating System Concepts. Module Curriculum
Republic Polytechnic School of Information and Communications Technology C6 Operating System Concepts Module Curriculum Module Description: This module examines the fundamental components of single computer
The Benefits of Verio Virtual Private Servers (VPS) Verio Virtual Private Server (VPS) CONTENTS
Performance, Verio FreeBSD Virtual Control, Private Server and (VPS) Security: v3 CONTENTS Why outsource hosting?... 1 Some alternative approaches... 2 Linux VPS and FreeBSD VPS overview... 3 Verio VPS
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
GestióIP IPAM v3.0 IP address management software Installation Guide v0.1 www.gestioip.net
GestióIP IPAM v3.0 IP address management software Installation Guide v0.1 www.gestioip.net GestióIP Copyright Marc Uebel 2011 Table of Contents 1 Introduction... 3 2 Requirements... 3 3 Installation...
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
This Release Notes document is for F-Secure Linux Security.
==== RELEASE NOTES FOR F-Secure Linux Security 9.20 build 2520 ==== This Release Notes document is for F-Secure Linux Security. This document contains late-breaking information about the product. Please
CSE 265: System and Network Administration
CSE 265: System and Network Administration MW 1:10-2:00pm Maginnes 105 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor: Prof. Brian D. Davison
ZABBIX. An Enterprise-Class Open Source Distributed Monitoring Solution. Takanori Suzuki MIRACLE LINUX CORPORATION October 22, 2009
ZABBIX An Enterprise-Class Open Source Distributed Monitoring Solution Takanori Suzuki MIRACLE LINUX CORPORATION October 22, 2009 Outline Biography ZABBIX New release ZABBIX 1.8 Activity in Japan Biography
This document describes the new features of this release and important changes since the previous one.
Parallels Virtuozzo Containers 4.0 for Linux Release Notes Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved. This document describes the new features of this release and important changes
Operating System Structure
Operating System Structure Lecture 3 Disclaimer: some slides are adopted from the book authors slides with permission Recap Computer architecture CPU, memory, disk, I/O devices Memory hierarchy Architectural
X05. An Overview of Source Code Scanning Tools. Loulwa Salem. Las Vegas, NV. IBM Corporation 2006. IBM System p, AIX 5L & Linux Technical University
X05 An Overview of Source Code Scanning Tools Loulwa Salem Las Vegas, NV Objectives This session will introduce better coding practices and tools available to aid developers in producing more secure code.
VMware ESXi 3.5 update 2
VMware ESXi 3.5 update 2 VMware ESXi 3.5 Exec Summary What is it? What does it do? What is unique? Who can use it? How do you use it? Next generation, thin hypervisor for FREE Partitions servers to create
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Parallels Virtuozzo Containers 4.7 for Linux Readme
Parallels Virtuozzo Containers 4.7 for Linux Readme This document provides the first-priority information about Parallels Virtuozzo Containers 4.7 for Linux and supplements the included documentation.
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Advanced Systems Security: Retrofitting Commercial Systems
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:
Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.
Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages
NetIQ Sentinel 7.0.1 Quick Start Guide
NetIQ Sentinel 7.0.1 Quick Start Guide April 2012 Getting Started Use the following information to get Sentinel installed and running quickly. Meeting System Requirements on page 1 Installing Sentinel
CSE 265: System and Network Administration. CSE 265: System and Network Administration
CSE 265: System and Network Administration MW 9:10-10:00am Packard 258 F 9:10-11:00am Packard 112 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor:
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
Deploying IBM Lotus Domino on Red Hat Enterprise Linux 5. Version 1.0
Deploying IBM Lotus Domino on Red Hat Enterprise Linux 5 Version 1.0 November 2008 Deploying IBM Lotus Domino on Red Hat Enterprise Linux 5 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science [email protected] 1 Reminders After
Parallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server
Getting Started Guide Parallels Small Business Panel for your Linux or Windows Server Getting Started Guide Page 1 Getting Started Guide: Parallels Small Business Panel, Linux & Windows Server Version
WHITEPAPER INTRODUCTION TO CONTAINER SECURITY. Introduction to Container Security
Introduction to Container Security Table of Contents Executive Summary 3 The Docker Platform 3 Linux Best Practices and Default Docker Security 3 Process Restrictions 4 File & Device Restrictions 4 Application
Nipper Studio Beginner s Guide
Nipper Studio Beginner s Guide Multiple Award Winning Security Software Version 2.1 Published March 2015 Titania Limited 2014. All Rights Reserved This document is intended to provide advice and assistance
Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu 10.04 LTS)
Deploying Ubuntu Server Edition Training Course Overview (Ubuntu 10.04 LTS) 1. Deploying Ubuntu Server Edition Course Overview About the Course and Objectives This advanced 40-hour course will provide
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
CTERA Agent for Linux
User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
Operating System Security Hardening for SAP HANA
Operating System Security Hardening for SAP HANA Peter Schinagl Technical Architect Global SAP Alliance [email protected] Markus Gürtler Architect & Technical Manager SAP Linux Lab [email protected] Corporate
A Firewall Model of File System Security
Ph.D Dissertation Proposal A Firewall Model of File System Security By Lihui Hu Department Of Computer Science Michigan Technological University March 2010 Committee Members: Dr. Jean Mayo, Chair Dr. Steve
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Cisco Security Agent (CSA) Network Admission Control (NAC)
Cisco Security Agent (CSA) Network Admission Control (NAC) Pascal Delprat Security Consultant Cisco France Vincent Bieri Marketing Manager, Security EMEA Technology Marketing Organisation 1 Agenda CSA
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
VIRTUOZZO TM FOR LINUX 2.6.1
. VIRTUOZZO TM FOR LINUX 2.6.1 WHAT S NEW DOCUMENT Copyright 2005 SWsoft TABLE OF CONTENTS TABLE OF CONTENTS... 2 INTRODUCTION: KEY THEMES... 3 Ease of Use and Manageablity... 3 Security... 3 Powerful...
Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers
Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers Enterprise Product Group (EPG) Dell White Paper By Todd Muirhead and Peter Lillian July 2004 Contents Executive Summary... 3 Introduction...
Thanks for choosing sentora-paranoid for your sentora hosting environment security solution
Sentora-paranoid version 1.0.1 by: Mario Rodríguez Somohano [email protected] Official web site: http://sentora-paranoid.open-source.tk Forum: http://forum.sentora-paranoid.open-source.tk
