SELinux course. Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant, Nethemba s.r.o.
|
|
|
- Peter Jenkins
- 9 years ago
- Views:
Transcription
1 SELinux course Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant, Nethemba s.r.o.
2 SELinux history I. Originally a development project from the National Security Agency (NSA) Implementation of the Flask operating system security architecture The NSA integrated SELinux into the Linux kernel using the Linux Security Modules (LSM) framework (Linus Torvalds, who wanted a modular approach to security instead of accepting just SELinux into the kernel)
3 SELinux history II. Originally, the SELinux implementation used persistent security IDs (PSIDs) stored in an unused field of the ext2 inode The next evolution of SELinux was as a loadable kernel module for the 2.4.<x> series of Linux kernels. This module stored PSIDs in a normal file Finally, the SELinux code was integrated upstream to the 2.6.x kernel, which has full support for LSM and has extended attributes (security.selinux in xattrs) in the ext3 file system. SELinux was moved to using xattrs to store security context information.
4 DAC (Discretionary Access Control) Users can change security attributes at request Subject with a certain access permission is capable of passing the permission to any other subject Users: administrators vs non-administrators Unix DAC - ability of the owner of a file or directory to grant or deny access to other users (chown, chmod, chattr,..)
5 Standard Linux Access Control Uses an Unix DAC Subjects are processes with real and effective user group IDs Objects are files, directories, pipes and devices with access mode in inode: rwx r x uid gid Access rules are hard coded in the kernel, checked on syscall call
6 Standard Linux Security Problems Access is based on user's access Example: Your firefox (if it is compromised) can read your ssh keys! Example II: It is possible to gain root shell through exploiting root process (e.g. Apache) Kernel does not distinguish applications from users Processes can change security properties
7 MAC (Mandatory Access Control) Users can not change security attributes at request (non discretionary) A corporate policy or security rules is enforced User programs have to work within the constraints of these access rules Follows the principle of least privilege Subjects vs. Objects
8 SELinux Access Control Uses Flask architecture, DTE, RBAC and MLS security models The subjects and the objects remain the same, SELinux assigns to every subject and object a security context (SID) combined from a SELinux user, role, type and MLS level Configurable via policy language All access is denied by default
9 Domain Type Enforcement (DTE) model Considers domains associated with subjects (processes) and types associated with objects (file, directory, device,..) Domain Definition Table (DDT) represents allowed access modes between subjects and objects (e.g. read, write, execute) Domain Interaction Table (DIT) represents allowed access modes between domains (e.g. signal, create,..) All acccess is denied unless explicitly allowed
10 Role Based Access Control (RBAC) model Associates the permissions to the roles, not directly to the users Each user (or subject) is associated with one or more roles Each role contains the permissions that are needed for its correct operation 4 classes of RBAC models (core, hierarchical, constrained, unified)
11 Multilevel Security (MLS) model Based on the Bell La Padula (BLP) Multi level subject its low level differs from its high level, it is trusted to handle data at any level in its range while maintaing proper separation among the different levels Multi level object used for the private state of multilevel subjects and for data sharing between multi level subjects Does not care about integrity of data, least privilege, or separating processes and objects by their duty, and has no mechanisms for controlling these security needs
12 Bell La Padula (confidentiality model) 1. The * property (read star property) states that a subject at a given security level must not write to any object at a lower security level (no writedown). 2. The Simple Security Property states that a subject at a given security level may not read an object at a higher security level (no read up). 3. The Discretionary Security Property uses an access matrix to specify the discretionary access control
13 Flask architecture Provides flexible support for MAC control policies Separates the definition of the policy logic from the enforcement mechanism Provides an access vector cache (AVC) that stores the access decision computations provided by the security server Focuses on the concept of least privilege Specifies the interfaces provided by the security server to the object manager that enforce the security policy (DTE, RBAC, MLS)
14 Flask architecture
15 SELinux, implemented Flask LSM module, using the LSM hooks in the kernel to control and label (Because of the abstraction layer provided SELinux is highly configurable and modifiable) Differences in the specific way SELinux implements Flask in the Linux kernel compared to traditional Flask: Under traditional TE, there is a distinction between types and domains. In SELinux, domains are processes that have the attribute process The security server, the AVC, and the policy engine are now all parts of the kernel.
16 What is policy? A set of rules that guide the SELinux security engine Defines types for file objects and domains for processes, uses roles to limit the domains that can be entered, and has user identities to specify the roles that can be attained,...
17 Where is policy? /etc/selinux/<policyname>/policy/ the binary policy and runtime configuration files /etc/selinux/<policyname>/src/policy/ policy sources /etc/selinux/<policyname>/contexts/ location of the security context information /etc/selinux/<policyname>/modules/booleans.active The configuration file /etc/selinux/config EXERCISE: Explore policy files
18 File System Security Contexts SELinux stores file security labels in xattrs Label every file system object (all files) with an individual security attribute Mount support: mount t nfs o context=user_u:object_r:user_home_t <hostname>:/shares/homes/ /home/ fscontext= sets the overarching file system label to a specific security context defcontext= overrides the value set for unlabeled files in the policy and requires a file system that supports xattr labeling
19 EXERCISE id Z root:system_r:unconfined_t ls dz /tmp drwxrwxrwt root root system_u:object_r:tmp_t touch /tmp/foo ls Z /tmp/foo rw r r root root root:object_r:tmp_t /tmp/ /tmp/foo
20 Object Classes SELinux defines a number of classes for objects in order to group certain permissions by specific classes (e.g.filesystem for file systems, file for files, and dir for directories). Each class has it's own associated set of permissions (filesystem: mount, unmount, get attributes, set quotas, relabel,.., file:read, write, get and set attributes, lock, relabel, link,rename, append,.. netif: tcp_recv, tcp_send, udp_send, udp_recv, rawip_recv, rawip_send)
21 Permissions Permissions are the actions that a subject can take on an object, if the policy allows it. These permissions are the access requests that SELinux actively allows or denies There are several common sets of permissions defined in the targeted policy, in $SELINUX_SRC/flask/access_vectors (EXERCISE)
22 TE Rules Attributes Identify as groups sets of security types that have a similar property (e.g. httpdcontent, file_type, netif_type, port_type, and node_type, fs_type, exec_type, mta_delivery_agent, domain, reserved_port_type) a type can have any amount of attributes, and an attribute can be associated with any number of types. attribute domain; attribute netmsg_type;
23 TE Rules Type Declaration Syntax: type <typename> [aliases] [attributes]; ## Examples type httpd_config_t, file_type, sysadmfile; type http_port_t, port_type, reserved_port_type; type httpd_php_exec_t, file_type, sysadmfile, exec_type;
24 TE Rules Type Transitions results in a new process running in a new domain different from the executing process, or a new object being labeled with a type different from the source doing the labeling ## General syntax of a transition> type_transition <source_type(s)> <target_type(s)> : <class(es)> <new_type>
25 TE Rules Domain Type Transition ## Domain transition syntax: type_transition <current_domain> <type_of_program> : process <new_domain> type_transition httpd_t httpd_sys_script_exec_t:process httpd_sys_script_t; type_transition initrc_t squid_exec_t:process squid_t; Macro: domain_auto_trans(initrc_t, named_exec_t, named_t)
26 TE Rules Object Labeling Transition ## New object labeling syntax: type_transition <creating_domain> <parent_object_type> :<class(es)> <new_type> type_transition named_t var_run_t:sock_file named_var_run_t; file_type_auto_trans(named_t, var_run_t, named_var_run_t, sock_file);
27 TE Rules Access Vectors rules that allow domains to access various system objects <av_kind> <source_type(s)> <target_type(s)>:<class(es)> <permission(s)> allow named_t sbin_t:dir search; auditallow unconfined_t security_t : security { load_policy setenforce setbool }; dontaudit named_t root_t:file { getattr read };
28 TE Rules neverallow neverallow <source_name(s)> <target_name(s)> : <class(es)><permission(s)> neverallow domain ~domain:process transition; These assertions are checked by the policy compiler, checkpolicy, when the policy is built, but after the entire policy has been evaluated, and are not part of the runtime access vector cache.
29 Understanding AVC Disallow an operation > denial message is generated: Jan 14 19:10:04 hostname kernel: audit( :420): avc: denied { getattr } for pid=5962 exe=/usr/sbin/httpd path=/home/auser/public_html dev=hdb2 ino= scontext=root:system_r:httpd_t tcontext=user_u:object_r:user_home_t tclass=dir
30 Understanding SELinux log messages AVC Messages can get created for a variety of reasons: A mislabeled file A process running under the wrong context A bug in policy Basically an application goes down a code path that was never tested by the policy writer and gets an unexpected AVC An intruder
31 audit2allow and audit2why (EXERCISE) audit2allow generate SELinux policy allow rules from logs of denied operations audit2allow a l o domains/misc/local.te audit2allow a l M domains/misc/local audit2why translates SELinux audit messages into a description of why the access was denied
32 SELinux Troubleshoot Tool (EXERCISE) setroubleshoot service listens to audit daemon for AVC messages, then processes plugin database for known issues /usr/share/setroubleshoot/plugins Displays knowledge base of how to handle avc message sealert command can launch browser or analyze log files Can be configured to send mails /etc/setroubleshoot/setroubleshoot.cfg
33 Auditing Audit system receives SELinux Events No auditd running > AVC in /var/log/messages and dmesg auditd running > AVCs in/var/log/audit/audit.log CAPP Controlled Access Protection Profile EAL4+. E Assurance Level (Level of testing and documentation) cp /usr/share/doc/audit /capp.rules /etc/audit.rules
34 Auditing tools auditctl (Utility to control the kernel s audit system) e [0 1] Disable, Enable audit aureport (Generate summary reports of audit logs): a Report about AVC messages i interpret numeric fields for human consumption ts Time Start te Time End aureport a ts 1:00:00 summary (Totals of events)
35 Audit searching ausearch (Search Audit Daemon Logs): m avc ts x executable ausearch m avc ts 1:00:00 x named EXERCISE: explore aureport and ausearch
36 Enable Kernel Auditing Sometimes applications fail with no AVC messages (dont audit rules sometimes cover up Real errors) Append the parameter audit=1 to your kernel boot line RHEL 4: Install selinux policy targeted sources make C /etc/selinux/targeted/src/policy enableaudit load RHEL 5: semodule b /usr/share/selinux/targeted/enableaudit.pp semodule b /usr/share/selinux/targeted/base.pp
37 Policy Macros SELinux uses m4 macro language policy.conf contains exploded macro policy codeadmfile; # can_exec(domain,executable) define(`can_exec',`allow $1 $2:file { rx_file_perms execute_no_trans };' ) define(`rx_file_perms', `{ read getattr lock execute ioctl }')
38 EXERCISE: Backtracking Rule Find how these rules are derived from a macro: allow httpd_t httpd_suexec_t:process transition; allow httpd_t httpd_suexec_exec_t:file {getattr, read, execute }; type_transition httpd_t httpd_suexec_exec_t:process httpd_suexec_t;
39 Solution apache.te: domain_auto_trans(httpd_t, httpd_suexec_exec_t, httpd_suexec_t); domain.if: template(`domain_auto_trans',` domain_trans($1,$2,$3) type_transition $1 $2:process $3; ') domain.if: template(`domain_trans',` allow $1 $2:file { getattr read execute }; allow $1 $3:process transition; dontaudit $1 $3:process {noatsecure siginh rlimitinh }; ')
40 SELinux Users Different than UNIX identities Not currently used in targeted policy: In the targeted policy, processes and objects are system_u, and the default for Linux users is user_u Linux UIDs and SELinux user identities should match because login and similar applications will try to look up the match. If it fails to find a match, it will fall back to user_u
41 SELinux Roles Define which SELinux user identities can have access to what domains (but simply being in a role is not enough to allow domain transition) role <rolename> types <domain(s)>; role sysadm_r types ldconfig_t; allow user_r sysadm_r; role_transition sysadm_r $1_exec_t system_r; (rarely used, only in strict policy) Used in strict and MLS policy
42 SELinux MLS user_u:user_r:user_t:s0 Often hidden in targeted and strict (MCS) Identifies one level or range single level: s0 range: so s15:c0.c1023 s15:c0.c1023 > SystemHigh
43 TE Rules Constraints Provide final and overarching constraints on the use of permissions that are enforced during runtime by the kernel security server Are in the form of Boolean expressions. The expression must be satisfied for the given permission to be granted. constrain process transition ( u1 == u2 or t1 == privuser ); constrain process transition ( r1 == r2 or t1 == privrole );
44 Special interfaces & Filesystems /proc/<pid>/attr current current security context. prev the context prior to the last exec exec the context to apply at the next exec fscreate the context to apply to any new files created by this process. EXERCISE: Explore /proc, /selinux
45 Types of policies Strict every subject and object are in a specific security domain, with all interactions and transitions individually considered within the policy rules Targeted every subject and object runs in the unconfined_t domain except for the specific targeted daemons. The objects on the system that are in the unconfined_t domain are allowed by SELinux to have no restriction
46 Strict Policy A system where everything is denied by default SELinux designed to be a strict policy. The policy rules only have allows, no denies Minimal privilege's for every daemon Separate user domains for programs like GPG,X, ssh, etc Difficult to enforce in general purpose operating system Not Supported in RHEL
47 Targeted Policy System where processes by default are unconfined only targeted processes are confined By default user processes run in unconfined domains (unconfined_t) System processes run in initrc_t Unconfined processes have the same access they would have without SELinux running Daemons with defined policy transition to confined domains
48 Targeted Domains In RHEL4: 15 targets defined (httpd, squid, pegasus, Mailman, named, dhcpd, mysqld, nscd, ntpd, portmap, postgresql, snmpd, syslogd, winbindd) In RHEL5: 200 targets defined (every program shipped by Red Hat and started on boot should have a domain defined) All system space is confined Limited confinement for user space (20 unconfined domains)
49 MLS Policy Strict policy with Bell LaPadula Support Supported in RHEL 5 with special license. Server only operating system No X windows support Limited package set HP/IBM working towards getting EAL4+/LSPP certification
50 Booleans in SELinux Policy (EXERCISE) /selinux/booleans/ echo 1 1 > /selinux/booleans/... echo 1 > /selinux/commit_pending_bools setsebool [ P] boolean value bool1=val1 bool2=val2... getsebool [ a] boolean... /etc/selinux/targeted/modules/active/booleans.local
51 Files and Directories in Targeted policy (EXERCISE) /etc/selinux/targeted/contexts /etc/selinux/targeted/modules /etc/selinux/targeted/policy /usr/src/redhat/sources/serefpolicy X.X.X/policy/
52 Understanding the File Contexts Files # Syntax of file context description regexp < type> ( <file_label> <<none>> ) Type d means to match only directories, the means to match only files /usr(/.*)?/java/.*\.so(\.[^/]*)* system_u:object_r:shlib_t ifdef(`dhcp_defined', `', ` /var/lib/dhcp(3)? d system_u:object_r:dhcp_state_t define(`dhcp_defined') ')
53 Common SELinux macros (EXERCISE) init_daemon_domain, init_system_domain, domain_file, domain_entry_file can_exec corenet_tcp_sendrecv_all_if, corenet_udp_sendrecv_all_if, corenet_raw_sendrecv_all_if, corenet_tcp_sendrecv_all_node, corenet_udp_sendrecv_all_node, corenet_raw_sendrecv_all_node, corenet_tcp_connect_all_ports domain_auto_trans, domain_trans files_tmp_file, file_pid_file
54 Understanding Roles in Targeted policy system_r role is for all system processes except user processes user_r default user role for regular Linux users object_r all objects have the role object_r sysadm_r system administrator role in a strict policy
55 EXERCISE: Example policy: dhcpd dhcp.fc dhcp.if dhcp.te
56 Assigning Object Types Configuration file specifies default context Inherited from containing directory at runtime Applications can explicitly set context: chcon: utility to set contexts passwd: maintains context on /etc/shadow
57 Assigning Process Types (default) inherited from parent process [ bash (user_t) > ls (user_t) ] set by policy (type transition rule) [ init (init_t) > httpd_init_script (initrc_t) > httpd (httpd_t) ] set by application (e.g., login) [ login (login_t) > bash (user_t) ]
58 Kernel Boot Parameters Kernel parameters override /etc/selinux/config settings selinux=0 Boots the kernel with SELinux turned off (All files will no longer get created with file context) Enforcing=0 Boots the kernel in permissive mode (File labeling continues)
59 Booting SELinux I 1.The initial process is assigned the predefined initial SID kernel (before the policy is loaded) 2./sbin/init mounts /proc/, then looks for the selinuxfs 3.If init does not find SELinux in the kernel, finds it is disabled via the selinux=0 boot parameter, or if /etc/selinux/config specifies that SELINUX=disabled, boot proceeds with a non SELinux system 4.init sets the enforcing status if it is different from the setting in /etc/selinux/config (parameter enforcing is passed during boot)
60 Booting SELinux II 1. The kernel checks /selinux/policyvers for the supported policy version (/etc/selinux/config) 2. If the binary policy is not the version supported, init attempts to load the previous version policy 3. Init modifies the policy in memory based on the local booleans settings 4. Initial SIDs are mapped to security contexts in the policy 5. init then re executes itself so that it can transition to a different domain 6. At this point, init continues with its normal boot.
61 Booting SELinux III
62 Copying and moving files (EXERCISE) mv the file retains its original label cp a plain copy creates the new file following the default behavior based on the domain of the creating process (cp) and the type of the target directory cp Z user:role:type The new file is relabeled as it is created based on the command line option. Z ( context)
63 Check the Security Context of a Process, User, or Object (EXERCISE) ps Z, ps auxz Id Z ls laz lsof Z netstat Z find / context= What is a security context of /etc/shadow, udevd?
64 Relabeling a File or Directory's Security Context (EXERCISE) chcon (fundamental utility used to change a files context) restorecon tar selinux star xattr H=exustar c f rsync X xattr
65 Other SELinux modified/aware binaries install, sshd, login, xdm, passwd, useradd, groupadd, rpm libselinux is the default SELinux library used by SELinux aware applications
66 Policycoreutils genhomedircon, fixfiles, restorecon, restorecond, setfiles, chcon, chcat audit2allow, audit2why (See Understanding SELinux log messages) secon, sestatus semodule, semodule_deps, semodule_expand, semodule_link, semodule_package load_policy run_init (only in MLS, strict) semanage, system config selinux setsebool, getsebool newrole (only in MLS, strict)
67 View the Status of SELinux (EXERCISE) /usr/bin/sestatus [ v]
68 Managing File Labeling restorecon (Used to set a file back to the system default policy) setfiles (Used to initialize a system. Used at the File system level. Require to specify file_context file) fixfiles (Script that wraps setfiles/restorecon with several useful features) genhomedircon (Used to generate file_contexts.homedir)
69 Relabeling a file system (EXERCISE) 1.touch /.autorelabel; reboot (recommended) 2.fixfiles relabel or fixfiles R packagename restore 3.cd $SELINUX_SRC; make relabeli
70 Enable or Disable Enforcement (EXERCISE) setenforce [ 0 1] getenforce getsebool named_disable_trans setsebool named_disable_trans 1 setsebool httpd_enable_homedirs 1 /etc/selinux/config selinuxenabled (for scripts) matchpathcon
71 Run a Command in a Specified Security Context runcon t httpd_t ~/bin/contexttest ARG1 ARG2 runcon user_u:system_r:httpd_t ~/bin/contexttest
72 View SELinux statistics (EXERCISE) avcstat [time] seinfo [ c NAME], [ t NAME], [ a NAME], [ r NAME], [ u NAME], [ b NAME], [ S NAME], [ C NAME], [ f TYPE], [ g TYPE], [ n NAME], [ o ADDR], [ p NUM], [ i NAME], [ s]
73 Performance Tuning cat /selinux/avc/hash_stats If your hash chains are growing to be larger than 10, there may be a performance impact. You can consider reducing the size of the cache. echo XXX > /selinux/avc/cache_threshold
74 SELinux policy query tool (EXERCISE) sesearch a t httpd_sys_content_t $SELINUX_POLICY/policy.conf s, source <NAME> t, target <NAME> c, class <NAME> p, perms <P1[,P2...]> allow Search for only allow rules. neverallow Search for only neverallow rules. audit Search for only dontaudit and auditallow rules. type Search for only type transition (type_trans) and type change (type_change) i, indirect Do an indirect search, which looks for rules deriving from a type's attribute.
75 SELinux Administrator GUI (EXERCISE) system config selinux semanage GUI frontend
76 SELinux Modules In RHEL 5 /Fedora Core 5 and later, the concept of Policy Modules was introduced The semodule command: Copies the policy package (pp) files to /etc/selinux/targeted/modules/active/modules Compiles all installed pp files into new policy file /etc/selinux/targeted/policy/policy.21 Creates new file_context file and file_context.homedirs Loads new policy
77 SELinux Modules (EXERCISE) semodule l ; List all modules currently loaded semodule b /usr/share/selinux/targeted/enableaudit.pp semodule b /usr/share/selinux/targeted/base.pp semodule i myapache.pp semodule r myapache
78 Generating Policy Modules Policy modules consists of three files: Type Enforcement File (te) (Contains the allow rules and interface calls associated with the confined domain) File Context File (fc) (Contains all of the labeling file context for the policy module) Interface File (if) (Contains all interfaces used by other domains to interact with this confined domain)
79 semanage framework Allowing Apache to listen on port 81: In RHEL4: required custom policy, policy sources and tools In RHEL5: semanage port a t http_port_t P tcp 81 Other use: semanage user a guest_u semanage fcontext a t httpd_bugzilla_script_exec_t /usr/share/bugzilla/cgi(/.*)?
80 Writing New Policy for a Daemon (EXERCISE) policygentool mydaemon /usr/sbin/mydaemon make f /usr/share/selinux/devel/makefile semodule i mydaemon.pp restorecon v /usr/sbin/mydaemon setenforce 0 service mydaemon restart audit2allow R f /var/log/audit/audit.log
81 References LaPadula_model hysteria
82 Thank you for listening! Ing. Pavol Lupták, CISSP, CEH
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction
Linux Security on HP Servers: Security Enhanced Linux Technical introduction This white paper -- one in a series of Linux security white papers -- discusses Security Enhanced Linux (SELinux), a mandatory
RHS429 - Red Hat Enterprise SELinux Policy Administration
RHS429 - Red Hat Enterprise SELinux Policy Administration Duration/Training Format /Global 04 Days (32 Hrs.) Instructor-Led Training Course Summary RHS429 introduces advanced system administrators, security
SELinux. Security Enhanced Linux
SELinux Security Enhanced Linux Introduction and brief overview. Copyright 2005 by Paweł J. Sawicki http://www.pawel-sawicki.com/ Agenda DAC Discretionary Access Control ACL Access Control Lists MAC Mandatory
Security Enhanced Linux and the Path Forward
Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary
Linux OS-Level Security Nikitas Angelinas MSST 2015
Linux OS-Level Security Nikitas Angelinas MSST 2015 Agenda SELinux SELinux issues Audit subsystem Audit issues Further OS hardening 2 SELinux Security-Enhanced Linux Is NOT a Linux distribution A kernel
Confining the Apache Web Server with Security-Enhanced Linux
Confining the Apache Web Server with Security-Enhanced Linux Michelle J. Gosselin, Jennifer Schommer [email protected], [email protected] Keywords: Operating System Security, Web Server Security, Access
Fedora 13 Managing Confined Services. Scott Radvan
Fedora 13 Managing Confined Services Scott Radvan Managing Confined Services Fedora 13 Managing Confined Services Author Scott Radvan [email protected] Copyright 2010 Red Hat, Inc. The text of and illustrations
Secure computing: SELinux
Secure computing: SELinux Michael Wikberg Helsinki University of Technology [email protected] Abstract Using mandatory access control greatly increases the security of an operating system. SELinux,
Networking in NSA Security-Enhanced Linux
Networking in NSA Security-Enhanced Linux James Morris Abstract Break through the complexity of SE Linux with a working example that shows how to add SE Linux protection to a simple network server. This
Trusted RUBIX TM. Version 6. Installation and Quick Start Guide Red Hat Enterprise Linux 6 SELinux Platform. Revision 6
Trusted RUBIX TM Version 6 Installation and Quick Start Guide Red Hat Enterprise Linux 6 SELinux Platform Revision 6 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr
SELinux & AppArmor - Comparison of Secure OSes
SELinux & AppArmor - Comparison of Secure OSes Apr 18 2007 Yuichi Nakamura Research and Development Department Hitachi Software Engineering Co., Ltd. [email protected] Contents 0. Background 1. Introduction
SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0))
SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0)) Yuichi Nakamura July 3, 2006 Contents 1 What is RBAC 2 1.1 Overview............................... 2 1.2 How RBAC works in SELinux....................
Using an Open Source Framework to Catch the Bad Guy. Norman Mark St. Laurent Senior Solutions Architect, Red Hat 06.28.12
Using an Open Source Framework to Catch the Bad Guy Norman Mark St. Laurent Senior Solutions Architect, Red Hat 06.28.12 Agenda Audit Log Management Infrastructure Establishing Policies and Procedures
The Case for SE Android. Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency
The Case for SE Android Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency 1 Android: What is it? Linux-based software stack for mobile devices. Very divergent from typical
Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.
Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
Mandatory Access Control in Linux
Mandatory Access Control in Linux CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ In the early 2000s Root and administrator Many
Incremental Backup Script. Jason Healy, Director of Networks and Systems
Incremental Backup Script Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Incremental Backup Script 5 1.1 Introduction.............................. 5 1.2 Design Issues.............................
Mandatory Access Control
CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism
NSA Security-Enhanced Linux (SELinux)
NSA Security-Enhanced Linux (SELinux) http://www.nsa.gov/selinux Stephen Smalley [email protected] Information Assurance Research Group National Security Agency Information Assurance Research Group 1
Getting Started with the Linux Intrusion Detection
1 of 7 6/18/2006 9:07 PM Getting Started with the Linux Intrusion Detection System Irfan Habib Abstract Sometimes file permissions aren't enough. LIDS gives you kernel-level access control that goes beyond
NATIONAL POPULATION REGISTER (NPR)
NATIONAL POPULATION REGISTER (NPR) Project Name: NPR Version No: 1.0.0 Release Date: Group Name: NPR-ECIL Version Date: LINUX SERVER INSTALLATION AND CONFIGURATION FOR JAVA BASED NPR DATAENTRY SOFTWARE
Security Enhanced (SE) Android: Bringing Flexible MAC to Android
Security Enhanced (SE) Android: Bringing Flexible MAC to Android Stephen Smalley and Robert Craig Trusted Systems Research National Security Agency {sds,rpcraig}@tycho.nsa.gov Abstract The Android software
What is included in the ATRC server support
Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
GL550 - Enterprise Linux Security Administration
GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
Role-Based Access Control (RBAC)
CIS/CSE 785: Computer Security (Syracuse University) RBAC: 1 1 Motivation Role-Based Access Control (RBAC) With many capabilities and privileges in a system, it is difficult to manage them, such as assigning
The Linux Audit Subsystem Deep Dive. SHARE Denver Colorado Convention Center, Korbel 4b 24-Aug 2009 1100-Noon
The Linux Audit Subsystem Deep Dive SHARE Denver Colorado Convention Center, Korbel 4b 24-Aug 2009 1100-Noon Shawn Wells Red Hat, Inc Session Themes Why is Linux Auditing needed? What
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
Object Classes and Permissions
Object Classes and Permissions Security Policy Development Primer for Security Enhanced Linux (Module 5) 2 SE Linux Policy Structure Top-level sections of policy.conf: Flask definitions object classes,
Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting
Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,
Migrating LAMP stack from x86 to Power using the Server Consolidation Tool
Migrating LAMP stack from x86 to Power using the Server Consolidation Tool Naveen N. Rao Lucio J.H. Correia IBM Linux Technology Center November 2014 Version 3.0 1 of 24 Table of Contents 1.Introduction...3
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet
RHCSA 7RHCE Red Haf Linux Certification Practice
RHCSA 7RHCE Red Haf Linux Certification Practice Exams with Virtual Machines (Exams EX200 & EX300) "IcGraw-Hill is an independent entity from Red Hat, Inc., and is not affiliated with Red Hat, Inc. in
Windows and Linux Security Audit
Journal of Applied Business Information Systems, 3(4), 2012 117 Journal of Applied Business Information Systems http://www.jabis.ro Windows and Linux Security Audit Sergiu Miclea* * Master Student at Master
GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days
GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Network Infrastructure Security Recommendations
Hardening Red Hat Enterprise Linux Ensure that file systems with user-writeable directories (ie /home, /tmp, /var/tem) are mounted on separate partitions. Ensure updates are applied as soon as they become
What s New in Centrify Server Suite 2014
CENTRIFY SERVER SUITE 2014 WHAT S NEW What s New in Centrify Server Suite 2014 The new Centrify Server Suite 2014 introduces major new features that simplify risk management and make regulatory compliance
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
Deploying IBM Lotus Domino on Red Hat Enterprise Linux 5. Version 1.0
Deploying IBM Lotus Domino on Red Hat Enterprise Linux 5 Version 1.0 November 2008 Deploying IBM Lotus Domino on Red Hat Enterprise Linux 5 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754
Administrative Role-Based Access Control on Top of Security Enhanced Linux
Administrative Role-Based Access Control on Top of Security Enhanced Linux Ayla Solomon Submitted in Partial Fulfillment of the Prerequisite for Honors in Computer Science June 2009 Copyright Ayla Solomon,
Linux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Linux Audit Quick Start SUSE Linux Enterprise 10 SP1
Linux Audit Quick Start SUSE Linux Enterprise 10 SP1 NOVELL QUICK START CARD Linux audit allows you to comprehensively log and track any access to files, directories, or resources of your system and trace
Database Security Part 7
Database Security Part 7 Discretionary Access Control vs Mandatory Access Control Elisa Bertino [email protected] Discretionary Access Control (DAC) No precise definition Widely used in modern operating
GroundWork Monitor Open Source 5.1.0 Installation Guide
GroundWork Monitor Open Source 5.1 is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version
Safety measures in Linux
S a f e t y m e a s u r e s i n L i n u x Safety measures in Linux Krzysztof Lichota [email protected] A g e n d a Standard Unix security measures: permissions, capabilities, ACLs, chroot Linux kernel
Automatic updates for Websense data endpoints
Automatic updates for Websense data endpoints Topic 41102 / Updated: 25-Feb-2014 Applies To: Websense Data Security v7.6, v7.7.x, and v7.8 Endpoint auto-update is a feature that lets a network server push
LSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
Configuring Remote HANA System Connection for SAP Cloud for Analytics via Apache HTTP Server as Reverse Proxy
Configuring Remote HANA System Connection for SAP Cloud for Analytics via Apache HTTP Server as Reverse Proxy Author: Gopal Baddela, Senior BI Architect Archius Copyright Archius 2016 1 Table of Contents
IT6204 Systems & Network Administration. (Optional)
Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION COURSE DESCRIPTION: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques
Red Hat JBoss Core Services Apache HTTP Server 2.4 Apache HTTP Server Installation Guide
Red Hat JBoss Core Services Apache HTTP Server 2.4 Apache HTTP Server Installation Guide For use with Red Hat JBoss middleware products. Red Hat Customer Content Services Red Hat JBoss Core Services Apache
ENTERPRISE LINUX SYSTEM ADMINISTRATION
ENTERPRISE LINUX SYSTEM ADMINISTRATION The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation
Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
Intrusion Detection using the Linux Audit Framework. Stephen Quinney <[email protected]> School of Informatics University of Edinburgh
Intrusion Detection using the Linux Audit Framework Stephen Quinney School of Informatics University of Edinburgh the only secure computer is one that s unplugged... Two Distinct
Using OpenEMM as a frontend to traditional mailing lists Jim Dutton 03/2013, 04/12/2013, 04/29/2013, 06/07/2013
The intended, or traditional, use of OpenEMM is as a closed system providing T+C +(SS)U functionality. It is also possible to use OpenEMM as a T+C system that can act as a frontend to traditional/existing
Syslog & xinetd. Stephen Pilon
Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and
Access Control Lists in Linux & Windows
Access Control Lists in Linux & Windows Vasudevan Nagendra & Yaohui Chen Categorization: Access Control Mechanisms Discretionary Access Control (DAC): Owner of object specifies who can access object (files/directories)
Installing the SSL Client for Linux
Linux Install Installing the SSL Client for Linux SSLLinux201502-01 Global Technology Associates 3361 Rouse Road, Suite 240 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected]
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
Red Hat Enterprise Linux 7 Virtualization Security Guide
Red Hat Enterprise Linux 7 Virtualization Security Guide Securing your virtual environment Scott Radvan Tahlia Richardson Thanks go to the following people for enabling the creation of this guide: Paul
CIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 3 1/18/07 CIS/TCOM 551 1 Announcements Email project groups to Jeff (vaughan2 AT seas.upenn.edu) by Jan. 25 Start your projects early!
How To Write Security Enhanced Linux On Embedded Systems (Es) On A Microsoft Linux 2.2.2 (Amd64) (Amd32) (A Microsoft Microsoft 2.3.2) (For Microsoft) (Or
Security Enhanced Linux on Embedded Systems: a Hardware-accelerated Implementation Leandro Fiorin, Alberto Ferrante Konstantinos Padarnitsas, Francesco Regazzoni University of Lugano Lugano, Switzerland
Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH
Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Tutorial Amon Ott Contents: 1 Motivation: Why We Need Better Security in the Linux Kernel 2 Overview of RSBAC 3 How
Recommended File System Ownership and Privileges
FOR MAGENTO COMMUNITY EDITION Whenever a patch is released to fix an issue in the code, a notice is sent directly to your Admin Inbox. If the update is security related, the incoming message is colorcoded
Implementing a Weblogic Architecture with High Availability
Implementing a Weblogic Architecture with High Availability Contents 1. Introduction... 3 2. Topology... 3 2.1. Limitations... 3 2.2. Servers diagram... 4 2.3. Weblogic diagram... 4 3. Components... 6
Setting-Up an Open-Source Backup Software Amanda Community in About 15 Minutes
Setting-Up an Open-Source Backup Software Amanda Community in About 5 Minutes Abstract Amanda is the most popular open source backup and recovery software in the world because of its openness, robustness,
GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days
GL-250: Red Hat Linux Systems Administration Course Length: 5 days Course Description: The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course
FreeIPA - Open Source Identity Management in Linux
FreeIPA - Open Source Identity Management in Linux Martin Košek Supervisor, Software Engineering, Red Hat ORS 2013, Karviná 1 Identity Management What is identity management? Identity
CIS433/533 - Computer and Network Security Operating System Security
CIS433/533 - Computer and Network Security Operating System Security Professor Kevin Butler Winter 2010 Computer and Information Science OS Security An secure OS should provide (at least) the following
Table of Contents. Introduction. Audience. At Course Completion. Prerequisites
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This in-depth, 5-day course helps students acquire
Parallels Virtuozzo Containers 4.7 for Linux
Parallels Virtuozzo Containers 4.7 for Linux Deploying Clusters in Parallels-Based Systems Copyright 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. Parallels Holdings, Ltd.
http://cnmonitor.sourceforge.net CN=Monitor Installation and Configuration v2.0
1 Installation and Configuration v2.0 2 Installation...3 Prerequisites...3 RPM Installation...3 Manual *nix Installation...4 Setup monitoring...5 Upgrade...6 Backup configuration files...6 Disable Monitoring
Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)
Red Hat Certifications: Red Hat Certified System Administrator (RHCSA) Overview Red Hat is pleased to announce a new addition to its line of performance-based certifications Red Hat Certified System Administrator
Partitioning. Files on the Hard Drive. Administration of Operating Systems DO2003. Partition = Binder with index. Write file = Insert document
Administration of Operating Systems DO2003 Mounting the file structure Devices Wecksten, Mattias 2008 Partitioning Wecksten, Mattias 2008 Files on the Hard Drive Partition = Binder with index Write file
Setting Up a CLucene and PostgreSQL Federation
Federated Desktop and File Server Search with libferris Ben Martin Abstract How to federate CLucene personal document indexes with PostgreSQL/TSearch2. The libferris project has two major goals: mounting
A Survey of Access Control Policies
A Survey of Access Control Policies Amanda Crowell University of Maryland [email protected] ABSTRACT Modern operating systems each have different implementations of access controls and use different
Fermilab Central Web Service Site Owner User Manual. DocDB: CS-doc-5372
Fermilab Central Web Service Site Owner User Manual DocDB: CS-doc-5372 1 Table of Contents DocDB: CS-doc-5372... 1 1. Role Definitions... 3 2. Site Owner Responsibilities... 3 3. Tier1 websites and Tier2
RedHat (RHEL) System Administration Course Summary
Contact Us: (616) 875-4060 RedHat (RHEL) System Administration Course Summary Length: 5 Days Prerequisite: RedHat fundamentals course Recommendation Statement: Students should have some experience with
2. Boot using the Debian Net Install cd and when prompted to continue type "linux26", this will load the 2.6 kernel
These are the steps to build a hylafax server. 1. Build up your server hardware, preferably with RAID 5 (3 drives) plus 1 hotspare. Use a 3ware raid card, 8000 series is a good choice. Use an external
BF2CC Daemon Linux Installation Guide
BF2CC Daemon Linux Installation Guide Battlefield 2 + BF2CC Installation Guide (Linux) 1 Table of contents 1. Introduction... 3 2. Opening ports in your firewall... 4 3. Creating a new user account...
How To Harden An Hp Server For A Long Time
Linux Security on HP Servers: General Security Topics Technical introduction This white paper discusses general security technologies available in Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise
OS Installation: CentOS 5.8
OS Installation: CentOS 5.8 OpenTUSK Training University of Nairobi Mike Prentice [email protected] Tufts University Technology for Learning in the Health Sciences July 2013 Outline 1 OS Install
Top Secret KVM, Lessons Learned from an ICD 503 Deployment
Top Secret KVM, Lessons Learned from an ICD 503 Deployment Frank Caviggia July 30, 2014 Defense in Depth 2014 1 Overview System Configuration - Hardware - Software Security Controls - Security Concepts
Native Host Intrusion Detection with RHEL6 and the Audit Subsystem. Steve Grubb Red Hat
Native Host Intrusion Detection with RHEL6 and the Audit Subsystem Steve Grubb Red Hat Introduction How the audit system works How we can layer an IDS/IPS system on top of it Introduction Designed to meet
Sophos Anti-Virus for Linux user manual
Sophos Anti-Virus for Linux user manual Product version: 7 Document date: January 2011 Contents 1 About this manual...3 2 About Sophos Anti-Virus for Linux...4 3 On-access scanning...7 4 On-demand scanning...10
