LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-22-2012, 04:37 PM   #1
metalaarif
Member
 
Registered: Oct 2011
Location: Nepal
Distribution: RHEL, CentOS, Slackware
Posts: 131
Blog Entries: 1

Rep: Reputation: 3
Testing SELinux


Hello guys, I have been doing some reading about SELinux.

I am trying to compare normal Linux which are based on Discretionary access control (DAC) and SELinux Implemented Linux OS based on Mandatory Access Control (MAC).

I did some reading and have understood about it. The part where I am having difficult to understand is about
HOW do I TEST them to show that there is difference between MAC and DAC.

I know this might sound stupid but I have just began my SELinux therefore, suggestion would be helpful. I want to try myself and see the difference between normal and selinux implemented linux OS.

It is because I want to harden my Linux and increase security.
 
Old 04-22-2012, 09:09 PM   #2
John VV
LQ Muse
 
Registered: Aug 2005
Location: A2 area Mi.
Posts: 17,624

Rep: Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651
fedora and CentOS both use SELinux
Ubuntu and OpenSUSE ( like i am now using) use apt-guard

se is built into the core of the os
apt guard is a layer of the onion


as to testing ?

do you have ( or are working on ) a masters in CS and networking

but fedora with the default settings and SE set to enforcing is very secure

but nothing ( not even the NSA or CIA) can withstand a determined and experienced "system cracker"

you might want to do a bit of reading
http://www.darkreading.com/
http://www.ethicalhacker.net/
 
Old 04-23-2012, 11:15 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by John VV View Post
Ubuntu and OpenSUSE ( like i am now using) use apt-guard
I thought OpenSuSE used AppArmor? Never heard of "apt-guard". Got an URI?


Quote:
Originally Posted by John VV View Post
as to testing ?
do you have ( or are working on ) a masters in CS and networking
Sure one should have an understanding of what one runs but one doesn't need a Masters in CS to practically test a Mandatory Access Control implementation:


Quote:
Originally Posted by metalaarif View Post
The part where I am having difficult to understand is about HOW do I TEST them to show that there is difference between MAC and DAC.
MAC runs on top of DAC and DAC only deals with "simple" access permissions. MAC tries to improve on that and include domains DAC can't handle. Some easy examples:
- Install Bitdefender for Linux. Running 'bdscan' on any target should fail because the application requires an executable heap (also see this).
- Install Firefox-3.x or Google Earth or Zend. Trying to run should fail because the one or more libraries needs to have the "textrel_shlib_t" type set first.
- Install Apache. Configure it to listen on an additional port with 'echo Listen 888' >> /etc/httpd/conf/httpd.conf. Start Apache. It should fail because there is no port assignment for port TCP/888 ('seinfo -p888').
 
1 members found this post helpful.
Old 04-23-2012, 09:13 PM   #4
chrism01
LQ Guru
 
Registered: Aug 2004
Location: Sydney
Distribution: Rocky 9.2
Posts: 18,358

Rep: Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751
You may find this useful http://www.linuxtopia.org/online_boo...ion/index.html
Chap 43 goes into the theory, Chap 44 shows you how to set/test it
 
1 members found this post helpful.
Old 04-25-2012, 05:51 PM   #5
metalaarif
Member
 
Registered: Oct 2011
Location: Nepal
Distribution: RHEL, CentOS, Slackware
Posts: 131

Original Poster
Blog Entries: 1

Rep: Reputation: 3
Cheers Unspawn and Chrism01, this is what i really wanted, thanks to you guys,
lemme just do a quick review and i will mark this as a solved post.
 
Old 04-26-2012, 01:44 PM   #6
metalaarif
Member
 
Registered: Oct 2011
Location: Nepal
Distribution: RHEL, CentOS, Slackware
Posts: 131

Original Poster
Blog Entries: 1

Rep: Reputation: 3
Thanks a lot unSpawn and chrism01.

You saved my life.
Thanks..Now I'm really happy.
 
Old 04-26-2012, 03:43 PM   #7
salasi
Senior Member
 
Registered: Jul 2007
Location: Directly above centre of the earth, UK
Distribution: SuSE, plus some hopping
Posts: 4,070

Rep: Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897
Quote:
Originally Posted by unSpawn View Post
I thought OpenSuSE used AppArmor? Never heard of "apt-guard". Got an URI?
Well, AppArmor is certainly the correct name. Now according to the security guide (which is fairly recent, just about coincident with the last oS release), AppArmor is your option under oS.

This wasn't, however, my understanding (which, as always, can be deeply flawed); I understood that when Novell stopped being the primary project sponsor behind AppArmor*, the choice between AppArmor and SELinux had become entirely a user choice. Looking at the Security Guide, however, there is no mention of SELinux and only AppArmor is described. This implies that AppArmor is the default, and while SE might be possible, it is not supported in the '...and here is the documentation...' sense of supported.

And, BTFW, where the previous 'Software Search' gave away the information as to whether the target package was an 'official' package or a 'personal project', the new version has been 'improved' to the point that I no longer know how to do this, so I can't comment on whether the SELinux packages have the same status (but without the same level of documentation, obviously) or not as the AppArmor packages. Progress! It isn't an unambiguous good, is it?

* I believe that Novell decided (or claimed, if you wish to spin it that way) that the 'heavy lifting' on AppArmor had been done, the sponsorship was no longer needed, and the project could be now allowed to roam free. I am massively unclear how this might play with any different set of priorities that Attachmate might now have, and I don't think that I care, although maybe I should.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Implementing SeLinux on Debian 5 (Lenny) -- can't install "selinux-basics" bashFUL Linux - Security 3 10-17-2011 01:16 AM
SELinux errors, SELinux and wine ziphem Linux - Security 10 01-27-2011 04:15 PM
Selinux-how do i find out what domains have permissions on what type?(selinux policy) vishyc88 Linux - Security 2 11-22-2010 04:27 AM
Replace 'etch' with 'testing' in /etc/apt/sources.list to track 'testing' branch? Akhran Debian 3 04-09-2007 10:45 AM
Setup as getting debian testing files from ftp - will it stay with testing BrianHenderson Debian 2 09-02-2004 06:06 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:06 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration