LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-06-2023, 08:22 PM   #1
watchintv
Member
 
Registered: Oct 2016
Posts: 57

Rep: Reputation: Disabled
How secure is Linux? Patching, static/dynamic analysis, etc...


Are patching services, or kernel developers, or pentesters reliably patching all bugs and vulnerabilities found with the current set of static and dynamic analysis tools that exist today? If they are not, then who is?

It seems like there should be someone or some entity that is capable of doing this.

Also, I know that not all bugs can be guaranteed to be found. I just thought using the tools available today that there would be someone or some website devoted to patching the kernel in this manner.

Does this all make sense or am I not looking at this problem correctly?
 
Old 03-06-2023, 10:11 PM   #2
chrism01
LQ Guru
 
Registered: Aug 2004
Location: Sydney
Distribution: Rocky 9.2
Posts: 18,362

Rep: Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751
For the kernel and associated sub-systems, you can start here : https://en.wikipedia.org/wiki/Linux_kernel_mailing_list.

For other services etc that run on Linux, google the home site of each one...
 
Old 03-07-2023, 03:19 AM   #3
rkelsen
Senior Member
 
Registered: Sep 2004
Distribution: slackware
Posts: 4,462
Blog Entries: 7

Rep: Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561
Quote:
Originally Posted by watchintv View Post
Does this all make sense or am I not looking at this problem correctly?
There are thousands (if not millions) of developers actively involved in Linux security on a daily basis.

Consider this: The same Operating System kernel powers >70% of the world's smart phones (Android uses the Linux kernel), and all of the top 500 super computers.

Sources:

https://gs.statcounter.com/os-market...bile/worldwide
https://www.stackscale.com/blog/most...mputers-linux/

That doesn't happen without security.
 
1 members found this post helpful.
Old 03-07-2023, 09:24 AM   #4
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,671
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945
There are, in fact, several "white hat" international security monitoring services, such as CERT, who make it their daily business to gather and immediately publicly disclose(!) known security vulnerabilities and to coordinate the process of developing responses to them.

The principle is that there can never be "security by obscurity." Quite the opposite.

Every major operating system, for every platform "from mainframe to mobile," is constantly involved in this process. You should always immediately install every "security update" just as soon as it is published, or simply arrange for your computer(s), and phone(s), to do so automatically. "Time is of the essence."

But also remember: "Security is a process." The fundamental nature of computers, borne by their sheer complexity, is that "there will always be another hole," and always another person looking for it – regardless of the color of his "hat." And also: "The greatest security vulnerability is always located between two ears."

Last edited by sundialsvcs; 03-07-2023 at 09:33 AM.
 
Old 03-07-2023, 10:20 AM   #5
jailbait
LQ Guru
 
Registered: Feb 2003
Location: Virginia, USA
Distribution: Debian 12
Posts: 8,340

Rep: Reputation: 550Reputation: 550Reputation: 550Reputation: 550Reputation: 550Reputation: 550
Quote:
Originally Posted by watchintv View Post
It seems like there should be someone or some entity that is capable of doing this.
The developer who wrote a piece of code can fix the bugs in his code in a fraction of the time and effort than some other competent developer who has never seen the code in question before.
 
Old 03-07-2023, 10:26 AM   #6
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,930

Rep: Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321Reputation: 7321
obviously there are errors, problems, security holes, lazy developers. So there will be always something to patch.
We always find and fix bugs and in the meantime we create new ones (and they are always different and probably harder to find).
 
Old 03-07-2023, 04:31 PM   #7
watchintv
Member
 
Registered: Oct 2016
Posts: 57

Original Poster
Rep: Reputation: Disabled
Thank you for the informatio. Very informative!

Who is winning, black hat or white hat -- in terms of finding vulnerabilities and exploiting?

If security is a process, is there no quick fix to prevent my system from getting hacked?

Must I hire a security consultant or is this something I can do on my own?

How is it that important organizations are preventing exploitation? Are they relying on this idea that security is a process and simply updating their OS when there is a new security update?

How does one bridge the gap between time of discovery of a vulnerabily and patching it?
 
Old 03-07-2023, 04:47 PM   #8
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,679

Rep: Reputation: 2713Reputation: 2713Reputation: 2713Reputation: 2713Reputation: 2713Reputation: 2713Reputation: 2713Reputation: 2713Reputation: 2713Reputation: 2713Reputation: 2713
Quote:
Originally Posted by watchintv View Post
Thank you for the informatio. Very informative!

Who is winning, black hat or white hat -- in terms of finding vulnerabilities and exploiting?

If security is a process, is there no quick fix to prevent my system from getting hacked?

Must I hire a security consultant or is this something I can do on my own?

How is it that important organizations are preventing exploitation? Are they relying on this idea that security is a process and simply updating their OS when there is a new security update?

How does one bridge the gap between time of discovery of a vulnerability and patching it?
It is smart to secure your network as well as you can and still be fully functional, IT is smart to secure your NODES on that network, because nothing (including security plans) can ever be perfect. IT is smart to set up intrusion and malware detection in case someone bypasses all of your security, because that can happen. After all that it is not that it is perfect and you are bulletproof, it is that now literally EVERYONE else looks like an easier target!

No operating system is perfectly secure that is still fully useful for most purposes. Linux is easier to secure than most, but it is an ongoing effort. As long as you have data worth protecting, you revisit threats, patches, network and host security, and evaluate vulnerabilities and risk regularly no matter WHAT OS you run.

Last edited by wpeckham; 03-07-2023 at 04:49 PM.
 
Old 03-07-2023, 05:08 PM   #9
rkelsen
Senior Member
 
Registered: Sep 2004
Distribution: slackware
Posts: 4,462
Blog Entries: 7

Rep: Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561
Quote:
Originally Posted by watchintv View Post
If security is a process, is there no quick fix to prevent my system from getting hacked?
It depends upon what your system is, what it does and what you want from it. Is it a web server? Is it an email server? Is it a desktop system? Do you want it to be accessible from the open internet? How do you intend to use the machine it will be installed on?

Without knowing more of these kinds of details, it is difficult to give you specific advice about locking it down.
Quote:
Originally Posted by watchintv View Post
How does one bridge the gap between time of discovery of a vulnerabily and patching it?
Keep your system updated. Most vulnerabilities in Linux and software that runs on it are patched quickly. Many of the things being patched these days would only make your system vulnerable within a narrow set of circumstances.
 
Old 03-07-2023, 06:09 PM   #10
watchintv
Member
 
Registered: Oct 2016
Posts: 57

Original Poster
Rep: Reputation: Disabled
Thank you for the information. I suppose if I wanted to check for vulnerabilities myself that I could do the following:

Breakdown my software:
Linux kernel (specific version)
Other OS software

Check CVE database for this software. Is the website https://www.cvedetails.com/ reliable for this process? In particular I noticed it lists "# of exploits" for each peice of software.

Or, should I reference a different website?

And then, be sure that I secure my network.

Does that all sound correct?
 
Old 03-07-2023, 06:21 PM   #11
rkelsen
Senior Member
 
Registered: Sep 2004
Distribution: slackware
Posts: 4,462
Blog Entries: 7

Rep: Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561
Why not rely on your distribution's update mechanism? They all have one, and that should be sufficient.

There are websites like this one, which will show you how your machine looks from the outside: https://www.grc.com/shieldsup
 
2 members found this post helpful.
Old 03-07-2023, 06:43 PM   #12
watchintv
Member
 
Registered: Oct 2016
Posts: 57

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by rkelsen View Post
Why not rely on your distribution's update mechanism? They all have one, and that should be sufficient.

There are websites like this one, which will show you how your machine looks from the outside: https://www.grc.com/shieldsup
Well, my concern is that the time between a vulnerability being found and a patch to exist seems risky.

Also, relying on white hat developers to find vulnerabilities vs a black hat entity who doesn't share with the community their vulnerabilities seems risky.

I guess all I can do is either stay updated with the Distro releases and updates and/or check the software for vulnerabilities myself.

Advice?
 
Old 03-07-2023, 07:31 PM   #13
rkelsen
Senior Member
 
Registered: Sep 2004
Distribution: slackware
Posts: 4,462
Blog Entries: 7

Rep: Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561
Quote:
Originally Posted by watchintv View Post
Advice?
Again, is this a home computer or a server? There are different methods for each.
 
Old 03-07-2023, 07:44 PM   #14
watchintv
Member
 
Registered: Oct 2016
Posts: 57

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by rkelsen View Post
Again, is this a home computer or a server? There are different methods for each.
Both
 
Old 03-07-2023, 08:20 PM   #15
Jan K.
Member
 
Registered: Apr 2019
Location: Esbjerg
Distribution: Windows 7...
Posts: 773

Rep: Reputation: 489Reputation: 489Reputation: 489Reputation: 489Reputation: 489
Lightning strikes, disc failures, fire, flooding, virus, malware... isn't the threat list endless?

And haven't the threats been around since... forever?


My take - or advice?

Bring it on, I say!

The important stuff, data, is at hand in multiple copies and can fully restore from bare metal in 10 minutes...

A trusted browser filters nasty stuff on the web, my mail-provider filters nasty mails, on Windows antivirus is running in the background... do you know of Lynis? or similar services?


So... chill, breathe and backup.
 
2 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Linux Kernel Patching Gets Dynamic LXer Syndicated Linux News 0 03-09-2014 06:20 AM
Looking for tools for static/dynamic code analysis for Linux like2learn Programming 1 09-12-2010 01:15 PM
Looking for tools for static/dynamic code analysis for embedded Linux like2learn Linux - General 1 09-11-2010 06:54 PM
what kind of static/dynamic analysis tools do you use? lordofring Programming 2 09-04-2005 11:53 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:06 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration