LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-25-2012, 08:58 AM   #1
Ronayn
Member
 
Registered: Jan 2006
Posts: 55

Rep: Reputation: 0
Security protocol issue


Will using a security protocol designed for Red Hat 5 (no, not Enterprise, RH5 circa 1998) on a Fedora 14 system secure it?

I've been tasked with implementing an archaic security protocol (which includes over a 100 things one must do to secure a RH5 system) on a system with Fedora 14. I have unsuccessfully argued that this will not secure the Fedora 14 system (as I imagine there have been significant changes to the OS and how to secure it in the 10 years between RH5 and Fedora 14).

Anyhow, I wanted to know if anyone else has encountered this issue, and how they resolved it. Note: I am no Fedora 14 guru, and have little knowledge on how to secure a linux system (in general). It's just that my gut tells me using the old protocol is not the right thing to do.
 
Old 10-25-2012, 10:18 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by Ronayn View Post
I have unsuccessfully argued
What were the arguments you used?
What were the reasons that were given you in return?


Quote:
Originally Posted by Ronayn View Post
archaic security protocol
What's the URI? What's it based on? Where's the documentation?


Quote:
Originally Posted by Ronayn View Post
Will using a security protocol designed for Red Hat 5 (no, not Enterprise, RH5 circa 1998) on a Fedora 14 system secure it?
While RHL is a far cry from recent Fedora security best practices tend to evolve and adapt. The question is finding out 0) what the protocol was based on and what it offers, 1) what the system needs to be protected against and 2) the reason for wanting to implement an old version of a security protocol. Knowing #0 means knowing if you have a solid foundation to build on, knowing if #0 and #1 match means knowing if putting in any effort will be efficient and produce an end result that adheres to which rules and regulations, mindset or whatever else is used as a yardstick and knowing #2 means knowing what ammo or which strategy to use for discussing changes.
So instead of slagging it off based on what little nfo you provided, IMHO solution-wise a better question would be "what additional measures are required to ensure the system is properly hardened?" .
 
Old 10-25-2012, 12:04 PM   #3
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
One thing that is possibly worth considering is that a a circa 1998 Linux would have been based upon the 2.0 kernel. Current Linux distributions are based on a long modified 2.6 or 3.x kernels. This means that in terms of security posture, many things would have evolved, exploits would have been uncovered and so forth such that it may not even be possible to secure an old system like that against current threats.
 
Old 10-25-2012, 01:59 PM   #4
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,676
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945
Quite obviously, everything depends upon exactly what-the-heck you (and/or your employer ...) actually means by the very-ambiguous term, "security protocol."
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Counter-Strike protocol issue icedude Linux - Networking 3 12-29-2005 05:50 AM
Flexible Wireless Security Protocol Quest101 Linux - Wireless Networking 1 06-14-2005 09:45 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:06 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration