LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-05-2004, 07:15 PM   #1
phr0stbyt3
LQ Newbie
 
Registered: Mar 2004
Posts: 1

Rep: Reputation: 0
Which OS is best for network security related.....


im a long time windows veteran looking to expand my horizons to an opensource OS because winXP is way too limiting. i dont know which linux distro is best for internet security related uses and half-life and such.... plz help


-linux n00b
 
Old 03-07-2004, 02:54 PM   #2
finegan
LQ Guru
 
Registered: Aug 2001
Location: Dublin, Ireland
Distribution: Slackware
Posts: 5,700

Rep: Reputation: 72
82.5% of security is just all in the kernel, some distros are a little more paranoid then others, some come with tools that'll simplify the learning process: CRUX, Mandrake Bastille, etc... but the distros are so maleable, that there is no one that is more secure then the others. If you really want to get your hands dirty, take a look at the BSDs, OpenBSD in particular, although its usually a hastle to run game servers on because of the need to run Linux binary emulation etc...

Also, this is probably better of in Security as opposed to the wireless forum. I'll see what I can do about a move.

Cheers,

Finegan

Last edited by finegan; 03-07-2004 at 02:56 PM.
 
Old 03-08-2004, 12:21 PM   #3
david_ross
Moderator
 
Registered: Mar 2003
Location: Scotland
Distribution: Slackware, RedHat, Debian
Posts: 12,047

Rep: Reputation: 79
Moved to Security
 
Old 03-08-2004, 02:11 PM   #4
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
There are basicly three critical elements to OS security

1) How strict the kernel and the compiler are (pretty much the core OS)
2) How safe is the default configuration
3) How knowledgable is the administrator?

Depending on the circumstances, any one of those three can cause you headaches. OSs like OpenBSD do a fantastic job on #1 and #2, but for #3 you're on your own (and in the case of OBSD, you better know what you're doing because there aren't any pretty GUIs to help you).

Other OSs, such as Mandrake Linux come by default fairly lax, but they allow you to tighten your security posture during the install, and they provide an optional secure kernel (grsec?), and also prelude IDS, Shorewall firewall, and msec lock-down scripts. So #1 is fairly well covered (although they haven't done the special stuff that OpenBSD did for memory management), #2 is decent, and even if you're lacking on #3 they give you some help.

Finally, there are some OSs that are not so good. I hear that Lindows is pretty wide-open by default, and I haven't heard of any friendly security tools that it might have. Red Hat has also been traditionally quite bad at "turning everything on", and while they've gotten better recently, they still have a long way to go (their firewall quite honestly sucks).

It really depends where you're at. If you aren't very knowledgable, then you'll need something that will help you out a little (although OpenBSD's man pages are outstanding and highly helpful, most newbies don't take the time to read them). Also, when you say "half-life and such" do you mean game server, or game client? *BSD boxes can run Half-Life game servers under Linux binary emulation, but I don't know about the actual client.
 
Old 03-08-2004, 04:39 PM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
i dont know which linux distro is best for internet security related uses and half-life and such.... plz help
Post details on what "internet security related uses" means to you, in short the purpose of the box. This is way to opaque to answer.


1) How strict the kernel and the compiler are (pretty much the core OS)
2) How safe is the default configuration
3) How knowledgable is the administrator?

I just disagree how you itemised the first two items. To me there's kernel stuff and there's userland (users, process) stuff. To reinforce the kernel you would remove unnecessary options, modules or compile as much monolithic as you can and remove CAP_MOD and such by patching it with Grsecurity, LIDS or the SELinux framework. Userland stuff means enforcing restrictions on any resources by way of "proper" configuration, running from lesser-privileged accounts, jailing, limiting, ACL's, stuff like that. Could you clarify what do you mean by "strictness" wrt compilers?
About administration can be made no mistake tho. Each and every OS will fail due to neglect, misconfiguration, mismanagement and such no matter how hardened it is. To me a "default" install isn't a starting point for discussing safety, it just isn't safe (enough for me), no matter what Linux/GNU/OSS flavour you choose. Anyway, if you're installing a production box it'll have a distinct prupose (or so I would hope) so a "default" install won't cut it: always choose custom for max control, then scrub the package list when installed.
 
Old 03-08-2004, 07:02 PM   #6
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
Well it's possible to change the way a compiler creates binaries so that they're loaded into memory differently (the ABI, I believe), which (and I could easily be wrong) is one of the things that OpenBSD does. For instance OpenBSD binaries cannot be used on FreeBSD, and FreeBSD binaries can only be used on OpenBSD with a compatibility mode. Also, you can be very strict with a compiler about what kind of warnings or errors it will generate for certain code, and whether it will refuse to compile it.

I consider the compiler part of the core OS simply because it's used to generate a lot of your userland tools, and even the kernel itself if you recompile it. Since every OS except Microsoft is bundling a compiler these days, (and because the the first point I outlined) I consider it core OS, at least if the OS team made modifications or improvements to it.

I referenced default configuration, because honestly the majority of Linux users do very little as far as substantial security tweaking, in fact most of the things a typical Linux user does is try to install a bunch of third-party apps, web server plugins, etc, which actually *lower* the overall security posture. IMHO a sane and safe default configuration is extremely important, because there are very few C_Cs and unSpawns in the world who actually know how to lock down a box (and take the time to do so).
 
Old 03-09-2004, 09:42 PM   #7
flashingcurser
Member
 
Registered: Jan 2003
Distribution: many win/nix/mac
Posts: 259

Rep: Reputation: 32
I like slackware because its init scripts are simple--that said--any distro can be hardened.

Some basics:
1. As pointed out above--compile your kernel with only what is needed. You may think about using one of the security enhanced kernels--I use selinux on my server, though it probably doesnt make a lot of difference for what i use it for.
2. Limit the services running on your machine to only what is needed (this is true of any OS including windows). The fewer things to exploit the better.
3. Get an os that has a good package system--and tools to automatically update your distro. This is so that when exploits are discovered security updates can be applied. Some examples of good packge system/distros are: apt/debian (or a debian based distro like libranet), swaret/slackware, portage/gentoo, rpm/to many to list. I would choose slack or deb based--they seem to do a better job of dealing with dependencies. Gentoo might be a little too steep of a learning curve, though the package system is said to be the best.
4. Set up a statefull fire wall. This can be done with iptables that come built in to most distros, however building the script yourself if your new to linux is quite a daunting task. I suggest going to this site and following the prompts, at the end it will give you a great script--then cut and past into your rc.firewall. It will be well commented--just read the comments and edit appropriately.

Just my $ 0.02


have fun, be safe

 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Accessing network related info The Joker Linux - Networking 6 04-20-2005 12:52 PM
scp problem related to network architecture? rdorte Linux - Networking 2 07-22-2004 09:17 AM
2 questions related to my network and apache bruhv-ahh Mandriva 3 10-15-2003 12:47 PM
Queston about logs, related to security pembo13 Linux - Security 4 09-25-2003 05:16 PM
Security-Related Question gauge73 Linux - Security 3 02-15-2003 05:20 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 07:44 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration