On Thu, Apr 27, 2000 at 12:30:39PM -0700, Dan Hutchinson wrote:
> This may be the wrong group for the following, but I went to the website
> www.linuxsecurity.com and there stating that it is impossible to make
> GNU/Linux -> Debian/Linux total secure because the root user has the
> ability to change the /bin/login file, that modules have to much access
> to the kernal, and that certain processes aren't monitored. They have
> a LIDS patch that is suppose to clean the above items up.  My question
> is, is it true about the above risks? I am using potato ver. 2.2.9 with
> the 2.2.14PCI kernal.  Also, has anyone used LIDS? Does it block your
> ability to change broken modules, etc...

I don't know much about LIDS, but what they are talking about is true,
though they should just say its impossible to make a totally secure
box anyway.

all powerful root: root on linux like most other *nixes can do pretty
much anything to the system, he is not subject to the file permissions
on the filesytem etc.  this means basically that if root is
compromised its game over.  there are some systems which take away
root's special powers and essentially make uid 0 (root) just an
ordinary user.  these are often called `capability' based systems, or
`trusted' systems, they include Trusted Irix, and i think there is a
Trusted Solaris, and a Trusted Digital Unix.  the problem with these
systems is they become quite difficult to administer, but the
advantage is if root is compromised its no big deal.  I once read that
a admin of one of these trusted OSes (Digital unix iirc) set a null
password on the root account and used it as the `guest' user that
guests could use, this sounds like utter stupidity but it really isn't
in a fully capability based system root is no more powerful then any
other user account.  

kernel modules:  yes its quite true that modules have pretty much full
access to the kernel, you can make a kernel module that is designed to
hide processes or files on the filesystem from detection, or to
interfere with checks such as tripwire or AIDE causing them to think
all is well when in fact many files have been altered.  this basically
falls back on all powerful root though, root is the only one who may
load kernel modules, thus root can modify the kernel.  if the risk of
allowing kernel modules outweighs there usefullness you can disable
kernel modules all together in the kernel configuration.  problem
solved.

there is no such thing as a fully secure system, LIDS does not make a
system secure all by itself, and certainly not totally secure.  LIDS
is just a tool, (an intrusion detection system, a burgler alarm for
your OS so to speak).

security is a dynamic thing, you need to decide what you are
protecting, and how much trouble you are willing to go to to protect
it.  with more and more security you lose more and more flexability
and convenience, only you can decide where to draw that line.  if you
want 99.999999999999999999% totally secure system unplug your computer
right now, put it in the most expensive vault you can find, seal that
up in 100 tons of concrete and drop it into the ocean, and have
submarines circle it shooting torpedos at anything that so much as
moves in its direction. this is pretty close to totally secure, but i
would say not all that useful (or economical) ;-)   if you want to
make sure nobody ever gets your data or gets at your computer 100%
total secure the only way is to destroy it.  also not that useful ;-)

for most people shutting off all uneeded services,
firewalling/wrapping the remaining ones, using strong passwords, using
secure protocols over unsecure ones (ssh instead of telnet etc) and
checking for security updates/patches and applying them as soon as
they are found will provide enough security for most people.

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

Attachment: pgpHk1NT4Asv3.pgp
Description: PGP signature

Reply via email to