Re: SELinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Takehiko Abe <keke@xxxxxxx> wrote:
>Sent: Sep 1, 2010 5:25 AM
>To: Community support for Fedora users <users@xxxxxxxxxxxxxxxxxxxxxxx>
>Subject: Re: SELinux
>
> >> I assume you know the chances that an average linux user actually get
> >> exploited in that way is very low.
> >
> > I would love to see the academic paper reference for this and the
> > analysis as to why - maybe it's because most of them use SELinux ;)
>
>Just count the known incidents of such exploits. ZERO. No WMD.

Pure bullshit.  There are PLENTY of UNIX/Linux systems that are 'powned'.  SeLinux prevents but does not stop this, if running in permissive mode.  In enforcing mode, all hell breaks loose.  At least you will be aware that this has happened and in enforcing mode the attack maybe stopped.  In enforcing mode, you can attempt to evaluate and eliminate the damage.  You don't READ about this because most companies don't want to admit their security system don't work. 
Remember the TV add about the fact that the firewall did not stop the 17 year old hacker from taking almost 200,000 credit card records and then building the robot of his dreams (this was an actual event folks, don't laugh)?  This MIGHT have been prevented if the company used and enforced a high quality security system like SeLinux.  SeLinux acts as a host based security system and is only as good as YOU make it.  If you don't want it, you don't have to have it.  But when the PCI folks (aka MasterCard/Visa/AMEX/Discover/JCB) shut off your ability to accept and process Credit/Debit transactions, you have no one to blame but yourself.  When your competition 'mysteriously' shows up with your design, then you have to ask, "How did they get that?"  Security systems are there for a reason.  We all have information that others desire and it is up to us to ensure that it does not appear in the hands of the 'bad guys'.  So, are you going to run around the Internet 'naked' or are you g
 oing to use every tool at your hands (Bastille/iptables/SeLinux)?  I prefer the latter scenario.  Of course, a very determined cracker is going to get in, but the ordinary Joe is not.

BTW, the EASIEST system to 'pown' is a Mac.  I'll leave it up to you to do the work (Google is definitely your friend with this.)

Please remember, it is up to YOU to protect YOUR data, no one else.

James McKenzie

-- 
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines

[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux