PostgreSQL/SELinux Error - relation "pg_catalog.pg_user" does not exist

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Tuesday 24 May 2005 04:04, Peter Farrow wrote:
> Maybe so... and if it works for you then use it, but sometimes when
> people say  "but we needed this or we needed that",  they haven't
> allways sat down and thought "why do we need it" or "do we really 'need'
> this ?"

When all the buffer overflows and other exploits all go away, then we won't 
need SELinux and its ilk.  SELinux, on a workstation or on a server, is great 
because it helps thwart the malware that will be written and will become more 
common as Linux becomes more common.  SELinux, properly implemented, can stop 
a virus, worm, even a trojan that the user accidentally or ignorantly clicked 
on (or the MUA's authors allowed through due to their bug in their code).  
Anyone in security knows that layered security is best; from firewalling on 
inward, multiple layers make machines more secure and less likely to be 
turned into spamming zombies like so many Windoze machines.

Is it complex?  Sure it is, but necessarily so, not arbitrarily.  Malware is a 
complex threat, and requires a complex solution.  KISS applies; but the adage 
'Make it as simple as possible; but no simpler' is more appropriate.

> Even having worked on government classified networks I have *never* seen
> an instance where the standard access controls offered by Linux/Unix
> didn't do what was required.

Harumph.  Systems without MAC don't get anywhere near a SCIF, and you know it, 
if you have ever worked in a real SCIF environment.  I personally have never 
worked inside an operating SCIF (thankfully), but I have read a defense 
contractor's Unclassified procedures manual on dealing with SCI inside the 
SCIF.  And I am thankful that national security is taken that seriously. 

With HIPAA implemented, the SCIF concept is going commercial, with one group 
in particular claiming the only fully operational SCIF outside the 
government.  And if you need SCIF spelled out I know you never worked in 
one. :-)

> Often DAC/MAC setups leads to inferior security because they can get
> very complex to setup, and the term "can't see the wood for the trees"
> springs to mind.

Simple is not always better.  This is why a properly set up policy should be 
the default; most users will simply not know how to make it work; in testing 
it must be made work like the typical user would like.

> As is most often the case the best security is the simplest, and DAC/MAC
> bloat doesn't help in any way.

Best is a matter of opinion; MAC provides guaranteed compartmentalization in 
those situations where compartmentalization is critical.  Like HIPAA.  In a 
HIPAA environment, to fully comply, there can be no root user.  That is, even 
the sysadmin must be restricted; there must be multiple admins and none have 
or can have unrestricted access.  

SELinux finally brings Linux up to the level of mid-80's VAX/VMS security.  
VMS (OpenVMS, that is) is still more secure than any Unix.  But SELinux is a 
step in the right direction.  That's why many SCIF sites specified 
VAXstations and Macintosh systems (again, I've seen unclassified documents 
showing equipment lists for a former SCIF site (there were multiple SCIF's on 
the site); VAXstations and old DEC's dominated, with only unclassified 
material being stored on AT&T 3B15's and 3B2's.).

But even the common user can reap the benefits of MAC in that it doesn't 
matter whether the intruder gains root or not; what the intruder can do 
through its exploited conduit is limited by the MAC system and cannot be 
overridden.  If it's a BIND exploit, for example, the SELinux MAC limits what 
BIND's named can do regardless of whether it gets root or not.

> If some document or requirement or spec says you need it, I would often
> question the theory behind the spec, and only if a demonstrable need
> arises (have yet to see that in 20+ years of consulting) then I would do
> it...

If the current rash of exploits and malware isn't a demonstrable need, I have 
never seen a demonstrable need.  Linux is not immune; there are just not that 
many 'pathogens' out there yet.  When the number of exploits goes up (and it 
will) SELinux is going to save many people's hides.

> Of course I've also been in this game too long as well to "never say
> never" and there is always a first time....  :-)

Have you done HIPAA yet?

Regardless, SELinux helps or can help users protect their systems from 
malicious intruders; for this alone it is worthwhile to at least learn it.  
And it's not going to be learned by a busy admin unless it's forced.  An 
admin who is incapable of learning it shouldn't be an admin; it's not that 
hard of material.  And any workstation connected to the internet will be 
scanned within half an hour and owned in an hour if protection is not there; 
firewalls are good outer layers, but host security should never be ignored; 
SELinux is a great addition to the stable of security tools; but like all 
other layers in the security toolbox there are annoyances; things like 
firewalls have their issues too, you know.
-- 
Lamar Owen
Director of Information Technology
Pisgah Astronomical Research Institute
1 PARI Drive
Rosman, NC  28772
(828)862-5554
www.pari.edu

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux