Re: question about security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, May 30, 2008 at 7:27 PM, Daniel J Walsh <dwalsh@xxxxxxxxxx> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Justin Mattock wrote:
> | On Fri, May 30, 2008 at 5:51 PM, Matthew Hammer
> | <matthewhammer89@xxxxxxxxx> wrote:
> |> On Fri, 30 May 2008 17:04:41 +0000
> |> "Justin Mattock" <justinmattock@xxxxxxxxx> wrote:
> |>
> |>> Hello; First I need to start with a status: SELinux seems to be
> |>> handling nicely with the latest git, and refpolicy. You guys really do
> |>> a good job.
> |>> Now for the question: I noticed reading the New York Times that
> |>> Comcast was hacked into, after reading the article I couldn't help but
> |>> ask the question
> |>> of "If comcast was using Linux with SELinux would this have happened".
> |>> So the question to SELinux is: If Comcast was using Linux, with
> |>> SELinux on there servers
> |>> would this attack have been prevented? What should Comcast have had
> |>> with there set up to better protect them from this type of
> |>> attack?(even though they probably use windows)
> |>> How would regular users and small businesses protect themselves from
> |>> this type of terrorism?
> |>> regards;
> |> My understanding of the comcast hack was that the hackers altered
> |> Comcast's registration information with the vendor that registers their
> |> domain. So no, the problem wasn't anything internal with comcast's own
> |> system.
> |>
> |> --
> |> Matthew Hammer
> |>
> |
> | AAhh I see, the vendor that registers their domain.
> |
> Of course the next question is whether the vendor who registers their
> doimains had been running SELinux, could it be stopped, and there is a
> good possibility.
>
> Depending on the Version, SELinux prevents most buffer overflow attacks
> on confined domains.
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (GNU/Linux)
> Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org
>
> iEYEARECAAYFAkhAVPQACgkQrlYvE4MpobPWSwCfQnk59XT5A7vZ/hL8JtHJGBj5
> 9fkAoJ+RKyeW/Vcd86U7syYUK9T17zwR
> =tzTL
> -----END PGP SIGNATURE-----
>

So if the vendor was protected with SELinux, the hacker would have had
to really work hard at trying to tweak the numbers
inside the vendors computer to cause this(edit a file), or is it  a
wire tap scenario i.g. similar to arp spoofing.

-- 
Justin P. Mattock

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux