Re: SELinux and Stuxnet

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> ...  taking advantage of the
> communication of processes in the tree?

to begin with virtual memory handling, LSM, network stack, signaling, polling, devices and etc

There are more easier techniques for compromise, such as adding kernel module, device driver and etc. (root kit) after getting elevated access to a daemon with enough privileges (system calls) or elevated access

or even easier one, in example a daemon with elevated (root) access can do almost any system/kernel call, access to /proc , direct access to devices, memory (raw), sockets and etc.

as a target for compromise you can always rely on Daemons and users,

Mandatory Access Control can be used to avoid elevation of access by unprivileged users/daemons, such elevation of privileges can be easy in example with finding a window of vulnerability in a daemon running on a system, some daemons need to run under root and create sub processes with dropped privileges, even RPC calls or shared memory are good points to start with

SELinux is not just about protecting kernel, it is about adding Mandatory Access Control /Role Based Access Control to Linux that by default has DAC

it is a matter of context based security, containing/sandboxing users, daemons and resources

However another purpose of SELinux is MLS (MultiLevel Security) -classified, unclassified and etc-

it is not just about protecting kernel tree, it is about not trusting users, daemons and processes in utilizing the resources, and by far restricting them to a predefined security context

in that view anything run on the system can be treated as a possible point of threat to some extent

also you cannot trust a user on a DAC based system, how do you enforce user not to in example chmod 777 his folder?

So as you may know anything on the system can be a concern for MAC and SELinux,


it actually depends on the goal and that particular system, it is not always necessary to gain root privilege when your target daemon is running on an unprivileged user (system wide)

Thus actually almost anything; even codes not from the Linux kernel as you can see

Best,

Patrick K.


On 2/22/2011 9:54 PM, Ethan Heidrick wrote:
The policies that are written are concerned with architecture based
penetration of an interconnecting tree (kernal), where SeLinux is
concerned, What "blocks" of code would be advantageous for an attacker
concerned with such penetration techniques such as key functions
{algorithms} and  data compression encryption taking advantage of the
communication of processes in the tree?


On Tue, Feb 22, 2011 at 2:13 PM, cto@xxxxxxxxxxxxxxxxxx
<mailto:cto@xxxxxxxxxxxxxxxxxx> <cto@xxxxxxxxxxxxxxxxxx
<mailto:cto@xxxxxxxxxxxxxxxxxx>> wrote:

    Ethan,

    What are you talking about?


    Patrick K.


    On 2/22/2011 4:47 PM, Ethan Heidrick wrote:

        IE: infrastructure is process based on detecting such side
        channeling
        attacks excuse the pun, but revising SeLinux security
        authorization if
        that is what you are suggesting would create an independent node of
        programmable patches directed specific technique.

        Where would an node discrimination in the coding be "hazardous"
        for such
        red team analysis for penetration?

        On Tue, Feb 22, 2011 at 9:54 AM, cto@xxxxxxxxxxxxxxxxxx
        <mailto:cto@xxxxxxxxxxxxxxxxxx>
        <mailto:cto@xxxxxxxxxxxxxxxxxx <mailto:cto@xxxxxxxxxxxxxxxxxx>>
        <cto@xxxxxxxxxxxxxxxxxx <mailto:cto@xxxxxxxxxxxxxxxxxx>

        <mailto:cto@xxxxxxxxxxxxxxxxxx <mailto:cto@xxxxxxxxxxxxxxxxxx>>>
        wrote:

            Need to add it myself, that human being is also error-prone,

            i.e. last message I meant "waives" and wrote "waves"

            such errors happen even in development, in software and in
        security



            On 2/22/2011 12:43 PM, cto@xxxxxxxxxxxxxxxxxx
        <mailto:cto@xxxxxxxxxxxxxxxxxx>
        <mailto:cto@xxxxxxxxxxxxxxxxxx <mailto:cto@xxxxxxxxxxxxxxxxxx>>
        wrote:
              Sanjai,

              Security is a complex business, I'm afraid that SELINUX is an
            attempt to
              simplify part of this job at least,

              The more secure you want to make a system the more complex
            naturally it
              becomes,

              however complexity is enemy of security by itself,

              There is somewhat a dilemma, a paradox in here, I'm afraid it
            cannot be
              oversimplified as regular users would become security
        experts or such
              simplification waves the need for security specialists

              Best,

              Patrick K.



                On 2/22/2011 12:19 PM, Sanjai Narain wrote:

                    Hi Patrick: Thanks for your note. I understand that
        SELinux
                    does not
                    directly apply to Stuxnet since it targeted Windows.
        However, my
                    question was conceptually motivated: whether mandatory
                    access control
                    could have contained the impact of this worm, had it
        been
                    available. I
                    had thought that the answer is yes but wanted to
        find out
                    from other
                    experts. I believe you concur. Now, if only we could
        make
                    SELinux a lot
                    easier to use..... this is where one of my interests
        lie. --
                    Sanjai


                    On 2/22/2011 11:53 AM, cto@xxxxxxxxxxxxxxxxxx
        <mailto:cto@xxxxxxxxxxxxxxxxxx>
        <mailto:cto@xxxxxxxxxxxxxxxxxx <mailto:cto@xxxxxxxxxxxxxxxxxx>>
        wrote:

                        On 1/30/2011 7:39 PM, cto@xxxxxxxxxxxxxxxxxx
        <mailto:cto@xxxxxxxxxxxxxxxxxx>
        <mailto:cto@xxxxxxxxxxxxxxxxxx <mailto:cto@xxxxxxxxxxxxxxxxxx>>
        wrote:

                            Hello,

                            Stuxnet is a Windows Worm, and SELinux is
        Mandatory
                            Access Control for
                            Linux

                            on Linux SELinux can reduce the impact of
        such worms
                            if targeting Linux
                            boxes, but it is not a preemptive mechanism
        for not
                            having any kind of
                            compromise due to any vulnerability,
        Although if you
                            protect your
                            system
                            and targeted processes you may have reach
        the goal
                            of containing the
                            impact of possible compromises


                            Best,

                            Patrick K.

                            On 1/30/2011 5:20 PM, Sanjai Narain wrote:

                                Has there been thinking on whether
                                SELinux-hardened machines can avoid
                                the spread of Stuxnet-like worms?
        Thanks. --Sanjai



                            --
                            This message was distributed to subscribers
        of the
                            selinux mailing
                            list.
                            If you no longer wish to subscribe, send mail to
        majordomo@xxxxxxxxxxxxx <mailto:majordomo@xxxxxxxxxxxxx>
        <mailto:majordomo@xxxxxxxxxxxxx <mailto:majordomo@xxxxxxxxxxxxx>>

                            with
                            the words "unsubscribe selinux" without
        quotes as
                            the message.


                        Sanjai,

                        SELinux is Mandatory Access Control for Linux

                        Stuxnet only compromises Windows, SCADA and PLC 7
                        systems (Siemens
                        systems)

                        it is a worm, for a worm to compromise a system
        you need
                        to have
                        certain vulnerabilities

                        It cannot compromise Linux (the same way); as
        that worm
                        has been
                        designed for particular purposes and taking
        advantages
                        of Windows
                        vulnerabilities

                        If you mean protecting a network using Linux
        front ends
                        or inline
                        systems Like IPS systems that's another story
        which is
                        irrelevant to
                        SELINUX actually (although an IPS system -Intrusion
                        Prevention system-
                        on Linux can take advantages of SELINUX)

                        in brief , theoretically in case of a worm for
        Linux, it
                        could be
                        contained if SELINUX is effectively used.

                        in practice Stuxnet is for Windows

                        Best,

                        Patrick K.




                --
                This message was distributed to subscribers of the selinux
                mailing list.
                If you no longer wish to subscribe, send mail to
        majordomo@xxxxxxxxxxxxx <mailto:majordomo@xxxxxxxxxxxxx>
        <mailto:majordomo@xxxxxxxxxxxxx <mailto:majordomo@xxxxxxxxxxxxx>>

                with
                the words "unsubscribe selinux" without quotes as the
        message.



            --
            This message was distributed to subscribers of the selinux
        mailing list.
            If you no longer wish to subscribe, send mail to
        majordomo@xxxxxxxxxxxxx <mailto:majordomo@xxxxxxxxxxxxx>
        <mailto:majordomo@xxxxxxxxxxxxx
        <mailto:majordomo@xxxxxxxxxxxxx>> with

            the words "unsubscribe selinux" without quotes as the message.






--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux