Free Essay

Enhanced Database Security

In:

Submitted By shahidsami
Words 2160
Pages 9
CS674 Database Security – Spring 2, 2011
MET Boston University

Enhanced Database Security
(Research Paper)

Submitted by Shahid Sami
April 24, 2011

Table of Contents

PAPER OVERVIEW 3
DETAILED DESCRIPTION 3
IMPLEMENTATION 3 1. Removing Default Passwords 3 2. Configuring Oracle Binary Permissions 6 3. Use of UMASK 7 4. Limiting SYSDBA login 9 5. Protecting the Listner 10 6. Limiting the privileges 12
PITFALLS AND RECOMMENDATIONS 13
RESOURCES 14

PAPER OVERVIEW

I will be researching on the following topics.

• Removing Default Passwords • Configuring Oracle Binary Permissions • Use of UMASK • Limiting SYSDBA login • Protecting the Listener • Limiting the privileges

DETAILED DESCRIPTION

Based on the Oracle 11g database, I will research on the above topics in detail. I will look into the shortcomings of the earlier versions of Oracle, the risks involved in those. I will also look into different types of authentications. How the binaries of the database can be protected. How to protect and secure the listener?

IMPLEMENTATION

1. Removing Default Passwords

When Oracle software is installed and a new database is created, the database create some common users. These users will have default passwords which are well know to many oracle users and hackers may try using them. So as a first step, one should identify these passwords and change them appropriately.

Security expert Pete Finnigan has written some scripts to collect these default passwords in a table and compare the passwords with existing passwords to find out if any user has the default password. The below steps how to use his scripts to find those users and try to lock and/or change the passwords.

1. Download from http://www.petefinnigan.com/default/osp_accounts_public.zip and copy the directory “osp_account_directory” on local machine or server where we need to address the databases.

[pic]

2. Connect to the SQL as sys and run the script (osp_install.sql) from above directory.

Connect sys as sysdba @/home/oracle/Desktop/samiShahid/osp_install.sql

[pic]

[pic]

3. Login as oraprobe user and execute the following query to get the status of users who are vulnerable in the database. This query shows that the users who are using default passwords and are not locked and expired.

col password format a20 col account_status format a20 col username format a15 select o.username, u.password, d.account_status from dba_users d, osp_accounts o , sys.user$ u where d.user_id = u.user# and o.hash_value = u.password and d.account_status not like 'EXPIRED%LOCKED' ;
[pic]
4. Identify un-used users, lock and expire those accounts as follows.

From the above query results, determine which accounts you want to lock and/or change the default passwords. The syntax for locking and expiring is:

ALTER USER ACCOUNT LOCK PASSWORD EXPIRE

The syntax for changing the password is:

ALTER USER IDENTIFIED BY

Note: It is always a very good practice to always lock the user SCOTT in a production environment as many people are familiar with the password tiger.

There is also a dictionary view dba_users_withdefpwd which gives all the user who are using default passwords.

2. Configuring Oracle Binary Permissions

In oracle software one of the most important binary file among many is the file with name oracle.exe in windows environment and oracle and in unix/linux environment. When we look at the permissions on this file in a unix environment as shown below this executable uses as special permission ‘s’ instead of ‘x’.

$ cd $ORACLE_HOME/bin
$ ls -l oracle
-rwsr-s--x 1 oracle dba 69936576 Oct 26 13:59 oracle

Instead of using the normal executable permissions ‘x’, the ‘s’ indicates that the this file has the setuid enable. It means that though the owner of this file is oracle, anybody who connects can run the program. This may expose the possibility of opening the important database files.

When a user connects to the oracle two processes will be create. One is the user process which use tools like sqlplus, toad etc to connect and the other is the server process which run the above oracle file. What this means is that there is no need for the oracle binary file to have permissions to other user at all. Therefore the unnecessary permissions can be removed using the following command.

$ chmod 4700 $ORACLE_HOME/bin/oracle

After the above command, the file permissions for the oracle file will look like this.

-rws------ 1 oracle dba 69375856 Mar 9 2011 oracle

Now we can disable the setuid and just give the executable permissions so that no othe user can run the binary file oracle. This can be done by issuing the following command.

$ chmod 0700 $ORACLE_HOME/bin/oracle

After the above command, the file permissions for the oracle file will look like this.

-rwx------ 1 oracle dba 69375856 Mar 9 2011 oracle

This has a significant impact. If user tries to connect as a local user from the server the permission is denied as he the user does not have the permission to execute the oracle binary file. This is illustrated below.

$ sqlplus admdba/admdba

ERROR:
ORA-12546: TNS:permission denied
Enter user-name:

However the user will be able to connect if connect string is used as shown below.

$ sqlplus admdba/admdba@orcl

Connected.

This is same as user connecting from a remote server using the tnsnames file.

3. Use of UMASK

As you know, you can change permissions in unix using the chmod command. However, as chmod works on existing files only, how can you make sure that files created later have the same permissions?

The exact permissions set on a newly created file are dictated by a special parameter called umask. The umask is a set of values that is subtracted from the all permissions to arrive at the permission value of the new file. To calculate permissions which will result from specific UMASK values, subtract the UMASK from 666 for files and from 777 for directories.
For example, if you have umask set to 777, it's subtracted from the overall permission value 777, resulting in 000—no permissions on the new file. The umask is a powerful and effective way to set permissions for the different files Oracle will create.
The overall umask of the Oracle software owner should be 022, which results in the files as Read+Write by owner and Read by all others. You can place this in the login profile file of the user so that it takes effect at all times.

There are many different types of files used by Oracle—data files, redo log files, trace files, and so on. Datafiles may be known beforehand and you can easily change their permissions, but tracefiles are generated at runtime. Thus, you should use umask to ensure the files are not exposed to any external users —trace files contain a variety of confidential information that can be exploited by hackers. For instance, someone could theoretically steal data files by copying them, mount them on a separate server, and bring the database up to rifle through its contents.

Set the umask for the directories as shown below:

|Directory |Description |Umask |
|Directory specified by the nitialization parameter |Some trace files are generated here as well as the database |0177 |
|background_dump_dest |alert log. Permissions should be rw------- (Read+Write by | |
| |Oracle software owner only). | |
|Directory specified by the initialization parameter |Trace files are generated here. Permissions should be the same|0177 |
|user_dump_dest |as above. | |
|$ORACLE_HOME/rdbms/log |Some database log files are generated here. |0177 |
| |Permissions should be the same as above. | |
|$ORACLE_HOME/rdbms/audit |Audit trails of database audit are stored here by default, |0177 |
| |unless you have set the audit_file_dest initialization | |
| |parameter. Permissions should be the same as above. Even if | |
| |you have DB audit trail, some common events such as SYSDBA | |
| |connections and database startup/shutdown are always audited | |
| |and placed here. | |
|Directory specified by the initialization parameter |Audit trails of database audit are stored here by default, |0177 |
|audit_file_dest |unless you have set the audit_file_dest initialization | |
| |parameter. Permissions should be the same as above. | |

4. Limiting SYSDBA login

Any unix user who belongs to group ‘dba’ can login to the database as as SYSDBA.

sqlplus / as sysdba

[pic]

Even though this is a convenience so that the database administrator does not need to remember the password to login as SYS account, it is very vulnerable. Even a strong SYS password is of use in this situation.

The auto login as sysdba can be disabled by setting the value of a parameter SQLNET.AUTHENTICATION_SERVICES in SQLNET.ora file to NONE. This file is available in $ORACLE_HOME/network/admin. (If the file is not available you can create one). Once this is set the root user cannot login as sysdba.

[pic]

5. Protecting the Listner

By default Oracle creates EXTPROC entry in the listner.ora configuration file for connecting to external procedural calls. This may give access to a hacker access to database and operating system.

[pic]

It is always a good practice to delete this entry if there no need for external procedural calls.

If hackers have access to run the listener utility and have access to the listener.ora, they can change the listener.ora file and set commands like SET DISPLAYMODE VERBOSE which sends lot of information to trace file. They can then run the listener utility to set the trace level to support and direct the trace file to any other folder and get lot of information in the trace file.

[pic]

To restrict the above, add the following line to the listener.ora file and restart the server.

ADMIN_RESTRICTIONS_LISTENER = ON

Now if the hacker runs the command, an error will be generated.

LSNRCTL> set trc_directory /hacker_dir
Connecting to (ADDRESS=(PROTOCOL=IPC)(KEY=PROPRD1))
TNS-12508: TNS:listener could not resolve the COMMAND given

6. Limiting the privileges

A typical user needs privileges that are important to perform his or her job—nothing neither more nor less. As this policy may prove unrealistic, however, you may need to adopt a middle-of-the-road approach: removing the most powerful privileges the users do not need.

One example of a powerful privilege is CREATE ANY TABLE, which lets the user create a table in any schema, not just its own. Rarely do users need this privilege; you can safely revoke it. On the other hand, a privilege like QUERY REWRITE, which allows the users' sessions to rewrite a query to take advantage of a function-based index or materialized view, is relatively innocuous.

First, identify all the privileges you consider innocuous (CREATE TYPE, CREATE SESSION, and so on) as follows:

select privilege, grantee, admin_option from dba_sys_privs where privilege not in
( /* list any other privilege here you don't find "sweeping" */
'ALTER SESSION',
'QUERY REWRITE',
'CREATE DIMENSION',
'CREATE INDEXTYPE',
'CREATE LIBRARY',
'CREATE OPERATOR',
'CREATE PROCEDURE',
'CREATE SEQUENCE',
'CREATE SESSION',
'CREATE SNAPSHOT',
'CREATE SYNONYM',
'CREATE TABLE',
'CREATE TRIGGER',
'CREATE TYPE',
'CREATE USER',
'CREATE VIEW',
'UNLIMITED TABLESPACE'
)
and grantee not in
('SYS','SYSTEM','WKSYS','XDB', 'MDSYS','ORDPLUGINS','ODM','DBA', 'CTXSYS',
' EXP_FULL_DATABASE', 'IMP_FULL_DATABASE','OLAP_DBA', 'OLAP_SYS', 'ORDSYS')
/* Place all the user names you want to exclude */ order by grantee, privilege;

Sample output

PRIVILEGE GRANTEE ADM
---------------------------------------- ------------------------------ ---
SELECT ANY DICTIONARY ADMDBA NO
SELECT ANY SEQUENCE ADMDBA NO
SELECT ANY TABLE ADMDBA NO
CREATE EVALUATION CONTEXT AQ_ADMINISTRATOR_ROLE YES
CREATE RULE AQ_ADMINISTRATOR_ROLE YES
CREATE RULE SET AQ_ADMINISTRATOR_ROLE YES
DEQUEUE ANY QUEUE AQ_ADMINISTRATOR_ROLE YES
ENQUEUE ANY QUEUE AQ_ADMINISTRATOR_ROLE YES
MANAGE ANY QUEUE AQ_ADMINISTRATOR_ROLE YES
CREATE ANY DIRECTORY CARS NO
CREATE ANY SEQUENCE CARS NO
CREATE ANY TABLE CARS NO
CREATE PUBLIC SYNONYM CARS NO
DROP ANY SEQUENCE CARS NO
CREATE CLUSTER CONNECT NO
CREATE DATABASE LINK CONNECT NO
SELECT ANY DICTIONARY DBSNMP NO
DEBUG ANY PROCEDURE JAVADEBUGPRIV NO
DEBUG CONNECT SESSION JAVADEBUGPRIV NO
ANALYZE ANY OEM_MONITOR NO
SELECT ANY DICTIONARY OEM_MONITOR NO
CREATE PUBLIC SYNONYM OLAP_USER NO

Be wary of using the ADMIN OPTION while granting privileges as it can cause a proliferation of privileges.

Dictionary objects also have to be protected from general users. So it is a good practice to set the o7_DICTIONARY_ACCESSIBILITY initialization parameter to FASLE.

alter system set O7_DICTIONARY_ACCESSIBILITY=FALSE scope=spfile ;

One good thing is that the SELECT ANY DICTIONARY system privileges is not included in the GRANT ALL PRIVILEGES.

PITFALLS AND RECOMMENDATIONS

Common pitfalls are not changing the default passwords, not managing the privileges properly, unknown data, not encrypting the sensitive data, lagging behind in software patches, not securing the backups and network security.

The investment in security is lower than the cost involved in data beaches and noncompliance. Auditing is not an overhead. Use a good password policy and lock the account after 3 failed attempts. Remember the CIA triangle

RESOURCES

Oracle 11g DBA handbook, Oracle Security books, interview with my DBA and some online sites.

http://www.petefinnigan.com/default/default_password_list.htm http://www.securedba.com/securedba/2007/12/hardening-the-o.html http://www.ordba.net/Articles/HardeningOracleDB.htm
HOWTO secure and Audit Oracle 10g and 11g by Ron Natan
Database Security and Auditing by Hassan A Afyouni
Oracle Database 11g DBA Handbook
Oracle Database 11g The Complete Reference
Interview with my Oracle DBA.

Similar Documents

Free Essay

Linux

...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...

Words: 1010 - Pages: 5

Free Essay

Linux Security Technologies

...Linux Security Technologies   SELinux (Security Enhanced Linux) is a mandatory access control in the Linux kernel that was originally developed by NSA (National Security Agency) with direct contributions provided by Red Hat Enterprise Linux (RHEL) via the Fedora Project. In the day and age of identity theft and attempted sabotage from terrorists against our country, it should be very apparent why an organization like NSA had such an interest in heading up development of a more secure way to better protect our nation’s computer systems. In a world so largely dependent on computer systems, inadequate security measures could lead to anything from having a single person’s financial information compromised to an electronic 9/11 against some of our country’s most secure federal computer networks. In the modern computer based society we live in, security is essential to protecting everything from personal desktops all the way up to the most secure federal databases. And many corporate and government level computers are based on the Linux kernel. SELinux has 3 states it can be in if on a system: Enabled, Disabled, and Permissive. Enforcing means SELinux security policy is active, Disabled means SELinux security policy is not active, and Permissive is a diagnostic state commonly used for troubleshooting. To better understand what improvements Mandatory Access Control (MAC) can provide for security, one needs to know about the standard Linux security provision called Discretionary...

Words: 1124 - Pages: 5

Premium Essay

Linux Securities

...Since its release to the public in 1991, the Linux operating system has become one of the most widely used operating systems in the world. This is largely because of the security features. The most popular of these three technologies are SELinux, chroot jail and iptables. We are going to break down the advantages and benefits of each of these features. The United States National Security Agency (NSA), the original developer of SELinux released the first version of this feature in December of 2000. According to a statement by the NSA "NSA Security-enhanced Linux is a set of patches to the Linux kernel and some utilities to incorporate a strong, flexible mandatory access control (MAC) architecture into the major subsystems of the kernel. It provides an enhanced mechanism to enforce the separation of information based on confidentiality and integrity requirements, which allows threats of tampering and bypassing of application security mechanisms to be addressed and enables the confinement of damage that can be caused by malicious or flawed applications. It includes a set of sample security policy configuration files designed to meet common, general-purpose security goals" It provides the ability to separate information based on confidentiality and integrity requirements. The flexibility allows control over what activities can be done by each daemon, user, or process. Standard Linux access controls are modifiable by the user and the applications which the user runs. SELinux access...

Words: 600 - Pages: 3

Premium Essay

Linux Security Technology

...|Linux Security Technology | | 1. SELinux SELinux, an implementation of Mandatory Access Control (MAC) in the Linux kernel, adds the ability to administratively define policies on all subjects (processes) and objects (devices, files, and signaled processes). This mechanism is in the Linux kernel, checking for allowed operations after standard Linux Discretionary Access Controls DAC are checked. Security-Enhanced Linux (SELinux) is a Linux feature that provides a mechanism for supporting access control security policies, including United States Department of Defense-style mandatory access controls, through the use of Linux Security Modules (LSM) in the Linux kernel. It is not a Linux distribution, but rather a set of Kernel modifications and user-space tools that can be added to various Linux distributions. Its architecture strives to separate enforcement of security decisions from the security policy itself and streamlines the volume of software charged with security policy enforcement. The key concepts underlying SELinux can be traced to several earlier projects by the United States National Security Agency (NSA), It has been integrated into the mainline Linux kernel since version 2.6. NSA, the original primary developer of SELinux, released the first version to the open source development community under the GNU GPL on December 22, 2000. Security-enhanced Linux...

Words: 1860 - Pages: 8

Free Essay

Linux Securities

...Security of a system when you are open to the internet is paramount in the world of servers. Linux has many layers of ever evolving security in order to keep up with the would be attackers in cyberspace. This is one of the reasons that Linux is one of the most used servers for internet sites and has few viruses engineered towards it. IP Tables Developed by the Netfilter organization the IP tables package for Linux is an evolution of the IP chains which came from the IPv4 Linux firewall package. Paul Russel was the initial head author of the organization and also behind the IP chains project The Netfilter organization began to come together in 1999 and through collaboration and research recognized the shortcomings of the IP chains package and developed this new product in order to address these concerns and make needed improvements. The improvements added to the new IP tables package helped improve performance and overall security. Better integration with the kernel led to improved speed and reliability but the true value came from the new security features. Stateful packet inspection allows the firewall to keep track of every connection passing through it allowing for better monitoring and can even view certain contents and attempt to anticipate actions of certain protocols. Also the ability to filter packets based on MAC address and TCP header flags helps to prevent attacks using malformed packets. Even a rate limiting feature that is designed to eliminate some denial...

Words: 1131 - Pages: 5

Premium Essay

Linux Security

...The Linux security technologies I researched are SELinux, chroot jail and iptables. SELinux (Security-Enhanced Linux) is a Linux feature that provides the mechanism for supporting access control security policies, including United States Department of Defense-style mandatory access controls, through the use of Linux Security Modules (LSM) in the Linux kernel. It is not a Linux distribution, but rather a set of kernel modifications and user-space tools that can be added to various Linux distributions. Its architecture strives to separate enforcement of security decisions from the security policy itself and streamlines the volume of software charged with security policy enforcement. The key concepts underlying SELinux can be traced to several earlier projects by the United States National Security Agency. The United States National Security Agency (NSA), the original primary developer of SELinux, released the first version to the open source development community under the GNU GPL on December 22, 2000. The software merged into the mainline Linux kernel 2.6.0-test3, released on 8 August 2003. Other significant contributors include Network Associates, Red Hat, Secure Computing Corporation, Tresys Technology, and Trusted Computer Solutions. Experimental ports of the FLASK/TE implementation have been made available via the TrustedBSD Project for the FreeBSD and Darwin operating systems. It provides an enhanced mechanism to enforce the separation of information based on confidentiality...

Words: 1300 - Pages: 6

Free Essay

Computer Analysis

...Fedora 12 Security-Enhanced Linux User Guide Murray McAllister Scott Radvan Daniel Walsh Dominick Grift Eric Paris James Morris Security-Enhanced Linux Fedora 12 Security-Enhanced Linux User Guide Edition 1.4 Author Author Author Author Author Author Copyright © 2009 Red Hat, Inc. Copyright © 2009 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. All other trademarks are the property of their respective owners...

Words: 26838 - Pages: 108

Free Essay

It302 Linux System Administration Research Assignment 1

...IT302 Linux System Administration Research Assignment 1 SELinux or Security Enhanced Linux uses an architecture that separates enforcement from access policy decisions. With this architecture different types of policies can be implemented, including Role-Based Access Control (RBAC), Type Enforcement (TE), and Multi-Level Security (MLS). The module assigns security labels to each subject or object. It uses a security class to determine the kinds of relationship a pair of labels might have. The triplet consisting of a pair of labels and a class are then sent to a policy server to determine if access is allowed. The security labels are assigned dynamic integer security ID's (SID's); the reply from the policy server is cached in an 'access vector cache' for performance reasons. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest level of security for the Linux operating system. Linux V-Server – The three basic elements of the VServer are: * The security context. A process in one security context cannot see processes in other security contexts, neither with the 'ps' command, nor with 'cat /proc' nor in any other way. As side-effect, this means that a process in one context cannot kill processes in other contexts. * Capabilities. The existing Linux kernel provides a wide variety of capabilities which can be taken away from processes. These include the ability to change network addresses...

Words: 423 - Pages: 2

Free Essay

Linux Security Technologies

...research problem. Linux has several security developments included in its open source operating system. Among these are SELinux, chroot jail, and iptables to name a few. SELinux is Security Enhanced Linux. The National Information Assurance Research Laboratory of the National Security Agency was in charge of carrying out the research and advanced development of technologies needed to enable the NSA to provide the solutions, products, and services to achieve Information Assurance for information infrastructures essential to the security of the U.S. National Security. The Security-enhanced Linux prototype was developed by the NSA along with research partners from NAI Labs, Secure Computing Corporation (SCC), and the MITRE Corporation. Many other contributions have followed since the initial release.(NSA-National Security Agency, 2009) Researchers in the National Information Assurance Research Laboratory of NSA worked with Secure Computing Corporation (SCC) to develop a strong, flexible mandatory access control architecture based on a mechanism first developed for the LOCK system called Type Enforcement. The NSA and SCC then worked with the University of Utah’s Flux research group to transfer the architecture to the Fluke research operating system. The architecture was enhanced, when it was transferred, to provide better support for dynamic security policies. This enhanced architecture was named Flask. SELinux implements the Flask security architecture which uses flexible mandatory...

Words: 1498 - Pages: 6

Free Essay

Linux Security Technologies

...types of Linux Security Technologies. Discretionary Access Control, SELinux (Security Enhanced Linux), chroot jail, and iptables are just a few. This paper is only going to discuss the latter three. Discretionary Access Control is the more traditional, however; DAC is not as secure and will not be discussed here.1 The U.S National Security Agency (NSA) is the organization behind the creation of SELinux. The reason the NSA is involved in this project is because this organization is responsible for carrying out the research and advanced development of technologies needed to enable NSA to provide the solutions, products, and services to achieve Information Assurance for information infrastructures critical to U.S. National Security interests. The NSA implemented a Mandatory Access control within the Linux Kernel. This MAC is named Flask.2 There are three main policies that SELinux uses to apply MAC. There is the Targeted, where the MAC controls will only be used for a specific process or processes, there is the Multilevel Security protection, and the Strict. The strict puts MAC controls to all processes. The targeted is not as secure as the strict, however; the targeted is easier to maintain. If one uses the strict, the administrator will have to customize the policy. Failure to do so could cause other users a significant problem in performing his or her assigned duties. 3 The main reason the MAC has been created is to help prevent security threats to a system...

Words: 919 - Pages: 4

Premium Essay

Linux Security

...| Linux Security | A review of some current technologies | | | | | In the pre-Internet world you have criminals looking for “hard” assets: money, jewelry and other items that could be easily turned into hard currency. We have always had “white-collar” crime such as embezzlement, fraud and insider trading. With the proliferation of the Internet and our personal and professional lives stored in the cloud; criminals can now take one ubiquitous piece of information and turn themselves into a whole other person. The ease in which such information can be used has turned people who would never think of ever holding up a bank, mugging someone or other physical crime, into criminals. This type crime has spawned a whole new “industry”: cyber security. One of the most important aspects of a network administrator’s job is to secure the system from any person who wishes to do criminal activities. These people are both within and outside the organization. With the Linux system there are three main technologies that are in use today. They are SELinux, chroot jail, and iptables. The first line of defense in a Linux system is chroot jail. Chroot is a process or application that changes the root directory for a user. To the user it appears that they are in their root directory, but they are actually in a modified root directory. This modified root directory is called jail. Without a chroot jail, a user with limited file permissions would still be able to navigate...

Words: 942 - Pages: 4

Free Essay

Security in Linux

...Security in Linux Linux, like any other computing platform, is constantly changing. There are a few major focus points for new and upgraded platforms, one of which is how user friendly it is. User friendliness goes beyond the ability to simply point and click, it also goes behind the lines deep into the inner workings of the system. Security is one of the most important functions of any operating system, very commonly overlooked and taken for granted. A system administrator can configure tables that are provided by the Linux kernel firewall in a program called iptables. Iptables has the ability to redirect, modify or stop packets of data all based on the state of a connection at any given time. There are many different tables that can be defined and each table contains built in chains or user defined chains. Every chain is essentially a list of rules that matches a set of packets and it specifies what to do with a packet that matches the rules. For the casual user it is best to use the predefined rules, they are often more than adequate. In an enterprise situation the administrator would likely want to define additional rules in order to best suit the business needs. Before iptables Linux mainly used ipchains as a firewall package. Iptables is an improvement on ipchains because it monitors the state of connections. Iptables can use the state of the connection as opposed to ipchains using the source destination and content only, to redirect, modify or drop a packet. At least...

Words: 965 - Pages: 4

Free Essay

It302 Activity 1

...Chapter 2 Installation Overview 1. A Net Boot CD is a way to install a new system from a hard disk or over a network. 2. Three considerations for planning an installation are; a. SELinux improves system security by implementing mandatory access control policies in the Fedora kernel b. Install a Graphical desktop environment (GUI) such as GNOME and/or KDE. c. Install additional software and services packages to fit the need of the user. 3. By default Fedora divides the disk into three partitions, including ‘/boot’ and Logical Volume Manager (LVM). 4. Manual partitioning the hard disk has its advantages, such as being able to isolate a filesystem for security or backup needs. 5. The / (root) partition is the main filesystem on the hard disk. Any new created directories will become part of the root filesystem unless a filesystem is created. 6. The swap partition is where Linux temporarily stores programs and data when it does not have enough RAM to hold all the information it is processing. 7. The /boot partition holds the hernel and other data the system needs when it boots. In order for the /boot partition to work properly it must be one of the first partitions on the disk. 8. The /var (variable) partition holds the bulk of system logs, package information, and accounting data. The /var/log partition is commonly used in a separate partition to isolate system logs from other files in the /var directory. 9. The /home partition is...

Words: 831 - Pages: 4

Premium Essay

Linux Security Technologies

...07/13/2012 Linux Security Technologies In today’s world there are many ways to gain access to the internet. You can go to your local library, a Starbucks, any airport, or even a McDonald’s. With all of these ways to have free access to the Web, the opportunity for hacker’s to get to your personal information is at an all time high. Linux programming has many ways to combat this situation with security technologies such as SELinux, chroot jail, iptables, and virtual private networks (VPN’s) to name a few. The basics of Linux security start with Discretionary Access Control, which is based by users and groups. The process starts with a user, who has access to anything that any other user can have access to. At first, it may seem great to be able to have that access, but the security in it is not so great. The US National Security Agency (NSA) developed the SELinux (Security Enhanced Linux) to combat the lack of strong security. (National Security Agency Central Security Service, 2009) Other organizations behind SELinux include the Network Associate Laboratories (NAI) labs which implemented several additional kernel mandatory access controls, developed the example security policy configuration, ported to the Linux 2.4 kernel, contributed to the development of the Linux Security Modules kernel patch, and adapted the SELinux prototype to LSM. The MITRE Corporation which enhanced several utilities to be SELinux-aware, and developed application security policies. And the...

Words: 1207 - Pages: 5

Premium Essay

Assignment 2 Linux Security

...Linux Security Technology Security of a system is important in our today’s use of the internet. That is why Linux with its many layers that are always evolving in security to protect against all kinds of hackers or othe types of attacks . SELinux, Chroot Jail, IPTables, Mandatory Access Control and Discrestionary Access Control, just to name a few. SELinux is an access control implementation for the Linux kernel. Take for instants that you are the administrator and you define rules in user space and if the Linux kernel has been added with SELinux support, then those rules will be followed by the kernel. SELinux is a NSA Security-Enhanced Linux, in which the mandatory access control is flexible. The structure of SELinux supports against all kinds of mandatory access control policies. Some of which are Role-Based Access Control and Multi-Level Security. It was designed by NSA for the purpose of protecting a server against malicious daemons, by telling the daemons what they can and can’t do. This type of technology was created by Secure Computing Corporation, but was supported by the U.S. National Security Agency. In 1992, the thought for a more intense security system was needed and a project called Distributed Trusted Match was created. Some good solutions evolved from this, some of which were a part of the Fluke operating system. Which then became the Flux and finally led to the creation of the Flask architecture. Eventually it was combined with the Linux kernel, which...

Words: 873 - Pages: 4