Access Control. SELinux. Mestrado Integrado em Engenharia Informática e Computação. Computer Systems Security

Size: px
Start display at page:

Download "Access Control. SELinux. Mestrado Integrado em Engenharia Informática e Computação. Computer Systems Security"

Transcription

1 Access Control SELinux Mestrado Integrado em Engenharia Informática e Computação Computer Systems Security João Carlos Eusébio Almeida - up João Gabriel Marques Costa - up May 17,

2 Contents 1 Introduction Access Control Security-Enhanced Linux How SELinux works Five golden principles of security The Decision Making Process Getting into SELinux Mandatory Access Control (MAC) Security Context Type Enforcement (TE) Role-Based Access Control (RBAC) Multi-Level Security (MLS) Multi-Category Security (MCS) Security Policy Modes Permissive Domains Booleans Utilities List of common problems Wrong Subject Context Wrong Object Context Right Subject and Object Context but No Access How to install SELinux in a Debian System 11 4 Example Use Cases MCS Usage Conclusion 15 2

3 1 Introduction 1.1 Access Control Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment. There are two main types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access limits connections to computer networks, system files and data. The three main models of access control are: Discretionary Access Control (DAC): defines the basic access controls for objects in a filesystem. This is the typical access control provided by file permissions, sharing, etc. Such access is generally at the discretion of the owner of the object (file, directory, device, etc.). DAC provides a means of restricting access to objects based on the identity of the users or groups (subjects) that try to access those objects. Depending on a subject s access permissions, they may also be able to pass permissions to other subjects. Mandatory Access Control (MAC): is a security mechanism that restricts the level of control that users (subjects) have over the objects that they create. Unlike in a DAC implementation, where users have full control over their own files, directories, etc., MAC adds additional labels, or categories, to all file system objects. Users and processes must have the appropriate access to these categories before they can interact with objects. This is talked more in depth in the respective [2.3.1] section of the document. Role-based Access Control (RBAC): is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create, or modify a file. Roles are defined according to job competency, authority, and responsibility within the enterprise. When properly implemented, RBAC enables users to carry out a wide range of authorized tasks by dynamically regulating their actions according to flexible functions, relationships, and constraints. This is in contrast to conventional methods of access control, which grant or revoke user access on a rigid, object-by-object basis. 1.2 Security-Enhanced Linux Security-Enhanced Linux (SELinux) is an implementation of MAC on Linux and an incredibly powerful tool for securing Linux servers. It has a reputation for being difficult to configure and, as a result, many system administrators simply choose to turn it off. Its architecture strives to separate enforcement of security decisions from the security policy itself and streamlines the volume of software charged with security policy enforcement. It provides an enhanced mechanism to enforce the separation of information based on confidentiality and integrity requirements, which allows threats of tampering and bypassing of application security mechanisms to be addressed and enables the confinement of damage that can be caused by malicious or flawed applications. For the purpose of this project, the group has decided to thoroughly study the implementation and architecture of SELinux as well as setup a number of use cases and tests. 3

4 2 How SELinux works 2.1 Five golden principles of security 1. Know your System: know what it runs on, what its network is like, traffic, etc. 2. Principle of Least Privilege: Don t give users more privileges than they need to do their job. 3. Defense in Depth: Don t just do one thing to protect your system. 4. Protection is key but detection is a must. 5. Know your enemy: what tools he uses, means of attack, etc. With SELinux it is possible to achieve these principles. Most operating system use Discretionary Access Control (DAC) to control how processes interact with files and the way processes interact with each other. However, it is not without issues. Allowing users to control object access permissions has the side-effect of opening the system up to Trojan horse susceptibility. Additionally, maintenance of the system and verification of security principles is extremely difficult for DAC systems because users control access rights to owned objects. The so-called Safety Problem": the lack of constraints on copy privileges, is another liability inherent to DAC. This lack of constraints on copying info from one file to another makes it difficult to maintain safety policies and to verify that those safety policies are not compromised. SELinux adds additional control beyond what is offered with traditional DAC. Processes and resources have security properties associated with them and the security policy in the kernel is flexible and easily changeable. A general purpose MAC architecture needs the ability to enforce an administratively-set security policy over all processes and files in the system, basing decisions on labels containing a variety of security-relevant information. 2.2 The Decision Making Process When a subject, (for example, an application), attempts to access an object (for example, a file), the policy enforcement server in the kernel checks the Access Vector Cache (AVC), where subject and object permissions are cached. If a decision cannot be made based on data in the AVC, the request continues to the security server, which looks up the security context of the application and the file in a database. Permission is then granted or denied, with an avc: denied message detailed in /var/log/messages if permission is denied. 2.3 Getting into SELinux Mandatory Access Control (MAC) Figure 1: Decision making process of SELinux Mandatory Access Control (MAC) is a type of access control in which the operating system is used to constrain a user or process (the subject) from accessing or performing an operation on an object (such as a file, disk, memory, socket etc.). Each of the subjects and objects have a set of security 4

5 attributes that can be interrogated by the operating system to check if the requested operation can be performed or not. For SELinux the: Subjects are processes. Objects are system resources such as files, sockets, pipes, network interfaces etc. that are accessed via processes (subjects). Security attributes are the security context [2.3.2]. Security Server within the Linux kernel authorizes access (or not) using the security policy [2.3.7] (or policy) that describes rules that must be enforced. Note that the subject (and therefore the user) cannot decide to bypass the policy rules being enforced by the MAC policy with SELinux enabled. Contrast this to standard Linux Discretionary Access Control (DAC), which also governs the ability of subjects to access objects, however it allows users to make policy decisions. SELinux supports two forms of MAC: Type Enforcement (TE) [2.3.3]: Where processes run in domains and the actions on objects are controlled by the policy. This is the implementation used for general purpose MAC within SELinux along with Role Based Access Control (RBAC) [2.3.4]. Multi-Level Security (MLS) [2.3.5]: This is an implementation based on the Bell-La Padula (BLP), and used by organizations where different levels of access are required so that restricted information is separated from classified information to maintain confidentiality. This allows enforcement rules such as "no write down" and "no read up" to be implemented in a policy by extending the security context to include security ranges or levels [2.3.2] Security Context A security context is a string made up of 3 or 4 attributes which are separated by ":". Those attributes are of type: user:role:type[:range] : user: an identity known to the policy that is authorized for a specific set of roles, and for a specific MLS/MCS range. Each Linux user is mapped to an SELinux user via SELinux policy. This allows Linux users to inherit the restrictions placed on SELinux users. Every process ran during an user s session uses the security context mapped to it s SELinux user identity. role: part of the Role-Based Access Control (RBAC) [2.3.4] security model in SELinux. SELinux users are authorized for roles, and roles are authorized for domains. type: is an attribute of Type Enforcement (TE) [2.3.3]. It defines a domain for processes, and a type for files. SELinux policy rules define how types can access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it. range: is an attribute of MLS and MCS. An MLS range is a pair of levels, written as lowlevelhighlevel if the levels differ, or lowlevel if the levels are identical. A set of category labels can also be used if they are defined in /etc/selinux/<selinuxtype>/setrans.conf. Figure 2: Example of a process security context 5

6 2.3.3 Type Enforcement (TE) SELinux makes use of a specific style of type enforcement to enforce mandatory access control. For SELinux it means that all subjects and objects have a type identifier associated to them that can then be used to enforce rules laid down by policy. The SELinux type identifier is used in the majority of SELinux language statements and rules used to build a policy that will, when loaded into the security server, enforce policy via the object managers Constraints It is possible to add constraints on users, roles, types and MLS ranges, for example within a TE environment, the way that subjects are allowed to access an object is via a TE allow rule, for example: allow unconfined_t ext_gateway_t : process transition; This states that a process running in the unconfined_t domain has permission to transition a process to the ext_gateway_t domain. However it could be that the policy writer wants to constrain this further and state that this can only happen if the role of the source domain is the same as the role of the target domain. To achieve this a constraint can be imposed using a constrain statement: constrain process transition ( r1 == r2 ); This states that a process transition can only occur if the source role is the same as the target role, therefore a constraint is a condition that must be satisfied in order for one or more permissions to be granted (i.e. a constraint imposes additional restrictions on TE rules) Role-Based Access Control (RBAC) To further control access to TE domains SELinux makes use of role-based access control (RBAC). This feature allows SELinux users to be associated to one or more roles, where each role is then associated to one or more domain types as shown in figure 3. The SELinux role name is the second component of a security context. It is possible to add constraints and bounds on roles as seen above. Figure 3: RBAC in SELinux Multi-Level Security (MLS) As previously stated [2.3.1][2.3.2], SELinux supports MLS/MCS by the use of the 4th attribute (range) in the security context. The implementation conforms to the Bell-La Padula BLP model in that a process (running at the "Secret" level) can read/write at their current level but only read down levels or write up levels (figure 4). This ensures confidentiality as the process can copy a file up to the secret level, but can never re-read that content unless the process "steps up to that 6

7 level", also the process cannot write files to the lower levels as confidential information would then drift downwards. Figure 4: Data Flows using MLS System MLS access rules are always combined with conventional access permissions (file permissions). For example, if a user with a security level of "Secret" uses Discretionary Access Control (DAC) to block access to a file by other users, this also blocks access by users with a security level of "Top Secret". A higher security clearance does not automatically give permission to arbitrarily browse a file system. Users with top-level clearances do not automatically acquire administrative rights on multi-level systems. While they may have access to all information on the computer, this is different from having administrative rights Multi-Category Security (MCS) Mult-Category Security (MCS) is an optional addition in SELinux that allows users to add categories to subjects and objects (in the range attribute of the security context). It is an extension on top of the current MLS implementation, although it does not follow the BLP model, and basically adds the additional constraint to the access check requiring that the categories that the process has must be a of the categories of the files it is accessing. Note that categories are defined as a set and not as a range, meaning that access is granted if the object s categories is a subset of the subject s categories (objects without a category can be accessed by anyone, provided they pass all previous access checks) Security Policy Policy is the set of rules that guide the SELinux security engine. It defines types for file objects and domains for processes, uses roles to limit the domains that can be entered, and has user identities to specify the roles that can be attained. Usually operating systems that come with SELinux pre-installed already provide a custom tailored policy like, for example, Red Hat Linux and CentOS. However, due to the modular nature of SELinux, it is extremely easy to customize or extend the current policy Modes There are 3 different modes of operation in SELinux: Enforcing: This tells the system to run with SELinux enforcing the currently active policy, watching all system access checks, stopping all denied accesses and logging all AVC violations. 7

8 Permissive: Functions the same way as in enforcing mode, except that it does not stop denied accesses (but still logs them). Disabled: The SELinux infrastructure is not enabled, therefore no policy can be loaded (or enforced) Permissive Domains SELinux lets the administrator change a single process type (domain) to be permissive. Which has the same implications as defined above, although only applying to a single process: Can be used for troubleshooting an issue in a single process without putting the entire system at risk by setting it to permissive. They allow an administrator to create policies for new applications without interfering with the rest of the system Booleans Minor modifications to SELinux policies can be made without modifying and recompiling the policy source by setting boolean values for optional features. Such features include allowing users to share their home directories under Samba or allowing Apache to serve files from users home directories which would otherwise be denied by the SELinux policy. 2.4 Utilities Show the current mode: $ getenforce Change the current mode to enforcing (non permanent): $ setenforce 1 Change the current mode to permissive (non permanent): $ setenforce 0 Configuration file: $ cat /etc/selinux/config Figure 5: Default configuration file Show security context of objects (files, folders, etc.): $ ls -Z 8

9 Figure 6: Security context of objects in / Show security context of subjects (running processes): $ ps auxz Figure 7: Security context of all processes running in the system Display the detailed status of a system running SELinux: $ /usr/sbin/sestatus -v Figure 8: SELinux Status Command to run a new shell in a new context, or role. Policy must allow the transition to the new role: $ /usr/bin/newrole Command to set the security context of one or more files by marking the extended attributes with the appropriate file or security context: $ /sbin/restorecon Command to check or correct the security context database on the file system: $ /sbin/fixfiles Command to list SELinux users: $ semanage user -l 9

10 Figure 9: SELinux Users Command to check the security context of logged user: $ id -Z 2.5 List of common problems Wrong Subject Context The program is running with the wrong subject context This happens when a program s executable file has the wrong context This happens when a third party software application installed and it is given an inappropriate SELinux file context This was fixed with a chcon command and the semanage commands. $ chcon --type=traceroute_exec_t /usr/bin/nmpa $ ls -Z /usr/bin/nmap $ -rwxr-xr-x. root root system_u:object_r:traceroute_exec_t:s0 /usr/vin/nmap $ semanage fcontext -a -t traceroute_exec_t /usr/bin/nmap Wrong Object Context The file begin accessed by the program has the wrong object context This can happen for any number of reasons The installation of third party software may result in files with wrong context because of inheritance from an upper level directory Often, configuration files end up with the wrong context as a result of how the system manager changes the configuration file. To repair the file, use the command: $ restorecon /path/to/file-name Right Subject and Object Context but No Access The program and the file have the correct contexts, but the policy should allow some operation between the two context, which is currently not allowed. In this case, it will be necessary to modify the SELinux policy First, consider looking threw the list of SELinux booleans for one that is related to the service which is not working using either getsebool or semanage. 10

11 3 How to install SELinux in a Debian System NOTE: These steps were checked and performed on an Virtual Machine running an instance of Ubuntu Get the default policy and the basic set of SELinux utilities by running: $ sudo apt-get install selinux-basics selinux-policy-default auditd 2. Download the _load_selinux_policy script (this is a slightly modified version of the script included in the Ubuntu selinux package), place it in /usr/share/initramfs-tools/scripts/initbottom/ then run: $ sudo update-initramfs -u 3. To configure GRUB and PAM and to create /.autorelabel run: $ sudo selinux-activate 4. Reboot, it will take a while to label the filesystems on boot and then it will automatically reboot a second time when that is complete. 5. To check that everything has been setup correctly and to catch common SELinux problems run: $ sudo check-selinux-installation You should now have a working SELinux system, which is in permissive mode. This means that the Policy is not enforced, but denials are logged. You can see all would-be denials since the last reboot with a small explanation for each with audit2why -al. If no critical audit errors appear in your syslog and you feel comfortable with SELinux, enable enforcing mode temporarily by running setenforce 1 or permanently by setting SELINUX=permissive on the config file located in /etc/selinux/config and then rebooting one last time. 11

12 4 Example Use Cases 4.1 MCS Usage Figure 10: Example categories To effectively use MCS, we need to be able to assign different sets of categories to different Linux users, even though they are all the same SELinux user (user_u). This is solved by introducing the concept of an SELinux login. This is used during the login process to assign MCS categories to Linux users when their shell is launched. Command to assign Linux users to SELinux user identities: $ semanage login -a Now when you list the SELinux users, you can see the Linux users assigned to a specific SELinux user identity: SELinux maintains a mapping between internal sensitivity and category levels and their humanreadable representations in the setrans.conf file. The system administrator edits this file to manage and maintain the required categories. Command to list the current categories: $ chcat -L 12

13 To modify the categories or to start creating our own, we need to modify the /etc/selinux/<selinuxtype>/setr file. For this example, we ll add the Marketing, Finance, Payroll and Personnel categories: Command to check the newly-added categories: $ chcat -L For these changes to take effect, we need to restart the MCS translation service as follows: Now that the required categories have been added to the system, we can start assigning them to SELinux subjects and objects. To further develop the example, let s assume that James is in the Marketing department, Daniel is in the Finance and Payroll departments, and Olga is in the Personnel department. Each of these users has already been assigned an SELinux login. Let us assign some categories to these users: List of users and respective categories after assigning: Let us now imagine we have the need to create a user for the CEO of the company Karl: 13

14 $ chcat We now need to assign categories to the various files on the system so that only the appropriate users can access them. For this example, we create a file in Daniel s home directory: Notice that at this stage the file has the default context for a file created in the user s home directory (user_home_t) and has no categories assigned to it. We can add the required category using the chcat command. Now when you check the security context of the file, you can see the category has been applied. In most cases, there is a need to assign more than one category to a file. For example, some files may need to be accessible to users from both the Finance and Payroll departments. Each of the categories that have been assigned to the file are displayed in the security context. It is possible to add or remove categories as required. Only users whose categories are a superset of the files categories are able to access it, assuming that Linux DAC and TE permissions would already allow the access. If a user who is assigned to a different category tries to access the file, they receive an error message: 14

15 5 Conclusion SELinux is a very mature product. NSA had been working on it for several years before releasing it to the Open Source community in December Even now it has been worked on by many individuals and companies. People in charge of application and data security will appreciate SELinux s robustness in dealing with zero-day exploits and poorly designed applications. Red Hat and Tresys both seem to be pretty interested in making SELinux easy to use and manage. Apart from RHEL and Fedora Core, users of Gentoo, Debian, and Ubuntu can also reap the benefits of SELinux. In addition to people interested in securing their desktop or their enterprise server, SELinux is also a good subject for students studying security in computer systems. It is a very vast topic and the main idea of this document was to give an overview of SELinux s architecture, methodologies and access control features. What the group found interesting was the level of modularity in the whole system and how easy it was to extend it or configure it for almost every need. References [1] Access Control [2] Mandatory Access Control (MAC) [3] Role Based Access Control (RBAC) [4] SELinux Wikipedia article [5] Secure Linux: Part 1. SELinux history of its development, architecture and operating principles [6] SELinux: Playing with fire [7] SELinux Wiki [8] SELinux - Gentoo Wiki [9] SELinux For Dummies (Video) [10] 2012 Red Hat Summit: SELinux For Mere Mortals (Video) [11] SELinux/Setup - Debian Wiki [12] Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide [13] Multi-Category Security (MCS) 15

SELinux Basics. Clint Savage Fedora Ambassador. Fedora Classroom November 9, 2008

SELinux Basics. Clint Savage Fedora Ambassador. Fedora Classroom November 9, 2008 SELinux Basics Clint Savage Fedora Ambassador Fedora Classroom November 9, 2008 What is SELinux? Another layer of security Created by the NSA / Red Hat Helps add to the multiple layers of defense Generally

More information

SELinux For Mere Mortals

SELinux For Mere Mortals SELinux For Mere Mortals (Or, Don't Turn It Off ) Dan Walsh Principal Software Engineer, Red Hat Thomas Cameron, RHCA Managing Solutions Architect, Red Hat June 23rd, 2010 Agenda About Us What is SELinux?

More information

SELinux Workshop Redux. Jamie Duncan, Senior Technical Account Manager RVaLUG - 18 April 2014

SELinux Workshop Redux. Jamie Duncan, Senior Technical Account Manager RVaLUG - 18 April 2014 SELinux Workshop Redux Jamie Duncan, Senior Technical Account Manager RVaLUG - 18 April 2014 Red Hat and SELinux Red Hat leads the way in SELinux development. John Dennis, Ulrich Drepper, Steve Grubb,

More information

SELinux Introduction. Jason Zaman FOSSASIA 2017 March 17th - 19th blog.perfinion.com

SELinux Introduction. Jason Zaman FOSSASIA 2017 March 17th - 19th blog.perfinion.com SELinux Introduction Jason Zaman FOSSASIA 2017 March 17th - 19th blog.perfinion.com Overview 1. Who am I? 2. What is SELinux? 3. DAC vs MAC 4. Type Enforcement 5. Labels 6. Sometimes SELinux denies badness

More information

Demystifying SELinux:

Demystifying SELinux: Demystifying SELinux: What is it trying to tell me? David Quigley dpquigl@davequigley.com 1 What is Access Control? A system for restricting who or what is allowed to access specific resources and how

More information

MANDATORY ACCESS CONTROL SECURITY ENHANCED LINUX (SELINUX)

MANDATORY ACCESS CONTROL SECURITY ENHANCED LINUX (SELINUX) OPERATING SYSTEM SECURITY GUEST LECTURE MANDATORY ACCESS CONTROL SECURITY ENHANCED LINUX (SELINUX) PATRICK UITERWIJK PUITERWIJK@REDHAT.COM / PATRICK.UITERWIJK.ORG GPG KEY: 4096R/0X9AB51E50 0 MANDATORY

More information

PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX

PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX Final Report 12/10/09 Mike Detwiler UMBC Student CMSC Course 426 Baltimore, MD Det1@umbc.edu Peter Coddington UMBC Student CMSC Course 626 Baltimore, MD

More information

SELinux Updates. Thorsten Scherf Senior Consultant. Red Hat Global Professional Services Berlin / Germany

SELinux Updates. Thorsten Scherf Senior Consultant. Red Hat Global Professional Services Berlin / Germany SELinux Updates Thorsten Scherf Senior Consultant Red Hat Global Professional Services 01.12.2011 Berlin / Germany Agenda SELinux review What happened to strict policy Policy customization and development

More information

10/23/12. Fundamentals of Linux Platform Security. Linux Platform Security. Roadmap. Security Training Course. Module 4 Introduction to SELinux

10/23/12. Fundamentals of Linux Platform Security. Linux Platform Security. Roadmap. Security Training Course. Module 4 Introduction to SELinux Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Linux Platform Security Module 4 Introduction to SELinux Roadmap Why SELinux? Overview

More information

Last time. User Authentication. Security Policies and Models. Beyond passwords Biometrics

Last time. User Authentication. Security Policies and Models. Beyond passwords Biometrics Last time User Authentication Beyond passwords Biometrics Security Policies and Models Trusted Operating Systems and Software Military and Commercial Security Policies 9-1 This time Security Policies and

More information

SELinux. Thorsten Scherf. Red Hat EMEA. October 2015

SELinux. Thorsten Scherf. Red Hat EMEA. October 2015 SELinux Thorsten Scherf Red Hat EMEA October 2015 What is wrong with UNIX security? Programs have full control over the access given to files they create (Discretionary Access Control DAC) Therefore no

More information

SELINUX FOR MERE MORTALS

SELINUX FOR MERE MORTALS SELINUX FOR MERE MORTALS (Or, Don't Turn It Off ) Thomas Cameron, RHCA, RHCDS, RHCVA, RHCSS, RHCX Managing Solutions Architect, Red Hat Wednesday, May 4th, 2011 Agenda About Us What is SELinux? About Us

More information

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné

More information

SELinux. Daniel J Walsh SELinux Lead Engineer

SELinux. Daniel J Walsh SELinux Lead Engineer SELinux Daniel J Walsh SELinux Lead Engineer 0 Day Exploits Patch Cycle Someone discovers a vulnerability in software Package Maintainer and OS Vendor Notified Fix generated/distributed Fix installed by

More information

Protect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt

Protect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt Protect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt Instructor, Consultant and Author Sandervanvugt.nl About Sander van Vugt Trainer, consultant and author Doing much

More information

SELinux: A New Approach to Secure Systems

SELinux: A New Approach to Secure Systems SELinux: A New Approach to Secure Systems by Chris Runge Abstract In this whitepaper, we will examine Security-Enhanced Linux (SELinux), the benefits it brings, and how Red Hat is working to make those

More information

SELINUX FOR MERE MORTALS

SELINUX FOR MERE MORTALS SELINUX FOR MERE MORTALS Thomas Cameron, Chief Architect, Red Hat 06.27.12 RHCA, RHCSS, RHCDS, RHCVA, RHCX Agenda About Us What is SELinux? Where did it come from? DAC vs. MAC So How Does SELinux Work?

More information

Security Enhanced Linux

Security Enhanced Linux Security Enhanced Linux Bengt Nolin beno9295@student.uu.se October 13, 2004 Abstract A very brief introduction to SELinux; what it is, what is does and a little about how it does it. 1 1 Background 1.1

More information

SECURITY ENHANCED LINUX FOR MERE MORTALS Thomas Cameron, RHCA, RHCSS, RHCDS, RHCVA, RHCX Chief Architect, Central US

SECURITY ENHANCED LINUX FOR MERE MORTALS Thomas Cameron, RHCA, RHCSS, RHCDS, RHCVA, RHCX Chief Architect, Central US SECURITY ENHANCED LINUX FOR MERE MORTALS Thomas Cameron, RHCA, RHCSS, RHCDS, RHCVA, RHCX Chief Architect, Central US Twitter: @thomasdcameron thomas@redhat.com Agenda About Us What is SELinux? Where did

More information

SE Linux Implementation LINUX20

SE Linux Implementation LINUX20 SE Linux Implementation LINUX20 Russell Coker IBM eserver pseries, Linux, Grid Computing and Storage Technical University 7/7/2004 Licensed under the GPL Topic Objectives In this topic students will learn

More information

Access Control. Discretionary Access Control

Access Control. Discretionary Access Control Access Control Discretionary Access Control 1 Outlines Access Control Discretionary Access Control (DAC) Mandatory Access Control (MAC) Role-Based Access Control (RBAC) 2 Access Control Access control

More information

SELinux. Don Porter CSE 506

SELinux. Don Porter CSE 506 SELinux Don Porter CSE 506 MAC vs. DAC By default, Unix/Linux provides Discretionary Access Control The user (subject) has discretion to set security policies (or not) Example: I may chmod o+a the file

More information

A Survey of Access Control Policies. Amanda Crowell

A Survey of Access Control Policies. Amanda Crowell A Survey of Access Control Policies Amanda Crowell What is Access Control? Policies and mechanisms that determine how data and resources can be accessed on a system. The Players Subjects Objects Semi-objects

More information

Discretionary Vs. Mandatory

Discretionary Vs. Mandatory Discretionary Vs. Mandatory Discretionary access controls (DAC) Privilege propagated from one subject to another Possession of an access right is sufficient to access the object Mandatory access controls

More information

Computer Security. 04r. Pre-exam 1 Concept Review. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 04r. Pre-exam 1 Concept Review. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 04r. Pre-exam 1 Concept Review Paul Krzyzanowski Rutgers University Spring 2018 February 15, 2018 CS 419 2018 Paul Krzyzanowski 1 Key ideas from the past four lectures February 15, 2018

More information

SECURITY ENHANCED LINUX FOR MERE MORTALS

SECURITY ENHANCED LINUX FOR MERE MORTALS SECURITY ENHANCED LINUX FOR MERE MORTALS Or, Don t Turn It Off! Thomas Cameron, RHCA, RHCSS, RHCDS, RHCVA, RHCX Digital Transformation Strategist, Red Hat May 3rd, 2017 AGENDA Agenda About Us What is SELinux?

More information

LINUX SECURITY PRIMER: SELINUX AND SMACK FRAMEWORKS KATHY TUFTO, PRODUCT MANAGER

LINUX SECURITY PRIMER: SELINUX AND SMACK FRAMEWORKS KATHY TUFTO, PRODUCT MANAGER LINUX SECURITY PRIMER: SELINUX AND SMACK FRAMEWORKS KATHY TUFTO, PRODUCT MANAGER E M B E D D E D S Y S T E M S W H I T E P A P E R w w w. m e n t o r. c o m INTRODUCTION With the proliferation of smart

More information

RHCE BOOT CAMP. Filesystem Administration. Wednesday, November 28, 12

RHCE BOOT CAMP. Filesystem Administration. Wednesday, November 28, 12 RHCE BOOT CAMP Filesystem Administration PARTITIONING What is partitioning? Splitting up a hard drive into organizable chunks Why? Isolates filesystem corruption Simplifies/speeds backups Allows optimizing

More information

Linux Capability Exploration Lab

Linux Capability Exploration Lab Laboratory for Computer Security Education 1 Linux Capability Exploration Lab Copyright c 2006-2009 Wenliang Du, Syracuse University. The development of this document is funded by the National Science

More information

Access control models and policies. Tuomas Aura T Information security technology

Access control models and policies. Tuomas Aura T Information security technology Access control models and policies Tuomas Aura T-110.4206 Information security technology 1. Access control 2. Discretionary AC 3. Mandatory AC 4. Other AC models Outline 2 ACCESS CONTROL 3 Access control

More information

Advanced Systems Security: Multics

Advanced Systems Security: Multics Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Security Enhanced Linux. Thanks to David Quigley

Security Enhanced Linux. Thanks to David Quigley Security Enhanced Linux Thanks to David Quigley History SELinux Timeline 1985: LOCK (early Type Enforcement) 1990: DTMach / DTOS 1995: Utah Fluke / Flask 1999: 2.2 Linux Kernel (patch) 2000: 2001: 2.4

More information

SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014

SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014 SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014 Introduction The expectation is that you will either have a virtual machine to use, or that you will revert any changes made to your machine

More information

Linux Systems Security. Security Design NETS Fall 2016

Linux Systems Security. Security Design NETS Fall 2016 Linux Systems Security Security Design NETS1028 - Fall 2016 Designing a Security Approach Physical access Boot control Service availability and control User access Change control Data protection and backup

More information

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 10 - Identity Management and Access Control MIS5206 Week 10 Identity Management and Access Control Presentation Schedule Test Taking Tip Quiz Identity Management and

More information

Red Hat Enterprise Linux 6

Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Last Updated: 2017-10-20 Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Mirek Jahoda Red Hat Customer Content Services mjahoda@redhat.com

More information

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control Last time Security Policies and Models Bell La-Padula and Biba Security Models Information Flow Control Trusted Operating System Design Design Elements Security Features 10-1 This time Trusted Operating

More information

Red Hat Enterprise Linux 6.4 Security-enhanced. Linux User Guide >>>CLICK HERE<<<

Red Hat Enterprise Linux 6.4 Security-enhanced. Linux User Guide >>>CLICK HERE<<< Red Hat Enterprise Linux 6.4 Securityenhanced Linux User Guide New and Changed Features for Red Hat Enterprise Linux 6.4. 1.1.6. New and Changed SELinux: Avoid SELinux on GFS2. 2.5.5. Setting Up NFS Over.

More information

Operating system security models

Operating system security models Operating system security models Unix security model Windows security model MEELIS ROOS 1 General Unix model Everything is a file under a virtual root diretory Files Directories Sockets Devices... Objects

More information

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System

More information

Red Hat Enterprise Linux 6 Security-Enhanced Linux. User Guide

Red Hat Enterprise Linux 6 Security-Enhanced Linux. User Guide Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Security-Enhanced Linux Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Edition 2.0 Author Copyright 2010 Red Hat, Inc. The text

More information

Computer Security. 02r. Assignment 1 & Access Control Review. Paul Krzyzanowski David Domingo Ananya Jana. Rutgers University.

Computer Security. 02r. Assignment 1 & Access Control Review. Paul Krzyzanowski David Domingo Ananya Jana. Rutgers University. Computer Security 02r. Assignment 1 & Access Control Review Paul Krzyzanowski David Domingo Ananya Jana Rutgers University Spring 2019 Question 1 What three Internet-enabled vulnerability categories does

More information

Access Control. Steven M. Bellovin September 13,

Access Control. Steven M. Bellovin September 13, Access Control Steven M. Bellovin September 13, 2016 1 Security Begins on the Host Even without a network, hosts must enforce the CIA trilogy Something on the host the operating system aided by the hardware

More information

Access Control Models

Access Control Models Access Control Models Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Access Control Models Access Control to regulate

More information

2/26/13. Hands-on SELinux: A Practical Introduction. Roadmap. SELinux Tools. Security Training Course. Day 1: Day 2: GUI

2/26/13. Hands-on SELinux: A Practical Introduction. Roadmap. SELinux Tools. Security Training Course. Day 1: Day 2: GUI Hands-on SELinux: A Practical Introduction Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Day 1: Why SELinux? Overview of SELinux Using SELinux SELinux Permissive Domains

More information

Operating Systems Linux 1-2 Measurements Background material

Operating Systems Linux 1-2 Measurements Background material Operating Systems Linux 1-2 Measurements Background material Introduction The Linux measurements were designed to allow you to have an impression about the administration of Linux severs along with providing

More information

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency Background / Motivation Increasing desire to use mobile devices throughout the US government.

More information

Security Principles and Policies CS 136 Computer Security Peter Reiher January 15, 2008

Security Principles and Policies CS 136 Computer Security Peter Reiher January 15, 2008 Security Principles and Policies CS 136 Computer Security Peter Reiher January 15, 2008 Page 1 Outline Security terms and concepts Security policies Basic concepts Security policies for real systems Page

More information

Red Hat Enterprise Linux 7

Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 7 SELinux User's and Administrator's Guide Basic and advanced configuration of Security-Enhanced Linux (SELinux) Last Updated: 2017-12-22 Red Hat Enterprise Linux 7 SELinux User's

More information

Working with Ubuntu Linux. Track 2 Workshop June 2010 Pago Pago, American Samoa

Working with Ubuntu Linux. Track 2 Workshop June 2010 Pago Pago, American Samoa Working with Ubuntu Linux Track 2 Workshop June 2010 Pago Pago, American Samoa Assumptions You are comfortable with the following: Core Linux concepts - Shells - Permissions - Graphical user interface

More information

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao Chapter 9: Database Security: An Introduction Nguyen Thi Ai Thao thaonguyen@cse.hcmut.edu.vn Spring- 2016 Outline Introduction to Database Security Issues Types of Security Threats to databases Database

More information

Policy, Models, and Trust

Policy, Models, and Trust Policy, Models, and Trust 1 Security Policy A security policy is a well-defined set of rules that include the following: Subjects: the agents who interact with the system, Objects:the informational and

More information

Instructions: Step 1: Respond to the following: IT131 Linux+

Instructions: Step 1: Respond to the following: IT131 Linux+ IT131 Linux+ Course Objectives Upon completion of this course, the student will be able to: 1. Create a new installation of Fedora/RHEL; 2. Use utilities to manage the Fedora/RHEL system; 3. Describe how

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

SELinux news in Fedora 16. Miroslav Grepl

SELinux news in Fedora 16. Miroslav Grepl SELinux news in Fedora 16 Miroslav Grepl ABSTRACT SELinux overview File name transitions Pre-built policy Shrinking policy Permissivedomains module 2 3 WHAT IS SELINUX WHAT IS SELINUX SELinux knows if

More information

Release Notes for Snare Linux Agent Release Notes for Snare for Linux

Release Notes for Snare Linux Agent Release Notes for Snare for Linux Release Notes for Snare for Linux InterSect Alliance International Pty Ltd Page 1 of 17 About this document This document provides release notes for the Snare Enterprise Agent for Linux. InterSect Alliance

More information

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013 RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2 3 June 2013 Developed by Red Hat, NSA, and DISA for the DoD Trademark Information Names, products,

More information

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus Linux system administrator-i Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective:

More information

Fedora 12 Security-Enhanced Linux

Fedora 12 Security-Enhanced Linux Fedora 12 Security-Enhanced Linux User Guide Murray McAllister Scott Radvan Daniel Walsh Dominick Grift Eric Paris James Morris Security-Enhanced Linux Fedora 12 Security-Enhanced Linux User Guide Edition

More information

Software Security and Exploitation

Software Security and Exploitation COMS E6998-9: 9: Software Security and Exploitation Lecture 8: Fail Secure; DoS Prevention; Evaluating Components for Security Hugh Thompson, Ph.D. hthompson@cs.columbia.edu Failing Securely and Denial

More information

CSCI 420: Mobile Application Security. Lecture 7. Prof. Adwait Nadkarni. Derived from slides by William Enck, Patrick McDaniel and Trent Jaeger

CSCI 420: Mobile Application Security. Lecture 7. Prof. Adwait Nadkarni. Derived from slides by William Enck, Patrick McDaniel and Trent Jaeger CSCI 420: Mobile Application Security Lecture 7 Prof. Adwait Nadkarni Derived from slides by William Enck, Patrick McDaniel and Trent Jaeger 1 cryptography < security Cryptography isn't the solution to

More information

Fouad Riaz Bajwa. Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA.

Fouad Riaz Bajwa. Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA. Fouad Riaz Bajwa Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA. www.ifossf.org Worst Security Threats Sharing Knowledge What makes FOSS secure?

More information

UNIT 9 Introduction to Linux and Ubuntu

UNIT 9 Introduction to Linux and Ubuntu AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 9 Introduction to Linux and Ubuntu Learning Objectives Participants will understand the basics of Linux, including the nature,

More information

How to Use This Lab Manual

How to Use This Lab Manual 3 Contents How to Use This Lab Manual........................................ 5 Lab 1: Setting Up the Student System.................................. 7 Lab 2: Installing Fedora............................................

More information

Security Models Trusted Zones SPRING 2018: GANG WANG

Security Models Trusted Zones SPRING 2018: GANG WANG Security Models Trusted Zones SPRING 2018: GANG WANG Access Control Slides credit to Ethan L. Miller and Scott A. Brandt Protection Domains Three protection domains Each lists objects with permitted operations

More information

What's New with SELinux

What's New with SELinux What's New with SELinux Stephen D. Smalley sds@tycho.nsa.gov National Information Assurance Research Laboratory National Security Agency National Information Assurance Research Laboratory 1 Advances in

More information

Access Control. Steven M. Bellovin September 2,

Access Control. Steven M. Bellovin September 2, Access Control Steven M. Bellovin September 2, 2014 1 Security Begins on the Host Even without a network, hosts must enforce the CIA trilogy Something on the host the operating system aided by the hardware

More information

Access control models and policies

Access control models and policies Access control models and policies Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2013 1. Access control 2. Discretionary AC 3. Mandatory AC 4. Other AC models Outline

More information

Metasploit. Installation Guide Release 4.4

Metasploit. Installation Guide Release 4.4 Metasploit Installation Guide Release 4.4 TABLE OF CONTENTS About this Guide Target Audience...1 Organization...1 Document Conventions...1 Support...2 Support for Metasploit Pro and Metasploit Express...2

More information

SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting

SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting Synopsis: This is the second System Administration class, a follow-on class for new administrators with limited networking

More information

Access control models and policies

Access control models and policies Access control models and policies Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 1. Access control 2. Discretionary AC 3. Mandatory AC 4. Other AC models Outline

More information

Computer Security. Access control. 5 October 2017

Computer Security. Access control. 5 October 2017 Computer Security Access control 5 October 2017 Policy and mechanism A security policy is a statement of what is, and what is not, allowed. A security mechanism is a method, tool or procedure for enforcing

More information

Table of Contents. About this Guide..3. This workis licensed under a Creative Commons Attribution 2.5 License. Getting Help..4. Welcome to Pinnacle..

Table of Contents. About this Guide..3. This workis licensed under a Creative Commons Attribution 2.5 License. Getting Help..4. Welcome to Pinnacle.. Installation Guide Table of Contents About this Guide..3 This workis licensed under a Creative Commons Attribution 2.5 License. Getting Help..4 Welcome to Pinnacle..4 Introduction..4 Organizational Hierarchy..4

More information

Fedora 11 Security-Enhanced Linux

Fedora 11 Security-Enhanced Linux Fedora 11 Security-Enhanced Linux User Guide Murray McAllister Daniel Walsh Dominick Grift Eric Paris James Morris Scott Radvan Security-Enhanced Linux Fedora 11 Security-Enhanced Linux User Guide Edition

More information

Security Enhanced Linux

Security Enhanced Linux Security Enhanced Linux Security Group Meeting 29 November 2002 Steven J. Murdoch http://www.cl.cam.ac.uk/users/sjm217/ Computer Laboratory, University of Cambridge Copyright c Steven. J. Murdoch p.1 Summary

More information

CMPSC 497 Attack Surface

CMPSC 497 Attack Surface Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA CMPSC 497 Attack Surface

More information

Getting Started with Linux

Getting Started with Linux Getting Started with Linux For those with experience using Microsoft Windows there will be many familiar ways of operating in a Linux environment. There are also a few key differences. The main differences

More information

L.A.M.P. Stack Part I

L.A.M.P. Stack Part I L.A.M.P. Stack Part I By George Beatty and Matt Frantz This lab will cover the basic installation and some configuration of a LAMP stack on a Ubuntu virtual box. Students will download and install the

More information

Cloud Under Control. HyTrust Two-Man Rule Solution Brief

Cloud Under Control. HyTrust Two-Man Rule Solution Brief HyTrust Two-Man Rule Solution Brief Summary Summary The exposure of extremely confidential national security information by an N.S.A. systems administrator highlighted the catastrophic consequences of

More information

CIS433/533 - Introduction to Computer and Network Security. Access Control

CIS433/533 - Introduction to Computer and Network Security. Access Control CIS433/533 - Introduction to Computer and Network Security Access Control Professor Butler Winter 2011 Computer and Information Science Trusted Computing Base The trusted computing base is the infrastructure

More information

Red Hat Enterprise Linux 6 Managing Confined Services. Guide to configuring services under control of SELinux

Red Hat Enterprise Linux 6 Managing Confined Services. Guide to configuring services under control of SELinux Red Hat Enterprise Linux 6 Managing Confined Services Guide to configuring services under control of SELinux Managing Confined Services Red Hat Enterprise Linux 6 Managing Confined Services Guide to configuring

More information

Red Hat Enterprise Linux 7 Getting Started with Cockpit

Red Hat Enterprise Linux 7 Getting Started with Cockpit Red Hat Enterprise Linux 7 Getting Started with Cockpit Getting Started with Cockpit Red Hat Enterprise Linux Documentation Team Red Hat Enterprise Linux 7 Getting Started with Cockpit Getting Started

More information

SELi He nux a dlin in F e edora 8 Dan N W am als e h Red D H a at te

SELi He nux a dlin in F e edora 8 Dan N W am als e h Red D H a at te SELinux Headline Fedora 8 Dan Walsh Name Red Hat Date SELinux History In Fedora Fedora 2 SELinux Introduced Strict Policy, Disabled, Confine User/Daemons Fedora 3 Targeted Policy, Enabled,

More information

P1_L6 Mandatory Access Control Page 1

P1_L6 Mandatory Access Control Page 1 P1_L6 Mandatory Access Control Page 1 We discussed access control in the last lesson. But that was only one kind of access control called discretionary access control, or DAC. That allows you to decide

More information

RHCSA BOOT CAMP. Filesystem Administration

RHCSA BOOT CAMP. Filesystem Administration RHCSA BOOT CAMP Filesystem Administration PARTITIONING What is partitioning? Splitting up a hard drive into organizable chunks Why? Isolates filesystem corruption Simplifies/speeds backups Allows optimizing

More information

CompTIA SY CompTIA Security+

CompTIA SY CompTIA Security+ CompTIA SY0-501 CompTIA Security+ https://killexams.com/pass4sure/exam-detail/sy0-501 QUESTION: 338 The help desk is receiving numerous password change alerts from users in the accounting department. These

More information

Fedora 21 SELinux User's and Administrator's Guide

Fedora 21 SELinux User's and Administrator's Guide Fedora 21 SELinux User's and Administrator's Guide Basic and advanced configuration of Security-Enhanced Linux (SELinux) Barbora Ančincová Murray McAllister Scott Radvan Daniel Walsh Dominick Grift Eric

More information

Discretionary Access Control (DAC)

Discretionary Access Control (DAC) CS 5323 Discretionary Access Control (DAC) Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 7 ravi.utsa@gmail.com www.profsandhu.com Ravi Sandhu 1 Authentication, Authorization, Audit AAA

More information

Fall 2014:: CSE 506:: Section 2 (PhD) Securing Linux. Hyungjoon Koo and Anke Li

Fall 2014:: CSE 506:: Section 2 (PhD) Securing Linux. Hyungjoon Koo and Anke Li Securing Linux Hyungjoon Koo and Anke Li Outline Overview Background: necessity & brief history Core concepts LSM (Linux Security Module) Requirements Design SELinux Key elements Security context: identity

More information

Linux Kernel Security Overview

Linux Kernel Security Overview Linux Kernel Security Overview Linux Security Summit Europe 2018 Edinburgh, UK James Morris jmorris@namei.org $ whoami Linux kernel security subsystem maintainer Linux kernel engineer at Microsoft Previously

More information

9/18/14. Hands-on SELinux: A Practical Introduction. Roadmap. SELinux Tools. Security Training Course. Day 1: Day 2: GUI

9/18/14. Hands-on SELinux: A Practical Introduction. Roadmap. SELinux Tools. Security Training Course. Day 1: Day 2: GUI Hands-on SELinux: A Practical Introduction Security Training Course Dr. Charles J. Antonelli The University of Michigan 2014 Day 1: Why SELinux? Overview of SELinux Using SELinux SELinux Permissive Domains

More information

CIS 76 Ethical Hacking Building an open source Pentest Sandbox, carrying out a Remote Code Execution exploit, and Remediating the RCE vulnerability.

CIS 76 Ethical Hacking Building an open source Pentest Sandbox, carrying out a Remote Code Execution exploit, and Remediating the RCE vulnerability. CIS 76 Ethical Hacking Building an open source Pentest Sandbox, carrying out a Remote Code Execution exploit, and Remediating the RCE vulnerability. Ryan Borden December 3, 2017 Contact: ryanborden81@gmail.com

More information

Introduction to Security and User Authentication

Introduction to Security and User Authentication Introduction to Security and User Authentication Brad Karp UCL Computer Science CS GZ03 / M030 14 th November 2016 Topics We ll Cover User login authentication (local and remote) Cryptographic primitives,

More information

Installing MediaWiki using VirtualBox

Installing MediaWiki using VirtualBox Installing MediaWiki using VirtualBox Install VirtualBox with your package manager or download it from the https://www.virtualbox.org/ website and follow the installation instructions. Load an Image For

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

IBM Security Identity Manager Version Planning Topics IBM

IBM Security Identity Manager Version Planning Topics IBM IBM Security Identity Manager Version 7.0.1 Planning Topics IBM IBM Security Identity Manager Version 7.0.1 Planning Topics IBM ii IBM Security Identity Manager Version 7.0.1: Planning Topics Table of

More information

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Enterprise Network Security Describe the general methods used to mitigate security threats to Enterprise networks

More information

Top considerations for implementing secure backup and recovery. A best practice whitepaper by Zmanda

Top considerations for implementing secure backup and recovery. A best practice whitepaper by Zmanda Top considerations for implementing secure backup and recovery A best practice whitepaper by Zmanda In the last few years there have been many headlines about high-profile incidents of lost or stolen backup

More information

"Charting the Course... MOC B: Linux System Administration. Course Summary

Charting the Course... MOC B: Linux System Administration. Course Summary Description Course Summary This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional Linux system administrator. The course covers

More information

Introduction To Linux. Rob Thomas - ACRC

Introduction To Linux. Rob Thomas - ACRC Introduction To Linux Rob Thomas - ACRC What Is Linux A free Operating System based on UNIX (TM) An operating system originating at Bell Labs. circa 1969 in the USA More of this later... Why Linux? Free

More information