The document presents an overview of Linux security, emphasizing its multi-user architecture and robust security features, including user authentication, resource management, and cryptography. It discusses mechanisms such as the .rhosts file, access control lists (ACLs), and mandatory access control (MAC) systems, highlighting their roles in managing access and protecting data. The conclusion stresses that while Linux offers comprehensive security capabilities, it requires careful configuration to optimize protection.
INTRODUCTION
Being amulti-user system - Linux have a
tremendous amount of security to offer; many being
open source, which can be validated and modified to
meet anyone’s needs.
Security mechanisms allow users to service
their legitimate needs without compromising the
server system security.
Resource and file management maintain
integrity
User privileges are granted.
Overall system stability and correctness do not
suffer.
3.
AUTHENTICATION
User entersusername and password via login
Passwords are hashed .
Encryption cannot be reversed
Stored in /etc/passwd or /etc/shadow
Pluggable authentication modules (PAMs)
Can reconfigure the system at run time to include
enhanced authentication techniques
Supports smart cards, Kerberos and voice
authentication
CRYPTOGRAPHY
Enables usersto access several forms of encryption to
protect their data
Uses powerful algorithms such as DES, AES and MD5
Kernel uses Cryptographic API to implement IPSec
Enables users to create secure (encrypted) file systems
Loopback device:
Layer between the virtual file system and the existing file
system
Can be used to encrypt and decrypt data transferred
between processes and the underlying file system
ADMINISTERING TRUSTED USERSAND HOSTS
The .rhosts file exists in a user's home
directory
Specifies trusted hosts based on the users
choice
More headaches for administrator - loss of
control
Solution - disable or monitor contents.
8.
In /etc/pam.d/limits.conf
Limit processes per user.
Limit memory usage.
LIMITING USER ACCESS TO SYSTEM RESOURCES
9.
SYSTEM SECURITY VIEW
Rootof Trust (e.g., TCG/TPM)
Virtualization Layer
Linux Kernel
Other
System
Trusted
Application
Application
User
authentication
Access
control
(transitions)
Firewall
Port scan
IDS
Crypto, Protocol, Access control
Administration
Set
Access
Policy
Audit
IDS
Patch
Harden
10.
ACL/MAC PERMISSIONS
Access ControlList
Almost modern files
systems, include ACLs
to give unprivileged
access to only certain
users.
Permissions are
separated by owner ,
group , and others .
Permissions are
displayed as
rwx rwx rwx
Mandatory Access Control
More sophisticated form
of permissions handling.
This is more like
application patching, it
limits what permission
each program is given.
MAC programs include:
AppArmor, SELinux,
SEBSD, GrSecurity,
Trusted Solaris and
Trusted BSD.
11.
MEMORY ACCESS
Eachprocess has its own page table.
All memory access via page table.
Easy for OS to terminate process which references
an invalid memory address.
Access control information for page held in the
page table entry (PTE).
Prevents executable code from being overwritten
Separates kernel code and user code.
12.
FIREWALLS
Firewalls aremeans of controlling what information
is allowed into and out of your local network.
Linux Firewalls are ;-
IPTables
SELinux
Scalable
Robus
13.
GRAPHICAL FIREWALL CONFIGURATION
UTILITIES
Linux supports several graphical tools that can be
used to set up a firewall
Red Hat Linux includes the lokkit program that
walks you through questions and establishes rules
based on your security choices
Red Hat Linux also includes the firewall-config
program, which allows the set up of complex
firewall rules
14.
CONCLUSION
Linux isa versatile OS.
Security implementation in the OS is spread
throughout the system - memory management, file
management, process management, etc.
Therefore every aspect of security needs to be
configured from scratch since default is not
maximum security.