Contributed by jose on from the onlamp-and-devworks dept.
The first two are from the Big Scary Daemon column on BSD. These articles discuss the use of groups to achieve security. By using this approach, multiple read and write groups can be created, allowing for controlled access to files. The second is a sudo tutorial . The sudo tool allows for controlled escalated priviledge use for multiple users.
Lastly, the IBM DeveloperWorks site has a nice article on web server security . Noting the number of httpd and SSL security issues lately, this one is worth a good read.
(Comments are closed)
By RC () on
Since it would take a small ammount of work to allow files to belong to multiple (~3) groups, and have different permissions for each group (RW, R), what is the TrustedBSD project doing with their piles of funding?
Comments
By schubert () on
Comments
By RC () on
I've seen far too much of this 'rather than address the issue, let's start name-calling' tactic.
Comments
By Anonymous Coward () on
TrustedBSD is a very cool project. The all-or-nothing model of root and user perms is a very bad idea and we can't get a higher level of security until we get rid of it. Just to possibly head off some name calling, me saying that TrustedBSD is on the right path does not equate to saying that OpenBSD isn't on the right path, of course, because there are several variants of the right path in this case, I think.
Comments
By Anonymous Coward () on
Comments
By Sam () on
If it does what you want and you can understand it, why not use it? If you can't understand it, maybe that says something.
It is quite clear what Micro and Trusted BSD do
by reading their websites. Which is what they're there for.
Comments
By SKULL () on
Well, reading a website is just as good or honest
as the designer or pr or sales people want to be. If we just read certain websites whose name begins with an M and ends with ICROSOFT you might conclude that their products are secure. Their ads say so, and so does their website, right?
A website only tells you what they want to tell you, and simply calling themselves "secure" is a difficult or impossible to evaluate statement for most people, or perhaps anyone.Where are the security standards?
I have yet to even see a really solid explanation of a neutral method of evaluating OS security that presumably OpenBSD would do well on(?).
The statement about exploitable defaults is too easy to win by simply turning everything off - does that mean redhat 6.2 is secure if I repackage it with everything turned off and then send it to you? It's still problematic.
The source code audit is something that sounds like a good thing, but the audits suffer from problems too - they miss things. And how to you measure two different audited products? By the number of auditors, or number of hours? And presumably a well coded but unaudited piece of software is better than bad audited code. Do we prefer the bad code /because/ it's audited?
Which brings us back to /good/ code? Who evaluates it? And what standards?
One of the things which brings insecurity is bad administration and bad configuration, something which is wholly unaddressed in many discussions. By burying good administrative practices in complex (but arguably good) docs, much good administration goes unimplemented. Who cares if it's well written, perfectly audited, but then badly configured-and-thus-insecure software? That people declaim responsibility after the initial release doesn't mean that that is a logical break in the chain of a claim for security. If I make something that is easy made into something I don't intend (i.e. insecure) is it really secure?
Comments
By francisco () on http://www.blackant.net/
definitely bad administration is OS independant.
this points to one benefit of running nothing by default and having good docs. everything you need, you must turn on and hence you know what you did. even if you are new and dont understand it, you are forced into responsibility, forced into at least knowing one source of information on the functionality in question.
By RC () on
> perms is a very bad idea and we can't get
> a higher level of security until we get rid of it.
You're right it is a bad idea... POOF! It's already gone. It's quite trivial make a user account, then selectively give them permissions to certain programs and files. The only time it's a Root-or-nothing sdituation is if you don't know how to use the Unix permissions effectively to delegate privlidges to certian users.
Throw in TCP/UDP port ACLs and Unix's permsissions are suffeciently powerful... And by that I mean you can do practically everything that you could with ACLs, without the needless added complexity.
You can say TrustedBSD is on the right path, but at least give some example of what features it has added that other BSDs/Unixes don't have.
By zil0g () on
(now really guys... let's all have a chill-pill)
By Anonymous Coward () on
Comments
By RC () on
Unlike writers for certain websites (*Ahem*), I don't get paid for spewing out crappy articles on incredibly easy subjects. Nor do I get anything from writing a great and wonderful article that might help a great many people, so the motivation just isn't there.
Conversly, Unix pros get paid based on what they know, that the competition doesn't. So the more I give away, the less valuable I am in the job market.
Comments welcome.
By Anonymous Coward () on
Comments
By Jeff Flowers () on
Comments
By mra () on
By Anonymous Coward () on
By AP () a_prades@yahoo.com on mailto:a_prades@yahoo.com
Comments
By Anonymous Coward () on