SELinux last straw

Arthur Pemberton pemboa at gmail.com
Wed Oct 17 20:04:37 UTC 2007


On 10/17/07, Les Mikesell <lesmikesell at gmail.com> wrote:
> Arthur Pemberton wrote:
> >>>
> >> The shortcut test is to su to the user in question and try to access the
> >> file/device.  The only slightly more complicated way is to walk down the
> >> path looking at the permissions for user/group/other on the file and the
> >> directories above.
> >
> > Well, these "traditional" methods didn't work for your friend Karl,
> > since he was hacked with them.
>
> Perhaps he had a false sense of security from the supposed other layers
> claimed to be present, when paying attention to the obvious would have
> been more beneficial.  That's the main reason I question the value of
> SELinux in the first place.  It doesn't come into play unless you have
> already made a mistake with the simple things and it diverts attention
> and makes it appear to be unimportant to get those things right.


You know, this is why I don't even think it makes sense discuss these
kind of things. So far, everyone arguing against SELinux is never
fully aware of the facts at hand.

First of all, you've launched yet another attack on SELinux simply
because Karl said it was SELinux, never mind that there is a high
likely hood that he is wrong.

Now, you're insinuating that his expectations of SELinux caused him to
practice poor traditional security and so he got hacked. Which
completely ignores the fact that he did not have SELinux when he got
hacked.

And, just recently there are (unsubstantiated) claims from ebay that
attacks from rooted Linux boxes are on the rise. I have no numbers,
but by intuition is that very few of those boxes had SELinux running
in enforcing mode, while they did have traditional UNIX security.



-- 
Fedora 7 : sipping some of that moonshine
( www.pembo13.com )




More information about the fedora-list mailing list