Preview

Security Enhanced Linux (Selinux), Chroot Jail, and Iptables

Good Essays
Open Document
Open Document
679 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Enhanced Linux (Selinux), Chroot Jail, and Iptables
Security Enhanced Linux (Selinux), Chroot Jail, and Iptables

Security Enhanced Linux (Selinux), Chroot Jail, and Iptables
Three of the most important types of Linux security technologies are Security Enhanced Linux (SELinux), chroot jail, and iptables. This security measures aide in the subversion of theft and malicious activity. We will discuss these items in depth to address who created them and for what reason. Along with how these technologies changed the operating system to enforce security, and the types of threats that these security systems are design to eliminate.
Security Enhanced Linux was released in December of 2000 from the National Security Agency (NSA), under the GNU general public license. SELinux is not a Linux distribution; it is a set of kernel modifications and tools that can be added to a variety of Linux distributions. SELinux is currently a part of Fedora Core, and it is supported by Red Hat. Incarnations of SELinux packages are also available for Debian, SuSe, and Gentoo. Security-enhanced Linux is a set of patches to the Linux kernel and some utilities to incorporate a strong, flexible Mandatory Access Control (MAC).
The Chroot system call was introduced during the development of Version 7 Unix in 1979, and added by Bill Joy on 18 March 1982, a year and a half before 4.2BSD was released in order to test its installation and build system. A chroot on a UNIX based operating systems, like Linux, is an operation that changes the apparent root directory for the current running process and its children. A program that is run in such a modified environment cannot name or access files outside the designated directory tree. On a web server, it is very useful for the security of shared hosting accounts. Without a chroot jail a user with limited file permissions can navigate to the top level directories. Although that user does not have permission to make changes, they can invade the files and access information.
An important use of chroot is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS Update appliance * Patch/Configuration appliance * Embedded biometrics * Remote policy management * Endpoint Encryption * Secure browser * Secure Email * Incremental backup…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Lab Report

    • 1967 Words
    • 8 Pages

    This lab consists of two parts. Make sure you label each section accordingly and answer all the questions.…

    • 1967 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    In this lab, you practiced properly securing a Linux server system. You performed the steps to secure the bootloader, enable iptables, and run SELinux to help lock down the Linux OS. You also applied ACLs to directories and files to secure file and data access and then checked those ACLs and permissions on the system.…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Liaskos, J., & Sandy, G. A. (2004). An evaluation of Internet use policies of Victorian local…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Is418 Project 1-2-3

    • 1343 Words
    • 6 Pages

    Unix security systems were designed into the architecture. Raw hardware devices are protected from direct access, and the file system has an inbuilt security system giving individual access to files on three levels, user only, group membership, and world access. Each category has read, executable and write flags that may be set in any combination. Kernel -or- System…

    • 1343 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Jang, Michael H.. Security strategies in Linux platforms and applications. Sudbury, MA: Jones & Bartlett Learning, 2011.…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Week 5 Pos 355

    • 2010 Words
    • 9 Pages

    Operating systems were not in existence before the 1960s. The definition of operating systems is a program designed to run other programs on the computer and is the most important program. In the past, computers were built to execute a series of single task similar to a calculator. In the 1960s came the MCP (Master Control Program) for the B5000 mainframe computer created by the company Burroughs/Unisys. The MCP was the first OS written exclusively in a high-level language. As the years progressed, OS giants were starting to form such as Windows, Linux, and Mac. In, this paper, these 3 tech OS giants will be examined thoroughly while covering memory management, process management, file management, and security.…

    • 2010 Words
    • 9 Pages
    Better Essays
  • Best Essays

    Linux Course Project

    • 2602 Words
    • 11 Pages

    References: Bodnar, L. (2005, October 5). A Look at EnGarde Secure Linux 3.0. Retrieved from http://lwn.net/Articles/154522…

    • 2602 Words
    • 11 Pages
    Best Essays
  • Good Essays

    5. You have forgotten the purpose of the -n option in the cat command. Which of the following can you enter at the Linux command line to find out what the -n option does when used with cat?…

    • 2601 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    to create a directory that a server thinks is the root directory, thereby blocking access by the server to all other areas of the file system…

    • 1032 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The original task team at First World Bank Savings and Loan has concerns about the…

    • 849 Words
    • 4 Pages
    Satisfactory Essays
  • Best Essays

    Unix/Linux

    • 2760 Words
    • 12 Pages

    At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active are just a few of the ways that help close the gap to unauthorized entry. An advantage UNIX seems to have is its’ lack of popularity, a piece of security in itself, most malicious activity is aimed at the ever-growing Windows empire.…

    • 2760 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Unix File Protection

    • 716 Words
    • 3 Pages

    UNIX offers a file protection system that is straightforward and simple to use. However, many people are not aware of the value of this powerful mechanism. A secure environment is achieved not only by the operating system, but also through vigilant user and administrative practices. There are many schemes and mechanisms used in the UNIX operating system, as well as some simple tricks that are available to give the kind of file protection administrators want. For the purpose of this paper, a company with 5,000 employees, where 4,990 employees are allowed access to a specific file will be assessed.…

    • 716 Words
    • 3 Pages
    Good Essays