- by Jack Bryar -
This week brought an Outlook disaster as yet another virus took down
every Windows system in sight. I'm so sick of viruses and badly written
software. Unfortunately, I don't think switching the world to some
standard vanilla Linux would solve the problem. It is better, but not
foolproof. However, there is a version of Linux that could make viruses a
of the past. If I could only get past that
weird feeling I have concerning the people who wrote it.Today's column nearly didn't make it to print today.
All connectivity at my primary employer effectively ceased for nearly six
hours when one of our salespeople opened a cute little note from a
It said, "Hi, How are you? When I saw this screen saver, I immediately
thought about you. I am in a harry, I promise you will love it."
She didn't love it one bit. Soon everyone in her Microsoft Outlook
book was sent the same message with the same copy of the W32/Goner@MM
worm virus, disguised as an alleged screen saver, GONE.SCR. In
the meantime her system was wrecked. Files were altered. Executables
were messed up.
Once again MS Outlook was the vehicle for taking down an
entire business. It's always something. A few weeks ago the virus de
jour was Sircam. Despite all the patches and tweaks, there is always something
being made by someone that can change and even delete files and even
entire applications running on Microsoft's monopoly platform.
Microsoft isn't the only OS with built-in security holes, although it
is easily the worst. If anything it does better than some of its competitors at fixing those holes.
According to a Netcraft
survey, the Code Red virus that popped up earlier this year
prompted Microsoft to offer a cumulative patch to fix many of the most glaring
security holes in their system. It also prompted many users to pay attention
implement the patch. Meanwhile, security problems on Sun remain
uncorrected. Even Linux systems have been hit with viruses. Based on the
of defacements reported by a German
that tracks such things, Linux and Apache can be messed with, as well.
Whatever its flaws, Linux, like all other members of the Unix
family, is a lot more difficult to attack with viruses. The partitioned
user/administrator-level permissioning architecture is far more secure in fighting the types of large-scale attacks that show up on Windows systems with depressing regularity.
In addition, file types are easier to shelter from the end user, making
it much more difficult to set up a Trojan horse. Finally, programs
like Tripwire provide additional protection for systems administrators,
allowing them to catch a greater share of nuisance code before it can do any
These features of Linux architecture are among the many reasons that
several governments have begun to champion Linux as an alternative platform.
year RedFlag Linux was
being promoted by China's security apparatus as an alternative to a
platform many felt was too vulnerable (not to mention too American).
Even today, RedFlag is being promoted using an interesting phrase, as "an
alternative solution for
governments, armies, and businesses." Elsewhere, governments such as India
been less public about their Linux preferences. However, even as it has been
criticized in the Indian media for ignoring the technological
threat posed by Jihadi extremists and Kashmiri separatists, India has quietly
hardened its communications backbone using redundant, Linux-based systems in
Nevertheless, Linux remains a vulnerable architecture. As Avi Fogel
pointed out in a LinuxSecurity.com article earlier this year, Linux, like Windows, has little in the way of intrusion detection
More importantly, it lacks sufficiently granular network or file access
controls. There's a first principle at stake here; there is something
fundamentally wrong with
ANY system that allows code to automatically change executables and
other core files without a user permission.
Oddly enough, the most important intelligence arm of the U.S.
government has prepared a fix and wants you to have it, no questions asked.
the beginning of the year, the formerly secretive National Security Agency ported
to Red Hat Linux 7.1 a security feature people there had built into the NSA's
Mach Operating System's microkernel. This "Security-Enhanced Linux" has been released as a GPL package with support
and can be downloaded from the agency's Web site. Admittedly, there's no tutorial for
"SELinux" package and when you try to set group policies and configure
domain management, you're on your own, but it is secure.
SELinux employs an access control system that uses data types and
a variety of rules-based enforcement protocols as a means for setting up
both confidentiality and integrity rules on user systems. The result is
a highly flexible, yet highly secure system with enforcement rules
embedded into a discrete "security server." The server contains the policies
each type of data and on each each type of data acts on another piece of
data. SELinux revalidates the security permission schema for each file
type each time it is used.
The result is that a virus cannot succeed in a SELinux system. In the
unlikely event that a virus could even be introduced into an SELinux-based
system, and then
executed, the virus should not be able reproduce onto an executable file. In
theory, this shouldn't happen because
Unix programs shouldn't have more than read or write permissions anyway, but in this case, SELinux would also prevent propagation of the virus
the reach of each program executable is restricted to its own "type."
any of the executables that would normally be targets for the virus are
effectively walled off. Even attacking the root won't have an effect on
the policies structure. The system may not be foolproof, but as a
intelligently configured alternative it beats traditional Unix
and it beats Windows hands down.
Perhaps your company doesn't think replacing Windows with Linux is
the hassle. But if their systems crashed because of Code Red or Systran
or Goner -- or perhaps all three, have them take a look at SELinux, and
-- have a conversation.