Originally posted by: drag
Originally posted by: n0cmonkey
Originally posted by: kamper
Also:
http://www.trustedbsd.org/ I believe it's meant to be merged back into FreeBSD when it's considered finished.
I think they've been slowly merging things back over time. Not positive though.
Some people use systrace to lock down everything on OpenBSD. Don't know if that's the same idea or not...
Not really.
The closest I've seen anyone come in OpenBSD (besides removing ACL type stuff that wasn't being used) is Trusted Path Execution, and I don't think that falls in the category of MAC. Interesting stuff though, worth looking into if you've got an older machine (the Stephanie patches weren't maintained).
Linux has SELinux, LIDS, and AppArmour (subdomain?) for MAC. There's also GRSecurity for RBAC. Interesting stuff.
Yep. The difference between Linux's MAC and everybody else's, except Solaris's, is that it's in active use in the real world right now. Of course that can change.
Looked up that TrustedFreeBSD thing. Kinda interesting. They ported SELinux to FreeBSD, in turn they ported the FreeBSD version to OpenDarwin which in turn gets ported to OS X. So maybe OS X will get MAC after all.
🙂
Out of SELinux and AppArmor I think that AppArmor is more interesting. The rules are much simplier for AppArmor. Basic read/write/execute for file access, for instance and use of familar wildcards.
Also there are tools for automaticly monitoring the execution of a program and build a profile for that program based on that. It has the ability to learn and build profiles for your applications which later you can use to help lock down the program.
http://en.opensuse.org/AppArmor_Detail
http://developer.novell.com/wiki/index.php/Apparmor_FAQ
Basicly a apparmor is something that a average administrator can actually use were as SELinux is for the more hardcore security systems.
I read in a blog were a person used the tools to automaticly generate a profile for a version of Firefox with a known buffer overflow with publicly aviable exploits. Then he implimented it and tried to exploit it and basicly just couldn't. So it's actually something that may help protect your system from zero-day exploits... At least for the applications you have 'locked down'.
edit:
It's already being ported to other distros..
Here is a page for a version built for Slackware.
http://danieldk.org/apparmor/
Also includes a example of building a profile for traceroute
http://danieldk.org/apparmor/profile-example.html