Linux Networking

Read Complete Research Material



Linux Networking

Introduction

This paper will analyze Linux networking, in addition to focusing at three different types of Linux security technologies those follow with SELinux, chroot jail, and iptables. These technologies aid in prevention of identity theft. I will help you understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them.

Under the GPL in late 2000 SElinux was released from the Office of Information Assurance of National Security Agency. More recently, the open source community developed it with assistance from NSA. Being at present Fedora Core's part, SElinux is assisted by Red Hat. Also, there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. Mandatory Access Control is the main concept behind SElinux. Based on MAC, the administrators have control over every interaction on the software of the system (Brown, 2010).

The concept of least privileged is used by users who along with default applications have no rights. According to the system's security, rights belong to the administrator and are granted by them only. The DAC also helps as ownership of files is only under the user who then has full access and control over them.

Discussion

If user accounts are attacked or penetrated into, anything can be done with and to the file belonging to that user. Standard Unix permissions still exist on the system , and are consulted before the SElinux policy during access attempts. SElinux is not involved if access is denied by standard permissions. However, SElinux is involved if access is allowed by the standard permissions, policies will then be consulted, accessed, gained or denied according to the contexts of the source or the object being targeted.

During the development of Version 7 Unix in 1979 the chroot system call was introduced 1 ½ years before 4.2BSD was realeased, Bill Joy added it to BSD on 18 March 1982 so that's its installation and build system could be tested. Chroot jail; one of UNIX based operating systems like Linux, is a common platform that segments file systems portioned to a specific user. As far as web server is considered, this is very handy for the protection of shared hosting accounts. Limited rights holding users can search top level files if Chroot jail is not present. Although that user does not have permission to change anything they can invade the files and target specific ones and get the information they want.

Virtualization with Virtual Private Server (VPS) is a meaningful use for Chroot jail. Since users have their own operating systems installed in the chroot directory they only hold fundamental authority for their own accounts, being clueless if higher directories even exist.. Chroot is not designed to restrain deliberate tries in order to gain access or attack the server but it is a useful form of preventative security. Other security methods that are available need ...
Related Ads