22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

364 Lotus Security Handbook<br />

problems as other operating systems. The major security issues for Linux are the<br />

following:<br />

► Root account: The one major rule that is regularly ignored is that “the root<br />

account should not be used unless absolutely necessary.” The reason for this<br />

rule is found in the power that root access offers to the person who uses it.<br />

Like the Administrator account in Windows NT®, root is the highest-level<br />

interactive login account that exists in Linux. The danger lies in the fact that<br />

most exploited programs run with the permissions of the user who activated<br />

that program. In other words, if the root account is being used while surfing<br />

the Internet and a script is inadvertently executed on a Web page, this script<br />

would then have root access, and could conceivably access any file or even<br />

delete the entire file system. Worse, some distributions (such as Lindows)<br />

require the use of the root account during installation and operation.<br />

► Complexity: By far the most threatening issue regarding Linux is a complex<br />

set of commands, concepts, and programs that must be understood for<br />

security to be properly implemented. In fact, this can easily be seen when<br />

Linux is installed for the first time by the newbie system administrator. While<br />

some Linux distributions (versions) have started making decisions on behalf<br />

of the person installing them, many Linux operating systems require the<br />

installer to choose between cryptically named programs – contained<br />

generally in packages and installed with rpm – or just installing the entire<br />

operating system. Unfortunately, the list of several hundred programs is often<br />

overwhelming. As a result, the person ends up installing the entire operating<br />

system, including the HTTP daemon, FTP daemon, mail daemons, and so<br />

forth – none of which are secure by default.<br />

► Networking OS: As Maximum Linux Security states, “Although Linux is well<br />

suited to personal use (even in non-networked environments), it is still<br />

inherently a network operating system. Default Linux installations run many<br />

Internet services, and unless you take proper precautions, attackers can<br />

target these services remotely throughout the duration of your online<br />

session.” This pretty much says it all.<br />

► Open source updates: Much of the software created for Linux is written by<br />

students, research groups, or software companies who are trying to find a<br />

way to make Linux software profitable. When this is combined with the fact<br />

that Linux is open source, it means that all the software is open to<br />

examination by the world, and there exists a potential security nightmare. The<br />

problem is not that open source software is any more insecure than<br />

proprietary software. In fact, Linux vendors are known for having updates or<br />

patches within hours of a reported security vulnerability. Instead, the problem<br />

is that system administrators never receive word about these updates. For<br />

example, Red Hat releases as many as five security bulletins a day that need<br />

to be reviewed by a system administrator to see if they're applicable. While

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!