LOL!!!
I feel you bruce :)
I think a LOT of people are struggling (and frustrated, rightfully so) with SELinux and simply place it in permissive mode. There is nothing wrong with doing this. Don't buy into the fear mongering hype. The only think you have to fear is fear itself.
If/when security is a concern (which in your case it doesn't seem to be) then SELinux is a powerful tool. You would run it along with Tripwire, rkhunter, et al, to validate the security of a server, and by the time it becomes so you can look back over the audit trail to see where perms need to be added etc...
If you are just looking to experiment, exposed to the internet or not, SELinux is really irrelevant, and in many cases can be cumbersome. I personally have had to disable SELinux (permissive mode) many a time to get things to work, and I have yet to have a system compromised by doing so. Not that this can't happen, but the actual chances of it happening are so low, that you ROI is simply not worth it. There really is not some army out their hit small ops looking for vulnerabilities in anything that's not a standard package.
So experiment and produce at will with little to fear. A lot of hype is built around SELinux in naiveté. Someone who really cares about security actually does not rely on SELinux, they monitor their servers intensely, and know every process running on them inside and out, review logs often, use tripwire, rkhunter, and monitor network activity with Security Onion, etc....
Again, this is not to say that SELinux is not part a good strategy, but it is not the holy grail many make it out to be either. It's a small part of security that as you mentioned a lot of use common folk can live without, and have done so for a long time, with no adverse effects.
On Jan 25, 2016, at 7:29 AM, bruce badouglas@gmail.com wrote:
--Gawd...
Feels like I'm trying to spit in the wind!!
1st, not trying to set up web servers, but am looking at running tests on linux servers.
2nd, recognize that one should have "secure" systems on the net, but realize I don't have the time/set of skills to "fully" get there...
So, if you want to say -- hey, don't have an insecure linux box, it could be hacked and cause us the Internet community probs due to your crap, that's fair.
But you need to realize, there are lots of people who are attempting to do as much as they can with limited resources/time. if anyone here wants to contact me offline, we can discuss. Heck, I've been looking for a "sysadmin" type that I can pay, talk with for a bit.
If fed/selinux had a "config" file for simple services/ports, great.. But when you get to policies, and understanding the nuances of selinux, as far as I can tell, it's a learning curve that has to be dealt with in order to get it right..
And to be honest, I know of a number of operations/organizations that have put the "security" sysAdmin stuff off until they could find a sysadmin resource for that function..
There are lots of "rails/php/nodejs/etc.. " and lots of "be a coder in 4 weeks" courses. that only get to the basics of coding, much less the sysadmin stuff..
None of these are going away.. so some guy who pops up a website/app on some aws instance.. has security issues that they might not even realize..
Anyway.. thanks guys!
On Mon, Jan 25, 2016 at 9:28 AM, Tim ignored_mailbox@yahoo.com.au wrote:
Allegedly, on or about 25 January 2016, bruce sent:
I fully get the need for security.. But if I can't get the security working as it should, but I still need to build whatever the project might be.. the project is going to get created.
If running Selinux in permissive mode is enough, great, so be it.
SELinux in permissive mode is *not* secure. You're using the computer in an insecure mode, and all SELinux is doing is logging the things that it would have stopped.
But when it comes to policies, for differnt users, applications, files,etc.. and the possiblity of screwing something up if you go wrong, then you have a bit of an issue there...
I run webservers, mailservers, fileservers, DNS servers, DHCP servers. And I haven't had to turn off SELinux, nor do anything beyond open the configurator GUI and tick the boxes that said to allow those particular services (look through its list, find HTTPD server, tick it, find serving CGI scripts, tick that, etc., that was about the extent of what I had to do). Seriously, setting that right was a damn sight easier than configuring any of those servers.
If you find something is failing because SELinux is stopping it, chances are that /that/ something is badly written, and needs doing better. Is it trying to serve files it has no business serving? Is it trying to execute things that it shouldn't execute but merely read? There's a plethora of dumb things people try to do with their programs, and stopping those dumb things is the solution, not allowing them.
Do you ignore programming error messages, too?
And you can't simpy tell someone, "if you don't know what you're doing, don't mess with linux!" Not going to happen..
I can say if you don't know what you're doing, don't do it on the internet. Dumb things on the internet don't just affect you, they affect other people around you. That's why we have masses of spam on the internet, and other hacks. Compromised user boxes, compromised ISP services, abound.
ps. To all who've replied in favor of someone not really implementing a fed/centos/linux instance unless secure, I take it you're also illing to provide pointers/help if someone asks, yes? (And not just saying go look at youtube vides, or read docs!!)
Here's a loaded weapon, point it at your own foot, and not in our direction... No, I wouldn't give someone advice on how to insecurely run their computer, and neither will plenty of others. You will find, however, that if you try doing it securely, and run into snags, that people are willing to help you solve the actual problem properly.
Webservers and mailservers, in particular, are at least two things that need to be run with a great deal of care. Hackers go searching for badly set up ones to do their nefarious deeds. And here you are advertising that you're going to do so, identifying yourself in the process.
-- [tim@localhost ~]$ uname -rsvp Linux 3.9.10-100.fc17.x86_64 #1 SMP Sun Jul 14 01:31:27 UTC 2013 x86_64
Boilerplate: All mail to my mailbox is automatically deleted, there is no point trying to privately email me, I only get to see the messages posted to the mailing list.
Windows, it's enough to make a grown man cry!
-- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org
-- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org