selinux??

Sylvia Sánchez lailahfsf at gmail.com
Tue Jan 26 17:06:49 UTC 2016


Totally agree with you, Bruce.



Cheers,
Sylvia


On Tuesday, 26 January 2016, bruce <badouglas at gmail.com> wrote:

> What the Heck???
>
> So.. people who think/decide to just disable seLinux, instead of
> diving in to "learn" it are just lazy????  Lord.. shaking my head..
>
> How about.. some might be lazy..
>
> Or, some have a bunch of different things to get accomplished, and
> aren't looking to be a sysAdmin, so they want to (if possible) get to
> the quickest way of getting their "project" working/tested.. And if
> the "security/process" of X (in this case selinux) is in the way.. The
> learning required to implement that gets shoved back. It's a
> prioritization process for a bunch of people.
>
> You have a limited amount of resources, you priortize and keep going.
> And yeah, you realize that you might be cutting corners re security,
> but you keep going.
>
> And before people say, "you need to learn security, or you shouldn't
> be writing apps!!".. not going to happen.
>
> Implementing "good" secutiry, doesn't happen by spending a few hours
> on a few sites. You eventually run into issues that "need to be
> solved", etc.. which then adds time/effort/resources. And rightly so,
> this is why you have skilled sysAdmin resources. But smaller projects
> don't have the resources for this process.. so it becomes a matter of
> prioritization/resource allocation..
>
> And I say again.. I've been willing to pay hard $$$ for someone
> willing to work with me on security.. No takers..!!!
>
> So, please, no disparaging "laxy" remarks, ok!
>
> Thanks!
>
>
> On Mon, Jan 25, 2016 at 11:21 PM, Tim <ignored_mailbox at yahoo.com.au
> <javascript:;>> wrote:
> > Allegedly, on or about 25 January 2016, vendor at billoblog.com
> <javascript:;> sent:
> >> Did you mean "hacked" or "attacked?"
> >
> > To me an attack is the attempt, a hack is they've succeeded.  They
> > succeeded.  Though, to be fair, I didn't say it was Linux computer, but
> > the principle is the same.  All computers are vulnerable, though in our
> > case it's more the applications than the OS.  And if you take no steps
> > to protect your system, or worse, take steps to remove protection, you
> > lay yourself wide open.
> >
> >> The problem I see with selinux is that it is so user-unfriendly.
> >> These kinds of things always seem easy and straightforward to someone
> >> who knows it well.  That's the nature of skill, regardless of the kind
> >> of skill it is.
> >
> > I see it no less user-friendly than other things.  I look at ACL (access
> > control lists), and see them as a nightmare.  I can see them being used
> > in security establishments, to control who can see or modify certain
> > documents that need disseminating.  But not in general use.  I can't
> > really imagine employee #54534624 writing a letter, then carefully
> > considering a list of who can do what with their file (mutter, mutter,
> > need to add my boss to read/write, my assistant to read/write, my
> > technically hopeless other boss to read-only so he doesn't foul up my
> > work, my co-workers to read-only, and I have to remember which of them
> > are working on the same case...).
> >
> > Barring oversights and errors, SELinux generally does what it's supposed
> > to do.  If I create a file in /var/www/html/ to be served, it
> > automatically gets given the right contects to be served, as part of the
> > process of *creating* a file at that location.  If I copy a file from
> > somewhere to there, the same thing happens, the copy is a new creation,
> > and gets the appropriate contexts for where it's created.  A confusing
> > thing happens if you try to move a file, the original file contexts are
> > moved along with the file, and they're probably going to be wrong.  It's
> > logical, but not obvious to the uninitiated.  Though it's not too hard
> > to find out why, you just problem solve it like any other error that
> > takes you by surprise.
> >
> > It's similar with file permissions.  Some people declare it too hard,
> > and want to make everything rwxrwxrwx, and hang the consequences.  On a
> > webserver, that (making everything world-writeable), or letting the
> > webserver process own the files (making everything writeable by the
> > server, and hence world-writeable), opens you up to all sorts of abuse,
> > not just the destruction of that individual file.
> >
> >> That's what I think of when I read these discussions.  If someone is
> >> struggling with something like this, they may seem like morons, but it
> >> is usually someting *other* than simple supidity or laziness that is
> >> the reason.  It's because the barrier to doing it is greater than the
> >> perceived benefit.
> >
> > At times, but the tone of the thread indicates that laziness is an
> > issue.
> >
> >> There is a truism that I remember being told about computer security a
> >> long, long time ago that usability and technical security are
> >> inversely related.  At some point, when you increase the technical
> >> security enough, you will have made the system unusable to the point
> >> that your users will simply start going around it simply to get their
> >> work done.
> >
> > That's true on both counts.  Though I tend to feel that SELinux has met
> > that balance at around the right place.
> >
> > While I have some sympathy for people who haven't yet learnt it, as they
> > try to do something.  My efforts are towards learn it, don't bypass it.
> > Just the same as well tell people don't do things as root - that's often
> > the root cause, pun intended, of all of these issues.  They do one dumb
> > thing, then another on top of that, and have several compounded problems
> > because they will not follow any advice.
> >
> > It's usually around this point that I bring up an analogy against people
> > trying to do things on computers when they don't really know how, and
> > stubbornly resist all efforts to learn:  I hope these people never get
> > it into their head to half-arsedly learn first aid, and refuse to do
> > something important because they don't want to.
> >
> >> ...[snip flash drive story]...
> >
> > I can understand that, and it's not a new story, either.  The need to do
> > it is understandable.  The concept of doing it in isolation can be a
> > required step.  If the drive manages to do something nasty, it only
> > affects that one computer, which then gets sterilised before being
> > allowed back on the network (if the operator knows that, and doesn't
> > just plug it back in, regardless).
> >
> > We had similar issues with floppy discs.  Back when bootblock viruses
> > were the common enemy, there was no/inadequate protection against them.
> > The only way to stop the spread, was a cold boot in between, and using a
> > system that booted from the disc in question.  That method was no good
> > against an OS that had another disc-based OS running it.
> >
> >> The combination of security that ignores users and users that ignore
> >> security gives you a system that has neither security nor usability.
> >> And simply calling users morons will not solve this.
> >
> > I don't believe I've said that.  In this email I've certainly mentioned
> > laziness, because the evidence points that way.
> >
> > As a general rule, on a user-level, SELinux doesn't get even thought
> > about, here.  It's in the background, and doesn't get in the way.  If
> > you're running services, then it rightly does become something you need
> > to know about managing.
> >
> > But what particularly gets my goat, it someone who's a programmer
> > developing things telling me that SELinux is too hard to deal with.  Too
> > hard?  Compared with what?  Writing software?!  Jeez, you've got much
> > harder work, *there*.  And, as far as I'm concerned, programmers being
> > hit with the big hammer that says, you have to write data in proper
> > locations, you can't just read any file you like on the system, you
> > can't just serve out files from any ad-hoc locations, is only a good set
> > of conditions to start imposing on so-called programmers.  Bring on the
> > software that pokes them with a sharp stick for doing things that allows
> > them to create buffer-overflow errors.  We could save the entire world a
> > whole lot of grief if programmers started paying attention to getting
> > that one bit of programming right.
> >
> >> I love KDE, but frankly, it is collapsing under it's own complexity.
> >
> > I can't say I've ever liked it.  It has the Fisher-Price toy look like
> > XP had, and a gazillion configuration options that I do not like the
> > defaults, and it's always been that way (ever since I saw it, a
> > gazillion configuration options).  Coming from an Amiga user background,
> > I've never agreed with what people said about Gnome looking like
> > Windows, no KDE does.  Gnome looked far more old Mac-like.
> >
> > The other thing that peeved me about KDE (and I can see this thread is
> > going to open a new can of worms), is the naming of all programs
> > starting with a K followed by a name that seems purely random (regarding
> > what the program actually did).  Not only making it hard to locate
> > software appropriate to your task, but confusingly k-naming things like
> > kernal-things got k-named (kmod, anyone? - a kernel module, or a KDE
> > something).
> >
> >>  Selinux is just another exmple.  I used to like linux because it made
> >> sense.  Now it seems that it's little different than Windows sometimes
> >> -- opaque, overly complex, and unfriendly.
> >
> > I don't think anything compares with the hideousness of Windows.  So
> > much of it is secret business, and I don't just mean closed-source.
> > Resolving some whacko fault involves delving into the registry, adding
> > things with sixteen hexadecimal numbers which mean nothing to no-one,
> > that are only documented on hacking sites, or incomprehensible gibberish
> > on the Microsoft that refers to two versions of Windows ago, warns
> > against doing it on your release, yet the Microsoft search engine
> > provides it as your solution.
> >
> > We now return you to your regular programming, from
> > alt.computers.help.me.commit.die.quickly
> >
> > --
> > [tim at localhost ~]$ uname -rsvp
> > Linux 3.9.10-100.fc17.x86_64 #1 SMP Sun Jul 14 01:31:27 UTC 2013 x86_64
> >
> > Boilerplate:  All mail to my mailbox is automatically deleted, there is
> > no point trying to privately email me, I only get to see the messages
> > posted to the mailing list.
> >
> > Lucky for you I typed this, you'd never be able to read my handwriting.
> >
> >
> >
> > --
> > users mailing list
> > users at lists.fedoraproject.org <javascript:;>
> > To unsubscribe or change subscription options:
> > https://admin.fedoraproject.org/mailman/listinfo/users
> > Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
> > Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
> > Have a question? Ask away: http://ask.fedoraproject.org
> --
> users mailing list
> users at lists.fedoraproject.org <javascript:;>
> To unsubscribe or change subscription options:
> https://admin.fedoraproject.org/mailman/listinfo/users
> Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
> Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
> Have a question? Ask away: http://ask.fedoraproject.org
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.fedoraproject.org/pipermail/users/attachments/20160126/1b166bc5/attachment.html>


More information about the users mailing list