Linux security

Alan McKinnon alan at linuxholdings.co.za
Sat Apr 29 23:01:57 UTC 2006


On Saturday 29 April 2006 20:31, Daniel Carrera wrote:
> Alan McKinnon wrote:
> > The benefit with Linux is that it's
> > harder to deploy the malware in the first place and it's much
> > harder to get it to be executable (execute bit and umask).
>
> Ok, I know the execute bit part. What makes it harder to deploy?
> Are we just relying on Firefox being secure?

All the points raised so far on this thread are basically deployment 
issues, from the wide diversity of clients (too many targets = 
shotgun approach slows down infection rates) to the side effect of 
OSS having more eyes on it to the execute bit to users not running 
with admin rights.

These all make it harder to get the malware onto the machine in an 
executable format than the comparable things for Windows. So it's a 
multi-layer defense.

> > If you ever have this debate with an MS fundie, I suggest you
> > side step that problematic question by (validly) pointing out
> > that the other guy is setting up a straw man.
>
> Where's the strawman? It seems like a valid question to me (the
> question is not "is Linux perfect?" but "is it less vulnerable?").

Your hypothetical debate moves through deployment issues onto what 
happens when the software actually runs. You have the MS guy saying 
that once that happens your personal user data is essentially toasted 
(and you go <gulp> and don't have an answer). The strawman is 
assuming (and maybe claiming) this has something to do with Linux 
being less secure than it's touted to be. It isn't, at that point 
Linux, Windows and every other OS I've seen will all let you destroy 
your own data with equal efficiency. So it becomes a silly argument 
where the OSes are actually equal. No, strike that, I just thought of 
one small benefit you could implement in Linux: create /home/backups 
readable and accessible only by root, and add hardlinks there to 
files you want to protect against deletion. Malware can then 
'rm -rf ~' all it wants but the files are not actually deleted. A long 
winded approach to be sure and it might take some time to set up but 
after that cron is your friend.

That's why I say you should keep the debate to the question of 
preventing the malware from being deployed at all, and Linux provides 
many tools to do just that. Granted, apps like Firefox can be set up 
to download and run just about anything which does erode your 
security, but I guess we have to live with that possibility (just not 
live with having it run like that out the box...)

-- 
If only you and dead people understand hex, 
how many people understand hex?

Alan McKinnon
alan at linuxholdings dot co dot za
+27 82, double three seven, one nine three five




More information about the ubuntu-users mailing list