APLawrence.com -  Resources for Unix and Linux Systems, Bloggers and the self-employed

TCB, MAC, DAC

2004/12/20

Trusted Computing Base. The programs (more technically, objects and processes) that are trusted to do what they are supposed to do (and only what they are supposed to do), and that would put the system at risk if compromised. On traditional Unix systems, any program run by root is part of the TCB (whether or not you should be trusting it). That's because traditional Unix is a DAC (Discretionary Access Control) system, but "root" is allowed to bypass all controls.

MAC (Mandatory Access Control) systems don't necessarily allow a user like root that can bypass anything. However, because it is difficult to administer a system without an overall administrator with great privilege, MAC systems tend to concentrate on specific areas where power is limited. For example, Windows systems have the concept of ownership where not even the administrator can necessarily access a file owned by someone else. The administrator can take ownership for itself, but that's a one way trap door: once taken, the administrator can't give it back.

In the Linux world, SELinux is a MAC system. It is imported to understand that a MAC system doesn't necessarily mean "trusted". From the SELinux FAQ:

The phrase "Trusted Operating System" generally refers to an
operating system that provides sufficient support for multilevel
security and evidence of correctness to meet a particular set of
government requirements. Security-enhanced Linux incorporates useful
ideas from these systems but focuses upon mandatory access controls.
It is expected that this work would be combined with other efforts
(e.g., auditing and documentation) to construct a "trusted" system.
The initial focus of Security-enhanced Linux development has been
to create useful functionality that delivers tangible protection
benefits in a wide range of real-world environments in order to
demonstrate the technology.
 


Got something to add? Send me email.



1 comment



Increase ad revenue 50-250% with Ezoic


More Articles by

Find me on Google+

© Tony Lawrence




---December 20, 2004

Well I think that in NSA/Government terms the "trusted operating system" is something that mets bueacratic criteria. That's with the documentation and stuff like that means.

Also SELinux isn't a operating system anyways. It's just a kernel with patches and some extra programs needed to support MAC. The "linux isn't a operating system, it's a kernel" type thing.

Currently Fedora Core3 supports SELinux by default. They don't go with very invasive rule set, only convenent proccesses that are exposed to networks or the internet get put under the default ruleset. However they have other rulesets that are more agressive you can use if you realy want to them, makes for a awkward desktop OS, though. Fedora Core2 had support for SElinux, but had a strong ruleset and you had to enable it at install time thru a boot arguement.

--Drag



------------------------
Kerio Connect Mailserver

Kerio Samepage

Kerio Control Firewall

Have you tried Searching this site?

Unix/Linux/Mac OS X support by phone, email or on-site: Support Rates

This is a Unix/Linux resource website. It contains technical articles about Unix, Linux and general computing related subjects, opinion, news, help files, how-to's, tutorials and more.

Contact us





If you lie to the computer, it will get you. (Perry Farrar)

What do such machines really do? They increase the number of things we can do without thinking. Things we do without thinking — there's the real danger. (Frank Herbert)







This post tagged: