APLawrence.com -  Resources for Unix and Linux Systems, Bloggers and the self-employed


© December 2004 Tony Lawrence

Trusted Computing Base. The programs (more technically, objects and processes) that are trusted to do what they are supposed to do (and only what they are supposed to do), and that would put the system at risk if compromised. On traditional Unix systems, any program run by root is part of the TCB (whether or not you should be trusting it). That's because traditional Unix is a DAC (Discretionary Access Control) system, but "root" is allowed to bypass all controls.

MAC (Mandatory Access Control) systems don't necessarily allow a user like root that can bypass anything. However, because it is difficult to administer a system without an overall administrator with great privilege, MAC systems tend to concentrate on specific areas where power is limited. For example, Windows systems have the concept of ownership where not even the administrator can necessarily access a file owned by someone else. The administrator can take ownership for itself, but that's a one way trap door: once taken, the administrator can't give it back.

In the Linux world, SELinux is a MAC system. It is imported to understand that a MAC system doesn't necessarily mean "trusted". From the SELinux FAQ:

The phrase "Trusted Operating System" generally refers to an
operating system that provides sufficient support for multilevel
security and evidence of correctness to meet a particular set of
government requirements. Security-enhanced Linux incorporates useful
ideas from these systems but focuses upon mandatory access controls.
It is expected that this work would be combined with other efforts
(e.g., auditing and documentation) to construct a "trusted" system.
The initial focus of Security-enhanced Linux development has been
to create useful functionality that delivers tangible protection
benefits in a wide range of real-world environments in order to
demonstrate the technology.

Got something to add? Send me email.

(OLDER)    <- More Stuff -> (NEWER)    (NEWEST)   

Printer Friendly Version


1 comment

Inexpensive and informative Apple related e-books:

Take Control of OS X Server

Take Control of the Mac Command Line with Terminal, Second Edition

Take Control of Apple Mail, Third Edition

Take Control of Pages

Take Control of Automating Your Mac

More Articles by © Tony Lawrence

---December 20, 2004

Well I think that in NSA/Government terms the "trusted operating system" is something that mets bueacratic criteria. That's with the documentation and stuff like that means.

Also SELinux isn't a operating system anyways. It's just a kernel with patches and some extra programs needed to support MAC. The "linux isn't a operating system, it's a kernel" type thing.

Currently Fedora Core3 supports SELinux by default. They don't go with very invasive rule set, only convenent proccesses that are exposed to networks or the internet get put under the default ruleset. However they have other rulesets that are more agressive you can use if you realy want to them, makes for a awkward desktop OS, though. Fedora Core2 had support for SElinux, but had a strong ruleset and you had to enable it at install time thru a boot arguement.



Printer Friendly Version

Have you tried Searching this site?

This is a Unix/Linux resource website. It contains technical articles about Unix, Linux and general computing related subjects, opinion, news, help files, how-to's, tutorials and more.

Contact us

Printer Friendly Version

Any sufficiently advanced technology is indistinguishable from magic. (Arthur C Clarke)

Linux posts

Troubleshooting posts

This post tagged:





Unix/Linux Consultants

Skills Tests

Unix/Linux Book Reviews

My Unix/Linux Troubleshooting Book

This site runs on Linode