# # TCB, MAC, DAC
APLawrence.com -  Resources for Unix and Linux Systems, Bloggers and the self-employed

TCB, MAC, DAC

I've removed advertising from most of this site and will eventually clean up the few pages where it remains.

While not terribly expensive to maintain, this does cost me something. If I don't get enough donations to cover that expense, I will be shutting the site down in early 2020.

If you found something useful today, please consider a small donation.



Some material is very old and may be incorrect today

© December 2004 Tony Lawrence
2004/12/20

Trusted Computing Base. The programs (more technically, objects and processes) that are trusted to do what they are supposed to do (and only what they are supposed to do), and that would put the system at risk if compromised. On traditional Unix systems, any program run by root is part of the TCB (whether or not you should be trusting it). That's because traditional Unix is a DAC (Discretionary Access Control) system, but "root" is allowed to bypass all controls.

MAC (Mandatory Access Control) systems don't necessarily allow a user like root that can bypass anything. However, because it is difficult to administer a system without an overall administrator with great privilege, MAC systems tend to concentrate on specific areas where power is limited. For example, Windows systems have the concept of ownership where not even the administrator can necessarily access a file owned by someone else. The administrator can take ownership for itself, but that's a one way trap door: once taken, the administrator can't give it back.

In the Linux world, SELinux is a MAC system. It is imported to understand that a MAC system doesn't necessarily mean "trusted". From the SELinux FAQ:

The phrase "Trusted Operating System" generally refers to an
operating system that provides sufficient support for multilevel
security and evidence of correctness to meet a particular set of
government requirements. Security-enhanced Linux incorporates useful
ideas from these systems but focuses upon mandatory access controls.
It is expected that this work would be combined with other efforts
(e.g., auditing and documentation) to construct a "trusted" system.
The initial focus of Security-enhanced Linux development has been
to create useful functionality that delivers tangible protection
benefits in a wide range of real-world environments in order to
demonstrate the technology.
 

If you found something useful today, please consider a small donation.



Got something to add? Send me email.





(OLDER)    <- More Stuff -> (NEWER)    (NEWEST)   

Printer Friendly Version

->
-> TCB, MAC, DAC

1 comment


Inexpensive and informative Apple related e-books:

Take Control of OS X Server

Take Control of the Mac Command Line with Terminal, Second Edition

Take Control of Apple Mail, Third Edition

Take Control of Pages

Take Control of Automating Your Mac





More Articles by © Tony Lawrence




---December 20, 2004

Well I think that in NSA/Government terms the "trusted operating system" is something that mets bueacratic criteria. That's with the documentation and stuff like that means.

Also SELinux isn't a operating system anyways. It's just a kernel with patches and some extra programs needed to support MAC. The "linux isn't a operating system, it's a kernel" type thing.

Currently Fedora Core3 supports SELinux by default. They don't go with very invasive rule set, only convenent proccesses that are exposed to networks or the internet get put under the default ruleset. However they have other rulesets that are more agressive you can use if you realy want to them, makes for a awkward desktop OS, though. Fedora Core2 had support for SElinux, but had a strong ruleset and you had to enable it at install time thru a boot arguement.

--Drag



------------------------


Printer Friendly Version

Have you tried Searching this site?

This is a Unix/Linux resource website. It contains technical articles about Unix, Linux and general computing related subjects, opinion, news, help files, how-to's, tutorials and more.

Contact us


Printer Friendly Version





Any sufficiently advanced technology is indistinguishable from magic. (Arthur C Clarke)




Linux posts

Troubleshooting posts


This post tagged:

Linux

Misc.

Security

UnixWords



Unix/Linux Consultants

Skills Tests

Unix/Linux Book Reviews

My Unix/Linux Troubleshooting Book

This site runs on Linode