LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-05-2008, 03:56 AM   #16
DragonSlayer48DX
Registered User
 
Registered: Dec 2006
Posts: 1,454
Blog Entries: 1

Rep: Reputation: 75

Here's a few articles I thought might be interesting.

http://en.wikipedia.org/wiki/List_of...mputer_viruses

http://librenix.com/?inode=21

http://www.theregister.co.uk/2003/10...ndows_viruses/

Cheers

Last edited by DragonSlayer48DX; 03-05-2008 at 03:59 AM.
 
Old 03-05-2008, 05:56 PM   #17
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
evilDagmar,

There are tons of definitions on the internet and there are a lot of threads in these forums that offer some interpretation....what value do they offer the OP, though?

I've already given what I thought the OP needed, just as everyone else here. If you ask a security-focused person their opinion on Linux vulnerabilities, you're going to be asking for a mouthful...it is upon the reader on how much and what he takes from that mouthful that he may consider valuable...its almost like asking for thoughts on religion and the discussion is bound to be heated.

I'm not a developer. I'm not a Linux advocate. I'm not a Windows advocate. I use Linux. I use Windows. I will recommend what I feel is necessary to get the job done. My advice sometimes 'goes against the grain'. This type of advice has rocked zealots' minds to the core before. I'm a professional security consultant. I've seen Linux machines cracked via vulnerable applications vectors in my line of work. In my view, Linux is not invulnerable and I'll not compare to Windows just to make Linux vulnerabilities seem less impacting. To mention that Linux applications are sometimes vulnerable (due to coding or PEBKAC issues) is not admitting anything wrong.

In the end, please send negativity to /dev/null and keep the OP's questions in mind. If we can both agree to disagree, things are probably cool...but all I really care about is giving the OP a good, clear and concise yet accurate answer to his question...my feedback was directed at him, not evilDagmar.
 
Old 03-05-2008, 06:33 PM   #18
DragonSlayer48DX
Registered User
 
Registered: Dec 2006
Posts: 1,454
Blog Entries: 1

Rep: Reputation: 75
One must keep in mind, also, that while there aren't many Linux viruses, etc. today, with the current growth rate of the Linux user base, tomorrow things can change rather quickly. No OS is completely bullet-proof, and I'd never give anyone the impression that Linux can never be infiltrated.

"A poorly maintained Linux system can be more vulnerable than an updated Windows PC."
(unknown author)

Cheers
 
Old 03-05-2008, 09:57 PM   #19
jgombos
Member
 
Registered: Jul 2003
Posts: 256

Rep: Reputation: 32
Quote:
Originally Posted by unixfool View Post
I've seen Linux machines cracked via vulnerable applications vectors in my line of work.
What is an application "vector"?
 
Old 03-05-2008, 10:25 PM   #20
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by jgombos View Post
What is an application "vector"?
The term vector is derived from the biological term. It's the means by which something (presumably bad) is carried toward something else. For example, if a company's LAN server gets cracked because a LAN client's browser ran into some really evil JavaScript code, then it could be said that the browser was the attack vector. The browser allowed the cracker to execute code on the LAN client, which then allowed him to attack the LAN server from within the LAN itself (and behind the router/firewall).
 
Old 03-06-2008, 08:33 AM   #21
jgombos
Member
 
Registered: Jul 2003
Posts: 256

Rep: Reputation: 32
Quote:
Originally Posted by win32sux View Post
The term vector is derived from the biological term. It's the means by which something (presumably bad) is carried toward something else. For example, if a company's LAN server gets cracked because a LAN client's browser ran into some really evil JavaScript code, then it could be said that the browser was the attack vector. The browser allowed the cracker to execute code on the LAN client, which then allowed him to attack the LAN server from within the LAN itself (and behind the router/firewall).
Thanks, that makes sense. So when UnixFool used the term, proceeding it with "vulnerable" was redundant then, right? I mean, it sounds like a vector is inherently a vulnerability (in fact apparently a multifaceted set of vulnerabilities).

Not trying to nit pick or anything.. I'm just hearing the term in the network security context for the first time.

Last edited by jgombos; 03-06-2008 at 08:39 AM.
 
Old 03-06-2008, 11:21 AM   #22
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by jgombos View Post
Thanks, that makes sense. So when UnixFool used the term, proceeding it with "vulnerable" was redundant then, right? I mean, it sounds like a vector is inherently a vulnerability (in fact apparently a multifaceted set of vulnerabilities).

Not trying to nit pick or anything.. I'm just hearing the term in the network security context for the first time.
I can't speak for unixfool, so it's best of I let him elaborate on what exactly he meant. But regarding whether a vector is always a vulnerability, I don't think that is the case. For example, let's look at the JavaScript drive-by attack which made headlines last year. In that case, the browser was/is the vector, yet the attack didn't exploit any actual vulnerabilities on the browser, it only used the browser as a means to gain code execution rights on the LAN side, and that's pretty much the way JavaScript is designed to work. The vulnerability was on the consumer-grade routers with unchanged default passwords.

Last edited by win32sux; 03-06-2008 at 11:24 AM.
 
Old 03-06-2008, 03:04 PM   #23
DragonSlayer48DX
Registered User
 
Registered: Dec 2006
Posts: 1,454
Blog Entries: 1

Rep: Reputation: 75
In molecular biology, a vector is any vehicle used to transfer foreign genetic material to another cell.

The vector itself is generally a DNA sequence that consists of an insert (transgene) and a larger sequence that serves of the "backbone" of the vector. The purpose of a vector to transfer genetic information to another cell is typically to isolate, multiply, or express the insert in the target cell. Vectors called expression vectors (expression constructs) specifically are for the expression of the transgene in the target cell, and generally have a promoter sequence that drives expression of the transgene. Simpler vectors called transcription vectors are only capable of being transcribed but not translated: they can be replicated in a target cell but not expressed, unlike expression vectors. Transcription vectors are used to amplify their insert.

http://en.wikipedia.org/wiki/Vector_DNA

IOW, the 'vector' is not necessarily a bad thing, nor does it always allow the transfer of bad things. You just hear it used more often in that context.

Cheers
 
Old 03-07-2008, 09:10 AM   #24
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by win32sux View Post
I can't speak for unixfool, so it's best of I let him elaborate on what exactly he meant. But regarding whether a vector is always a vulnerability, I don't think that is the case. For example, let's look at the JavaScript drive-by attack which made headlines last year. In that case, the browser was/is the vector, yet the attack didn't exploit any actual vulnerabilities on the browser, it only used the browser as a means to gain code execution rights on the LAN side, and that's pretty much the way JavaScript is designed to work. The vulnerability was on the consumer-grade routers with unchanged default passwords.
Yes, this is what I meant, though you probaby worded things better.

I also agree with your explanation of a vector not always being a vulnerability.
 
Old 03-10-2008, 04:38 AM   #25
evilDagmar
Member
 
Registered: Mar 2005
Location: Right behind you.
Distribution: NBG, then randomed.
Posts: 480

Rep: Reputation: 31
Exclamation

Quote:
Originally Posted by unixfool View Post
evilDagmar,

There are tons of definitions on the internet and there are a lot of threads in these forums that offer some interpretation....what value do they offer the OP, though?
In theory, they offer factual correctness. Or at least, I do. What you said is simply wrong.

Quote:
Originally Posted by unixfool View Post
I've already given what I thought the OP needed, just as everyone else here. If you ask a security-focused person their opinion on Linux vulnerabilities, you're going to be asking for a mouthful...it is upon the reader on how much and what he takes from that mouthful that he may consider valuable...its almost like asking for thoughts on religion and the discussion is bound to be heated.
Your problem is that I am a "security-focused" person. Among other things, this means I pay close attention to security advisories, statistical analysis of malicious activity on the net, and generally don't like it when people start preaching panic and fear based on factual inaccuracies like claiming Linux viruses are not far in the minority.

Quote:
Originally Posted by unixfool View Post
I'm not a developer. I'm not a Linux advocate. I'm not a Windows advocate. I use Linux. I use Windows. I will recommend what I feel is necessary to get the job done. My advice sometimes 'goes against the grain'. This type of advice has rocked zealots' minds to the core before. I'm a professional security consultant. I've seen Linux machines cracked via vulnerable applications vectors in my line of work. In my view, Linux is not invulnerable and I'll not compare to Windows just to make Linux vulnerabilities seem less impacting. To mention that Linux applications are sometimes vulnerable (due to coding or PEBKAC issues) is not admitting anything wrong.
Except that's not what you were saying. You were saying something else entirely, and now you're trying to substitute a lot of pleasant talk for actually being accurate. I can guarantee you that at the end of the day, people would rather have accuracy over a bunch of made-up nonsense, however pleasant it may sound.

Quote:
Originally Posted by unixfool View Post
In the end, please send negativity to /dev/null and keep the OP's questions in mind. If we can both agree to disagree, things are probably cool...but all I really care about is giving the OP a good, clear and concise yet accurate answer to his question...my feedback was directed at him, not evilDagmar.
Learn the difference between facts and fantasy. Facts are what I deal in. Fantasy is what you've been posting. There's no "agree to disagree" here because you've been saying entirely incorrect things, I've been calling them what they are, and then you seem to think you should follow up with something completely unrelated.

...and yes, I am rather well-known for being entirely intolerant of people spreading misinformation. If you don't like it, stop posting fairy-tales in a tech forum. Claiming that Linux viruses aren't far in the minority is just so divorced from reality it makes my head ache just to think about it.

Post Scriptum: Everyone thinking that "playing nice" might be more important than "providing correct information" should probably take a look at the following rant someone else wrote, since it seems rather apropos at this moment: http://www2.apebox.org/wordpress/rants/5/

...and why is this a problem, some of those of you who are newer to thinking about security strategically may be thinking? It's a problem because security models are based on providing balanced responses to threats based on their likelihood and their severity. Someone convinced that the internet is positively crawling with viruses that target Linux is likely to waste a bunch of their time trying to figure out virus scanners (which have notably few signatures for Linux viruses, hint hint) instead of paying attention to the important things that actually are the prevalent vectors for attack, like unsecured access mechanisms, badly chosen and/or easily guessable passwords, outdated PHP applications, and network-enabled services accessible by hosts that have no need of those services (like allowing the whole world to ssh into their machines). Reading iptables documentation to figure out how to implement the principle of least privilege is going to be a far more effective use of time than reading the documentation on Trend Micro's linux client.

Last edited by evilDagmar; 03-10-2008 at 06:10 AM. Reason: Calling me a "forum nazi" == you lose. http://en.wikipedia.org/wiki/Reductio_ad_Hitlerum
 
Old 03-13-2008, 01:08 PM   #26
(((X)))
LQ Newbie
 
Registered: Dec 2007
Posts: 16

Rep: Reputation: 0
Some things depend on you.
But default Ubuntu 7.10 is pretty safe.
Don't worry.
Internet offers information and patches to make it even safer, how ironic.
Don't fear the INTERNET
 
Old 03-14-2008, 11:02 AM   #27
rg.viza
Member
 
Registered: Aug 2006
Posts: 74

Rep: Reputation: 15
Quote:
Originally Posted by unixfool View Post
It is BAD BAD BAD to assume that there are very few trojans that affect Linux.
This is a really really *really* good point. I see a lot of people posting "You don't need to worry about viruses on linux :P", and every time I see it, it makes my skin crawl and I get the urge to correct them by adding a big fat YET to the end of that sentence.

It's a really dangerous attitude. It's only a matter of time. Linux is not the magic bullet of operating system security. It has the same possibility of exploit that any other OS has. The difference is the authors of OSS are (generally) more willing to acknowledge stuff, take it seriously, and patch it quickly. It's a matter of pride in a developer. If I have a bug, in my software, I want to be the one that patches it, so I'll do it quickly before someone does it for me and starts posting about how lazy or security irreverent I am.

All linux needs is the attention of people that can exploit it. That will come with market share as the market share rises. In fact the same openness that enables researchers to find and fix bugs will allow the crackers to find the stuff the researchers miss. They are, after all, just people.

Malware and virus people like to aim at targets that provide the largest number of users. When linux adoption has reached the point where it's interesting to them, the floodgates will open. When this happens you will pay a steep price for bad habits and bad security philosopy based on "there's no viruses on linux :P"

Please get out of the habit of thinking like this, and start adding a "yet" to the end of this sentence.

-Viz
 
Old 03-16-2008, 04:12 AM   #28
evilDagmar
Member
 
Registered: Mar 2005
Location: Right behind you.
Distribution: NBG, then randomed.
Posts: 480

Rep: Reputation: 31
Quote:
Originally Posted by rg.viza View Post
This is a really really *really* good point. I see a lot of people posting "You don't need to worry about viruses on linux :P", and every time I see it, it makes my skin crawl and I get the urge to correct them by adding a big fat YET to the end of that sentence.
Well, quell the urge. Windows is probably going to have to die out before Linux viruses get out of the minority group. These people want to know what's a threat to them at present. Bringing "yet" into it is expanding the subject unnecessarily.

Quote:
Originally Posted by rg.viza View Post
It's a really dangerous attitude. It's only a matter of time. Linux is not the magic bullet of operating system security. It has the same possibility of exploit that any other OS has. The difference is the authors of OSS are (generally) more willing to acknowledge stuff, take it seriously, and patch it quickly. It's a matter of pride in a developer. If I have a bug, in my software, I want to be the one that patches it, so I'll do it quickly before someone does it for me and starts posting about how lazy or security irreverent I am.

All linux needs is the attention of people that can exploit it. That will come with market share as the market share rises. In fact the same openness that enables researchers to find and fix bugs will allow the crackers to find the stuff the researchers miss. They are, after all, just people.
You seem to forget that part of the reason Linux is doing so well now is that it definitely had the attention of these people all through the 90's. It's still got the attention of people who can exploit it, it's just that the criminals are busy making a huge splash running amok on the low-hanging fruit out there (i.e., the Windows machines). With respect to being a secure operating system, Microsoft has spent half their time fooling around with the "everyone is allowed to do anything to the system" security model, and they're still playing catch-up because of it.

Quote:
Originally Posted by rg.viza View Post
Malware and virus people like to aim at targets that provide the largest number of users. When linux adoption has reached the point where it's interesting to them, the floodgates will open. When this happens you will pay a steep price for bad habits and bad security philosopy based on "there's no viruses on linux :P"
Your premises fail utterly to support your conclusion, and your conclusion itself is flawed.

Quote:
Originally Posted by rg.viza View Post
Please get out of the habit of thinking like this, and start adding a "yet" to the end of this sentence.
No. By what vague criteria you're citing, one could add a "yet" to the end of practically every sentence, up to and including "You should not be afraid of having your soft tissues eaten in a dark alley by renegade cyborgs".

Preaching paranoia fails. Some things are a threat to Linux at the moment, others are not. Viruses are way down on the list. Users not bothering to implement any kind of access controls, users using horrible passwords, users failing to keep software up to date, users giving accounts to people they shoudn't, users not making backups, users failing to try and learn about the security model that's in place already--these things are a far greater threat at the moment, and whatever security model people form now should be focused on the threats of now and not possible threats of the distant future because unless time-travellers assault your network, these things are not currently a threat.

Last edited by evilDagmar; 03-16-2008 at 04:15 AM.
 
Old 03-20-2008, 11:26 AM   #29
jukebox55
Member
 
Registered: Aug 2007
Distribution: slackware 11
Posts: 101

Rep: Reputation: 15
Quote:
Originally Posted by win32sux View Post
By accessing the HTTPS (HTTP over SSL) address of whatever site you're on (if available).

For example, you would use https://www.linuxquestions.org/ instead of http://www.linuxquestions.org/

Your browser should display some kind of notification when you're using HTTPS.

On Firefox, the address bar turns yellow and a little lock icon shows.

ive gone to https://www.linuxquestions.org/

and i see the lock but its got a red line through it, with the message 'warning, contains unauthenticated content'.

whats wrong?
 
Old 03-20-2008, 11:37 AM   #30
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by jukebox55 View Post
ive gone to https://www.linuxquestions.org/

and i see the lock but its got a red line through it, with the message 'warning, contains unauthenticated content'.

whats wrong?
There's content on that page which wasn't sent via HTTPS - your browser is letting you know about it.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Does this mean Linux is not safe? MBA Whore Linux - Security 20 11-06-2006 07:25 PM
ASP on linux...Possible? Safe? evank Programming 1 03-03-2006 11:41 PM
how safe it is to use linux/window in one hd ngan_yine Linux - Hardware 3 10-11-2004 03:58 PM
safe mod in linux , what is it ? kernelvn Linux - Security 1 09-28-2004 06:07 AM
Is my linux box safe? dont_know_much Linux - Security 2 07-18-2004 02:48 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:48 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration