Linux security
Lorin B Pino
ljpino at grundyec.net
Sat Apr 29 18:56:26 UTC 2006
Daniel Carrera wrote:
> Alan McKinnon wrote:
>
>> The hard part with a Linux virus is not writing it, it's *deploying* it.
>
>
> Okay, why are they harder to deploy? You're just nit-picking on terms.
> The point is trying to figure out if Linux is less vulnerable to malware.
>
>> A possible solution is to overhaul the OS in such a way that data
>> files can be tagged as writable only by specified apps i.e. only
>> *this* signed copy of OO.o can write to *that* .odt file. I really
>> don't think this is workable, the admin burden and inconvenience will
>> be large.
>
>
> SELinux to the rescue?
>
> Cheers,
> Daniel.
The problem with deployment of viruses in linux would be the same
problem as is being discussed with hardware drivers. How many kernels
are in use now? How does each distro perform certain tasks? Some
distros structure things quite differently from each other. I am
currently running CentOS 4.2 (I am on this list to see what problems I
may run into before trying ubuntu), and I installed an autopackage
version of abiword. Autopackage is trying to set up an installer that
will work on any distro, but they are having trouble making it work with
debian and it's derivatives. I am assuming that virus writers would run
into the same problems. Viruses in the windows world usually target a
certain release of windows, IE, or OE. If someone wrote a virus that
was 100% effective on RHEL3, Would that virus be able to run on my SUSE
9.2, CentOS 4.2, or Mandrake 9.1? My _opinion_ is that until there is
more similarity between distros, or a particular distro starts to
dominate the linux market, it would be difficult to write a virus that
will have a very wide spread effect. After all, a virus is just another
program.
~Lorin
More information about the ubuntu-users
mailing list