From: | "Sys Admin News" <sanews@sysadmin.email-publisher.com>
Subject: | Sys Admin Magazine -- July 2003 News and Reviews | |
Date: | Mon, 28 Jul 2003 13:46:17 -0700 |
******************************************************************
Sys Admin Magazine -- News and Reviews
July 2003
******************************************************************
This month, Evan Sarmiento introduces TrustedBSD's ACL functionality
and describes its MAC framework by detailing the use of three
previously listed MAC modules. He also explains how systems
administrators can design their own security policies for a
given system.
******************************************************************
Sponsor: PureMessage by ActiveState
===========================================
Webcast: Choosing and Deploying an Anti-Spam Solution
July 29, 10AM PDT
Choosing the right anti-spam solution is critical. Register for this
free webcast featuring Giga Research and Vignette and learn how leading
companies are stopping spam in the enterprise.
Find out more:
http://click.sysadmin.email-publisher.com/maabiCAaaZtEZa2sokSb/
******************************************************************
Using TrustedBSD
by Evan Sarmiento
TrustedBSD provides a set of trusted operating system extensions
to FreeBSD. Currently, these extensions can be downloaded from
http://www.TrustedBSD.org, but most of them (ACL and MAC -- Mandatory
Access Control) have been integrated into the FreeBSD-current tree.
The MAC framework allows security policies to be set dynamically at
runtime. The MAC Framework essentially gives the developer the access
to define a security policy that works by positioning the developer's
code within kernel functions. The developer's security policy can
either augment the traditional FreeBSD discretionary access control
policy, or replace it entirely. Essentially, the MAC framework allows
the systems administrator to give fine-grained privileges to each user
through modifying the existing security policy to match the needs of
the given system. TrustedBSD comes prepackaged with a few MAC security
modules, which augment the security policies of the given system or
add new features -- Biba Integrity Policy and File System Firewall
Policy, among others.
TrustedBSD also provides the concept of labels. Labels are extraneous
pieces of information that are grafted onto various kernel structures.
These labels can be filled with information that can be used by MAC
modules to determine the outcome of a security check. Access Control
List (ACL) functionality is also provided. In this article, I'll
introduce TrustedBSD's ACL functionality and describes its MAC
framework by detailing the use of three previously listed MAC
modules. I'll also explain how systems administrators can design
their own security policies for a given system.
To read the rest of Evan's article, go to:
http://click.sysadmin.email-publisher.com/maabiCAaaZtE1a2sokSb/
******************************************************************
FREE 14-day Evaluation: NeedTEXT Shell is the industry-leading
solution for remote network monitoring from a wireless handheld
device. System administrators can use all of their standard
command-line utilities, such as SSH, ftp, top, etc. directly from
a RIM BlackBerry, to diagnose and fix problems from anywhere,
at any time. Visit:
http://click.sysadmin.email-publisher.com/maabiCAaaZtE2a2sokSb/
******************************************************************
CALL FOR PAPERS
Enterprise Administration
We're looking for practical, high-end discussions of storage,
clustering, security, and advanced networking solutions based
on your expertise and insights.
Open Source
We're looking for original uses of classic tools such as Apache,
Samba, and MySQL; custom solutions built from open source components;
and descriptions of useful open source utilities.
Scripting
Describe how you improved your life with the perfect Perl, shell,
PHP, Python, or Tcl/Tk script.
We suggest that if you are interested in contributing, you first
submit a proposal to us. If the proposal seems appropriate, we'll
ask you to submit a manuscript. If the manuscript is accepted,
we'll edit it, print it, and pay you for it. For more detailed
information, refer to the author guidelines. Please address requests
for guidelines, proposals, and manuscripts to:
Rikki Endsley
Associate Managing Editor
email: rendsley@cmp.com
******************************************************************
EDUCATIONAL DISCOUNTS: CanIt-PRO anti-spam solution
Universities, colleges and institutions choose Roaring Penguin
Software's CanIt-PRO, the most effective email filtering product.
CanIt-PRO offers unparalleled flexibility for administrators and
end users, and never discards a valid email. Complimentary evaluations
and educational discounts are available. Visit Roaring Penguin
Software at ACUTA '03 booth #421.
http://click.sysadmin.email-publisher.com/maabiCAaaZtE3a2sokSb/
******************************************************************
Newsletter Subscription Information
Please feel free to share this newsletter with interested parties
via email (not on bulletin boards). To subscribe, see:
http://click.sysadmin.email-publisher.com/maabiCAaaZtE4a2sokSb/
Email comments to: aankerholz@cmp.com
******************************************************************
LINUXWORLD CONFERENCE & EXPO - REGISTER NOW!
LEARN how companies have achieved higher profits and increased their
productivity by utilizing Linux
PARTICIPATE in LinuxWorld's world-class education program and benefit
from interactive training in the all-new Hands-on Labs!
DISCOVER the latest innovations and technologies from the hottest
companies around
HEAR the latest developments and updates on the state of open source
at our analyst roundtable discussion
ATTEND exciting keynote addresses from Hewlett-Packard, Sun
Microsystems,
Red Hat, IBM and Oracle
Register today!
http://click.sysadmin.email-publisher.com/maabiCAaaZtE5a2sokSb/
When Registering, enter priority code LSUR