Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Internet has vuln.
From: Tracy Reed <treed () ultraviolet org>
Date: Fri, 13 Sep 2013 11:07:04 -0700

On Wed, Sep 11, 2013 at 05:57:55PM PDT, Steve Wray spake thusly:
In some cases it could be quite difficult to disengage from NSA-influenced
projects, eg selinux. So far as I can tell this is pretty much everywhere
now. Redhat embraced it ages ago, its been integrated in the kernel since
2.6, so how do we opt out of selinux?

Now you are throwing the baby out with the bathwater. SELinux is FOSS and very

Are instructions like "you just need to edit the kernel boot line, usually
in /boot/grub/grub.conf, if you're using the GRUB boot loader. On the
kernel line, add selinux=0 at the end." just laughable? The code is in the
kernel therefore the kernel is (potentially) compromised, right?

Sure, potentially compromised by pretty much anyone in the world since anyone
can contribute to it. But all of the contributions happen out in the open so
the code can be reviewed for trickery. 

Are there any kernels available after 2.6 with no selinux? How easy or
difficult would it be to strip it out? Hardware devices that are running
Linux kernels, do they have the selinux code in them?

There would be no point in doing so.

I'm pretty sure that a lot of people are going to throw their hands up in
despair at this kind of thing and say "but its open source, its been
verified and checked by people around the world, surely it can be trusted."

Despair? No. More like relief.

Tracy Reed, RHCE     Digital signature attached for your safety.
Copilotco            PCI/HIPAA/SOX Compliant Secure Hosting
866-MY-COPILOT x101  http://copilotco.com

Attachment: _bin

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]