New Features in Fedora Core 5

Slides:



Advertisements
Similar presentations
NERC Security Requirements – What Vendors Should Provide James W. Sample, CISSP, CISM Manager of Information Security California ISO.
Advertisements

QM Implementation Based on CoP, PDCA, and GSBPM
CiviContribute. This Week's Agenda CiviContribute is an online fundraising and donor management component which enables you to track and manage contributions.
Case Studies for Projects. Network Audit A brief description of the systems (via fingerprinting, if black box is used) Network perimeter should be described.
Apache Web Server v. 2.2 Reference Manual Chapter 4 Multi-Processing Modules (MPMs)
XML Based Learning Environment Prashant Karmarkar Brendan Nolan Alexander Roda.
Shane Jahnke CS591 December 7,  What is SELinux?  Changing SELinux Policies  What is SLIDE?  Reference Policy  SLIDE  Installation and Configuration.
Linux Networking CIS Why Linux/Unix? Configurability ▫Customizable System to satisfy unique needs. Scalability ▫Able to serve an increasing number.
Productivity and flow, on or offline Huddle Desktop CUSTOMER BRIEFING.
EDDS Error Handling QP & Reliability Team. 2 EDDS Error Handling 1. In case of ‘Error code: -1’ (refer below captured error message ) EDDS system need.
Master Expert Associat e Microsoft Certified Solutions Master (MCSM) Microsoft Certified Solutions Expert (MCSE) Microsoft Certified Solutions Associate.
T EAM F OUNDATION S ERVER IN D EVELOPMENT Kambiz Saremi.
TOSIBOX LOCK security options 1 1.
Security Enhanced Linux (SELinux)
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Computer Security & OS Lab. DKU May 26 Younsik Jeong Ph.D. Student.
Microsoft Installer Technologies and patch management approaches.
Open Office 2: Writer Creating Labels. 2 To begin you need to start Open Office Writer Click on “Start” 2. Select “Programs” 3. Select “OpenOffice.org.
WhatsUp Gold v15 – WhatsUp Companion 3.7 WhatsUp Companion Extended
Automated Testing Tips Copyright © 2000 Compuware Corporation Mark Nesslar July 15, 2000.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
© 2007 by «Author»; made available under the EPL v1.0 | Date | Other Information, if necessary Eclipse SOA Tools Platform Project Eric Newcomer IONA Technologies.
MAIL MERGE Designing Documents with. Terms Mail Merge: A process that inserts variable information into a standardized document to produce a personalized.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Linux Security LINUX SECURITY. Firewall Linux Security Internet Database Application Web Server Firewall.
West Printing Company Printing Services on the Web for your convenience.
FLOOR CANDY.
West Printing Company Now on the Web For your Convenience.
CENT 305 Information Systems Security Overview of System Logging syslog 1.
To access our web services, go to……. Click on Customer Login.
Samba – Good Just Keeps Getting Better The new and not so new features available in Samba, and how they benefit your organization. Copyright 2002 © Dustin.
The HTTP is a standard that all Web browsers and Web servers must speak in order for the Web portion of the Internet to work.
Introduction A security scanner is a software which will audit remotely a given network and determine whether bad guys may break into it,or misuse it.
Ten Common Computer Problems That Can Easily Be Fixed By: Sam Merrifield.
Coding Compliance Components Writing Custom Policies for Auditing, Expiration and More Jason Morrill Program Manager Windows SharePoint Services.
Chapter 2Administrative Office Management, 13th Ed1 ADMINISTRATIVE OFFICE MANAGEMENT Chapter 2 Handling Administrative Management Challenges.
1 Assessment Comprehensive Analysis of IBM i Security.
Embedded Product Design. The Initial Concept of a Product l Top-level management –Composed primarily of engineers l Marketing –Feedback from customers.
M M M M 5. Not Listed
Windows NT ® Security Management: Extending Windows NT 5.0 Security Management Tools, Part 2 Praerit Garg Program Manager Windows NT Security Microsoft.
4000 Imaje 4020 – Software Imaje 4020 – Content ■ Content of Chapter Software: 1. Flash Up 2. Netcenter 3. FTP 4. Active X 5. XCL commands 6. Exercise.

Certification Overview.
# # 0089CB # 00283C HEXRGB # COLOUR PALETTE TEXT COLOUR HEXRGB # FFFFFF 255 # # BFBFBF.
How to live with SELinux
SELinux Overview ● Permissions historically – Why is unix or ACL permissions not good enough? ● DAC vs. MAC ● SELinux ID, objects, roles and types ● Policy.
SELinux Sandbox Daniel Walsh Red Hat. What is a sandbox ➔ Run general applications in a locked down environment. ➔ Less privileged then other processes.
SELinux Overview Dan Walsh SELinux for Dummies Dan Walsh
Red Hat Enterprise Linux 5 Security April Red Hat Development Model Collaboration with partners and open source contributors to develop technology.
SELinux: Best Practices and What's New in Red Hat Enterprise Linux 5 Name Dan Walsh Date Wednesday May 9 th 2007.
What is SELinux trying to tell me? The 4 key causes of SELinux errors.
Multi-Category Security (MCS)
OpenShift & SELinux Dan Walsh Twitter: #rhatdan
Printer Management Chapter 5 - Objectives.
Palo Alto Networks Certified Network Security Engineer (PCNSE) 7 Exam
COP 4343 Unix System Administration
Writing SELinux Policy | Permissive Domains | Real bugs
Demystifying SELinux: WTF is it saying?
Getting Started Player Set Up.
Processes The most important processes used in Web-based systems and their internal organization.
SELinux Daniel J Walsh SELinux Lead Engineer.
Before You Click SAVE.
SELinux in 20 Minutes LCA Miniconf Jan. 28th, Canberra AU
Batch Setup.
The Technology.
Cool Feature #1 Instant Call Recording - Ready to Listen:
(With Hybrid Network Support)
Convergence IT Services Pvt. Ltd
Batch Setup.
Language Independent Code Analysis
Presentation transcript:

New Features in Fedora Core 5 Modular Policy Easily allow administrators to customize policy Allow third parties to ship policy with applications Improve usability customization semanage frame work for management Allow customization without writing policy New Access checks. Memory checks Those damn execmem, execmod, execstack, execheap checks. Reference Policy restorecond

New Features in Fedora Core 5 MLS EAL4+/LSPP RBAC labeled printing polyinstatiated file systems labeled network labeled documents MCS Limited MLS functionality for the rest of us Handling of Labeled documents SOX/Hippa???

What are we working on Now??? USABILITY Why did SELinux break XYZ? How do I fix it? At RedHat/Fedora we are focusing on helping the System Administrator to make SELinux work for them. Analyze common configurations apache, ftp, samba, bind ... to suggest changes to SELinux Translate AVC messages into Human understandable code.

What are we working on Now??? Completing MLS Port Bringing MCS to the desktop Nautilus, Mailers, Open Office Auditing Locking down the SELinux booleans Bastille for SELinux?