Distribution Development Security Jeremiah Yongue.

Slides:



Advertisements
Similar presentations
Heroix Longitude - multiplatform, automated application performance monitoring and management software.
Advertisements

Linux Operating System Linux is a free open-source operating system based on Unix. Linux was originally created by Linus Torvalds with the assistance of.
Introduction to Linux Video task 1. Five reasons to use Linux Data security Price Reliability It is modified for the needs of a user It is easy to use.
Mountain Lion Security Mac OS X Strong Passwords Every Mac needs a login name and password Every user on every Mac should have their own account.
Introduction to Linux Ubuntu for Libraries. Objectives o To Understand the history of Linux/Unix based OS’s o To learn the various Linux distributions.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
GNU / Linux A free operating system. Summary History What can you find on a Linux OS Linux Economy.
Linux vs. Windows. Linux  Linux was originally built by Linus Torvalds at the University of Helsinki in  Linux is a Unix-like, Kernal-based, fully.
'08 Rabat Why are we using FreeBSD? Scaleable Services Workshop AfNOG 2008 Rabat, Morocco slides by Hervey Allen presented by Joe Abley.
Debian-Based Distributions Typically use an APT (Advanced Packaging Tool) package client to install/update applications as well as install either.deb.
Introduction to Linux Chapter 1. Operating Systems Operating System (OS) - most basic and important software on a computer Performs core tasks Organize.
Linux Introduction. Overview What is Unix/Linux? History of Linux Features Supported Under Linux The future of Linux.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Linux Basics CS 302. Outline  What is Unix?  What is Linux?  Virtual Machine.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Downloading & Installing Software Chapter 13. Maintaining the System Yum Pirut BitTiorrent Rpm Keeping Software Up To Date Up2date Red Hat Network Wget.
LO2 Understand the key components used in networking
Free Software MARIO CADENAS. Free Software’s Definition “Free software” means software that respects users' freedom and community. Roughly, the users.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
Linux Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Overview of Linux Dr. Michael L. Collard 1.
A Comparison of Linux vs. Windows Bhargav A. Sorathiya B.E. 4 th C.E. Roll no:6456.
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
EMT 2390L Lecture 1 Dr. José M. Reyes Álamo. Outline About Linux Install Linux in a Virtual Machine.
A Practical Guide to Fedora and Red Hat Enterprise Linux Unit 8: Installing Software in Linux Chapter 13: Downloading and Installing Software By Fred R.
Using secure methods for sending and receiving files SPEEDE Server SPEEDE Users’ Group May 4, 2007 David Stallcup.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
TRC Mini-Grant 2002 Dell PowerEdge 2500 Server. Project Goals Provide CS students with exposure to Linux (Unix) computing environment in CS courses Provide.
Library 2.06 February 2009 Linux for Librarians Nishtha Anilkumar Librarian Physical Research Laboratory Ahmedabad.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
OARN Database UPDATE – SEPTEMBER We’re Live – and Testing  The site is up and running in Google’s data centers:  The site has been secured: 
Linux Overview Why Linux ? Not-so-ancient history –Torvalds, Linus Torvalds, 002 the Helsinki University, as a student, low budget, work home –rapid and.
Linux Not in textbook. Why Not Just Use Windows? Windows costs money ($100 to $300, typically) Windows is proprietary: –The source code is a closely guarded.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Getting Started With Ubuntu Linux Presented by Grant Root
A brief history of Unix Jeremy Shafer MIS Department Fox School of Business Temple University.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
UNIX History UNIX began as a research project. UNIX System V developed at Bell Laboratories. BSD (Berkley Software Distribution) UNIX XENIX UNIX Sun Operating.
XAMPP.
Linux Operating System By: Julie Dunbar. Overview Definitions History and evolution of Linux Current development In reality ◦United States  Business.
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 01 Introduction.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
A Brief Introduction to Linux Cheng-Han Du. History.
Chap 1 ~ Introducing LINUX LINUX is a free-stable multi-user operating system that derives from UNIX operating system Benefits: 1) Linux is released under.
A Brief Introduction to Linux Cheng-Han Du. History.
Course : PGClass : MCA Subject: Operating SystemSub.Code : 3CT11 Staff Name : S.SomasundaramYear & Sem : II nd & III rd.
Benefits of a SUSE® Subscription
LOCAL ENCRYPTION Using GPG keys in conjunction with UNIX password manager “Pass”.
Key management issues in PGP
Linux - computer operating system
What is F/LOSS? By Scot Henderson.
CSC227: Operating Systems
Linux Security Presenter: Dolev Farhi |
COP 4343 Unix System Administration
Selected topic in computer science (1)
Overview – SOE PatchTT November 2015.
Overview – SOE PatchTT December 2013.
GnuPG The GNU Privacy Guard
A Guide on Top Linux Distribution in 2016
Ubuntu Working in Terminal
Linux Not in textbook.
More Scripting & Chapter 11
Getting Started With Linux
Transforming Your Brain with SQL 2017 on Linux
IS3440 Linux Security Unit 4 Securing the Linux Filesystem
IS3440 Linux Security Unit 8 Software Management
Understanding Linux and the BASH shell v
Section 1: Linux Basics and SLES9 Installation
Tools and Explanations for Mac Beginners
Presentation transcript:

Distribution Development Security Jeremiah Yongue

Linux Distribution A Unix-like operating system built on top of the Linux kernel which includes various collections of software packages. Well known examples include Ubuntu, Fedora, and Red Hat. Solaris is not Linux, it is Unix, according to the single Unix specification.

Development Process 1.Software updates come from upstream. 2.Software is patched or forked according to distribution- specific standards. 3.Software is packaged. 4.Software is distributed to users. The key issue with this process is ensuring that the software is “safe” at every step of the process.

Fuduntu “Fuduntu is a light hearted and fun Linux distribution that earns its name by its design to fit somewhere in-between Fedora and Ubuntu.” Founding member. Quick Stats: users software packages #25 on Distrowatch.com’s popularity metrics for the past 12 months.

Security at Fuduntu Build-Hosts Dedicated servers for building software packages. Access restricted by SSH public keys. Root access/login disabled. “Lives” behind a firewall. Can’t modify system without sudo rights. Access to repository rsync restricted by separate account and password.

Security Continued GPG package signing GNU Privacy Guard (GnuPG or GPG) is a GPL Licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP. Package is signed with a private key at build time. Package manager downloads public key to check against packages. YUM, our package manager, will NOT install unsigned packages or packages that fail the key check.

Sources