linux security myth

38
Linux Security Myth Mackenzie Morgan Ohio LinuxFest 2010 11 September 2010 Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 1 / 35

Upload: mackenzie-morgan

Post on 12-Jun-2015

3.464 views

Category:

Technology


0 download

DESCRIPTION

Slightly changed version of SELF 2010 "Is Linux Secure?" talk. Presented simultaneously in English and ASL.

TRANSCRIPT

Page 1: Linux Security Myth

Linux Security Myth

Mackenzie Morgan

Ohio LinuxFest 2010

11 September 2010

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 1 / 35

Page 2: Linux Security Myth

Introduction

Outline

1 Introduction

2 Vocabulary

3 What can still hurt me?

4 What protection is there?

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 2 / 35

Page 3: Linux Security Myth

Introduction

Me

Mackenzie Morgan

Computer Science student

Ubuntu Developer

Kubuntu user

http://ubuntulinuxtipstricks.blogspot.com ← find slides here

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 3 / 35

Page 4: Linux Security Myth

Introduction

This Talk

Linux Zealot: Try Linux! It doesn’t get viruses!

Average Person: No viruses? I’m invincible!

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 4 / 35

Page 5: Linux Security Myth

Vocabulary

Outline

1 Introduction

2 Vocabulary

3 What can still hurt me?

4 What protection is there?

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 5 / 35

Page 6: Linux Security Myth

Vocabulary

Malware

Malware (or “badware”) is an umbrella term for viruses, trojans, worms,rootkits, etc.

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 6 / 35

Page 7: Linux Security Myth

Vocabulary

Virus

Viruses infect individual files. They spread when people share those files.

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 7 / 35

Page 8: Linux Security Myth

Vocabulary

Social Engineering

Social Engineering is tricking people into doing something that is bad forsecurity.

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 8 / 35

Page 9: Linux Security Myth

Vocabulary

Trojan

Trojans are malware that get installed via social engineering. . . or, well,lying.“I’m a fun game and totally safe! but not really, I’m actually going to steal your

passwords. . . ”

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 9 / 35

Page 10: Linux Security Myth

Vocabulary

Worm

A worm infects other systems, automatically, usually over a network.

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 10 / 35

Page 11: Linux Security Myth

Vocabulary

Botnet

A botnet is a group of systems infected by malware which operate as acollective and are controlled by a erm. . . jagoff.

Yes, I’m from Pittsburgh. How’d you guess?

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 11 / 35

Page 12: Linux Security Myth

Vocabulary

Botnet

A botnet is a group of systems infected by malware which operate as acollective and are controlled by a erm. . . jagoff.Yes, I’m from Pittsburgh. How’d you guess?

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 11 / 35

Page 13: Linux Security Myth

Vocabulary

Rootkit

A rootkit keeps the activities of an unauthorised user hidden so that youcan’t tell your system has been owned.

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 12 / 35

Page 14: Linux Security Myth

Vocabulary

Keylogger

A keylogger tracks everything you type. Yes, including passwords.It could be hardware (see ThinkGeek), but usually software. There arelegitimate(-ish) uses.

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 13 / 35

Page 15: Linux Security Myth

Vocabulary

Browser-based Attack

A browser-based attack is any attack that takes place inside the webbrowser. They are usually not limited to a specific OS.Examples:

Cross-site Scripting (XSS) – using Javascript on one webpage to stealdata from another

Tracking cookies – harvests the information stored in your browser byother websites

Cookie jacking – stealing credentials for other websites from yourbrowser’s cookies

Click jacking – hiding clickable objects on a webpage on top of otherobjects so that you’re not clicking what you think you’re clicking

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 14 / 35

Page 16: Linux Security Myth

Vocabulary

Phishing

Phishing is social engineering aimed at making you believe you areinteracting with someone else whom you trust

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 15 / 35

Page 17: Linux Security Myth

What can still hurt me?

Outline

1 Introduction

2 Vocabulary

3 What can still hurt me?

4 What protection is there?

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 16 / 35

Page 18: Linux Security Myth

What can still hurt me?

What’s still a problem?

All of those

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 17 / 35

Page 19: Linux Security Myth

What can still hurt me?

But what about no viruses?

Windows ones usually won’t run, even in Wine

Several hundred for Linux

Only ∼30 in the wild ever

No known viruses exploiting current vulnerabilities

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 18 / 35

Page 20: Linux Security Myth

What can still hurt me?

Email Trojans

“Check out this cool new game! http://example.com/foo.desktop”

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 19 / 35

Page 21: Linux Security Myth

What can still hurt me?

Untrusted Software

.deb for “screensaver” on gnome-look.org

. . . and now you’re on a botnethttp://ubuntuforums.org/showthread.php?t=1349678

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 20 / 35

Page 22: Linux Security Myth

What can still hurt me?

Untrusted Software

.deb for “screensaver” on gnome-look.org

. . . and now you’re on a botnethttp://ubuntuforums.org/showthread.php?t=1349678

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 20 / 35

Page 23: Linux Security Myth

What can still hurt me?

Browser-based attacks

Unless only for Internet Explorer

Firefox? Opera? Chrome?

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 21 / 35

Page 24: Linux Security Myth

What can still hurt me?

Phishing

There’s no patch for gullibility

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 22 / 35

Page 25: Linux Security Myth

What can still hurt me?

Rootkits

If any of the previous work, the attacker might install one

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 23 / 35

Page 26: Linux Security Myth

What protection is there?

Outline

1 Introduction

2 Vocabulary

3 What can still hurt me?

4 What protection is there?

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 24 / 35

Page 27: Linux Security Myth

What protection is there?

Trusted software sources

Stick to your distro’s repos

Otherwise, source directly from upstream

Avoid non-software in .deb or .rpm format

Heed warnings about failed signature checks

Arch Linux does not sign packages

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 25 / 35

Page 28: Linux Security Myth

What protection is there?

Launchers

You get a .desktop from web/email. . .Do you know what it’ll run?

Could be anything

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 26 / 35

Page 29: Linux Security Myth

What protection is there?

Launchers

You get a .desktop from web/email. . .Do you know what it’ll run?Could be anything

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 26 / 35

Page 30: Linux Security Myth

What protection is there?

Launchers in KDE

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 27 / 35

Page 31: Linux Security Myth

What protection is there?

Launchers in GNOME

Fedora’s & openSUSE’s GNOME:

Ubuntu’s GNOME:

Ubuntu has a policy against “ignore this security warning” buttons

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 28 / 35

Page 32: Linux Security Myth

What protection is there?

Browser - Javascript

Use NoScriptUsers might not be equipped to know what to allow, but it blockscross-site scripting & click-jacking

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 29 / 35

Page 33: Linux Security Myth

What protection is there?

Browser - Encryption

Don’t send passwords unencrypted!Lock icon:Means connection is encrypted and probably no man-in-the-middle

NOT necessarily a sign that all is good!

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 30 / 35

Page 34: Linux Security Myth

What protection is there?

Browser - Phishing

But how do you know it’s the site it claims to be?Look at everything before the third slash—that’s the domain

Check out this green thing

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 31 / 35

Page 35: Linux Security Myth

What protection is there?

Minimal privileges

Don’t login graphically as root!Why?Malware gets full access

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 32 / 35

Page 36: Linux Security Myth

What protection is there?

Don’t need it? Don’t use it!

Don’t login remotely with command line or push files to it?Uninstall your SSH and S/FTP servers

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 33 / 35

Page 37: Linux Security Myth

What protection is there?

Detecting problems

Find rootkits:

rkhunter

chkrootkit

Warn of changes:

tripwire

Warn of attacks:

snort

These are advanced tools

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 34 / 35

Page 38: Linux Security Myth

What protection is there?

Questions?

Slides will be posted:http://ubuntulinuxtipstricks.blogspot.com

Mackenzie Morgan (OLF 2010) Linux Security Myth 11 September 2010 35 / 35