<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trusted Linux box in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570044#M79238</link>
    <description>Chris is right on the money, you need to tell use what you mean by trusted. &lt;BR /&gt;In addition to his links, there is another good doc on Securing/Optimizing Linux:&lt;BR /&gt;&lt;A href="http://www.redhat.com/mirrors/LDP/LDP/solrhe/Securing-Optimizing-Linux-RH-Edition-v1.3/index.html" target="_blank"&gt;http://www.redhat.com/mirrors/LDP/LDP/solrhe/Securing-Optimizing-Linux-RH-Edition-v1.3/index.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Lots of good stuff in there and its free.&lt;BR /&gt;</description>
    <pubDate>Fri, 21 Sep 2001 19:34:04 GMT</pubDate>
    <dc:creator>Bernie Vande Griend</dc:creator>
    <dc:date>2001-09-21T19:34:04Z</dc:date>
    <item>
      <title>Trusted Linux box</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570039#M79233</link>
      <description>Is there anyway to make a Linux box Trusted?&lt;BR /&gt;I am using RedHat 7.0 2.2.16 kernel release.</description>
      <pubDate>Fri, 24 Aug 2001 18:25:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570039#M79233</guid>
      <dc:creator>Account Not Used</dc:creator>
      <dc:date>2001-08-24T18:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted Linux box</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570040#M79234</link>
      <description>Hi Michael,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;As such Linux has lot of features, it is matter of disabling everything and then enabling only the things you want. But if you are looking for a command like we do in HP to make a system trusted, then i don't believe there is anything like that.&lt;BR /&gt;&lt;BR /&gt;But you can definitely try running bastille&lt;BR /&gt;&lt;A href="http://wwww.bastille-linux.org" target="_blank"&gt;http://wwww.bastille-linux.org&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;It will definitely make a default installation more secure.&lt;BR /&gt;&lt;BR /&gt;-HTH&lt;BR /&gt;Ramesh</description>
      <pubDate>Fri, 24 Aug 2001 20:08:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570040#M79234</guid>
      <dc:creator>linuxfan</dc:creator>
      <dc:date>2001-08-24T20:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted Linux box</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570041#M79235</link>
      <description>Hello Michael,&lt;BR /&gt;&lt;BR /&gt;Please have a look at :&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.hp.com/security/products/linux" target="_blank"&gt;http://www.hp.com/security/products/linux&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This is a recent announcement. It seems to offer lots of security features and some of these features look like HP-UX ones (system event auditing).&lt;BR /&gt;&lt;BR /&gt;Don't hesitate to download and read the technical product brief in PDF.&lt;BR /&gt;&lt;BR /&gt;Good luck.&lt;BR /&gt;&lt;BR /&gt;Kodjo&lt;BR /&gt;&lt;BR /&gt;P.S. Don't forget to rate this answer (from 1 to 10).&lt;BR /&gt;</description>
      <pubDate>Sun, 02 Sep 2001 20:45:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570041#M79235</guid>
      <dc:creator>Kodjo Agbenu</dc:creator>
      <dc:date>2001-09-02T20:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted Linux box</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570042#M79236</link>
      <description>you should be able to setup trusted access between boxes if they can both resolve each other. all you should have to do is configure the .rhosts files for the users that you want to have trusted relationship.</description>
      <pubDate>Fri, 21 Sep 2001 17:36:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570042#M79236</guid>
      <dc:creator>Gerald Corson</dc:creator>
      <dc:date>2001-09-21T17:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted Linux box</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570043#M79237</link>
      <description>Michael,&lt;BR /&gt;&lt;BR /&gt;Before anyone can give a coherent answer to your question, you're first going to have to define what you mean by "Trusted."&lt;BR /&gt;&lt;BR /&gt;Since this is an HP forum and you've capitalized the word, you may mean as in HP-UX Trusted Mode.  In that case you're looking for password aging, shadow passwords, and kernel auditing capabilities.  The first two are bundled with most Linux distributions.  The auditing capabilities are built into some security-conscience implementations (such as the HP one mentioned by someone else), but are also available with the Lnux Intrusion Detection System  (LIDS) kernel module for other distributions.&lt;BR /&gt;&lt;BR /&gt;You may mean trusted as in other systems trust it for root level access.  In that case see the comments about .rhosts stuff by someone else, though you probably want to use ssh instead of rsh (&lt;A href="http://www.openssh.org)." target="_blank"&gt;www.openssh.org).&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You may also mean trusted as in US Government Trusted Systems Evaluation Criteria (C2, B1, B2, etc.).  There are no Linux systems with official TSEC evaluations that I know of, but...&lt;BR /&gt;o  The following should be able to meet C2 standards:&lt;BR /&gt;   - Any Linux distro reasonably hardened and running LIDS&lt;BR /&gt;   - The Wirex distro&lt;BR /&gt;o  The following should be able to meet B1 standards when running on physically secured hardware&lt;BR /&gt;   - The SGI distro&lt;BR /&gt;   - The HP distro&lt;BR /&gt;   - A well hardened system running the NSA SE Linux patches&lt;BR /&gt;&lt;BR /&gt;For information on hardening Linux systems, see the SANS Institute's 'Securing Linux Step-by-Step', the RedHat site mentioned by someone else, and also the Bastille Linux Project (&lt;A href="http://www.bastille-linux.org)." target="_blank"&gt;www.bastille-linux.org).&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;There are also Linux guidelines being produced by the Center for Internet Security (&lt;A href="http://www.cis.org)," target="_blank"&gt;www.cis.org),&lt;/A&gt; but these aren't out yet.</description>
      <pubDate>Fri, 21 Sep 2001 19:24:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570043#M79237</guid>
      <dc:creator>Chris Calabrese</dc:creator>
      <dc:date>2001-09-21T19:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted Linux box</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570044#M79238</link>
      <description>Chris is right on the money, you need to tell use what you mean by trusted. &lt;BR /&gt;In addition to his links, there is another good doc on Securing/Optimizing Linux:&lt;BR /&gt;&lt;A href="http://www.redhat.com/mirrors/LDP/LDP/solrhe/Securing-Optimizing-Linux-RH-Edition-v1.3/index.html" target="_blank"&gt;http://www.redhat.com/mirrors/LDP/LDP/solrhe/Securing-Optimizing-Linux-RH-Edition-v1.3/index.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Lots of good stuff in there and its free.&lt;BR /&gt;</description>
      <pubDate>Fri, 21 Sep 2001 19:34:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570044#M79238</guid>
      <dc:creator>Bernie Vande Griend</dc:creator>
      <dc:date>2001-09-21T19:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted Linux box</title>
      <link>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570045#M79239</link>
      <description>You might want to look at another Linux-based OS &amp;amp; application called Trustix ( &lt;A href="http://www.trustix.net/products/trustix-1.5/" target="_blank"&gt;http://www.trustix.net/products/trustix-1.5/&lt;/A&gt; ). If you are looking for a real challenge in security, take a look at the NSA's Security-Enhanced Linux ( &lt;A href="http://www.nsa.gov/selinux/" target="_blank"&gt;http://www.nsa.gov/selinux/&lt;/A&gt; ).&lt;BR /&gt;</description>
      <pubDate>Tue, 02 Oct 2001 17:41:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/trusted-linux-box/m-p/2570045#M79239</guid>
      <dc:creator>Michael Worsham</dc:creator>
      <dc:date>2001-10-02T17:41:51Z</dc:date>
    </item>
  </channel>
</rss>

