this post was submitted on 02 Mar 2024
18 points (82.1% liked)

Linux

47545 readers
544 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

I secure systems for my day job. That means installing AV software, ensuring Windows Firewall is ON, etc. (Plus many other things...)

I've seen discussions around disk encryption here, but I don't recall much about a malware protection. Maybe a little about personal (desktop) firewalls.

I'm aware of Clam, etc, but is anyone actually using these tools much?

Or are we just presuming we're all immune from the bad guys targeting Windows?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 25 points 7 months ago* (last edited 7 months ago) (3 children)
  • On Linux, you don't download random stuff from the internet, e.g. a new browser. You get it from a central source, usually package manager, where it is verified and secure.
  • Most stuff is open source, therefore we can check if it does weird stuff. Proprietary software is often seen critically in our community.
  • Linux is usually always updated because of the central update mechanism, so that vulnerabilities are fixed very quickly.
  • Linux has more granular permissions. There's no "allow nothing" (but still too much) or "give random software access to the whole device" like on Windows. Linux software is written to need only as many permissions as needed, but not much more.
  • Containers are big and crucial, especially when immutable distros grow more popular (even better security!). Many of use use Flatpak because of those pros. With them, we can give or remove every permission, like network access, file system, etc.
  • Antivirus is almost useless, it won't always work reliably, see it more as an additional measure. Many AVs are close to being malware themselfes. They may act as indicator, but not as safeguard for viruses.
  • If you share stuff with people using Windows, ClamAV is still handy.
  • We aren't safe from viruses too, but we try to minimize our attack vector as much as we can with those methods mentioned above.
  • Windows viruses can still be executed with WINE, so use Bottles (container for WINE) when running Windows software.
[–] [email protected] 4 points 7 months ago

the rhel machines at work are terrible specifically because of mcaffe av

[–] [email protected] 2 points 7 months ago* (last edited 7 months ago)

On Linux, you don't download random stuff from the internet, e.g. a new browser. You get it from a central source, usually package manager, where it is verified and secure

Devs tend to make strong use of packages on GitHub, PyPi etc which have been targeted quite a bit with malware. Malicious snaps and

Linux software is written to need only as many permissions as needed, but not much more.

Hooboi. Depends on who writes the software. There are plenty of dumb devs for either OS, and I've had to yell at many for requiring their commercial software (built in Java with an X11/web front-end and exposed listening ports) run as root, usually because they didn't want to figure out the permissions needed to access a device. There's a surprisingly narrow intersection of devs who understand OS security and networking.

Linux is usually always updated because of the central update mechanism, so that vulnerabilities are fixed very quick

For OS packages, sure, but are all your Docker containers, snaps, flatpaks, and appimages updated whenever one of the underlying libraries had a significant vulnerability? How about that PPA, or the stuff you compiled from source a year ago?

Because people are increasingly using those for software not available on the base repositories

Linux users often have a false sense of security that leads them towards insecure practices, often for the same reasons as Windows users (I just want it to do X and work). While traditional signature-based antivirus doesn't help much for either OS, there are plenty of other controls to fill the space that most people/organizations can - but don't - implement on either OS.

On Linux, that includes strict management/review of software+code sources, SElinux/AppArmor enforcement, remote logging+review, and much more. These often conflict with Linux devs idea of "freedom" and thus area a hard sell.

[–] possiblylinux127 2 points 7 months ago (1 children)

Immutable distros aren't considered secure or reliable by the industry. You need SElinux to secure a device properly.

[–] [email protected] 3 points 7 months ago (1 children)

Definitely. Having SELinux or AppArmour is very important.
Image based distros still offer some security and reliability benefits, because they are reproducible and therefore issues can be fixed quicker and easier. Also, at least now, due to the read-onlyness of the core parts of the OS, you can't install malware as easily.

[–] [email protected] 1 points 7 months ago* (last edited 7 months ago)

On Fedora Atomic (only) any process running from the wheel user can install software without a password prompt. I am fixing this currently.

Also, SELinux is only in use for system processes, all user processes run unconfined.