Containers and SELinux

Secure your Containers with SELinux

Introduction Linux containers provide a lightweight and efficient way to run multiple isolated environments on a single host. While containers offer many benefits, such as improved resource utilization and faster application deployment, there are also security concerns that must be considered. One security implementation that can be used with containers is SELinux. In this article, we will explore some of the security features of SELinux and how they can be used to secure Linux containers. [Read More]


Containers and User Namespace

Introduction Podman is an alternative to Docker, providing a similar interface. Podman allows users to create and manage containers on a Linux system. One of the challenges with containerization is the need to run containers as the root user, which can pose a security risk. One solution to this problem is to use user namespaces with Podman. In this article, we will explore what user namespaces are, how they can be used with Podman, and how to run a container as root inside the container while being non-root outside the container. [Read More]


A powerful and simple VPN protocol

WireGuard VPN Introduction Virtual Private Networks (VPNs) have become essential tools for ensuring online privacy and security. A good VPN must be both secure and fast, while also being easy to set up and use. WireGuard is a relatively new VPN protocol that is gaining popularity because it meets all these criteria. What is WireGuard? WireGuard is an open-source VPN protocol designed for ease of use and high performance. It was created by Jason Donenfeld in 2016 and is now included in the Linux kernel. [Read More]

Labeled IPsec with LibreSwan

Enhance the security with labeled IPsec

Introduction Libreswan is an open-source implementation of the Internet Protocol Security (IPsec) protocol. IPsec is a widely used technology for securing communication over the internet. Labeled IPsec is an extension of IPsec that provides mandatory access control (MAC) to IPsec packets based on the security labels. In this article, we will discuss how labeled IPsec can be implemented with Libreswan. Implement labeled IPsec To implement labeled IPsec with Libreswan, we need to use the Security Enhanced Linux (SELinux) policy. [Read More]

Linux Security

Securre your Linux Computers

Introduction As a widely used operating system, Linux is often targeted by hackers and malicious actors. Therefore, it is crucial to harden Linux to make it more secure. Hardening Linux involves taking a series of measures to minimize vulnerabilities, prevent attacks, and mitigate the impact of successful attacks. By implementing these measures, Linux administrators can reduce the risk of data breaches, system disruptions, and other security incidents. Securing the Linux Kernel The Linux kernel is the core of the operating system, and securing it is essential for overall system security. [Read More]


Limiting the System Calls

Introduction: Understanding Seccomp Seccomp is a Linux kernel feature that enables administrators to restrict the actions that a process can perform, thus providing an additional layer of security. It stands for “secure computing mode” and was first introduced in the 2.6.12 kernel. Seccomp is a powerful tool for enhancing the security of a Linux system, as it helps to mitigate the risks of exploitation from untrusted code and malware. How Seccomp Works Seccomp works by limiting the system calls that a process can make. [Read More]

VMs and SELinux

Virtual Machines with SELinux

Introduction Libvirt is an open-source tool used for managing virtual machines on Linux systems. One of the challenges with virtualization is ensuring that the host system and virtual machines are secure. SELinux, or Security-Enhanced Linux, is a security module that can be used to add an additional layer of security to both the host system and virtual machines. In this article, we will explore how SELinux can be used to protect the host and virtual machines. [Read More]

Rootkits on Linux

A Threat to System Security

Rootkits on Linux: A Threat to System Security A rootkit is a type of malicious software that allows an attacker to gain privileged access to a computer system. This access can be used to steal sensitive information, install additional malware, or carry out other malicious activities. Rootkits on Linux can be particularly dangerous, as they can go undetected for long periods of time and allow an attacker to gain complete control over the system. [Read More]


Enhancing Computer Security with OpenSCAP

SCAP and OpenSCAP: Enhancing Computer Security The Security Content Automation Protocol (SCAP) is a suite of standards designed to help organizations manage their computer security vulnerabilities. It provides a standardized method for identifying, measuring, and evaluating security risks across an organization’s infrastructure. OpenSCAP is an open-source implementation of SCAP that provides a set of tools and libraries for integrating SCAP into an organization’s security management framework. SCAP Standards: Identifying and Measuring Security Risks The SCAP suite includes several standards for identifying and measuring security risks, including the Common Vulnerabilities and Exposures (CVE) dictionary, the Common Configuration Enumeration (CCE) standard, and the Common Platform Enumeration (CPE) standard. [Read More]


Security Enhanced Linux

SELinux: Enhancing System Security SELinux stands for Security-Enhanced Linux, which is a security module implemented in the Linux kernel. It provides an additional layer of security by enforcing mandatory access control policies on top of the traditional discretionary access control mechanisms provided by the Linux kernel. SELinux was developed by the National Security Agency (NSA) and external contributors in collaboration with Red Hat and has been integrated into various Linux distributions, including Red Hat Enterprise Linux, Rocky Linux, AlmaLinux, and Fedora. [Read More]