- Security-focused operating system
This is an alphabetical list of
operating system s with a sharp security focus. Their order does not imply rank.In our context, "Security-focused" means that the project is devoted to increasing the security as a major goal. As such, something can be secure without being "security-focused." For example, almost all of the operating systems mentioned here are faced with security bug fixes in their life time; however, they do all strive to consistently approach all generic security flaws inherent in their design with new ideas in an attempt to create a secure computing environment.
BSD
BSD is a family of
Unix variants derived from a code base originating at theUniversity of California, Berkeley . All derived BSD operating systems are released under the terms of a BSD-style license. There are several BSD variants, with only one being heavily focused on security.OpenBSD
OpenBSD is an open sourceBSD operating system that is known to be concerned heavily with security. The project has completed rigorous manual reviews of the code and addressed issues most systems have not. OpenBSD also supplies an executable space protection scheme known asW^X (memory is writablexor executable), as well as aProPolice compiled executable base.TrustedBSD
TrustedBSD is a sub-project ofFreeBSD designed to add trusted operating system extensions, targeting theCommon Criteria for Information Technology Security Evaluation (see also Orange Book). Its main focuses are working onaccess control list s, event auditing, extended attributes,mandatory access control s, and fine-grained capabilities. Since access control lists are known to be confronted with theconfused deputy problem , capabilities are a different way to avoid this issue. As part of the TrustedBSD project, there is also a port of the NSA's FLASK/TE implementation to run on FreeBSD. Many of these trusted extensions have been integrated into the main FreeBSD branch starting at 5.x.Linux
Linux itself is not inherently security-focused; however, many distributions and projects attempt to make Linux secure.Adamantix
Adamantix is a
Debian -based, security-focused Linux distribution (formerly named Trusted Debian). It employs aPaX andProPolice protected base, and utilizes theRSBAC Mandatory access control system.Annvix
Annvix was originally forked fromMandriva to provide a security-focused server distribution that employsProPolice protection, hardened configuration, and a small footprint. Plans are to include full support for theRSBAC Mandatory access control system in the near future.EnGarde Secure Linux
EnGarde Secure Linux is a secure platform designed for servers. It has boasted a browser-based tool for MAC using SELinux since 2003. Additionally, it can be accompanied with Web, DNS, and Email enterprise applications, specifically focusing on security without any unnecessary software. The community platform ofEnGarde Secure Linux is the bleeding-edge version freely available for download.Fedora
Fedora is a free,
Red Hat sponsored community developedLinux distribution . It is the only mainstream Linux distribution with a concentrated effort to improve system security,Fact|date=July 2008 as a consequence it boasts a fully integratedSELinux MAC and fine-grained executable memory permission system (Exec Shield ) and all binaries compiled with GCC's standard stack-smashing protection, as well as focusing on getting security updates into the system in a timely manner.Hardened Gentoo
Hardened Gentoo is a subproject of theGentoo Linux project.Hardened Gentoo offers a ProPolice protected and Position Independent Executable base using the exact same package tree as Gentoo. Executable space protection in Hardened Gentoo is handled by
PaX .The Hardened Gentoo project is an extremely modular project, and also provides subprojects to integrate other intrusion-detection and
Mandatory access control systems into Gentoo. All of these can be optionally installed in any combination, with or withoutPaX and a ProPolice base.Hardened Linux
Hardened Linux is a small Distribution for Firewalls, Intrusion Detection Systems, VPN-Gateways and Authentication jobs that is still under heavy development. It includes GRSecurity, PaX and GCC stack smashing protection.
Immunix
Immunix is a commercial distribution of Linux focused heavily on security. They supply many systems of their own making, includingStackGuard ; cryptographic signing of executables; race condition patches; and format string exploit guarding code. Immunix traditionally releases older versions of their distribution free for non-commercial use.Note that the Immunix distribution itself is licensed under two licenses: The Immunix commercial and non-commercial licenses. Many tools within are GPL, however; as is the kernel.
Openwall Project
Owl by a developer known as
Solar Designer was the first distribution to have a non-executableuserspace stack, /tmprace condition protection andaccess control restrictions to /proc data, by way of a kernel patch. It also features a per-user tmp directory via the pam_mktemp PAM module, and supports Blowfish password encryption.Red Hat Enterprise Linux
Red Hat Enterprise Linux - offers the same security benefits as Fedora with the additional support of back-porting security fixes to the released versions of the packages (particularly the kernel) so the sys-admin does not have to perform a significant (and risky) upgrade to get a security fix.Solaris
Solaris is a free
Unix variant created bySun Microsystems . Solaris itself is not inherently security-focused. Solaris is based upon theOpenSolaris project which is mostly licensed under theCDDL open source license . OpenSolaris features such as ZFS and refinements to security are merged upstream to the official Solaris variant after Sun certifies quality of the enhancements.Trusted Solaris
Trusted Solaris is a security-focused version of the Solaris Unix operating system. Aimed primarily at the government computing sector, Trusted Solaris adds detailed auditing of all tasks, pluggableauthentication , mandatoryaccess control , additional physical authentication devices, and fine-grained access control. Trusted Solaris isCommon Criteria certified. (See [http://wwws.sun.com/software/security/securitycert/trustedsolaris.html] and [http://wwws.sun.com/software/security/securitycert/images/TSol8_7-03CMS.jpg] )The most recent version, Trusted Solaris 8, received the EAL4 certification level augmented by a number of protection profiles.Solaris 10 and trusted functionality
Trusted Solaris functionality has now been added to the mainstream version of Solaris. In the 11/06 update to Solaris 10, the "Solaris Trusted Extensions" feature adds mandatory access control and labelled security. Introduced in the same update, the "Secure by Default Networking " feature implements less services on by default compared to most previous releases which had most services enabled. RBAC, found in both mainstream Solaris and Trusted Solaris, dramatically lessens the need for using root directly by providing a way for fine grained control over various administrative tasks.
See also
*
Common Criteria
* Orange Book
*Comparison of operating systems
*Capability (computers)
* Capabilities vs. ACLs
*Computer security
*IX (operating system)
*OpenBSM
*Security-evaluated operating system
*Security engineering
*Trusted operating system External links
* [http://www.openbsd.org OpenBSD]
* [http://adamantix.org/ Adamantix]
* [http://hardenedlinux.sourceforge.net/ Hardened Linux]
* [http://www-128.ibm.com/developerworks/linux/library/l-sppriv.html?ca=dgr-lnxw04Privileges Security mechanisms in newer operating systems]
Wikimedia Foundation. 2010.