Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Businesses Apple

Securing Mac OS X Tiger 130

Stephen de Vries writes "Mac OS X is one of the most secure default installations of any OS. But it is still possible to lock the OS down further, in order to meet corporate security guidelines or to securely use network services. Corsaire has released a guide to Securing Mac OS X Tiger (long pdf) which addresses the new security features introduced through Tiger and presents some security good practice guidelines."
This discussion has been archived. No new comments can be posted.

Securing Mac OS X Tiger

Comments Filter:
  • by Poromenos1 ( 830658 ) on Saturday September 10, 2005 @03:35PM (#13527310) Homepage
    If you're going for corporate security, you're probably going to look at every aspect you need to lock down. Security by default matters for 90% of desktop users, but don't you disable services/add firewalls as soon as you set up your OS?
  • by Meshach ( 578918 ) on Saturday September 10, 2005 @03:51PM (#13527391)
    I think the idea is that IT departments could save some time / money if out of box operating systems didn't have so many default holes. Also there will be a more forgiving margin of error
  • by Anonymous Coward on Saturday September 10, 2005 @04:02PM (#13527448)
    Wow, bundling iTunes (a program which lets you load MP3s onto an iPod) with an iPod. What blatant disregard for the consumer, who is powerless to install other iPod interface software [ephpod.com] or buy a different MP3 player.
  • staying secure (Score:3, Insightful)

    by jacklexbox ( 912121 ) on Saturday September 10, 2005 @04:04PM (#13527460)
    Security still depends on the user of the software, even the most secure system can be opened WIDE up if someone chooses (or chooses without knowing) to make it so. You can have everything encrypted, but if your password is easily guessable then your encryption is weak. This goes with the thought that "A system is only as secure as it's weakest point."
  • by Anonymous Coward on Saturday September 10, 2005 @04:11PM (#13527495)
    but don't you disable services/add firewalls as soon as you set up your OS?

    No, because these things should be done by default by the OS vendor.
  • by eneville ( 745111 ) on Saturday September 10, 2005 @04:56PM (#13527715) Homepage
    An especially never enter console commands on /. rated anything other than informative, even that is a bad idea. Never enter a console command without first reading the man page, yes it's long and could be a bore, but its not as boring as restoring from backups (if you have backsups of some important directory that you forgot about).
  • by Halfbaked Plan ( 769830 ) on Saturday September 10, 2005 @06:24PM (#13528202)
    You're nuts if you think 'the biggest roadblock' is some tacit conspiracy by IT staffers.
  • by akac ( 571059 ) on Saturday September 10, 2005 @08:18PM (#13528768) Homepage
    I don't think that makes any sense, frankly.

    Corporate IT departments prefer working on applications, servers, and such. They abhor "help desk" duty which is what setting up drive images, desktops, and scuh.

    So frankly, the IT department usually doesn't give a care what the desktop users use - its the help desk department that does.
  • by laffer1 ( 701823 ) <luke@@@foolishgames...com> on Saturday September 10, 2005 @08:51PM (#13528918) Homepage Journal
    This is very interesting. The article points out that small businesses and individuals get cracked more than big organizations. It also points out that more people use Windows and Linux than Mac OS X and BSD. I wonder if the numbers take that into account. Are the Linux statistics balanced with the windows counts, etc?

    I think there might be two problems with the information assuming the numbers are normalized on installs vs succesful compromises. First, Mac OS X is the most widely sold UNIX like OS in the world. Its hard to believe that OS X and BSD counted together is more than Linux. Most other surveys put them at about the same percentage. If you look at servers then linux would blow out OS X and probably BSD. Desktops i think linux would do better than BSDs aside from OS X. Second, it would be nice to see data on how well trained the sys admins were on the systems. Many people don't know linux well enough to properly secure it. An OSX destkop ships in a safer default than most linux distros. In fact, if you look at the bloated distros they ship with several programs that do the same thing. (KDE and Gnome along with software) 4 browsers, 3 email clients, probably 20 text editors, etc. OS X server and Linux are both a pain in the ass for different reasons. I think they give a false sense of security because of the user interface. (graphical and not distros like gentoo or debian that don't include x11 by default) Windows has the same problem. If you meet a windows admin who's never touched the registry then you know they are an idiot. Likewise, if someone hasn't touch a config file in /etc or used a terminal on OS X server or linux they are an idiot. BSD people have no choice :)

    Obscurity only goes so far. I'd also like to know what caused the linux distros to get attacked. Was it a kernel flaw, service issue, common open source software? For example, many operating systems come with a webserver now (apache or iis). Is there a pattern on services?

    I write this on a redhat EL 3.0 workstation install. I've noticed that i get about the same number of security updates in a month for my windows box and this redhat machine. Today i had to install 5 patches to redhat. (last patched a week ago) and i patched windows a few days ago and had 3. My ibook g4 laptop with tiger on it has had about 7 security patches in the last month and countless new versions of software like quicktime, itunes, etc. I've always wondered if apple hides security updates in new versions of software and doesn't tell anyone. My point is that all my operating systems seem to require the same amount of security patching in desktop scenarios. My FreeBSD file server and webservers tend to need 1-2 patches a month as part of the userland and then new versions of software add up for say 20-25 portupgrades a month. And that does not include apache, mysql or php which i manually compile and install.

    Numbers without more background are not that helpful.
  • by Horst Graben ( 841338 ) on Saturday September 10, 2005 @10:59PM (#13529393)
    That is incorrect - both the 15" and 17" PowerBook G4 come with a PC card slot.
  • by Nick Driver ( 238034 ) on Saturday September 10, 2005 @11:43PM (#13529577)
    Without even R'ing the FA, I can tell you that truly securing the Mac OS is just as easy as truly securing any other OS.

    1) Unplug it from any network.
    2) Strictly control whoever gets physical access.
    3) ???
    4) Security!

    Seriously... after watching some dipshit try over 4,000 times within the span of a couple hours to attempt buffer overflows on every listening port on my honeypot last Friday afternoon, before I finally blacklisted his entire class C from my router, I've come to the same conclusion that the DoD has... that NO computer connected to the Internet can be made secure... period... that you should only connect disposeable devices to the public Internet.

    I even wonder if I'm not the bigger dipshit for sitting there watching this idiot half the afternoon, throwing the kitchen sink at my poor machine in vain, before pulling the plug on him and banishing his whole netblock.

It is easier to write an incorrect program than understand a correct one.

Working...