Internet Security Standards 135
Aetius writes "The Center for Internet Security has released a set of security standards and tools for several operating systems. Here's the ZDNet story. I checked out the Linux standard and it is a pretty good coverage of the basics; about the only thing missing was a simple firewall treatment. I installed it on my wide-open desktop system (RH 7.3) and scored a 6.61 out of 10, which doesn't seem too bad. The scanner code isn't open source, but it's perl so you can at least look at it. You have to register to download it. If nothing else, the PDF of the standards is a good read. Enjoy."
Tools to gauge your security? (Score:4, Insightful)
Re:Tools to gauge your security? (Score:2)
perl -d
would be a good starting point
Re:Tools to gauge your security? (Score:2)
Quis Custodiet Ipsos Custodes?
which I thaught was quite a good question to ask, I dont see why it (the parent),should be marked down as Troll
Re:Tools to gauge your security? (Score:1)
My thanks for the compliment. Nevermind, perhaps some kind hearted soul will take pity and mod me backup.
And to the person who marked me troll:
Quis Custodiet Ipsos Custodes? : Who shall watch the watchmen?
In other words, who is checking this software actually works, what it actually does, and that it's not missed some glaring security issue.
Re:Tools to gauge your security? (Score:2)
Good question. You can always meta moderate.
Re:Tools to gauge your security? (Score:1)
Re:Tools to gauge your security? (Score:1)
Err... Foot... mouf... Oh damn....
Well, FYI that means "My chickens aren't laughing."
Re:Tools to gauge your security? (Score:1)
Why do people always feel the need to not translate?
Because they post when they are in serious hack mode [ic.ac.uk] and make the assumption that others will understand without explinations.
Mea Culpa ;-) [dictionary.com]
reboot? (Score:2, Funny)
Re:reboot? (Score:1)
Re:reboot? (Score:2)
However, considering that you've likely touched close to half the files in
You reboot now, you'll probably know why something breaks. You don't reboot till 6 weeks from now, you're going to be spinning your wheels.
Re:ahem (Score:4, Funny)
Tech?Update (Score:3, Interesting)
*sigh*
Ironic indeed (Score:2)
Re:Tech?Update (Score:2)
Seriously, if you expect people to interoperate with you, you should start by sticking to the STANDARDs.
Re:Tech?Update (Score:2, Informative)
It is not marked experimental in the kernel!
Here's what the help says:
CONFIG_INET_ECN:
Explicit Congestion Notification (ECN) allows routers to notify
clients about network congestion, resulting in fewer dropped packets
and increased network performance. This option adds ECN support to
the Linux kernel, as well as a sysctl (/proc/sys/net/ipv4/tcp_ecn)
which allows ECN support to be disabled at runtime.
Note that, on the Internet, there are many broken firewalls which
refuse connections from ECN-enabled machines, and it may be a while
before these firewalls are fixed. Until then, to access a site
behind such a firewall (some of which are major sites, at the time
of this writing) you will have to disable this option, either by
saying N now or by using the sysctl.
Re:Tech?Update (Score:2)
Correction: ECN is a proposed standard. A step up from experimental (a step which occured long after ECN was introduced into the linux kernel, BTW), but still a long way from actually being a standard.
Re:Tech?Update (Score:2)
Turning on ECN isn't the problem. The problem lies in old firewalls/routers that disallow ECN packets.
Fortunately, if you use Linux, you can easily disable ECN at run time:
echo "0" >
Re:Tech?Update (Score:2)
Missed the biggest hole (Score:4, Insightful)
Unfortunatly they have missed the biggest hole in security on the internet. The average user and the default install.
It's all well and good to say that we now have a standard. The problem is that the people who are most likely to use this tool are the ones that don't need it as bad. If you are aware this tool exists then you are security minded enough to have closed all the holes yourself.
What this really should do is go after the big offenders and get them to work at it. I am not necesarily talking Microsoft here. I am talking about the builders. Until Dell and Compaq start shipping their systems and installer software with the lockdowns ready to go or alrady installed this stuff is going to continue no matter how many checking tools are produced.
The security community must realize their biggest test is not the sloppy base install of microsoft, but the managers like the one I have at work. His official policy is "If it ain't broke don't fix it." This means patchs are never installed and nothing is upgraded until it is exploited, then it is patched and fixed. Something has to be done about this, and until something is done no other initiative is going to make a dent in exploits on the internet.
Re:Missed the biggest hole (Score:2)
This happens in two ways:
1) the more users who increase their security to match the CIS standards, the better
2) ideally OS vendors will start shipping systems whose default settings are set to comply with CIS security standards
Re:Missed the biggest hole (Score:2)
Re:Missed the biggest hole (Score:1)
It's all well and good to say that we now have a standard. The problem is that the people who are most likely to use this tool are the ones that don't need it as bad. If you are aware this tool exists then you are security minded enough to have closed all the holes yourself.
It is good to have a standard. It raises the confidence level of the new user. If "switch"ers from other platforms to Linux consider themselves security experts or think that they have closed the holes just because they know about a standard check
Re:Missed the biggest hole (Score:2, Insightful)
It might be more accurate to say that people who are aware this tool exists are security minded enough to want to know how to close the holes, and what the holes are. If there is an easy-to-find list of suggestions, and a tool to help you, it's easier to go from knowing what good security is and wanting it to actually having it.
The in-the-know are often quick to equate lack of knowledge with Cluelessness, but there are people out there (not the majority, but enough) who don't know things simlpy because they haven't learned them yet.
Open Source vs Free Software (Score:3, Informative)
If it is perl it is Open Source. But, just because it is Open Source, it isn't necessarily Free.
So please don't say Open Source when you mean Free Software.
Re:Open Source vs Free Software (Score:3, Offtopic)
Open Source (for me) means, you're able to "take an active part in development" not only "be a able to watch it". The second one is "Shared Source".
Re:Open Source vs Free Software (Score:2)
Re:Open Source vs Free Software (Score:3, Insightful)
Re:Open Source vs Free Software (Score:4, Insightful)
You've missed the difference between having the source code available (sometimes referred to as "open source") and Open Source [opensource.org].
In short, having source code available does not make a project Open Source - its all about the licensing. And not all Open Source projects match the Free Software definition (witness FSF vs BSD jihads).
Re:Open Source vs Free Software (Score:2)
But hey - I like both the BSD and GPL. So I tend not to track those arguments.
It's so Microsoft (Score:4, Informative)
Re:It's so Microsoft (Score:1)
Re:It's so Microsoft (Score:1)
No it's not (Score:3, Informative)
You first point concerns hfnetchk, and the prompt you receive is to validate the signature on the file to insure it hasn't been spoofed. I don't understand why you would complain about this.
The second point is inaccurate, I had it complain about numerous Microsoft services on my system such as MSSQL, TermServices, BITS, Automatic-Update, ASP.NET and so on. It doesn't seem to be really complaining about anything, it's just listing everything that it didn't expect to see there. I don't see the point of htis.
The third point is understandable because it requires access to secured areas of the system. If it doesn't warn you then that's an issue.
If you check the members list of CIS you'll see a variety of names, government agencies, companies and such... But you won't find Microsoft's name there.
I haven't looked at this terribly closely but it seems like a good start. I do see a number of pretty glaring errors in their document, I'm going to send them a note asking about them.
Re:It's so Microsoft (Score:1)
I got this on Redhat 7.2 (Score:1)
Don't waste your time unless you run rh or mdk (Score:5, Informative)
Despite the fact they say this is for "linux," it is not nearly that generic.
Re:Don't waste your time unless you run rh or mdk (Score:1)
It doesn't appear to be a very sophisticated eval tool at any rate - the site / org seem to be relatively credible, but then that may just be appearance.
Re:Don't waste your time unless you run rh or mdk (Score:2)
Page 2 of the documentation is a title page which states "Linux Benchmark v1.0.0 (Red Hat and Mandrake Linux)". That pretty much says it all.
Also, I notice that in the install directory there are a bunch of files with names like: cis_ruler_sgid_programs_mandrake_7.1. Files with names like this for RedHat 6.1-7.2 and Mandrake 7.1-8.1 are in this directoy. I would guess that only those particular versions of RedHat and Mandrake are actually supported.
Re:Don't waste your time unless you run rh or mdk (Score:1)
Nice going.
Re:Don't waste your time unless you run rh or mdk (Score:1)
Files and security are handled differently on different Linux distro's, so this is likely one of those things that's harder to make work with every distro known to mankind. Redhat and Mandrake are a start... Redhat and Debian or Slackware or SuSE would be a better start... But at least there's a start.
-Sara
Re:Don't waste your time unless you run rh or mdk (Score:2)
Re:Don't waste your breath complaining about this (Score:2)
OK, assuming I've parsed this sentence fragment correctly, you're insulted that somebody has chosen to spend money to solve part of the problem.
True enough. So you'd rather they not solve the problem at all if they can't solve it equally for everybody?
Because somebody doesn't solve the problem for everybody, they don't understand the problems other people face? That's a non-sequitur if ever I've seen one... If you understand how huge the differences between Linux distributions is, why do you think that a single tool should be able to be everything to everybody?
It seems to me that these people are spending money to try and solve other people's problems. Given this relatively altruistic gesture (though they have their reasons, I'm sure), why shouldn't they try to get the biggest bang for the buck? If covering those two distributions helps thirty or forty percent of Linux users, that's pretty darned good, if you ask me.
Even if we can take them seriously, why can't there be an open standards rating system for security? I'm not sure there's a connection between these two ideas. But just because their tool to test doesn't work on all Linux distributions doesn't mean that the standard itself can't be applied to other distributions. Did you follow the link, or just decide to shoot your mouth off?
ObDisclaimer: Jay Beale, who wrote the Linux tool, is a good personal friend of mine.
ObFlame: That said, Mr. (or Ms.) Anonymous coward, your above writing demonstrates unclear thinking. Try keeping your sentences to one thought apiece, or at most two logically connected statements. Try to have clear relationships between those sentences so that other people can follow what you're saying.
Re:Don't waste your time unless you run rh or mdk (Score:2, Insightful)
I don't mean because every cool *nix tool should be ported over for our enjoyment. I mean because, not to generalize, but generally speaking Mac users tend to be a very cocky bunch as regards security. We're used to having literally unhackable machines, and now with the move to a BSD base, all we're told is how much more secure that is than anything else on the planet, so there's probably quite a few Mac users out there who assume their cumulative hackability score is now a negative number.
Couple that with the fact that it's quickly becoming the most common form of *nix (by sheer quantity) and you've got a whole lot of potentially insecure BSD setups operating under a false sense of security, which could bring as much evil to this world as raw sockets [grc.com].
Feel free to look down on me for being some lowly point-and-drool GUI junky, but if OS X boxes start getting cracked in large numbers, then the mainstream hears that *nix isn't much more secure than the other [microsoft.com] type of operating system, and that only helps the bad guys.
Re:Don't fall for them! (Score:1)
Lucky you were here.
Here's a quick test tool (Score:4, Insightful)
#!/bin/sh
Instructions:
1. Download and run
2. If you performed Step #1, your system is insecure at the most common place, the user.
Re:Here's a quick test tool (Score:1)
Does that mean I passed?
Hang on, where's all my stuff gone?
Shouldn't the title be (Score:1)
Direct Links (Score:1, Redundant)
Doesn't _quite_ work (Score:4, Informative)
I tried it on my machine, and found the results quite wrong.
My machine started out as a RedHat 6.something, and I updated it, part with RPMs, part by hand. Lately I've upgraded to glibc 2.2.5. I run Apache (latest), Squid, and a lot of other stuff.
Let's look at the tests:
All in all, a good idea, but with some shortcomings. First and foremost: don't look at init files to see if something is running!. Look at the ports. Look at ps.
Oh well. I'm behind a NAT anyway....
By the way... why is <dl> not allowed in comments?
Re:Doesn't _quite_ work (Score:1)
Yeah, but if you have one, and someone breaks in, you've already served notice that they are not welcome. I understand this is important legally (IANAL), because you can then get law enforcement involved. Without the banner, it's like leaving your front door open, which apparently is equal to "hey, come on in and steal stuff"... The banner is like a sign on your locked front door that says "if you break in I will break you".
As for the other stuff, I checked out a 1.0 beta copy of the CIS Security Scanner over a year ago and it failed to find a couple of things. I think sendmail was one of them - CIS was doing something silly like "ps -ef | grep 'sendmail - Accepting connections'", and my sendmail didn't show up like that. I forget what else went unnoticed.
I emailed CIS about it and got back a "Gosh! Wow! Thanks for telling us, we'll certainly look into that!" reply. I got the impression that what they meant was "uh oh, we didn't think of that", though they didn't come right out and say it.
Re:Doesn't _quite_ work (Score:2)
legalities. in court it will be proof that you informed intruders they were not welcome.
This machine isn't being used as an NFS client False, I have all the clients in place. I just haven't any mounted NFS volume
huh? it is not being used.
but in general it looks like that tool really is fucked up. why not repackage nessus, nmap and tripwire?
Re:Doesn't _quite_ work (Score:2)
Well... OK. We cheated. We just check the mtime on the RPM databases. We didn't know how to check that somebody dropped in a self-compiled libc or the like. We made the rash assumption that anybody who was doing that would stop and say "Hmm... *have* there been any updates I've not applied in the last month"....
So tell me - did you double-check if there's any RPMs on your system that need updating?
They don't look at IPtables (Score:1)
Re:Doesn't _quite_ work (Score:2)
>Er, yes, that's because I like to be able to print.
>Mail daemon is on and collecting mail from the network.
>Where the heck else is smtp going to collect mail from??
It could just be routing mail between local accounts. Maybe that configuration isn't so common anymore, but it does have the longest history. Anyway, what's important security-wise is that local routing doesn't require an SMTP server.
>Negative: 3.14 named DNS server not deactivated.
>Correct; it is serving DNS for my home LAN. It wouldn't perform that task very well if it was deactivated.
>samba smb rc script not deactivated.
>Er, right. That's because I use SMB.
>All quite silly, and that's just part of it.
Okay... It's not like you don't have your reasons for running the things that are being flagged. But simply having more services running makes your system more vulnerable to attack. That's what's being indicated.
>Note that the whole home LAN is firewalled, but for some reason it didn't bother checking for that!
Huh? The firewall may improve the security of your network, but it doesn't really affect the security of your system itself. And, even then, either the linux box in question is doing the firewalling, and thus one side is exposed, or it isn't, and so the firewalling is being done on another system, and would be difficult to detect. Although, if your system is the firewall box, it would be useful to be able to make sure that no unnecessary services were active on the outer connection.
Re:Doesn't _quite_ work (Score:1)
>>Where the heck else is smtp going to collect mail from??
>It could just be routing mail between local >accounts. Maybe that configuration isn't so common
>anymore, but it does have the longest history.
>Anyway, what's important security-wise is that
>local routing doesn't require an SMTP server.
Latest Redhat installs sendmail listening on loopback (127.0.0.1) for a reason. Why? Some utilities (can't give you an example) that need to send email only speak SMTP, instead of using mail or sendmail.
Re:Doesn't _quite_ work (Score:2)
It might, some apps are configured to alway sconnect to a SMTP server to send mail, that way the app only needs a single configuration regardless of if the mail is to be handled locally or remotely. If this is the case, then it would be best if you configure the SMTP server to only allow connections on 127.0.0.1, and use this in the application.
Delusions of grandeur? (Score:3, Insightful)
Re:Delusions of grandeur? (Score:2)
The same thing that makes you think you won't get caught in the
Odd (Score:2)
It scored me negatively for not having all users in /etc/ftpusers, even though I'm not running ftpd. Plenty of other cases like this.
So far, very impressive. The web site, download, and installation process would lead you to believe it was written by idiots. Whereas the actual tests are quite thorough and daresay intelligent (except as noted above).
Re:Odd (Score:2)
bin has a valid shell of
are kind of odd also.
how is nologin a valid shell? what should be there in it's place?
im also getting:
Graphical login not deactivated.
It is my workstation.
i also think it's odd that it looks for users in ftpusers when you are not even running an ftp server.
Re:Odd (Score:2)
Possible poll? (Score:1)
Standards, eh? (Score:2, Insightful)
Ever-moving Goalpost... (Score:1)
It would be much more useful for the distro builders (Commercial and Non-Commercial alike) to place Security at the head of the queue when designing the default install configurations of their OS's.
OK, so your average home user doesn't want to care about system security, but until OS's can transparantly, securely, safely & automatically install the latest security updates, without causing 'big brother' feelings in their users, and with enough protection in place so that the update mechanism cannot be fooled, spoofed or tampered with by a malicious 3rd party (not likely in the near future!), then everyone should be taking an active interest in the security of their systems.
This tool will definately be useful, but only when used in conjunction with a whole bunch of other testing tools, and only when these are all combined with a healthy dose of common sense. It's a good development, but system security tools in general still have a long way to go...
Ridiculous (Score:1)
(The 1552 ports scanned but not shown below are in state: closed)
Port State Service
22/tcp open ssh Nmap run completed -- 1 IP address (1 host up) scanned in 0 seconds
----
tar -zxvf cis-linux.tar.gz
cd cis
rpm -ivh CISscan-1.2.0-1.2.i386.rpm
------
Lets see... The only daemon I have installed, and running is SSH... the only account available is root... and it spits out this garbage?:
Final rating = 6.07 / 10.00
Lets try turning off ssh... and then doing it:
Final rating = 6.07 / 10.00
weeeelllll... so... with no daemons listening whatsoever, no ports open... no way in other than the keyboard I'm holding... and no user other than root....... this thing needs some tweaking...
Re:Ridiculous (Score:1)
And it also has several false alarms and places where the code is pretty fucked up. Oh well.
I've used it on Win2k (Score:2)
I've already used this on a few Windows2000 machines. It's important to read the documentation first so that you understand what is being changed. There will be some items you'll probably want to go back and change. At the time of the release, they only had a Level 1 template. Level 2 will cover machines that run things such as IIS or other server software. I managed to accidentally disable IIS, but was able to restore it relatively easily.
Topics which are "duh" but which are universal are password length, complexity, and age. Next step is to shut off unnecessary services. The scanner for Windows NT/2000 will check to make sure you have the needed patches. If you don't, it will give you URL's of where to find them.
Good for the Very Basics (Score:3, Informative)
I've been in shops where their idea of 'security' was to have each individual user download their own version of Zone Alarm. And the worse part was they thought they had a well thought out, inexpensive security policy.
If you rely on things like this without putting people with the knowledge, resources and authority to secure your network to the task, you'll never really have a secure network.
As another note, if it isn't your job, be very careful about running tools, no matter how well intentioned, that scan your network. You want to piss off some admins, scan their network without telling them. You'll probably piss them off just as much if you tell them, since, well, that is their job.
Re:Good for the Very Basics (Score:1, Interesting)
Re:Good for the Very Basics (Score:1)
The telnet banner is ludicrous, as it won't stop anyone, and at the very least is a waste of that individuals time to change.
A plethora of other false security holes are given to the user, and if the user is ignorant enough would cause them to have to reconfigure useless services which aren't even installed on their systems.
enough said.
Re:Good for the Very Basics (Score:2)
Real security comes from knowing that your servers will be compromised. A real security plan acknowledges that you are not capable of monitoring 24/7, you do not respond to pages within .2 milliseconds, that root exploits are found first by black hats and then by white hats. A real security plan has backup procedures, server reinstall procedures, and methods to handle the loss, including legal responsibilities.
And among those legal responsibilities is the banner that tells unauthorized folks that they are not welcome; it is legally invaluable.
Re:Good for the Very Basics (Score:1)
ARgh Registration... (Score:2)
Linux [cisecurity.org]
Solaris [cisecurity.org]
HP-Unix [cisecurity.org]
Cicso Router (nix) [cisecurity.org]
Cisco Router (win) [cisecurity.org]
Win2k/NT [cisecurity.org]
I'd hate to see this become a standard.. (Score:3, Insightful)
It complained about xinetd and ftp being misconfigred even though both xinetd (and by extension wu-ftpd) aren't running. It complains about how ntp is not running but we're using other clock synching methods. I'm getting a reduced score on bullshit.
I can see it now... "Sorry, we only do business with vendors whose servers score 9.5 or better"
The fundamental flaw (Score:2, Insightful)
If a box is in a locked room and only accesible thru the network then only it's network security is relevant etc. etc.
This is NOT for Linux (Score:2)
This is NOT for Linux. Instead, it is for Redhat and Mandrake. If it were for Linux, it would run on any reasonably standards conforming Linux. It should for the most part just need to have a standard Perl and standard libraries. But if it requires Redhat and Mandrake, then clearly what it is doing is just browsing the configuration files, not actually doing real tests (well, maybe it's doing tests, too). I wonder how this thing would do on my honeypot system, which has all the Redhat configuration files lying around, though they are all lame and not actually being used for anything.
Really effective firewall (Score:1)
A really effective firewall:
Find a pair of wire cutters. Find the ethernet cable connecting you to the network. Place the wire cutters approximately in the middle of the cable and squeeze the handles firmly until the cable is cut. There. Now you're safe.
The standard never actually gives a 10 score. (Score:3, Funny)
Indeed, 3 points are deducted for the severe flaw "system has a luser who blindly runs software he downloaded from the internet."
Ran it on my system (Score:2)
And I scored 6.79. But a few things that it docked points for seem out of line. Running postfix will dock points (I'd assume that running any MTA) will dock points, from the wording of the report.
I realize that MTA's can be exploited, but it seems that the only way to get a 10.00 is to have a system that has no network connection to the outside world.
Accepting risk (Score:1)
Re:Ran it on my system (Score:2)
That's not surprising, as Mandrake tends to enable Postfix and xinetd in the default install.
Security analyzer for windows (Score:1)
Re:Security analyzer for windows (Score:2)
Oh wait, I found the source code for the test:
if (OS == Windows*) {
cout >> "Your computer is secure. Score 10.0";
}
Great, now I'll get in trouble for reverse engineering...
A few clarifications,from one of the culprits (Score:3, Informative)
1) There is *NO* expectation that a usable system will score a 10.0. I fully expect that having a usable system score over a 9.0 will require some work. The laptop I'm writing this on finally scored an 8.8 after much tweaking. However, I *KNOW* what 11 or 12 things didn't pass, and I know to keep an eye on them. As I said to one of the other people - "I tighten it down any more, my score will go up but I'll break something I need on a daily basis". *THAT* is the score we want everybody's machine to get.
2) A number of people have complained it checked
3) Yes, we know there weren't any really stringent firewall tests. This was a point of MUCH contention during development - we had to balance the security aspect of every item against the likelyhood that it would Severely Screw Up somebody's machine if implemented. Note that even RedHat recognized that there's no "One Size Fits All" for firewalls, and provides 3 basic levels of paranoia.
4) There's a LOT of stuff (like firewalls) that are good security measures that are *NOT* appropriate for "almost every machine". These will hopefully be visited in a "Level 2" benchmark in the near future.
5) Yes, there's rough edges - if you find something annoying, *please* send a comment to the appropriate e-mail address.
Remember - these are *consensus* benchmarks. We *do* listen to user feedback. And no, you don't have to be a CIS member to send feedback.
Re:A few clarifications,from one of the culprits (Score:2)
And another thing - PELASE REGISTER (Score:2)
They can't do that if you don't register - if they have 5,439 downloads that bypass the registration, they dont know if it's 5,439 people downloading once or one bozo who keeps downloading it. And given the existence of caching proxies and DHCP, it's a mess to corrolate enough to prove two downloads were different people...
Site created with Microsoft Frontpage (Score:1)
<meta name="GENERATOR" content="Microsoft FrontPage 3.0">
in their pages, you know how much you can trust them...
And their "standards"? It's nothing more than those that every competent sysadmin could tell you : close unnecesssary services, some tweaks here and there. The majority of content in that PDF only tells you HOW to disable unnecessary services. It'd be more appropiate to put them in "Security for Redhat Linux in 24 Hours". Scary for them to declare it as a "standard"...
Re:Congratulations, you've violated the EULA (Score:2)
And everybody's uisng the scoring tool received from CIS, so nobody's violating (f).
The part about (f) basically means that you can't go saying "I scored a 5.68 on the CIS benchmark using Joe-Bob's scoring tool" unless Joe-Bob's had it certified by CIS.
Re: Use a Mac as a server. Unkrackable history! (Score:1)
An unsecure application running on a Mac makes the Mac even more vulnerable than most other Operating Systems, because under Mac OS every application has full access to all system resources (Mac OS does not have multiuser security).
Instead, if you run a webserver, which is secure to run on a Mac, on Linux or something else (whatever you want), and that webserver does not have security bugs, then any other operating system is even more secure than your Mac, because other operating systems have multiuser security, additionally to the secure webserver.
Mac OS is not a secure OS - maybe you are running a secure webserver on top of the unsecure Mac OS, but then you are talking about the wrong thing, because the webserver does not have anything to do with OS security.
There are *much* more secure operating systems than Mac OS. Most of them would have been able to stop an attacker, who just exploiting a third-party Addon application, because these OSes do not depend on application level security.
Take a look about XTS-400 from Getronics, Pitbull from Argus Systems, Trusted Solaris from Sun or OS/400 from IBM to understand, how real security works (EVEN IF your application gets hacked).
Mac OS is not suitable as a server OS, because it does neither have protected memory nor preemptive multitasking.
Mac OS X might be suitable as a server, but I think it is mainly meant to be a workstation OS.
regards,
octogen
And, by the way, SecureOS from Secure Computing has NEVER been hacked, Argus Pitbull on AIX and on Solaris/SPARC have NEVER been hacked (and only once on Solaris/Intel, Sun's fault, not Argus'), Getronics XTS-400 has NEVER been hacked - although those OSes where running a lot of *insecure* third-party addons.
So please, don't pretend that Mac OS is secure, if you can't prove it.