Securing Mac OS X Tiger 130
Stephen de Vries writes "Mac OS X is one of the most secure default installations of any OS. But it is still possible to lock the OS down further, in order to meet corporate security guidelines or to securely use network services. Corsaire has released a guide to Securing Mac OS X Tiger (long pdf) which addresses the new security features introduced through Tiger and presents some security good practice guidelines."
I once tried to secure a tiger (Score:5, Funny)
Re:I once tried to secure a tiger (Score:1)
Re:I once tried to secure a tiger (Score:5, Funny)
Does the tiger let you out for walks?
Nice to see you... (Score:5, Funny)
Next time... (Score:4, Funny)
Wear good earplugs.
Re:I once tried to secure a tiger (Score:2)
Re:I once tried to secure a tiger (Score:2)
Re:I once tried to secure a tiger (Score:2)
"long pdf"? (Score:4, Funny)
But of course, I don't think anyone ever tries to RTFA, so the thoughtful gesture is lost on us....
Re:"long pdf"? (Score:2, Interesting)
There have warnings accompanying long related articles for time eternal - some people come here primarily for discussion (sort of like an online book club). The article is a "necessary nuisance" for this bunch, hence the disclaimer. For those who actually come for information it isn't so much of a concern.
Now since I'm here for discussion, what's the deal with
Re:"long pdf"? (Score:1, Offtopic)
Re:"long pdf"? (Score:2)
Adobe reader, good gosh.. you now know why it took me so long to make such a small comment
Re:"long pdf"? (Score:2)
Re:"long pdf"? Not missed much... (Score:3, Interesting)
Yeah, 41 pages long. If you ever read "basic secure your Linux box", well, that's it. I'm dissapointed that a real Mac problem was not addressed. It allows you world writable Applications directory, and
It contains:
Setting password, Displaying warning, locking your firmware (well, this one is the only deviation from "Lock your box for real world dummies"), enabling ACLs
Does default matter? (Score:5, Insightful)
Re:Does default matter? (Score:3, Insightful)
Re:Does default matter? (Score:2)
A company would be foolish not to consider the security of the default install of an OS and comparing it with the security of others.
Re:Does default matter? (Score:2)
Re:Does default matter? (Score:3, Insightful)
Re:Does default matter? (Score:3, Insightful)
Corporate IT departments prefer working on applications, servers, and such. They abhor "help desk" duty which is what setting up drive images, desktops, and scuh.
So frankly, the IT department usually doesn't give a care what the desktop users use - its the help desk department that does.
Re:Does default matter? (Score:1, Insightful)
No, because these things should be done by default by the OS vendor.
Re:Does default matter? (Score:5, Interesting)
I've seen very secure corporate environments using OS X where everything works splendidly (including roaming profiles actually carrying _all_ of your settings with you). Also, the security manages not to get in the way of day-to-day activity.
That's what converted me to *nix. (Score:1)
Re:Does default matter? (Score:2)
It comes from the basic approach to security that is different in windows from pretty much any other system. Other systems assume the user has no administrative privileges, and require positive credentials to gain those privileges.
Windows assumes the user is also the administrator, and you must remove privileges from
Re:Does default matter? (Score:2)
Re:Does default matter? (Score:4, Informative)
They're all turned off.
Even on the server version, only SSH is turned on by default.
Do you really need a firewall until you turn on any services? Most users will never do this. And they have a GUI for the firewall that allows holes for most typical services with just a check box.
CIA still using OS X? (Score:3, Interesting)
Re:CIA still using OS X? (Score:5, Informative)
Re:CIA still using OS X? (Score:4, Informative)
NSA did a pretty good writeup of Securing Mac OS X Panther Server [nsa.gov] earlier this year. One can still apply all the recommendations to Tiger Server.
Re:CIA still using OS X? (Score:1)
Secure swap space (Score:5, Informative)
Wait for it... (Score:5, Funny)
Re:Wait for it... (Score:4, Interesting)
Anyone know if filevault's key is encrypted against anything apart from the user's key and the optional recovery key?
Long answer... (Score:1)
Non-free encryption is untrustworthy. (Score:2)
Re:Non-free encryption is untrustworthy. (Score:1)
In order to get the whole sequence mostly invisible to the user, they re-wrote the login code to enable the disk image to be mounted before your KeyChain was available (as the KeyChain is stored on the encrypted image.
Parts of FileVault (the image mounter and stuff) are in Darwin and thus you can see the source, however hdiutil and hdid (control most of disk image subsystems) are not available as Apple considers them competitive advantages.
Re:Secure swap space (Score:2)
staying secure (Score:3, Insightful)
More securing OS X links/pdf's etc (Score:5, Informative)
http://www.net-security.org/dl/articles/Securing_
http://eq.rsug.itd.umich.edu/software/radmind/ [umich.edu]
http://homepage.mac.com/hogfish/PhotoAlbum2.html [mac.com]
Best tip (not a flame) - simply don't run any Microsoft software, support open or other vendors software please, also W3C standards, thanks.
Windows password hash storage (Score:2, Interesting)
By default, OS X stores your password as a nice secure hash. However, it also stores it using Windows' shitty hash method, that takes approximatly 0.000000001 seconds to brute force with John the Ripper [google.com].
So it's advisable to somehow disable this functionalty.
Re:Windows password hash storage (Score:2)
Re:Windows password hash storage (Score:2)
Re:Windows password hash storage (Score:3, Informative)
Otherwise, you may be happy to know that on Tiger there is no "hash" subdirectory in
Maybe it's stored somewhere else. Or maybe Apple fixed this vulnerability in Tiger (your experience is with Panther anyway).
Re:Windows password hash storage (Score:3, Informative)
Apple fixed this in one of the recent Software Updates. It was mentioned in the release notes.
Re:Windows password hash storage (Score:3, Informative)
Re:Windows password hash storage (Score:5, Informative)
Cortana: "By default, OS X stores your password as a nice secure hash. However, it also stores it using Windows' shitty hash method, that takes approximatly 0.000000001 seconds to brute force with John the Ripper"
On Tiger, this is not true. In Tiger, one has to explicitly check a checkbox for each user, and enter that user's password, to allow those users to use Windows sharing. The sheet with these checkboxes states:
"Sharing with Windows computers requires storing your password in a less secure manner. You must enter the password for each account that you want to enable."
So, Windows file sharing is there, but Apple has not exactly made it easy to enable it.
Given this UI, I guess that there is no way to secure this weakness in Windows file sharing without breaking compatibility.
Re:Windows password hash storage (Score:1)
Metadata in the PDF (Score:4, Interesting)
Move your keychain file to a removable disk (Score:4, Informative)
Re:Move your keychain file to a removable disk (Score:2, Insightful)
Good guide overall (Score:3, Informative)
Re:Good guide overall (Score:3, Informative)
The problem with chrooting on 10.4 now is that Apple's network home mounting method borks if you have
small world Durandal.
(dhaveconfig/netsrek)
Three thumbs up (Score:4, Interesting)
I had already applied some of the security recommendations, such as enabling security on Open Firmware, but I've just learned there are a plethora of other security options available on Mac OS X 'out of the box'.
There are options in Tigers security preferences that allow swap space to be encrypted and to avoid passwords being accessible in the clear when stored in memory and swapped to disk. Kernel core dumps can be be disabled for similar reasons.
Password policies! I had no idea Tiger could do that.
After going through this article and learning a bit more about how KeyChain works, I've started creating my own keychains to store 'Secure Notes' and I've finally accepted that Safari does do 'auto-logon' securely in the way it uses KeyChain.
This is a very good article.
Re:Three thumbs up (Score:2, Interesting)
It can starting with 10.3. I have an older article about it on my site here [afp548.com]. The article is from 10.3, but really just more of it works now on 10.4. Also look at the site for my login times script that uses pwpolicy to imitate the login hours policy that other OSes offer admins.
Last year at MacWorld SF, I put together a pwpolicy GUI in AppleScript Studio for a live demo. I also did a minor bit of pwpolicy scripting at WWDC this year. If you have an
Re:Three thumbs up (Score:1)
Re:Three thumbs up (Score:1)
Re:Three thumbs up (Score:2)
I have an ADC Select membership and there is no WWDC option on the ADC site for me. (It only lists ADC Store, Downloads, and My Account)
In past years there was a way to buy access to the WWDC session videos and stuff after WWDC was over. This year there doesn't appear to be an way to do so.
Easy as any O/S to secure... (Score:5, Insightful)
1) Unplug it from any network.
2) Strictly control whoever gets physical access.
3) ???
4) Security!
Seriously... after watching some dipshit try over 4,000 times within the span of a couple hours to attempt buffer overflows on every listening port on my honeypot last Friday afternoon, before I finally blacklisted his entire class C from my router, I've come to the same conclusion that the DoD has... that NO computer connected to the Internet can be made secure... period... that you should only connect disposeable devices to the public Internet.
I even wonder if I'm not the bigger dipshit for sitting there watching this idiot half the afternoon, throwing the kitchen sink at my poor machine in vain, before pulling the plug on him and banishing his whole netblock.
Re:Easy as any O/S to secure... (Score:2)
To me, it means that you can put a mac on a network in the default configuration and have a 100% secure configuration.
With OS X, you can get security with the following:
1. Setup regular accounts for other users who share your computer. keeping admin account to yourself and not enabling root.
2. There is no step 2.
This prescription works for anyone other than say the NSA or CIA.
Open Ports (Score:3, Interesting)
An OS without *any* open ports can still be vulnerable, by merely having a TCP/IP stack connected to a public network. Even if the stack merely can only respond to ICMP packets (no tcp or udp ports open, nor any other IP protocols enabled), it can still theoretically be vulnerable to DoS attacks via ICMP.
TFA makes no mention whatsoever of disabling ICMP.
Re:Open Ports (Score:2)
Nobody is going to DoS a workstation anyway. Come on let's be realistic here.
What is Interesting: (Score:1)
Disabling ssh password logins (Score:1)
Knowing that this was a new development in Tiger, I compared the new config file with an older one from Panther and noticed the line #UsePAM no. Uncommenting this finally disabled passwords, which implies that the
Re:Most secure? (Score:2)
Re:Most secure? Says: mi2g (Score:4, Informative)
http://www.macworld.com/news/2004/11/02/mi2g/inde
Re:Most secure? Says: mi2g (Score:2, Insightful)
I think there might be two problems with the information assuming the numbers are normalized on installs vs succesful compromises. First, Mac OS X is the most widely sold UNIX like OS in
Re:Most secure? Says: mi2g (Score:1)
Sorry, when it comes to security, I like fresh data...
That report might have been accurate at that very moment in time, but the area of information security is so dynamic, that older reports, such as this one, while insightful, shouldn't be used as a barometer for the present or the future.
Re:Learn about Apple's misdeeds and mischief (Score:1, Insightful)
Re:Learn about Apple's misdeeds and mischief (Score:2)
I bought a printer two weeks ago. IT TOO CAME BUNDLED WITH A DRIVER.
I notice I was powerless to install another driver to work it, this bundling meant I was not able to get a driver for my Canon from Epson, HP, Netscape, Pioneer or DeWalt.
This is a monopoly!
Read before you sudo rm -rf / (Score:5, Informative)
Folks, sudo puts you into superuser mode and executes a command, rm. rm removes files, in this case, all of them.
Unless you enjoy completely rebuilding a system and losing all your data files, don't run this command.
Another tip: never enter console commands you don't understand.
Re:Read before you sudo rm -rf / (Score:3, Insightful)
Re:Read before you sudo rm -rf / (Score:1)
Poppycock! Recklessly fucking up your computer is the only way you'll learn anything!
Re:mod parent down: clueless alarmism (Score:2, Informative)
Doesn't work, please advise... (Score:1, Funny)
Seriously, given the inferiority of Microsoft software, it would do the world a favor if someone would "rm-ed" their stuff worldwide.
We Mac users keep waiting for that certain virus to do the job.
Prison isn't as bad as it's made out to be, you'll be out in 5 years on good behavior.
Re:You should also run Apple's bundled secure scri (Score:3, Interesting)
Re:You should also run Apple's bundled secure scri (Score:3, Interesting)
Windows has the same feature, so what?
On Linux you can install libtrash or any other kind of protection, which is much nicer than any filesystem default, so what?
On VAX all the versions were collected, so what??
It is downtime and service needed that counts not someone with EnCase. Problem is that you can do rm / by default and not what it does and not wheter Mac is holy or not.
Re:You should also run Apple's bundled secure scri (Score:2)
Re:You should also run Apple's bundled secure scri (Score:2)
Although your comment was correct in every aspect, it also failed in every other viewpoint.
It is not the question of security if files are gone or not (if this would be the question then your comment is 100% correct), real question here is "Can they dissapear (even temporarily) due to lack of security and couse loss or downtime?"
Re:You should also run Apple's bundled secure scri (Score:2)
Like any other Unix system, you should take care who gets sudo access. In the case of OS X, and Admin user can use sudo, while a Standard account can not.
Re:You should also run Apple's bundled secure scri (Score:2)
Question here is if default user (usualy users don't create more separate accounts) is admin:) and if "sudo rm" is possible by default.
Maybe you didn't get it, but joker (as you described parent poster) was aiming at the same sentence (and the same flaw, default user being admin by default, I'm not saying you can't restrict this account) as I did:)
Transcribed from original
Stephen de V
Re:You should also run Apple's bundled secure scri (Score:1)
Quicker way to secure a Mac (Score:3, Funny)
Re:Quicker way to secure a Mac (Score:2)
It was protected by a Jaguar, but they're a bit passe these days.
Re:That's all well and nice ... (Score:3)
Re:That's all well and nice ... (Score:1)
face it: microsoft may suck, but intel (and amd) has given a pretty nice performance/price ratio compared to apple hardware. Maybe it's cause the power pc wasn't manufactured in massive quantities? I don't know.
Re:That's all well and nice ... (Score:2)