* [gentoo-dev] Ports Security @ 2003-09-05 1:10 Jan Krueger 2003-09-05 4:17 ` Mike Frysinger 0 siblings, 1 reply; 4+ messages in thread From: Jan Krueger @ 2003-09-05 1:10 UTC (permalink / raw To: gentoo-dev Hi, is there a guide like http://www.openbsd.org/porting.html#Security in progress? available? Or even better tools bundled in a "esecurity_check": src_unpack() { blabla unpack epatch blabla # check unpacked and patched source tree for security issues # like in http://www.openbsd.org/porting.html#Security esecurity_check || die } ? Something like that? In progress? Or even ready for testing? already finished? Someone just forgot to mention? I was to blind to see? Gruß Jan -- gentoo-dev@gentoo.org mailing list ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [gentoo-dev] Ports Security 2003-09-05 1:10 [gentoo-dev] Ports Security Jan Krueger @ 2003-09-05 4:17 ` Mike Frysinger 2003-09-05 14:13 ` Jan Krueger 0 siblings, 1 reply; 4+ messages in thread From: Mike Frysinger @ 2003-09-05 4:17 UTC (permalink / raw To: gentoo-dev [-- Attachment #1: signed data --] [-- Type: text/plain, Size: 873 bytes --] On Thursday 04 September 2003 21:10, Jan Krueger wrote: > Hi, > > is there a guide like > http://www.openbsd.org/porting.html#Security > in progress? available? uhh we have gentoo-hardened ... not sure what you're asking about ... > Or even better tools bundled in a "esecurity_check": putting this in an ebuild to be run everytime a pkg is unpacked is kind of dumb (no offense meant) ... we have no 'automated' ways for portage to scan source code looking for potential security issues, nor should there be ... the responsibility lies on the upstream author and the gentoo maintainer, and it should stop there ... perhaps creating tools for developers to use when testing out a new pkg would be feasible ... then again i think if you want a 'secure' box you should follow the excellent work the gentoo-hardened team has put together ... -mike [-- Attachment #2: signature --] [-- Type: application/pgp-signature, Size: 827 bytes --] ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [gentoo-dev] Ports Security 2003-09-05 4:17 ` Mike Frysinger @ 2003-09-05 14:13 ` Jan Krueger 2003-09-05 12:37 ` Mike Frysinger 0 siblings, 1 reply; 4+ messages in thread From: Jan Krueger @ 2003-09-05 14:13 UTC (permalink / raw To: vapier, gentoo-dev On Friday 05 September 2003 04:17, Mike Frysinger wrote: > On Thursday 04 September 2003 21:10, Jan Krueger wrote: > > Hi, > > > > is there a guide like > > http://www.openbsd.org/porting.html#Security > > in progress? available? > > uhh we have gentoo-hardened ... not sure what you're asking about ... I am asking about something like http://www.openbsd.org/porting.html#Security a guide for portage developers how to make sure the things installed are secure. Just like http://www.openbsd.org/porting.html#Security And i am asking about a way for me, the user, administrator, to check the potential security impacts of the software to install before it is put into action. > > Or even better tools bundled in a "esecurity_check": > > putting this in an ebuild to be run everytime a pkg is unpacked is kind of > dumb (no offense meant) ... Thats your point of view. > we have no 'automated' ways for portage to scan > source code looking for potential security issues, nor should there be ... > the responsibility lies on the upstream author and the gentoo maintainer, > and it should stop there ... No, it should not. Site Security doesnt stop at the ebuild maintainer. I, as a potential user of "trusted gentoo", would like to have a way to verify the work of the developer. I might want to use 3rd party ebuilds, commercial ebuilds, special super-hardened ebuild not in normal portage tree, i might have requirement complety different from what the developer thought. And also it is impossible to bring all those ebuild to the high security standard i mention here, so i should have the possibility to verify at emerge time. So, instead of "esecurity_check" it should be a portage feature that i can switch on. After every unpack or even building the image, just before installation, i would like to see what security impacts the package might have in its source or how many suid progs it wants to install or whatever. And if i say so, the ebuild should not install as soon as the scanners detect that the installed software would not conform to my requirements (that i would have to define in make.conf). > perhaps creating tools for developers to use when testing out a new pkg > would be feasible ... Yes, that would be very nice. > then again i think if you want a 'secure' box you > should follow the excellent work the gentoo-hardened team has put together According to whats written on the project side the issue i bring up here is not (yet) covered. a secure box can always be compromised by installing insecure software. So installing secure software (only) should be made easy and verifyable. As portage is responsible for installing software on our gentoo machines it should support us in developing and installing secure software. The feature i bring to discussion here is for sure not the overall solution but a little step in the right direction. It is dumb (no offense meant) to believe the ebuild-maintainer knows about and respects the local Site Security Requirements. It is dumb to believe every administrator or user is a security expert and can audit each software package before installation. Jan > ... -mike -- gentoo-dev@gentoo.org mailing list ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [gentoo-dev] Ports Security 2003-09-05 14:13 ` Jan Krueger @ 2003-09-05 12:37 ` Mike Frysinger 0 siblings, 0 replies; 4+ messages in thread From: Mike Frysinger @ 2003-09-05 12:37 UTC (permalink / raw To: gentoo-dev [-- Attachment #1: signed data --] [-- Type: text/plain, Size: 3020 bytes --] On Friday 05 September 2003 10:13, Jan Krueger wrote: > a guide for portage developers how to make sure the things installed are > secure. Just like > http://www.openbsd.org/porting.html#Security we dont have one and i dont believe there are plans for one ... again, the people who would be writing it are the gentoo-hardened team but i havent seen any mentions of it on the hardened list ... > Thats your point of view. not really ... the performance hit is not acceptable > No, it should not. Site Security doesnt stop at the ebuild maintainer. > I, as a potential user of "trusted gentoo", would like to have a way to > verify the work of the developer. then verify it ... either you trust gentoo developers or you dont ... > I might want to use 3rd party ebuilds, commercial ebuilds, special > super-hardened ebuild not in normal portage > tree, i might have requirement complety different from what the developer > thought. like i said this is were the special util or pkg could be utilized that would do this kind of security scan ... basically it is used whenever the user wants to do that kind of research. but again, no such think (afaik) exists. > And also it is impossible to bring all those ebuild to the high > security standard i mention here, so i should have the possibility to > verify at emerge time. So, instead of "esecurity_check" it should be a > portage feature that i can switch on. in that vein, no work has been done > After every unpack or even building > the image, just before installation, i would like to see what security > impacts the package might have in its source or how many suid progs it > wants to install or whatever. And if i say so, the ebuild should not > install as soon as the scanners detect that the installed software would > not conform to my requirements (that i would have to define in make.conf). talk to hardened ... there is already work to trim out all (if possible) suid binaries ... > According to whats written on the project side the issue i bring up here is > not (yet) covered. a secure box can always be compromised by installing > insecure software. So installing secure software (only) should be made easy > and verifyable. As portage is responsible for installing software on our > gentoo machines it should support us in developing and installing secure > software. well, there are instances where this is not true, but lets not bother mincing words on a moot point ;) > It is dumb (no offense meant) to believe the ebuild-maintainer knows about > and respects the local Site Security Requirements. It is dumb to believe > every administrator or user is a security expert and can audit each > software package before installation. agreed but all in all, i'd suggest taking this thread to the hardened list. the people who are on that list make security their #1 focus. you'd get a very different reception (probably more useful input) than here on -dev. -mike [-- Attachment #2: signature --] [-- Type: application/pgp-signature, Size: 827 bytes --] ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2003-09-05 12:37 UTC | newest] Thread overview: 4+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2003-09-05 1:10 [gentoo-dev] Ports Security Jan Krueger 2003-09-05 4:17 ` Mike Frysinger 2003-09-05 14:13 ` Jan Krueger 2003-09-05 12:37 ` Mike Frysinger
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox