public inbox for gentoo-hardened@lists.gentoo.org
 help / color / mirror / Atom feed
* Re: [gentoo-hardened] Hardened laptops
@ 2003-08-23  9:53 mike
  2003-08-23  9:59 ` David Nielsen
       [not found] ` <Pine.LNX.4.44.0308281538370.15670-100000@skyhawk.austin.ibm.com>
  0 siblings, 2 replies; 14+ messages in thread
From: mike @ 2003-08-23  9:53 UTC (permalink / raw
  To: gentoo-hardened

I just got an encrypted root filesystem working on my iBook (based on Linux 
2.6.0-testX and util-linux 2.12).  I hope to clean up my initrd sources and 
publish them in mid-September.  If anyone is interested in this, please let me 
know.

--
Mike


--
gentoo-hardened@gentoo.org mailing list


^ permalink raw reply	[flat|nested] 14+ messages in thread
* Re: [gentoo-hardened] Hardened laptops
@ 2003-08-24  8:15 A. Permyakov
  0 siblings, 0 replies; 14+ messages in thread
From: A. Permyakov @ 2003-08-24  8:15 UTC (permalink / raw
  To: mike@flyn.org; +Cc: gentoo-hardened

Sonds like an excellent idea, please count me in.  Anything I can do to help?  Got an older laptop sitting on a shelf here quite unused, would be willing to beta-test if time required is reasonable.

Thanks -- AP

----- Original Message -----
From: "mike@flyn.org" <mike@flyn.org>
Date: Sat, 23 Aug 2003 05:53:31 -0400
To: <gentoo-hardened@gentoo.org>
Subject: Re: [gentoo-hardened] Hardened laptops 

I just got an encrypted root filesystem working on my iBook (based on Linux 
2.6.0-testX and util-linux 2.12).  I hope to clean up my initrd sources and 
publish them in mid-September.  If anyone is interested in this, please let me 
know.

--
Mike


--
gentoo-hardened@gentoo.org mailing list


-- 
______________________________________________
http://www.linuxmail.org/
Now with e-mail forwarding for only US$5.95/yr

Powered by Outblaze

--
gentoo-hardened@gentoo.org mailing list


^ permalink raw reply	[flat|nested] 14+ messages in thread
* Re: [gentoo-hardened] Hardened laptops
@ 2003-08-23 13:54 mike
  0 siblings, 0 replies; 14+ messages in thread
From: mike @ 2003-08-23 13:54 UTC (permalink / raw
  To: gentoo-hardened

> 1) what's the speed penalties involved ?
> 	I only have a 500Mhz Celeron chip in my laptop so I'm kinda worried it
> will send GNOME down the drain to encrypt the entire FS.

Well, I did not do any formal benchmarks but my laptop is certainly just as 
usable as when it had a plaintext filesystem.  I have not yet noticed any 
performance issues.  Of course, I'm not capturing video or any other 
HD-intensive activities.  My laptop is an iBook with a 600MHz G3.
 
> 2) Would this be applicable to encrypting specific partitions - since
> I've been looking at encrypting my /home on my desktop as well - most
> because I can though.

My pam_mount (http://www.flyn.org) PAM module allows one to easily use their 
system password to unlock an encrypted home directory.  I recommend it if you 
want to avoid encrypting your whole hard drive.  There is a pam_losetup module 
out there as well that does something similar -- but I have not tried it.

--
Mike


--
gentoo-hardened@gentoo.org mailing list


^ permalink raw reply	[flat|nested] 14+ messages in thread
* Re: [gentoo-hardened] Hardened laptops
@ 2003-08-18  9:46 mike
  0 siblings, 0 replies; 14+ messages in thread
From: mike @ 2003-08-18  9:46 UTC (permalink / raw
  To: gentoo-hardened

> Then I wanted to move the setup to 2.5/2.6 kernels; the init command for
> doing so has stumped me. pivot_root simply does not work; there are
> other ways of doing something with mount -o bind...

Pivot_root does not work?  Is this a 2.[56]-sepcific problem?  I have been using 
2.4's pivot_root interface with mkCDrec for quite some time.  However, I have 
not tried the same with 2.[56].

I may be interested in starting work on an encrypted root system using 2.6 and 
util-linux 2.12.

--
Mike


--
gentoo-hardened@gentoo.org mailing list


^ permalink raw reply	[flat|nested] 14+ messages in thread
* Re: [gentoo-hardened] Hardened laptops
@ 2003-08-17 18:26 Joshua Brindle
  0 siblings, 0 replies; 14+ messages in thread
From: Joshua Brindle @ 2003-08-17 18:26 UTC (permalink / raw
  To: gentoo-hardened, mike

make it so... :)

i downloaded the nah6 scripts and they aren't anything incredibly complicated.. the
vmware idea is a little odd to me, if there were some other non-commercial
alternatives there might be a bigger demand from gentoo users..


Joshua Brindle

>>> "mike@flyn.org" <mike@flyn.org> 08/15/03 09:16AM >>>
I am interested in working on a secure laptop meta-project.  Laptop
security is interesting because some amount of physical security must
be addressed.  Laptop theft is big buisiness, after all.

A well designed laptop operating system would be centered around encrypted
filesystems and would have many applications:

1.  People who want to protect their personal data from theft.

2.  Buisinesses that want to protect secrets stored on their fleet
of laptops.

3.  Military applications -- laptops are all over today's battlefield
and a lucky ambush could easily reap classified information.

4.  Etc...

A company named NAH6 (http://www.nah6.com) has a product like this.
They use Linux in order to boot Windows from an encrypted volume.
I would like to focus on a Linux environment as an end.  The idea is that a 
lost or stolen laptop will not give up any sensitive information. 

Here are the components I envision including their current status:

1.  Encrypted root filesystem.  The 2.6 Linux kernel and util-linux 2.12
will provide this using an encrypted loopback interface.  A speedier
compromise is to use encrypted home directories only.  I maintain a PAM
module, pam_mount, that mounts encrypted home directories transparently.  [ If 
you don't mind a shameless plug, there is an article about pam_mount in the 
August Linux Journal. ]

2.  Encrypted swap partition (or no swap at all).  This is necessary because 
otherwise programs could swap secrets to a plaintext disk.  The 2.6 Linux 
kernel's encrypted loopback interface can do this.

3.  An inproved authentication system.  Encryption algorithms are useless
if a weak key is used.  Therefore it may be desireable to authenticate
when booting and mounting an encrypted root filesystem (or mounting an
encrypted home directory) using a physical token or other strong means.

4.  An intrusion detection system.

5.  Obviously, otherwise hardened software.

Comments?  Has anyone else talked about this around here?

--
Mike


--
gentoo-hardened@gentoo.org mailing list


--
gentoo-hardened@gentoo.org mailing list


^ permalink raw reply	[flat|nested] 14+ messages in thread
* Re: [gentoo-hardened] Hardened laptops
@ 2003-08-17 11:41 mike
  2003-08-17 17:10 ` Norman B. Robinson
  0 siblings, 1 reply; 14+ messages in thread
From: mike @ 2003-08-17 11:41 UTC (permalink / raw
  To: gentoo-hardened

>> I am interested in working on a secure laptop meta-project.  Laptop
>> security is interesting because some amount of physical security must
>> be addressed.  Laptop theft is big buisiness, after all.
>>
>> A well designed laptop operating system would be centered around encrypted
>> filesystems and would have many applications:
>>
>> 1.  People who want to protect their personal data from theft.
>>
>> 2.  Buisinesses that want to protect secrets stored on their fleet
>> of laptops.
>>
>> 3.  Military applications -- laptops are all over today's battlefield
>> and a lucky ambush could easily reap classified information.
>>
>> 4.  Etc...
>>
>> A company named NAH6 (http://www.nah6.com) has a product like this.
>> They use Linux in order to boot Windows from an encrypted volume.
>> I would like to focus on a Linux environment as an end.  The idea is that a 
>> lost or stolen laptop will not give up any sensitive information. 
>>
>> Here are the components I envision including their current status:
>>
>> 1.  Encrypted root filesystem.  The 2.6 Linux kernel and util-linux 2.12
>> will provide this using an encrypted loopback interface.  A speedier
>> compromise is to use encrypted home directories only.  I maintain a PAM
>> module, pam_mount, that mounts encrypted home directories transparently.  [ I 

>> you don't mind a shameless plug, there is an article about pam_mount in the 
>> August Linux Journal. ]
>>
>> 2.  Encrypted swap partition (or no swap at all).  This is necessary because 

>> otherwise programs could swap secrets to a plaintext disk.  The 2.6 Linux 
>> kernel's encrypted loopback interface can do this.
>>
>> 3.  An inproved authentication system.  Encryption algorithms are useless
>> if a weak key is used.  Therefore it may be desireable to authenticate
>> when booting and mounting an encrypted root filesystem (or mounting an
>> encrypted home directory) using a physical token or other strong means.
>>
>> 4.  An intrusion detection system.
>>
>> 5.  Obviously, otherwise hardened software.
>>
>> Comments?  Has anyone else talked about this around here?

> I haven't seen anything directly like this on the gentoo-hardened list 
> yet. I have seen the loopback encrypted filesystems and distro 
> discussions (nothing that isn't in the archives).

> I haven't seen anything directly like this on the gentoo-hardened list 
> yet. I have seen the loopback encrypted filesystems and distro 
> discussions (nothing that isn't in the archives). 

Norman, you brought up some great points.  I am familiar with TEMPEST, but am 
not far enough into this to start trying to mitigate its risk yet.  

I now have a few questions about the encrypted home directory scenario (most of 
root filesystem is plaintext).  Basically, is it worth it vs. an encrypted root 
filesystem?  Besides encrypting swap, one sticky point is encrypting /tmp.  Here 
are a few potential solutions:

1.  Make /tmp an encrypted filesystem, generated at boot time with a random key 
(much like encrypted swap space).

2.  If you have enough memory and/or encrypted swap, use Linux's tmpfs.

3.  Implement per-user temporary directories in each user's encrypted $HOME.  
Obviously all applications must know to use $HOME/tmp instead of /tmp.  This may 
be difficult to ensure.

Plain text /tmp is of course bad because, for example, vi may leak secrets by 
creating recovery files there.  So what is the best solution?  Or are there too 
many potential loopholes when using encrypted home directories vs. encrypted 
root filesystem?

--
Mike


--
gentoo-hardened@gentoo.org mailing list


^ permalink raw reply	[flat|nested] 14+ messages in thread
* [gentoo-hardened] Hardened laptops
@ 2003-08-15 14:16 mike
  2003-08-15 16:07 ` Norman B. Robinson
  2003-08-18  3:56 ` Boyd Waters
  0 siblings, 2 replies; 14+ messages in thread
From: mike @ 2003-08-15 14:16 UTC (permalink / raw
  To: gentoo-hardened

I am interested in working on a secure laptop meta-project.  Laptop
security is interesting because some amount of physical security must
be addressed.  Laptop theft is big buisiness, after all.

A well designed laptop operating system would be centered around encrypted
filesystems and would have many applications:

1.  People who want to protect their personal data from theft.

2.  Buisinesses that want to protect secrets stored on their fleet
of laptops.

3.  Military applications -- laptops are all over today's battlefield
and a lucky ambush could easily reap classified information.

4.  Etc...

A company named NAH6 (http://www.nah6.com) has a product like this.
They use Linux in order to boot Windows from an encrypted volume.
I would like to focus on a Linux environment as an end.  The idea is that a 
lost or stolen laptop will not give up any sensitive information. 

Here are the components I envision including their current status:

1.  Encrypted root filesystem.  The 2.6 Linux kernel and util-linux 2.12
will provide this using an encrypted loopback interface.  A speedier
compromise is to use encrypted home directories only.  I maintain a PAM
module, pam_mount, that mounts encrypted home directories transparently.  [ If 
you don't mind a shameless plug, there is an article about pam_mount in the 
August Linux Journal. ]

2.  Encrypted swap partition (or no swap at all).  This is necessary because 
otherwise programs could swap secrets to a plaintext disk.  The 2.6 Linux 
kernel's encrypted loopback interface can do this.

3.  An inproved authentication system.  Encryption algorithms are useless
if a weak key is used.  Therefore it may be desireable to authenticate
when booting and mounting an encrypted root filesystem (or mounting an
encrypted home directory) using a physical token or other strong means.

4.  An intrusion detection system.

5.  Obviously, otherwise hardened software.

Comments?  Has anyone else talked about this around here?

--
Mike


--
gentoo-hardened@gentoo.org mailing list


^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2003-08-30  5:41 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-08-23  9:53 [gentoo-hardened] Hardened laptops mike
2003-08-23  9:59 ` David Nielsen
2003-08-23 12:17   ` Nigel Stepp
     [not found] ` <Pine.LNX.4.44.0308281538370.15670-100000@skyhawk.austin.ibm.com>
2003-08-29 22:35   ` W. Michael Petullo
2003-08-30  5:39     ` Ned Ludd
  -- strict thread matches above, loose matches on Subject: below --
2003-08-24  8:15 A. Permyakov
2003-08-23 13:54 mike
2003-08-18  9:46 mike
2003-08-17 18:26 Joshua Brindle
2003-08-17 11:41 mike
2003-08-17 17:10 ` Norman B. Robinson
2003-08-15 14:16 mike
2003-08-15 16:07 ` Norman B. Robinson
2003-08-18  3:56 ` Boyd Waters

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox