public inbox for gentoo-hardened@lists.gentoo.org
 help / color / mirror / Atom feed
From: Kevin Chadwick <ma1l1ists@yahoo.co.uk>
To: gentoo-hardened@lists.gentoo.org
Subject: Re: [gentoo-hardened] New Server, considering hardened, need pointers to tfm...
Date: Mon, 12 Dec 2011 18:41:15 +0000	[thread overview]
Message-ID: <20111212184115.65f27c92.ma1l1ists@yahoo.co.uk> (raw)
In-Reply-To: <CAD98N_EdqtNvnQoSmepF41ef37AeDbg2bsq_U+7Hez_xHpgjJQ@mail.gmail.com>

On Mon, 12 Dec 2011 18:38:28 +0100
Javier Juan Martínez Cabezón wrote:

> Now please tell me how under this circunstances could root to make nothing.

What are you asking?

The heart of the OS is the kernel. The OpenBSD kernel is more secure
and always will be full stop because that is their main aim. Think about
the exploits in the Linux kernel for all those years whilst they were
present someone could have been exploiting them and still untill the
next one is added and/or found, one of them can likely bypass RBAC.
Restrictions upon root on OpenBSD have been shown to be bypassable
locally on Pentium >2s via cpu management mode by a root user, it's
still difficult. Therefore I try to use certain hardware and will still
use chflags sappnd etc..

Your example about execution can be controlled via file permissions, if
someone allows arbitrary running as root, RBAC or not that is dumb.
Your daemons should be chrooted as normal users so for servers rbac
means very little to me but I would use it if I ran Linux servers and
am planning to use it on my Linux desktops and OpenBSD would likely code
it if they had many more developers and got lots of the other stuff they
want done and couldn't find any more bugs. They certainly wouldn't
refuse a working and well written patch. For desktops or more
exploitable systems rbac gains some weight, so does systrace but all
these tools are good things (don't mention the races in systrace
because I'm not interested and it's still useful) and RAWIO is off by
default on OpenBSD.

Perl can only execute binaries on the system that are there and some
will on a large install contain local exploits or bugs which can be
reduced and fixed but not those introduced by users which could be far
more easily exploited and you can't even hope to prevent that. If you
can exploit the system through perl then that is a perl bug. If perl
scripts are a problem chmod it 750 and/or systrace it or rbac it. Next
you'll be telling me about physical security and bios batteries, well
physical security can exist and lets stop now as it is all irrelevent
and I'm sure everyone here is bored to death of the OpenBSD vs RBAC or
PAX topic.

All of this comes down to more is better and noexec mounts are one of
those blanket tools possibly with effective grsec logging. Exec logging
is usually too much to handle.

Also many exploits only do one particular thing, so dismissal like this
is simply wrong and part of the problem. In fact I remember Linux being
criticised for execution on downloads, the best answer was noexec should
be used. There is also the possibility of users loading up limewire
etc..



  reply	other threads:[~2011-12-12 18:40 UTC|newest]

Thread overview: 35+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-12-10 20:17 [gentoo-hardened] New Server, considering hardened, need pointers to tfm Tanstaafl
2011-12-10 20:52 ` Matthew Thode
2011-12-11 10:18   ` Sven Vermeulen
2011-12-11 12:20     ` Alex Efros
2011-12-11 14:25       ` Sven Vermeulen
2011-12-11 14:53         ` Alex Efros
2011-12-11 16:49           ` Matthew Thode
2011-12-11 20:01           ` Hilco Wijbenga
2011-12-11 20:08           ` Kevin Chadwick
2011-12-12 11:56             ` Anthony G. Basile
2011-12-12 13:38               ` Kevin Chadwick
2011-12-12 14:08                 ` Kevin Chadwick
2011-12-12 15:23                   ` Javier Juan Martínez Cabezón
2011-12-12 16:44                     ` Kevin Chadwick
2011-12-12 17:38                       ` Javier Juan Martínez Cabezón
2011-12-12 18:41                         ` Kevin Chadwick [this message]
2011-12-12 19:44                           ` Javier Juan Martínez Cabezón
2011-12-12 20:19                             ` Kevin Chadwick
2011-12-12 21:04                               ` Javier Juan Martínez Cabezón
2011-12-12 22:08                                 ` Kevin Chadwick
2011-12-13 21:20                                   ` Javier Juan Martínez Cabezón
2011-12-14 11:05                                     ` Kevin Chadwick
2011-12-14 15:27                                       ` Javier Juan Martínez Cabezón
2011-12-14 15:55                                         ` Alex Efros
2011-12-14 16:28                                           ` Javier Juan Martínez Cabezón
2011-12-14 16:42                                         ` Kevin Chadwick
2011-12-14 18:06                                           ` Javier Juan Martínez Cabezón
2011-12-14 19:45                                             ` Kevin Chadwick
2011-12-14  3:18           ` Peter Volkov
2011-12-14  3:31           ` Peter Volkov
2011-12-11 20:30     ` Kevin Chadwick
2011-12-11 23:00       ` Matthew Finkel
2011-12-12 11:34         ` Kevin Chadwick
2011-12-12 11:59       ` Anthony G. Basile
2011-12-12 13:14         ` Kevin Chadwick

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20111212184115.65f27c92.ma1l1ists@yahoo.co.uk \
    --to=ma1l1ists@yahoo.co.uk \
    --cc=gentoo-hardened@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox