[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: How Debian Linux could be made more secure



>> not a good idea. remove all special permissions from all
>> files, and use sudo. guy could add a hook to his scripts
>> on master, and reject all packages with suid/sgid
>> permissions. it's a very easy thing.
>
>Not really.  Administrators may decide not to rely on the
>security of sudo, but on a few well-defined programs which
>can be run suid root (things like /bin/passwd).  There are
>some places where perm & 07000 != 0 is needed or ok.

lets say : no package may have files with perl & 0700 != 0,
becuase then an administrator setup a local security policy.

but a package (such as passwd) may use suidmanager, to vote
for a file to be suid root, or whatever.

btw: as long term solution dpkg should integrate suidmanager.
the reason is : if i want to modify the permissions of files not in
the suidregistry, the ahcnge might get (temporary ?) lost during the
upgrade to a new version.


>> i agree. but /etc/suid.conf is fine, why an additional list ?
>
>The /etc/suid.conf has the local system administrator's
>and the package maintainer's view of things.  The
>clearance list contains a different view which is based on
>the clearance procedure, and recent bug reports.  Think of
>it as a way to distribute security knowledge to users.

Packages without clearence should be removed from debian,
or installed in a secure way, with README.debia or Security.note
listing the details (maybe how to activate it).

an additional source for informat is always ok, but the primary information
should be in the packages, and they always must have a secure setup.

>Think of an environment with lots of packets, where the
>administrator decides to update some of them, including
>the clearance list.  He will then get warnings about
>security problems on his system which may come from
>recentyl discovered breaches, or from configuration
>errors.

there is one problem in debian : if you update your list of available
packages, you only see "ah, a new version is available". you don't see
whether it's a securiy fix, or fixing a typo, or a rather experimental
trial+failure version.

this information should be in a new package "security-advisor" ?
i agree that this will solve the problem, but its a quick hack rather than
a long term solution. but for now it's ok.

oh, and please don't forget the devices, and other files. not only
binaries are a security thread. if you have a local debian mirror,
do a dpkg-deb -c of all files. you will find lots of files :
 - not owned by root or
 - not group root or
 - not mode 755 (dirs) 644 (files) 755 (files in */s?bin)

many automatic services operate under their own user id (mail,news,lists,...)
and such packages should follow the golden rule, too : if it's not absolutely
necessary for a file/dir/link to have different owner/group/permission
than root/roto rwXrXrX, don't do it.

my last check found several strange things, so i wrote emails. don't know
what happend.

andreas


--
To UNSUBSCRIBE, email to debian-devel-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org


Reply to: