[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: security



[DISCLAIMER: I've played with this here at home, and think I've got a
fairly secure system, but I'm no expert, I'm just an interested geek]

On Mon, Feb 03, 2003 at 02:21:33PM +0100, Russell Coker wrote:
> Is anyone here running a Debian system with no daemons running as root
> other than init, inetd, and sshd, no SUID-root programs other than
> passwd, su, etc, and generally having everything locked down as much
> as possible (chroot's for daemons, etc)?

I'm running bind9 in a chroot (using Martin's bind9-chroot package);
everything else is as normal. 

> If so what kernel patches do you apply for security?  

I'm using a couple at the moment: grsecurity and the pseudo-socket ACL
one.  grsecurity is quite well documented out there, and provides a huge
number of hardening options, as well as it's own ACL implementation.
the pseudo-socket ACL patch gets around the currently simplistic TCP
port security system (root can bind <1024, everyone can take those above
that) by letting you create particular groups that are allowed to bind
to low ports, but do not otherwise have root privileges.

> What do you consider to be the main area of weakness in your system
> security that needs to be addressed?  

Privileged daemons seem to be the largest issue these days.  AIUI,
SELinux significantly reduces the privileges that daemons have, so this
is already a large step in the right direction.

[snip]

> I am interested in improving the general security of Debian and am
> involved in some discussions as to what is the best way to do it.  I
> am searching for background data to help with this.

I'd say your SELinux work is the single most useful thing that could be
used to improve the security of Debian, since it (AFAIK) uses MAC to
lock down broad swathes of the system, only opening the small holes that
are needed.  More support for daemons running as non-privileged users
and in chroots are always good though, especially with kernel 2.4's bind
mounts.

More general things, like source audits and using packages like libsafe
and valgrind to reduce the effects and find the sources of buffer
overflows is essential also, but it's not Debian-specific.

I'm sure this is all already obvious, but perhaps it'll help...

-- 
Rob Weir <rweir@ertius.org>				http://ertius.org/

Attachment: pgpoilma6Y2Fo.pgp
Description: PGP signature


Reply to: