[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#675467: ITP: bilibop -- run Debian from external media



Hi,

This looks pretty interesting and exciting to me!
Hence, a few inline questions follow.

bilibop project wrote (01 Jun 2012 13:10:51 GMT) :
> One of its main goals is to fix security issues or harden standard
> rules and policies to make the system more robust in this
> particular situation.

This sounds awesome, but pretty vague, so I'm curious:
What security issues?
What hardening?
How more robust?

> bilibop-common: shell functions to find the drive hosting the root
> filesystem (dm-crypt, LVM, loop devices, aufs and any combination of
> them are supported)

This might be useful for Tails' implementation of "wipe memory on
shutdown".

> bilibop-rules: udev rules to fix the removable drive hosting the running
> system, and all its partitions, as members of the 'disk' group (fixes bug
> #645466).

I fail to understand how a drive can be a member of the 'disk' group.
Please enlighten me. (Being offline, I can't read the mentionned bug
right now, but still, the package description should make sense by
itself, without needing to access online resources.)

> Other optional features for the desktop environment (based on
> Udisks).

Such as?

> bilibop-lockfs: make a standard installation to behave like
> a LiveUSB. Can be used as an alternative (and enhancement) of the
> fsprotect package.

Interesting.
What makes it different from (or better than) fsprotect and live-boot?

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc



Reply to: