Words From Bastille Developer Jay Beale 87
How secure do you feel? Occams Razor points to "A great interview with [Jay Beale,] the Lead developer, about the Linux Bastille project." Beale talks about the direction that Bastille has taken, and seems fairly pragmatic about the Linux security model and computer security in general. A nugget: "... to fully secure a system, you really have to grind it into dust, scatter the pieces to the wind, and hope that Entropy does [its] part. Since you can't do this, you make tradeoffs."
Re:In my experience... (Score:1)
Simple, efficient, and 100% Microsoft certified.
-Fred Persec
Re:Universities (Score:1)
Ò
In my experience... (Score:2)
I'd just like to wibble a little about my experience, as a developer in a corporate environment, with watching boxes get secured. I'm afraid I've had to post this anonymously, as I don't want to give away any information about which corporation I'm talking about (moderators: AC's need lovin' too...)
I've seen our architecture/support/security guys lock down NT and Unix boxes (both of various flavours). What's struck me as the major difference between the two is the level of experience they've brought to the job. It seems to me that Unix is a much more known quantity; people *know* how you lock down a Unix box, they've been doing it for 15 years. NT boxes, OTOH, are relatively new technology. No-one really has a big-picture overview of what you've got to do to them. This leads to all sorts of mistakes (I want to change permissions on this directory...of course that means override all subdirectories) - and it's difficult to tell when you've finished.
The other big problem that you face is reversibility --- if someone makes a security change, can you undo it without rebuilding the box? If not, what will that stop you doing in future --- all software that goes on web boxes will need upgrading, and if that upgrade, eg, involves a new DLL & registry editing, can we do it? [insert analogous Unix-type question here]? Is the technology described in the article reversible? It does say (ominously) "You see, to secure a system, you'll have to remove some functionality" ... how closely defined can you make "some" in that remark?
Just my $0.02
Re:Bastille gripes... (Score:2)
How about the recent problems in BitchX (made me glad that I had been running BitchX in a well-supervised chroot for quite a while), that would also get you a user account.
etc etc etc
----------------------------
Re:Completely Unnecessary (Score:1)
Linux and OpenBSD are different operating systems. Could it be possible that there is a piece of hw or sw that Linux supports and OpenBSD does not? On the hardware side, note, for example, that OpenBSD does not support SMP. On the software side, some may prefer ipchains over OpenBSD's ipfilter. CIPE does not exist for OpenBSD either.
Re:Completely Unnecessary (Score:1)
Yes, OpenBSD has a good firewall but the parent to which I responded to said: "I don't understand why anyone would use something else in a situation in which high-security is needed (which is any internet site these days)." Now, is every Internet site a firewall, or are there other sites, that, say, are webservers, mail servers, ftp servers, etc? Would you want SMP for any of these?
Could you give an example of an exploit that cannot be blocked by a plain ol packet filter that a stateful filter can?
Re IPsec: there are standards and then there are widely used/implemented standards. Until recently Cisco 675 routers did not support the protocol numbers of IPsec (50 and 51 I think). US West will most likely never release an update to its customers that do not have a version of CBOS with IPsec support. What are we to do? I also refer you to the related /. discussion about the immaturity of FreeS/WAN. CIPE is time-tested, production-quality, simple code.
Re:other distros? (Score:1)
So the easiest way to do it would be to get your Slackware system just the way you want it, burn your root ext2 image to CD (more complicated if you have more than one partition that you need to back up), and then when your hard drive dies, you just pop in tomsrtbt, repartition, dd the
I think it would save you a lot of effort (unless you don't have a CDR), and plus you don't have to put with all that Red Hat garbage.
Re:But the real question is... (Score:1)
I can't really think of a better historical parallel, so I'll suggest Fort Knox in Goldfinger would be better: the bad guys are trying to take what you've got (or at least destroy it), while simultaneously embarassing your government and exploiting the fact that the American Army is pretty incompetent. This casts the product formerly known as Bastille in the role of Bond, dashing in to save the day while screwing Pussy Galore. Oh, wait... guess the parallel isn't quite exact. Oh well...
~luge
But the real question is... (Score:3)
Seriously, it sounds like a cool product, but a) no debian yet so no help to me
~luge
Re:The real question is... (Score:1)
--
Re:Bastille gripes... (Score:1)
Why would it be easier to compromise a user account? The only thing I can think of is the "you can't telnet in as root" thing, but I've completely disabled telnetd.
Re:Bastille gripes... (Score:1)
Bastille gripes... (Score:5)
On thing that bugged me is the fact that it doesn't make it easy for you to choose what kind of security you're really looking for. For example, all I'm really concerned with on my home machine is network security. I don't want people connecting from a remote location and doing nasty things. On the other hand, I don't care about people who have physical access to the machine, because I have physical security to prevent that. Bastille ended up chmod'ing a bunch of executables so only root could use them. This ended up breaking numerous things, including the Helix updater. I couldn't even run ifconfig as a normal user after running Bastille. At least it generates pretty thorough logs, so I was able to undo the "damage".
The other thing is that it doesn't do any checks of what's turned on in your kernel. I was pretty sure I didn't have the firewall support compiled in, so I was pretty surprised that Bastille didn't complain. Some investigation showed that the scripts it installed to secure the network connection were all failing because of this. This is especially dangerous, because without actively checking, some users will think their system has been secured when it really isn't.
Over time, I'm sure Bastille will get better. In the meantime there are some quirks though, so be careful.
ROFL! (Score:1)
--Joe
--
Bastille Security (Score:1)
Re:Dont Forget About the Most Neglected Security T (Score:1)
As I have a beer in my hand right now I can properly reply, Cheers.
Re:Bastille gripes... (Score:2)
Bastille has its quirks but securing a system is a non-trivial task.
After saying all of this, I'll sheepishly admit that I didn't fully run Bastille on my systems. I went to the entire procedure but didn't execute the changes. I realized that most of them were already in place. Furthermore, some of the screen msg's were kind of "funny" (curses, foiled again!). I wasn't sure that my answers were properly being handled. So rather that trust some mysterious script, I just made the few additional changes myself. Maybe this explains your mysterious chmods. I dunno.
A simpler way of saying it... (Score:3)
--
Re:Dont Forget About the Most Neglected Security T (Score:2)
But there are people working on things like this.. I'm one of 'em.
Cheers,
~ Signal 11
Re:Dont Forget About the Most Neglected Security T (Score:2)
That's the theory anyway.. the practice is that creating an initrd.gz image with SSH, login/authentication capabilities (via PAM) and the necessary tools to boot up a basic mandrake 7 system is about 20MB. Bloatware (ugh). All that needs to go into RAM. Even worse.. the linux kernel only defaults to creating 4MB of ramdisk.. so as soon as it accesses anything past 4MB.. *BOOM!* fscking piece of #$@! anyway.. I'll write up a HOWTO once it's done.
Re:Completely Unnecessary (Score:1)
OpenBSD natively supports IPSec out of the box, which is the standard protocol for creating encrypted VPNs (Win2K, FreeBSD, Linux, Solaris, etc... all in one way or another support IPSec) CIPE, on the other hand, is Linux only.
SMP is not useful in a firewall/gateway device, which does not require a lot of horsepower. You might think encryption does, but OpenBSD supports some hardware encryption cards. Granted, if one needs a super high performance Internet server they should use FreeBSD or Linux, behind an OpenBSD firewall :-)
Last, but not least, IPFilter is a true stateful firewall package, whilst ipchains is not, by default. If an admin doesn't know why this is important, they shouldn't be in the business of securing a box.
Re:Completely Unnecessary (Score:1)
Now, is every Internet site a firewall, or are there other sites, that, say, are webservers, mail servers, ftp servers, etc? Would you want SMP for any of these?
Of course you'd want SMP for extremely high-traffic servers, but you'd also want them behind a firewall, hopefully running OpenBSD. Cdrom.com, the busiest ftp site on the Net, has a single-processor machine, running FreeBSD, which I think says more about the importance of the infrastructure surrounding a machine (the internet connection, the RAM, the processor cache) than the number of processors. I'm not aware if it's behind any kind of firewall or not.
Could you give an example of an exploit that cannot be blocked by a plain ol packet filter that a stateful filter can?
If I remember correctly, the main reason for keeping state on a TCP session is to prevent session hijacking and/or spoofing. The firewall can remember which packets belong to sessions that are valid (i.e. originating from internal clients to external hosts (outbound conections only), if that is your policy). A stateful firewall can also help in DoS attacks, because it can determine the 'valid' SYN packets from the invalid ones ued in the attack. This is why after slashdot.org was DoSed they installed a bridging FreeBSD server running IPFilter to try to prevent this scenario in the future.
Re: (Score:2)
Re:But the real question is... (Score:1)
Well, the Bastille is a fortress, you see. And, sure, the building was stormed --- but the problem wasn't the building, it was the administration.
It's a joke, you see.
Re:Just a few days late! (Score:1)
I did submit the story on Bastille Day, when it was posted.
My submission to Slashdot about that article was rejected.
Re:In my experience... (Score:1)
Re:But the real question is... (Score:1)
Actually, I think they are on record as stating the name Bastille was chosen because many believe that the Bastille was stormed due to faulty administration. Thus the parallel to crack-able boxen.
I thought it was rather clever. Oh well.
Re:Perfictly secure linux, whats the point? (Score:1)
Actually I think this becoming a Trend anyway, as RedHat 6.2 Workstation (according to rumours, I never installed it) wont install inetd by default.
Re:In my experience... (Score:1)
Yeah, sure, right. Nothing to worry about.
Re:If he used OpenBSD... (Score:1)
OpenBSD - Armed to the gills. [obenbsd.org]
Re:In my experience... (Score:2)
Re:Universities (Score:1)
Re:other distros? (Score:1)
debian/slackware are mainly for the hard core geek audience..for server admins who have to struggle with multiple OSes ease of use/install is a MUST (i must be able to download an iso image if i dont have one, it must have all security fixes upto current, i must be able to install over HTTP/NFS/FTP/CDROM at least). i also run debian and slackware but the majority of my servers are redhat with ipchains/custom kernels and stackguard compiled binaries...and a few secret extras.
Re:Completely Unnecessary (Score:1)
Also, openBSDs limited hardware support, no SMP support (wha? who uses a single CPU server anymore? even my desktop has two) and confusing install (i tried it once - it worked but it was painful) is not going to help push it.
you want to promote openbsd ? create a redhat like install for it so its secure out of the box AND has useful stuff/supports modern hardware(think quad xeons) AND its installer should be secure by default after starting all the common networking daemons. then you guys can promote openbsd all you want..hell..i'll buy a coupla hundred copies.
Re:other distros? (Score:1)
Re:Capture /flag at Apple (Score:3)
Re:A better way of saying it... (Score:2)
Secure the Admin means to educate the Admin on the tradeoffs between security and ease of use. As Pen said in the original post, Security is inversely proportional to convenience. Bastille takes the next step, and tries to educate as it undoes what the distros have done. Its easy to make a machine very secure, but you end up with a box nobody can use. With an under-educated Admin, it can be very tough to know what to turn on or off and why and how.
the AC
Re:A better way of saying it... (Score:3)
Then go to work securing the system.
Its a motto I've been living by, but it can be very frustrating at times when all someone wants is a big security switch. I tell them its the one marked [| O], the | means insecure, the O means Oversecure.
the AC
Re:Dont Forget About the Most Neglected Security T (Score:2)
This is already easy to do for most partitions, but not root. What sig11's trying to do is to make a boot sequence that mounts a temporary partition, asks you for the password and then remounts the encrypted root. This is kinda tricky, as it requires you to atomically ('cause you always need a root) swap root partition. I looked into this as well a few months ago, and as far as I could figure, I'd need to hack the kernel to make a swap_root_fs call or something.
Too much hassle. I found an encrypted home-dir package which was a 95% solution for 5% effort.
The real trick in all of these cases is to avoid getting the password swapped out to disk. Encrypting the swap can slow things down alot.
Re:other distros? (Score:3)
In fact I would say that since desktop machines are administered as well or as closely as server machines, its more necessary to have easy ways to secure it.
Many insecure desktop machines are used to cover the tracks of crackers, as well as to launch DDoS attacks.
Re:Bastille gripes... (Score:3)
WWJD -- What Would Jimi Do?
Re:Dont Forget About the Most Neglected Security T (Score:1)
where he discusses the fact that he had to release the contents of a private mailing list due to a Netscape legal case
Luckily this ought to be a thing of the past. Take a look at the StegFS Filesystem [cam.ac.uk]. It's all about the plausible denial aspect when being faced somebody trying to get access to your encrypted data. With this you can say you have no / no more data without them being able to disprove you (as opposed to having obvious encrypted files lying around). The worst thing that could happen is the other party wiping you drive.
cheers,
Roland
Re:Bastille gripes... (Score:1)
Well... also you can't ssh in as root (or at least it should be set to that).
Okay, for example if you have a service running like a web server or an ftp server, they probably won't be running as root (at least they shouldn't be). There might be a bug in one of those services that allows you to execute commands on the machine (this is generally what happens in the buffer overflow exploits you hear about all the time). So now the attacker can most likely get himself access to your machine with whatever privlages the service that was comprimised had, not root.
Re:Bastille gripes... (Score:3)
Bastille ended up chmod'ing a bunch of executables so only root could use them. This ended up breaking numerous things, including the Helix updater. I couldn't even run ifconfig as a normal user after running Bastille. At least it generates pretty thorough logs, so I was able to undo the "damage".
This is all part of network security though. The purpose of doing this kind of "damage" isn't just protecting you from local users. The idea is that if an outsider cracker manages to compromise a user account (which is much easier than getting root directly) you want to prevent them from then using internal exploits to gain root.
Not to mention... (Score:2)
Anyway, at least they didn't name it the "Maginot Line" or "Dien Bien Phu".
A quote... (Score:1)
(Eugene H. Spafford, Assoc.Prof. CS, Perdue Univ.)
What's he doing here? (Score:1)
The real question is... (Score:1)
Re:The real question is... (Score:1)
You're only as secure as your neighbors (Score:2)
Since most Unix machines will allow telnet access from any IP address, and many other machines allow FTP or other filesharing access from any address, then you are basically as secure as the weakest machine one of your friends or users happens to log into you from, which could be anywhere and is not under your control unless you make special effort.
The reason for this is that if a cracker (always use the correct terminology...) should break into some less-secure machine than yours, he could install a network sniffer or keystroke recorder on it that captures your buddy's password the next time he logs into your supposedly secure machine from the compromised one.
Poof goes your carefully secured fortress. He doesn't have to use any careful exploit at all to crack your machine. He just logs in using your buddy's username and password.
Better hope you're machine is tightened down against root cracks, and you better hope your buddy wasn't logging in using the root password.
One thing for sure - don't every log into anywhere as root, or do an su, if your telnetted via an intermediate machine, as there could be a sniffer or recorder running on that machine.
This exploit may be even easier than you think - one of the original versions of telnet could be compiled with a debugging flag that, if set to true, would dribble all the keystrokes out to a file. All the hacker had to do would be to gain write access to the telnet executable file and set the value of the global debugging flag from 0 to 1 and he'd get everyone's keystrokes that ever used telnet.
Me? I don't ever use telnet. I use ssh (secure shell). The only external site I ever log into is my web hosting service. I think a minimum requirement of a web hosting service these days is that they provide secure shell access to their customers - mine does, it is Seagull Networks [seagull.net]. Does anyone know any others?
Also don't transfer files with FTP - passwords are provided in the clear and crackers can copy your files with sniffers. Use scp (secure copy) instead.
Capture /flag at Apple (Score:3)
While my complaints about A/UX fell on deaf ears in the A/UX team, the people who maintained the Unix machines for Apple employees to use (yes, some Apple employees do use Unix, they even used to have a Cray running Unicos) invited me to play capture /flag.
In the root directory of some of the multiuser machines was a file named flag that was not writeable. The objective was to write into it and then tell the admins how you did it.
When I started the current contents was "such and such a department rules". I guess I would have written "Mike was here" or something.
While I was able to crack A/UX 2.0 every which way, I never could capture /flag.
My understanding is the security holes got fixed in A/UX 3.0. It's a dead product now.
The way I found the security holes was to start methodically working through the CERT advisories [cert.org] and checking which ones A/UX was not compliant with. When I'd find one and they'd refuse to fix it, I'd file a bug report and send some emails around with explicit details of how you can break root because they weren't listening to CERT.
If you administrate a computer on a network, you should go through the CERT advisories yourself and tighten up your system.
Re: on the way + help appreciated (Score:2)
Re:Completely Unnecessary (Score:1)
Granted, if one needs a super high performance Internet server they should use FreeBSD or Linux, behind an OpenBSD firewall :-)
That's why Bastille Linux is being written and maintained. The OpenBSD firewall can't stop what it has been configured to let through -- all the boxes in the DMZ need to be locked down as tight as a drum, regardless of OS. Bastille is for those Linux boxes that, for whatever reason, have to exist on the internet, be they firewalls, LDAP servers, VPN machines, or web servers.
AetiusRe:Bastille gripes... (Score:1)
The best defense against these (other than running John the Ripper or what not to force your users to use good passwords and locking down other things) is to minimize what the attacker can do.
Pushover (Score:2)
No, Not if the Decryption would Self-Incriminate (Score:2)
It's Not Released, But He *Didn't* Have to Decrypt (Score:2)
Now, whether or not law enforcement can keep the drive(s) indefinitely is a very gray area with little precedent. As of now the matter hasn't been appealed as it could, and for good reason: Mitnick is still on parole, unable to be near computers and such things anyway. I wouldn't want to anger the people who fucked me over for so long and who can still put me back in jail for minor things. But I hope that when Kevin is truly free and no longer on parole, that he challenges this and wins--but I wouldn't count on it, since the value of those old computer components is negligible even now, since it's been so long, that a fight over them wouldn't be very financially justified. At any rate, I'd rather forfeit a couple of hard disks than my freedom, so it's not such a bad deal.
Dont Forget About the Most Neglected Security Type (Score:4)
There should be a distribution--and maybe there is, can anyone point us to it?--which offers the encrypting file system as an option during install. Most of the install process for the more friendly distros already have all the install options laid out in fairly easy-to-use dialogs and what not, but it would go a long way toward insuring privacy if an encrypting file system were a standard install option in a big distro. With relaxation of crypto export regulations, it's becoming increasingly possible for the big US Linux companies to do this, and of course most non-US distros could have been doing it already.
The fact is, most *nix OSes are already much more secure from cracking exploits and viruses than Windows can ever dream of being; something like Bastille is just icing on the cake. But the next step in security, and in ensuring our privacy, is having an encrypted file system as an option in widely used distros, or in widely used/easy to apply add-on products. A standard complaint when someone suggests this is the increased overhead--but with modern microprocessors, the overhead is barely noticeable--I'd know because I use encrypted file systems in Windows on a measly old K6-2 400, with overhead barely visible at all. Just try using an efs on a processor made in the last 2 years, and you'll see it's pretty snappy. Running programs from encrypted drives does sometimes have noticeable, but not deadly, overhead, but accessing data stored on those drives (logs, writings, multimedia files, etc.) is hardly slower than accessing it on non-encrypted drives. And this is my experience under Windows, I can only imagine that under Linux performance would be far superior.
Just an attempt to point out that there's more than one issue in security; securing from crackers is far more well addressed, in almost all operating environments, than security for stored data. These days the U.S. and U.K. governments, and many others, are cracking down on expression of unpopular ideas and distribution of IP-infringing source and executables, and if they come to search your computer and find an encrypted file system, you're better off than if they find that copy of a DeCSS sort of proggie you wrote, or that article you thought you published anonymously but they managed to trace back to you, or the opinion you expressed about a company which has now decided to sue you for libel, or that copy of the webpage you uploaded which calls school officials and classmates the misguided bastards they really are.
Just a few days late! (Score:1)
I'm sure it's all just a ploy to get some French developers developing with nationalist pride!
The price of *security* is eternal vigilance (Score:2)
What I mean by the subject line: don't think that ssh in itself guarantees security. Even with ssh (or scp for that matter), there's always a danger of a man-in-the-middle attack (as ssh itself calls it). A compromised machine between you and the host you're connecting to could easily pretend to be that host, sending you a fake ssh key, and forwarding your packets through another connection to the real host. This way, your communications is encrypted, but only to be decrypted at the compromised machine and re-encrypted and forwarded to its real destination.
Of course, this could be prevented if you know the key of the host you're connecting to beforehand. But how many of us actually verify the authenticity of the host's key the first time we connect to that host? And some hosts do change their keys once in a while (perhaps a reboot, an sshd upgrade, etc.) -- although we *could* verify the new key, I doubt in practice most people bother to.
Anyway, my point is, don't ever fall into the trap that human beings are so prone to: equating security with some entity, like unconsciously equating "ssh" with "secure connection". To be truly secure, you have to be careful at every step. Unfortunately, this is often impractical... but at least, be aware of the vulnerable parts of the chain so that at least you know what could bite you (or what bit you, if something happened). Never, ever, fall into the trap of thinking your system is secure.
A system is never 100% secure; so, it's better be aware of its vulnerabilities than to blindly trust it, and then look around bewildered when something bites you.
---
What I like about Bastille (Score:2)
I gave bastille to a friend that wanted to learn about security, and he was able to secure his box, get answers for some of his questions, and overall have a better understanding of how security on Linux boxes should work.
Now if they would only port it to slackware...
Jay, keep up the good work!
--
Re:The price of *security* is eternal vigilance (Score:2)
But your overall point about security is well put. ssh will display the "host identification changed!" string, but a lot of people will probably just ignore it. And if the remote machine has already been compromised, ssh won't make a bit of difference. Everything's about awareness, tradeoffs, and awareness of tradeoffs.
Re:You're only as secure as your neighbors (Score:1)
The significant difference (again, as you're obviously aware since you mentioned the same issue with FTP) between secure-shell and telnet is that the data is encrypted when it travels over the network (as opposed to telnet traffic, which is cleartext and can be sniffed).
So far I'm supporting your original statement that you are subject to the security of remote systems... but the risk can be reduced dramatically with some forms of token-based authentication. One-time pads might help too.
Re:Perfictly secure linux, whats the point? (Score:1)
Re:Dont Forget About the Most Neglected Security T (Score:1)
(What ever happened to the fifth amendment?)
Re:Bastille Security (Score:1)
Kerberos-like authentication also increases both security and convenience to the end-user (for reasons similar to single sign-on).
Re:A simpler way of saying it... (Score:1)
Kerberos-like authentication also increases both security and convenience to the end-user (for reasons similar to single sign-on).
Confidentiality is only one aspect of security. (Score:2)
Information confidentiality is not information security. Confidentiality of is only one aspect. Integrity and availability of information are also important -- often much more important than confidentiality.
Look at slashdot itself for an example. How important is data confidentiality? Ok, there are some passwords people could steal, but they're not significant by themselves -- they're only meta-information. Why are the passwords important? They don't protect confidential information -- they guard the integrity of authorship. To slashdot, integrity is more important than confidentiality. (Of course, there's the issue of true identities... but slashdot could only provide clues.)
How severely would a denial-of-service attack impact slashdot's business? Very completely. An effective denial-of-service attack would completely disrupt slashdot's business.
As far as I can tell, availability is slashdot's (and many other organizations') most important information security consideration. Confidentiality is the least important of those three information security categories (availability, integrity, and confidentiality).
Most information is not confidential, so in most cases, integrity and availability of information are the top priorities.
Many of the severe threats to information security throughout history have been its destruction and/or modification, and many historically significant compromises to confidentiality are now viewed as desirable increases in the availability of the affected information. Confidentiality is (as is illustrated to an extreme in George Orwell's "1984") also extremely important, but it's not the only consideration in information security.
Mandrake == Redhat? (Score:1)
tune
Re:Mandrake == Redhat? (Score:3)
Mandrake has its own security system, which was called Msec, and was renamed to Usec (Unix Security) because many people asked for Msec to not only work on Linux-Mandrake, but also on any kind of Unix system...
Msec was coded too quickly, it was a bunch of shell scripts, hardening your system security and doing some security check using a cron job;
unfortunately, it was unmaintainable...
So Usec was coded with maintainability in mind,
using two XML databases, one for security points (see questions, with predefined answer for default security level, etc etc ), and another database with defined actions for each answer to each questions...
All of that was coded in a library called libbus,
that can be easily used by frontends.
Finally, Usec and Bastille-Linux decided to merge into one project called BUS ( Bastille Unix Security );
The point is that we keep all of the Usec stuff,
excepted backend, and that we use the Bastille-Linux perl backend, which many people have put a lot of work in ( Bastille-Linux backend support, as an exemple, transaction, and any change can be backed out. )
All the Bastille-Linux security hardening point will be present in Bastille Unix Security, the security points just need to be rewriten in the XML databases (a lot is already done right now)
Perfictly secure linux, whats the point? (Score:2)
For a business, a real firewall, protecting the weaker systems can be enough. I'm not saying I'm a BSD zealot, and there isn't anything wrong with having an 'ultrasecure' Linux for its own sake, but I don't really see why this is needed.
Amber Yuan 2k A.D
Re:Universities (Score:2)
My high school tried a similar tact when testing out some crappy Mac software, unfortunately the guy they got to test the software a huge moron (The school wasn't really that bright, they only provided 3gigabytes of storage for 1700 students, they ran out of space 3 weeks into the first semester). The major problem with the security wasn't security, but the fact that the software managed disk space, and program crashes by deleting random (or all) files.
Amber Yuan 2k A.D
What exactly is the point of this? (Score:1)
other distros? (Score:2)
Would it be difficult to port it to other distros like Debian and Slackware?
Re:Universities (Score:1)
Re:A better way of saying it... (Score:1)
Do you mean, make sure only a select (one, even) bunch of people have admin rights and that these people know about security? Or do you mean something else (please forgive a newbie if this is a dum kwestion :)? I remember that when apache got "white-hatted" the report the hackers produced criticised the fact that 9 people could su to admin-rights accounts.
Re:If he based his dist on Debian... (Score:1)
Universities (Score:1)
Re:Universities (Score:1)
Re:Universities (Score:1)
Lost all my Karma too. (sigh)
Re:A simpler way of saying it... (Score:1)
Trying to secure Windows 95 is like trying to secure a fart in a mitten.
Re:No, Not if the Decryption would Self-Incriminat (Score:1)
Re:What happened to /. Saturday night? (Score:1)
Re:What's he doing here? (Score:1)
(not very funny, I'll post it anyway...)
Maybe I'm paranoid, but... (Score:1)
Right now, many users install RedHat and then take no security steps. If many users started installing some default Bastille configuration and then taking no more security steps, then holes in the default Bastille configurations will be found and exploited. There's no such thing as a security free lunch, save maybe unplugging your computer.
Re:Capture /flag at Apple (Score:3)
In my day, we didn't have any fancy schmancy Bastille scripts to harden our systems. If we wanted a secure VAX system, we wrote our own scripts to do it. If we didn't know how secure it was, then we called our friend Kevin M. to come over and test it out. Nowadays, all you lazy Silicon Valley kids couldn't secure up a computer if it was turned off. You wouldn't know a secure computer from a circuit breaker and my friend Kevin M. can't help you because he can't come within 10' of a computer. The lazy government didn't like him testing the security of their computers, and threw him in prison!
An uninspiring name, no? (Score:2)