[ubuntu-hardened] Ubuntu Hardened (SELinux) Call for Volunteers:
Gnome, pygtk and python hackers
Lorenzo Hernández García-Hierro
lorenzo at gnu.org
Tue May 24 19:01:50 CDT 2005
NOTE: cross posting to -devel as suggested in the -devel channel, I
apologize if it sounds like noise.
We are seeking for Gnome hackers, more concretely those experienced with
Python hacking and using PyGTK for the development of consistent
configuration tools and other nifty utilities for the desktop user as
front-ends or management tools of the "Proactive Security" (intrusion
prevention) technologies under development and deployment for Ubuntu
We plan to do the following stuff:
1) a Gnome applet for giving information on SELinux status and provide
immediate ways of enabling/disabling at runtime, among changing the
modes, giving AVC statistics, booleans and tunables.
2) a Security Center-like GUI, that would be much like a GTK2-based
port of Bastille but personalized to our needs and usability
guidelines, among the deployed technologies.
3) porting Red Hat's configuration tools (old redhat-config-tools).
On the (1):
It should be combining information from RH's system-config-securitylevel
GUI, the sestatus program, and the avcstats program.
People will want to know whether SELinux is enabled/disabled,
enforcing/permissive modes, what policy is active, boolean settings and
possibly tunable settings.
SELinux provides a good interface for the purpouse, among the proper and
existing tools that can be either used as back-ends or as inspiration of
what we want to get.
An example of doing it "at our own":
# selinuxfs default location
selinuxfs = '/selinux/'
# modes & general information
enforcement = selinuxfs + 'enforce'
mls = selinuxfs + 'mls'
disable_selinux = selinuxfs + 'disable'
policy_version = selinuxfs + 'policyvers'
# Access Vector Cache statistics
avc_stats = selinuxfs + 'avc/'
avc_cache_threshold = avc_stats + 'cache_threshold'
avc_hash_stats = avc_stats + 'hash_stats'
fd = open(enforcement)
enforcement_mode = fd.read()
fd = open(mls)
mls_mode_value = fd.read()
fd = open(policy_version)
policy_version_value = fd.read()
fd = open(avc_cache_threshold)
avc_cc_threshold = fd.read()
name = "selinux-gnome-applet"
version = "0.1"
image_dir = "/usr/share/pixmaps"
glade_dir = "/usr/share/" + name
It won't be a big deal, summarizing, but my PyGTK skills really suck and
I haven't code a lot of Python hacking lately.
The artwork is something I could try to do but I don't what should be
used properly (no badges or anything like that for it, please, it must
Ubuntu-dependent and related), and I lack of a proper drawing tablet,
just a scanner that might do half of the work ;).
It would look like the `echo Zvpebfbsg | tr A-Za-z N-ZA-Mn-za-m`
Security Center if it applies as inspiration (*grin*).
A bug is filed in the bugzilla since some time ago:
An interesting usability feedback from Matthew Thomas:
The primary target is Fedora's system-config-securitylevel. It's way too
"Red Hat-dependant" but won't be a big deal for an experienced Python
hacker to "sanitize" for our needs.
export CVSROOT=:pserver:anonymous at rhlinux.redhat.com:/usr/local/CVS
cvs -z3 login
cvs -z3 co redhat-config-securitylevel
Feel free to get in touch with me (trulux in the IRC) or any other
fellow like Andrew Mitchell (ajmitch) and Martin Pitt (pitti) in
#ubuntu-hardened or #ubuntu-devel.
Cheers and many thanks in advance.
Lorenzo Hernández García-Hierro <lorenzo at gnu.org>
[1024D/6F2B2DEC] & [2048g/9AE91A22][http://tuxedo-es.org]
More information about the ubuntu-hardened