[ubuntu-hardened] security center in ubuntu
Nils-Christoph Fiedler
ncfiedler at gnome.org
Sat Apr 3 12:29:52 BST 2010
I surely meant the usage of unskilled users with selinux. But my
scepticism refers to the nsa history of selinux. I simply dont trust it
out of this circumstance. We have a little private people monitoring
through our government here in Germany, so its hard for me to trust a
technology inspired or whatever by an instituion like that. Has anyone
of you verified the code of selinux as not possibly evil?
In my eyes, besides hard techniques, human perception and a related lack
of information is a great cause for the vulnerability of a system.
Therefor the documentation of a "security-center" is very important.
Today these important information that is needed for the user to see the
necessity to take action is wide spread over the internet. (I dont know
of a source, where much information about this issue is bundled.) And
there will always be a statistical lack of security, when it is too
uncomfortable for the user to take this action to protect him / her,
because then it is easier to fall back to old samples of behaviour -
thats human.
For those packages, that are already part of the repositories /
sources-list, there should be an easy way of installation via gui. The
possibility to install the terminal or else doesnt meet the goal of
ease, when you dont know, what to install.
I guess thats it from over here for the moment. Please keep in mind,
that I am using GNOME, so that I am not aware of maybe existing ubuntu
specific guis concerning this issue in KDE.
*Here's an open list, feel free to add / modify sth. missing:*
+ Email encryption like enigmail / seahorse
+ Firewall / iptables / port management (when I install gufw today, the
default setting is OFF.. / sudo ufw status)
+ Antivirus like clamav (especially for machines standing in a local
network with Windows maschines - I could never run clamtk for updates
properly)
+ Usage of Bleachbit / Deborphan / wipe order (even cache and history
data can be a vulnerability in case of local access to the maschine)
+ Easy installation of Truecrypt by integration into the sources-list by
default
+ Testingscript for passwordstrength (the documentation should recommend
[1] alternation, different level pwds and provide information about the
syntax of good passwords, maybe with an implementation of John & rainbow
tables / international dictionaries or an updatable local database, that
stores the most known weak passwords, like "password", "god" and so on)
+ Combined Webbrowser user agent and language switcher (today only
available as a plugin for Firefox as far as I know)
+ rkhunter / chkrootkit for rootkits, backdoor, exploits
+ Check whether a keylogger is running (e.g. lkl)
+ Permission check, using information provided by apt to identify
changes to system files
+ moblock for ip-list blocking (maybe also for blocking known insecure
tor endnodes)
+ tripwire for integrity
+ aide for file changes
+ logcheck
+ checksecurity
+ denyhosts
*
The documentation should provide information about:*
+ LVM encryption
+ [1], maybe with a little impressing mathmatical example of brute force
and social engineering. Especially using the same password in a social
network service and as the root password is kind of stupid.
+ Installation, usage and risks of tor, privoxy, ntp
+ The risk of using popular monopolists services
+ Maybe telling the users the risk of running sth as root via a
selfclosing popup
*Just some various links I found, related to this issue:*
http://savannah.nongnu.org/projects/tiger
http://savannah.nongnu.org/project/memberlist.php?group=tiger
http://www.nongnu.org/tiger/
http://brainstorm.ubuntu.com/idea/19648/
http://brainstorm.ubuntu.com/idea/1282/
https://help.ubuntu.com/community/MoBlock
http://www.debuntu.org/intrusion-detection-with-aide
http://packages.ubuntu.com/de/karmic/denyhosts
---
Kees Cook schrieb:
> On Fri, Apr 02, 2010 at 01:20:33PM -0000, Nils-Christoph Fiedler wrote:
>
>> this idea, because today security is kind of a patchwork of different
>> software, partly even not in the repositories of ubuntu, which makes it
>>
>
> I have to disagree about the "not in the repositories" bit, but I can
> agree that a central UI for investigating security would be interesting.
>
>
>> accurate and a little annoying for more skilled ones, to install and
>> setup those software separately. (talking about my personal experience)
>>
>
> The bulk of Ubuntu's security[1] is on by default and doesn't require
> any user interaction. For the other pieces, the way to configure them
> is very different, since they do very different things. To that end,
> I think documentation is needed before a UI. If we can't describe what
> to do first, we have no hope of writing a UI to help do things. :)
>
>
>> besides that i think there is a lack of "corporate design" or
>> centralization of software and settings management in ubuntu, because
>> you dont have one location where to individualize settings, but a
>> handful of applications for that. (maybe this is also a problem of
>> gnome)
>> what do you think about that?
>>
>
> Sounds like a great project; I would be interested in what you come
> up with. Just itemizing specifically which subsystems to incorporate
> would be a great first step, with consolidated documentation pointers
> to follow, I'd imagine.
>
> Thanks!
>
> -Kees
>
> [1] https://wiki.ubuntu.com/Security/Features#Matrix
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.ubuntu.com/archives/ubuntu-hardened/attachments/20100403/1b6322e6/attachment.htm
More information about the ubuntu-hardened
mailing list