You are not logged in.
Hi,
I found this paper of Theo De Raadt about the security mesures on OpenBSD. I just want to know if in linux and specifically in archlinux there are equivalent mesures and if so, if there are activate by default.
Thanks,
Xan
Last edited by xanb (2013-12-16 14:34:19)
Owning one OpenRC (artoo way) and other three systemd machines
Offline
Have you done any reading/research about it yourself?
Offline
Offline
I'm wondering whether the NSA will update their security guide for RHEL, since quite a lot of it is quite usable as is on other Linux Distributions.
Claire is fine.
Problems? I have dysgraphia, so clear and concise please.
My public GPG key for package signing
My x86_64 package repository
Offline
Hi,
I found this paper of Theo De Raadt about the security mesures on OpenBSD. I just want to know if in linux and specifically in archlinux there are equivalent mesures and if so, if there are activate by default.
Thanks,
Xan
I (mostly) respect what Theo De Raadt and OpendBSD a lot, but computer security is really the only thing Theo De Raadt ever talks about and the only goal of OpenBSD is to achieve a nirvana-like state of computer security perfection. If you're looking for a UNIX-like operating system intended for typical desktop use with all the security measures like those in OpenBSD already present, you almost certainly won't find it.
Offline
Moving to Networking, Server, and Protection
Are you familiar with our Forum Rules, and How To Ask Questions The Smart Way?
BlueHackers // fscanary // resticctl
Offline
Please, don't argue you with each other. Not blame wars.
I just want to know if there is an alternative mesures to OpenBSD mesures. Yes, I have been investigated, but I don't know if archlinux has enabled by default ASLR protection, PIE protection, etc. I just know that Archlinux compiles all packages with ProPolice (gcc). Is it true?
Thanks,
Owning one OpenRC (artoo way) and other three systemd machines
Offline
Not to hijack or mislead the thread but I'd also like to know what, if any, OpenBSD or relatives used as hasher alongside of RdRand and relatives.
Offline
Debian's hardening page is useful info. Compare the options there to Arch's default flags. Note that some packages have custom flags.
Offline
Debian's hardening page is useful info. Compare the options there to Arch's default flags. Note that some packages have custom flags.
What this mean? Is arch more/equal/less secure than debian by this way?
On the other hand, can someone help me to put something like this for archlinux? It could be useful for people searching security. I just know SSP policy: https://bugs.archlinux.org/task/18864
Thanks,
Xan
Owning one OpenRC (artoo way) and other three systemd machines
Offline
On the other hand, can someone help me to put something like this for archlinux? It could be useful for people searching security.
Thanks,
Xan
Arch Linux does not have release versions that means you can not create a table of security features per version as in ubuntu.
You could create one that reflects the current status quo of the options listed there. I would be interested in it, although i believe half of what is listed in the table are features of the linux kernel.
Offline
xanb wrote:On the other hand, can someone help me to put something like this for archlinux? It could be useful for people searching security.
Thanks,
XanArch Linux does not have release versions that means you can not create a table of security features per version as in ubuntu.
You could create one that reflects the current status quo of the options listed there. I would be interested in it, although i believe half of what is listed in the table are features of the linux kernel.
I started: https://wiki.archlinux.org/index.php/Security_features Please, improve it as long as you want.
Owning one OpenRC (artoo way) and other three systemd machines
Offline
More effort is needed in the section of Kernel Hardening and Userspace Hardening. Thanks,
Owning one OpenRC (artoo way) and other three systemd machines
Offline
xanb, this is just my opinion here: I appreciate your curiosity and what you're trying to do, but I don't see how it's accomplishing anything, nor do I see how the table you've made will help the community in the long run. The uninitiated and, well... less-than-competent n00bs who see that table may assume those are actual security features in Arch; in fact, they are not. You're listing things in a very terse format that are not security features of Arch, but which a) can through the user's effort be installed, and aren't really included by default; or b) are part of the upstream source base, and aren't deliberately enabled by the Arch developers.
The inference new users may make is that these are things which make Arch more secure relative to other distributions, when in fact the opposite is true---they are things new users may wish to use to make the system more secure if necessary. The aforementioned "Security" page was meant to help folks concerned with security enable the features they need. Since you seem to have gotten most of the information from said "Security" page, the table is superfluous, and now you're asking people to contribute more superfluous (and potentially misleading) information.
Last edited by ANOKNUSA (2013-12-19 14:00:36)
Offline
xanb, this is just my opinion here: I appreciate your curiosity and what you're trying to do, but I don't see how it's accomplishing anything, nor do I see how the table you've made will help the community in the long run. The uninitiated and, well... less-than-competent n00bs who see that table may assume those are actual security features in Arch; in fact, they are not. You're listing things in a very terse format that are not security features of Arch, but which a) can through the user's effort be installed, and aren't really included by default; or b) are part of the upstream source base, and aren't deliberately enabled by the Arch developers.
The inference new users may make is that these are things which make Arch more secure relative to other distributions, when in fact the opposite is true---they are things new users may wish to use to make the system more secure if necessary. The aforementioned "Security" page was meant to help folks concerned with security enable the features they need. Since you seem to have gotten most of the information from said "Security" page, the table is superfluous, and now you're asking people to contribute more superfluous (and potentially misleading) information.
Yes, surely you are right. I have no "new" information about how are the real "security" features Archlinux has. Maybe it's better to improve security page, and not creating new one. But I think that some information (which I don't know) is missing in security page (for example if by default we have pointer offuscation, heap protection, etc.). I think that it's missing a "Hardening Archlinux" in the wiki. Perhaps you could help. I helped with that.
Owning one OpenRC (artoo way) and other three systemd machines
Offline