Announcement: Bastille Linux (fwd)

---------

New Message Reply About this list Date view Thread view Subject view Author view

Subject: Announcement: Bastille Linux (fwd)
From: Gorkem Cetin (e077245@metu.edu.tr)
Date: Thu 03 Jun 1999 - 21:03:07 EET DST


Yeni Linux dağıtımı, güvenlik konusunda Red Hat Linux dağıtımı üzerine
yapılan yamalarla iddialı.

-- Görkem

Work on the Bastille Linux distribution is commencing!
------------------------------------------------------

[ I'll be at the USENIX Technical Conference in Monterey the second half
of next week (the 9th through the 11th), and will be leading a Secure
Linux BOF Thursday night from 7 to 8 PM. Everyone is welcome to attend;
the Bastille Linux distribution will be the primary topic for
discussion, but I welcome other bits too. ]

The company formerly known as VA Research, VA Linux Systems, has kindly
provided a website and FTP site for our project at:

        http://www.bastille-linux.org/

(and ftp.bastille-linux.org as well).

Right now, that page has the (very!) preliminary version of our
development roadmap and a link to:

        http://lists.bastille-linux.org/mailman/listinfo

where our mailing lists are run.

We currently have two mailing lists: Bastille-linux-announce, a
moderated list for announcements regarding the project, and
Bastille-linux-discuss, an unmoderated list for discussion of the
project.

To subscribe to the announcement list, please visit the above website or
send a message to:

        Bastille-linux-announce-request@bastille-linux.org

with 'subscribe you@example.net' in the body of the message (no quotes).

To subscribe to the discussion list, please send the above message to:

        Bastile-linux-discuss-request@bastille-linux.org

The announce list is NOT subscribed to the discussion list, so please
subscribe to both if you're so inclined. If you wish to subscribe to the
digest version of the list, it's probably simplest to subscribe directly
from:

      http://lists.bastille-linux.org/mailman/listinfo

The mailing lists are archived at:

      http://lists.bastille-linux.org/pipermail/bastille-linux-discuss/
and
      http://lists.bastille-linux.org/pipermail/bastille-linux-announce/

Our distribution is aimed primarily at individual users who are less
knowledgeable about security than experts would be. By securing the
default configuration, inexperienced users will be able to run secure
services without having to become security gurus.

The target for our first distribution is admins who distribute CDs to
users who are responsible for their own systems. This will be useful
in, say, universities, so that admins like myself can hand a Linux CD to
a user without entering a state of complete and utter panic, as well as
in corporations without strong IS control of all PC resources.

User-administered systems are not our only target; we intend our
distribution to be useful to experienced administrators running
single-purpose secure servers and to home users for whom security has
traditionally been an afterthought.

For reasons outlined in our project roadmap (available at our homepage)
our distribution will be based on Red Hat Linux v6.0.

Currently, I'm looking for leaders for the following aspects of the
project:

- 'Gimme' fixes: All the easy, simple, turn SUID off or change
        config file fixes which should be completed immediately. I need
        an individual willing to merge our several lists of such
        problems, create a checklist, and coordinate individuals' fixed
        packages. I (and, I'm sure, others) will be more than happy to
        actually produce the fixed packages, but a coordinator is
        needed.

- 'Harden' script: We have a 'harden' script or two at our
        disposal which need to be adapted to our environment and the
        needs of our users. These scripts need to be assessed, and their
        useful parts unified into a single harden script which can be
        run immediately following an install.

- Cryptography: We intend to make strong cryptography a meaningful
        part of the distribution. This includes SSH, S/WAN, PGP, and
        other useful tools. We need to compile a list of useful crypto
        parts and oversee the creation of packages for these programs.

- New Tools: We need a front-end to make kickstart installs more
        easily configured to not run unnecessary daemons and to install
        a more tightly-controlled set of packages. I envision a
        front-end to create useful Kickstart files meeting specific
        criteria. A back-end tool, mkkickstart, already does some of
        what we need, but we should make this accessible to non-experts.

- Other Tools: Many other security tools exist from which Bastille
        Linux could benefit. These need to be examined, packaged, and
        integrated into our distribution.

- Installer: We need a couple of (mostly minor) changes to the
        Red Hat install program, including the ability to include the
        kickstart file on CDs, to make installation simpler in certain
        environments.

- Auditing: We need a list of criteria for auditing source code
        for the kernel and applications, and an individual to maintain
        a checklist for what has been audited. This way, we actually
        have some records as to what has been fixed or changed, and
        what may not be secure. (I don't expect all of this to be done
        for the 1.0 release, but there's no time like the present to
        get started.) The Linux Security Audit project mailing list is
        quite useful, and the auditing coordinator is expected to work
        closely with the LSAP folk. The LSAP FAQ can be found at
        http://www-jcr.lmh.ox.ac.uk./~security/

- Standards: While not our highest priority for the 1.0 release,
        we should track applicable standards as closely as possible.
        This means attempting compliance with the LSB project, as it
        turns out new standards, and (if we can manage), whatever sorts
        of distribution-level Posix stuff we need to do. (Using the
        Bash 2.0 shell, for example, as opposed to the 1.x version,
        based on 2.0's nearly complete Posix compliance. The standards
        coordinator is expected to try to keep abreast of existing
        standards and to track our compliance with them. This includes
        various security standards, such as the Controlled Access
        Protection Profile (NSA's C2-equivalent PP). If deemed
        necessary, we could split the standards into security standards
        and other standards, so that they could be coordinated more
        easily.

- Documentation: We need to, at a minimum, produce a detailed list
        of changes in our distribution from a stock Red Hat 6
        distribution, and to produce user-level documentation for any
        tools we build or modify. Somebody needs to keep track of these
        changes and find folks to document them.

- Updates: Once our v1.0 is released, somebody will need to
        produce fixes for new holes found and to make announcements
        regarding our fixes.

- Web: We need folks willing to keep the web site up-to-date,
        preferably by writing some tools to automate as much as possible
        what changes have been or need to be made. Thanks to Ben Woodard
        at VA Linux Systems, soon we'll have our distribution accessible
        through CVS and we'll have a bug-tracking package installed at
        the website. We need to make this info as useful and as
        presentable as possible.

- QA: We need somebody willing to hold _somebody_, _anybody_
        responsible for fixing the bugs reported through our bug
        tracking package. This may mean fixing it by oneself if the
        appropriate maintainer is not willing or not able to do so, or
        it may mean tracking me down and making _me_ do it. :-)

This is, of course, a lot of work. In addition to all of this, I intend
to personally be the overall coordinator of all these functions, to
provide a beta-test site for the project, and to be liaison with other
Linux distributions.

This brings up the question of our relationship with other
distributions. I doubt that Red Hat will be interested in much of our
work, but I intend to keep in communication with them, especially on
security-related issues. Although our distribution is not going to be
based on Debian, we are working from a common code base, for the most
part, and I would like to share fixes with them directly.

Finally, there are several other secure Linux projects in development.
kha0s Linux and the (as-yet-unnamed) Secure Linux distribution project
coordinated by Le Reseau just starting development and aimed squarely at
servers, and to build it from the ground up. This is a very important
project, but it differs from ours in that our system is intended for
general use by a relatively unschooled public. We plan on closely
coordinating with the project hosted by Le Reseau (refereed by Rik van
Riel) as much as possible. The kha0s Linux project appears to be
dormant, but we will attempt to coordinate with them as well.

Several other groups, including the TrinityOS folk, Chris Schanzle's
group at NIST, and Kurt Seifried's Rebar for RedHat project have all
done work on securing Red Hat Linux-based distributions. Those folk are
all (I believe) on the list, and I look forward to integrating their
work into our own. Mr. Seifried in particular has suggested that we
merge our efforts, and we look forward to his participation in our
mutual project.

As I have already said, this is a lot of work. However, I truly believe
it's important work, and based on the number of people who seem willing
to work on it, I think that most folk agree. Now it's time to prove we
care by doing the work.

Please feel free to contact me (jon@umbc.edu) if you wish to take on any
of the leadership roles outlined above. Please include a brief list of
your qualifications on the off-chance that more than one person wants
any particular job. I regret that my decisions on areas of
responsibility may appear arbitrary, but we must get this project
underway.

Security is, among many other things, an iterative process; as there
will always be new layers of security enhancements, we merely need to be
open to learning from our mistakes. (Security is also a relative term:
secure as compared to what and for what purpose are questions we'll do
our best to answer as well.)

Thank you for taking the time to read this excessively long message, and
thank you in advance for your participation and response. Thanks
especially to Alan Paller and Rob Kolstad at the SANS institute for
supporting this work, to my boss Andy Johnston at the University of
Maryland, Baltimore County (UMBC) for allowing me to do this on company
time, and to Ben Woodard over at VA Linux Systems for making our
Internet Presence a reality and coordinating huge portions of this work.

Jon Lasser <jon@umbc.edu>

--
Jon Lasser (410)383-7962                    http://www.tux.org/~lasser/
Work: jon@umbc.edu	   			   Home: jon@lasser.org
    "The more you drive, the less intelligent you get." -- Repo Man

Listeden cikmak icin: unsub linux mesajini listeci@bilkent.edu.tr'a gonderiniz. Lutfen Listeci icin MIME / HTML / Turkce Aksan kullanmayin. Liste arsivinin adresi: http://listweb.bilkent.edu.tr/


New Message Reply About this list Date view Thread view Subject view Author view

---------

Bu arsiv hypermail 2b25 tarafindan uretilmistir.