LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 03-07-2015, 03:00 AM   #16
Gerard Lally
Senior Member
 
Registered: Sep 2009
Location: Leinster, IE
Distribution: Slackware, NetBSD
Posts: 2,181

Rep: Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763

Quote:
Originally Posted by JackHair View Post
On the average setup maybe you're right. I personally don't rely on the stock software on my router. I use OpenWRT. I also have no teen resetting my router. I'm the only one with physical access, actually the only user of the connection. I don't think I'm too careless. When I download unknown software I use an online a/v scanner. On Windows I try program's in a sandbox and on a RAMDISK, if it's not too big, before I might install them for real. And of course my systems are always up to date.
On a server it gets another story naturally.
I'd be more concerned about, for example, the Chrome browser, than any third-party software the Chrome browser was downloading. Security is not what it was ten years ago - keeping the bad guys out. It's likely the bad guys are already in. Something like Tomoyo or grsecurity allows you to severely curtail what this "trusted" software is allowed to do.
 
Old 03-07-2015, 04:25 AM   #17
Alien Bob
Slackware Contributor
 
Registered: Sep 2005
Location: Eindhoven, The Netherlands
Distribution: Slackware
Posts: 8,559

Rep: Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106
Quote:
Originally Posted by mancha View Post
PS Over the last months and years I've seen posts with open-ended questions like "How do I secure my Slackware system?". It's
made me think a single Hardening Slackware thread where slackers share security/hardening tips would be a good resource. This
post could kick it off.

Tips could be most anything security-related ranging from mitigation to ways of shrinking attack surfaces to safe configurations
of critical services, etc. Care would be given to ensuring technical accuracy.

A practical knowledge-based thread would be a welcome change of pace on LQ-Slackware which lately seems monopolized by
a small cast of characters intent on poisoning the well by repeatedly calling people stupid/ignorant and calling Slackware
antiquated/inadequate.

Thoughts?
This thread will get a lot of noise inbetween the signal. You could start a Wiki page like http://wiki.linuxquestions.org/wiki/Slackware-Links and copy the important/informative/instructive texts from this thread into the Wiki page. Then you can edit the first post in this thread to contain the link to that Wiki.
 
4 members found this post helpful.
Old 03-07-2015, 09:54 AM   #18
linuxtinker
Member
 
Registered: Dec 2013
Location: NJ / USA
Distribution: Slackware 64 -Current
Posts: 232

Rep: Reputation: 99
Quote:
Originally Posted by mancha View Post

Note: this should also be done on Slackware64 so 32-bit executables run in IA-32 emulation mode get properly randomized.

If I am not running a multilib system would I still need this?


Also I haven't done anything else to "harden" my "slackware- -current" install. I mostly trust the firewalls I am behind. I also think I am smart enough ( hopefully) not to fall pray to fishing attacks.
What would you suggest the next thing I should do? ...


I like the idea of the thread as well, but like Alienbob said, the noise seems to have started already...
 
Old 03-07-2015, 11:18 AM   #19
hitest
Guru
 
Registered: Mar 2004
Location: Canada
Distribution: Void, Debian, Slackware, VMs
Posts: 7,342

Rep: Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746
Quote:
Originally Posted by JackHair View Post
I think this should be enough security.
I think my post is a start in the positive direction, that is, adding on a software firewall (and the other things I mentioned) is a step up from just using a NAT router. However, I agree with allend. I think one needs to continually revisit and revise the security protocols that are in place as you learn.
I really appreciate the comments from the professional IT people here at LQ.
 
Old 03-07-2015, 11:53 AM   #20
bassmadrigal
LQ Guru
 
Registered: Nov 2003
Location: West Jordan, UT, USA
Distribution: Slackware
Posts: 8,792

Rep: Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656
Quote:
Originally Posted by gezley View Post
The difference here is that Ivandi, as ever on his high horse, is imposing his view as a default for Slackware. None of the other projects you list is a default.
Where does he say this should be default? He states that there should be a project started, not a petition, not a plea for inclusion into Slackware, just a project. To me, that sounds like exactly what he has with PAM. A project that contains this stuff, so if someone is interested in doing it, they have a decent starting point instead of starting from scratch.

I understand ivandi isn't the most popular person here because of how he chooses to attack Slackware's decisions, but even if he isn't happy with the current state of Slackware, he is doing what a lot of us don't do, putting his money where his mouth is and providing a way for people to have Slackware more like the way he wants it. He has PAM available for people... people can choose to use it, or they can choose to ignore it. He is as welcome to suggest that Slackware should have PAM included just as any of us are welcome to suggest that Slackware should be left without it. Could he have more tact in proposing his suggestions? Absolutely! But it doesn't mean his voice should just be silenced because it isn't what many forum members want to hear. And it shouldn't mean that any idea he has should be attacked by forum members.
 
1 members found this post helpful.
Old 03-07-2015, 12:09 PM   #21
genss
Member
 
Registered: Nov 2013
Posts: 741

Rep: Reputation: Disabled
Quote:
Originally Posted by bassmadrigal View Post
Where does he say this should be default? He states that there should be a project started, not a petition, not a plea for inclusion into Slackware, just a project. To me, that sounds like exactly what he has with PAM. A project that contains this stuff, so if someone is interested in doing it, they have a decent starting point instead of starting from scratch.
i agree that everybody has the right to express their opinion
that said, ivandi did state multiple times he's desire for PAM in Slackware by default
 
Old 03-07-2015, 12:19 PM   #22
Gerard Lally
Senior Member
 
Registered: Sep 2009
Location: Leinster, IE
Distribution: Slackware, NetBSD
Posts: 2,181

Rep: Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763Reputation: 1763
Quote:
Originally Posted by bassmadrigal View Post
Where does he say this should be default? He states that there should be a project started, not a petition, not a plea for inclusion into Slackware, just a project. To me, that sounds like exactly what he has with PAM. A project that contains this stuff, so if someone is interested in doing it, they have a decent starting point instead of starting from scratch.
A project started to have one of the LSMs compiled into the kernels Pat ships? That's what I don't understand. SELinux or AppArmor is either on or off; there's no need for a project. The kernel config has either y, m or n.

The other point I made was that his proposal, while it might not matter to you, would matter to me. I don't want Slackware shipped with any of the in-kernel LSMs compiled in by default, least of all the NSA and Novell ones Ivandi proposes. S/he mocks Slackware for being the only distro to ship without any of these LSMs turned on; it doesn't seem to have occurred to Ivandi that Pat might have left them switched off so that Slackware users could choose other, out-of-kernel MAC, RBAC and/or RSBAC implementations instead, as I do with Tomoyo version 1 (version 2 is integrated into the kernel), and as other Slackware users do with grsecurity.

The idea that you need a full project just to turn on SELinux/AppArmor/Tomoyo2 in the kernel is quite laughable, and leads me to suspect Ivandi is not quite as knowledgeable as s/he likes to put on. You turn them on by doing make menuconfig with your kernel source. That's your project right there.

Last edited by Gerard Lally; 03-08-2015 at 05:02 AM.
 
1 members found this post helpful.
Old 03-07-2015, 03:07 PM   #23
ivandi
Member
 
Registered: Jul 2009
Location: Québec, Canada
Distribution: CRUX, Debian
Posts: 528

Rep: Reputation: 866Reputation: 866Reputation: 866Reputation: 866Reputation: 866Reputation: 866Reputation: 866
Quote:
Originally Posted by gezley View Post
The idea that you need a full project just to turn on SELinux/AppArmor/Tomoyo2 in the kernel is quite laughable, and leads me to suspect Ivandi is not quite as knowledgeable as s/he likes to put on. You turn them on by doing make menuconfig with your kernel source. That's your project right there.

make menuconfig is the first step in the process of evaluating the available options and selecting the one that fits best. Then provide the needed additional packages and some ready-made policies. I think this could be called a project.

Being a Slackware user implies that I have a very limited knowledge of Linux. My participation in this forum leads me to suspect that the willingness to learn and change is actively disliked here.

And on topic. I am using tomoyo2. Here is a slackbuild for the tools if someone is interested. It's easy to run it in Slackware, but no major distribution uses it.


Cheers
 
1 members found this post helpful.
Old 03-07-2015, 03:25 PM   #24
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Quote:
Originally Posted by gezley View Post
A project? Why on earth would anybody need Slackware to start a project implementing NSA or Novell security modules? I for one appreciate Pat not compiling these by default into Slackware kernels because it allows me to patch the kernel with the out-of-kernel Tomoyo version 1 patch without first having to remove the NSA and Novell cruft. I do understand Tomoyo 1 is not as "modern" as Tomoyo 2 but I much prefer using it or grsecurity than SELinux or AppArmor, and I certainly prefer Pat's approach to yours, which sounds like arm-twisting in favour of Red Hat and/or the NSA.

My thoughts: leave Slackware users to make their own "knowledge-based" choices instead of imposing yours on everyone else. Slackware does not "ignore" all the security modules available in the Linux kernel; rather, it leaves it up to competent users to exercise their own choice whether or not to opt for in-kernel (eg., AppArmor) or out-of-kernel (Tomoyo 1, grsecurity) security.
I'd have to agree. Most desktop users won't even use these either way. Those that do are better off doing it themselves.

While fixing security issues in Slackware is a good thing, forcing unwanted security options on users is a bad thing. However, I'll be compiling my own kernel anyway.

A software firewall is strongly recommended. I don't trust my router not to be hacked. In fact I also recommend overriding the DNS settings the router gives you as it can lead to attacks.
 
1 members found this post helpful.
Old 03-07-2015, 03:37 PM   #25
genss
Member
 
Registered: Nov 2013
Posts: 741

Rep: Reputation: Disabled
i never was interested in security,
still i learned about /proc and i know CAP_SYSADMIN can do anything he wants using it
https://grsecurity.net/ has patches to restrict /proc access (CONFIG_GRKERNSEC_PROC)

might be of worth for those who care about security more then me
(id' advise waiting if someone who actually knows about this to give hes/her opinion)
 
Old 03-07-2015, 04:31 PM   #26
mancha
Member
 
Registered: Aug 2012
Posts: 484

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by allend View Post
Thanks for that tip on the 'vdso=1' kernel option on Slackware 32-bit. I have confirmed and implemented.
You're welcome!

Quote:
Originally Posted by j_v View Post
I like the idea of the thread. This would be an excellent counterpoint to the Slackware Security threads.
I thought so too but now believe it unrealistic. As long as LQ-Slackware remains plagued by snarky and obnoxious behavior from a loud minority,
having drama-free technical threads is just wishful thinking. A less interactive (therefore more troll-resistant) medium like slackdocs.org is wiser
for this kind of effort (as allend suggested).

--mancha

PS Marking "SOLVED". Moderators: please consider locking if this thread becomes yet another cesspool.
 
5 members found this post helpful.
Old 03-09-2015, 06:52 AM   #27
bassmadrigal
LQ Guru
 
Registered: Nov 2003
Location: West Jordan, UT, USA
Distribution: Slackware
Posts: 8,792

Rep: Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656
Quote:
Originally Posted by gezley View Post
A project started to have one of the LSMs compiled into the kernels Pat ships?
Where does he say that? I think you're putting words in his mouth (post) that he never said. He is very vocal in his desire to see Slackware ship with PAM, however, I don't see any mention in this thread where he states that these modifications should be in kernels Pat ships (he only has 3 posts here, it isn't hard to look at all of them before you start throwing out untrue accusations).

Project != Proposal to Pat
 
Old 03-09-2015, 03:56 PM   #28
fogpipe
Member
 
Registered: Mar 2011
Distribution: Slackware 64 -current,
Posts: 550

Rep: Reputation: 196Reputation: 196
Quote:
Originally Posted by gezley View Post
A project started to have one of the LSMs compiled into the kernels Pat ships? That's what I don't understand. SELinux or AppArmor is either on or off; there's no need for a project. The kernel config has either y, m or n.

The other point I made was that his proposal, while it might not matter to you, would matter to me. I don't want Slackware shipped with any of the in-kernel LSMs compiled in by default, least of all the NSA and Novell ones Ivandi proposes. S/he mocks Slackware for being the only distro to ship without any of these LSMs turned on; it doesn't seem to have occurred to Ivandi that Pat might have left them switched off so that Slackware users could choose other, out-of-kernel MAC, RBAC and/or RSBAC implementations instead, as I do with Tomoyo version 1 (version 2 is integrated into the kernel), and as other Slackware users do with grsecurity.

The idea that you need a full project just to turn on SELinux/AppArmor/Tomoyo2 in the kernel is quite laughable, and leads me to suspect Ivandi is not quite as knowledgeable as s/he likes to put on. You turn them on by doing make menuconfig with your kernel source. That's your project right there.
I agree. I dont want most of the kind of "help" that has been proposed lately. The reason im using slackware is that its one of the few distros that trusts its users and their knowledge and their ability to take care of themselves. Just ship the software including the kernel, in its default config (and a default services off config) and let me configure it to my liking.

If i wanted something different id be using another distro. Its great the way it is, because the way it is allows you to do pretty much what ever you want to with it.
If one doesnt have the time, or technical expertise to configure it the way one likes, there are other choices available that might better suit.

Last edited by fogpipe; 03-09-2015 at 04:20 PM.
 
1 members found this post helpful.
Old 03-09-2015, 05:57 PM   #29
GazL
LQ Veteran
 
Registered: May 2008
Posts: 6,897

Rep: Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019
While we're on the subject of hardening and ASLR, I noticed that the latest stable releases on kernel.org include a fix for 64bit that improves the degree of entropy on stack randomisation:
http://git.kernel.org/cgit/linux/ker...58486ae78e8d77

Not the end of the world if you don't have them, but those who take an interest in this sort of thing may find it interesting.
 
1 members found this post helpful.
  


Reply

Tags
exploit, hardening, kernel, security, slackware



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Random Thoughts, Cheap Shots, Bon Mots… LXer Syndicated Linux News 0 09-04-2014 12:00 PM
Random thoughts on browser choices/Firefox. jon lee Slackware 5 10-06-2013 10:40 PM
LXer: This week at LWN: Some numbers and thoughts on the stable kernels LXer Syndicated Linux News 0 09-09-2010 08:00 PM
Where are the random thoughts? JoannesX Slackware 3 05-02-2005 08:53 PM
Some [random] newbie thoughts: Where to start? southsibling LinuxQuestions.org Member Success Stories 2 08-22-2004 01:44 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 05:33 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration