oss-sec mailing list archives
Re: Linux kernel proactive security hardening
From: Solar Designer <solar () openwall com>
Date: Sat, 4 Jun 2011 01:53:55 +0400
Hi all, We have started with the project described below under GSoC 2011, and I've just setup a new mailing list for it, as well as for Linux kernel hardening topics in general. Here's my "welcome" message explaining this in more detail and referencing work that has already started: http://www.openwall.com/lists/kernel-hardening/2011/06/03/1 Folks interested in getting involved (or just watching) are welcome to join the kernel-hardening list (some already did). Subscribe here: http://www.openwall.com/lists/#subscribe (choose "kernel-hardening" from the drop-down at the bottom of this page). Now the context to this (which was too long to top-quote): On Wed, Mar 23, 2011 at 03:35:09AM +0300, Solar Designer wrote:
On Sun, Nov 07, 2010 at 02:16:32PM -0800, Kees Cook wrote:A push has started to try to get as much as possible upstream into the Linux kernel from the various hardening patches that exist in PaX, grsecurity, OpenWall, etc. I've got some details here: http://www.outflux.net/blog/archives/2010/11/07/security-is-more-than-bug-fixing/ And there's a sign-up list here, for people interested in helping out: https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening#Upstream%20Hardening We could use the help. :)Here's another way to help out: Openwall is a mentoring organization for Google Summer of Code 2011 (GSoC), and one of our "ideas" is this: http://openwall.info/wiki/ideas "Linux kernel hardening - extract security hardening changes from various patches (which the mentor will point out), forward-port them to the latest mainstream kernels, make it easy to enable/disable the hardening measures (both compile- and runtime), add documentation, properly submit to and work with LKML (make proposals and own discussions to completion: either rejection or acceptance). This is a noble but thankless job to do, so be prepared! The authors of those changes did not submit them "properly" and did not "own discussions to completion" precisely because the job is so thankless. ;-) This may optionally involve work with other kernel branches and other upstreams as well (OpenVZ, Red Hat, Ubuntu)." Under Owl tasks, we also have: "The rhel6 branch OpenVZ kernel that we'd update to will need to be security-hardened, in part by reviewing, extracting, cleaning up, porting, and documenting/commenting individual changes from grsecurity and PaX (some of which have originated from Openwall's patches for older kernels), and in part by implementing new security-related changes/features, some of those specific to container-based virtualization (purpose-specific restrictions to be applied on per-container basis). We expect help/consulting/mentoring from the author of PaX on portions that are PaX (some of these are difficult to understand from the code alone, especially the rationale behind things being done in a certain way), whereas the rest are not too complicated for a capable person to fully figure out on their own. We should work with upstreams - OpenVZ and Red Hat - to try and get some of these enhancements accepted."
... Alexander
Current thread:
- Re: Linux kernel proactive security hardening Solar Designer (Jun 03)