1 |
I am interested in working on a secure laptop meta-project. Laptop |
2 |
security is interesting because some amount of physical security must |
3 |
be addressed. Laptop theft is big buisiness, after all. |
4 |
|
5 |
A well designed laptop operating system would be centered around encrypted |
6 |
filesystems and would have many applications: |
7 |
|
8 |
1. People who want to protect their personal data from theft. |
9 |
|
10 |
2. Buisinesses that want to protect secrets stored on their fleet |
11 |
of laptops. |
12 |
|
13 |
3. Military applications -- laptops are all over today's battlefield |
14 |
and a lucky ambush could easily reap classified information. |
15 |
|
16 |
4. Etc... |
17 |
|
18 |
A company named NAH6 (http://www.nah6.com) has a product like this. |
19 |
They use Linux in order to boot Windows from an encrypted volume. |
20 |
I would like to focus on a Linux environment as an end. The idea is that a |
21 |
lost or stolen laptop will not give up any sensitive information. |
22 |
|
23 |
Here are the components I envision including their current status: |
24 |
|
25 |
1. Encrypted root filesystem. The 2.6 Linux kernel and util-linux 2.12 |
26 |
will provide this using an encrypted loopback interface. A speedier |
27 |
compromise is to use encrypted home directories only. I maintain a PAM |
28 |
module, pam_mount, that mounts encrypted home directories transparently. [ If |
29 |
you don't mind a shameless plug, there is an article about pam_mount in the |
30 |
August Linux Journal. ] |
31 |
|
32 |
2. Encrypted swap partition (or no swap at all). This is necessary because |
33 |
otherwise programs could swap secrets to a plaintext disk. The 2.6 Linux |
34 |
kernel's encrypted loopback interface can do this. |
35 |
|
36 |
3. An inproved authentication system. Encryption algorithms are useless |
37 |
if a weak key is used. Therefore it may be desireable to authenticate |
38 |
when booting and mounting an encrypted root filesystem (or mounting an |
39 |
encrypted home directory) using a physical token or other strong means. |
40 |
|
41 |
4. An intrusion detection system. |
42 |
|
43 |
5. Obviously, otherwise hardened software. |
44 |
|
45 |
Comments? Has anyone else talked about this around here? |
46 |
|
47 |
-- |
48 |
Mike |
49 |
|
50 |
|
51 |
-- |
52 |
gentoo-hardened@g.o mailing list |