Gentoo Archives: gentoo-hardened

From: "mike@××××.org" <mike@××××.org>
To: gentoo-hardened@g.o
Subject: [gentoo-hardened] Hardened laptops
Date: Fri, 15 Aug 2003 14:17:03
Message-Id: 20030815141701.7F6FB314CA@neuromancer.voxel.net
1 I am interested in working on a secure laptop meta-project. Laptop
2 security is interesting because some amount of physical security must
3 be addressed. Laptop theft is big buisiness, after all.
4
5 A well designed laptop operating system would be centered around encrypted
6 filesystems and would have many applications:
7
8 1. People who want to protect their personal data from theft.
9
10 2. Buisinesses that want to protect secrets stored on their fleet
11 of laptops.
12
13 3. Military applications -- laptops are all over today's battlefield
14 and a lucky ambush could easily reap classified information.
15
16 4. Etc...
17
18 A company named NAH6 (http://www.nah6.com) has a product like this.
19 They use Linux in order to boot Windows from an encrypted volume.
20 I would like to focus on a Linux environment as an end. The idea is that a
21 lost or stolen laptop will not give up any sensitive information.
22
23 Here are the components I envision including their current status:
24
25 1. Encrypted root filesystem. The 2.6 Linux kernel and util-linux 2.12
26 will provide this using an encrypted loopback interface. A speedier
27 compromise is to use encrypted home directories only. I maintain a PAM
28 module, pam_mount, that mounts encrypted home directories transparently. [ If
29 you don't mind a shameless plug, there is an article about pam_mount in the
30 August Linux Journal. ]
31
32 2. Encrypted swap partition (or no swap at all). This is necessary because
33 otherwise programs could swap secrets to a plaintext disk. The 2.6 Linux
34 kernel's encrypted loopback interface can do this.
35
36 3. An inproved authentication system. Encryption algorithms are useless
37 if a weak key is used. Therefore it may be desireable to authenticate
38 when booting and mounting an encrypted root filesystem (or mounting an
39 encrypted home directory) using a physical token or other strong means.
40
41 4. An intrusion detection system.
42
43 5. Obviously, otherwise hardened software.
44
45 Comments? Has anyone else talked about this around here?
46
47 --
48 Mike
49
50
51 --
52 gentoo-hardened@g.o mailing list

Replies

Subject Author
Re: [gentoo-hardened] Hardened laptops "Norman B. Robinson" <norman_b_robinson@×××××.com>
Re: [gentoo-hardened] Hardened laptops Boyd Waters <bwaters+moz@××××.edu>