Gentoo Archives: gentoo-hardened

From: Joshua Brindle <method@g.o>
To: gentoo-hardened@g.o, "mike@××××.org" <mike@××××.org>
Subject: Re: [gentoo-hardened] Hardened laptops
Date: Sun, 17 Aug 2003 21:28:03
Message-Id: 20030817T132636Z_B95E00150000@gentoo.org
1 make it so... :)
2
3 i downloaded the nah6 scripts and they aren't anything incredibly complicated.. the
4 vmware idea is a little odd to me, if there were some other non-commercial
5 alternatives there might be a bigger demand from gentoo users..
6
7
8 Joshua Brindle
9
10 >>> "mike@××××.org" <mike@××××.org> 08/15/03 09:16AM >>>
11 I am interested in working on a secure laptop meta-project. Laptop
12 security is interesting because some amount of physical security must
13 be addressed. Laptop theft is big buisiness, after all.
14
15 A well designed laptop operating system would be centered around encrypted
16 filesystems and would have many applications:
17
18 1. People who want to protect their personal data from theft.
19
20 2. Buisinesses that want to protect secrets stored on their fleet
21 of laptops.
22
23 3. Military applications -- laptops are all over today's battlefield
24 and a lucky ambush could easily reap classified information.
25
26 4. Etc...
27
28 A company named NAH6 (http://www.nah6.com) has a product like this.
29 They use Linux in order to boot Windows from an encrypted volume.
30 I would like to focus on a Linux environment as an end. The idea is that a
31 lost or stolen laptop will not give up any sensitive information.
32
33 Here are the components I envision including their current status:
34
35 1. Encrypted root filesystem. The 2.6 Linux kernel and util-linux 2.12
36 will provide this using an encrypted loopback interface. A speedier
37 compromise is to use encrypted home directories only. I maintain a PAM
38 module, pam_mount, that mounts encrypted home directories transparently. [ If
39 you don't mind a shameless plug, there is an article about pam_mount in the
40 August Linux Journal. ]
41
42 2. Encrypted swap partition (or no swap at all). This is necessary because
43 otherwise programs could swap secrets to a plaintext disk. The 2.6 Linux
44 kernel's encrypted loopback interface can do this.
45
46 3. An inproved authentication system. Encryption algorithms are useless
47 if a weak key is used. Therefore it may be desireable to authenticate
48 when booting and mounting an encrypted root filesystem (or mounting an
49 encrypted home directory) using a physical token or other strong means.
50
51 4. An intrusion detection system.
52
53 5. Obviously, otherwise hardened software.
54
55 Comments? Has anyone else talked about this around here?
56
57 --
58 Mike
59
60
61 --
62 gentoo-hardened@g.o mailing list
63
64
65 --
66 gentoo-hardened@g.o mailing list