1 |
make it so... :) |
2 |
|
3 |
i downloaded the nah6 scripts and they aren't anything incredibly complicated.. the |
4 |
vmware idea is a little odd to me, if there were some other non-commercial |
5 |
alternatives there might be a bigger demand from gentoo users.. |
6 |
|
7 |
|
8 |
Joshua Brindle |
9 |
|
10 |
>>> "mike@××××.org" <mike@××××.org> 08/15/03 09:16AM >>> |
11 |
I am interested in working on a secure laptop meta-project. Laptop |
12 |
security is interesting because some amount of physical security must |
13 |
be addressed. Laptop theft is big buisiness, after all. |
14 |
|
15 |
A well designed laptop operating system would be centered around encrypted |
16 |
filesystems and would have many applications: |
17 |
|
18 |
1. People who want to protect their personal data from theft. |
19 |
|
20 |
2. Buisinesses that want to protect secrets stored on their fleet |
21 |
of laptops. |
22 |
|
23 |
3. Military applications -- laptops are all over today's battlefield |
24 |
and a lucky ambush could easily reap classified information. |
25 |
|
26 |
4. Etc... |
27 |
|
28 |
A company named NAH6 (http://www.nah6.com) has a product like this. |
29 |
They use Linux in order to boot Windows from an encrypted volume. |
30 |
I would like to focus on a Linux environment as an end. The idea is that a |
31 |
lost or stolen laptop will not give up any sensitive information. |
32 |
|
33 |
Here are the components I envision including their current status: |
34 |
|
35 |
1. Encrypted root filesystem. The 2.6 Linux kernel and util-linux 2.12 |
36 |
will provide this using an encrypted loopback interface. A speedier |
37 |
compromise is to use encrypted home directories only. I maintain a PAM |
38 |
module, pam_mount, that mounts encrypted home directories transparently. [ If |
39 |
you don't mind a shameless plug, there is an article about pam_mount in the |
40 |
August Linux Journal. ] |
41 |
|
42 |
2. Encrypted swap partition (or no swap at all). This is necessary because |
43 |
otherwise programs could swap secrets to a plaintext disk. The 2.6 Linux |
44 |
kernel's encrypted loopback interface can do this. |
45 |
|
46 |
3. An inproved authentication system. Encryption algorithms are useless |
47 |
if a weak key is used. Therefore it may be desireable to authenticate |
48 |
when booting and mounting an encrypted root filesystem (or mounting an |
49 |
encrypted home directory) using a physical token or other strong means. |
50 |
|
51 |
4. An intrusion detection system. |
52 |
|
53 |
5. Obviously, otherwise hardened software. |
54 |
|
55 |
Comments? Has anyone else talked about this around here? |
56 |
|
57 |
-- |
58 |
Mike |
59 |
|
60 |
|
61 |
-- |
62 |
gentoo-hardened@g.o mailing list |
63 |
|
64 |
|
65 |
-- |
66 |
gentoo-hardened@g.o mailing list |