Wishlist: Difference between revisions

From Alpine Linux
(→‎Hardening: tcb Logins - short description and resources)
(grsecurity policy database - with initial description)
Line 18: Line 18:


= Hardening =
= Hardening =
== grsecurity policy database ==
I think providing a [https://grsecurity.net/ grsecurity] policy database for users and administrators would greatly increase adoption and proper use of grsecurity. A starting point for this project would be to provide the lowest common denominator policies, that has been tested to work, for a given package, daemon, or service. I think this would drastically reduce the barior to entry for users increase the security of the system. Hopefully this database provides building blocks need to quickly learn, modify, and validate grsecurity policies that match their intended policies for their system(s).


== tcb Logins ==
== tcb Logins ==

Revision as of 06:39, 31 January 2015

This material is work-in-progress ...

Do not follow instructions here until this notice is removed.
(Last edited by Systmkor on 31 Jan 2015.)

Warning: This page is unofficial at the moment.


Project Wishlist

Ports

Security

Offensive

Defensive

Administration

Networks

Hardening

grsecurity policy database

I think providing a grsecurity policy database for users and administrators would greatly increase adoption and proper use of grsecurity. A starting point for this project would be to provide the lowest common denominator policies, that has been tested to work, for a given package, daemon, or service. I think this would drastically reduce the barior to entry for users increase the security of the system. Hopefully this database provides building blocks need to quickly learn, modify, and validate grsecurity policies that match their intended policies for their system(s).

tcb Logins

The goal of this is to remove the S currently needed for shadow logins.

tcb resources

Removing SUIDs/SGIDs

It would be nice to see the elimination of these file permissions from Alpine. The reason for this is because throughout the years SUIDs/SGIDs have repeatedly been a source of exploits (esp. privilege escelation) for UNIX derivatives. It may be unfeasible or not unwise to completely ban these file permissions for all packages of Alpine but removing these permissions from Alpine base and X server has been proven to be doable and would provide safer Alpine systems out of the box.

Packaging

Builds

Automation

Testing

Metrics

Benchmarks

Community

Outreach

Publicity