Wishlist: Difference between revisions

From Alpine Linux
(→‎Packaging: gitian & Nix - Initial reference to these)
(→‎Packaging: cleaned up links)
Line 39: Line 39:


== gitian ==
== gitian ==
[https://gitian.org/]
 
[https://github.com/devrandom/gitian-builder]
* [https://gitian.org/ gitian]
[https://gist.github.com/devrandom/806265]
* [https://github.com/devrandom/gitian-builder gitian-builder]
[http://media.ccc.de/browse/congress/2014/31c3_-_6240_-_en_-_saal_g_-_201412271400_-_reproducible_builds_-_mike_perry_-_seth_schoen_-_hans_steiner.html 31C3 - Reproducible Builds]
* [https://gist.github.com/devrandom/806265 libcoin gitian build code]
* [http://media.ccc.de/browse/congress/2014/31c3_-_6240_-_en_-_saal_g_-_201412271400_-_reproducible_builds_-_mike_perry_-_seth_schoen_-_hans_steiner.html 31C3 - Reproducible Builds]


== Nix ==
== Nix ==
[http://nixos.org/docs/papers.html]
 
[https://nixos.org/nix/]
* [http://nixos.org/docs/papers.html NixOS Papers]
[https://nixos.org/]
* [https://nixos.org/nix/ Nix Package Manger]
* [https://nixos.org/ NixOS - Homepage]





Revision as of 08:37, 31 January 2015

This material is work-in-progress ...

Do not follow instructions here until this notice is removed.
(Last edited by Systmkor on 31 Jan 2015.)

Warning: This page is unofficial at the moment.


Project Wishlist

Ports

Security

Offensive

Defensive

Administration

Networks

Hardening

capabilities

grsecurity policy database

I think providing a grsecurity policy database for users and administrators would greatly increase adoption and proper use of grsecurity. A starting point for this project would be to provide the lowest common denominator policies, that has been tested to work, for a given package, daemon, or service. I think this would drastically reduce the barior to entry for users increase the security of the system. Hopefully this database provides building blocks need to quickly learn, modify, and validate grsecurity policies that match their intended policies for their system(s).

tcb Logins

The goal of this is to remove the S currently needed for shadow logins.

tcb resources

Removing SUIDs/SGIDs

It would be nice to see the elimination of these file permissions from Alpine. The reason for this is because throughout the years SUIDs/SGIDs have repeatedly been a source of exploits (esp. privilege escelation) for UNIX derivatives. It may be unfeasible or not unwise to completely ban these file permissions for all packages of Alpine but removing these permissions from Alpine base and X server has been proven to be doable and would provide safer Alpine systems out of the box.

Packaging

gitian

Nix


Builds

Distros

Some ditros that would be cool to be able to build on top of Alpine. This is by no means intended to change how the core of Alpine is about, developed, or maintained.

Automation

Testing

Metrics

Benchmarks

Community

Outreach

Publicity