Aaron wrote:
Joachim Schipper wrote:
On Thu, Oct 11, 2007 at 08:54:42PM +0200, Xavier Mertens wrote:
Hi *,

I'm busy with a systrace/stsh implementation but there is a lack of standard
policies (IMHO). Any idea where I can find some ready-to-use policies?

I must be missing some important ones, when the user logs in, he got immediately
the following error:

systrace: getcwd: Permission denied

You should probably do a Google search on systrace before continuing
further down this road. In particular, I believe the issue highlighted
by Robert Watson has not been fixed yet (although I could be wrong, and
would be happy to be wrong in this case).

Otherwise, I seem to recall a repository of configurations called 'hairy
eyeball'. And the interactive policy generators (xsystrace for instance)
can be pretty useful, too.

        Joachim

I hope i'm not out of line changing the thread but this seemed like a good place to ask this question.

I'm fairly new to OpenBSD and have set up a few machines, nothing production, trying out configurations, rebuilding, patching etc. before i felt comfortable putting one in production. One thing I did read up on, where i could find it, was hardening beyond the default install. Two of the tools that most of the hardening articles i found, Securelevels and systrace, (the third one seems to be common sense), have now seemingly been rendered useless. I followed the huge thread on "why can't openbsd's securelevels be saved" and now this thread has alerted me to the fact that systrace is able to be circumvented. I also noticed that Joachim commented on both so I figured this for a good place for this topic. I'm wondering if there are other tools/ways besides these that I just haven't heard of to do similar things(hardening of the system) or if there is in effect no way to do the things that, these two tools, specifically systrace has historically handled(is there really a need in the first place?). I say specifically systrace because from the discussions i've been reading, the whole securelevel methodology, to the people that do the work on OpenBSD, is flawed. I'm not here to dispute or even to discuss that point, as currently I can't program (nor afford to hire people that can) so my likes and dislikes are moot. Like i say, i'm still relatively new to OpenBSD so I'm just looking for insight, I haven't used systrace in the past, and until about a week ago was working with securelevels but then found the aforementioned article. I had abandoned the securelevel method in light of the 'issue'(s)/false sense of security with securelevels and from the discussion had decided to pick up with systrace, until i saw this thread yesterday. Is it more common than not, to not worry as much about "hardening" the OS, via these methods, but rather just to make 'hopefully' wise decisions, install the least amount of software as you need, physical separations(i.e. logging to remote server instead of sappnd'ing your logs)(but what happens when after getting root on the system producing logs, the attacker proceeds to work towards your logging server?) and stay current w/at least the stable branch? I guess with all the hoopla about 'hardening'/trusted this and that/fuzzy knobs(i.e. SE Linux) i got a little overzealous looking for ways to tweak things (which i know can end up either making things less secure (especially with false sense of security) or just plain breaking them), but if there is/are acceptable, ways, I'd at least like to be aware of them and the scope of their use from the people that know OpenBSD best.

Thanks,

Aaron

Thanks to everyone for answering/explaining what i know is in no way an easy question to answer with really an infinite number of answers depending on the skill set of the person answering and also the level of the person asking. Like I said originally I'm fairly new to Openbsd, and to be honest, when i read that securelevels was able to be defeated and to move to systrace, i was a little overwhelmed reading up on it and looking at the examples. The types of machines I will be running (when i feel comfortable enough with openbsd)(and am concerned about protecting, should i be more concerned about protecting my OBSD workstation too? I run pf and only allow pass out w/return traffic allowed, no services at all) will be single or dual purpose servers.. i.e. http, smtp, imap etc, not machines that are running X and all my fav ports like amule (not that i would ever download anything from there anyway, that's just not safe :-)) I don't allow remote logins even via ssh except for the local networks, I always have a firewall in front of my public servers with rate limits (overload for pf fans) and I had decided a while back i was going to forgo the new bells and whistles in the latest and greatest versions of software, due to simplicity/security's sake. and only run packages for the services I need, even though often times i get frustrated that things don't get brought current with every new release (i.e. hylafax or dspam). _NOT COMPLAINING_, just giving an example. Maybe it's good that these things came up with securelevels and systrace because to be honest , I'm not sure I would have been up for upgrading like I should with securelevels and i _know_ I would had a fit trying to get systrace policies set up, if not worse thinking i had them set up right and figuring out later they weren't and i had in fact lessened the security by putting all my trust in that system, at least at this point in my experience. From what I have comprehended both of the security mechanisms that have been "broken" still need to have someone that has gained root on the box (not that my understanding might not be flawed), which is one of the things that OpenBSD strives to disallow. For now I think I'll stick with the minimalistic type install, choosing software with a good security history, doing my best to configure things as safe (chrooting, using login.conf, running things as non-privileged users, etc...) as possible, as people have suggested, sticking with the openbsd package system and keeping a close eye on the systems via some of the suggestions made in this thread and in others on this list. Perhaps by the time systrace is fixed or the next mechanism for securing beyond default install and common sense, if the teams decides to go the fixing systrace route, I'll be better prepared to utilize those tools.
   Thanks to the OpenBSD team for all the work and help.

Aaron

Reply via email to