Glenn Brunette wrote:
> 
> Scott Rotondo wrote:
>> Darren J Moffat wrote:
>>> I've given this a lot of thought and I've finally come a conclusion.
>>>
>>> Ideally I would prefer to see more (maybe not all) the changes that JASS 
>>> makes to the default configuration made the default configuration in the 
>>> relevant consolidations (mostly this is ON).  My recent thread on 
>>> stronger password defaults is a step in that direction.  However until 
>>> such times as we have done that AND we have somewhere in the system the 
>>> equivalent of the JASS auditing (config check) capability I think we 
>>> need JASS to continue.
>>>
>>> So I'm supporting this project with the main goal of it being to 
>>> actually get as much as possible out of JASS and make it smaller as time 
>>> goes on.   I would like to see the new JASS project team work with the 
>>> SMF and Install communities/projects to achieve this, with the ultimate 
>>> goal being JASS is no longer a separate component or feature.
>>>
>>> I think we do need a source repository for this but I'm not sure about 
>>> the need for a separate mailing list from security-discuss - in fact 
>>> given that the goal is integration and the amount of work that needs to 
>>> be done with other opensolaris.org communities I think a separate list 
>>> initially would be detrimental to that goal.
>>>
>>> So: +1
>> This proposal has been languishing for some time waiting for another 
>> Core Contributor to endorse it. With this email, I'm providing that 
>> remaining +1.
>>
>> What Darren wrote above describes my position as well. My goal is to see 
>> the security-relevant features of JASS absorbed into Solaris so that 
>> JASS itself becomes unnecessary. I believe that should be a primary goal 
>> of this project. In the interim, however, it is useful to make the 
>> existing JASS source available to the broader community for maintenance 
>> and enhancement.
> 
> I also agree with that sentiment, although I would like to stress
> one clarifying point.  Integrating the default JASS actions into
> Solaris and integrating some form of auditing would be a huge step
> forward but that alone does not eliminate what JASS does.
> 
> JASS also provides a central point for policy with respect to
> auditing <and> hardening.  Today, we have one big knob (netservices)
> and lots of mini-knobs (svcadm, ndd, routeadm, mv, vi, etc.) that must
> all be managed independently.  We don't have a flexible way for our
> customers to specify a policy.  One of the key elements of JASS IMHO
> was to bring this all under the control of a single policy framework
> (for SMF any everything else) that allowed people to specify the
> hardening configuration of their systems.  Without functionality of
> this sort, I think that any such replacement effort would be incomplete
> since this is a feature that is used by nearly every organization who
> has deployed JASS.
> 
> Just my $0.02.
> 
> Regardless, +1 on the project (if I have not already done so).
> 
> g
> 

Having the security policy enforced by centralized rules is obviously 
the right thing to do.  I spoke briefly with Scott yesterday about my 
concerns that simply having new conventions may not be enough to show 
signs of real improvements with Solaris security.  I truly don't want to 
imply this as a negative criticism, but I am encouraged that this 
project may deliver some additional value if the bar is set at a higher 
level.

Do you think this project can also work towards additional goals such as 
non-bypassable that may be a part of other projects?

Regards,

     --John


Reply via email to