21:21:56 #startmeeting [14:15] <@harish_> speaker: Joerg Simon [14:16] <@harish_> #topic Fedora Security Lab [14:16] <@harish_> fsl developed by testers [14:17] <@harish_> fsl is a test-tool all-stars [14:17] <@harish_> #link http://spins.fedoraproject.org/security/ [14:18] <@harish_> #link https://fedorahosted.org/security-spin/readyApps [14:18] <@harish_> has a list of apps that were rejected either because they were too large or d 21:21:56 Meeting started Sat Jan 29 21:21:56 2011 UTC. The chair is harish_. Information about MeetBot at http://wiki.debian.org/MeetBot. 21:21:56 Useful Commands: #action #agreed #halp #info #idea #link #topic. 21:22:01 but also nist the national institute of we don't use it in europe 21:22:04 harish_: Error: Can't start another meeting, one is in progress. 21:22:40 and very important um it doesn't care about solution based things or compliance based things it's about real security and it's made for companies or governments that really have something to protect 21:22:50 um it is made to have a common sense of how i made the test 21:23:15 and yeah they put it in this chart so i was as i was in india a test pilot put out the circuit breaker for the pilot without the pilot knowing about it 21:23:39 the test pilot knew all about the attack but the pilot did no tknow about the attack so i do not recommend you do this 21:23:53 uh yeah it defines what you teset where you test which channel you test 21:24:06 not only about data communication or network security it's also abt physical property that you test 21:24:10 it's about things that you can see 21:24:16 it also regulates in which periods you test 21:24:23 and this is something this could be a possible solution for a menu 21:24:30 where you could put all the tools in the different cases 21:24:42 this could be one solution the other solution could be it's not really a work flow here 21:24:55 you can select the module that you need, the 17 modules and it's color coded so you know where you're started 21:25:07 um yeah i want to know what time um 21:25:22 there is often ppl tell me there is no 100% security 21:25:33 who has googled security, what does security mean to you? 21:25:40 21:25:49 risk management, protecting from risk protecting from danger 21:26:04 in germany we have risk protection goals, integrity, 21:26:08 sorry 21:26:19 i will look, sorry 21:26:23 i have it, i have it 21:26:27 yeah yeah yeah, 21:26:33 availability yeah 21:27:28 the easy promis of defining security in a more complex way they count the check surveys the checks that you put in to control risks or threats that you have and the limitations for the controls and limitations of the functions that you expose to the world 21:27:33 they have a metric that is also available for free 21:27:41 and normally i would talk about the metric now but i skipped the slide 21:28:03 and right now we have 3 version goals the request to disable automount which makes sense if you 21:28:13 um yeah if you want make filesystem rules 21:28:19 not that the system just mount your device 21:28:25 then often ppl ask how to join project 21:28:38 if you want to contrib to fedora security lab talk to us and just if you are a pckager, just package it for us 21:28:55 but if you want towork on structure for fedora security lalb just speak to me and we will find a ...task for you 21:29:15 yeah and the next goal maybe we can do it here at fudcon maybe make a yum install security lab 21:29:21 and i told you our team is not limited to some persons 21:29:34 release engineering is also part of the security lab because without them there woud not be a release 21:29:37 so i cannot limit it to people 21:29:39 yeah that's it 21:29:44 i'm on time, 21:29:49 thank you 21:30:14 [ transcriber's note: my keyboard is totally not comfy for transcribing :) ] 21:30:36 new speaker 21:30:51 badkittydaddy: Want me to take over? 21:30:56 if you could, sure 21:31:27 Why should you protect your linux system? simply put, it's youtr computer, to be used as you see fit 21:31:43 you have to win every day, but the cracker only has to win once 21:31:57 The approach to take must be multi-facetd with different approaches which may or may not overlap 21:32:12 some ways are automatic settings on your computer, some are habits you should adopt 21:32:24 A system under attack : SSH log of the same 21:32:40 (ssh log of brute force login attack shown onscreen) 21:33:09 Use a router - NAT service will block unexpected packets (script scanning, crackers, login requests, etc.) 21:33:36 Question: How much attack reduction occurs by moving the SSH port? 21:33:59 In general security through obscurity; may work but also may be discovered 21:34:21 another audience member suggests the denyhosts tool to block an IP for a time duration after multiple failed logins 21:34:49 (Back to presenter) everyone should have their own account on each computer 21:35:01 shows how to use the User Manager in Fedora to add a new account 21:35:21 Manager Passwords - at least 8 characters, captial letters, small, digits, special characters, etc. 21:35:46 password should be easy to remeber but hard to guess 21:36:02 root password should be different than users 21:36:20 (Question) Some distros set root password random, don't let users set -- presenter not certain which is better 21:36:52 (Antoher audience person) From a multi-user perspective multiple logins via sudo would be better 21:37:15 Password experation a good idea; screen shown on how to do that 21:37:24 90 days or so suggested 21:38:15 -- Control remote access to your desktop, disable VNC if not used, a system with no desktop users will not allow VNC access 21:38:27 in enabling VNC you may be broadcasting it is available over wifi 21:38:40 -- Screensaver should have password in order to unlock the screen 21:39:11 Remove automatic login 21:39:23 etc /etc/gdm/custom.conf 21:39:28 s/etc/edit 21:39:38 -- Perform updates regularly 21:39:51 usually can be done automatically unless you like to keep close control 21:40:12 as root set a cron job, or do "yum update" manually 21:40:28 Install software from Reposititories 21:41:12 Windows you control where things go; ideally with Linux you can get away with the standard package 21:41:39 (Shows where repositories can be edited from within GNOME on Fedora) 21:41:55 Or you can edit /etc/yum.conf directory to control the repository list 21:42:12 or /etc/yum/repo.d 's file.repo 21:42:31 -- Activate your firewall and tune appropriately 21:42:49 (Shows where in System menu to reach Firewall Configuration) 21:43:08 can edit /etc/sysconfig/iptables -- but manual customization of the file is not needed 21:43:30 --- Turn off unneeded system services -- often ftp, sshd, vnc, httpd, sendmail, netconsole.. 21:43:37 System/Administration/Services shown 21:44:00 Or use the "setup" command, System Services tool from the console 21:44:11 changes take effect next boot 21:44:20 Limit SSH access to unly the users you allow, and exclude the root user 21:45:49 Shows how to edit SSH to do this 21:45:57 -- Install denyhosts 21:46:15 python script that analyzes sshd logs to determine which IPs have repeated login failures 21:46:33 it will modify /etc/hosts.deny 21:47:23 -- other strategies 21:47:32 Install SELinux and use it in enforcing mode 21:47:37 Use NoScript firefox plugin 21:47:51 Remove junk that accumulates over time (BleachBit) 21:47:57 Don't automount devices 21:48:04 close root terminals when you're finished 21:48:53 one small question – will be there a log available maybe? 21:49:07 -- protect your computer's physical integrity 21:49:32 they could insert a live CD or USB key or hard drive and plug it in, and do what they want 21:49:37 -- Summary 21:50:10 {mgoldmann: I belive a meeting bot is logging all fudcon room channels} 21:50:25 Cerlyn: ah, great! 21:50:59 List of bullet points from above shown 21:51:09 Presentation made with Fedora 9-14 systems except 13 21:51:22 {Applause Questions/Comments} 21:52:23 Question on why default user on many distros automatically presumed to be able to switch to root 21:52:52 root is a user when used which cannot be used to figure out who used it 21:53:08 Protecting your own password now is an important as protecting the root one 21:54:13 Someone suggests renaming the root user; other suggest this might break things 21:54:37 HTTPS everywhere and Password Maker Firefox plugins suggested 21:54:48 passwordmaker.org - has android apps, etc. 21:56:11 --- meeting ends --- 21:56:19 (Session rather) 21:59:28 * nirik finds power. 22:00:55 This session slot I'll stick to just this session and be available for questions if they have any nirik can't answer. 22:01:15 brunowolff_: if you have things you specifically want me to ask, let me know. 22:01:28 I think I can describe the current setup and ask what we should do moving foward. 22:03:19 Right now I don't have questions for the group. I might have some in reaction to the discussion. 22:03:48 If they start conflating the wrangler with the leader, you can clarify that. They were two people in the past. 22:03:57 #endmeeting 22:04:01 And should be again if Spins SIG is revived. 22:04:37 yeah. 22:04:51 i think it's all change rooms now 22:05:08 yeah, jared is here writing on the whiteboard. we haven't started yet 22:05:10 Anyone gonna liveblog the spins talk? 22:05:18 otherwise, I'll handle it 22:05:19 Cerlyn: Error: Can't start another meeting, one is in progress. 22:05:33 Nushio: that would be great. I could, but I might be talking and it's hard to talk and type. 22:05:35 the bit is already busy 22:05:40 bot 22:05:43 Strawman agenda 22:05:46 1. Current Sitauation 22:05:47 nirik: relax, i'll handle it 22:05:49 2. Are they worthwhile? 22:05:52 3. Technical issues 22:05:58 4. Governance issues? 22:06:03 5. Possible solutions 22:06:06 I do hope we get slides 22:06:15 from all the presenters 22:06:16 No slides yet for this session 22:06:17 alright I think Cerlyn is going to be handling this one? 22:06:30 Nushio: Unless you want to; I typed the last one a bit 22:06:42 Cerlyn: go ahead 22:06:46 I just liveblogged the previous one 22:06:46 -- What is a spin? Spins came out of 2 fudcons ago 22:07:04 basically a spin is a live version of fedora with its own package set based out of Fedora 22:07:14 securitylab, xfce, sugar, etc. 22:07:57 kind of the process existing now -- someoen comes up with the idea, comes up with the kickstart file, etc., 22:08:05 The Spins SIG looks at it 22:08:10 The board looks at it to see if it can be called fedora 22:08:21 if the board says yes it becomes mirrored out, etc. 22:08:42 The problem is the Spins SIG essentially was Bruno and the current speaker, but that's it 22:08:53 no one else was testing, some spins didn't work, may look a bit bad 22:09:14 (another speaker) the way the process was created caused the process to be fundamentally flawed 22:09:50 Lots of stuff to test in a short 6-month timeframe to verify it works with the fedora 22:10:02 Spins SIG not given the mandate to do any release engineering 22:10:22 --- Coordinator brings the talk back to the agenda 22:10:27 Jesse cleanup after Spins SIG several times. 22:10:38 s/cleanup/cleaned up/ 22:11:19 (Lots of people jumping back and forth on topics) 22:12:04 Spins SIG technically only approving the kickstart; not anything else 22:12:21 Currently ~10 Spins 22:13:22 There are download statitics, but they are not necessarily represantive 22:13:41 I think Spins SIG should have been doing more with the process and minimum quality standards. But needs more people to do that. 22:14:02 For the current situation, QA situation LFC and XFCE were tested for the current release 22:14:18 Alright, I'm out of power on my laptop. I'm stepping out for this session. 22:14:42 -- two different flavors of spins -- focused on desktop environment, or a common set of tools 22:14:57 the third case is the brazillian spin due to a trademark issue 22:15:29 Does it make sense to treat them all equally? 22:15:55 broffice isn't needed for future spins. 22:16:51 The other thing to point out is that it is a live image with its own package, but we may want an alternative multi-CD/DVD install as well 22:16:53 Types 22:16:57 - Desktop 22:17:02 - Vertial set of apps 22:17:05 - Virtualized 22:17:24 To what is a spin, add that spins are also a showcase 22:17:34 Cerlyn: Youre doing a great job transcribing. thanks! 22:18:40 (audience member) maybe it would be worth setting up a core package setup with a more visual experience where they can pick the package groups that they want 22:19:00 Moderator notes this has been thrown around many times before, and we are kind of there 22:19:33 As spins define now installation is not required, but has to be installable by policy 22:19:58 arguable that the security CD will often be used without installing it at all 22:20:16 --- moving on to "Are they worthwhile" 22:20:26 the Fedora board thinks that there is some level of validity to spins 22:20:44 (Audience #1) They are usable to see if something works on your hardware and has the applications that you need 22:21:21 Moderator: Why do we want spins? 22:21:46 It may be worth distinguishing between the ks files and the iso's here. For some things you really want 22:21:49 -- Sugar on a stick allows testing how users will use it without the need for an IT department's help 22:22:13 updates and don't need the iso's, but rather to be able to easily make a current one. 22:23:40 another audience member notes spins useful for QA test days 22:24:06 {Why list being created} 22:24:16 * Testing on other hardware/infro 22:24:20 * Q/A - Test days 22:24:23 * Showcase ! 22:24:40 * Creative outlet 22:25:31 With persistent home you can use them on computers you don't own to run a relatively trustable OS. 22:25:54 I use them at work for some machines connected to projectors for meetings. 22:26:14 brunowolff: Are you looking for this to be relayed to the conference room, or are you here? 22:26:30 My comments have all been for relay. 22:26:37 I am not at Tempe. 22:26:39 Cerlyn: he's sadly remote 22:27:05 Well I only get to go away from home one trip a year, and it is to a board gaming tournament. 22:27:51 * Try before you buy 22:29:13 brunowolff: I'm trying to relay but the moderators trying to move things along too 22:29:42 Someone notes that they carry around many of the spins to demonstrate things 22:30:08 * Creative outlet - out of the box {modified} 22:30:15 * fastest way to install Fedora 22:31:43 devils' advocate -- a more flexible installer would allow spins to be abandoed 22:31:46 abandoned 22:32:01 some spins, but not all 22:32:19 {another person} but a group in the installer is not a showcase 22:32:57 {another} the idea has always been to form spins from package groups 22:33:42 --- 3. Technical issues? 22:34:03 * Upgrades 22:34:08 * Less flexible installer 22:34:27 * Upgrades/updates {combined} 22:34:49 * Insallation code paths 22:34:50 * Testing 22:34:57 * Image size 22:35:03 * filesystem overlay 22:35:30 If we care, nVidia drivers don't work on live images. 22:36:42 brunowolff: The binary-only ones? 22:36:56 * too many options to setup your system 22:36:57 Using live images on optical media is very slow due to seek time. 22:37:30 Yes. They need to be installed on a system that has the right hardware. They don't auto detect like Fedora's drviers do. 22:37:47 * media seek times {relayed/added} 22:37:54 With nouveau improving it's less of an issue. 22:38:04 * audit trail (the perl problem) 22:38:16 I never tested catalyst, but wouldn't be surprised if they didn't work either. 22:38:32 * mirroring/disk space 22:39:07 * nirik hopes we get to the ... profit^Wsolutions part of the talk. 22:39:53 * one at a time 22:40:08 image size can be seen as a constraint as well as a storage issue 22:40:10 I think direction to go would be enough. Once we have a direction, I don't think solutions will be that hard. 22:40:22 --- 4. Governance issues? 22:40:30 * meetings 22:40:43 * brand dilution 22:41:02 * Why a Spins SIG/wrangler? 22:41:02 Relay: I felt it difficult to impose requirements on people doing spins when it was just Kevin and I to make decisions. 22:41:22 I didn't feel that was enough people to get a consensus. 22:41:37 The wrangler does initial technical review. 22:41:50 * responsibility/workload 22:41:57 And was also envisioned to liason with Releng. 22:42:31 The wrangler could certainly ask for help doing reviews if there was anyone to ask. 22:42:47 brunowolff: Relayed 22:42:55 * lack of response/communication 22:43:03 The Spins leader was supposed to do vision things with spins. 22:43:29 Like suggesting goals for improvement, leading discussions on minimum standards. 22:44:45 Helping to define criterea for accepting or rejecting proposals for new spins related to their theme. 22:45:16 * point of contact 22:45:30 Other workers were needed to help the wrangler, document process and the like. 22:45:51 * combersome process 22:45:59 * too many deicison makers 22:46:45 * branding/design of particular spins 22:49:48 * resources 22:49:55 --- 5. Possible solutions 22:53:12 Discussion about mirrioring -- gentleman's agreement not to go over 1 Terabyte per meet 22:53:20 s/meet/release 22:53:30 not all spins mirrored, many are 22:55:41 Fedora board has authority over the trademark; with the spins sig became a bit of a rubber-stamping exercise 22:55:41 I'd like to see us really cut back on the iso's and do my ks publishing instead. People would be expect to create their 22:56:00 own images with up to date packages when they wanted. 22:56:48 I'd also like to see the ones for which we do iso's not be one man shows and have teams of people that 22:57:00 can be drawn on for testing and other tasks. 22:57:41 * require to build media with kicstart 22:57:43 Maybe cutback to Desktop, KDE and possible XFCE and LXDE. 22:57:48 * require spins to participate in SIG 22:58:11 * nightly reports 22:58:41 I think people were already required to participate in Spins SIG if they wanted an official spin. 22:59:18 * allow spin sig final approval (excluding trademark approval) 22:59:19 They just didn't, and the turn out was so bad that punishing those that didn't wasn't workable. 22:59:37 * disconnect spin release cycle from the main 23:00:11 Note Spins SIG doesn't have criterea for determining which Spins should be rejected. 23:00:17 * no one-man shows 23:00:24 (Other than on technical merits.) 23:01:12 meeting ended 23:01:27 Next topic: Using the SELinux Sandbox / Dan Walsh 23:01:44 no real solutions found. perhaps we will find one in the hackfests. 23:03:04 I'll look to see if one is scheduled later. On Monday it will be harder (or impossible) for me to participate, depending on the time. 23:03:10 ooh are dan's slides up yet? 23:03:28 locally yes; don't know about elsewhere 23:04:08 I'd have made sure if I was there to see his talk and our esteemed leaders 23:04:35 he has a talk tomorrow on writing policy 23:04:52 this a repeat of his talk from last year 23:04:59 yeah i do we get slides from both 23:05:06 Cerlyn: Just raise a hand and ask him if he's got them available on his fedorapeople.org space 23:05:06 I do hope 23:05:24 DiscordianUK: http://dwalsh.fedorapeople.org/ 23:05:26 I'd imagine he would 23:05:29 ta 23:05:37 http://dwalsh.fedorapeople.org/SELinux/Presentations/ 23:05:57 I don't see anything later than Sept 2010 there but he might be using an existing deck 23:06:38 What is a sandbox - run general applications in a locked down environment 23:06:40 this looks like the sandbox.pdf file there 23:06:47 likewise there's nowt new there 23:06:57 http://dwalsh.fedorapeople.org/SELinux/Presentations/sandbox.pdf 23:07:09 Run untrusted applications or filters on untrusted data 23:07:28 But in reality you trust things somewhat; otherwise you would never run Firefox in the first place 23:07:31 but it might have some bugs 23:07:40 Beauty! thanks Cerlyn 23:08:02 Vulnerabilities - allow filtering tools to read untrusted content 23:08:26 Examples of sandboxes - chroot, chrome-snadbox, OLPC/bitfrost, Java sandbox, SELinux xguest 23:08:47 SELinux - Standard SELinux is difficult to use on random applications 23:10:44 two processes with the same type can attack each other 23:11:10 Standard SELinux Sandbox - Execution of any app within SELinux Confinement 23:11:13 Blocks "Open" call 23:11:21 Allows read/write on inherited file descriptors 23:11:25 Temporary storage allowed 23:12:37 Uses MCS (uniquely generated) Labels for seperation 23:13:07 Excellent for scripting 23:13:12 Confinement of grid jobs 23:14:33 What about the desktop? 23:15:00 - how to confine Acrobat Reader(tm), Large communication paths for a variety of things (X server, home directory, gconf, Dbus...) 23:17:09 /usr/bin/sandbox 23:17:41 Setup file system, creatings new directories in home and /tmp; selects a random MCS label, 23:17:47 Labels directories sandbox file sandbox_file_t:MCS1 23:18:07 Copy executible/input files to homedir & time; creates .sandboxrc in homedir with command 23:18:22 Executes new utility seunshare; uses sandboxX.sh 23:18:30 Deletes temporary $HOME & /tmp 23:19:10 -- seunshare is a C Setuid Program 23:19:31 --- Sandbox X Components 23:21:04 Xephyr -- Xace (trusted X windows) does not work 23:21:19 Xephr gives every sandboxed app its own X server 23:22:22 Window manager used to run apps full screen 23:23:16 uses Matchbox, or you can use the -W flag to specify another such as metacity 23:23:32 This works because Gnome/GTK apps create contect in the home directory on the fly 23:24:15 Firefox creates a new .mozilla directory, etc. 23:24:29 SELinux policy - sandbox types are shown on a slide 23:24:48 -- sandbox -X problems 23:25:21 Windows cannot resize (on Fedora; patched fix in RHEL6) 23:25:24 No cut & paste 23:25:31 User confusion 23:25:39 - don't want to write a document while in a sandbox which will be destroyed 23:26:36 -- Future potential items 23:26:51 MLS? {Trusted environment} 23:26:55 Save sandbox directory? 23:27:39 {A demonstration is shown} 23:29:00 Showing two xterms, one sandboxed, one not 23:29:43 sandboxed one cannot see all processes, /tmp files, etc. 23:29:57 sandboxed xterm cannot ssh to another, sudo to root, etc. 23:32:56 Shows evince (PDF reader) sandboxed 23:33:33 has rigged firefox to always download PDF files in a sandboxed evince 23:33:52 the sandbox can detect if a document has been changed which was passed into it 23:35:25 there are no obvious signs of performance degredation due to opening files in a sandbox 23:36:26 shows firefox sandboxed using one of the different types which allows web access 23:38:51 working on how to make firefox instances which can only talk to intranet or Internet sites; watch his blog for details 23:40:36 Shows the ability to use the MLS label to force a "secret" level seperate desktop environment 23:40:51 oooh MLS 23:41:04 is that a new set of slides? 23:41:08 although due to a bug some of the gnome panels have issues while sandboxed 23:41:25 there have been no slides shown since the demonstration started 23:41:36 It looks like the PDF on the website matches the slides he showed today 23:41:37 ahh okay 23:41:52 thank you 23:45:28 {applause} 23:45:57 #endmeeting { Using the SELinux Sandbox / Dan Walsh } 23:46:47 kudos to Dan 23:46:55 and thanks to you 23:51:16 #endmeeting