<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=3490&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=3490</link>
		<description><![CDATA[The most recent posts in Please add a hardened kernel by @anthraxx (Levente Polyak).]]></description>
		<lastBuildDate>Fri, 08 May 2020 14:03:12 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21540#p21540</link>
			<description><![CDATA[<div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>But it&#039;s not perfect: <a href="https://madaidans-insecurities.github.io/openbsd.html" rel="nofollow">https://madaidans-insecurities.github.io/openbsd.html</a><br />See also <a href="https://madaidans-insecurities.github.io/linux.html" rel="nofollow">https://madaidans-insecurities.github.io/linux.html</a></p></div></blockquote></div><p>I think it may be some type of a discord of another nature like following:</p><p>If we look at OpenBSD community and talk to them, we will know that they prohibit USA citizens to work on OBSD crypto at least because of USA export restrictions on cryptography, they see Linux sponsors often being controlled by USA and NSA, they recommend to NOT use Libreboot and GNU code as it may be infected by hardly visible NSA backdoors. The most obvious backdoor is systemD, btw.</p><p>I think such open source GNU backdoors are targeted at modern hardware closed source trojans, UEFI plugins and other bootkits. But then OpenBSD may include some software backdoors from GB MI5/MI6?</p><p>If we look at american Whonix they promote Linux, undocumented security patches by @anthrax and GNU software welcomed by NSA.</p><p>Of course I may be wrong, just an idea.</p><p>Also add here China (often sponsored by London) vs USA commercial collisions (if they are not just a political theater).</p>]]></description>
			<author><![CDATA[dummy@example.com (bimon)]]></author>
			<pubDate>Fri, 08 May 2020 14:03:12 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21540#p21540</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21519#p21519</link>
			<description><![CDATA[<div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>I wonder how is it possible to use such a distro in production</p></div></blockquote></div><p>Well Alpine is very popular indeed, it&#039;s the default image for Docker. And it&#039;s fundamentally incompatible with systemd thanks to the musl libc base.</p></div></blockquote></div><p>For a standalone usage on physical hosts without local or remote ZFS root would not it be good to have a verification of earlier installed files?</p><p>Even with a root placed to ZFS directly or to extX over zvol verification of installed files in a package manager is still very convenient as a first place to check installation integrity and see at least which config files were changed from their default state since packages installed.</p>]]></description>
			<author><![CDATA[dummy@example.com (bimon)]]></author>
			<pubDate>Fri, 08 May 2020 10:25:43 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21519#p21519</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21516#p21516</link>
			<description><![CDATA[<div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>I wonder how is it possible to use such a distro in production</p></div></blockquote></div><p>Well Alpine is very popular indeed, it&#039;s the default image for Docker. And it&#039;s fundamentally incompatible with systemd thanks to the musl libc base.</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Fri, 08 May 2020 09:52:50 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21516#p21516</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21497#p21497</link>
			<description><![CDATA[<div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>Individual packages can be verified after installation:</p><div class="codebox"><pre><code>apk verify $package</code></pre></div></div></blockquote></div><p>It seems that this command verifies only a package signature, but NOT checksums of the files already installed earlier? I wonder how is it possible to use such a distro in production, all serious distros like Debian apt, RH yum, Arch pacman and even Gentoo <a href="https://wiki.archlinux.org/index.php/Pacman/Rosetta#Verification_and_repair" rel="nofollow">allow to verify earlier installed files</a>.</p><div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>Have you actually tried building much software from source using a musl libc base? Most software is intended for use with GNU&#039;s bloated libc variant and so might not compile under musl without patching.</p></div></blockquote></div><p>Good notice, I did not try to build software written in relatively low level languages like C on Alpine Linux. Though using Alpine just as a KVM hypervisor host seems workable idea to me if for some unfortunate reason sometimes we do not have our lovely Devuan for that purpose and if even Slackware/Salix stalls its development. Alpine looks being very actively developing in spite of any problems in other systemd free distros.</p>]]></description>
			<author><![CDATA[dummy@example.com (bimon)]]></author>
			<pubDate>Thu, 07 May 2020 11:00:49 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21497#p21497</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21496#p21496</link>
			<description><![CDATA[<div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>Sure Alpine package integrity is verified before installation, but after files have been installed how to verify them once again say like by</p><p>wajig integrity </p><p>in Devuan?</p></div></blockquote></div><p>Individual packages can be verified after installation:</p><div class="codebox"><pre><code>apk verify $package</code></pre></div><div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>It seems to miss binary compatibility with other distros which is not convenient but at least overcomeable by building from source.</p></div></blockquote></div><p>Have you actually tried building much software from source using a musl libc base? Most software is intended for use with GNU&#039;s bloated libc variant and so might not compile under musl without patching.</p><div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>I can easily configure services in any distro free from systemD</p></div></blockquote></div><p>Yes but it is irritating to have to disable services after installing packages. And it&#039;s spelled &quot;systemd&quot; btw, it doesn&#039;t end with a capital &quot;d&quot;.</p><div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>But there is much more security in OpenBSD</p></div></blockquote></div><p>Yes indeed, unlike the Linux devs the developers of that operating system prioritise security over shiny new features.</p><p>But it&#039;s not perfect: <a href="https://madaidans-insecurities.github.io/openbsd.html" rel="nofollow">https://madaidans-insecurities.github.io/openbsd.html</a></p><p>See also <a href="https://madaidans-insecurities.github.io/linux.html" rel="nofollow">https://madaidans-insecurities.github.io/linux.html</a></p><div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>Need to configure AppArmor.</p></div></blockquote></div><p>AppArmor is enabled by default for Debian buster and I think Devuan&#039;s beowulf release will also follow that path.</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Thu, 07 May 2020 10:34:38 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21496#p21496</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21495#p21495</link>
			<description><![CDATA[<div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>Sure Alpine package integrity is verified before installation, but after files have been installed how to verify them once again say like by</p><p>wajig integrity </p><p>in Devuan?</p></div></blockquote></div><p>You could use something like this:<br /><a href="https://packages.debian.org/stable/fcheck" rel="nofollow">https://packages.debian.org/stable/fcheck</a></p><p>I think the best way to use this would be to scan the system while it&#039;s offline by using a live USB Devuan, with the database also stored on an external drive.</p><p>Phil</p>]]></description>
			<author><![CDATA[dummy@example.com (pcalvert)]]></author>
			<pubDate>Thu, 07 May 2020 10:01:13 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21495#p21495</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21491#p21491</link>
			<description><![CDATA[<div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>Arch is similar to OpenBSD in that respect — no services are enabled automatically, unlike Devuan &amp; Debian.</p></div></blockquote></div><p>I can easily configure services in any distro free from systemD, it is relatively non time consuming task, example (Devuan ASCII):</p><div class="quotebox"><blockquote><div><p>root@backup:/# free<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; total&#160; &#160; &#160; &#160; used&#160; &#160; &#160; &#160; free&#160; &#160; &#160; shared&#160; buff/cache&#160; &#160;available<br />Mem:&#160; &#160; &#160; &#160; 2002032&#160; &#160; &#160; 251196&#160; &#160; &#160;1673404&#160; &#160; &#160; &#160; 7948&#160; &#160; &#160; &#160;77432&#160; &#160; &#160;1632964<br />Swap:&#160; &#160; &#160; &#160; &#160; &#160; &#160;0&#160; &#160; &#160; &#160; &#160; &#160;0&#160; &#160; &#160; &#160; &#160; &#160;0</p><p>root@backup:/# pstree<br />init─┬─cron<br />&#160; &#160; &#160;├─6*[getty]<br />&#160; &#160; &#160;├─matchbox-deskto<br />&#160; &#160; &#160;├─nodm─┬─Xorg─┬─{InputThread}<br />&#160; &#160; &#160;│&#160; &#160; &#160; │&#160; &#160; &#160; └─2*[{Xorg:disk$0}]<br />&#160; &#160; &#160;│&#160; &#160; &#160; └─nodm───x-session-manag───sakura─┬─bash<br />&#160; &#160; &#160;│&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; ├─{gmain}<br />&#160; &#160; &#160;│&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; └─{sakura:disk$0}<br />&#160; &#160; &#160;├─rsyslogd─┬─{in:imklog}<br />&#160; &#160; &#160;│&#160; &#160; &#160; &#160; &#160; ├─{in:imuxsock}<br />&#160; &#160; &#160;│&#160; &#160; &#160; &#160; &#160; └─{rs:main Q:Reg}<br />&#160; &#160; &#160;├─screen───sh───sleep<br />&#160; &#160; &#160;├─sshd─┬─sshd───bash───pstree<br />&#160; &#160; &#160;│&#160; &#160; &#160; └─sshd───bash───watch<br />&#160; &#160; &#160;├─udevd<br />&#160; &#160; &#160;└─zed───{zed}</p><p>root@backup:/# zpool list<br />NAME&#160; &#160; &#160; SIZE&#160; ALLOC&#160; &#160;FREE&#160; EXPANDSZ&#160; &#160;FRAG&#160; &#160; CAP&#160; DEDUP&#160; <br />Backup&#160; 5.44T&#160; 5.22T&#160; &#160;227G&#160; &#160; &#160; &#160; &#160;-&#160; &#160; &#160;9%&#160; &#160; 95%&#160; 1.00x&#160; <br />system&#160; &#160;57.5G&#160; 15.2G&#160; 42.3G&#160; &#160; &#160; &#160; &#160;-&#160; &#160; &#160;3%&#160; &#160; 26%&#160; 1.00x</p></div></blockquote></div><p>But there is much more security in OpenBSD, then just minimum amount of services, if I would compare OpenBSD to Linux I would mention at least following manual config actions for Linux needed:</p><p>Kernel needs to be Libre and sometimes patches needed with many compile time and startup time options for enabling different security settings.<br />Need to configure AppArmor.<br />Settings in sysctl<br />/etc/ configs of services often need to be customized for better security.</p>]]></description>
			<author><![CDATA[dummy@example.com (bimon)]]></author>
			<pubDate>Thu, 07 May 2020 03:09:23 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21491#p21491</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21490#p21490</link>
			<description><![CDATA[<div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>Alpine Linux do offer an <em>edge</em> branch which is rolling but their stable release schedule is about every six months.</p></div></blockquote></div><p>At least Alpine keeps packages from earlier releases so that it is possible to switch config to them or manually download them if needed.</p><p>Rolling distros not keeping earlier versions of packages are hardly suitable for production usage especially on physical hosts.</p><p>On virtual host it is easier to fix rolling installation especially if using host&#039;s ZFS zvol with snapshots for a guest file system.</p><div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p> They do sign their repositories though and apk verifies the packages before installation.</p></div></blockquote></div><p>Sure Alpine package integrity is verified before installation, but after files have been installed how to verify them once again say like by</p><p>wajig integrity </p><p>in Devuan? </p><div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>Alpine Linux rocks but the musl libc base might prove slightly limiting.</p></div></blockquote></div><p>It seems to miss binary compatibility with other distros which is not convenient but at least overcomeable by building from source.</p>]]></description>
			<author><![CDATA[dummy@example.com (bimon)]]></author>
			<pubDate>Thu, 07 May 2020 02:59:24 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21490#p21490</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21488#p21488</link>
			<description><![CDATA[<div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>Btw, is it possible to rebuild a complete workable subset (like for a mini debootstrap) of Devuan/Debian packages for i586?</p></div></blockquote></div><p>I don&#039;t think so but I may be wrong.</p><div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>Why not having a Linux distro with default configuration similar to OpenBSD, which is the most secure by default and any custom change would be an opt out of security rather than opt in?</p></div></blockquote></div><p>Arch is similar to OpenBSD in that respect — no services are enabled automatically, unlike Devuan &amp; Debian.</p><p>But the main problem with security in GNU/Linux is that the kernel devs just don&#039;t give a damn: <a href="https://lkml.org/lkml/2008/7/14/465" rel="nofollow">https://lkml.org/lkml/2008/7/14/465</a></p><div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>Alpine seems to be less rolling than Arch/Parabola but it lacks installed files verification too.</p></div></blockquote></div><p>Alpine Linux do offer an <em>edge</em> branch which is rolling but their stable release schedule is about every six months. They do sign their repositories though and apk verifies the packages before installation. Alpine Linux rocks but the musl libc base might prove slightly limiting.</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Wed, 06 May 2020 20:52:13 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21488#p21488</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21482#p21482</link>
			<description><![CDATA[<p>Distros look for me like following list now:</p><p>Main OS: Devuan, OpenBSD (non Linux)<br />Alternative main OS: <a href="https://alpinelinux.org/" rel="nofollow">Alpine</a>, <a href="https://salixos.org/" rel="nofollow">Salix</a><br />Guest OS: ^above, <a href="https://www.parabola.nu/" rel="nofollow">Parabola</a>, Gentoo, GUIX</p><p>All mentioned above distributions except OpenBSD and GUIX support at least OpenRC init system, and some of them provide more options for their init system. None of them forces you to use systemD without your choice.<br />So OpenRC is supported in: Devuan, Alpine, Salix (Slackware), Parabola and Gentoo. </p><p>Devuan, Alpine, Salix and OpenBSD have release model suitable for stability in production usage.<br />Parabola and Gentoo are rolling distributions without release cycles, so they provide more recent, fresh versions of the software but not always stable enough, therefore they are only good for experimenting, e.g. as VM guests.</p><p>Legacy usable OS: Debian v4-v7, RH/Centos v4-v6<br />Unusable shit OS: any distro nailed to systemD without a choice to replace it with something else like OpenRC or at least sysv.</p>]]></description>
			<author><![CDATA[dummy@example.com (bimon)]]></author>
			<pubDate>Wed, 06 May 2020 18:45:11 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21482#p21482</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21481#p21481</link>
			<description><![CDATA[<p>Another question:</p><p>I have found only a very few of distros convenient for myself:</p><p>Universal OS (e.g. for host): Devuan, OpenBSD<br />Guest OS (less stable, rolling): Parabola, Gentoo, GUIX</p><p>It seems for Linux based virtualization hosts&#160; only Devuan is suitable IMHO.<br />But it would be better to have a backup path having one more distro to be on the safe side.<br />It shall be very stable not rolling, I guess Slackware Salix could be good, but it lacks a feature to verify installed files:<br /><a href="https://wiki.archlinux.org/index.php/Pacman/Rosetta#Verification_and_repair" rel="nofollow">https://wiki.archlinux.org/index.php/Pa … and_repair</a></p><p>Unfortunately I do not know any other stable Linux distros except Devuan and Slackware Salix free of systemD.</p><p>Alpine seems to be less rolling than Arch/Parabola but it lacks installed files verification too.</p>]]></description>
			<author><![CDATA[dummy@example.com (bimon)]]></author>
			<pubDate>Wed, 06 May 2020 18:25:05 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21481#p21481</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21479#p21479</link>
			<description><![CDATA[<div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>What makes you think Gentoo is more secure than Devuan? Their PaX integration is no longer officially supported now that grsecurity have moved to a paying model.</p></div></blockquote></div><p>Gentoo still has a so called hardened profile though without PAX. It is most likely a set of some compiler options.</p><p>I wonder if Devuan security level is worse than Gentoo hardened profile?</p><p>Btw, is it possible to rebuild a complete workable subset (like for a mini debootstrap) of Devuan/Debian packages for i586? Only for text mode SSH session?<br />In Gentoo I can rebuild world for i586 (and even for i486).</p><p>If we look at <a href="https://forums.whonix.org/c/news" rel="nofollow">https://forums.whonix.org/c/news</a><br />there is so much work is done for improving distro security, unfortunately it is based on Debian instead of Devuan.</p><p>There are so many hardening manuals for Linux, like for Windows too.<br />Why not having a Linux distro with default configuration similar to OpenBSD, which is the most secure by default and any custom change would be an opt out of security rather than opt in?</p>]]></description>
			<author><![CDATA[dummy@example.com (bimon)]]></author>
			<pubDate>Wed, 06 May 2020 17:58:03 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21479#p21479</guid>
		</item>
		<item>
			<title><![CDATA[Re: Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21469#p21469</link>
			<description><![CDATA[<p>That&#039;s the same kernel configuration as is used by Arch&#039;s linux-hardened package, which no longer includes firmware blobs.</p><p>You can build your own kernel with that configuration by following <a href="https://kernel-team.pages.debian.net/kernel-handbook/ch-common-tasks.html#s-common-official" rel="nofollow">https://kernel-team.pages.debian.net/ke … n-official</a></p><div class="quotebox"><cite>bimon wrote:</cite><blockquote><div><p>Is gentoo-hardened still more secure than Devuan when used with the same anthraxx kernel ?</p></div></blockquote></div><p>What makes you think Gentoo is more secure than Devuan? Their PaX integration is no longer officially supported now that grsecurity have moved to a paying model.</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Wed, 06 May 2020 12:13:09 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21469#p21469</guid>
		</item>
		<item>
			<title><![CDATA[Please add a hardened kernel by @anthraxx (Levente Polyak)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=21463#p21463</link>
			<description><![CDATA[<p><a href="https://github.com/anthraxx/linux-hardened" rel="nofollow">https://github.com/anthraxx/linux-hardened</a></p><p>Preferably a Libre variant without BLOBs like this:</p><p><a href="https://web.archive.org/web/20200508081917/https://www.parabola.nu/packages/libre/x86_64/linux-libre-hardened/" rel="nofollow">https://web.archive.org/web/20200508081 … -hardened/</a></p><p>Is gentoo-hardened still more secure than Devuan when used with the same anthraxx kernel ?</p>]]></description>
			<author><![CDATA[dummy@example.com (bimon)]]></author>
			<pubDate>Wed, 06 May 2020 04:35:21 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=21463#p21463</guid>
		</item>
	</channel>
</rss>
