From mboxrd@z Thu Jan 1 00:00:00 1970 From: ng0 Subject: Re: Hardening Date: Wed, 25 Jan 2017 11:51:07 +0000 Message-ID: <87fuk7pdck.fsf@wasp.i-did-not-set--mail-host-address--so-tickle-me> References: <20170124111934.16080-1-contact.ng0@cryptolab.net> <20170124190726.GB6110@jasmine> <87bmuw2n3j.fsf@wasp.i-did-not-set--mail-host-address--so-tickle-me> <20170124210233.GB30771@jasmine> <87sho75wvj.fsf@elephly.net> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:34219) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1cWM6f-0003iE-0P for guix-devel@gnu.org; Wed, 25 Jan 2017 06:51:18 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1cWM6a-0003sx-W9 for guix-devel@gnu.org; Wed, 25 Jan 2017 06:51:17 -0500 Received: from perdizione.investici.org ([2001:41d0:2:33d0::19]:50414) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1cWM6a-0003sa-Lr for guix-devel@gnu.org; Wed, 25 Jan 2017 06:51:12 -0500 Received: from [94.23.50.208] (perdizione [94.23.50.208]) (Authenticated sender: niasterisk@grrlz.net) by localhost (Postfix) with ESMTPSA id DE74B1201A9 for ; Wed, 25 Jan 2017 11:51:09 +0000 (UTC) In-Reply-To: <87sho75wvj.fsf@elephly.net> List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org Sender: "Guix-devel" To: guix-devel@gnu.org Ricardo Wurmus writes: > Leo Famulari writes: > >> On Tue, Jan 24, 2017 at 08:56:48PM +0000, ng0 wrote: >>> Leo Famulari writes: >>> > Should we build Tor with "--enable-expensive-hardening"? >>> >>> I will take a look later what can be applied other than the >>> default configure flags. >>> >>> I'm all for hardening, but it seems that the first basic ideas >>> for Guix are stuck in the idea state. >> >> As far as I can tell, --enable-expensive-hardening is specific to Tor, >> so it's not relevant to the project of hardening all Guix packages. >> >>> It would be great to see some movement on this during this >>> year. I volunteer to help with it, though I don't have as much >>> experience with SELinux (and only basic experience with >>> GrSecurity without a modular kernel like GuixSD uses). >> >> Yes, this effort needs a champion. > > I know SELinux and I have a couple of almost-ready packages for it. Th= e > bigger problem for us is writing SELinux policies, because we cannot > just use those from Fedora. Oh, this is good to hear! > SELinux policies are applied to file paths (which are not stable in > Guix) and are =E2=80=9Cremembered=E2=80=9D using extended file attribut= es. This means > we=E2=80=99d have to write policies that can deal with arbitrary prefix= es and > we=E2=80=99d have to add an optional service to automatically label all= store > items (that=E2=80=99s expensive but maybe it can be done incrementally)= . Oh. > However, this is completely separate from enabling a configure flag for > Tor. That's why I changed the subject of the email, I am aware that this has nothing to do with tor configure-flags. --=20 =E2=99=A5=E2=92=B6 ng0 -- https://www.inventati.org/patternsinthechaos/