I don't know how the Sabayon build system works, but why not just build an image with full hardening and distribute it as an optional sabayon-hardened.iso? Without a pax kernel, you'll probably be okay on all video hardware and any breakage will happen at compile time, not when the end user tries to run things.

--Tony

On 03/13/2012 02:50 PM, Mitch Harder wrote:
Thanks for the feedback.  We appreciate your review of our approach.

On Tue, Mar 13, 2012 at 1:19 PM, Anthony G. Basile<[email protected]>  wrote:
1) glibc needs to be compiled with USE=hardened to apply some necessary
patches, and it needs to be compiled with a hardened compiler to get
-D_FORTIFY_SOURCES=2.  So the toolchain (gcc/glibc/binutils) must be
compiled and then recompiled with USE=hardened.
Right, sorry I wasn't clear about that.

Hardening the toolchain (gcc/glibc/binutils) should be a single step.


2) If the entire system is not compiled hardened, then the system libraries
will lack the security from hardening.  Why bother then with hardening at
all?
This is a very important question that is still unclear for me.

My premise is that:

We can achieve a worthwhile increase security by selectively hardening
Sabayon (hardened toolchain, hardened suid binaries, on a standard
kernel).

 From here, we will be in a position to selectively harden other
categories of packages (such as @system, LAMP, etc...).

Desktop (such as full Gnome and KDE) and Multimedia will probably be
last (and may be a ways down the road).

I have a supporting premise that, eventually, nearly all packages will
support being built hardened.

If these premises are incorrect, then this approach to hardening may
not be worthwhile.

And, again, I appreciate the feedback of the people who have spent
much more time working with hardening.




--
Anthony G. Basile, Ph.D.
Gentoo Linux Developer [Hardened]
E-Mail    : [email protected]
GnuPG FP  : 8040 5A4D 8709 21B1 1A88  33CE 979C AF40 D045 5535
GnuPG ID  : D0455535


Reply via email to