Re: How efficient is mounting /usr ro?

2003-10-17 Thread Yasar Arman
Bernd Eckenfels wrote:
 In article [EMAIL PROTECTED] you wrote:

A read-only /usr is not a security measure.


 Depends on your definition og it-security. It reduces downtime, prevents
 some admin and software failures and therefore is a security measure.

I think,

you mean safety, not security.

Safety (eng.)  = Sicherheit (german)
Security (eng) = Sicherheit (german)
:-)

regards,
yasar
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: How efficient is mounting /usr ro?

2003-10-17 Thread Christian G. Warden
On Fri, Oct 17, 2003 at 11:01:27AM +0200, Yasar Arman wrote:
 Bernd Eckenfels wrote:
  In article [EMAIL PROTECTED] you wrote:
 
 A read-only /usr is not a security measure.
 
 
  Depends on your definition og it-security. It reduces downtime, prevents
  some admin and software failures and therefore is a security measure.
 
 
 I think,
 
 you mean safety, not security.
 
 Safety (eng.)  = Sicherheit (german)
 Security (eng) = Sicherheit (german)

we have the same problem with english.

$ dict security
2 definitions found

From Webster's Revised Unabridged Dictionary (1913) [web1913]:

  Security \Se*curi*ty\, n.; pl. {Securities}. [L. securitas: cf.
 F. s['e]curit['e]. See {Secure}, and cf. {Surety}.]
[...]
(c) Freedom from risk; safety.
[...]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Bernd Eckenfels
In article [EMAIL PROTECTED] you wrote:
 So is a tape backup a security measure?  What about a UPS?  Is ECC memory a 
 security measure?  I guess it's a security measure to buy rack mount servers 
 from companies such as Dell rather than assembling your own white-box 
 machines then.  :-#

Yes, all of them improves the data and service availability and is therefore
an it security measure. You may want to check out the baseline security
manual on even more (i.e. organisational) means.

http://www.bsi.bund.de/gshb/english/menue.htm

 Security is about protection from unauthorised access

This is your definition, it does not match most of the literature you can
get in that area. However most often, this is the only area where everybody
talks about and where you can make the big money :)

Greetings
Bernd
-- 
eckes privat - http://www.eckes.org/
Project Freefire - http://www.freefire.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Bernd Eckenfels
In article [EMAIL PROTECTED] you wrote:
 Depends on your definition og it-security. It reduces downtime, prevents
 some admin and software failures and therefore is a security measure.

And to reply to myself:

Information Security - As defined by ISO-17799, information security is
characterized as the preservation of:

* Confidentiality - ensuring that information is accessible only to
  those authorized to have access.
* Integrity - safeguarding the accuracy and completeness of information
  and processing methods.
* Availability - ensuring that authorized users have access to
  information and associated assets when required.

Greetings
Bernd
-- 
eckes privat - http://www.eckes.org/
Project Freefire - http://www.freefire.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Volker Birk
Bernd Eckenfels [EMAIL PROTECTED] wrote:
 You may want to check out the baseline security
 manual on even more (i.e. organisational) means.

Better forget that ridiculous paper.

VB.
-- 
X-Pie Software GmbH
Postfach 1540, 88334 Bad Waldsee
Phone +49-7524-996806 Fax +49-7524-996807
mailto:[EMAIL PROTECTED]  http://www.x-pie.de


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Volker Birk
Bernd Eckenfels [EMAIL PROTECTED] wrote:
 http://www.bsi.bund.de/gshb/english/menue.htm

Better forget that ridiculous paper.

VB.
-- 
X-Pie Software GmbH
Postfach 1540, 88334 Bad Waldsee
Phone +49-7524-996806 Fax +49-7524-996807
mailto:[EMAIL PROTECTED]  http://www.x-pie.de


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Christian Storch
Yes, a very sophisticated kind of definition.
But what about the small gap between theory and practice?
Now here we're discussing about 'real life'.

So I think security and availability represent to basic independend points of 
discussion.
Security in a sense of preventing of bad impact from outside a system.
That's debian-security. For the second one I would suggest debian-isp or debian-user.

Christian

- Original Message - 
From: Bernd Eckenfels [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, October 17, 2003 6:26 PM
Subject: Re: How efficient is mounting /usr ro?
...
 
 Information Security - As defined by ISO-17799, information security is
 characterized as the preservation of:
 
 * Confidentiality - ensuring that information is accessible only to
   those authorized to have access.
 * Integrity - safeguarding the accuracy and completeness of information
   and processing methods.
 * Availability - ensuring that authorized users have access to
   information and associated assets when required.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Peter Cordes
On Fri, Oct 17, 2003 at 09:05:04AM -0700, Christian G. Warden wrote:
 we have the same problem with english.
 
 $ dict security
 2 definitions found
 
 From Webster's Revised Unabridged Dictionary (1913) [web1913]:
 
   Security \Se*curi*ty\, n.; pl. {Securities}. [L. securitas: cf.
  F. s['e]curit['e]. See {Secure}, and cf. {Surety}.]
 [...]
 (c) Freedom from risk; safety.
 [...]

 Ok, how about wrapping this thread up sometime soon.  The semantics and
philosophical issues can be discussed in much greater depth than they have
been so far, but preferably not on deb-sec.  Here are some observations:

 Making /usr read-only is not likely going to be an option in
debian-installer any time soon.  The question is whether to mention the
possibility of doing it in any documentation.  It's not much of a defense
against a cracker, and only useful against an automated attack that doesn't
check for it, in terms of security, so the Debian security manual isn't an
obvious place for it.  It's the sort of thing that could get mentioned as a
possibly-useful-for-some-systems kind of thing in with other sysadmin tips
and tricks.

 Any docs that do mention it should include info on how to tell apt to mount
it read-write before running dpkg, and read-only again after:

   DPkg {
 // Auto re-mounting of a readonly /usr
 Pre-Invoke {mount -o remount,rw /usr;};
 Post-Invoke {mount -o remount,ro /usr;};
   }
from:
http://lists.debian.org/debian-devel/2001/debian-devel-200111/msg00212.html

 (note the caveat that dpkg could sometimes leave running processes with file
descriptors open on deleted files, preventing /usr from being remount ro
again.)

 So, as I see it, mounting /usr read-only is of minor benefit, and is only
even possible for people who have /usr on a filesystem by itself, or with
other read-only stuff.  It's worth a mention somewhere, but shouldn't be
promoted as a best-practice or something that all good admins do.  If a
particular system would really benefit from it, the admin probably just
needs to see the idea mentioned, not see a big list of effects on systems in
general.

-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , des.ca)

The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces! -- Plautus, 200 BC


signature.asc
Description: Digital signature


Re: How efficient is mounting /usr ro?

2003-10-17 Thread Adam ENDRODI
On Fri, Oct 17, 2003 at 08:57:43PM +0200, Christian Storch wrote:
 Yes, a very sophisticated kind of definition.
 But what about the small gap between theory and practice?

In theory, it approximates the practice :)

 So I think security and availability represent to basic independend points of 
 discussion.
 Security in a sense of preventing of bad impact from outside a system.

My view is that either C, I or A represents an area against which an
attacker or some accident could bring on `bad impact'.  Consider
the simple question `Is my site defaced?'.

To stay on topic, I'm for keeping /usr and /usr/local read-only,
because really nothing should update them except for a few
programs under controlled circumstances (that's what makes
the enforcment of this policy cheap).  In addition, it might
help you notice an intrusion.

(I also got used to remount,ro /, for that matter)

bit,
adam

-- 
1024D/37B8D989 954B 998A E5F5 BA2A 3622  82DD 54C2 843D 37B8 D989  
finger://[EMAIL PROTECTED] | Some days, my soul's confined
http://www.keyserver.net | And out of mind
Sleep forever


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Russell Coker
On Sat, 18 Oct 2003 07:07, Adam ENDRODI wrote:
 To stay on topic, I'm for keeping /usr and /usr/local read-only,
 because really nothing should update them except for a few
 programs under controlled circumstances (that's what makes
 the enforcment of this policy cheap). In addition, it might
 help you notice an intrusion.

Unless you have a good auditing setup (none of the various auditing modules 
are available in Debian) then you probably won't notice an automated attack 
that is blocked by having a read-only file system.  The attack may continue 
hitting you regularly until you remount it rw for an upgrade, at which time 
the attack will succeed.

If you want security for such things then use SE Linux, systrace, RSBAC, or 
GRSEC.  Don't waste time with ro mounts of /usr.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Goswin von Brederlow
Russell Coker [EMAIL PROTECTED] writes:

 On Sat, 18 Oct 2003 07:07, Adam ENDRODI wrote:
  To stay on topic, I'm for keeping /usr and /usr/local read-only,
  because really nothing should update them except for a few
  programs under controlled circumstances (that's what makes
  the enforcment of this policy cheap).  In addition, it might
  help you notice an intrusion.
 
 Unless you have a good auditing setup (none of the various auditing modules 
 are available in Debian) then you probably won't notice an automated attack 
 that is blocked by having a read-only file system.  The attack may continue 
 hitting you regularly until you remount it rw for an upgrade, at which time 
 the attack will succeed.
 
 If you want security for such things then use SE Linux, systrace, RSBAC, or 
 GRSEC.  Don't waste time with ro mounts of /usr.

Mounting stuff read-only also prevents filesystem corruption in case
the system does crash and reduces the frequency of fscks if you reboot
frequently.

You can also just pull the network plug and go single user before
mounting /usr RW for updates.

MfG
Goswin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Matt Zimmerman
On Thu, Oct 16, 2003 at 11:08:46PM +0200, Bernd Eckenfels wrote:

 In article [EMAIL PROTECTED] you wrote:
  A read-only /usr is not a security measure.
 
 Depends on your definition og it-security. It reduces downtime, prevents
 some admin and software failures and therefore is a security measure.

In the IT field, security refers specifically to unauthorized use, as in
security guard, and security system.  It does not, in general, refer to
the more generic definitions of security, as in security blanket,
securities and exchange commission, or job security.

-- 
 - mdz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Yasar Arman

Bernd Eckenfels wrote:
 In article [EMAIL PROTECTED] you wrote:

A read-only /usr is not a security measure.


 Depends on your definition og it-security. It reduces downtime, prevents
 some admin and software failures and therefore is a security measure.


I think,

you mean safety, not security.

Safety (eng.)  = Sicherheit (german)
Security (eng) = Sicherheit (german)

:-)

regards,
yasar



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Bernd Eckenfels
In article [EMAIL PROTECTED] you wrote:
 So is a tape backup a security measure?  What about a UPS?  Is ECC memory a 
 security measure?  I guess it's a security measure to buy rack mount servers 
 from companies such as Dell rather than assembling your own white-box 
 machines then.  :-#

Yes, all of them improves the data and service availability and is therefore
an it security measure. You may want to check out the baseline security
manual on even more (i.e. organisational) means.

http://www.bsi.bund.de/gshb/english/menue.htm

 Security is about protection from unauthorised access

This is your definition, it does not match most of the literature you can
get in that area. However most often, this is the only area where everybody
talks about and where you can make the big money :)

Greetings
Bernd
-- 
eckes privat - http://www.eckes.org/
Project Freefire - http://www.freefire.org/



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Bernd Eckenfels
In article [EMAIL PROTECTED] you wrote:
 Depends on your definition og it-security. It reduces downtime, prevents
 some admin and software failures and therefore is a security measure.

And to reply to myself:

Information Security - As defined by ISO-17799, information security is
characterized as the preservation of:

* Confidentiality - ensuring that information is accessible only to
  those authorized to have access.
* Integrity - safeguarding the accuracy and completeness of information
  and processing methods.
* Availability - ensuring that authorized users have access to
  information and associated assets when required.

Greetings
Bernd
-- 
eckes privat - http://www.eckes.org/
Project Freefire - http://www.freefire.org/



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Volker Birk
Bernd Eckenfels [EMAIL PROTECTED] wrote:
 You may want to check out the baseline security
 manual on even more (i.e. organisational) means.

Better forget that ridiculous paper.

VB.
-- 
X-Pie Software GmbH
Postfach 1540, 88334 Bad Waldsee
Phone +49-7524-996806 Fax +49-7524-996807
mailto:[EMAIL PROTECTED]  http://www.x-pie.de



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Volker Birk
Bernd Eckenfels [EMAIL PROTECTED] wrote:
 http://www.bsi.bund.de/gshb/english/menue.htm

Better forget that ridiculous paper.

VB.
-- 
X-Pie Software GmbH
Postfach 1540, 88334 Bad Waldsee
Phone +49-7524-996806 Fax +49-7524-996807
mailto:[EMAIL PROTECTED]  http://www.x-pie.de



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Christian Storch
Yes, a very sophisticated kind of definition.
But what about the small gap between theory and practice?
Now here we're discussing about 'real life'.

So I think security and availability represent to basic independend points of 
discussion.
Security in a sense of preventing of bad impact from outside a system.
That's debian-security. For the second one I would suggest debian-isp or 
debian-user.

Christian

- Original Message - 
From: Bernd Eckenfels [EMAIL PROTECTED]
To: debian-security@lists.debian.org
Sent: Friday, October 17, 2003 6:26 PM
Subject: Re: How efficient is mounting /usr ro?
...
 
 Information Security - As defined by ISO-17799, information security is
 characterized as the preservation of:
 
 * Confidentiality - ensuring that information is accessible only to
   those authorized to have access.
 * Integrity - safeguarding the accuracy and completeness of information
   and processing methods.
 * Availability - ensuring that authorized users have access to
   information and associated assets when required.




Re: How efficient is mounting /usr ro?

2003-10-17 Thread Peter Cordes
On Fri, Oct 17, 2003 at 09:05:04AM -0700, Christian G. Warden wrote:
 we have the same problem with english.
 
 $ dict security
 2 definitions found
 
 From Webster's Revised Unabridged Dictionary (1913) [web1913]:
 
   Security \Se*curi*ty\, n.; pl. {Securities}. [L. securitas: cf.
  F. s['e]curit['e]. See {Secure}, and cf. {Surety}.]
 [...]
 (c) Freedom from risk; safety.
 [...]

 Ok, how about wrapping this thread up sometime soon.  The semantics and
philosophical issues can be discussed in much greater depth than they have
been so far, but preferably not on deb-sec.  Here are some observations:

 Making /usr read-only is not likely going to be an option in
debian-installer any time soon.  The question is whether to mention the
possibility of doing it in any documentation.  It's not much of a defense
against a cracker, and only useful against an automated attack that doesn't
check for it, in terms of security, so the Debian security manual isn't an
obvious place for it.  It's the sort of thing that could get mentioned as a
possibly-useful-for-some-systems kind of thing in with other sysadmin tips
and tricks.

 Any docs that do mention it should include info on how to tell apt to mount
it read-write before running dpkg, and read-only again after:

   DPkg {
 // Auto re-mounting of a readonly /usr
 Pre-Invoke {mount -o remount,rw /usr;};
 Post-Invoke {mount -o remount,ro /usr;};
   }
from:
http://lists.debian.org/debian-devel/2001/debian-devel-200111/msg00212.html

 (note the caveat that dpkg could sometimes leave running processes with file
descriptors open on deleted files, preventing /usr from being remount ro
again.)

 So, as I see it, mounting /usr read-only is of minor benefit, and is only
even possible for people who have /usr on a filesystem by itself, or with
other read-only stuff.  It's worth a mention somewhere, but shouldn't be
promoted as a best-practice or something that all good admins do.  If a
particular system would really benefit from it, the admin probably just
needs to see the idea mentioned, not see a big list of effects on systems in
general.

-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , des.ca)

The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces! -- Plautus, 200 BC


signature.asc
Description: Digital signature


Re: How efficient is mounting /usr ro?

2003-10-17 Thread Adam ENDRODI
On Fri, Oct 17, 2003 at 08:57:43PM +0200, Christian Storch wrote:
 Yes, a very sophisticated kind of definition.
 But what about the small gap between theory and practice?

In theory, it approximates the practice :)

 So I think security and availability represent to basic independend points of 
 discussion.
 Security in a sense of preventing of bad impact from outside a system.

My view is that either C, I or A represents an area against which an
attacker or some accident could bring on `bad impact'.  Consider
the simple question `Is my site defaced?'.

To stay on topic, I'm for keeping /usr and /usr/local read-only,
because really nothing should update them except for a few
programs under controlled circumstances (that's what makes
the enforcment of this policy cheap).  In addition, it might
help you notice an intrusion.

(I also got used to remount,ro /, for that matter)

bit,
adam

-- 
1024D/37B8D989 954B 998A E5F5 BA2A 3622  82DD 54C2 843D 37B8 D989  
finger://[EMAIL PROTECTED] | Some days, my soul's confined
http://www.keyserver.net | And out of mind
Sleep forever



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Russell Coker
On Sat, 18 Oct 2003 07:07, Adam ENDRODI wrote:
 To stay on topic, I'm for keeping /usr and /usr/local read-only,
 because really nothing should update them except for a few
 programs under controlled circumstances (that's what makes
 the enforcment of this policy cheap).  In addition, it might
 help you notice an intrusion.

Unless you have a good auditing setup (none of the various auditing modules 
are available in Debian) then you probably won't notice an automated attack 
that is blocked by having a read-only file system.  The attack may continue 
hitting you regularly until you remount it rw for an upgrade, at which time 
the attack will succeed.

If you want security for such things then use SE Linux, systrace, RSBAC, or 
GRSEC.  Don't waste time with ro mounts of /usr.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page



Re: How efficient is mounting /usr ro?

2003-10-17 Thread Goswin von Brederlow
Russell Coker [EMAIL PROTECTED] writes:

 On Sat, 18 Oct 2003 07:07, Adam ENDRODI wrote:
  To stay on topic, I'm for keeping /usr and /usr/local read-only,
  because really nothing should update them except for a few
  programs under controlled circumstances (that's what makes
  the enforcment of this policy cheap).  In addition, it might
  help you notice an intrusion.
 
 Unless you have a good auditing setup (none of the various auditing modules 
 are available in Debian) then you probably won't notice an automated attack 
 that is blocked by having a read-only file system.  The attack may continue 
 hitting you regularly until you remount it rw for an upgrade, at which time 
 the attack will succeed.
 
 If you want security for such things then use SE Linux, systrace, RSBAC, or 
 GRSEC.  Don't waste time with ro mounts of /usr.

Mounting stuff read-only also prevents filesystem corruption in case
the system does crash and reduces the frequency of fscks if you reboot
frequently.

You can also just pull the network plug and go single user before
mounting /usr RW for updates.

MfG
Goswin