Scott Rotondo wrote:
> Darren J Moffat wrote:
>> I've given this a lot of thought and I've finally come a conclusion.
>>
>> Ideally I would prefer to see more (maybe not all) the changes that JASS 
>> makes to the default configuration made the default configuration in the 
>> relevant consolidations (mostly this is ON).  My recent thread on 
>> stronger password defaults is a step in that direction.  However until 
>> such times as we have done that AND we have somewhere in the system the 
>> equivalent of the JASS auditing (config check) capability I think we 
>> need JASS to continue.
>>
>> So I'm supporting this project with the main goal of it being to 
>> actually get as much as possible out of JASS and make it smaller as time 
>> goes on.   I would like to see the new JASS project team work with the 
>> SMF and Install communities/projects to achieve this, with the ultimate 
>> goal being JASS is no longer a separate component or feature.
>>
>> I think we do need a source repository for this but I'm not sure about 
>> the need for a separate mailing list from security-discuss - in fact 
>> given that the goal is integration and the amount of work that needs to 
>> be done with other opensolaris.org communities I think a separate list 
>> initially would be detrimental to that goal.
>>
>> So: +1
> 
> This proposal has been languishing for some time waiting for another 
> Core Contributor to endorse it. With this email, I'm providing that 
> remaining +1.
> 
> What Darren wrote above describes my position as well. My goal is to see 
> the security-relevant features of JASS absorbed into Solaris so that 
> JASS itself becomes unnecessary. I believe that should be a primary goal 
> of this project. In the interim, however, it is useful to make the 
> existing JASS source available to the broader community for maintenance 
> and enhancement.

I also agree with that sentiment, although I would like to stress
one clarifying point.  Integrating the default JASS actions into
Solaris and integrating some form of auditing would be a huge step
forward but that alone does not eliminate what JASS does.

JASS also provides a central point for policy with respect to
auditing <and> hardening.  Today, we have one big knob (netservices)
and lots of mini-knobs (svcadm, ndd, routeadm, mv, vi, etc.) that must
all be managed independently.  We don't have a flexible way for our
customers to specify a policy.  One of the key elements of JASS IMHO
was to bring this all under the control of a single policy framework
(for SMF any everything else) that allowed people to specify the
hardening configuration of their systems.  Without functionality of
this sort, I think that any such replacement effort would be incomplete
since this is a feature that is used by nearly every organization who
has deployed JASS.

Just my $0.02.

Regardless, +1 on the project (if I have not already done so).

g

-- 
Glenn Brunette
Distinguished Engineer
Director, GSS Security Office
Sun Microsystems, Inc.

Reply via email to