<p dir="ltr">Matthew,<br>
Do you refer the same old crypto export thingie that always hit us? Or you mean as a patch for the kernel as is?<br>
As a kernel patch the option as already was mentiones is to create an alternative kernel package, so you can use it or not based on your local rules/corp standard/legal restrictions.<br>
And I will be really happy if we can offer this as an alternate kernel. Is better than no offer it at all :)<br>
</p>
<br><div class="gmail_quote">El vie, 8 de mayo de 2015 16:34, Conley, Matthew M CTR GXM <<a href="mailto:matthew.m.conley1.ctr@navy.mil">matthew.m.conley1.ctr@navy.mil</a>> escribió:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">GRSec. I am on the fence for. I do like it, but do keep in mind, in certain settings (ie Gov't) it isn't allowed. It is simpler to learn, that said, I would have to relearn it.<br>
<br>
Regards<br>
Matthew Conley<br>
<br>
-----Original Message-----<br>
From: <a href="mailto:centos-devel-bounces@centos.org" target="_blank">centos-devel-bounces@centos.org</a> [mailto:<a href="mailto:centos-devel-bounces@centos.org" target="_blank">centos-devel-bounces@centos.org</a>] On Behalf Of Ezequiel Brizuela [aka EHB or qlixed]<br>
Sent: Friday, May 08, 2015 11:18 AM<br>
To: The CentOS developers mailing list.<br>
Subject: Re: [CentOS-devel] [SIG Hardening] hardening classes<br>
<br>
<br>
<br>
2015-05-08 8:01 GMT-03:00 Leam Hall <<a href="mailto:leamhall@gmail.com" target="_blank">leamhall@gmail.com</a>>:<br>
<br>
<br>
On 05/07/15 18:32, Ezequiel Brizuela [aka EHB or qlixed] wrote:<br>
<br>
<br>
I really like to participate in this SIG, I mostly want to add a support<br>
for grsecurity hardened kernel, this can be an option/part of this SIG?<br>
Grsecurity have patches as stable for the Kernel 3.2 and 3.14 Branches,<br>
I know that is not the same branches that currently handle Centos7<br>
Kernel, so I want to put this clear for the first moment and get your<br>
feedback about.<br>
<br>
<br>
<br>
Ezequiel, that would be interesting. A couple of questions come to mind. First, will it be optional? That is, can the grsecurity stuff be a choice of someone implementing our hardening recommendations? There are reasons, either lack of testing framework or application requirements, that might make a CentOS user want parts of the hardening stuff without all of it.<br>
<br>
<br>
<br>
I suppose that we can make the kernel optional, not as an addon but as a alternative kernel, the grsecurity kernel (<a href="http://grsecurity.net/" target="_blank">http://grsecurity.net/</a>), involves the use of pax for executable access control and have multiple level of security preconfigured to choose, so<br>
<br>
<br>
<br>
The second question, and this is based off my lack of knowledge, is how future open is your idea? Can it grow to cover the current kernels as well as the 4.x series?<br>
<br>
<br>
<br>
Currently the grsecurity got 'stable' patches for:<br>
<br>
* 3.1-3.2.68 - Last updated: 05/07/15<br>
<br>
* 3.1-3.14.41 - Last updated: 05/07/15<br>
<br>
And the 'test' patches for:<br>
<br>
* 3.1-4.0.2 - Last updated: 05/07/15<br>
<br>
<br>
(Quick explanation of versioning: [grsec version]-[kernel vers])<br>
<br>
<br>
So we have the long term branches 3.2.x, 3.14.x, and the stable 4.x as a test. I dunno when is going to change this from test to stable, but It will eventually happen.<br>
<br>
So, if this gain some interest, I can make a draft of how we can make this integration happen.<br>
<br>
<br>
I'm going to read and recapitulate the last SIG Security mails and review them to see actual status/next meetings to going forward with this.<br>
<br>
<br>
~ Ezequiel Brizuela - AKA QliXeD ~<br>
<br>
<br>
_______________________________________________<br>
CentOS-devel mailing list<br>
<a href="mailto:CentOS-devel@centos.org" target="_blank">CentOS-devel@centos.org</a><br>
<a href="http://lists.centos.org/mailman/listinfo/centos-devel" target="_blank">http://lists.centos.org/mailman/listinfo/centos-devel</a><br>
</blockquote></div>