Just to run an idea up the flagpole...

I have had good success with a slightly orthogonal approach to securing my servers. I run a hardened gentoo install, but with linux-vservers for the guests and additionally pax kernel patches.

The motivation is that Pax has mitigated a reasonable proportion of recent kernel issues. On the userspace side, linux-vservers are something like chroot-on-steroids and make it very straightforward to ringfence user applications without quite going to a full virtualisation solution. (For those who don't know, Linux-vservers look and smell like a virtualisation solution, but they are implemented using a kind of chroot - lxc containers are re-implementing the same idea, but currently much less advanced)

Up until now I have also been running kernels with the grsec patches, but merging those with linux-vserver is relatively complex since there is some overlap. Additionally it would appear that linux-vservers offer a large chunk of the protection that the grsec restrictions should offer. You loose the grsec RBAC system by going only PAX, but that doesn't quite work as expected with vservers, so I would think most users wouldn't implement that anyway

So the proposal is to recognise another secure setup which is:

- Minimal host installation + linux-vserver / pax kernel
- Applications moved to lightweight vserver guests (go pretty much one application / webapp per guest)

Who cares?

Cheers

Ed W

Reply via email to