On 26 June 2020 22:03:35 CEST, james <gar...@verizon.net> wrote: >On 6/26/20 12:38 PM, Daniel Frey wrote: >> On 6/20/20 7:04 PM, William Kenworthy wrote: >>> Thanks for filing the bug. >> >> Gah! I forgot about this! >> >> I filed a bug now, I hope I made it clear enough. Others can pipe in >> there with comments if they like. >> >> I did indicate the two potential proposals to correct the issue in >the >> bug itself. >> >> https://bugs.gentoo.org/729752 >> >> Dan > >BEFORE I contribute to this bug, I'm posting here to see if others are >or have interest, in my thoughts on this issue and my related needs for > >extreme security, via Gentoo. Below is far from complete, but it only >provides a very snippets of my (secure) pathway forward with Gentoo. > >Interesting thread, thanks to all contributors. I'd like to add 'my >selfish' interest, as they also be espoused by other, more focused, >gentoo users. > >INTRO: > >I rarely build gentoo systems, for many reasons, that are not pretty >singularly focused. It drastically reduces security, performance and >upgrade issues. For me, the days of a any system, having groups or >users, are in the history books of very bad ideas. uP are so cheap and >less than $100, gets you a very 'bad ass' computer (Rasp. Pi 4+) 16 G >map-able ram. Furthermore, SOON, usb_4 devices are going to obsolete >the >entire concept of a 'hard drive'; hence the death (my prediction) of >groups and users on multi-USER systems, albeit slowly. > >Multi-function, Multi-tasking, and light weight, focused transient >clusters are the future. YMMV. > > >So solving a problem, that was real and big, decades ago, fails to look > >at the future. For me, Gentoo is future proof. I suggest a well >documented pathway forward; totally without the concept of groups and >users, on a typical, highly secure system. Which is now the baseline >for >real systems, particularly with a ipv4 or ipv6 static ip, that provide >focused and highly restricted functionalities. CA servers are going >private, as the public and root CA servers, are suspect, at best, as to > >being pristinely secure. Yes boys and girls most Certificate >Authorities >are HACK! Even the main root CAs. > >The F. Feds are the original culprits, but now it is a feeding frenzy. >The planet is now hacked, and groups and users concepts are the past. >imho! Danger Will Robinson Danger! > >So can some of the smarter (gentoo) folks illuminate how to totally >avoid groups and users, except for the minimum required, application >specific? For example like serial line tools, or outline a set of >tweaks/setting to avoid these altogether? > >I build embedded G. systems. I build single purpose G systems. I build >security G. systems (often with the ethernet, in only listen mode. I >build G. Firewalls. >I build G. highly restricted/filtered servers. NONE of those need users > >or groups. And if they do, I can obfuscate codes to provide that need, >to where filters and focused software gets what it needs to provide >functions. > >Yep, I'm moving to a total 'State_Machine_design' for critical >services. >Strip out every thing else..... > >Am I alone, or have/are others contemplating such high secure pathways? > >I'd be fantastic to find a kernel hacker that is on the pathway of >extreme minimization too; private email is fine; if that is in your >wheel_house. > > >curiously alone?, >James
James, Doesn't this imply that all the software and people interacting with the systems all have root-level access? One of the reasons MS systems were so vulnerable in the past was because they did not support seperated users. It's also still a problem with a lot of legacy systems. As long as more than 1 person can access the system, seperate users and groups/ACLs are necessary. Can you explain how having no users makes a system more secure? -- Joost -- Sent from my Android device with K-9 Mail. Please excuse my brevity.