On Mon, Oct 15, 2007 at 09:30:02PM -0500, Aaron wrote:
> The types of machines I will be running (...) I run pf [on my
> workstation] and only allow pass out w/return traffic allowed, no
> services at all) will be single or dual purpose servers.. i.e. http,
> smtp, imap etc, not machines that are running X and all my fav ports
> (...) I don't allow remote logins even via ssh except for the local
> networks, I always have a firewall in front of my public servers with
> rate limits (...) and I had decided a while back i was going to forgo
> (...) the latest and greatest versions of software, due to
> simplicity/security's sake.

Sounds pretty good.

> (...) [I] _know_ I would 
> had a fit trying to get systrace policies set up, if not worse thinking i 
> had them set up right and figuring out later they weren't and i had in fact 
> lessened the security by putting all my trust in that system, at least at 
> this point in my experience.

This is a common response from OpenBSD fans when confronted with SELinux
and the like.

> From what I have comprehended both
> [systrace and securelevels] still need to have someone that has gained
> root on the box (not that my understanding might not be flawed), which
> is one of the things that OpenBSD strives to disallow.

Unless I am sorely mistaken, systrace can be broken by any user with
enough priviliges to run two processes.

I'm not really aware of any non-root problem with securelevels, but
since securelevels are almost entirely about restricting root (and not
other users - an ordinary user wouldn't notice the difference), this is

                Joachim

-- 
PotD: x11/gnome/utils - GNOME utility programs

Reply via email to