Roadmap

Differences between revisions 78 and 79
Revision 78 as of 2009-06-02 20:45:04
Size: 8598
Editor: pool-71-114-226-254
Comment: add a few more high priority apparmor items
Revision 79 as of 2009-06-02 21:25:03
Size: 11141
Editor: pool-71-114-226-254
Comment:
Deletions are marked like this. Additions are marked like this.
Line 71: Line 71:
  * xulrunner-1.9, firefox, evince, totem, xserver-xorg   * xulrunner-1.9, firefox, evince, totem, xserver-xorg, pidgin
   * avoid CPU bound apps
   * Clamav is already contained and is too cpu-bound to use PIE
   * Sasl?
   * Cyrus is too cpu-bound
   * Totem (Gstreamer) - very cpu-bound - needs testing to determine if performance impact is acceptable
   * Vlc (not in main), cpu-bound, but riddled with problems and little maintenance within Ubuntu
Line 73: Line 79:
  * proper PIE-handling in GDB (current patch barely works, upstream wants more correct approach, https://bugs.launchpad.net/bugs/382940)
  * Security team could make available a PPA for PIE testing, and the community could do performance testing
  * possibly add comment in the binary that won't get stripped
Line 75: Line 84:
  * internationalization issues, would need to be added to the list of folders that are already translated (xdg)
  * user confusion: Is the private directory encrypted or not?
Line 114: Line 125:
 * ufw improvements
  * support egress filtering (https://bugs.launchpad.net/bugs/382932)
  * support filtering by interface (https://bugs.launchpad.net/bugs/247450)
  * enable ufw by default (https://bugs.launchpad.net/bugs/382938)
   * new application profiles open by default, but configurable
   * look into things like port 25 if mail-transport-agent is installed
  * network-manager integration (create a new network, open it up)
  * dynamically detect outbound connections and somehow prompt (be careful with desktop DoS!)
  gui to turn on and off, turn on off and application selectors (location? control center applets). Talk to gufw about this
  * D-Bus/policykit integration
 * unified method to ask security questions
 * openjdk-6 testsuite cleanup from default compiler flags (https://bugs.launchpad.net/bugs/330713)
 * approach upstream glibc about futility of fwrite checks when lacking fprintf and fclose checks
 * automated Debian-security fetch/try/build system (mom, ubuntuwire (rcbugs), pitti may have some)
  * Get a report with some debdiffs the security team could review
  * At least open a bug with a failed/fuzzed debdiff that could be used as a starting point for community work
 * have sudo warn if it is prompting on a non-terminal fd (Debian said won't fix-- investigate, https://bugs.launchpad.net/bugs/56755). Should be forwarded upstream and Ubuntu should not carry a separate patch.
 * sort out bad vt interaction between usplash and other applications (https://bugs.launchpad.net/bugs/104602)
  * corner-case: sulogin with root password and usplash starts
  * other cases?
 * apparmor initscript is too slow (https://bugs.launchpad.net/bugs/382944)

Karmic

Blueprints

Documentation

  • The Security Team FAQ needs to be filled with answers to the various questions Ubuntu gets about security.

  • The Security Team KnowledgeBase need more to be written. Many ideas have already been listed there.

Investigations

Several ideas for possible work come from investigating existing the installed set of packages.

  • setuid: which programs are setuid and what may be needed to improve them.

  • measure how many bits of randomness are actually being used in kernel ASLR, compared to other ASLR implementations.
  • review ideas from brainstorm.

AppArmor Confinement

The following profiles have been identified and prioritized as targets for AppArmor confinement. Please note that a high priority does not indicate a committment to develop the profile during the current development cycle.

  • Top priority
  • Secondary priority
    • nmbd
    • winbind
    • spamassassin (spamd)
    • acroread (likely not possible due to constraints of agreement with Adobe)
  • Tertiary priority
    • dnsmasq (possibly P2 due to libvirt (talk to soren))
    • squid (possibly P2 (talk to elmo))
    • awstats
    • analog (in progress)

    • mailman
    • asterisk (universe)
    • exim4
    • nagios/nrpe
    • openssh-server (not easy, as users can spawn anything)
    • pidgin
    • mail clients (thunderbird, kmail, evolution) -- difficult
    • eog
    • totem
    • skype (likely not possible due to constraints of agreement)
    • ekiga
    • rhythmbox
  • Unspecified priority
    • portmap (low-effort)
    • rpc.statd (low-effort)
    • scripts that people tend to give sudo access. For example: apache2ctl, initscripts
    • munin

Unscheduled Wishlist Items

This area can be used to list ideas for future security work, or link to bugs that describe "Wishlist" issues.

Not Interested

  • hardened default config (Bastille-like). Check the compatibility of debian-bastille. Status: reviewed. what can be done in a default install is already being done


CategorySecurityTeam

SecurityTeam/Roadmap (last edited 2022-01-04 22:38:06 by rodrigo-zaiden)