Which is a reason why "Why isn't FreeBSD more like..." questions aren't allowed here.if you want FreeBSD to become more like OpenBSD
Which is a reason why "Why isn't FreeBSD more like..." questions aren't allowed here.if you want FreeBSD to become more like OpenBSD
That's a gross over-simplification, and a sign the narrative of that "article" got through.Rather, "Why isn't FreeBSD more secure?". And this question should be allowed.
But in the article can be read:Other example, this article states that intel's hyperthreading must be disabled by default
Intel's hyperthreading technology (also known as SMT, Simultaneous MultiThreading) has proven itself to be insecure, so it should be disabled here.
MUST This word, or the terms "REQUIRED" or "SHALL", mean that the
definition is an absolute requirement of the specification.
SHOULD This word, or the adjective "RECOMMENDED", mean that there
may exist valid reasons in particular circumstances to ignore a
particular item, but the full implications must be understood and
carefully weighed before choosing a different course.
Obviously the threat model with unencrypted swap is that cryptographic keys could be stored in it unencrypted, and if somebody switches power off could peel them out of the swap space. Encrypted swap space might help against this.In this very thread, someone agreed that "swap should always be encrypted". Really? What's the threat here? Clearly, it's hardware falling into the wrong hands. When that happens, encrypted swap helps keeping private things secret. But what if that isn't even a realistic scenario for you? A bad thing that can happen with encrypted swap on FreeBSD is a resource deadlock (as GELI sometimes needs to dynamically allocate memory) in situations of heavy memory pressure. Although unlikely, I experienced that during a massive poudriere bulk run. And of course, it always costs a tiny bit of computing power. So, it's a trade-off.
en.wikipedia.org
That's just one specific example of something that should stay secret (of course, an important one!). But to make it a threat, someone unauthorized must gain access to the hardware.Obviously the threat model with unencrypted swap is that cryptographic keys could be stored in it unencrypted
Yes. This. Upvote a million times as all the cool kids nowdays say (I think. I'm old, so I don't know).Security is never an absolute thing. It depends on specific threats, risk analysis, etc.
Just out of curiosity (and, maybe, there is something to discuss), which are these? Are these points that weren't already adressed (like, e.g., being able to build ports as non-root, that works...)?As for the article itself, there are some good points in it
That's a sign for nothing, i tend to over-simplify things, but this is me. I didn't even read that article.That's a gross over-simplification, and a sign the narrative of that "article" got through.
Looking at your avatar, this comes a little unexpected ?. Well, then I misinterpreted your reaction, that's greati tend to over-simplify things, but this is me.
I thought that logic WAS simple. ?Looking at your avatar, this comes a little unexpected
For me personally, some of the sysctl settings I thought were interesting (to me) like some of the network settings for security, the pkg stuff, well even Ubuntu you have to at least sudo if you actually want to install or upgrade.Just out of curiosity (and, maybe, there is something to discuss), which are these? Are these points that weren't already adressed (like, e.g., being able to build ports as non-root, that works...)?
Not only the hardware, that just makes things easier. Access to the operating system (with a current or future method to elevate to root, however that may be achieved).But to make it a threat, someone unauthorized must gain access to the hardware.
This is the answer. But its far easier to drag out 20 year old sendmail vulnerabiltiies.Like these forums, Reddit are also a censorious bunch.
Here's an idea. Why don't you take that article, turn it into a wiki page (a reponse to xyz) and update and correct whatever needs correction. Just don't hide what you don't like... this aspect is something you "party faithful" certainly won't want to entertain.
I see no basis for this. If someone has your physical machine, all bets are off. There might be no reason NOT to encrypt it, but it's hardly universal that 'its important to encrypt it".Yes,there are many bad opinions to FreeBSD but the encrypted swap was right,is important to encrypt it
I check it with his example
Then that's the fault of the author. If he wants to be taken seriously, he needs to write seriously.Ah, well. As already stated in a private message concerning this, "should" wouldn't really describe what the author of this article means.
To understand it, you probably have to read the whole article. Then, you will understand (e.g. through "stylistic" elements like sarcasm) that this author truly believes their views are the only correct ones. They don't use words like "must" a lot, and they use "should" and similar quite often, but that can't hide the intentions. (It is OTOH a nice stragety to enable "Wortklauberei" like this later)
I didn't cite the article. I reproduced part of its contents in my own words. Reproducing the word "should" there would only make it less accurate.
edit: BTW, citing some definitions obviously taken from formal specifications (if I'm not mistaken they might come from IETF) here is very off-topic. We're really not talking about formal language here, to the contrary.
Disk encryption in general, in my opinion, can be overused. One thing people forget or gloss over is that encryption only protects cold disks or unmounted partitions. Machine up, devices/partitions mounted, the data is vulnerable. I also question "why do people encrypt the entire disk?" Is there really anything in /etc that needs to be encrypted? That's my opinion and I'm going to tell anyone they're wrong for doing it their way.I see no basis for this. If someone has your physical machine, all bets are off. There might be no reason NOT to encrypt it, but it's hardly universal that 'its important to encrypt it".
Encrypted swap won't help with this. On a running machine, there will be a "mapped" device allowing access to the unencrypted data.Not only the hardware, that just makes things easier. Access to the operating system (with a current or future method to elevate to root, however that may be achieved).
depends on:Disk encryption in general, in my opinion, can be overused.
Yep, that's why I said "My opinion" and "in general". Too many people (corporations) simply say must encrypt everything all the time without thought on "who, what why" that is the part I've always disagreed with. Encrypt separate devices/partitions hold financial data? Absolutely a good idea. The CFO laptop that he takes with him on the train, to meetings? Yep likely candidate for whole disk encryption. The shared family PC? Not the right choice (my opinion) but mom & dad should have a separate data disk encrypted having the family finances on it.depends on:
- the machine you use
- the concerned data
- your personal attidude between careless and paranoid
And that is pretty much the exception to my opinion: laptops that travel or could be easily stolen.On my laptop the entire disk is encrypted.
Cause it can be stolen or get lost.
And it's just less effort to enter the password once at booting, than handle with encryption/decryption all the time.
Me personally? Look to see if there is any identifying info on it so I can return it, otherwise toss it in the trash. Easy way to get someone to start loading malicious stuff on your computer.What are you doing, if you find a lost USB flash drive on the street?
Maybe not. But in /bin or /sbin for sure. Encryption ensures that no one tamperes with f.e. login while your system is down to slip you a souped up one.Is there really anything in /etc that needs to be encrypted?
If that author really would have wanted to be taken seriously, he would have stated his name in the file like it is good common practice for various reasons. He didn't.Then that's the fault of the author. If he wants to be taken seriously, he needs to write seriously.
That would be a bit easier than read only media for the system files, or doing mtree stuff during boot or "TPM" type of stuff.Maybe not. But in /bin or /sbin for sure. Encryption ensures that no one tamperes with f.e. login while your system is down to slip you a souped up one.