From Fedora Project Wiki

No edit summary
(openssh)
(69 intermediate revisions by 17 users not shown)
Line 1: Line 1:
{{header|docs}}
{{header|docs}}{{Docs_beat_open}}
{{Docs_beat_open}}
{{Draft|
Pick up a sub-beat and sign your name}}


== Disable SSL 3.0 and RC4 ==


{|- style="width: 40%; margin: auto;"
The SSL 3.0 protocol and the RC4 cipher are considered insecure and vulnerable to attacks. As such, these two are disabled by default for all Fedora components that use the system-wide crypto policies. This includes gnutls and openssl libraries, and all the applications based on them.
! style="width: 70%;" |Toool || style="width: 10%; text-align: center;" | To do || Writer
|-
|style="text-align: left;" | [[Features/DynamicFirewall | Dynamic Firewall]] || done ||
|-
|style="text-align: left;"| [[Features/DNSSEC_on_workstations | DNSSEC on workstations]] || done ||
|-
|style="text-align: left;"| OpenSCAP (secstat, firstaidkit) || done ||
|-
|style="text-align: left;"| [[Features/EcryptfsAuthConfig | EcryptfsAuthConfig]] || done ||
|-
|style="text-align: left;" | [[Features/RemoveSETUID |Remove SETUID]] (for pkgs maintainers)|| done ||
|-
|style="text-align: left;"| [http://0pointer.de/public/systemd-man/pam_systemd.html pam_systemd] (systemd related) || ??? ||
|-
|style="text-align: left;"| freeipa (F15) || ??? ||
|-
|}


= Security =
Applications or environments that require SSL 3.0 or RC4 can use [https://github.com/nmav/fedora-crypto-policies/blob/master/crypto-policies.8.txt update-crypto-policies] to globally switch to the LEGACY policy to enable SSL 3.0 and RC4.
This section describes the security changes and enhancements available in Fedora 15.


== Dynamic Firewall ==
'''Note (Use note tag)''' - All applications that use TLS  from NSS are not affected by this change.
Fedora 15 adds support for the optional firewall daemon (FirewallD), providing a dynamic firewall management with a D-Bus interface.  


The previous firewall model with system-config-firewall, was static and required a full firewall restart for all changes, even simple ones. The dynamic firewall mode, makes it possible to change firewall settings without the need to restart the firewall for persistent connections. At this stage, it supports iptables, ip6table and ebtables. In Fedora 15 a simple tray applet shows the firewall state, enabling/disabling firewall services
== OpenSSH 7.1 ==
The OpenSSH project continues to improve the security of network communication with the release of OpenSSH version 7.1. Details of the release are available at http://www.openssh.com/txt/release-7.1


For more details, consult the Fedora wiki pages, [[Features/DynamicFirewall | Fedora 15: Dynamic Firewall]] and [[FirewallD/ | FirewallD]].
== Package Hardening ==
Packages compiled for Fedora 23 will be compiled with a position-independent code flag enabled by default. This was an optional setting that as a default will protect users from certain potential security vulnerabilities.


== Standardized Passphrase Policy  ==
A common password policy is being utilized to provide a set of consistent rules for password policies. These rules can be modified locally to fit user needs.


== DNSSEC on workstations  ==
In Fedora 15 comes in a new security feature that protects the end users and their workstations exposition against various DNS spoofing and DNS cache-poisoning attacks.
'''DNSSEC''' is an environment full tested in Fedora, as all major DNS servers in Fedora run with '''DNSSEC''' validation enabled by default since Fedora 11, giving to the Fedora Project a lot of experience from server environment. '''DNSSEC''' is aimed to secure all DNS traffic. <code>NetworkManager</code> uses the BIND nameserver as a DNSSEC resolver and all received DNS responses are proved to be correct. In case a particular domain is signed and failed to validate then resolver returns SERFVAIL instead of invalidated response, which means something is wrong.
For all more details view [[Features/DNSSEC_on_workstations | DNSSEC on workstations]] om the Fedora wiki.
'''dnssec-tools''' version 1.8 in Fedora 15 is the tool used to improve this feature.
== OpenSCAP ==
First introduced in Fedora 14, OpenSCAP is a set of open source libraries providing an easier path for integration of the SCAP line of standards, managed by NIST and created to provide a standardized approach to maintaining the security of enterprise systems, such as automatically verifying the presence of patches, checking system security configuration settings, and examining systems for signs of compromise.
In Fedora 15, '''openscap''', the set of open source libraries enabling integration of the SCAP line of standards, has been upgraded from version 0.6.3 to 0.6.8. During these development stage there has been introduced full support for perl regular expression by default, OVAL float type support, XSL transformation improvements and Dublin Core support, added OVAL schemas version 5.6 and improved XCCDF reporting.
'''secstate''', the Security State Configuration Tool, has been rebuilt in Fedora 15 against version 0.4.1.
'''firstaidkit''', the System Rescue Tool that automates simple and common system recovery tasks, has been upgraded from 0.2.17 to version 0.2.18.
For more informations visit [http://www.open-scap.org/page/Main_Page http://www.open-scap.org/page/Main_Page].
== authoconfig ecryptfs ==
('''Feature Not confirmed''')
Fedora 15 brings in improved support for eCryptfs, a stacked cryptographic filesystem for Linux. '''ecryptfs''' is a useful tool that allows system administrator automatically <code>authconfig</code> and mount a private encrypted part of the home directory when a user logs in.
For details view the wiki page [[Features/EcryptfsAuthConfig| ecryptfs Autho-Config]].
== For Package Maintainers ==
('''perhaps don't include in the RN''')
Another feature that makes the applications and the Operating System more secure. Fedora 15 removes setuid applications and instead specifically assigns the capabilities required by an application, modifing the spec files of most applications that include a setuid application to remove the setuid flag and change to file capabilities.
View [[Features/RemoveSETUID | Remove SETUID]], for all details.


[[Category:Docs Project]]
[[Category:Docs Project]]
[[Category:Draft documentation]]
[[Category:Draft documentation]]
[[Category:Documentation beats]]
[[Category:Documentation beats]]

Revision as of 02:59, 28 August 2015

DocsProject Header docTeam1.png
Note.png
Beat is open
This beat is now ready to have Fedora 25 content added by the beat writer


Disable SSL 3.0 and RC4

The SSL 3.0 protocol and the RC4 cipher are considered insecure and vulnerable to attacks. As such, these two are disabled by default for all Fedora components that use the system-wide crypto policies. This includes gnutls and openssl libraries, and all the applications based on them.

Applications or environments that require SSL 3.0 or RC4 can use update-crypto-policies to globally switch to the LEGACY policy to enable SSL 3.0 and RC4.

Note (Use note tag) - All applications that use TLS from NSS are not affected by this change.

OpenSSH 7.1

The OpenSSH project continues to improve the security of network communication with the release of OpenSSH version 7.1. Details of the release are available at http://www.openssh.com/txt/release-7.1

Package Hardening

Packages compiled for Fedora 23 will be compiled with a position-independent code flag enabled by default. This was an optional setting that as a default will protect users from certain potential security vulnerabilities.

Standardized Passphrase Policy

A common password policy is being utilized to provide a set of consistent rules for password policies. These rules can be modified locally to fit user needs.