evilangel wrote:Thanks for all these usefull information.
About PaX, is it the only tool adding memory randomisation against remote exploit ?
Some of the randomization is done outside PaX, for example:
CONFIG_GRKERNSEC_RANDNET gives "larger entropy pools" for additional randomness.
CONFIG_GRKERNSEC_BRUTE stops exploits that try to "guess" address space memory by detering the parent processes of children killed by PaX - a good example of how well grsecurity and PaX works together.
CONFIG_GRKERNSEC_KMEM isn't randomness but it protects kernel memory, and when combind with the right options, makes kernel rootkits practically impossible.
I may be missing something else.
evilangel wrote:In fact, this question because, I find all these features really interesting (randomisation, chroot hardening, RBAC/MAC...). But I try to find a scalable way to install them.
GrSecurity need me to recompile every kernel.
I've got some pre-compiled grsecurity kernels here:
http://www.ravencore.com/grsec/You said you're using debian, but you can always either use alien to install them, or simply unpack them with the "rpm2cpio" utility and extract the resulting cpio archive on the / of your server.
Don't forget to run your mkinitrd utilities and update your bootloader manually if you do this.
evilangel wrote:As SELinux or SMACK is already present in my Debian kernels i was thinking of using it. However, it depends if I am able to reach an equivalent level of security or not.
SELinux and SMACK are MAC utils only, they don't do any other form of kernel hardening; you won't get anywhere near the level of security with them vs using grsecurity. What I've seen some people do is use SELinux and PaX (no grsecurity) but you still have to patch your kernel .... but SELinux is available in my kernel-pax rpm, but you lose out on some of the grsecurity -> PaX interoperability which is always nice to have.