CAcert needs your help with the following tasks. You can register yourself on this wiki page when you want to work on it.
Action logging
We would like to have a system that collects login-sessions on Unixoid servers (SSH + local sessions), and asks the administrator what he actually did in that session, to collect a report of who logged in when, how long and what they did.
Contact for this task: philipp@cacert.org
- Working on it:
- Comments:
Possible solutions include scripting sudo, using a shell like sudosh with rc script or sudo alternatives like http://www.sudo.ws/sudo/other.html (samj)
- Yes, a sudosh script as an additonal mechanism to ease documenting helps, but the main system should also work in case the user does not enter anything in the sudosh script, or does not use sudo at all. Perhaps we will also want to document other actions like file-transfers (scp, sftp) in the future.
ELF Signing and ELF-Loader-Signature Verifying
We would like to have X.509 and/or OpenPGP based ELF signing tools and improved ELF-Loaders that can enforce signature verification on load. There are several projects that are working on it, but none seems to be complete yet: http://wiki.cacert.org/wiki/CodesigningCert#head-6bbdb82bb3228b4a676f589f48b9c0e1d1fefff2
Contact for this task: philipp@cacert.org
- Working on it:
- Comments:
- Could be interesting to handle validation in userspace and mark validated executables as 'safe' until notified of modification. (samj)
- Yes, caching the validation in a secure way might be helpful for lower-security demands. Higher security demands might want to turn caching off, though.
Maintenance for Havege
Havege should be maintained, improved, packaged and if possible included into mainstream kernels: http://www.irisa.fr/caps/projects/hipsor/
Contact for this task: philipp@cacert.org
- Working on it:
Secure Compression
We are seaching for a compression system (library, ...) which does not contain any checksums, avoids any recognizable structures in the compressed file as far as possible, and where every file is a valid compressed file that can be decompressed correctly. The compression factor should be similar or better than ZIP, but must not be better than ~ 1:100, even with extremely low entropy files.
Contact for this task: philipp@cacert.org
- Working on it:
- Comments:
Depending on application, existing compression & truecrypt or similar could be an option. (samj)
- No, we specifically do not want to use encryption functions to replace compression function. We specifically want a compression function.
Data nymisation (obfuscation???) management
(Nymisation is our new word that covers both anonymisation and pseudonymisation. If you know a better word, please let us know) We would like to be able to have a nymisation system, which is able to synchronously nymisate data of various data-transfers and databases for testing and development environments, which supports various different nymisation scenarios. The challenge is that we have several networked applications (CATS, www, secure, tverify, ...) which contain related data, and communicate about related data. For differnet kinds of tests, we want to be able to apply different rules for anonymisation (eg. Some tests don't need any names at all, so we can strip them off completely, for some tests it's enough if we randomly mix all firstname with each other, or all lastnames, ...). The idea is to create proxies and agents that are centrally managed. The proxies are put in place between 2 systems that are communicating through filetransfer (XML,CSV), HTTP, and potentially other interfaces like RPC, ODBC, ... For training mode, the proxies should pass through all data, and learn the structure of the data that is passed through. When activated through the central management, the proxies anonymise/deanonymise the data according to the rules. The agents are able to load data from one place (database) and store it somewhere else. (Similar to proxies, but active).
Contact for this task: philipp@cacert.org
- Working on it:
- Comments:
- For some of these applications (eg CATS) a simpler solution like hashing the email address may be an option (samj)
Firefox Extension for HashServer
We would like to have a Firefox Extension that extracts the public key from each certificate Firefox processes, calculates the SHA-1 sum of it, and looks it up in a blacklist that is regularly updated from http://hashserver.cacert.org/ In case a compromised key is found, the user is alerted.
Contact for this task: philipp@cacert.org
Working on it: david.tamas@phpheaven.hu (G-Lex)
Encrypted Logfiles
We need a solution for Syslog, Apache and potentially other applications to automatically encrypt all their logfiles to a given public key. We already thought about other solutions like serial links to a dedicated syslog server, or syslog over TCP, but we prefer to store the logfiles directly on the server where they are created, encrypted to a public key. The secret key to decrypt the logfiles should be generated on a dedicated machine. In demand of logfile auditing, the encrypted logfiles should be copied to the dedicated machine, where they can be decrypted and audited. An attacker that succeeds to gain access to the webserver should not be able to decipher the logfiles on the server. All logfiles on the server can be encrypted to the same public key, we currently don't need different settings per logfile. It should be easy to deploy it on a normal Debian+Apache+Postfix server, to install the software and deploy the public key, and to have all logfiles encrypted from then on. Compatibility with OpenPGP Public keys (or X.509 certificates, or even SSH keys) is preferred, but not a requirement. (Perhaps GnuPG can be used directly by syslog in some way?).
Contact for this task: philipp@cacert.org
Working on it: nagy.gergely@gnanet.net (GNA)
- Comments:
- First, we shoud somehow separate the discussions from the tasklist
- We could also use hybrid encryption with regular rekeying of the symmetric key. I think we could encrypt several lines in the logfile together. (Maybe i'm too few to it, but what is hybrid encryption in this context? -GNA) (hybrid encryption = random session key for symmetric encryption + asymmetric encrypted session key. See OpenPGP or S/Mime for examples) I have read a bit about that, so i understand. Still i have problems how to implement it in a data stream like syslog. I would need to create logchunks which would be then separated into small sets of logfiles that can be encrypted. In that way we would not need anything other than gpg in asymetric mode, but we would get a lot of logfiles. Still, because i'm not a programmer there may be a point i'm missing.
- Maybe we should go an other way: let the logs created with symetric encryption so they can be encrypted byt-by-byte, but afterwards let a hasing algorythm create an intergity sum, and store the first hash in a safe place. Then we have encrypted logs, and can check for integrity. (-GNA) - I haven´t found any safe places for storing hashes yet. Perhaps TPMs could help there, but I doubt it. And hashes only provide tamper-evidence, not tamper-prevention. - I only thougt the symmetric encryption would be tamper prevetion, and the hashing (like in mysyslog) would do the integrity.
- Another solution might be to use existing infrastrucuture by generating a random symmetric key at boot, encrypting the key to the public key and storing it, then using it to create an encrypted filesystem and protecting that filesystem from reads (eg make it write only using eg an LSM). Also check out TPMs. Sounds complicated though when syslog could be used. [samj]
- The main objective is confidentiality. Integrity is optional. Perhaps OpenPGP is able to concatenate several encrypted packages after each other in a single file. So perhaps you can encrypt every line, and simply add it to the logfile. Since OpenPGP is packet oriented, it might work.
Potential solution: http://www.balabit.com/network-security/syslog-ng/ Potential solution: http://ecryptfs.sourceforge.net/ (if it can (be made to) work on public keys alone)
httpdate
A Debian package containing http://www.stud.uni-karlsruhe.de/~ucbdo/httpdate.en.html to be run either as a cronjob. I just found an alternative software: http://freshmeat.net/projects/htpd/
Contact for this task: philipp@cacert.org
Working on it: JesperZedlitz
Translatable Wiki
Please read http://svn.cacert.org/CAcert/HowTo/HowTo_Translingo.pdf and try it out on www.Translingo.org We are searching for a Wiki engine that is able to either use Translingo to translate the contents on the wiki, or to do a similar translation system internally. Please search for Wikis with translation functionality, test them, and provide a report about it.
Contact for this task: philipp@cacert.org
- Working on it:
- Comments:
Potential solution: Drupal http://drupal.org/project/drupal_wiki http://drupal.org/handbook/modules/translation
- Google Translation APIs are now available which could do this at runtime and/or cache pages (samj)
- URL to google translation APIs please.
Detection for register_globals usage
Find or develop a solution for a PHP module (perhaps Suhosin or similar), that writes logfile entries with filename+linenumber of all usages of globals that were registered through register_globals The current detection solutions of turning it off and looking for things that break isn't sufficient. Perhaps the tainting concept of Perl helps to solve this task (by tainting all registered globals, and reporting tainted variables on usage.
Contact for this task: philipp@cacert.org
- Working on it:
Subversion Mimetypes
Find a solution to automatically set the mimetypes of newly added files (.pdf -> application/pdf , ...) on the subversion server. The problem we have is that we have too many different users with too many different clients, so it's impossible for us to tell every user to configure their client correctly to send the mimetypes correctly in the first place. Most clients automatically send application/octet-stream as mimetype, which makes the Apache-modsvn access difficult for the users.
Contact for this task: philipp@cacert.org
- Currently working on it: J.Steijlen
- Comments:
LUKS Security
Find a solution to tell LUKS/DM-Crypt in case of emergency to wipe all the keys in memory, block disk access, and ask for the passwords on the console again. Perhaps a /proc file interface like /proc/sys/dmcrypt/emergency would be helpful.
Contact for this task: philipp@cacert.org
- Working on it:
- Comments:
- Since a script will likely be talking to /proc, why no do this in a script to start with. Good idea nonetheless. (samj)
- How can a script wipe the keys inside the kernel? With /dev/mem or /dev/kmem ?
LUKS Robustness
Currently LUKS is usually using hardcoded devicenames, which causes a problem when race-conditions result in randomly different devicenames upon booting (/dev/sda <-> /dev/sdi). In those cases LUKS doesn't find the encrypted harddisk anymore, and can't boot. Find a solution that LUKS does not depend on the hardcoded values anymore (perhaps still use them as default for the first try, but the encrypted partition isn't found there, then fall back to search for it on all other available devices) The solution should be then incorporated into Debian and Ubuntu (which are both affected by that problem)
Contact for this task: philipp@cacert.org
- Working on it:
Troubleticket System
We are searching for a troubleticket system with a Thunderbird extension, so that we can distribute the support-cases through IMAP or POP3 mailinglists to our support staff, and so that they can use Thunderbird as a frontend for the support system. Please evaluate whether any of the existing troubleticket / support systems out there already have a Thunderbird extension (or an extension to another widely available email client), or whether they have an API that could be used for a newly developed extension.
Contact for this task: guillaume@cacert.org , philipp@cacert.org
- Working on it:
Potential solution: http://drupal.org/project/casetrackerhttp://drupal.org/project/mailhandler
Potential solution: http://www.nynox.com/
- Comments:
- Issues and bugs are different things altogether and they are rarely linked. Treating issues as bugs or vice versa tends to break processes. We have access to JIRA licenses which would be an ideal (if otherwise commercial) solution. (samj)
- We are searching for support-issue-handling, not for bugtracking here.
New Blog Software
A task for our new sysadmins: We are thinking about migrating blog.cacert.org to Mephisto: http://mephisto.stikipad.com/ Please setup a Wordpress installation, create a few users, post a few blog-entries. Then try a migration to Mephisto, and see how it behaves. Create a Debian package for Mephisto in case there is none yet.
Desireable Requirement: X509 authentication
Contact for this task: philipp@cacert.org
- Working on it:
- Comments:
- I had bad experiences with mephisto in the past. I reported some trivial xss and they didn't manage to fix it for a long time (CVE-2007-1873). My suggestion would be serendipity, I reported some exotic xss to them and their security practice was always okay. (Hanno)
- Created an account at wordpress.com for testing - could be used for main page of site given recent outages. (samj)
Testsystem Image
We currently have a single testsystem on the internet: https://www.test1.cacert.at/ The sourcecode of the website is available on http://www.cacert.org/src-lic.php but it's very hard to setup into a working environment. We would like to have a VirtualBox/Qemu/VMWare image which includes a whole testsystem, so that every developer can easily setup a testsystem on his own machine, and that the developers don't interfere with each other.
Contact for this task: philipp@cacert.org
- Working on it:
Secure VPN
We are searching for a vendor that is able to deliver a secured Point-to-Point VPN solution that is designed for high-security environments. We are interested in 2-4 VPN boxes, with the following requirements: Strong casing, hardened TCP/IP stack, double encryption, no web-frontend, no IPSEC, independent security reviews (sourcecode availability preferred). Layer 2 bridging availability would be great. Must not allow internet access for any of the 2 networks that are connected through the VPN. It would be preferred to have the VPN in a Network-HSM style casing. A potential product: http://www.flexsecure.de/ojava/tunnelbox.html
Contact for this task: philipp@cacert.org
- Working on it:
Searchable Mailman archive
At the moment we are providing the standard mailman archive, but since we don't want to make it fully publically accessable (spidering, spamming, ...), it's currently login protected for members of the mailinglists, and Google and other search engines can't index it and make it searchable. The standard archive interface of Mailman doesn't provide searching, so finding a solution for giving our users a search-interface to the mailinglist archive would be the idea.
Contact for this task: philipp@cacert.org
- Working on it: daniel
Potential solution:http://drupal.org/project/mailhandler
Potential solution: http://www.sympa.org/ (under evaluation)
- Comments:
- Many of our dicusssions are interesting for the community at large, and as someone who has invested hundreds of hours into them I would rather this be available to other similar efforts. Google Groups support archiving and prevents email harvesting. Implementation is trivial, by creating a group, setting it to archive mode and subscribing a specified email. (samj)
- We sometimes get requests to remove personal details that were accidently sent to the mailinglist from the archive. Does Google support that?
Evaluate Sympa
Sympa promises to provide searchable archive, x509 capabilities, better ACL, better interface, and much more. Please evaluate those features, and a migration of Mailman to Sympa regarding for the CAcert infrastructure.
Contact for this task: philipp@cacert.org
- Working on it: daniel
- Comments:
See post to sysadm list about http://sysadmin.ie deployment (samj)
Bugs.cacert.org
All public CAcert services should support X509 authentication / registration either directly or via OpenID or similar technologies.
Contact for this task: daniel@cacert.org
- Working on it: none
- Comments:
- Rely on mod_ssl to set variables like SSL_CLIENT_S_DN which can be compared to user email in mantis. User signup form should drop email field and pick it up from here instead, so users can sign up automatically using certs too. Should be trivial code changes. (samj)
- Needed Code-changes should go into the official packages
Ok so it seems the path of least resistance for us wrt solving many of the interoperability problems and 'eating our own dogfood' is to use gnutls with apache (rather than mod_ssl) and hack cacert.org, mediawiki, wordpress, etc. to consult the SSL_CLIENT_S_AN% variable(s) for any prefixed with "RFC822NAME:" (or perhaps for simplicity just use SSL_CLIENT_S_AN0): http://www.outoforder.cc/projects/apache/mod_gnutls/docs/#environment-variables (samj)
community.cacert.org
All internal CAcert services like pop3s/imaps and SMTP should support X509 authentication rather than depending on another username/password.
Contact for this task: daniel@cacert.org
Working on it: daniel@cacert.org
- Comments:
- Web interfaces are one thing, but assuming one gets IMAPS/SMTP working with client certs (eg using stunnel), client support is your next problem. (samj)
- How can someone get a certificate if he has to proof that he has access to the mailbox, when he only gets access to the mailbox when he has a certificate?
- I would prefer certificate + username + password instead of only certificate, due to possibly compromised client keys and CSRF attacks.
wiki.cacert.org
All public CAcert services should support X509 authentication / registration either directly or via OpenID or similar technologies.
Contact for this task: daniel@cacert.org
- Working on it: none
- Comments:
- This should be fairly straightforward by picking up SSL_CLIENT_S_DN et al courtesy mod_ssl. As an aside, a section of the wiki for client cert enabling various products should exist. (samj)
Spam-administration
Mailman somehow magically detects most spam and sends it to list-administrators. Currently this work is mostly done by staff of CAcert. If would be nice if we seperate email moderation from list administration, so that we could more easily distribute that work on more people, so that our core staff can concentrate on other things.
Contact for this task: philipp@cacert.org
- Working on it:
- Comments:
- Moderation sucks - it is a conversation killer. If it smells like spam then bin it. (samj)
- Spam is being moderated, non-spam is delivered unmoderated. Unmoderated Spam-Filters are conversation killers.
Full Disk Encryption for OpenBSD
We could need a full disk encryption system for OpenBSD, preferably integrated into the installation process like Debian/Ubuntu Installer does it.
Contact for this task: philipp@cacert.org
- Working on it:
Syslogging through Vserver
Write a HowTo for piping all syslog messages from all linux-vserver guests to the syslog server on the vserver-host, so that the logfiles are out-of-reach of the linux-vserver guests. Unix-Domain Sockets / Pipes are highly preferred. Up to 30 vserver-guests are needed. Automatic addition of new guests when new vhosts are created would be very helpful.
Contact for this task: philipp@cacert.org
- Working on it:
- Comments:
Could this be as simple as mknod'ing /dev/log as you would for a chroot? Close: http://www.paul.sladen.org/vserver/archives/200205/0089.html
Note that a syslogd daemon can setup multiple /dev/log socket. or you can use hard links to setup /dev/log using the root server /dev/log in every vserver. This way, logging would go to the root log files.
This could be used in a high security setup, where logging become invisible to a vserver (and thus an attacker wanting to cleanup).
Database optimisation
Investigate how we can tune our database and the database queries.
Contact for this task: philipp@cacert.org
- Working on it:
- Comments:
Currently http://cacert.org/stats.php seems to be generated for each hit (it takes ages). This info should be cached, even if just by using curl/wget from cron to spit out the page every hour/day/etc. There may be other long running queries hurting us. (samj)
Unicode
CAcert wants to migrate to Unicode. Please join http://wiki.cacert.org/wiki/UnicodeTaskForce if you are experienced with Unicode.
- Comments:
- New systems should be unicode friendly.
IPv6
CAcert wants to offer it's services on both IPv4 and IPv6.
Contact for this task: philipp@cacert.org
- Working on it:
- Comments:
- Most recent distros/packages have IPv6 support that just needs to be enabled. Agreed this is a noble cause. (samj)
- And how would that change the DNS records in the cacert.org zone?
- Most recent distros/packages have IPv6 support that just needs to be enabled. Agreed this is a noble cause. (samj)
CAcert Feature Requests and Bugs
Developers please also see http://bugs.cacert.org/ whether there are any outstanding requests that are missing patches for them. Please develop patches for the open requests. Sourcecode is available from http://www.cacert.org/src-lic.php
Contact for this task: philipp@cacert.org
- Working on it: