词条 | Tin Hat Linux |
释义 |
}}{{Infobox OS | name = Tin Hat Linux | logo = | website = tinhat.sourceforge.net | developer = Anthony G. Basile, et al. | family = Unix-like | source_model = Open source | license = Various | latest_release_version = 20130228 | latest_release_date = {{release date and age|2013|02|28}} | language = Multilanguage | kernel_type = Monolithic | ui = GNOME | working_state = Current | supported_platforms = IA-32, x86-64 | package_manager = Portage }} Tin Hat is a Security-focused Linux distribution derived from Hardened Gentoo Linux. It aims to provide a very secure, stable, and fast desktop environment that lives purely in RAM.[1] Tin Hat boots from CD, or optionally from USB flash drive, but it does not mount any file system directly from the boot device.[1] Instead, Tin Hat employs a large SquashFS image from the boot device which expands into tmpfs upon booting. This makes for long boot times, but fast speeds during use. Design goalThe central design consideration in Tin Hat is to construct an operating system that can hide data from an attacker even if he has physical access to the computer.[1] Physical access to a computer with unencrypted filesystems does not secure the data and an attacker could easily retrieve the data. Encrypting the filesystem provides protection from such an attack, but many implementations of encryption do not hide the fact that data is encrypted on the filesystem. For example, the LUKS encryption system includes metadata which detail the block cipher and block cipher mode used in encryption. This information does not help the attacker decrypt the filesystem, but it does reveal that it contains encrypted data and not random data. However, Tin Hat stores its filesystem in the RAM, leaving no data in the computer's hard drive. If the user stores any data via a more permanent means than RAM, the encrypted data is indiscernible from random data. Tin Hat's preferred method of encryption is via loop-aes v3. Beyond these considerations, Tin Hat has to also protect against more common exploits based on networking or security holes in software. The hardening model chosen is PaX/Grsecurity which is already provided by the Hardened Gentoo project. Hardening of the kernel and the toolchain make most code born exploits less likely. A non-modular compiled kernel further frustrates the insertion of malicious kernel modules.{{Citation needed|date=February 2009}} Difference from GentooThe design goals of Tin Hat necessitate branching from Gentoo, rather than adding features from within by adding software to Gentoo's native portage system.{{Citation needed|date=February 2009}} See also{{Portalbar|Cryptography}}ReferencesThis article uses content from this page on tinhat.sourceforge.net, where it is licensed under the Gnu GPL. 1. ^1 2 {{cite web|url=http://tinhat.sourceforge.net|title=Tin Hat|publisher=D'Youville College}} External links
Articles and media coverage
1 : Gentoo Linux derivatives |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。