{{Header}}
{{#seo:
|description=Advanced Host Security for Advanced Users, {{project_name_long}} Hardening
|image=Host232security23434234.jpg
}}
[[File:Host232security23434234.jpg|thumb]]
{{intro|
{{security_intro}}
This page is targeted at advanced users who wish to improve the general security of their host operating system to become even more secure.
}}
= apt-transport-tor =
apt-transport-tor is a package that allows non-{{project_name_workstation_long}} that are not behind a torifying gateway to torify their APT traffic for individual repositories.
With non-{{project_name_short}} systems in mind, for security reasons APT blocks clearnet connections to .onion
domains by default. APT developers want to protect users from accidentally trying to use .onion
repositories without using Tor. Otherwise, a rogue DNS server could redirect users to a false domain and trick them into thinking they are using Tor when they are not.
apt-transport-tor (tor+http
) is the default from {{project_name_short}} 14 onward because it provides better error handling.
source: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754242#54
That said, it might make sense to use a-t-tor anyhow even if not
strictly needed as it will deal better with certain tor anomalies given
that it knows tor is involved reporting better errors (like telling you
that the .onion address you typo'ed is too long/short; saying
"unreachable host" if a service is… well, not reachable, instead of
saying "TTL expired" which is reported by Tor and technically more
correct but unhelpful), will use different circuits for different
sources and stuff.
For instance it reports if the .onion address is too long or short, and will use different circuits for different sources.
= DMZ =
If users have a shared network -- such as a cable modem/router or ADSL/router setup that is utilized by others -- then consider configuring a {{project_name_gateway_short}} [https://en.wikipedia.org/wiki/DMZ_%28computing%29 DMZ].
A properly configured DMZ restricts {{project_name_gateway_short}} from accessing, and being accessible to, other nodes on the network like printers, phones, computers and laptops. This is true even if root access is somehow achieved.
Should an incursion take place, a DMZ prevents an adversary from exploring other systems and possibly compromising them. However, in this case a DMZ does not protect the user's anonymity, since the adversary could just ping a remote server and discover the real IP address. Another benefit of a DMZ is that should other systems be compromised, it is more difficult to compromise {{project_name_gateway_short}}.
= Hardware Security =
{{mbox
| type = notice
| image = [[File:Ambox_notice.png|40px|alt=Info]]
| text = {{project_name_short}} cannot provide protection against hardware backdoors.
}}
Trusted computer hardware is fundamental to security. It is recommended to purchase and use "clean" computers that have components manufactured by reputable companies. It is preferable to pay in cash so hardware IDs do not leak your identity.
As outlined in the [[System_Configuration_and_Access#Use_a_Dedicated_Host_Operating_System_and_Computer|System Configuration and Access]] entry, it is safest to purchase a computer that is solely used for {{project_name_short}} activities because this minimizes the risk of a prior hardware compromise.
= Key Hardening Steps =
For greater security, advanced users should harden the host {{os}} as much as is practicably possible. This includes, but is not limited to applying relevant steps from the [[System_Hardening_Checklist|System Hardening Checklist]] and instructions found throughout this section:
When running guest operating systems in full screen mode, the guest operating system usually has control over the whole screen. This could present a security risk as the guest operating system might fool the user into thinking that it is either a different system (which might have a higher security level) or it might present messages on the screen that appear to stem from the host operating system.Any readers who are knowledgeable in this area are encouraged to share their expertise and edit this section accordingly. = See Also = * [[Basic Host Security]] * [[Host Operating System Selection]] = Footnotes = {{reflist|close=1}} {{Footer}} [[Category:Documentation]]
In order to protect the user against the above mentioned security risks, the secure labeling feature has been developed. Secure labeling is currently available only for VBoxSDL. When enabled, a portion of the display area is reserved for a label in which a user defined message is displayed. The label height in set to 20 pixels in VBoxSDL. The label font color and background color can be optionally set as hexadecimal RGB color values.