head 1.11;
access;
symbols;
locks; strict;
comment @# @;
1.11
date 2006.02.13.14.26.31; author rwatson; state dead;
branches;
next 1.10;
1.10
date 2005.04.29.10.25.23; author rwatson; state Exp;
branches;
next 1.9;
1.9
date 2003.05.15.14.34.56; author rwatson; state Exp;
branches;
next 1.8;
1.8
date 2002.12.23.22.34.04; author rwatson; state Exp;
branches;
next 1.7;
1.7
date 2002.11.30.14.35.24; author rwatson; state Exp;
branches;
next 1.6;
1.6
date 2002.05.22.03.14.47; author rwatson; state Exp;
branches;
next 1.5;
1.5
date 2002.05.09.19.00.57; author rwatson; state Exp;
branches;
next 1.4;
1.4
date 2002.05.09.18.49.12; author rwatson; state Exp;
branches;
next 1.3;
1.3
date 2002.05.02.22.27.08; author chris; state Exp;
branches;
next 1.2;
1.2
date 2002.05.02.22.23.43; author chris; state Exp;
branches;
next 1.1;
1.1
date 2002.05.02.00.31.14; author chris; state Exp;
branches;
next ;
desc
@@
1.11
log
@Remove TrustedBSD web page from CVS -- it's now being maintained in P4 so
that non-committers can help maintain it. The new path is:
//depot/projects/trustedbsd/www/...
@
text
@
Home
$FreeBSD: projects/trustedbsd/www/home.page,v 1.10 2005/04/29 10:25:23 rwatson Exp $
About TrustedBSD
The TrustedBSD project provides a set of trusted operating system
extensions to the FreeBSD operating system, targeting the Common
Criteria for Information Technology Security Evaluation (CC). This
project is still under development, and much of the code is destined
to make its way back into the base FreeBSD operating system.
This Web site will provide access to documentation,
code relating to features that are still under development, and
code that has its fingers in too many places to justify integrating
into the base operating system. Targeted features include:
- Extensible and audited authorization framework to support
access control modules. This framework provides
general-purpose labeling of kernel subjects/objects, centralized
policy management, and access to a variety of run-time security
events. This will allow the compile-time, boot-time, and
run-time extension of the operating system security model
based in both TrustedBSD access control modules, and
third-party modules that employ the extension framework.
- Mandatory access control modules based on the framework
supporting a variety of access control models, including fixed
and floating label Biba integrity policies, the MLS
confidentiality policy, Type Enforcement, and other customized
policies designed for common FreeBSD deployment scenarios.
In addition, the SELinux FLASK and Type Enforcement
implementations will be provided via an SEBSD module, providing
access to the higher level FLASK service abstraction, and
mature TE implementation.
- Improvements in system privilege to reduce the level of
risk associated with common system management functions.
- Access control lists for the file system and other kernel
resources allowing fine-grained and manageable discretionary
access control.
- Event auditing support, OpenBMS audit API and audit trail file
format, and single-host modular IDS system to monitor security
events and notify administrators in the event of
irregularities.
The TrustedBSD Project is made possible through the generous
sponsorship and donations of a variety of organizations, including
the Defence Advanced Research Projects Agency (DARPA), the National
Security Agency (NSA), Network Associates Laboratories, Safeport
Network Services, the University of Pennsylvania, Yahoo!, McAfee
Research, SPARTA, Inc., Apple Computer, Inc., and others.
Contributions to support the TrustedBSD Project are welcome; please
consider making donations through the FreeBSD Foundation.
@
1.10
log
@Add more information on OpenBSM, that some code came from Apple.
@
text
@d40 1
a40 1
$FreeBSD: projects/trustedbsd/www/home.page,v 1.9 2003/05/15 14:34:56 rwatson Exp $
@
1.9
log
@Expand the DARPA acronym in the project sponsors section.
Add the National Security Agency as a project sponsor, also with
acronym expanded.
@
text
@d40 1
a40 1
$FreeBSD: projects/trustedbsd/www/home.page,v 1.8 2002/12/23 22:34:04 rwatson Exp $
d85 4
a88 3
Event auditing support, and single-host modular IDS system
to monitor security events and notify administrators in the event
of irregularities.
d95 4
a98 3
Network Services, the University of Pennsylvania, Yahoo!, and
others. Contributions to support the TrustedBSD Project are
welcome; please consider making donations through the FreeBSD
Foundation.
@
1.6
log
@Wording/content improvements for the project summary on the front
page.
@
text
@d2 2
a20 3
3. The names of the authors may not be used to endorse or promote
products derived from this software without specific prior written
permission.
d40 1
a40 1
$FreeBSD: projects/trustedbsd/www/home.page,v 1.5 2002/05/09 19:00:57 rwatson Exp $
@
1.5
log
@Update the TrustedBSD page to include a reference to SEBSD, the FreeBSD
port of the SELinux FLASK and TE implementations.
Update the TrustedBSD page to acknowledge donations and sponsorship by
various organizations, including DARPA, NAI Labs, Safeport Network
Services, the University of Pennsylvania, Yahoo!, and others. Point
at the FreeBSD Foundation as a good vehicle for making future donations
and sponsorships.
@
text
@d41 1
a41 1
$FreeBSD: projects/trustedbsd/www/home.page,v 1.4 2002/05/09 18:49:12 rwatson Exp $
d60 8
a67 4
Extensible and audited authorization framework for integrating
third-party authorization modules, including general-purpose
subject and object labeling and centralized policy management.
d69 9
a77 9
Mandatory access control modules supporting privacy and
integrity policies, including support for fixed and floating
label Biba integrity policies, the MLS confidentiality policy,
Type Enforcement, and other customized policies appropriate
for common FreeBSD deployment scenarios involving mutually
untrusting parties. In addition, the SELinux FLASK and Type
Enforcement implementations will be provided vi an SEBSD
module, providing access to the higher level FLASK service
abstraction, and mature TE implementation.
d79 1
a79 1
Improvements in system privileges to reduce the level of
@
1.4
log
@Update TrustedBSD mission description on the main TrustedBSD page to
better reflect recent direction and development.
Sponsored by: DARPA, NAI Labs
Obtained from: TrustedBSD Project
@
text
@d41 1
a41 1
$FreeBSD: projects/trustedbsd/www/home.page,v 1.3 2002/05/02 22:27:08 chris Exp $
d70 4
a73 1
untrusting parties.
d86 8
@
1.3
log
@Include NAI Labs/CBOSS copyright at the top of this file.
Sponsored by: DARPA, NAI Labs
@
text
@d41 1
a41 1
$FreeBSD: projects/trustedbsd/www/home.page,v 1.2 2002/05/02 22:23:43 chris Exp $
d53 2
a54 2
to make its way back into the base FreeBSD operating system;
however, this Web site will provide access to documentation,
d65 6
a70 2
Fine-grained capabilities for system functions so as to
implement least-privilege and reduce the risks of compromise.
d72 2
a73 3
Mandatory access control for privacy and integrity, allowing
FreeBSD to be used in environments hosting mutually suspicious
parties and multi-level security modules.
@
1.2
log
@o Mark up CVS metadata using the `' namespace used in the FreeBSD
Web site.
o Include the CVS ID tag in HTML output.
Sponsored by: DARPA, NAI Labs
@
text
@d1 35
d41 1
a41 1
$FreeBSD$
@
1.1
log
@Welcome the TrustedBSD Web site code. This is being kept here because
it is the best place for FreeBSD Doc. Project people to have access to
it, and because it can be easily mirrored. It fulfills the requirement
that it is directly related to FreeBSD.
Sponsored by: DARPA, NAI Labs
Obtained from: TrustedBSD Project
@
text
@d4 6
@