It has been discussed before. Alot of it is privilege escalation protections which would be meaningless in qubes. Some of it would be nice. Some people in the mailing list have claimed to got a grsec kernel working if you search it, but it might be more trouble then its actually worth.
I kind of believe in the philosophy that nothing is 100%, there is no such thing as completely stopping attacks, if attacker is persistent enough and you continue to use the services you use a computer to enjoy, you will be compromised eventually. There will always be bugs till the end of the time and the best thing to do is just mitigate the damage. For example in qubes the sys-net is assumed untrustworthy but it does its best to separate its exposure from rest of the system.
Not sure if you know this, but Brad Spengler, the developer of grsecurity, doesn't even use his own kernels. He prefers to use windows.
wow thanks for the information,and yes I totally agree there will never be a way to be fully 100% a system is unexploitable,bug-free,backdoor free,all we can really due is reduce the coding,and make it more simple
for years projects such as firefox,OpenBSD,gresecurity,etc. have been constantly updating their respective projects,i see no near possible end to its security audits,in the fore see-able future.
and i did not know Brad Spengler does'nt use his own kernel :O I did hear though he was quite disrespectful when a certain someone found a bug and he got butt-hurt or something and deleted that certain someone off his twitter
and the escalation protections is not needed why?just wondering is all,I have a hunch it is because of Qubes awesome security by isolation approach,and because its based off a micro-kernel Xen right?due to its small amounts of coding?
He blocked everyone off his twitter, he flies off the handle alot it seems. Well I'm no expert, but for example qubes has passwordless sudo. But maybe i'm misunderstanding myself I'm not sure.
It may not be necessary. There is a kernel hardening project
which is bringing some of the grsecurity & PaX stuff into the
mainline kernel.
http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project
hi what do you mean by takened with salt?
I know Qubes is quite reasonably secured with its isolation and xen architecture,but I like adding precaution such as extra security in case of an attacker somehow bypasses the isolation or find an exploit or flaw in the xen architecture