Proper FreeBSD system hardning :)(all for sysctl)
-
Proper FreeBSD system hardning :)
(all for sysctl)security.bsd.see_other_uids
security.bsd.see_other_gids
--> Don't show other users processessecurity.bsd.unprivileged_read_msgbuf
--> Don't allow unprivileges to read kernel buffer (dmesg)security.bsd.unprivileged_proc_debug
--> Don't allow unprivileged to use debuggingsecurity.bsd.hardlink_check_uid
security.bsd.hardlink_check_gid
--> restrict hardlinks to same user/groupkern.elf64.aslr.enable
kern.elf32.aslr.enable
--> Enable kernel address randomization (ASLR)security.bsd.unprivileged_mlock
--> Restrict unprivileged users from loading kernel modulessysctl kern.securelevel=1
--> Cannot lower securelevel
--> Cannot write directly to mounted disks
--> Cannot write to /dev/mem or /dev/kmem
--> Cannot load/unload kernel modules
--> Cannot change firewall rules (if compiled with IPFIREWALL_STATIC)
--> System immutable and append-only file flags cannot be removedThis can make a FreeBSD system more secure, especially on multi-user systems. Securelevel ca even go higher, but those restrictions generally need care.
#runbsd #freebsd #security #hardening #goodpractice #devops #sysadmin
-
Proper FreeBSD system hardning :)
(all for sysctl)security.bsd.see_other_uids
security.bsd.see_other_gids
--> Don't show other users processessecurity.bsd.unprivileged_read_msgbuf
--> Don't allow unprivileges to read kernel buffer (dmesg)security.bsd.unprivileged_proc_debug
--> Don't allow unprivileged to use debuggingsecurity.bsd.hardlink_check_uid
security.bsd.hardlink_check_gid
--> restrict hardlinks to same user/groupkern.elf64.aslr.enable
kern.elf32.aslr.enable
--> Enable kernel address randomization (ASLR)security.bsd.unprivileged_mlock
--> Restrict unprivileged users from loading kernel modulessysctl kern.securelevel=1
--> Cannot lower securelevel
--> Cannot write directly to mounted disks
--> Cannot write to /dev/mem or /dev/kmem
--> Cannot load/unload kernel modules
--> Cannot change firewall rules (if compiled with IPFIREWALL_STATIC)
--> System immutable and append-only file flags cannot be removedThis can make a FreeBSD system more secure, especially on multi-user systems. Securelevel ca even go higher, but those restrictions generally need care.
#runbsd #freebsd #security #hardening #goodpractice #devops #sysadmin
@Larvitz we enable a bunch of these (and more) by default in BastilleBSD
-
undefined Stefano Marinelli shared this topic