Date: Fri, 17 Apr 1998 10:55:57 +0200 From: Philippe Regnauld <regnauld@deepo.prosa.dk> To: Robert Watson <robert+freebsd@cyrus.watson.org> Cc: freebsd-security@FreeBSD.ORG Subject: Re: kernel permissions Message-ID: <19980417105557.59439@deepo.prosa.dk> In-Reply-To: <Pine.BSF.3.96.980417013537.8952E-100000@trojanhorse.pr.watson.org>; from Robert Watson on Fri, Apr 17, 1998 at 01:45:29AM -0400 References: <199804170519.WAA12540@burka.rdy.com> <Pine.BSF.3.96.980417013537.8952E-100000@trojanhorse.pr.watson.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Robert Watson writes: > Hardening Project. What I have in mind is a port in the ports collection > that would "harden" the default FreeBSD base installation. It would apply > schg flags, remove unnecessary read/write/etc access from standard > binaries and config files, disable most daemons and inetd.conf entries, > install a more-than-minimal ipfw config, perhaps enable some kernel > settings, etc. I'm all for this, and would be willing to test it. While you're at it: - include the hardening to _removing_ certain syscalls from the kernel (see below) - you could use the "ugly" dialog lib. to make a nice menu selection (like the GS port) to enable/disable features: [ ] Standard (definition) [ ] Paranoid (definition) [ ] X-Files [X] Custom [ ] Make kernel unreadable to world :-) [X] Append-only /var ? [...] > The goal would be to move from an "open" system to one > that might be more appropriate for a router or firewall machine in a less > friendly network environment. For the paranoid, of course, it would be > appropriate for every-day use :). Yep. > Does this seem like an interesting or useful proposal? When setting up a > proxy server, I really want a minimal feature set enabled, although having > the standard toolset available is always useful. The proxy user, however, > should not even be able to send packets on irregular ports, and would be > restricted by ipfw. Similarly, use of secure levels would allow us to > significantly reduce the effects of any kind of compromise. Suggestion: how difficult would it be to have ipfw(8) respect the securelevel to, for example, refuse to flush / alter the ipfw list ? i.e.: all mods have to be tested before the securelevel is raised, and once it is, only rebooting into single user on the console allows you to change the filters. > Some other thoughts I had were instructions for rolling a custom system CD > + possibly a boot disk to create read-only machines for use as proxy > servers or routers. Swap + MFS would be the only writable areas of the > system, and neither of those would persist over boot. We need write-protect notch on the hard-disks :-) > environment. A number of the large scale UNIX machines I have seen go so > far as to disable all setuid utilities (other than su) to prevent > unauthorized use of the system. Some off-the-shelf firewall packages, like BorderWare (based on BSDi) uses a dual-kernel approach: - an operational, network-aware kernel stripped of suspect system calls (particularly the *id stuff) - a fully functional "single-user" kernel with NO networking to do the maintenance. This is a tad straight-jacketed, but you get the idea (I hope). > Anyhow, if there is sufficient interest in the project, I'd like to try > and get it off the ground. Presumably, some changes might work their way > back into the default distribution. If we lose no significant > functionality, it cannot hurt to restrict priveledges. It may help us > when those unpredicted vulnerabilities do turn up. Better than a port: a separate set of tarballs in the dist: harden.aa harden.ab ... ? Anti-bloatists oblige. -- -[ Philippe Regnauld / sysadmin / regnauld@deepo.prosa.dk / +55.4N +11.3E ]- «Pluto placed his bad dog at the entrance of Hades to keep the dead IN and the living OUT! The archetypical corporate firewall?» - S. Kelly Bootle, ("MYTHOLOGY", in Marutukku distrib) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980417105557.59439>