-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Harden Network #186
Comments
A firewall seems quite too much for security-misc. Kicksecure firewall should go:
not sure yet. Some related off-topic discussion here:
For desktop it seems hard to reason about which ones to enable by default and which ones to prohibit. avahi not sure how important that is for actual users. cups works fine for local printing even if a firewall is enabled. Printing over network is rare and in that case opening a port in the firewall can be required. That's a usability regression over Debian but a well justified one and there would be documentation how to easily open any port. By having zero open ports by default, it's a bit more secure. Less fingerprinting can be done by scanners. But if at least 1 port is open, more information can be gathered.
I'd rather solve the issues preventing hardened malloc enabled by default than having a ton of different mechanisms (for suid, for daemons) for opt-in hardened malloc.
Probably a non-issue. This should already implicitly be the same thanks to systemd targets. Systemd is quite clever about this and distributions inhert this. If you find any daemons that load before AppArmor, please report the issue upstream and link the bug report here.
This is a problem because |
I am not sure if this package would be the right place for this task, but I think there is no other kicksecure repo that is more suited.
We have to take upon ourselves to harden the interaction with network. This has several steps:
Environment="LD_PRELOAD='libhardened_malloc.so'
in their systemd service config.After=apparmor.service
andAppArmorProfile=profile
.What is achieved after: No connection from outside can enter the system aside from select services, which are forcibly protected and heavily limited and confined with mandatory access control and significantly hardened against memory and heap safety vulnurabilities. This won't be suited for servers. About that I am opening another issue.
The text was updated successfully, but these errors were encountered: