Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

systemd hardening/privilege separation #503

Open
LaserEyess opened this issue Nov 22, 2024 · 0 comments
Open

systemd hardening/privilege separation #503

LaserEyess opened this issue Nov 22, 2024 · 0 comments

Comments

@LaserEyess
Copy link

For systems that use systemd, there are various thing inadyn could do to make it safer to use by default. What I mean by "safer" is, specifically, restricting privileges of inadyn to the bare minimum of what it needs to function. The point is to facilitate defense-in-depth of internet facing services.

There are a few things I'm thinking of in particular:

  1. "Plain" hardening, such as things like ProtectHome=, or RestrictNamespace=
  2. Using tmpfiles/sysusers to automatically create an unprivileged user with the right permissions
  3. Support for credentials to store passwords encrypted on the disk, and allow configs to access them in the service

I think (1) is pretty straight forward and uncontroversial, but I'm curious about your thoughts on (2) or maybe even (3). I'm willing to make PRs for these features. See also the Arch Linux package build that implements (2).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant