Changeset View
Changeset View
Standalone View
Standalone View
usr.sbin/bsdinstall/scripts/hardening
Show All 23 Lines | |||||
# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | # OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||||
# SUCH DAMAGE. | # SUCH DAMAGE. | ||||
# | # | ||||
# $FreeBSD$ | # $FreeBSD$ | ||||
: ${DIALOG_OK=0} | : ${DIALOG_OK=0} | ||||
echo -n > $BSDINSTALL_TMPETC/rc.conf.hardening | echo -n > $BSDINSTALL_TMPETC/rc.conf.hardening | ||||
echo -n > $BSDINSTALL_TMPETC/sysctl.conf.hardening | |||||
exec 3>&1 | exec 3>&1 | ||||
FEATURES=$( dialog --backtitle "FreeBSD Installer" \ | FEATURES=$( dialog --backtitle "FreeBSD Installer" \ | ||||
--title "System Hardening" --nocancel --notags --separate-output \ | --title "System Hardening" --nocancel --notags --separate-output \ | ||||
--checklist "Choose system security hardening options:" \ | --checklist "Choose system security hardening options:" \ | ||||
0 0 0 \ | 0 0 0 \ | ||||
"hide_uids" "Hide processes running as other users" ${hide_uids:-off} \ | "hide_uids" "Hide processes running as other users" ${hide_uids:-off} \ | ||||
"hide_gids" "Hide processes running as other groups" ${hide_gids:-off} \ | "hide_gids" "Hide processes running as other groups" ${hide_gids:-off} \ | ||||
"read_msgbuf" "Disable reading kernel message buffer for unprivileged users" ${read_msgbuf:-off} \ | "read_msgbuf" "Disable reading kernel message buffer for unprivileged users" ${read_msgbuf:-off} \ | ||||
"proc_debug" "Disable process debugging facilities for unprivileged users" ${proc_debug:-off} \ | "proc_debug" "Disable process debugging facilities for unprivileged users" ${proc_debug:-off} \ | ||||
"random_pid" "Randomize the PID of newly created processes" ${random_id:-off} \ | "random_pid" "Randomize the PID of newly created processes" ${random_pid:-off} \ | ||||
"stack_guard" "Insert stack guard page ahead of the growable segments" ${stack_guard:-off} \ | "stack_guard" "Insert stack guard page ahead of the growable segments" ${stack_guard:-off} \ | ||||
"clear_tmp" "Clean the /tmp filesystem on system startup" ${clear_tmp:-off} \ | "clear_tmp" "Clean the /tmp filesystem on system startup" ${clear_tmp:-off} \ | ||||
"disable_syslogd" "Disable opening Syslogd network socket (disables remote logging)" ${disable_syslogd:-off} \ | "disable_syslogd" "Disable opening Syslogd network socket (disables remote logging)" ${disable_syslogd:-off} \ | ||||
"disable_sendmail" "Disable Sendmail service" ${disable_sendmail:-off} \ | "disable_sendmail" "Disable Sendmail service" ${disable_sendmail:-off} \ | ||||
2>&1 1>&3 ) | 2>&1 1>&3 ) | ||||
exec 3>&- | exec 3>&- | ||||
for feature in $FEATURES; do | for feature in $FEATURES; do | ||||
if [ "$feature" = "hide_uids" ]; then | if [ "$feature" = "hide_uids" ]; then | ||||
echo security.bsd.see_other_uids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | echo security.bsd.see_other_uids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | ||||
fi | fi | ||||
if [ "$feature" = "hide_gids" ]; then | if [ "$feature" = "hide_gids" ]; then | ||||
echo security.bsd.see_other_gids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | echo security.bsd.see_other_gids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | ||||
fi | fi | ||||
if [ "$feature" = "read_msgbuf" ]; then | if [ "$feature" = "read_msgbuf" ]; then | ||||
echo security.bsd.unprivileged_read_msgbuf=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | echo security.bsd.unprivileged_read_msgbuf=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | ||||
fi | fi | ||||
if [ "$feature" = "proc_debug" ]; then | if [ "$feature" = "proc_debug" ]; then | ||||
echo security.bsd.unprivileged_proc_debug=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | echo security.bsd.unprivileged_proc_debug=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | ||||
fi | fi | ||||
if [ "$feature" = "random_id" ]; then | if [ "$feature" = "random_pid" ]; then | ||||
echo kern.randompid=$(jot -r 1 9999) >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | echo kern.randompid=$(jot -r 1 9999) >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | ||||
allanjude: is there a reason this is 9999 not 99999? | |||||
allanjudeUnsubmitted Not Done Inline Actionsit doesn't work the way I thought, so the current value is fine allanjude: it doesn't work the way I thought, so the current value is fine | |||||
fi | fi | ||||
if [ "$feature" = "stack_guard" ]; then | if [ "$feature" = "stack_guard" ]; then | ||||
echo security.bsd.stack_guard_page=1 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | echo security.bsd.stack_guard_page=1 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening | ||||
fi | fi | ||||
if [ "$feature" = "clear_tmp" ]; then | if [ "$feature" = "clear_tmp" ]; then | ||||
echo 'clear_tmp_enable="YES"' >> $BSDINSTALL_TMPETC/rc.conf.hardening | echo 'clear_tmp_enable="YES"' >> $BSDINSTALL_TMPETC/rc.conf.hardening | ||||
fi | fi | ||||
if [ "$feature" = "disable_syslogd" ]; then | if [ "$feature" = "disable_syslogd" ]; then | ||||
echo 'syslogd_flags="-ss"' >> $BSDINSTALL_TMPETC/rc.conf.hardening | echo 'syslogd_flags="-ss"' >> $BSDINSTALL_TMPETC/rc.conf.hardening | ||||
fi | fi | ||||
if [ "$feature" = "disable_sendmail" ]; then | if [ "$feature" = "disable_sendmail" ]; then | ||||
echo 'sendmail_enable="NONE"' >> $BSDINSTALL_TMPETC/rc.conf.hardening | echo 'sendmail_enable="NONE"' >> $BSDINSTALL_TMPETC/rc.conf.hardening | ||||
fi | fi | ||||
done | done | ||||
is there a reason this is 9999 not 99999?