-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Protecting /sys and /proc #277
Comments
That's an interesting repository which might have some goodies that have not been suggested here yet. Created, for it. That approach is blacklist based. Enumerating badness. https://github.com/Kicksecure/security-misc/blob/master/usr/libexec/security-misc/hide-hardware-info approach is whitelist based. Hardening permissions for everything except whitelisted. It also supports conditionals, configuration, is extensible, could be used to address the other related open issues in this repository one day. |
The main difference to consider is that ours is a self created new service. This approach uses existing mechanisms and allows better control for the user (also for us). https://www.freedesktop.org/software/systemd/man/latest/tmpfiles.d.html We can implement the same whitelist approach also here, I think. |
I don't see much code issues with It's currently easy to opt-in the hide-hardware-info.service systemd unit using How would opt-in enabling work? This is what the script is currently doing:
Not a high priority for me to translate that to systemd-tmpfiles. |
We know have our own services to change permissions. I have come across a better and more clean implementation.
https://github.com/divestedcg/Brace/tree/master/brace/usr/lib/tmpfiles.d
Can this approach be used here too for our purposes?
The text was updated successfully, but these errors were encountered: