No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
<!-- The actual name of your proposed change page should look something like: Changes/Your_Change_Proposal_Name. This keeps all change proposals in the same namespace --> | <!-- The actual name of your proposed change page should look something like: Changes/Your_Change_Proposal_Name. This keeps all change proposals in the same namespace --> | ||
= Enable systemd service hardening for default services = | = Enable systemd service hardening for default and high profile services = | ||
{{Change_Proposal_Banner}} | {{Change_Proposal_Banner}} | ||
== Summary == | == Summary == | ||
Improve security of default services by enabling some of the high impact systemd service hardening knobs for all default services. | Improve security of default services by enabling some of the high impact systemd service hardening knobs for all default and high profile services. | ||
== Owner == | == Owner == | ||
Line 27: | Line 27: | ||
[[Category:SystemWideChange]] | [[Category:SystemWideChange]] | ||
* Targeted release: | * Targeted release: Fedora 40 | ||
* Last updated: <!-- this is an automatic macro — you don't need to change this line --> {{REVISIONYEAR}}-{{REVISIONMONTH}}-{{REVISIONDAY2}} | * Last updated: <!-- this is an automatic macro — you don't need to change this line --> {{REVISIONYEAR}}-{{REVISIONMONTH}}-{{REVISIONDAY2}} | ||
<!-- After the change proposal is accepted by FESCo, tracking bug is created in Bugzilla and linked to this page | <!-- After the change proposal is accepted by FESCo, tracking bug is created in Bugzilla and linked to this page | ||
Line 42: | Line 42: | ||
== Detailed Description == | == Detailed Description == | ||
The specific toggles under consideration include the following | The specific toggles under consideration include the following | ||
* PrivateTmp= | * PrivateTmp=yes | ||
* ProtectSystem= | * ProtectSystem=yes/full/strict | ||
* ProtectHome= | * ProtectHome=yes | ||
* PrivateDevices= | * PrivateDevices=yes | ||
* ProtectKernelTunables= | * ProtectKernelTunables=yes | ||
* ProtectControlGroups= | * ProtectKernelModules=yes | ||
* NoNewPrivileges= | * ProtectControlGroups=yes | ||
* NoNewPrivileges=yes | |||
We will enable as many of these as feasible for the | We will enable as many of these as feasible for the services but not every toggle is going to be applicable to every service. For example, ProtectHome=yes wouldn't work for any of the systemd user services but ProtectHome=read-only might and PrivateNetwork can only be used for services that work locally. | ||
== Feedback == | == Feedback == | ||
Line 56: | Line 57: | ||
== Benefit to Fedora == | == Benefit to Fedora == | ||
Fedora services will get a significant security boost by default by avoiding or mitigatating security vulnerabilities in these services. | |||
<!-- | |||
When a Change has multiple benefits, it's better to list them all. | When a Change has multiple benefits, it's better to list them all. | ||
Line 129: | Line 116: | ||
== User Experience == | == User Experience == | ||
This should be a fully transparent change for users. | |||
== Dependencies == | == Dependencies == | ||
None. We are merely enabling some long supported systemd features by default for default and high profile services. | |||
== Contingency Plan == | == Contingency Plan == | ||
* Contingency mechanism: These settings can be enabled/disabled at a per service level. No wholesale reverts is necessary. If we don't finish the work for all the services, we can follow through in future releases. | |||
* Contingency mechanism: | * Contingency deadline: N/A | ||
* Blocks release? No | |||
* Contingency deadline: N/A | |||
* Blocks release? | |||
== Documentation == | == Documentation == | ||
* https://www.freedesktop.org/software/systemd/man/latest/systemd.exec.html | |||
* https://www.redhat.com/sysadmin/systemd-secure-services | |||
* https://www.redhat.com/sysadmin/mastering-systemd | |||
<!-- REQUIRED FOR SYSTEM WIDE CHANGES --> | <!-- REQUIRED FOR SYSTEM WIDE CHANGES --> | ||
Line 163: | Line 139: | ||
== Release Notes == | == Release Notes == | ||
systemd security hardening features are enabled for default services and following high profile services. | |||
* Postgres | |||
* Apache Httpd | |||
* Nginx | |||
* MariaDB | |||
.... |
Revision as of 02:00, 15 November 2023
Enable systemd service hardening for default and high profile services
Summary
Improve security of default services by enabling some of the high impact systemd service hardening knobs for all default and high profile services.
Owner
-->
- Name: Rahul Sundaram
- Email: metherid@gmail.com
Current status
- Targeted release: Fedora 40
- Last updated: 2023-11-15
- [<will be assigned by the Wrangler> devel thread]
- FESCo issue: <will be assigned by the Wrangler>
- Tracker bug: <will be assigned by the Wrangler>
- Release notes tracker: <will be assigned by the Wrangler>
Detailed Description
The specific toggles under consideration include the following
- PrivateTmp=yes
- ProtectSystem=yes/full/strict
- ProtectHome=yes
- PrivateDevices=yes
- ProtectKernelTunables=yes
- ProtectKernelModules=yes
- ProtectControlGroups=yes
- NoNewPrivileges=yes
We will enable as many of these as feasible for the services but not every toggle is going to be applicable to every service. For example, ProtectHome=yes wouldn't work for any of the systemd user services but ProtectHome=read-only might and PrivateNetwork can only be used for services that work locally.
Feedback
Benefit to Fedora
Fedora services will get a significant security boost by default by avoiding or mitigatating security vulnerabilities in these services.
Scope
- Proposal owners:
- Other developers:
- Release engineering: #Releng issue number
- Policies and guidelines: N/A (not needed for this Change)
- Trademark approval: N/A (not needed for this Change)
- Alignment with Community Initiatives:
Upgrade/compatibility impact
How To Test
User Experience
This should be a fully transparent change for users.
Dependencies
None. We are merely enabling some long supported systemd features by default for default and high profile services.
Contingency Plan
- Contingency mechanism: These settings can be enabled/disabled at a per service level. No wholesale reverts is necessary. If we don't finish the work for all the services, we can follow through in future releases.
- Contingency deadline: N/A
- Blocks release? No
Documentation
- https://www.freedesktop.org/software/systemd/man/latest/systemd.exec.html
- https://www.redhat.com/sysadmin/systemd-secure-services
- https://www.redhat.com/sysadmin/mastering-systemd
N/A (not a System Wide Change)
Release Notes
systemd security hardening features are enabled for default services and following high profile services.
- Postgres
- Apache Httpd
- Nginx
- MariaDB
....