No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
<!-- The actual name of your proposed change page should look something like: Changes/Your_Change_Proposal_Name. This keeps all change proposals in the same namespace --> | <!-- The actual name of your proposed change page should look something like: Changes/Your_Change_Proposal_Name. This keeps all change proposals in the same namespace --> | ||
= | = Enable systemd service hardening for default services = | ||
{{Change_Proposal_Banner}} | {{Change_Proposal_Banner}} | ||
== Summary == | == Summary == | ||
Improve security of default services by enabling some of the high impact systemd service hardening knobs for all default services. | |||
== Owner == | == Owner == | ||
--> | --> | ||
* Name: [[User: | * Name: [[User:Sundaram| Rahul Sundaram]] | ||
* Email: metherid@gmail.com | |||
* Email: | |||
<!--- UNCOMMENT only for Changes with assigned Shepherd (by FESCo) | <!--- UNCOMMENT only for Changes with assigned Shepherd (by FESCo) | ||
* FESCo shepherd: [[User:FASAccountName| Shehperd name]] <email address> | * FESCo shepherd: [[User:FASAccountName| Shehperd name]] <email address> | ||
Line 34: | Line 25: | ||
<!-- After review, the Wrangler will move your page to Category:ChangeReadyForFesco... if it still needs more work it will move back to Category:ChangePageIncomplete--> | <!-- After review, the Wrangler will move your page to Category:ChangeReadyForFesco... if it still needs more work it will move back to Category:ChangePageIncomplete--> | ||
[[Category:SystemWideChange]] | |||
* Targeted release: [https://docs.fedoraproject.org/en-US/releases/f<VERSION>/ Fedora Linux <VERSION>] | * Targeted release: [https://docs.fedoraproject.org/en-US/releases/f<VERSION>/ Fedora Linux <VERSION>] | ||
Line 52: | Line 41: | ||
== Detailed Description == | == Detailed Description == | ||
The specific toggles under consideration include the following | |||
* PrivateTmp=true | |||
* ProtectSystem=true | |||
* ProtectHome=true | |||
* PrivateDevices=true | |||
* ProtectKernelTunables=true | |||
* ProtectControlGroups=true | |||
* NoNewPrivileges=true | |||
We will enable as many of these as feasible for the service but not every toggle is going to be applicable to every service. For example, ProtectHome wouldn't work for any of the systemd user services and ProtectSystem wouldn't work for system services that need to access configuration in /etc | |||
== Feedback == | == Feedback == |
Revision as of 23:57, 14 November 2023
Enable systemd service hardening for default services
Summary
Improve security of default services by enabling some of the high impact systemd service hardening knobs for all default services.
Owner
-->
- Name: Rahul Sundaram
- Email: metherid@gmail.com
Current status
- Targeted release: <VERSION>/ Fedora Linux <VERSION>
- Last updated: 2023-11-14
- [<will be assigned by the Wrangler> devel thread]
- FESCo issue: <will be assigned by the Wrangler>
- Tracker bug: <will be assigned by the Wrangler>
- Release notes tracker: <will be assigned by the Wrangler>
Detailed Description
The specific toggles under consideration include the following
- PrivateTmp=true
- ProtectSystem=true
- ProtectHome=true
- PrivateDevices=true
- ProtectKernelTunables=true
- ProtectControlGroups=true
- NoNewPrivileges=true
We will enable as many of these as feasible for the service but not every toggle is going to be applicable to every service. For example, ProtectHome wouldn't work for any of the systemd user services and ProtectSystem wouldn't work for system services that need to access configuration in /etc
Feedback
Benefit to Fedora
Scope
- Proposal owners:
- Other developers:
- Release engineering: #Releng issue number
- Policies and guidelines: N/A (not needed for this Change)
- Trademark approval: N/A (not needed for this Change)
- Alignment with Community Initiatives:
Upgrade/compatibility impact
How To Test
User Experience
Dependencies
Contingency Plan
- Contingency mechanism: (What to do? Who will do it?) N/A (not a System Wide Change)
- Contingency deadline: N/A (not a System Wide Change)
- Blocks release? N/A (not a System Wide Change), Yes/No
Documentation
N/A (not a System Wide Change)