Skip to content

systemd hardening/privilege separation #503

Open
@LaserEyess

Description

For systems that use systemd, there are various thing inadyn could do to make it safer to use by default. What I mean by "safer" is, specifically, restricting privileges of inadyn to the bare minimum of what it needs to function. The point is to facilitate defense-in-depth of internet facing services.

There are a few things I'm thinking of in particular:

  1. "Plain" hardening, such as things like ProtectHome=, or RestrictNamespace=
  2. Using tmpfiles/sysusers to automatically create an unprivileged user with the right permissions
  3. Support for credentials to store passwords encrypted on the disk, and allow configs to access them in the service

I think (1) is pretty straight forward and uncontroversial, but I'm curious about your thoughts on (2) or maybe even (3). I'm willing to make PRs for these features. See also the Arch Linux package build that implements (2).

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions