Russ Allbery <r...@debian.org> writes:

> "Trent W. Buck" <trentb...@gmail.com> writes:
>
>> As someone who does that kind of thing a lot, I'd rather have
>> the increased annoyance of opt-out hardening than
>> the reduced security of opt-in hardening.
>> Even if it means I occasionally need to patch site-local rules into
>> /etc/apparmor.d/local/usr.bin.msmtp or
>> /etc/systemd/system/libvirtd.service.d/override.conf.
>
> I also feel this way but there are a bunch of people who really, really
> don't, and also it's not entirely obvious when hardening is failing or
> what overrides you need to add.  So making this the default is hard,
> because it fundamentally breaks the "it has to work out of the box"
> property that people expect.  Making it be semi-normal for daemons to not
> work out of the box depending on what configuration options or other
> packages you have installed is a hard sell.

I agree; that is reasonable.

> That makes me want some way to opt in to "hardening that might break
> something," but I'm not sure the best way to do that.

I think for me the important point is whether "might break something"
means a chance of in 1 in one hundred, or 1 in one crore.

e.g. I expect "SystemCallArchitectures=native" to break for a lot of
people (anyone doing dpkg --add-architecture)

e.g. I expect "ProtectClock=yes" to break for very few people, because
it's really unlikely that any libnss-foo.so or libpam-foo.so is
going to try to change the hardware clock.

(Although ProtectClock= requires NoNewPrivileges which is a whole
separate kettle of fish, as discussed elsewhere in this thread.)

Reply via email to