On Sun, Oct 14, 2007 at 03:27:20PM -0500, Aaron wrote: > I hope i'm not out of line changing the thread but this seemed like a good > place to ask this question.
Not at all, and changing the thread title when changing the thread subjet is a welcome relief from the usual misc@ practice. > I'm fairly new to OpenBSD and have set up a few machines, nothing > production (...). One thing I did read up on (...) was hardening > beyond the default install. Two of the tools that most of the > hardening articles i found, Securelevels and systrace, (the third one > seems to be common sense), have now seemingly been rendered useless. > (...) > I'm wondering if there are other tools/ways besides these that I just > haven't heard of to do similar things (hardening of the system) or if there > is in effect no way to do the things that, these two tools, specifically > systrace has historically handled(is there really a need in the first > place?). I say specifically systrace because from the discussions i've > been reading, the whole securelevel methodology, to the people that do the > work on OpenBSD, is flawed. I'm not here to dispute or even to discuss > that point, as currently I can't program (nor afford to hire people that > can) so my likes and dislikes are moot. I'm not aware of any current `replacement' for systrace in OpenBSD. This is both a blessing and a curse; systrace gets its tentacles deep into security-sensitive code, and I remember at least one instance where that caused a bug (though not what bug). On the other hand, systrace allows one to express a security policy that's more fine-grained than the default UNIX permissions allow. > Like i say, i'm still relatively new to OpenBSD so I'm just looking for > insight, I haven't used systrace in the past, and until about a week ago > was working with securelevels but then found the aforementioned article. I > had abandoned the securelevel method in light of the 'issue'(s)/false sense > of security with securelevels and from the discussion had decided to pick > up with systrace, until i saw this thread yesterday. > Is it more common than not, to not worry as much about "hardening" the > OS, via these methods, but rather just to make 'hopefully' wise decisions, > install the least amount of software as you need, physical separations(i.e. > logging to remote server instead of sappnd'ing your logs)(but what happens > when after getting root on the system producing logs, the attacker proceeds > to work towards your logging server?) and stay current w/at least the > stable branch? > I guess with all the hoopla about 'hardening'/trusted this and > that/fuzzy knobs(i.e. SE Linux) i got a little overzealous looking for ways > to tweak things (which i know can end up either making things less secure > (especially with false sense of security) or just plain breaking them), but > if there is/are acceptable, ways, I'd at least like to be aware of them and > the scope of their use from the people that know OpenBSD best. It's not entirely impossible to improve on OpenBSD's default security, although the default security is pretty good. The most obvious improvement is disabling SSH logins using passwords, as has already been mentioned. It might also be a good idea to periodically audit /etc/master.passwd for weak passwords. John the Ripper <http://www.openwall.com/john/> might be useful here. There is also something to be said for dropping all IPv6 traffic; the IPv6 stack is not as thoroughly tested as the IPv4 stack, despite a lot of work by the smart people of the KAME project. In the same vein, a restrictive pf configuration might help prevent or at least mitigate the effects of exploitation. You could also take a good look at /etc/login.conf; it does a pretty good job of limiting resource usage, but it's a bit more lenient than it could be, especially for the 'daemon' group (daemons very rarely really need the ability to allocate an unbounded amount of memory). It should be noted that the 'daemon' group appears to be used only by ports, though. However, this merely prevents an attacker that has already gained access from DoS'ing the rest of the applications on the machine. If you have local users, you might also want to vet suid applications. You could also move the 'root' entry in /etc/master.passwd away from the first line; if there is a programming error whereby a suid app that can be told to parse an arbitrary file, the password hash for root cannot be discovered (see <http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=157> for an example of this problem; while this is not the only example I know of, this problem is not particularly common). This also isn't much of a problem if root has a password that is too complex to bruteforce, which should be the case. It could also be argued that, should you require an MTA that is accessible from the outside world, replacing sendmail with your favourite alternative may increase security. Finally, X11's direct hardware access is scary. However, OpenBSD already goes to great lengths to mitigate the impact (see xf86(4) and some of the papers in the www.openbsd.org/papers section). Beyond this point, it's a matter of not creating vulnerabilities while installing ports. The most important part here is to choose the most secure ports you can find, or at least the most secure ports that provide acceptable functionality. This might mean choosing Konqueror, Dillo or even w3m over Firefox. This might mean choosing PostgreSQL over MySQL. This might mean choosing mutt over Thunderbird. This definitely means running all daemons under their own user and in a chroot jail. This also means disabling modelines when using vim. There is also some possibility to improve intrusion detection; /etc/security is useful, but can be extended (and files can be added to the list to check for - see /etc/mtree). An automatic log watcher might also be useful. IDS and IPS systems tend to be rather useless in a OpenBSD environment, as they are likely to be more vulnerable than the systems they protect. Further improvements to security tend to be rather paranoid; logging critical data to a printer, for instance, is a good way of preventing an attacker from wiping the logs (but you need some way to handle him or her filling the logs faster than the printer can print). Incrementally burning a CD has much the same result, in that data that has already been written cannot be wiped without it being obvious. (Although I wouldn't bet you that the printer cannot be made to mangle the paper, or that the CD drive cannot be made to destroy the CD.) However, all of the above is not necessarily of real value; OpenBSD is very secure in the default install, and if one chooses the ports to install with care, it remains very secure. Joachim -- TFMotD: nsphyter (4) - National Semiconductor DP83815/DP83843/DP83847 10/100 Ethernet PHY