mirror of
https://gitlab.archlinux.org/archlinux/infrastructure.git
synced 2025-01-18 08:06:16 +01:00
- unprivileged bpf: we do not need this on our infra, we can assume bpf() calls will happen with CAP_SYS_ADMIN if required. - unprivileged userns: we do not need this on our infra for none of our services or similar. Reduce attack surface by a huge margin including most recent CVE-2020-14386. - kptr restrict: we already check for CAP_SYSLOG and real ids but we really do not require any specific kernel pointers to be logged. Settings this to 2 instead to blank out all kernel pointers to protect against info leak. - kexec: disable kexec as we do never want to kexec our running servers into something else. Settings this sysctl disables kexec even if its compiled into the kernel. - bpf jit harden: harden BPF JIT compiler to mitigate JIT spraying for the sacrifices off a bit performance for all users including privileged.
43 lines
1.6 KiB
YAML
43 lines
1.6 KiB
YAML
---
|
|
|
|
- name: set restricted access to kernel logs
|
|
copy: src=50-dmesg-restrict.conf dest=/etc/sysctl.d/50-dmesg-restrict.conf owner=root group=root mode=0644
|
|
notify:
|
|
- apply sysctl settings
|
|
|
|
- name: set ptrace scope, restrict ptrace to CAP_SYS_PTRACE
|
|
copy: src=50-ptrace-restrict.conf dest=/etc/sysctl.d/50-ptrace-restrict.conf owner=root group=root mode=0644
|
|
notify:
|
|
- apply sysctl settings
|
|
|
|
- name: set restricted access to kernel pointers in proc fs
|
|
copy: src=50-kptr-restrict.conf dest=/etc/sysctl.d/50-kptr-restrict.conf owner=root group=root mode=0644
|
|
notify:
|
|
- apply sysctl settings
|
|
|
|
- name: enable JIT hardening for all users
|
|
copy: src=50-bpf_jit_harden.conf dest=/etc/sysctl.d/50-bpf_jit_harden.conf owner=root group=root mode=0644
|
|
notify:
|
|
- apply sysctl settings
|
|
|
|
- name: disable unprivileged bpf
|
|
copy: src=50-unprivileged_bpf_disabled.conf dest=/etc/sysctl.d/50-unprivileged_bpf_disabled.conf owner=root group=root mode=0644
|
|
notify:
|
|
- apply sysctl settings
|
|
|
|
- name: disable unprivileged userns
|
|
copy: src=50-unprivileged_userns_clone.conf dest=/etc/sysctl.d/50-unprivileged_userns_clone.conf owner=root group=root mode=0644
|
|
notify:
|
|
- apply sysctl settings
|
|
|
|
- name: disable kexec load
|
|
copy: src=50-kexec_load_disabled.conf dest=/etc/sysctl.d/50-kexec_load_disabled.conf owner=root group=root mode=0644
|
|
notify:
|
|
- apply sysctl settings
|
|
|
|
- name: set kernel lockdown to restricted
|
|
copy: src=50-lockdown.conf dest=/etc/tmpfiles.d/50-kernel-lockdown.conf owner=root group=root mode=0644
|
|
when: "'hcloud' in group_names"
|
|
notify:
|
|
- apply sysctl settings
|