Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add fapolicyd-hardening module preventing usage of sigstop, sigkill and ptrace #15

Merged
merged 2 commits into from
Jan 15, 2024

Commits on Dec 12, 2023

  1. add fapolicyd-hardening module preventing usage of sigstop, sigkill a…

    …nd ptrace
    
    Receiving any of these signals or starting to ptrace the process leads
    to a system hang.
    This hardening module prevents such thing to happen.
    
    Without the module (example for ptrace):
    ~~~
    $ sesearch -A -t fapolicyd_t -c process -p ptrace
    allow abrt_dump_oops_t domain:process ptrace; [ deny_ptrace ]:False
    allow sysadm_t domain:process ptrace; [ deny_ptrace ]:False
    allow unconfined_domain_type domain:process ptrace; [ deny_ptrace ]:False
    ~~~
    
    With the module:
    ~~~
    $ sesearch -A -t fapolicyd_t -c process -p ptrace
    --> no rule
    
    $ strace -fttTvyy -p $(pgrep fapolicyd)
    strace: attach: ptrace(PTRACE_SEIZE, 3930): Permission denied
    ~~~
    
    Note: requires policycoreutils >= -3.6-0.rc2.1 ("deny" functionality)
    
    Signed-off-by: Renaud Métrich <[email protected]>
    rmetrich committed Dec 12, 2023
    Configuration menu
    Copy the full SHA
    1d165c0 View commit details
    Browse the repository at this point in the history

Commits on Dec 14, 2023

  1. make fapolicyd-hardening module optional

    Signed-off-by: Renaud Métrich <[email protected]>
    rmetrich committed Dec 14, 2023
    Configuration menu
    Copy the full SHA
    d3a432f View commit details
    Browse the repository at this point in the history