WalterH
That doesn't really matter if we are not thinking about hardening systemd services.
As shown above in the logs /usr/libexec/gromox-imap
restarts itself when not startet as user gromox.
crpb Reexecing /usr/libexec/gromox/imap
gromox-imap 2.30.0.f0a485f (pid 14431 uid 479)
That uid part ๐
I will not remove it from my script because i don't care about ports < 1024.
And if we are talking hardening/security we need to begin writing stuff like this....
(I have only played around with the admin-api and grommunio-index restrictions for now.. but just as an example...)
grom-test-2:/etc/systemd/system # systemctl cat grommunio-admin-api.service
# /usr/lib/systemd/system/grommunio-admin-api.service
[Unit]
Description=grommunio admin api
After=grommunio-admin-api.socket
Requires=grommunio-admin-api.socket
[Service]
WorkingDirectory=/usr/share/grommunio-admin-api/
ExecStart=/usr/sbin/uwsgi --ini /usr/share/grommunio-admin-api/api-config.ini
User=grommunio
Group=nginx
SupplementaryGroups=grommunio
Restart=on-failure
KillSignal=SIGINT
Type=notify
NotifyAccess=all
[Install]
WantedBy=multi-user.target
# /etc/systemd/system/grommunio-admin-api.service.d/override.conf
# HINTS https://github.com/cyberitsolutions/prisonpc-systemd-lockdown by trent
[Unit]
Requires=mysql.service
After=mysql.service
[Service]
#Group=gromoxcf
#SupplementaryGroups=nginx
CapabilityBoundingSet=
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
ProtectClock=yes
ProtectKernelLogs=yes
DevicePolicy=closed
NoNewPrivileges=yes
PrivateDevices=yes
PrivateMounts=yes
PrivateTmp=yes
PrivateUsers=yes
ProtectControlGroups=yes
ProtectHome=yes
ProtectKernelModules=yes
ProtectKernelTunables=yes
ProtectSystem=strict
SystemCallArchitectures=native
RestrictRealtime=yes
MemoryDenyWriteExecute=yes
#UMask=0077
ReadWritePaths=/run /var/log /etc/gromox /var/lib/gromox
ReadOnlyPaths=/
grom-test-2:/etc/systemd/system # systemd-analyze security grommunio-admin-api.service
NAME DESCRIPTION EXPOSURE
โ PrivateNetwork= Service has access to the host's network 0.5
โ User=/DynamicUser= Service runs under a static non-root user identity
โ CapabilityBoundingSet=~CAP_SET(UID|GID|PCAP) Service cannot change UID/GID identities/capabilities
โ CapabilityBoundingSet=~CAP_SYS_ADMIN Service has no administrator privileges
โ CapabilityBoundingSet=~CAP_SYS_PTRACE Service has no ptrace() debugging abilities
โ RestrictAddressFamilies=~AF_(INET|INET6) Service may allocate Internet sockets 0.3
โ RestrictNamespaces=~CLONE_NEWUSER Service may create user namespaces 0.3
โ RestrictAddressFamilies=~โฆ Service cannot allocate exotic sockets
โ CapabilityBoundingSet=~CAP_(CHOWN|FSETID|SETFCAP) Service cannot change file ownership/access mode/capabilities
โ CapabilityBoundingSet=~CAP_(DAC_*|FOWNER|IPC_OWNER) Service cannot override UNIX file/IPC permission checks
โ CapabilityBoundingSet=~CAP_NET_ADMIN Service has no network configuration privileges
โ CapabilityBoundingSet=~CAP_SYS_MODULE Service cannot load kernel modules
โ CapabilityBoundingSet=~CAP_SYS_RAWIO Service has no raw I/O access
โ CapabilityBoundingSet=~CAP_SYS_TIME Service processes cannot change the system clock
โ DeviceAllow= Service has a device ACL with some special devices 0.1
โ IPAddressDeny= Service does not define an IP address allow list 0.2
โ KeyringMode= Service doesn't share key material with other services
โ NoNewPrivileges= Service processes cannot acquire new privileges
โ NotifyAccess= Service child processes may alter service state 0.2
โ PrivateDevices= Service has no access to hardware devices
โ PrivateMounts= Service cannot install system mounts
โ PrivateTmp= Service has no access to other software's temporary files
โ PrivateUsers= Service does not have access to other users
โ ProtectClock= Service cannot write to the hardware clock or system clock
โ ProtectControlGroups= Service cannot modify the control group file system
โ ProtectHome= Service has no access to home directories
โ ProtectKernelLogs= Service cannot read from or write to the kernel log ring buffer
โ ProtectKernelModules= Service cannot load or read kernel modules
โ ProtectKernelTunables= Service cannot alter kernel tunables (/proc/sys, โฆ)
โ ProtectProc= Service has full access to process tree (/proc hidepid=) 0.2
โ ProtectSystem= Service has strict read-only access to the OS file hierarchy
โ RestrictAddressFamilies=~AF_PACKET Service cannot allocate packet sockets
โ RestrictSUIDSGID= Service may create SUID/SGID files 0.2
โ SystemCallArchitectures= Service may execute system calls only with native ABI
โ SystemCallFilter=~@clock Service does not filter system calls 0.2
โ SystemCallFilter=~@debug Service does not filter system calls 0.2
โ SystemCallFilter=~@module Service does not filter system calls 0.2
โ SystemCallFilter=~@mount Service does not filter system calls 0.2
โ SystemCallFilter=~@raw-io Service does not filter system calls 0.2
โ SystemCallFilter=~@reboot Service does not filter system calls 0.2
โ SystemCallFilter=~@swap Service does not filter system calls 0.2
โ SystemCallFilter=~@privileged Service does not filter system calls 0.2
โ SystemCallFilter=~@resources Service does not filter system calls 0.2
โ AmbientCapabilities= Service process does not receive ambient capabilities
โ CapabilityBoundingSet=~CAP_AUDIT_* Service has no audit subsystem access
โ CapabilityBoundingSet=~CAP_KILL Service cannot send UNIX signals to arbitrary processes
โ CapabilityBoundingSet=~CAP_MKNOD Service cannot create device nodes
โ CapabilityBoundingSet=~CAP_NET_(BIND_SERVICE|BROADCAST|RAW) Service has no elevated networking privileges
โ CapabilityBoundingSet=~CAP_SYSLOG Service has no access to kernel logging
โ CapabilityBoundingSet=~CAP_SYS_(NICE|RESOURCE) Service has no privileges to change resource use parameters
โ RestrictNamespaces=~CLONE_NEWCGROUP Service may create cgroup namespaces 0.1
โ RestrictNamespaces=~CLONE_NEWIPC Service may create IPC namespaces 0.1
โ RestrictNamespaces=~CLONE_NEWNET Service may create network namespaces 0.1
โ RestrictNamespaces=~CLONE_NEWNS Service may create file system namespaces 0.1
โ RestrictNamespaces=~CLONE_NEWPID Service may create process namespaces 0.1
โ RestrictRealtime= Service realtime scheduling access is restricted
โ SystemCallFilter=~@cpu-emulation Service does not filter system calls 0.1
โ SystemCallFilter=~@obsolete Service does not filter system calls 0.1
โ RestrictAddressFamilies=~AF_NETLINK Service cannot allocate netlink sockets
โ RootDirectory=/RootImage= Service runs within the host's root directory 0.1
โ SupplementaryGroups= Service runs with supplementary groups 0.1
โ CapabilityBoundingSet=~CAP_MAC_* Service cannot adjust SMACK MAC
โ CapabilityBoundingSet=~CAP_SYS_BOOT Service cannot issue reboot()
โ Delegate= Service does not maintain its own delegated control group subtree
โ LockPersonality= Service may change ABI personality 0.1
โ MemoryDenyWriteExecute= Service cannot create writable executable memory mappings
โ RemoveIPC= Service user may leave SysV IPC objects around 0.1
โ RestrictNamespaces=~CLONE_NEWUTS Service may create hostname namespaces 0.1
โ UMask= Files created by service are world-readable by default 0.1
โ CapabilityBoundingSet=~CAP_LINUX_IMMUTABLE Service cannot mark files immutable
โ CapabilityBoundingSet=~CAP_IPC_LOCK Service cannot lock memory into RAM
โ CapabilityBoundingSet=~CAP_SYS_CHROOT Service cannot issue chroot()
โ ProtectHostname= Service may change system host/domainname 0.1
โ CapabilityBoundingSet=~CAP_BLOCK_SUSPEND Service cannot establish wake locks
โ CapabilityBoundingSet=~CAP_LEASE Service cannot create file leases
โ CapabilityBoundingSet=~CAP_SYS_PACCT Service cannot use acct()
โ CapabilityBoundingSet=~CAP_SYS_TTY_CONFIG Service cannot issue vhangup()
โ CapabilityBoundingSet=~CAP_WAKE_ALARM Service cannot program timers that wake up the system
โ RestrictAddressFamilies=~AF_UNIX Service may allocate local sockets 0.1
โ ProcSubset= Service has full access to non-process /proc files (/proc subset=) 0.1
โ Overall exposure level for grommunio-admin-api.service: 4.0 OK ๐
I usually use those shenanigangs with something like a uwsgi python app because web-developers are either behind with the security updates or using bleeding edge crap which nobody wants to run with too many permissions..