- 02 May, 2021 1 commit
-
-
Loic authored
Added a sysctl control to prevent the system from crashing. See the bug #1 Signed-off-by:
Loic <loic.f@hardenedbsd.org>
-
- 30 Apr, 2021 2 commits
-
-
Shawn Webb authored
Typo fix for secadm.8 See merge request !1
-
Loic authored
-
- 09 Apr, 2021 1 commit
-
-
Shawn Webb authored
Under the right conditions, secadm may cause a kernel panic due to an SMAP violation: 1. kldload secadm 2. secadm add integriforce 3. secadm show 4. secadm flush 5. secadm add integriforce 6. secadm show <- panic here Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Reported-by: Airbus CyberSecurity SAS Submitted-by: Airbus CyberSecurity SAS
-
- 21 Nov, 2020 2 commits
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
Check the proper variable when adding an Integriforce rule. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Submitted-by: Airbus CyberSecurity Engineering Team
-
- 04 Jan, 2020 1 commit
-
-
Shawn Webb authored
Upstream FreeBSD commit f121d45000fd1c42611ca1e54872bd4545398933 dropped the last argument from VOP_UNLOCK. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 03 Dec, 2018 1 commit
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Sponsored-by: SoldierX
-
- 02 Oct, 2017 2 commits
-
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
- 14 Sep, 2017 2 commits
-
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
Oliver Pinter authored
This change introduces the prefer_acl keyword, to control the order of rule evaluation. When the prefer_acl property was set on a specific rule, then it overrides the settings came from FS-EA based hbsdcontrol. FYI: by default the hbsdcontrol's settings overrides the secadm rules, since hbsdcontrol's evaluation is after the MAC framework's check. Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
- 05 Sep, 2017 1 commit
-
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
- 30 Aug, 2017 1 commit
-
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
- 20 Jul, 2017 1 commit
-
-
Shawn Webb authored
With /bin/sh, if you give it "./" as a command, it will try to execute that. This use case was not tested and could cause a kernel panic. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Sponsored-by: SoldierX
-
- 09 Jul, 2017 1 commit
-
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
- 01 Dec, 2016 1 commit
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 14 Nov, 2016 1 commit
-
-
Shawn Webb authored
KLD-related system calls have been hardened to disallow jailed users from seeing any KLD information. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> github-issue: #34
-
- 04 Nov, 2016 1 commit
-
-
Shawn Webb authored
It's already locked. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 21 Sep, 2016 4 commits
-
-
Shawn Webb authored
Update the manpages for Trusted Path Execution (TPE). Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
ABI changed. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
New secadm rule section: tpe. Members of tpe: - enable (boolean): Enable TPE - all (boolean): Enable TPE for all suers - invert (boolean): Invert GID logic - gid (int): The Group ID (GID) for which TPE applies Fully-qualified example: secadm { tpe { enable: true, gid: 10, invert: true, } } Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
This introduces a new command to secadm: tpe. To enable TPE, use `secadm tpe -T`. To disable TPE, use `secadm tpe -t`. To set the GID, use `secadm tpe -g <gid>`. To enforce TPE for everyone, use `secadm tpe -A`. To invert the GID, use `secadm tpe -g`. The GID by default is 0. TODO: 1) Documentation 2) Support tpe in secadm.rules(5) Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 23 Aug, 2016 1 commit
-
-
Shawn Webb authored
-
- 11 Jun, 2016 1 commit
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 09 Jun, 2016 2 commits
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Submitted-by:
Piotr Kubaj <pkubaj@anongoth.pl>
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Submitted-by:
Piotr Kubaj <pkubaj@anongoth.pl>
-
- 11 Apr, 2016 2 commits
-
-
Shawn Webb authored
-
Johannes Meixner authored
-
- 04 Apr, 2016 1 commit
-
-
Johannes Meixner authored
- add WITHOUT_KMOD variable for ports/hardenedbsd/secadm - add WITHOUT_CLI variable for ports/hardenedbsd/secadm-kmod
-
- 26 Mar, 2016 2 commits
-
-
Olivér Pintér authored
HBSD: Correct example path
-
Johannes Meixner authored
* leave `all` target unchanged * check if CLI is defined for ports/hardenedbsd/secadm * check if KMOD is defined for ports/hardenedbsd/secadm-kmod
-
- 07 Mar, 2016 5 commits
-
-
Shawn Webb authored
While here, remove code that shouldn't have been. Only rules that are protected by Integriforce should prevent modification. Files with PaX rules can still be modified. Only allow deletion of Integriforce-protected files or files with PaX rules if the rule pertaining to that file is disabled. Under no circumstance, allow deletion of files under Integriforce in whitelist mode. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> github-issue: #10
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> github-issue: #28
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> github-issue: #28
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> github-issue: #28
-
- 05 Mar, 2016 3 commits
-
-
Shawn Webb authored
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> github-issue: #28
-
Shawn Webb authored
Specify which flags are availabe for pax rules. Add more information regarding Integriforce and whitelist mode. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> github-issue: #28
-