- 18 May, 2022 2 commits
-
-
Shawn Webb authored
Apparently FreeBSD's API change to NDINIT wasn't MFC'd to 13-STABLE. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
Remove old cruft. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 03 Sep, 2021 1 commit
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Reported-by: Airbus CyberSecurity SAS issue: #2
-
- 27 Jun, 2021 4 commits
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
* Document strict application allow list (whitelist) mode * Document Trusted Path Execution (TPE) Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 05 Jun, 2021 1 commit
-
-
Shawn Webb authored
The macro NAMEI_DBG_INITED doesn't exist on 12-STABLE. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 05 May, 2021 1 commit
-
-
Shawn Webb authored
This is a modified version of the rename protection patches from Airbus. While importing and testing their patches, I discovered there were a few more places that needed the same fix applied for issue #1 . Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Submitted-by: Airbus CyberSecurity SAS
-
- 04 May, 2021 1 commit
-
-
Shawn Webb authored
We need to force setting NAMEI_DBG_INITED because, being out-of-tree, we're not not able to check whether INVARIANTS is enabled. When INVARIANTS is enabled, the namei function performs a KASSERT on the debug flags being set. Ideally, this would be set by calling the NDBINIT_DBG macro, but that's gated by INVARIANTS. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Reported-by: @loic issue: #1
-
- 30 Apr, 2021 2 commits
-
-
Shawn Webb authored
Typo fix for secadm.8 See merge request hardenedbsd/secadm!1
-
Loic authored
-
- 09 Apr, 2021 1 commit
-
-
Shawn Webb authored
Under the right conditions, secadm may cause a kernel panic due to an SMAP violation: 1. kldload secadm 2. secadm add integriforce 3. secadm show 4. secadm flush 5. secadm add integriforce 6. secadm show <- panic here Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Reported-by: Airbus CyberSecurity SAS Submitted-by: Airbus CyberSecurity SAS
-
- 21 Nov, 2020 2 commits
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
Check the proper variable when adding an Integriforce rule. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Submitted-by: Airbus CyberSecurity Engineering Team
-
- 04 Jan, 2020 1 commit
-
-
Shawn Webb authored
Upstream FreeBSD commit f121d45000fd1c42611ca1e54872bd4545398933 dropped the last argument from VOP_UNLOCK. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 03 Dec, 2018 1 commit
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Sponsored-by: SoldierX
-
- 02 Oct, 2017 2 commits
-
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
- 14 Sep, 2017 2 commits
-
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
Oliver Pinter authored
This change introduces the prefer_acl keyword, to control the order of rule evaluation. When the prefer_acl property was set on a specific rule, then it overrides the settings came from FS-EA based hbsdcontrol. FYI: by default the hbsdcontrol's settings overrides the secadm rules, since hbsdcontrol's evaluation is after the MAC framework's check. Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
- 05 Sep, 2017 1 commit
-
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
- 30 Aug, 2017 1 commit
-
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
- 20 Jul, 2017 1 commit
-
-
Shawn Webb authored
With /bin/sh, if you give it "./" as a command, it will try to execute that. This use case was not tested and could cause a kernel panic. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Sponsored-by: SoldierX
-
- 09 Jul, 2017 1 commit
-
-
Oliver Pinter authored
Signed-off-by:
Oliver Pinter <oliver.pinter@hardenedbsd.org>
-
- 01 Dec, 2016 1 commit
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 14 Nov, 2016 1 commit
-
-
Shawn Webb authored
KLD-related system calls have been hardened to disallow jailed users from seeing any KLD information. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> github-issue: #34
-
- 04 Nov, 2016 1 commit
-
-
Shawn Webb authored
It's already locked. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 21 Sep, 2016 4 commits
-
-
Shawn Webb authored
Update the manpages for Trusted Path Execution (TPE). Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
ABI changed. Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
New secadm rule section: tpe. Members of tpe: - enable (boolean): Enable TPE - all (boolean): Enable TPE for all suers - invert (boolean): Invert GID logic - gid (int): The Group ID (GID) for which TPE applies Fully-qualified example: secadm { tpe { enable: true, gid: 10, invert: true, } } Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
Shawn Webb authored
This introduces a new command to secadm: tpe. To enable TPE, use `secadm tpe -T`. To disable TPE, use `secadm tpe -t`. To set the GID, use `secadm tpe -g <gid>`. To enforce TPE for everyone, use `secadm tpe -A`. To invert the GID, use `secadm tpe -g`. The GID by default is 0. TODO: 1) Documentation 2) Support tpe in secadm.rules(5) Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 23 Aug, 2016 1 commit
-
-
Shawn Webb authored
-
- 11 Jun, 2016 1 commit
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org>
-
- 09 Jun, 2016 2 commits
-
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Submitted-by:
Piotr Kubaj <pkubaj@anongoth.pl>
-
Shawn Webb authored
Signed-off-by:
Shawn Webb <shawn.webb@hardenedbsd.org> Submitted-by:
Piotr Kubaj <pkubaj@anongoth.pl>
-
- 11 Apr, 2016 2 commits
-
-
Shawn Webb authored
-
Johannes Meixner authored
-
- 04 Apr, 2016 1 commit
-
-
Johannes Meixner authored
- add WITHOUT_KMOD variable for ports/hardenedbsd/secadm - add WITHOUT_CLI variable for ports/hardenedbsd/secadm-kmod
-
- 26 Mar, 2016 1 commit
-
-
Olivér Pintér authored
HBSD: Correct example path
-