-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security ideas for hardening the OS #6
Comments
Locked the root account, created sudoer rules and added a large |
How you are solving the auth file? If I am not mistaken, BOINC generates random one on first startup. If you just include pre-generated file to image, then it will be same for all installations. |
@tomasbrod BOINC does generate a random auth file, however it is only done when I make the image and doesn't deviate between images that people download. This will be solved with an installer but as we have a raw, prepackaged image, it is difficult. The reason we need to do this is because an attacker can know the RPC password by simply downloading the BOINCOS image. Off the top of my head I'm thinking of adding a systemd unit or something similar that will only run once and jumble up the auth file to something different when the OS is first booted. My current method and what I plan to do with what I just described is to simply feed a sha512 hash function with a bunch of random bits and place that in the user home and BOINC data directory. |
FWIW I would not encourage the firewall, unless it is easily disabled. I already have a network firewall and really don't want to have to debug problems related to both of them causing problems. |
Here's another thought: I have a custom gui_rpc_auth.cfg that I put on my clients already for remote access. Is there a way you can provide a directory accessible on the thumb drive for me to input such files as gui_rpc_auth.cfg, Acct_mgr_login.xml, etc? |
@tcblack Firewall is easily disabled through As for the USB query, I have removed the ability to mount file systems as to completely isolate the BOINC OS system from any memory on the permanent system. I believe the implemented permissions on the BOINC data directory are sufficient enough for importing those files. I typically use some sort of networking transfer using If you know of any way to allow mounting of only USB devices, your knowledge will be very much appreciated! |
RPC password randomisation functionality is now in the code here |
Current ideas that will be implemented with upcoming updates are:
Locking the root accountCreating strict sudo permissions that only allow for certain actions to be elevated without a passwordPossibly a firewall or boinc.service argument to prevent RPCs to the clientRandomisation on a per-OS basis:
gui_rpc_auth.cfg
randomisationSSH keys (if key-based auth enabled)
Possible solution is to add a script that runs and disables itself after running at bootForced password reset (consideration)
Any ideas posted here will be amended to this post and implemented in a future update.
The text was updated successfully, but these errors were encountered: