mirror of
https://github.com/ArcticFoxes-net/Synapse-Ubuntu-ZFS
synced 2024-12-21 23:31:34 -05:00
Certbot hardening
This commit is contained in:
parent
15c9757027
commit
d1aee7b41c
@ -5,6 +5,7 @@ This configuration does not include some hardening configurations, as those are
|
|||||||
|
|
||||||
**Notes**:
|
**Notes**:
|
||||||
- snap ufw blocks Docker by default. ArcticFoxes's Matrix server uses .deb ufw instead.
|
- snap ufw blocks Docker by default. ArcticFoxes's Matrix server uses .deb ufw instead.
|
||||||
|
- Use the .deb certbot package so that you can apply systemd hardening.
|
||||||
- A lot of these configuration files use ArcticFoxes's domain. If you are adopting this to your own system, make sure that you replace them.
|
- A lot of these configuration files use ArcticFoxes's domain. If you are adopting this to your own system, make sure that you replace them.
|
||||||
- The Certbot-OCSP-Fetcher script can be found [here](https://github.com/GrapheneOS/infrastructure/blob/main/certbot-ocsp-fetcher)
|
- The Certbot-OCSP-Fetcher script can be found [here](https://github.com/GrapheneOS/infrastructure/blob/main/certbot-ocsp-fetcher)
|
||||||
- You need to create a `postgres-socket` and add the `postgres` and `matrix-synapse` user to it.
|
- You need to create a `postgres-socket` and add the `postgres` and `matrix-synapse` user to it.
|
||||||
|
26
etc/systemd/system/certbot.service.d/override.conf
Normal file
26
etc/systemd/system/certbot.service.d/override.conf
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
[Service]
|
||||||
|
CapabilityBoundingSet=
|
||||||
|
CPUSchedulingPolicy=batch
|
||||||
|
LockPersonality=true
|
||||||
|
MemoryDenyWriteExecute=true
|
||||||
|
PrivateDevices=true
|
||||||
|
PrivateIPC=true
|
||||||
|
PrivateUsers=true
|
||||||
|
ProcSubset=pid
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
ProtectHome=read-only
|
||||||
|
ProtectHostname=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectProc=invisible
|
||||||
|
ProtectSystem=strict
|
||||||
|
ReadWritePaths=/etc/letsencrypt /var/lib/letsencrypt /var/log/letsencrypt /var/cache/certbot-ocsp-fetcher
|
||||||
|
RestrictAddressFamilies=AF_INET AF_INET6
|
||||||
|
RestrictNamespaces=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
RestrictSUIDSGID=true
|
||||||
|
SystemCallArchitectures=native
|
||||||
|
SystemCallFilter=@system-service
|
||||||
|
SystemCallFilter=~@resources @obsolete
|
Loading…
Reference in New Issue
Block a user