mirror of
https://github.com/ArcticFoxes-net/Synapse-Ubuntu-ZFS
synced 2024-12-21 23:31:34 -05:00
Certbot hardening
This commit is contained in:
parent
15c9757027
commit
d1aee7b41c
@ -5,6 +5,7 @@ This configuration does not include some hardening configurations, as those are
|
||||
|
||||
**Notes**:
|
||||
- snap ufw blocks Docker by default. ArcticFoxes's Matrix server uses .deb ufw instead.
|
||||
- Use the .deb certbot package so that you can apply systemd hardening.
|
||||
- A lot of these configuration files use ArcticFoxes's domain. If you are adopting this to your own system, make sure that you replace them.
|
||||
- The Certbot-OCSP-Fetcher script can be found [here](https://github.com/GrapheneOS/infrastructure/blob/main/certbot-ocsp-fetcher)
|
||||
- You need to create a `postgres-socket` and add the `postgres` and `matrix-synapse` user to it.
|
||||
|
26
etc/systemd/system/certbot.service.d/override.conf
Normal file
26
etc/systemd/system/certbot.service.d/override.conf
Normal file
@ -0,0 +1,26 @@
|
||||
[Service]
|
||||
CapabilityBoundingSet=
|
||||
CPUSchedulingPolicy=batch
|
||||
LockPersonality=true
|
||||
MemoryDenyWriteExecute=true
|
||||
PrivateDevices=true
|
||||
PrivateIPC=true
|
||||
PrivateUsers=true
|
||||
ProcSubset=pid
|
||||
ProtectClock=true
|
||||
ProtectControlGroups=true
|
||||
ProtectHome=read-only
|
||||
ProtectHostname=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectProc=invisible
|
||||
ProtectSystem=strict
|
||||
ReadWritePaths=/etc/letsencrypt /var/lib/letsencrypt /var/log/letsencrypt /var/cache/certbot-ocsp-fetcher
|
||||
RestrictAddressFamilies=AF_INET AF_INET6
|
||||
RestrictNamespaces=true
|
||||
RestrictRealtime=true
|
||||
RestrictSUIDSGID=true
|
||||
SystemCallArchitectures=native
|
||||
SystemCallFilter=@system-service
|
||||
SystemCallFilter=~@resources @obsolete
|
Loading…
Reference in New Issue
Block a user