systemd Service Hardening: Security-Optionen für Production #110
Labels
No labels
apache
api
api-contract
api-gateway
authentication
automation
breaking-change
comments
component/deployment
component/documentation
component/service-management
configuration
contact-form
coordination/cross-repo
coordination/needed
core
deployment
development
development-ready
digital-sovereignty
distribution
effort
large
effort
medium
effort
small
enhancement
frontend
furt-service
furt/gateway
furt/installation
gateway
gateway-integration
generator
gitea-testing
health-check
help-wanted
hugo
hugo-integration
infrastructure
installation
logging
low-tech
mail
meta
meta/duplicate
meta/planning
meta/wontfix
monitoring
observability
openapi
organization
packaging
performance
planning
platform/linux
priority
high
priority
low
priority
medium
production
question
sagjan
security
service
service-analytics
service-development
service-formular2mail
service-newsletter
service-request
service-sagjan
session
blocker
session
handover
session
next
shortcode
specs
ssl
status
blocked
status
done
status
in-progress
status
review
status
to-go
systemd
testing
tooling
type
admin
type
bug
type
config
type
deployment
type
docs
type
enhancement
type
feature
type
handover
type
infrastructure
type
installation
type
maintenance
type
migration
type/refactor
type
research
type
security
type/testing
v0.1.0
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: DAW/furt#110
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Purpose
Systemd-Service mit Security-Optionen für Production-Deployments härten.
Current State
Basis-systemd-Service funktional aber ohne Security-Hardening:
Proposed Security-Hardening
Filesystem-Protection
ProtectSystem=strict- Read-only filesystemReadWritePaths=/var/run /var/log/furt- Nur notwendige PfadeProtectHome=yes- Home-Verzeichnisse blockierenPrivateTmp=yes- Isolierte /tmpProcess-Isolation
NoNewPrivileges=yes- Privilege escalation verhindernRestrictSUIDSGID=yes- SUID/SGID Programme blockierenNetwork-Hardening (optional)
RestrictAddressFamilies=AF_INET AF_INET6- Nur IP-ProtokolleIPAddressDeny=any+IPAddressAllow=localhost- Local-only bindingImplementation
Erweiterte systemd-Service-Template in
deployment/linux/furt-hardened.serviceTesting-Plan
Priority
Medium - Security-Enhancement für Production, nicht für Basis-Funktionalität erforderlich
Dependencies
Issue-Scope Reduction
Nach Review reduziert auf pragmatische Security-Optionen:
Entfernt: SystemCallFilter, Capabilities, IPv6, Memory-Protection
Grund: Security-Theater vs. tatsächlicher Nutzen
Behalten: 6 sinnvolle Optionen:
Vorteil: Weniger Dokumentation, weniger Debugging, gleicher Security-Nutzen.
Debian Testing: SUCCESS ✅
johann (Debian 12, systemd 247):
All 6 security features working:
Ready for klaus (Arch) testing.
Multi-Distro Testing: COMPLETE ✅
Testing Results:
johann (Debian 12, systemd 247): ✅ All features working
klaus (Arch Linux, systemd ~256): ✅ All features working
Security hardening stable across:
Ready for production deployment.
Next Steps:
Issue #110: systemd Service Hardening - Pragmatische Security-Optionen
State: open
Labels: effort/small, priority/medium, status/to-go, type/security
Milestone: v0.1.2 - Gateway Basics
Created: 2025-09-05T22:30:10+02:00
URL: #110
Description
Purpose
Systemd-Service mit pragmatischen Security-Optionen für Production-Deployments härten. Fokus auf das Nötige ohne Overhead.
Current State
Basis-systemd-Service funktional aber ohne Security-Hardening:
Proposed Security-Hardening (Minimal)
Filesystem-Protection
ProtectSystem=strict- Read-only filesystemReadWritePaths=/var/run/furt /var/log/furt- Nur notwendige PfadeProtectHome=yes- Home-Verzeichnisse blockierenProcess-Hardening
NoNewPrivileges=yes- Privilege escalation verhindernPrivateTmp=yes- Isolierte /tmpNetwork-Restriction
RestrictAddressFamilies=AF_INET- Nur IPv4 (was furt nutzt)Implementation
6 zusätzliche Zeilen in
deployment/linux/furt.serviceTesting-Plan
/var/log/furtDocumentation
Priority
Medium - Pragmatisches Security-Enhancement ohne Complexity-Overhead
Dependencies
Issue Complete - Ready for Merge
Implementation: 6 security lines in furt.service
Testing: Debian + Arch successful
Documentation: Included in issue description
Performance: No impact (812K RAM)
All requirements fulfilled.