Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Security and ZFS Overview subsections to introduction.md #28

Merged
merged 4 commits into from Feb 20, 2019
Merged
Changes from 1 commit
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
Next
Update introduction.md
Add "Security" subsection
  • Loading branch information
Mrt134 committed Feb 14, 2019
commit a15631d80da9aafad5b08bb9270d2b33692a43cd
@@ -70,3 +70,63 @@ Project Trident provides many features:
- **Easy system administration:** Project Trident provides many graphical tools for performing system administration.

- **Vibrant community:** Project Trident has a friendly and helpful community.

### Security

The Project Trident system is secure by default.
This section is an overview of the built-in security features.
There are also tips about increasing the security of the installed system beyond the configured defaults.

The security features built into Project Trident include:

- **Naturally immune to viruses and other malware:** Most viruses are written to exploit the Windows operating system.
This conversation was marked as resolved by Mrt134

This comment has been minimized.

@q5sys

q5sys Feb 15, 2019
Member

  • Naturally immune to viruses and other malware written for other Operating Systems: Most viruses are written to exploit the Windows operating system.
These are incompatible with the binaries and paths found on a Project Trident system.
Additional antivirus software is also available in the Appcafe.
This is useful when sending or forwarding email attachments to users running other operating systems.

- **Potential for serious damage is limited:** Privilege separation between users and the administrator account (root) are built-in.
Files and directories can only be modified by root any any users and groups with permission.
This conversation was marked as resolved by Mrt134

This comment has been minimized.

@q5sys

q5sys Feb 15, 2019
Member

"any any" needs to be fixed

Any executed programs or scripts are only granted the permissions of that user.
A malicious program can only infect the files and directories owned by the user.
Core operating system files are protected.
Only users that are *wheel* and/or *operator* group members can gain administrative access.
These users are still not allowed to list directory contents or access files outside of the set "user" and "group" permissions.

- **Built-in firewall:** The default firewall ruleset allows Internet access and any available network shares.
The firewall does not allow any inbound connections to the computer.
This conversation was marked as resolved by Mrt134

This comment has been minimized.

@q5sys

q5sys Feb 15, 2019
Member

"...connections to the computer unless the user authorizes them."


- **Few default services:** All boot services can be viewed in the Service Manager.
Service Manager also allows starting, stopping, and adding or removing from boot any system service.

- **SSH is disabled:** SSH can only be enabled by the administrator (root).
This conversation was marked as resolved by Mrt134

This comment has been minimized.

@q5sys

q5sys Feb 15, 2019
Member

"SSH is disabled by default:"

This prevents bots and outside individuals from accessing the Project Trident system.
This conversation was marked as resolved by Mrt134

This comment has been minimized.

@q5sys

q5sys Feb 15, 2019
Member

"...from accessing a Project Trident system."

If SSH access is required, add `sshd\_enable=YES` to **/etc/rc.conf**.
Then, start the service with the Service Manager or by typing `sudo service sshd start` in the command line.
Root access is required.
A firewall rule must also be added using the Firewall Manager.
Allow SSH connections through the default SSH TCP port *22*.

- **SSH root logins are disabled:** If SSH is enabled, login as a regular user and use `su` or `sudo` for administrative actions.
Do not change this setting, as it prevents an unwanted user from having complete access to the system.

- **sudo is installed:** `sudo` allows users in the *wheel* group permission to run an administrative command after typing the user password, not the *root* password.
The first user created during installation is added to the *wheel* group.
Use the User Configuration in Desktop Settings to add other users to the *wheel* group.
To change the default `sudo` configuration, use `visudo` as *root*.
This command verifies there are no syntax errors, which could inadvertently prevent root access.

- [AES instruction set](https://en.wikipedia.org/wiki/AES_instruction_set) (AESNI) support is loaded by default for the Intel Core i5/i7 processors that support this encryption set.
This support speeds up AES encryption and decryption.

- **Automatic notification of security advisories:** The System Update Manager utility automatically checks for any updates available from a [security advisory](https://www.freebsd.org/security/advisories.html) that affects Project Trident.
The administrator can keep the operating system fully patched against vulnerabilities with a mouse click.

- Tor Mode can be used to anonymously access Internet sites as it automatically forwards all Internet traffic through the [Tor Project's](https://www.torproject.org/) transparent proxy service.

To learn more about security on TrueOS and Project Trident systems, `man security` is a good place to start.
These resources provide more information about security on FreeBSD-based operating systems:

- [FreeBSD Security Information](https://www.freebsd.org/security/)
- [Security Section in the FreeBSD Handbook](https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/security.html)
- [Hardening FreeBSD](http://www.bsdguides.org/2005/hardening-freebsd/)