hardening guideline for Freebsd 7.2

krad kraduk at googlemail.com
Tue Sep 29 15:12:54 UTC 2009


2009/9/29 doug schmidt <douglas.j.schmidt at gmail.com>

> center for internet security benchmarks;
>
> http://www.cisecurity.org/bench_freebsd.html
>
>
> On Sat, Sep 26, 2009 at 8:27 AM, Aflatoon Aflatooni <aaflatooni at yahoo.com
> >wrote:
>
> > Hi,
> > Is there a hardening guideline for Freebsd 7.2?
> >
> > Thanks
> >
> >
> >
> > _______________________________________________
> > freebsd-questions at freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> > To unsubscribe, send any mail to "
> > freebsd-questions-unsubscribe at freebsd.org"
> >
> _______________________________________________
> freebsd-questions at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "
> freebsd-questions-unsubscribe at freebsd.org"
>

looks a bit old that guide does. Freebsd is actually fairly secure out of
the box. What you need to establish is what kind of usage you are going to
have.

eg

If you are going to be giving lots of people shell access, then what you
will need to do will be quite different than if you were setting up an
apache web server.

Generally I would say just make sure there are no exploits for the services
you are going to enable/install and put them into a jail. Write a decent pf
ruleset for your needs. Above all though restrict access to the box to the
bare minimum of what you can get away with


More information about the freebsd-questions mailing list