System Hardening

OpenSnitch

OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch. Ref: https://github.com/evilsocket/opensnitch

Warning

appindicators which is required for the system tray icon is buggy and seems to produce a lot of syslog errors: journalctl --since "1 hour ago"

Recommend installing and using Tray Icons: Reloaded instead: https://extensions.gnome.org/extension/2890/tray-icons-reloaded/

Note

Works more or less with VPNs… YMMV.

Other speedup configs

Caution

Tread at your own risk… A lot of these things can fuck-up your device and might be annoying to undo or fix easily. But we all have installation scripts and backups right…. right?!

Monitor journalctl --since "1 hour ago" for bugs and application errors which might use up battery, or other hardware resources. Need to run as admin to see all messages otherwise you will only see logs related to your system.

gnome-shell editor: dconf-editor

To look into:

Hardening scripts

debian-cis

Warning

Some of these may not be desirable to have hardened on host machines.

Ref: https://github.com/ovh/debian-cis

# Installation
# need root to cp into /etc/default/cis-hardening
cd debian-cis
cp debian/default /etc/default/cis-hardening
sed -i "s#CIS_LIB_DIR=.*#CIS_LIB_DIR='$(pwd)'/lib#" /etc/default/cis-hardening
sed -i "s#CIS_CHECKS_DIR=.*#CIS_CHECKS_DIR='$(pwd)'/bin/hardening#" /etc/default/cis-hardening
sed -i "s#CIS_CONF_DIR=.*#CIS_CONF_DIR='$(pwd)'/etc#" /etc/default/cis-hardening
sed -i "s#CIS_TMP_DIR=.*#CIS_TMP_DIR='$(pwd)'/tmp#" /etc/default/cis-hardening

# Audit everything
./bin/hardening.sh --audit-all

# audit single item
./bin/hardening/4.4_logrotate_permissions.sh --audit

# Apply a fix / harden
./bin/hardening/4.4_logrotate_permissions.sh --apply