As EOS has FirewallD enabled as a service in its latest release, I’d like to request further security enhancements on the end-user’s side.
Specifically, I’d like to suggest apparmor and unbound as services pre-installed.
Apparmor is a security framework for Linux. As a mandatory access control system, it controls individual applications and can restrict rights granularly with profiles. If an application (e.g. Firefox) is compromised, the attacker can do little damage to the system if the application runs under apparmor control.
Configuring unbound for tls-upstream dns resolution, one could use this example as an unbound.conf -file, which is not setting up any local dns-server, but just uses unbound to enhance personal privacy and security, while surfing the web (also see https://www.privacy-handbuch.de/handbuch_93c.htm):
# verbosity number, 0 is least verbose. 1 is default.
### Forwarding using DNS over TLS:
### Begin “Tls-Upstream No-Filter-Section”
# Freifunk München
# Digitalcourage e.V.
# Digitale Gesellschaft (CH) DNS Server
# Censurfridns Denmark (aka. UncensoredDNS)
# AdGuard DNS-Server OHNE Werbe- und Trackingfilter
# Mullvad DoT und DoH-Server OHNE Werbe- und Trackingfilter
### Begin “Tls-Upstream Adblocker-Section”
# Dismail.de DNS Server
# dnsforge.de DNS Server
# BlahDNS DE Server
# AdGuard DNS-Server MIT Werbe- und Trackingfilter
# Mullvad DoT und DoH-Server MIT Werbe- und Trackingfilter
I see some challenges with apparmor. The biggest one would be that it would make the EndeavourOS team responsible for ensuring the profiles are correct and up-to-date and I am not sure we have a big enough team for that.
On the unbound side, finding a default config that would work for everyone in the world seems difficult.
The named censorship-free and trusted DNS servers (“Tls-Upstream No-Filter-Section”) with no-logging policy, DNSSEC validation and anti-spoofing protection (test page) can be recommended as an alternative to the providers’ default DNS servers for those who want to switch.
The other DNS servers (“Tls-Upstream Adblocker-Section”) filter advertising, tracking and malware domains at the DNS level. All named projects are operated by independent individuals.
OK! - This is from Central Europe…
And OK! - Firejail or apparmor is a matter of choice.
And, perhaps, I was very wrong, requesting such things upfront in a new thread. Not thought-through well enough on my end, I guess.
Yet, I wanted to bring apparmor and unbound to the fore-front for users, who are interested in security issues, and ways to tackle something of an all 'round internet-censorship, which seems to be a growing issue during these days, internationally.
think it good you bring attention for usr that might find useful or not know . People want different thing so that why Endeavouros give you sold basic base… if you want more you add Better install thing than waste time removing thing you no want/need.
" Your system your rule " Hope you enjoy time on Endeavouros
IMHO, as a cybersecurity professional myself, I really think that once you start down the path of wanting to secure your system, you really need to learn and do it yourself.
Some basic security is good for everyone, but the more security you wrap around a system, the more difficult it becomes to troubleshoot if you don’t understand it. Apparmor and SELinux are good examples of this.
run all apps through Firejail (with browser apps also using hardened_malloc) - firejail also has Apparmor support
install lkrg-dkms (Linux Kernel Runtime Guard)
enable the kernel option module.sig_enforce=1 (so rootkits cannot be inserted).
I run all the above with Apparmor enabled without too many problems.
For a properly hardened kernel consider building your own (so memory addresses are not easily known) If you use any out of tree kernel modules like zfs or nvidia I make it simple to build a kernel with these modules signed too - see arch-sign-modules.
This is WAY too large of a maintenance burden to be a realistic request for the team to accomplish. The only 2 distros with a well done setup for apparmor or SELinux i know of are Ubuntu and Fedora and their derivatives. It takes a LOT of time and effort to set these up well and EOS along with most other distros simply dont have the resources to do this.
Also configuring unbound for someone who may not have the same needs as another for its use seems like it would also been non trivial to do. I personally dont like unbound and would prefer it not be there.
Hardening your system and blocking advertising and tracking requires one thing above all - a lot of time to acquire the necessary knowledge. Not every user with rather average competence has so much time to fight his way through it.
One must not forget that the fewest users attach importance to such things. Mainly because they don’t know enough, but also because they don’t care who gets access to their data.
You also have to have the muse and passion to want to do and have things like this.
As honorable as the thought process may be, I can understand that it is not possible for the EOS team to implement such things. They simply don’t have the time and the manpower.
Many users would certainly be hopelessly overwhelmed with Unbound and Apparmor. Then they would come to the forum with their problems. Who should support all this then? In the end, most would send EOS right back to /dev/null.