Advertisement
noonedeadpunk

Untitled

Jan 17th, 2022
33
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.45 KB | None | 0 0
  1. root@cc-compute04-tky1:/home/dr5005# systemd-analyze security nova-compute.service
  2. NAME DESCRIPTION EXPOSURE
  3. ✗ PrivateNetwork= Service has access to the host's network 0.5
  4. ✓ User=/DynamicUser= Service runs under a static non-root user identity
  5. ✗ CapabilityBoundingSet=~CAP_SET(UID|GID|PCAP) Service may change UID/GID identities/capabilities 0.3
  6. ✗ CapabilityBoundingSet=~CAP_SYS_ADMIN Service has administrator privileges 0.3
  7. ✗ CapabilityBoundingSet=~CAP_SYS_PTRACE Service has ptrace() debugging abilities 0.3
  8. ✗ RestrictAddressFamilies=~AF_(INET|INET6) Service may allocate Internet sockets 0.3
  9. ✗ RestrictNamespaces=~CLONE_NEWUSER Service may create user namespaces 0.3
  10. ✗ RestrictAddressFamilies=~… Service may allocate exotic sockets 0.3
  11. ✗ CapabilityBoundingSet=~CAP_(CHOWN|FSETID|SETFCAP) Service may change file ownership/access mode/capabilities unrestricted 0.2
  12. ✗ CapabilityBoundingSet=~CAP_(DAC_*|FOWNER|IPC_OWNER) Service may override UNIX file/IPC permission checks 0.2
  13. ✗ CapabilityBoundingSet=~CAP_NET_ADMIN Service has network configuration privileges 0.2
  14. ✗ CapabilityBoundingSet=~CAP_RAWIO Service has raw I/O access 0.2
  15. ✗ CapabilityBoundingSet=~CAP_SYS_MODULE Service may load kernel modules 0.2
  16. ✗ CapabilityBoundingSet=~CAP_SYS_TIME Service processes may change the system clock 0.2
  17. ✗ DeviceAllow= Service has no device ACL 0.2
  18. ✗ IPAddressDeny= Service does not define an IP address whitelist 0.2
  19. ✓ KeyringMode= Service doesn't share key material with other services
  20. ✗ NoNewPrivileges= Service processes may acquire new privileges 0.2
  21. ✓ NotifyAccess= Service child processes cannot alter service state
  22. ✗ PrivateDevices= Service potentially has access to hardware devices 0.2
  23. ✗ PrivateMounts= Service may install system mounts 0.2
  24. ✗ PrivateTmp= Service has access to other software's temporary files 0.2
  25. ✗ PrivateUsers= Service has access to other users 0.2
  26. ✗ ProtectClock= Service may write to the hardware clock or system clock 0.2
  27. ✗ ProtectControlGroups= Service may modify the control group file system 0.2
  28. ✗ ProtectHome= Service has full access to home directories 0.2
  29. ✗ ProtectKernelLogs= Service may read from or write to the kernel log ring buffer 0.2
  30. ✗ ProtectKernelModules= Service may load or read kernel modules 0.2
  31. ✗ ProtectKernelTunables= Service may alter kernel tunables 0.2
  32. ✗ ProtectSystem= Service has full access to the OS file hierarchy 0.2
  33. ✗ RestrictAddressFamilies=~AF_PACKET Service may allocate packet sockets 0.2
  34. ✗ RestrictSUIDSGID= Service may create SUID/SGID files 0.2
  35. ✗ SystemCallArchitectures= Service may execute system calls with all ABIs 0.2
  36. ✗ SystemCallFilter=~@clock Service does not filter system calls 0.2
  37. ✗ SystemCallFilter=~@debug Service does not filter system calls 0.2
  38. ✗ SystemCallFilter=~@module Service does not filter system calls 0.2
  39. ✗ SystemCallFilter=~@mount Service does not filter system calls 0.2
  40. ✗ SystemCallFilter=~@raw-io Service does not filter system calls 0.2
  41. ✗ SystemCallFilter=~@reboot Service does not filter system calls 0.2
  42. ✗ SystemCallFilter=~@swap Service does not filter system calls 0.2
  43. ✗ SystemCallFilter=~@privileged Service does not filter system calls 0.2
  44. ✗ SystemCallFilter=~@resources Service does not filter system calls 0.2
  45. ✓ AmbientCapabilities= Service process does not receive ambient capabilities
  46. ✗ CapabilityBoundingSet=~CAP_AUDIT_* Service has audit subsystem access 0.1
  47. ✗ CapabilityBoundingSet=~CAP_KILL Service may send UNIX signals to arbitrary processes 0.1
  48. ✗ CapabilityBoundingSet=~CAP_MKNOD Service may create device nodes 0.1
  49. ✗ CapabilityBoundingSet=~CAP_NET_(BIND_SERVICE|BROADCAST|RAW) Service has elevated networking privileges 0.1
  50. ✗ CapabilityBoundingSet=~CAP_SYSLOG Service has access to kernel logging 0.1
  51. ✗ CapabilityBoundingSet=~CAP_SYS_(NICE|RESOURCE) Service has privileges to change resource use parameters 0.1
  52. ✗ RestrictNamespaces=~CLONE_NEWCGROUP Service may create cgroup namespaces 0.1
  53. ✗ RestrictNamespaces=~CLONE_NEWIPC Service may create IPC namespaces 0.1
  54. ✗ RestrictNamespaces=~CLONE_NEWNET Service may create network namespaces 0.1
  55. ✗ RestrictNamespaces=~CLONE_NEWNS Service may create file system namespaces 0.1
  56. ✗ RestrictNamespaces=~CLONE_NEWPID Service may create process namespaces 0.1
  57. ✗ RestrictRealtime= Service may acquire realtime scheduling 0.1
  58. ✗ SystemCallFilter=~@cpu-emulation Service does not filter system calls 0.1
  59. ✗ SystemCallFilter=~@obsolete Service does not filter system calls 0.1
  60. ✗ RestrictAddressFamilies=~AF_NETLINK Service may allocate netlink sockets 0.1
  61. ✗ RootDirectory=/RootImage= Service runs within the host's root directory 0.1
  62. ✓ SupplementaryGroups= Service has no supplementary groups
  63. ✗ CapabilityBoundingSet=~CAP_MAC_* Service may adjust SMACK MAC 0.1
  64. ✗ CapabilityBoundingSet=~CAP_SYS_BOOT Service may issue reboot() 0.1
  65. ✓ Delegate= Service does not maintain its own delegated control group subtree
  66. ✗ LockPersonality= Service may change ABI personality 0.1
  67. ✗ MemoryDenyWriteExecute= Service may create writable executable memory mappings 0.1
  68. ✗ RemoveIPC= Service user may leave SysV IPC objects around 0.1
  69. ✗ RestrictNamespaces=~CLONE_NEWUTS Service may create hostname namespaces 0.1
  70. ✗ UMask= Files created by service are world-readable by default 0.1
  71. ✗ CapabilityBoundingSet=~CAP_LINUX_IMMUTABLE Service may mark files immutable 0.1
  72. ✗ CapabilityBoundingSet=~CAP_IPC_LOCK Service may lock memory into RAM 0.1
  73. ✗ CapabilityBoundingSet=~CAP_SYS_CHROOT Service may issue chroot() 0.1
  74. ✗ ProtectHostname= Service may change system host/domainname 0.1
  75. ✗ CapabilityBoundingSet=~CAP_BLOCK_SUSPEND Service may establish wake locks 0.1
  76. ✗ CapabilityBoundingSet=~CAP_LEASE Service may create file leases 0.1
  77. ✗ CapabilityBoundingSet=~CAP_SYS_PACCT Service may use acct() 0.1
  78. ✗ CapabilityBoundingSet=~CAP_SYS_TTY_CONFIG Service may issue vhangup() 0.1
  79. ✗ CapabilityBoundingSet=~CAP_WAKE_ALARM Service may program timers that wake up the system 0.1
  80. ✗ RestrictAddressFamilies=~AF_UNIX Service may allocate local sockets 0.1
  81.  
  82. → Overall exposure level for nova-compute.service: 9.2 UNSAFE 😨
  83. root@cc-compute04-tky1:/home/dr5005#
  84.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement