FreeBSD hardening guide

Hi
I see FreeBSD is not supported

Is there any alternative documentation?

Regards
Kavitha
 
The FreeBSD fork, HardenedBSD, might be a good starting point for those who are really serious about security. It's the platform used by OPNsense.
Does it make sense to talk about hardening FreeBSD towards HardenedBSD level, SirDice ? If I remember correctly, there has not been a hole in FreeBSD for years, and there were only a couple overall, and they weren't even deadly? So hardening more is more of an extra assurance? (I'm talking about security that doesn't stem from user/sysdamin oversight).
 
Does it make sense to talk about hardening FreeBSD towards HardenedBSD level, SirDice ?
Plenty of things from HardenedBSD have been implemented in FreeBSD itself. If it makes sense, and doesn't break everything. There's a lot of "cross-pollination" between all the various BSDs out there.

The project started with Address Space Layout Randomization (ASLR) as an initial focal point and is now implementing further exploit mitigation techniques.
ASLR has been implemented in FreeBSD since then.
 
Does it make sense to talk about hardening FreeBSD towards HardenedBSD level, SirDice ? If I remember correctly, there has not been a hole in FreeBSD for years, and there were only a couple overall, and they weren't even deadly? So hardening more is more of an extra assurance? (I'm talking about security that doesn't stem from user/sysdamin oversight).

Hardening is not just about plugging holes.

It is also about mitigations that come into effect when there is a hole, to limit what an attacker can do with that hole.
 
Back
Top