Hardening Arch Linux
This is a direct sequence of Installing Arch Linux, which already includes some hardening practices. This guide will go one step further because I am applying some CIS controls specific for Linux environments, obviously scoping and tailoring for my personal purposes.
Security x Usability
Before starting, just a disclaimer. Obviously many hardening techniques can be applied to improve a system's security, but typically security is inversely proportional to usability. That said, despite many configurations can be set to improve one's system, the purpose of this system must be well understood, so these controls will not make the system unusable.
In this case, as explained in the previous text, I am aiming to configuring an operating system to be installed in a laptop for personal usage. That's why I am not using the
linux-hardened kernel here for instance. All in all, always remember that even a well-hardened system can be owned simply because technology is just another aspect of security. To keep all systems safe, people who use them must be trained, and the processes also must be revised and in compliance with the best practices.
Basic System's Security
This section aggregates general-purpose controls. The first one will set the message presented before logging into the system, to avoid expose any details on the system --helps preventing footprinting.
echo "\d \t (\U) \n:\l" > /etc/issue
Next, the services enabled must be reviewed and unnecessary ones should be deactivated.
systemctl list-unit-files --state enabled systemctl disable unit.service # use this to disable services
Assuring the system's clock is always right and synchronized with reliable sources is essential because some protocols rely on it and the logs can become useless.
First, edit the
/etc/systemd/timesyncd.conf uncommenting the lines starting with
FallbackNTP=. Insert on the first line reliable sources separated by spaces --I like to use those provided by NTP.br.
Save and exit the editor and run the commands in the next listing to enable NTP, synchronize the clock, and enable permanently this service.
timedatectl set-ntp true timedatectl status timedatectl show-timesync --all systemctl enable systemd-timesyncd.service
All hardening techniques become useless if one can just boot the system in rescue mode, so properly configuring the boot loader is essential. Here, we are going to create a user and a password for every option in GRUB, except the default option to load the OS.
Create a hashed password and put it into
/etc/grub.d/40_custom. Since this hash is a long string and I am supposing you are in a pure text mode, the easiest way is to redirect the output of the GRUB's command to the file as shown in the next listing.
grub-mkpassword-pbkdf2 | tee -a /etc/grub.d/40_custom
/etc/grub.d/40_custom in a text editor and remove the first lines created by the last command --the ones asking for passwords-- and insert the lines from the next listing. Note that the last line must be completed with the hashed password.
set superusers="root" password_pbkdf2 root grub.pbkdf2.sha512.10000.4E073435...
Remake the GRUB's configuration file --
/boot/grub/grub.cfg-- using the next command, then open this file in a text editor.
grub-mkconfig -o /boot/grub/grub.cfg
Find the menu entry for Arch Linux's default boot --
/boot/grub/grub.cfg-- and insert the
--unrestricted option right after the 'Arch Linux' string to avoid typing GRUB's user and password at every boot. This line will look like
menuentry 'Arch Linux' --unrestricted --class arch....
Configure a firewall to control and log all access to the machine. Since ufw is already installed and it provides a friendly interface to iptables, we are going to use it. The next command listing shows how to enable ufw logs, set up the default policies, start and enable the service, test if it is active, and see the service's logs.
ufw logging on ufw default allow outgoing ufw default deny incoming systemctl start ufw systemctl enable ufw ufw enable ufw status journalctl -o verbose | grep -i ufw # to see ufw logs
Update 2021-10-26: to see the firewall logs continuously as in
tail -f, simply run
journalctl --follow | grep -i ufw.
To avoid the temptation of creating weak passwords, PAM must be properly configured to implement a password policy, as well as securely control the login process. Here we are going to implement this password policy:
- Minimum length: 14 characters.
- Required characters: uppercase, lowercase, digits, and special characters.
- Different characters between passwords: 3 characters.
- Retries: 3 times.
- Retries before locking: 6 times.
- Time between each retry: 3 seconds.
- Time before automatic account lockout: 10 minutes.
- Storing method: SHA-512 in
To achieve it, open
/etc/pam.d/passwd in a text editor, comment all lines --considering you have not changed this file yet-- and add the next lines.
password required pam_cracklib.so retry=3 minlen=14 difok=3 dcredit=-1 ucredit=-1 ocredit=-1 lcredit=-1 password required pam_unix.so use_authtok sha512 shadow
Update 2021-10-26: looks like
pam_tally2.sowas dropped in
pamv1.4.0 so the next step must be ignored (tally configuration).
/etc/pam.d/system-login file and edit --or comment-- the
pam_tally2.so line changing that for the line shown in the next listing.
auth required pam_tally2.so deny=6 unlock_time=600 onerr=fail file=/var/log/tallylog
Finally, edit the
/etc/pam.d/su file to restrict the
su access to members of the wheel group. Uncomment or add the next line.
auth required pam_wheel.so use_uid
It worth saying that the file
/etc/login.defs overrides any settings defined by PAM, but in my case, it is pretty well configured, so there was no need to change it. Also, remember that a time out must be set so the shell will log off when inactive. This configuration is implemented in my dotfiles for Bash and Zsh.
Since PAM drastically changes the login process, any mistake can make the system useless. I recommend testing the system after making these changes because we are going to block root access in the next steps.
To audit login errors from a given user, use the command below. If this user is blocked, you can release it by appending a
--reset option in the same command.
Update 2021-10-06: since tally was dropped from
pam, the command below is not present in Arch anymore.
Warning: if everything goes wrong, you will want to boot your system in recue mode to fix the things, so be sure you know how to do it.
Since the root user will be disabled and the
su command too, the only way to perform administrative tasks will be using Sudo, so it must be properly configured. It is highly recommended to use the command
visudo to perform all changes and it requires that the environmental variable
EDITOR is configured --see my dotfiles to learn how to do it.
Having everything set, run the command
visudo and start by locating the aliases section. Create aliases like those in the next listing, be known that these commands will be executed by all users in the
wheels groups without having to type any passwords.
Cmnd_Alias UPDATE = /usr/bin/pacman -Syu
Find the 'Defaults' section and add the next lines. Here we are allowing logins from real TTYs even for remote access, so if you use SSH, remember to add the
-t option to get in the system.
Defaults env_reset Defaults secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" Defaults requiretty Defaults use_pty Defaults umask=0022 Defaults umask_override
Finally, a couple of lines below the definitions for the
wheels group are set. Add the line below to allow the execution of the defined aliases by the members of this group.
%wheel ALL=(ALL) NOPASSWD: UPDATE
Update the System
We are already at the final lap and now we want to guarantee that the packages are retrieved using a secure protocol --HTTPS. You can manually edit the file
/etc/pacman.d/mirrorlist to achieve it or you can use Arch's mirrorlist generator to create a list and then, edit it at your own will.
Next, you should review all installed packages and remove unnecessary ones. Then just make sure your system is up-to-date. To learn more about
pacman, read its official guide.
pacman -Qq # lists all installed packages pacman -Rs # removes the package and unused dependencies pacman -Syu # upgrades all packages
Now it is time to disable the root login --next command-- and reboot the system. If you need to change this in the future, type the second command.
passwd -l root # disable root login sudo passwd -u root # enable root login
Be responsible when using all users with Sudo powers. Despite the fact there is no root anymore, this user must be considered the system administrator, so any malware or misuse can deeply affect the security of the OS.
Finally, remember that security is made by many aspects and this guide covered only the technology one. You should be aware of taking prudent actions in the day-by-day tasks, as well as following best practices to avoid any problems.
After rebooting your system you should be more secure and ready to rock!
Bonus: Booting Arch in Rescue Mode
Since Arch uses systemd, the equivalent to single-user mode is the rescue mode and to use it, in the GRUB menu select the appropriate kernel image --a.k.a. menu option-- and press
e. If you protected this menu as shown in this text --hope you did!--, you will have to type the user and password previously defined.
In the next screen, find the kernel configuration line --the one that starts with
linux /vmlinuz-linux root=.... Append the string in the next listing at the end of this line, then press
control-x to boot the system. You will still have to type the password to decrypt the disk if using full disk encryption and the root password so the system will launch a shell for maintenance.