Securing /tmp and shm partitions

Securing /tmp and /dev/shm is a nice practice.  Lots of programs and scripts have access in there. So you don’t want code, malicious or not to run in there, trying to get root permissions or snoop on you.

Temporary storage directories such as /tmp, /var/tmp and /dev/shm provide storage space for malicious executables.
Crackers and hackers store executables in /tmp. Malicious users can use temporary storage directories to execute unwanted program and crack your server.

First because I forget, let’s bind /var/tmp to /tmp in /etc/fstab

Now we deal with /tmp only.

Update 28/03/2015: That practice was for many unstable and criticized also by many. Unfortunately for them, I was vindicated when even OpenBSD in the upcoming version does the same for the very same reasons. Security.

Security improvements:

  • /var/tmp is now a symbolic link to /tmp, as a first step towards reducing the “fill it up” attack surface against the /var partition.

 

If it’s a separate partition we only need a

If it’s not, we will create an image for it. The example is for 4GB, tune it as you like.

Modify /tmp line as follows:

You should to the same for shm:

 

Edit your /etc/fstab:
# nano /etc/fstab

change:
“none /dev/shm tmpfs defaults,rw 0 0” to
“none /dev/shm tmpfs defaults,nosuid,noexec,rw 0 0”

Remount /dev/shm:
# mount -o remount /dev/shm
It should be fine now.

0 (0)
Article Rating (No Votes)
Rate this article
Attachments
There are no attachments for this article.
Comments
There are no comments for this article. Be the first to post a comment.
Full Name
Email Address
Security Code Security Code
Related Articles RSS Feed
RHCS6: Reduce a Global Filesystem 2 (GFS2)
Viewed 2910 times since Sun, Jun 3, 2018
LOGROTATE – ARCHIWIAZACJA LOGÓW
Viewed 1579 times since Fri, Nov 30, 2018
Method 2 – Use shell scripts How to install yum cron on a CentOS/RHEL 6.x/7.x
Viewed 3728 times since Tue, Dec 4, 2018
python learning
Viewed 1454 times since Wed, Dec 18, 2019
bash mistakes This page is a compilation of common mistakes made by bash users. Each example is flawed in some way.
Viewed 8591 times since Sun, Dec 6, 2020
RHEL: Scan and configure new SAN (fibre channel) LUNs
Viewed 7299 times since Sun, May 27, 2018
RHCS6: Mirror/unmirror a GFS2 volume
Viewed 4769 times since Sun, Jun 3, 2018
RHEL: iSCSI target/initiator configuration on RHEL6
Viewed 8220 times since Sat, Jun 2, 2018
HowTo: The Ultimate Logrotate Command Tutorial with 10 Examples
Viewed 4252 times since Fri, Nov 30, 2018
How to convert RAW image to VDI and otherwise
Viewed 14224 times since Wed, Oct 3, 2018