Securing /tmp and shm partitions

Securing /tmp and /dev/shm is a nice practice.  Lots of programs and scripts have access in there. So you don’t want code, malicious or not to run in there, trying to get root permissions or snoop on you.

Temporary storage directories such as /tmp, /var/tmp and /dev/shm provide storage space for malicious executables.
Crackers and hackers store executables in /tmp. Malicious users can use temporary storage directories to execute unwanted program and crack your server.

First because I forget, let’s bind /var/tmp to /tmp in /etc/fstab

Now we deal with /tmp only.

Update 28/03/2015: That practice was for many unstable and criticized also by many. Unfortunately for them, I was vindicated when even OpenBSD in the upcoming version does the same for the very same reasons. Security.

Security improvements:

  • /var/tmp is now a symbolic link to /tmp, as a first step towards reducing the “fill it up” attack surface against the /var partition.

 

If it’s a separate partition we only need a

If it’s not, we will create an image for it. The example is for 4GB, tune it as you like.

Modify /tmp line as follows:

You should to the same for shm:

 

Edit your /etc/fstab:
# nano /etc/fstab

change:
“none /dev/shm tmpfs defaults,rw 0 0” to
“none /dev/shm tmpfs defaults,nosuid,noexec,rw 0 0”

Remount /dev/shm:
# mount -o remount /dev/shm
It should be fine now.

0 (0)
Article Rating (No Votes)
Rate this article
Attachments
There are no attachments for this article.
Comments
There are no comments for this article. Be the first to post a comment.
Full Name
Email Address
Security Code Security Code
Related Articles RSS Feed
debian How to Upgrade Debian 8 Jessie to Debian 9 Stretch
Viewed 2851 times since Sun, Sep 23, 2018
Linux - How to get CPU information
Viewed 2700 times since Fri, Jun 8, 2018
OpenSSL – sprawdzanie czy klucz pasuje do certyfikatu
Viewed 3152 times since Thu, May 24, 2018
ZPOOL: Create a new zpool for zfs filesystems
Viewed 2757 times since Sun, Jun 3, 2018
Find All Large Files On A Linux System
Viewed 2725 times since Mon, Oct 29, 2018
Top 20 OpenSSH Server Best Security Practices ssh linux aix
Viewed 6590 times since Fri, May 15, 2020
20 Practical Examples of RPM Commands in Linux rpm
Viewed 8574 times since Mon, Feb 18, 2019
How to accurately determine when the system was booted
Viewed 2679 times since Wed, Oct 3, 2018
How to convert RAW image to VDI and otherwise
Viewed 15661 times since Wed, Oct 3, 2018
chrt command: Set / Manipulate Real Time Attributes of a Linux Process
Viewed 11755 times since Mon, Feb 17, 2020