On Sun, Jan 11, 2026 at 11:02:33PM +0000, Dewayne Geraghty wrote:
> I like the idea of protecting syctl's after the system has completed
> booting. :)
Awesome. I think this change from 4-state to 5-state sysctl nodes will
be pretty easy. I'm at the tail end of recovering from a sinus
infection, so I might work on this.
I try not to commit code when sick, but this easy enough that I
probably wouldn't make any grave mistakes. :-)
>
> I vaguely recall you asking for input re enhancing HardenedBSD via
> telegram, though I thought of locking down all non-performance related
> sysctl's via something like securelevel=3+ :).
> Perhaps a better approach is to use a sysctl to inhibit changing
> security.mac and hardening.pax, would be helpful against compromise. Your
> suggestion is a great starting point, thank-you for keeping your eye on
> improving BSD for us.
Just so you're aware, I don't use Telegram. If you've been conversing
with a Shawn Webb on Telegram, that is NOT me. And do please let me
know if you have been in contact with an impersonator (and when, if
possible).
>
> The other suggestion to improve HBSD, was placing a label on network
> packets entering the system. Currently, when using MAC_MLS or MAC_BIBA,
> all packets are assigned a label via the interface (setting), a nice
> extension would be to label the packet as it exited ipfw or pf;
> particularly as there are so many jails listening to an interface, a (MAC)
> labelled packet would protect the packet from a compromised jail.
I could see that being pretty useful. I wonder if that could be
implemented as a MAC module, or if the supported firewalls/packet
filters need to be modified as well.
I'm not an expert in the networking code. Networking stacks are pretty
complex and I'm not sure I'm the right person to do that kind of work.