OpenSolaris Now Secure By Default.
snv_42 (Solaris Express b42a) of OpenSolaris has introduced a fantastic change which may surprise a few people performing initial installations (not upgrades). As of snv_42 ALL ...
... network services (except for ssh) that were previously enabled by default, are now either disabled or constrained to respond to local requests only. This change minimizes the attack surface for an installed system and provides a base for customers to enable only the services they require.
All of the affected services are controlled by the Service Management Framework (SMF). Any individual service can be enabled using the normal svcadm(1M) and svccfg(1M) commands.
Disabling network services can also be achieved manually by running
# netservices limited
This can be used on upgraded systems, where no changes are made by default, or to re-establish the hardened state after enabling individual services. Similarly, default services can be enabled as they were in previous Solaris releases by running
# netservices open
There are two situations where you may see services listening to the network even when running in the "netservices limited" state. First, there are a few non-ON services, primarily for Gnome, that still require modifications to limit them to local requests. These changes will be included in an upcoming build.
Source: PSARC 2004/368 Secure by Default (Not public yet, but the request to be has been made)
So what does that mean to the average user? Well, obvious things like telnet, rlogin and ftp will be disabled for connections from remote systems. The only way you will be able to connect is via ssh. However, following an initial install, the only way to connect will be via the console as login via ssh for root is disabled by default too (default OpenSSH config).
More subtle things that will also be disabled will be rpcbind (used by NIS and NFS) and Sendmail will be configured to only receive mail from the local process. If the newly installed machine is to receive mail from other hosts, it needs to be configured to allow incoming mail as follows:
# svcadm refresh sendmail
# svcadm restart sendmail
The only other issue that I envisage new users to encounter is remote X connections are also disabled by default now. If you wish you allow X clients from other systems to work on your display, you will need to enable the X server to listen to the network
as follows:
# svcadm refresh x11-server
... and restart X server.
Note that this is not necessary if you use X11 forwarding via ssh -X
.
These changes will eventually make their way into the official Solaris release.
This is all well and good, but I wonder if or when the OpenSolaris developers will follow NetBSD's lead and stop shipping Sendmail with Solaris, by default (Ubuntu Linux has never shipped with Sendmail). Whilst super powerful and highly scalable, Sendmail is a nightmare to configure for the average Joe Schmoe and it notorious for it's vulnerabilities.
Update: Check out the project page for more details and a TOI (Transfer of Information)