by Grach » Sun Oct 03, 2010 3:01 am
To make system more secure in general:
1. Uninstall packages with unused suid/sgid binaries (like sudo)
2. Make sure all the PaX and Grsecurity features are enabled, configured properly and don't prevent apps from working
3. Rebuild your kernel without unnecessary things like modules, LSM framework, SCTP and IPsec, FUSE, DRM, ALSA/OSS and so on
4. Apply more restricted DAC permissions on sensitive files and directories like stuff in /var/log, /sys, /boot, /lib/modules, /proc/bus, etc
5. Use more secure resolvers like unbound or djbdns instead of BIND; use more secure syslog daemon like socklog or even don't use syslog daemon at all
6. Make sure executables you use are build as PIE to make ROP attacks more unlikely to success, and if they aren't PIE, rebuild them with customized specs
7. If you connect to several banking systems, do it as separate users in separate X window servers, and maybe deploy some restrictive RBAC policy with custom killing and logging traps to detect and prevent intrusions
8. Try to maintain static /dev to prevent any exploitation of udev
9. Use iptables to reject any inbound connections to prevent exploitation of services that could be left running by mistake
10. Configure your browser for strict SSL/TLS usage (like requiring OCSP avalability, only safe TLS negotiation, no weak ciphers, etc)
11. Uninstall anything you don't need to prevent web browser or any other app from running Java applets and audio/video content by accident, etc.
12. Use NoScript and its ABE to prevent XSS/CSRF attacks
13. Disable JIT compiling of JavaScript and enable MPROTECT restriction on web browser executable
14. Anything else I forgot or don't know about
Btw, TinHat seems more appropriate for your task (if you have enough RAM to run it), or Hardened Gentoo, as they both have strong kernelspace and userspace hardeding, while OpenSUSE (which NetSecl 3.0 is based on), AFAIK, does not provide PIE binaries (at least not for client apps), has (partially) writable ELF relocation tables, no system-wide -fstack-protector-all, etc...