FreeBSD Prevent Users From Seeing Information About Processes Owned by Other Users

last updated in Categories , ,

Many commands accepts username and passwords on the command line and ps, top, sockstat and many commands can display this information to all users on the system. How do I prevent users from seeing information about processes that are being run under another UID to avoid information leakage under FreeBSD operating systems?

FreeBSD has inbuilt security measure to disallow users to see processes run by other users (UID) to avoid information leakage (snooping). The MIB security.bsd.see_other_uids and security.bsd.see_other_gids needs to set to zero (0) to enable this security feature via sysctl. Type the following command to enable this feature on boot:
# echo 'security.bsd.see_other_uids=0' >> /etc/sysctl.conf
# echo 'security.bsd.see_other_gids=0' >> /etc/sysctl.conf

Type the following to turn it on immediately, enter:
# sysctl security.bsd.see_other_uids=0
# sysctl security.bsd.see_other_gids=0

Now normal users cannot see what other people or groups are running on the system. This also applies to all jailed systems.



Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin, DevOps engineer, and a trainer for the Linux operating system/Unix shell scripting. Get the latest tutorials on SysAdmin, Linux/Unix and open source topics via RSS/XML feed or weekly email newsletter.

9 comment

  1. Will you please let me know exact procedure/web link to get the information..Thanks in Advance.

  2. Hi Vivek,

    I have downloaded latest .rpm and installed the same on my test CentOS 5.3(i386) system. Will you please let me me what to do next to get the expected functionality ? Thanks.

  3. This should be saying:

    # echo ‘security.bsd.see_other_uids=0’ >> /etc/sysctl.conf
    # echo ‘security.bsd.see_other_gids=0’ >> /etc/sysctl.conf

    and not /etc/rc.conf

    Still, have a question? Get help on our forum!