FreeBSD – A Lesson in Poor Defaults

· security · Source ↗

TLDR

  • A sysadmin hardening guide arguing FreeBSD’s base system ships insecure defaults across OpenSSH, Sendmail, PF, and package tooling.

Key Takeaways

  • FreeBSD patched HPN-SSH, tcp_wrappers, weak DSA host keys, and disabled-upstream ciphers back into OpenSSH, producing multiple CVEs unique to FreeBSD.
  • Sendmail stayed in base by default for 27 years until FreeBSD 14.0, with security fixes sometimes imported silently and no advisory published.
  • The bundled PF firewall has not synced with OpenBSD upstream since 2009; a subsequent invasive patch effectively forked it permanently.
  • No firewall is enabled by default out of the box despite three being included.
  • Both ports and pkg run extensive operations as root unnecessarily; the ports security team reportedly dismissed the concern.

Hacker News Comment Review

  • The piece is a recurring submission; a prior 2022 thread on the same content drew 91 comments and is the most substantive discussion available.

Notable Comments

  • @bell-cot: flags 2022 thread with 91 comments as the live debate worth reading.

Original | Discuss on HN