mirror of
https://github.com/tasket/Qubes-VM-hardening.git
synced 2025-01-26 07:25:57 -05:00
Update README.md
This commit is contained in:
parent
a572756340
commit
39c40a18ac
12
README.md
12
README.md
@ -4,3 +4,15 @@ Files for enhancing Qubes VM security and privacy
|
|||||||
## rc.local: Protect sh and bash init files
|
## rc.local: Protect sh and bash init files
|
||||||
|
|
||||||
Placed in /etc/rc.local of a template VM, this makes the shell init files immutable so PATH and alias cannot be used to hijack commands like su and sudo. I combed the dash and bash docs to address all the user-writable files. Feel free to comment or create issue if you see an omission or other problem.
|
Placed in /etc/rc.local of a template VM, this makes the shell init files immutable so PATH and alias cannot be used to hijack commands like su and sudo. I combed the dash and bash docs to address all the user-writable files. Feel free to comment or create issue if you see an omission or other problem.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
------
|
||||||
|
|
||||||
|
|
||||||
|
## See also:
|
||||||
|
|
||||||
|
[Enabling dom0 prompt for sudo](https://www.qubes-os.org/doc/vm-sudo/#replacing-password-less-root-access-with-dom0-user-prompt)
|
||||||
|
|
||||||
|
[AppArmor Profiles](https://github.com/tasket/AppArmor-Profiles)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user