Fend off malware at Qubes VM startup
Go to file
2017-03-15 01:39:36 -04:00
rc.local Update rc.local 2017-03-15 01:39:36 -04:00
README.md Update README.md 2017-03-14 22:23:43 -04:00

Qubes-VM-hardening

Files for enhancing Qubes VM security and privacy

rc.local: Protect sh and bash init files

Placed in /etc/rc.local of a template VM, this makes the shell init files immutable so PATH and alias cannot be used to hijack commands like su and sudo. I combed the dash and bash docs to address all the user-writable files. Feel free to comment or create issue if you see an omission or other problem.


See also:

Enabling dom0 prompt for sudo

AppArmor Profiles