mirror of
https://github.com/PrivSec-dev/privsec.dev.git
synced 2025-08-05 21:04:15 -04:00
Update Desktop Linux Hardening.md
Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
parent
f866d0c871
commit
fa6276f9bd
1 changed files with 1 additions and 1 deletions
|
@ -401,7 +401,7 @@ ExecStart=/usr/bin/gnome-shell --no-x11
|
|||
|
||||
Consider adding the [mount options](https://man7.org/linux/man-pages/man8/mount.8.html#FILESYSTEM-INDEPENDENT_MOUNT_OPTIONS) `nodev`, `noexec`, and `nosuid` to mountpoints which do not need the respective capabilities. Typically, these can be applied to `/boot`, `/boot/efi`, and `/var`. These flags could also be applied to `/home` and `/root`, however `noexec` will prevent applications that require binary execution in those locations from working (including Flatpak and Snap).
|
||||
|
||||
It should be noted that `noexec` is not foolproof and actually [quite easy to bypass](https://www.chromium.org/chromium-os/developer-library/guides/security/noexec-shell-scripts/).
|
||||
It should be noted that `noexec` is not foolproof and actually [quite easy to bypass](https://www.chromium.org/chromium-os/developer-library/guides/security/noexec-shell-scripts/#what-about-interpreted-code).
|
||||
|
||||
If you use [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/), do not set any of these mount options on `/var/log/journal`. From my testing, the Toolbox container will fail to start if you have `nodev`, `nosuid`, or `noexec` on said directory. If you are on Arch Linux, you probably do not want to set `noexec` on `/var/tmp`, as some AUR packages will then fail to build.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue