security-misc/usr/lib/sysctl.d/990-security-misc.conf

497 lines
20 KiB
Plaintext
Raw Normal View History

2024-05-10 23:18:36 -04:00
## Copyright (C) 2019 - 2024 ENCRYPTED SUPPORT LP <adrelanos@whonix.org>
## See the file COPYING for copying conditions.
2023-10-26 12:04:13 -04:00
## NOTE:
2024-07-17 11:04:03 -04:00
## This file has a special name to ensure that /usr/lib/sysctl.d/99-protect-links.conf
## is parsed first, followed by /usr/lib/sysctl.d/990-security-misc.conf.
2023-10-26 12:04:13 -04:00
## https://github.com/Kicksecure/security-misc/pull/135
2024-08-25 21:34:12 -04:00
## Definitions:
## KSPP=yes: compliant with recommendations by the KSPP
## KSPP=partial: partially compliant with recommendations by the KSPP
2024-07-17 11:04:03 -04:00
## This configuration file is divided into 5 sections:
2024-07-13 08:41:40 -04:00
## 1. Kernel Space
## 2. User Space
## 3. Core Dumps
## 4. Swap Space
## 5. Networking
2024-07-17 11:04:03 -04:00
## For detailed explanations of most of the selected commands, refer to:
2024-07-13 08:41:40 -04:00
## https://www.kernel.org/doc/html/latest/admin-guide/sysctl/kernel.html
## https://www.kernel.org/doc/html/latest/admin-guide/sysctl/fs.html
## https://www.kernel.org/doc/html/latest/admin-guide/sysctl/net.html
## https://www.kernel.org/doc/html/latest/admin-guide/sysctl/vm.html
## https://www.kernel.org/doc/html/latest//networking/ip-sysctl.html
## 1. Kernel Space:
##
## https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-kernel
2024-08-02 10:11:06 -04:00
## https://kspp.github.io/Recommended_Settings#sysctls
2024-07-13 08:41:40 -04:00
## https://wiki.archlinux.org/title/Security#Kernel_hardening
2024-07-17 11:04:03 -04:00
## Restrict kernel address visibility via /proc and other interfaces, regardless of user privileges.
2024-07-17 08:00:24 -04:00
## Kernel pointers expose specific locations in kernel memory.
2024-07-13 08:41:40 -04:00
##
## https://kernsec.org/wiki/index.php/Bug_Classes/Kernel_pointer_leak
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctl.
##
2024-07-13 08:41:40 -04:00
kernel.kptr_restrict=2
2024-07-17 11:04:03 -04:00
## Restrict access to the kernel log buffer to users with CAP_SYSLOG.
2024-07-13 08:41:40 -04:00
## Kernel logs often contain sensitive information such as kernel pointers.
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctl and CONFIG_SECURITY_DMESG_RESTRICT=y.
##
2023-12-04 10:36:21 -05:00
kernel.dmesg_restrict=1
2024-07-13 08:41:40 -04:00
## Prevent kernel information leaks in the console during boot.
2024-07-17 11:04:03 -04:00
## Must be used in conjunction with kernel boot parameters.
## See /etc/default/grub.d/41_quiet_boot.cfg for implementation.
##
## https://www.kernel.org/doc/html/latest/core-api/printk-basics.html
2024-07-13 08:41:40 -04:00
##
2024-07-13 11:21:24 -04:00
## See /usr/lib/sysctl.d/30_silent-kernel-printk.conf for implementation.
2024-07-13 08:41:40 -04:00
##
2024-07-13 11:21:24 -04:00
#kernel.printk=3 3 3 3
## Restrict eBPF access to CAP_BPF.
## Disables unprivileged calls to bpf() without recovery.
2024-07-13 08:41:40 -04:00
##
## https://en.wikipedia.org/wiki/EBPF#Security
## https://lwn.net/Articles/660331/
2024-07-13 08:41:40 -04:00
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctl.
2024-08-16 11:06:21 -04:00
##
2024-07-13 08:41:40 -04:00
kernel.unprivileged_bpf_disabled=1
2024-07-17 11:04:03 -04:00
## Restrict loading TTY line disciplines to users with CAP_SYS_MODULE.
## Prevents unprivileged users from loading vulnerable line disciplines with the TIOCSETD ioctl.
2024-07-13 08:41:40 -04:00
##
## https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
## https://lkml.org/lkml/2019/4/15/890
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctl does not set CONFIG_LDISC_AUTOLOAD.
##
2024-07-13 08:41:40 -04:00
dev.tty.ldisc_autoload=0
2024-07-17 11:04:03 -04:00
## Restrict the userfaultfd() syscall to users with SYS_CAP_PTRACE.
## Reduces the likelihood of use-after-free exploits from heap sprays.
2024-07-13 08:41:40 -04:00
##
## https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cefdca0a86be517bc390fc4541e3674b8e7803b0
## https://duasynt.com/blog/linux-kernel-heap-spray
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctl.
##
2024-07-13 08:41:40 -04:00
vm.unprivileged_userfaultfd=0
2024-07-17 11:04:03 -04:00
## Disables kexec, which can be used to replace the running kernel.
2024-07-13 08:41:40 -04:00
## Useful for live kernel patching without rebooting.
2020-02-12 13:03:23 -05:00
##
2024-07-13 08:41:40 -04:00
## https://en.wikipedia.org/wiki/Kexec
2020-02-12 13:03:23 -05:00
##
2024-07-13 11:21:24 -04:00
## See /usr/lib/sysctl.d/30_security-misc_kexec-disable.conf for implementation.
2024-07-13 08:41:40 -04:00
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctl and does not set CONFIG_KEXEC.
##
2024-07-13 08:41:40 -04:00
#kernel.kexec_load_disabled=1
2024-07-13 08:41:40 -04:00
## Disable the SysRq key to prevent leakage of kernel information.
2024-07-17 11:04:03 -04:00
## The Secure Attention Key (SAK) can no longer be utilized.
##
2024-07-13 08:41:40 -04:00
## https://www.kernel.org/doc/html/latest/admin-guide/sysrq.html
## https://www.kicksecure.com/wiki/SysRq
## https://github.com/xairy/unlockdown
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the less strict CONFIG_MAGIC_SYSRQ_DEFAULT_ENABLE=176.
##
2024-07-13 08:41:40 -04:00
kernel.sysrq=0
2024-07-17 11:04:03 -04:00
## Restrict user namespaces to users with CAP_SYS_ADMIN.
2024-07-13 08:41:40 -04:00
## User namespaces aim to improve sandboxing and accessibility for unprivileged users.
## Unprivileged user namespaces pose substantial privilege escalation risks.
2024-07-17 21:04:54 -04:00
## Restricting may lead to breakages in numerous software packages.
## Uncomment the second sysctl to entirely disable user namespaces.
2024-08-17 23:53:11 -04:00
## Disabling entirely will reduce compatibility with some AppArmor profiles.
2024-09-04 09:23:24 -04:00
## Disabling entirely is known to break the UPower systemd service.
2024-07-13 08:41:40 -04:00
##
2024-08-17 23:53:11 -04:00
## https://lwn.net/Articles/673597/
2024-07-13 08:41:40 -04:00
## https://madaidans-insecurities.github.io/linux.html#kernel
## https://github.com/a13xp0p0v/kernel-hardening-checker#questions-and-answers
2024-08-17 23:53:11 -04:00
## https://github.com/NixOS/nixpkgs/pull/84522#issuecomment-614640601
## https://github.com/Kicksecure/security-misc/pull/263
2024-07-13 08:41:40 -04:00
##
## KSPP=partial
## KSPP sets the stricter sysctl user.max_user_namespaces=0.
2024-07-13 08:41:40 -04:00
##
2024-07-17 21:04:54 -04:00
kernel.unprivileged_userns_clone=0
#user.max_user_namespaces=0
2024-07-13 08:41:40 -04:00
2024-07-17 11:04:03 -04:00
## Restricts kernel profiling to users with CAP_PERFMON.
2024-07-13 08:41:40 -04:00
## The performance events system should not be accessible by unprivileged users.
2024-07-13 23:40:53 -04:00
## Other distributions such as Ubuntu and Fedora may permit further restricting.
2024-07-13 08:41:40 -04:00
##
## https://www.kernel.org/doc/html/latest/admin-guide/perf-security.html#unprivileged-users
## https://lore.kernel.org/kernel-hardening/1469630746-32279-1-git-send-email-jeffv@google.com/
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctl.
##
2024-07-13 08:41:40 -04:00
kernel.perf_event_paranoid=3
2024-08-24 22:47:04 -04:00
## Force the kernel to panic on "oopses" and kernel warnings in the WARN() path.
## Can sometimes potentially indicate and thwart certain kernel exploitation attempts.
## Panics may be due to false-positives such as bad drivers.
2024-08-24 22:57:22 -04:00
## Oopses are serious but non-fatal errors.
## Kernel warnings are useful to avoid a when attempting to access the location of a WARN().
##
2024-08-24 22:47:04 -04:00
## https://en.wikipedia.org/wiki/Kernel_panic#Linux
## https://en.wikipedia.org/wiki/Linux_kernel_oops
## https://en.wikipedia.org/wiki/Kdump_(Linux)
## https://forums.whonix.org/t/set-oops-panic-kernel-parameter-or-kernel-panisc-on-oops-1-sysctl-for-better-security/7713
##
## KSPP=partial
2024-08-24 22:47:04 -04:00
## KSPP sets the sysctls, CONFIG_PANIC_ON_OOPS=y, but also requires CONFIG_PANIC_TIMEOUT=-1.
2024-08-16 11:06:21 -04:00
##
## See /usr/libexec/security-misc/panic-on-oops for implementation.
##
2024-08-24 22:47:04 -04:00
## TODO: Debian 13 Trixie
## The limits are applicable when using Linux kernel >= 6.2 (retained here for future-proofing and completeness).
##
#kernel.panic=-1
2024-08-24 22:57:22 -04:00
#kernel.panic_on_oops=1
2024-08-24 22:47:04 -04:00
#kernel.panic_on_warn=1
#kernel.oops_limit=1
#kernel.warn_limit=1
2024-08-05 01:06:34 -04:00
## Disable the use of legacy TIOCSTI operations which can be used to inject keypresses.
## Can lead to privilege escalation by pushing characters into a controlling TTY.
## Will break out-dated screen readers that continue to rely on this legacy functionality.
##
2024-08-05 01:06:34 -04:00
## https://lore.kernel.org/lkml/20221228205726.rfevry7ud6gmttg5@begin/T/
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctl and does not set CONFIG_LEGACY_TIOCSTI.
##
## TODO: Debian 13 Trixie
## This is disabled by default when using Linux kernel >= 6.2.
##
2024-08-05 01:06:34 -04:00
dev.tty.legacy_tiocsti=0
2024-07-13 08:41:40 -04:00
## Disable asynchronous I/O for all processes.
## Leading cause of numerous kernel exploits.
## Disabling will reduce the read/write performance of storage devices.
2024-07-13 08:41:40 -04:00
##
## https://en.wikipedia.org/wiki/Io_uring#Security
## https://lwn.net/Articles/902466/
2024-07-13 08:41:40 -04:00
## https://security.googleblog.com/2023/06/learnings-from-kctf-vrps-42-linux.html
## https://github.com/moby/moby/pull/46762
## https://forums.whonix.org/t/io-uring-security-vulnerabilties/16890
2024-07-13 08:41:40 -04:00
##
## TODO: Debian 13 Trixie
2024-07-13 08:41:40 -04:00
## Applicable when using Linux kernel >= 6.6 (retained here for future-proofing and completeness).
##
kernel.io_uring_disabled=2
2024-07-13 08:41:40 -04:00
2024-07-17 11:04:03 -04:00
## 2. User Space:
2024-07-13 08:41:40 -04:00
##
## https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-userspace
2024-07-17 08:00:24 -04:00
## Restrict usage of the ptrace() system call to only processes with CAP_SYS_PTRACE.
2024-07-13 08:41:40 -04:00
## Limit ptrace() as it enables programs to inspect and modify other active processes.
2024-07-13 23:40:53 -04:00
## Prevents native code debugging which some programs use as a method to detect tampering.
2024-07-17 08:00:24 -04:00
## May cause breakages in 'anti-cheat' software and programs running under Proton/WINE.
2024-07-13 08:41:40 -04:00
##
## https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html#ptrace-scope
2024-07-13 23:40:53 -04:00
## https://en.wikipedia.org/wiki/Ptrace
## https://grapheneos.org/features#attack-surface-reduction
## https://github.com/GrapheneOS/os-issue-tracker/issues/651#issuecomment-917599928
## https://github.com/netblue30/firejail/issues/2860
##
2024-08-16 11:06:21 -04:00
## KSPP=partial
## KSPP sets the stricter sysctl kernel.yama.ptrace_scope=3.
##
2024-07-17 08:00:24 -04:00
## It is possible to harden further by disabling ptrace() for all users, see documentation.
2024-07-26 23:28:59 -04:00
## https://github.com/Kicksecure/security-misc/pull/242
2024-07-13 08:41:40 -04:00
##
kernel.yama.ptrace_scope=2
2024-07-17 11:04:03 -04:00
## Maximize bits of entropy for improved effectiveness of mmap ASLR.
## The maximum number of bits depends on CPU architecture (the ones shown below are for x86).
2024-07-13 08:41:40 -04:00
## Both explicit sysctl are made redundant due to automation.
## Do NOT enable either sysctl - displaying only for clarity.
##
2023-05-15 12:11:44 -04:00
## https://forums.whonix.org/t/automate-mmap-randomisation-to-fix-ppc64el/16514
2024-07-13 08:41:40 -04:00
##
2024-07-13 11:21:24 -04:00
## See /usr/libexec/security-misc/mmap-rnd-bits for implementation.
2023-05-15 12:11:44 -04:00
##
#vm.mmap_rnd_bits=32
#vm.mmap_rnd_compat_bits=16
2024-07-13 08:41:40 -04:00
## Prevent hardlink creation by users who do not have read/write/ownership of source file.
2024-07-17 11:04:03 -04:00
## Only allow symlinks to be followed when outside of world-writable sticky directories.
2024-07-13 08:41:40 -04:00
## Allow symlinks when the owner and follower match or when the directory owner matches the symlink's owner.
2024-07-17 11:04:03 -04:00
## Hardens cross-privilege boundaries if root process follows a hardlink/symlink belonging to another user.
2024-07-13 08:41:40 -04:00
## This mitigates many hardlink/symlink-based TOCTOU races in world-writable directories like /tmp.
##
2024-07-13 08:41:40 -04:00
## https://wiki.archlinux.org/title/Security#File_systems
## https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=/tmp
## https://en.wikipedia.org/wiki/Time-of-check_to_time-of-use#Preventing_TOCTOU
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctls.
##
2024-07-13 08:41:40 -04:00
fs.protected_hardlinks=1
fs.protected_symlinks=1
2024-07-13 08:41:40 -04:00
## Disallow writes to files in world-writable sticky directories unless owned by the directory owner.
2024-07-17 11:04:03 -04:00
## Also applies to group-writable sticky directories to make data spoofing attacks more difficult.
2024-07-13 08:41:40 -04:00
## Prevents unintentional writes to attacker-controlled files.
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctls.
##
2024-07-13 08:41:40 -04:00
fs.protected_fifos=2
fs.protected_regular=2
## Enable ASLR for mmap base, stack, VDSO pages, and heap.
## Forces shared libraries to be loaded to random addresses
## Start location of PIE-linked binaries is randomized.
## Heap randomization can lead to breakages with legacy applications.
##
## https://en.wikipedia.org/wiki/Address_space_layout_randomization#Linux
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctl.
##
kernel.randomize_va_space=2
2024-07-17 11:04:03 -04:00
## Increase the maximum number of memory map areas a process is permitted to utilize.
## Addresses performance, crash, and start-up issues for some memory-intensive applications.
2024-07-13 08:41:40 -04:00
## Required to accommodate the very large number of guard pages created by hardened_malloc.
2024-07-17 11:04:03 -04:00
## Kicksecure version 18 will deprecate hardened_malloc, so this sysctl will be applied here instead.
2024-07-13 08:41:40 -04:00
##
## https://archlinux.org/news/increasing-the-default-vmmax_map_count-value/
## https://github.com/GrapheneOS/hardened_malloc#traditional-linux-based-operating-systems
## https://github.com/Kicksecure/hardened_malloc/blob/master/debian/hardened_malloc.conf
## https://www.kicksecure.com/wiki/Hardened_Malloc#Deprecation_in_Kicksecure
##
vm.max_map_count=1048576
2023-12-04 10:36:21 -05:00
2024-07-24 20:11:33 -04:00
## Disable the miscellaneous binary format virtual file system to prevent unintended code execution.
## Prevents registering interpreters for various binary formats based on a magic number or their file extension.
2024-07-28 07:57:25 -04:00
## Otherwise arbitrary executables with recognized file formats will be passed to relevant user space applications.
2024-07-28 08:04:30 -04:00
## These interpreters will then run with root permissions when a setuid binary is owned by root.
2024-07-24 20:11:33 -04:00
## Can stop maliciously crafted files with specific file extensions from automatically executing.
## Breaks many scripts that do not have appropriate shebang interpreter directives (#!/bin/...).
##
## https://www.kernel.org/doc/html/latest/admin-guide/binfmt-misc.html
## https://salsa.debian.org/debian/binfmt-support
## https://access.redhat.com/solutions/1985633
## https://en.wikipedia.org/wiki/Binfmt_misc
## https://security.stackexchange.com/questions/271786/does-allowing-binfmt-misc-significantly-increase-the-attack-surface-for-unprivil
## https://unix.stackexchange.com/questions/439569/what-kinds-of-executable-formats-do-the-files-under-proc-sys-fs-binfmt-misc-al
## https://github.com/Kicksecure/security-misc/pull/249
##
## KSPP=no
## KSPP does not set CONFIG_BINFMT_MISC.
2024-07-24 20:11:33 -04:00
##
## This is disabled by default due to file/folder permission issues:
## https://github.com/Kicksecure/security-misc/issues/267
##
#fs.binfmt_misc.status=0
2024-07-24 20:11:33 -04:00
2024-07-13 08:41:40 -04:00
## 3. Core Dumps:
##
## https://madaidans-insecurities.github.io/guides/linux-hardening.html#core-dumps
2024-07-13 08:41:40 -04:00
## Disable core dump files by preventing any pattern names.
2024-07-17 11:04:03 -04:00
## This setting may be overwritten by systemd and is not comprehensive.
2024-07-13 08:41:40 -04:00
## Core dumps are also disabled in security-misc via other means.
##
## https://wiki.archlinux.org/title/Core_dump#Disabling_automatic_core_dumps
##
kernel.core_pattern=|/bin/false
## Prevent setuid processes or otherwise protected/tainted binaries from creating core dumps.
## Any process which has changed privilege levels or is execute-only will not be dumped.
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets the sysctl.
##
2024-07-13 08:41:40 -04:00
fs.suid_dumpable=0
2024-07-17 11:04:03 -04:00
## Set core dump file name to 'core.PID' instead of 'core' as a form of defense-in-depth.
2024-07-13 08:41:40 -04:00
## If core dumps are permitted, only useful if PID listings are hidden from non-root users.
##
kernel.core_uses_pid=1
## 4. Swap Space:
##
## https://madaidans-insecurities.github.io/guides/linux-hardening.html#swap
## Limit the copying of memory to the swap device only if absolutely necessary.
2024-07-17 11:04:03 -04:00
## Minimizes the likelihood of writing potentially sensitive contents to disk.
## Not recommended to set to zero since this disables periodic write behavior.
2024-07-13 08:41:40 -04:00
##
## https://en.wikipedia.org/wiki/Memory_paging#Linux
2024-07-16 10:31:23 -04:00
## https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Performance_Tuning_Guide/s-memory-tunables.html
2024-07-13 08:41:40 -04:00
##
vm.swappiness=1
2023-12-04 10:36:21 -05:00
2024-07-13 08:41:40 -04:00
## 5. Networking:
##
## https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-network
## https://wiki.archlinux.org/title/Sysctl#TCP/IP_stack_hardening
## Enable hardening of the BPF JIT compiler for all users.
## Provides some mitigation against JIT spraying.
##
## https://en.wikipedia.org/wiki/JIT_spraying
## https://www.blackhat.com/docs/eu-16/materials/eu-16-Reshetova-Randomization-Can't-Stop-BPF-JIT-Spray-wp.pdf
## https://lwn.net/Articles/686098/
## https://lwn.net/Articles/525609/
##
## KSPP=yes
## KSPP sets the sysctl.
##
net.core.bpf_jit_harden=2
2024-07-13 08:41:40 -04:00
## Enable TCP SYN cookie protection to assist against SYN flood attacks.
##
## https://en.wikipedia.org/wiki/SYN_flood
## https://cateee.net/lkddb/web-lkddb/SYN_COOKIES.html
##
2024-08-16 11:06:21 -04:00
## KSPP=yes
## KSPP sets CONFIG_SYN_COOKIES=y.
##
2024-07-13 08:41:40 -04:00
net.ipv4.tcp_syncookies=1
## Protect against TCP time-wait assassination hazards.
## Drops RST packets for sockets in the time-wait state.
2024-07-17 08:00:24 -04:00
##
2024-07-13 08:41:40 -04:00
## https://tools.ietf.org/html/rfc1337
##
net.ipv4.tcp_rfc1337=1
2024-07-13 08:41:40 -04:00
## Enable reverse path filtering (source validation) of packets received from all interfaces.
2024-07-17 11:04:03 -04:00
## Prevents IP spoofing and mitigates vulnerabilities such as CVE-2019-14899.
## The second "default" command fixes a bug in the existing kernel implementation.
2024-07-13 08:41:40 -04:00
##
## https://en.wikipedia.org/wiki/IP_address_spoofing
2024-08-08 23:35:33 -04:00
## https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-server_security-reverse_path_forwarding#sect-Security_Guide-Server_Security-Reverse_Path_Forwarding
2024-07-13 08:41:40 -04:00
## https://forums.whonix.org/t/enable-reverse-path-filtering/8594
## https://seclists.org/oss-sec/2019/q4/122
## https://github.com/Kicksecure/security-misc/pull/261
2024-07-13 08:41:40 -04:00
##
net.ipv4.conf.*.rp_filter=1
2024-07-13 08:41:40 -04:00
net.ipv4.conf.default.rp_filter=1
## Disable ICMP redirect acceptance and redirect sending messages.
2024-07-17 11:04:03 -04:00
## Prevents man-in-the-middle attacks and minimizes information disclosure.
2024-08-06 23:48:53 -04:00
## If ICMP redirects are permitted, accept messages only through approved gateways (kernel default).
## Approving gateways requires the managing of a default gateway list.
##
## https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-server_security-disable-source-routing#sect-Security_Guide-Server_Security-Disable-Source-Routing
## https://www.frozentux.net/ipsysctl-tutorial/chunkyhtml/theconfvariables.html
## https://www.debian.org/doc/manuals/securing-debian-manual/network-secure.en.html
## https://askubuntu.com/questions/118273/what-are-icmp-redirects-and-should-they-be-blocked
2024-08-06 23:48:53 -04:00
## https://github.com/Kicksecure/security-misc/pull/248
2024-07-13 08:41:40 -04:00
##
net.ipv4.conf.*.accept_redirects=0
net.ipv4.conf.*.send_redirects=0
net.ipv6.conf.*.accept_redirects=0
#net.ipv4.conf.*.secure_redirects=1
2024-07-13 08:41:40 -04:00
## Ignore ICMP echo requests.
## Prevents clock fingerprinting through ICMP timestamps and Smurf attacks.
##
## https://en.wikipedia.org/wiki/Smurf_attack
##
net.ipv4.icmp_echo_ignore_all=1
net.ipv6.icmp.echo_ignore_all=1
2024-07-13 08:41:40 -04:00
## Ignore bogus ICMP error responses.
## Mitigates attacks designed to fill log files with useless error messages.
##
net.ipv4.icmp_ignore_bogus_error_responses=1
2024-07-17 11:04:03 -04:00
## Disable source routing which allows users to redirect network traffic.
2024-07-13 08:41:40 -04:00
## Prevents man-in-the-middle attacks in which the traffic is redirected.
##
## https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-server_security-disable-source-routing
##
net.ipv4.conf.*.accept_source_route=0
net.ipv6.conf.*.accept_source_route=0
2024-07-13 08:41:40 -04:00
## Do not accept IPv6 router advertisements and solicitations.
##
net.ipv6.conf.*.accept_ra=0
2024-07-17 09:35:25 -04:00
## Disable SACK and DSACK.
2024-07-13 08:41:40 -04:00
## Select acknowledgements (SACKs) are a known common vector of exploitation.
## Duplicate select acknowledgements (DSACKs) are an extension of SACK.
## Disabling can cause severe connectivity issues on networks with high latency or packet loss.
## Enabling on stable high-bandwidth networks can lead to reduced efficiency of TCP connections.
2024-07-17 08:00:24 -04:00
##
2024-07-13 08:41:40 -04:00
## https://datatracker.ietf.org/doc/html/rfc2018
## https://datatracker.ietf.org/doc/html/rfc2883
## https://access.redhat.com/sites/default/files/attachments/20150325_network_performance_tuning.pdf
## https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
## https://wiki.archlinux.org/title/Sysctl#TCP_Selective_Acknowledgement
## https://forums.whonix.org/t/disabling-tcp-sack-dsack-fack/8109/5
##
## SACK and DSACK are currently enabled.
##
#net.ipv4.tcp_sack=0
#net.ipv4.tcp_dsack=0
2024-07-13 23:40:53 -04:00
## Disable TCP timestamps to limit device fingerprinting via system time.
2024-08-15 23:12:07 -04:00
## Timestamps allow round-trip time measurement and protection against wrapped sequence numbers.
2024-08-09 00:21:59 -04:00
## Disabling timestamps on very fast links is likely to cause TCP Sequence Numbers to wrap.
## Segments with wrapped numbers will be incorrectly discarded, reducing network performance.
2024-07-13 08:41:40 -04:00
##
2024-08-09 00:21:59 -04:00
## https://datatracker.ietf.org/doc/html/rfc1323
2024-07-13 08:41:40 -04:00
## https://forums.whonix.org/t/do-ntp-and-tcp-timestamps-really-leak-your-local-time/7824
## https://web.archive.org/web/20170201160732/https://mailman.boum.org/pipermail/tails-dev/2013-December/004520.html
2024-08-09 00:21:59 -04:00
## https://access.redhat.com/sites/default/files/attachments/20150325_network_performance_tuning.pdf
2024-07-13 08:41:40 -04:00
##
net.ipv4.tcp_timestamps=0
2024-07-13 23:40:53 -04:00
## Enable logging of packets with impossible source or destination addresses.
2024-07-17 11:04:03 -04:00
## Martian and unroutable packets may be used for malicious purposes.
## Recommended to keep a (kernel dmesg) log of these to identify suspicious packets.
## Useful for troubleshooting and diagnostics but not necessary by default.
## Known to cause performance issues, especially on systems with multiple interfaces.
2024-07-17 08:00:24 -04:00
##
2024-07-13 11:21:24 -04:00
## https://wiki.archlinux.org/title/Sysctl#Log_martian_packets
2024-07-13 08:41:40 -04:00
## https://github.com/Kicksecure/security-misc/issues/214
2020-02-15 12:30:21 -05:00
##
2024-07-17 08:00:24 -04:00
## The logging of martian packets is currently disabled.
##
#net.ipv4.conf.*.log_martians=1
2024-07-17 11:04:03 -04:00
## Enable IPv6 Privacy Extensions to prefer temporary addresses over public addresses.
## The temporary/privacy address is used as the source for all outgoing traffic.
2024-07-17 08:05:27 -04:00
## Must be used in combination with /usr/lib/systemd/networkd.conf.d/80_ipv6-privacy-extensions.conf.
## Must be used in combination with /usr/lib/NetworkManager/conf.d/80_ipv6-privacy.conf.
2024-07-17 11:04:03 -04:00
## Should be used with MAC randomization in /usr/lib/NetworkManager/conf.d/80_randomize-mac.conf.
2024-07-17 08:05:27 -04:00
##
2024-07-17 11:04:03 -04:00
## MAC randomization breaks root server and VirtualBox DHCP, likely due to IPv6 Privacy Extensions.
##
## https://datatracker.ietf.org/doc/html/rfc4941
## https://github.com/Kicksecure/security-misc/pull/145
## https://github.com/Kicksecure/security-misc/issues/184
##
2024-07-17 11:04:03 -04:00
## The use of IPv6 Privacy Extensions is currently disabled due to these breakages.
##
#net.ipv6.conf.*.use_tempaddr=2