2021-01-11 21:17:13 -05:00
# Enhances miscellaneous security settings
2015-12-15 16:05:03 -05:00
2021-01-11 21:17:13 -05:00
## Kernel hardening
2019-09-15 10:07:50 -04:00
2021-01-11 21:17:13 -05:00
This section is inspired by the Kernel Self Protection Project (KSPP). It
2023-12-25 08:37:23 -05:00
implements all recommended Linux kernel settings by the KSPP and many more.
2019-09-15 10:07:50 -04:00
2024-07-17 10:43:16 -04:00
- https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project
- https://kspp.github.io/Recommended_Settings
2019-09-15 10:07:50 -04:00
2021-01-11 21:17:13 -05:00
### sysctl
2016-11-21 12:42:55 -05:00
2024-07-13 08:41:40 -04:00
sysctl settings are configured via the `/usr/lib/sysctl.d/990-security-misc.conf`
2021-01-11 21:17:13 -05:00
configuration file.
2024-07-13 08:41:40 -04:00
Significant hardening is applied by default to a myriad of components within kernel
space, user space, core dumps, and swap space.
2021-01-11 21:17:13 -05:00
2024-07-17 10:43:16 -04:00
- Restrict access to kernel addresses through the use of kernel pointers regardless
of user privileges.
2021-01-11 21:17:13 -05:00
2024-07-17 10:43:16 -04:00
- Restrict access to the kernel logs to `CAP_SYSLOG` as they often contain
sensitive information.
2021-01-11 21:17:13 -05:00
2024-07-17 10:43:16 -04:00
- Prevent kernel information leaks in the console during boot.
2021-01-11 21:17:13 -05:00
2024-07-17 10:43:16 -04:00
- Restrict eBPF access to `CAP_BPF` and enable associated JIT compiler hardening.
2021-01-11 21:17:13 -05:00
2024-07-17 10:43:16 -04:00
- Restrict loading TTY line disciplines to `CAP_SYS_MODULE` .
2021-01-11 21:17:13 -05:00
2024-07-17 10:43:16 -04:00
- Restrict the `userfaultfd()` syscall to `CAP_SYS_PTRACE` , which reduces the
likelihood of use-after-free exploits.
2019-06-23 15:51:53 -04:00
2024-07-17 10:43:16 -04:00
- Disable `kexec` as it can be used to replace the running kernel.
2019-06-23 15:51:53 -04:00
2024-07-17 10:43:16 -04:00
- Entirely disable the SysRq key so that the Secure Attention Key (SAK)
can no longer be utilized. See [documentation ](https://www.kicksecure.com/wiki/SysRq ).
2022-07-13 08:25:53 -04:00
2024-07-17 10:43:16 -04:00
- Provide the option to disable unprivileged user namespaces as they can lead to
substantial privilege escalation.
2019-06-23 15:51:53 -04:00
2024-07-17 10:43:16 -04:00
- Restrict kernel profiling and the performance events system to `CAP_PERFMON` .
2023-12-25 08:37:23 -05:00
2024-07-24 20:26:23 -04:00
- Force the kernel to panic on "oopses" that can potentially indicate and thwart
2024-07-24 20:28:27 -04:00
certain kernel exploitation attempts. Provide the option to reboot immediately
on a kernel panic.
2024-07-24 20:26:23 -04:00
2024-07-17 10:43:16 -04:00
- Randomize the addresses (ASLR) for mmap base, stack, VDSO pages, and heap.
2023-11-05 14:41:01 -05:00
2024-07-19 07:20:59 -04:00
- Disable asynchronous I/O as `io_uring` has been the source
2024-07-17 22:25:00 -04:00
of numerous kernel exploits (when using Linux kernel version >= 6.6).
2021-01-11 21:17:13 -05:00
2024-07-17 10:43:16 -04:00
- Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it
enables programs to inspect and modify other active processes. Provide the
option to entirely disable the use of `ptrace()` for all processes.
2020-02-15 15:28:30 -05:00
2024-07-17 10:43:16 -04:00
- Prevent hardlink and symlink TOCTOU races in world-writable directories.
2023-11-04 10:33:35 -04:00
2024-07-17 10:43:16 -04:00
- Disallow unintentional writes to files in world-writable directories unless
they are owned by the directory owner to mitigate some data spoofing attacks.
2023-11-04 10:33:35 -04:00
2024-07-17 10:43:16 -04:00
- Increase the maximum number of memory map areas a process is able to utilize.
2024-07-13 08:41:40 -04:00
2024-07-17 10:43:16 -04:00
- Disable core dump files and prevent their creation. If core dump files are
enabled, they will be named based on `core.PID` instead of the default `core` .
2024-07-13 08:41:40 -04:00
2024-07-17 10:43:16 -04:00
- Limit the copying of potentially sensitive content in memory to the swap device.
2024-07-13 08:41:40 -04:00
Various networking components of the TCP/IP stack are hardened for IPv4/6.
2024-07-17 10:43:16 -04:00
- Enable TCP SYN cookie protection to assist against SYN flood attacks.
2024-07-13 08:41:40 -04:00
2024-07-17 10:43:16 -04:00
- Protect against TCP time-wait assassination hazards.
2024-07-13 08:41:40 -04:00
2024-07-17 10:43:16 -04:00
- Enable reverse path filtering (source validation) of packets received
from all interfaces to prevent IP spoofing.
2024-07-13 08:41:40 -04:00
2024-07-17 10:43:16 -04:00
- Disable ICMP redirect acceptance and redirect sending messages to
2024-07-18 01:28:31 -04:00
prevent man-in-the-middle attacks and minimize information disclosure. If
ICMP redirect messages are permitted, only do so from approved gateways.
2024-07-13 08:41:40 -04:00
2024-07-17 10:43:16 -04:00
- Ignore ICMP echo requests to prevent clock fingerprinting and Smurf attacks.
2024-07-13 08:41:40 -04:00
2024-07-17 10:43:16 -04:00
- Ignore bogus ICMP error responses.
2024-07-13 08:41:40 -04:00
2024-07-17 10:43:16 -04:00
- Disable source routing which allows users to redirect network traffic that
can result in man-in-the-middle attacks.
2024-07-13 08:41:40 -04:00
2024-07-17 10:43:16 -04:00
- Do not accept IPv6 router advertisements and solicitations.
2024-07-13 08:41:40 -04:00
2024-07-17 10:43:16 -04:00
- Provide the option to disable SACK and DSACK as they have historically been
a known vector for exploitation.
2024-07-14 03:05:49 -04:00
2024-07-17 10:43:16 -04:00
- Disable TCP timestamps as they can allow detecting the system time.
2024-05-10 23:15:42 -04:00
2024-07-17 10:43:16 -04:00
- Provide the option to log packets with impossible source or destination
addresses to enable further inspection and analysis.
2024-07-17 07:56:40 -04:00
2024-07-17 10:43:16 -04:00
- Provide the option to enable IPv6 Privacy Extensions.
2024-05-10 23:15:42 -04:00
2023-05-08 09:45:18 -04:00
### mmap ASLR
2024-07-17 10:43:16 -04:00
- The bits of entropy used for mmap ASLR are maxed out via
`/usr/libexec/security-misc/mmap-rnd-bits` (set to the values of
`CONFIG_ARCH_MMAP_RND_BITS_MAX` and `CONFIG_ARCH_MMAP_RND_COMPAT_BITS_MAX`
that the kernel was built with), therefore improving its effectiveness.
2023-05-08 09:45:18 -04:00
2021-01-11 21:17:13 -05:00
### Boot parameters
2019-06-23 15:51:53 -04:00
2024-07-14 11:56:25 -04:00
Mitigations for known CPU vulnerabilities are enabled in their strictest form
2024-07-17 08:57:35 -04:00
and simultaneous multithreading (SMT) is disabled. See the
2024-07-14 11:56:25 -04:00
`/etc/default/grub.d/40_cpu_mitigations.cfg` configuration file.
2019-10-14 06:10:08 -04:00
2024-07-14 11:56:25 -04:00
Boot parameters relating to kernel hardening, DMA mitigations, and entropy
generation are outlined in the `/etc/default/grub.d/40_kernel_hardening.cfg`
configuration file.
2024-07-17 10:43:16 -04:00
- Disable merging of slabs with similar size, which reduces the risk of
triggering heap overflows and limits influencing slab cache layout.
2024-07-14 11:56:25 -04:00
2024-07-17 10:43:16 -04:00
- Enable memory zeroing at both allocation and free time, which mitigates some
use-after-free vulnerabilities by erasing sensitive information in memory.
2024-07-14 11:56:25 -04:00
2024-07-17 10:43:16 -04:00
- Enable the kernel page allocator to randomize free lists to limit some data
exfiltration and ROP attacks, especially during the early boot process.
2024-07-14 11:56:25 -04:00
2024-07-17 10:43:16 -04:00
- Enable kernel page table isolation to increase KASLR effectiveness and also
mitigate the Meltdown CPU vulnerability.
2019-06-23 15:51:53 -04:00
2024-07-17 10:43:16 -04:00
- Enable randomization of the kernel stack offset on syscall entries to harden
against memory corruption attacks.
2021-01-11 21:17:13 -05:00
2024-07-17 10:43:16 -04:00
- Disable vsyscalls as they are vulnerable to ROP attacks and have now been
replaced by vDSO.
2019-06-23 15:51:53 -04:00
2024-07-17 10:43:16 -04:00
- Restrict access to debugfs by not registering the file system since it can
contain sensitive information.
2021-01-11 21:17:13 -05:00
2024-07-17 10:43:16 -04:00
- Force kernel panics on "oopses" to potentially indicate and thwart certain
kernel exploitation attempts.
2019-06-23 15:51:53 -04:00
2024-07-17 22:19:27 -04:00
- Provide the option to modify machine check exception handler.
2019-06-23 15:51:53 -04:00
2024-08-02 10:12:50 -04:00
- Provide the option to enable the kernel Electric-Fence sampling-based memory
safety error detector which can identify heap out-of-bounds access, use-after-free,
and invalid-free errors.
2024-07-22 23:12:13 -04:00
- Provide the option to use kCFI as the default CFI implementation since it may be
slightly more resilient to attacks that are able to write arbitrary executables
in memory (when using Linux kernel version >= 6.2).
2024-07-22 03:26:00 -04:00
2024-07-17 22:19:27 -04:00
- Provide the option to disable support for all x86 processes and syscalls to reduce
2024-07-17 10:43:16 -04:00
attack surface (when using Linux kernel version >= 6.7).
2020-01-30 01:22:06 -05:00
2024-07-17 10:43:16 -04:00
- Enable strict IOMMU translation to protect against DMA attacks and disable
the busmaster bit on all PCI bridges during the early boot process.
2019-07-15 09:03:30 -04:00
2024-07-17 10:43:16 -04:00
- Do not credit the CPU or bootloader as entropy sources at boot in order to
maximize the absolute quantity of entropy in the combined pool.
2022-07-13 08:25:53 -04:00
2024-07-17 10:43:16 -04:00
- Obtain more entropy at boot from RAM as the runtime memory allocator is
being initialized.
2021-01-11 21:17:13 -05:00
2024-07-17 22:19:27 -04:00
- Provide the option to disable the entire IPv6 stack to reduce attack surface.
2022-07-13 08:25:53 -04:00
2024-07-14 11:56:25 -04:00
Disallow sensitive kernel information leaks in the console during boot. See
2024-07-15 01:05:00 -04:00
the `/etc/default/grub.d/41_quiet_boot.cfg` configuration file.
2021-01-11 21:17:13 -05:00
2023-11-03 14:53:40 -04:00
### Kernel Modules
2023-12-25 08:37:23 -05:00
2023-11-03 14:53:40 -04:00
#### Kernel Module Signature Verification
2024-07-17 10:43:16 -04:00
Not yet implemented due to issues:
2023-11-03 15:55:17 -04:00
2024-07-17 10:43:16 -04:00
- https://forums.whonix.org/t/enforce-kernel-module-software-signature-verification-module-signing-disallow-kernel-module-loading-by-default/7880/64
- https://github.com/dell/dkms/issues/359
2023-11-03 14:53:40 -04:00
See:
2024-07-17 10:43:16 -04:00
- `/etc/default/grub.d/40_signed_modules.cfg`
2023-11-03 14:53:40 -04:00
2023-11-04 10:33:35 -04:00
#### Disables the loading of new modules to the kernel after the fact
2024-07-17 10:43:16 -04:00
Not yet implemented due to issues:
2023-11-05 20:54:43 -05:00
2024-07-17 10:43:16 -04:00
- https://github.com/Kicksecure/security-misc/pull/152
2023-11-05 20:54:43 -05:00
2023-12-25 08:37:23 -05:00
A systemd service dynamically sets the kernel parameter `modules_disabled` to 1,
preventing new modules from being loaded. Since this isn't configured directly
within systemctl, it does not break the loading of legitimate and necessary
modules for the user, like drivers etc., given they are plugged in on startup.
2023-11-04 10:33:35 -04:00
2024-07-11 12:42:37 -04:00
#### Blacklist and disable kernel modules
2021-01-11 21:17:13 -05:00
2024-07-13 09:32:01 -04:00
Conntrack: Deactivates Netfilter's connection tracking helper module which
increases kernel attack surface by enabling superfluous functionality such
as IRC parsing in the kernel. See `/etc/modprobe.d/30_security-misc_conntrack.conf` .
2024-07-12 02:22:10 -04:00
Certain kernel modules are blacklisted by default to reduce attack surface via
`/etc/modprobe.d/30_security-misc_blacklist.conf` . Blacklisting prevents kernel
modules from automatically starting.
2024-07-17 10:43:16 -04:00
- CD-ROM/DVD: Blacklist modules required for CD-ROM/DVD devices.
2024-07-12 02:22:10 -04:00
2024-07-17 10:43:16 -04:00
- Framebuffer Drivers: Blacklisted as they are well-known to be buggy, cause
kernel panics, and are generally only used by legacy devices.
2024-07-12 02:22:10 -04:00
2024-07-17 10:43:16 -04:00
- Miscellaneous: Blacklist an assortment of other modules to prevent them from
automatically loading.
2024-07-12 02:22:10 -04:00
Specific kernel modules are entirely disabled to reduce attack surface via
`/etc/modprobe.d/30_security-misc_disable.conf` . Disabling prohibits kernel
2024-07-17 10:43:16 -04:00
modules from starting. This approach should not be considered comprehensive;
rather, it is a form of badness enumeration. Any potential candidates for future
2024-07-13 09:30:55 -04:00
disabling should first be blacklisted for a suitable amount of time.
2024-07-12 02:22:10 -04:00
2024-07-17 22:21:37 -04:00
- Optional - Bluetooth: Disabled to reduce attack surface.
- Optional - CPU MSRs: Disabled as can be abused to write to arbitrary memory.
2024-07-17 10:43:16 -04:00
- File Systems: Disable uncommon and legacy file systems.
2024-07-12 02:22:10 -04:00
2024-07-17 10:43:16 -04:00
- FireWire (IEEE 1394): Disabled as they are often vulnerable to DMA attacks.
2024-07-12 02:22:10 -04:00
2024-07-17 10:43:16 -04:00
- GPS: Disable GPS-related modules such as those required for Global Navigation
Satellite Systems (GNSS).
2024-07-12 02:22:10 -04:00
2024-07-17 22:21:37 -04:00
- Optional - Intel Management Engine (ME): Provides some disabling of the interface
between the Intel ME and the OS. May lead to breakages in places such as security,
power management, display, and DRM. See discussion: https://github.com/Kicksecure/security-misc/issues/239
2024-07-12 02:22:10 -04:00
2024-07-17 10:43:16 -04:00
- Intel Platform Monitoring Technology Telemetry (PMT): Disable some functionality
of the Intel PMT components.
2024-07-17 09:07:31 -04:00
2024-07-17 10:43:16 -04:00
- Network File Systems: Disable uncommon and legacy network file systems.
2024-07-12 02:22:10 -04:00
2024-07-17 22:21:37 -04:00
- Network Protocols: A wide array of uncommon and legacy network protocols and drivers
are disabled.
2024-07-12 02:22:10 -04:00
2024-07-17 10:43:16 -04:00
- Miscellaneous: Disable an assortment of other modules such as those required
for amateur radio, floppy disks, and vivid.
2024-07-12 02:22:10 -04:00
2024-07-17 10:43:16 -04:00
- Thunderbolt: Disabled as they are often vulnerable to DMA attacks.
2023-11-05 14:41:01 -05:00
2024-07-17 22:21:37 -04:00
- Optional - USB Video Device Class: Disables the USB-based video streaming driver for
devices like some webcams and digital camcorders.
2021-01-11 21:17:13 -05:00
### Other
2019-12-23 03:57:36 -05:00
2024-07-17 10:43:16 -04:00
- A systemd service clears the System.map file on boot as these contain kernel
pointers. The file is completely overwritten with zeroes to ensure it cannot
be recovered. See:
2021-01-11 21:17:13 -05:00
`/etc/kernel/postinst.d/30_remove-system-map`
`/lib/systemd/system/remove-system-map.service`
2021-08-03 12:56:31 -04:00
`/usr/libexec/security-misc/remove-system.map`
2021-01-11 21:17:13 -05:00
2024-07-17 10:43:16 -04:00
- Coredumps are disabled as they may contain important information such as
encryption keys or passwords. See:
2021-01-11 21:17:13 -05:00
`/etc/security/limits.d/30_security-misc.conf`
`/etc/sysctl.d/30_security-misc.conf`
2019-12-23 03:57:36 -05:00
2021-01-11 21:17:13 -05:00
`/lib/systemd/coredump.conf.d/30_security-misc.conf`
2020-01-11 15:17:06 -05:00
2024-07-17 10:43:16 -04:00
- An initramfs hook sets the sysctl values in `/etc/sysctl.conf` and
`/etc/sysctl.d` before init is executed so sysctl hardening is enabled as
early as possible. This is implemented for `initramfs-tools` only because
this is not needed for `dracut` as `dracut` does that by default, at
least on `systemd` enabled systems. Not researched for non-`systemd` systems
by the author of this part of the readme.
2020-01-15 10:08:57 -05:00
2023-11-05 14:41:01 -05:00
## Network hardening
2020-01-14 09:18:30 -05:00
2024-07-17 10:43:16 -04:00
Not yet implemented due to issues:
2024-07-17 07:56:40 -04:00
2024-07-17 10:43:16 -04:00
- https://github.com/Kicksecure/security-misc/pull/145
2024-07-17 07:56:40 -04:00
2024-07-17 10:43:16 -04:00
- https://github.com/Kicksecure/security-misc/issues/184
2024-07-17 07:56:40 -04:00
2024-07-17 10:43:16 -04:00
- Unlike version 4, IPv6 addresses can provide information not only about the
originating network but also the originating device. We prevent this from
happening by enabling the respective privacy extensions for IPv6.
2023-11-05 14:41:01 -05:00
2024-07-17 10:43:16 -04:00
- In addition, we deny the capability to track the originating device in the
network at all, by using randomized MAC addresses per connection by
default.
2023-11-04 10:33:35 -04:00
2023-11-05 14:54:05 -05:00
See:
2024-07-17 10:43:16 -04:00
- `/usr/lib/NetworkManager/conf.d/80_ipv6-privacy.conf`
- `/usr/lib/NetworkManager/conf.d/80_randomize-mac.conf`
- `/usr/lib/systemd/networkd.conf.d/80_ipv6-privacy-extensions.conf`
2023-11-05 14:54:05 -05:00
2023-12-25 09:10:31 -05:00
## Bluetooth Hardening
2023-11-05 14:54:05 -05:00
2023-12-25 09:10:31 -05:00
### Bluetooth Status: Enabled but Defaulted to Off
- **Default Behavior**: Although Bluetooth capability is 'enabled' in the kernel, security-misc deviates from the usual behavior by starting with Bluetooth turned off at system start. This setting remains until the user explicitly opts to activate Bluetooth.
- **User Control**: Users have the freedom to easily switch Bluetooth on and off in the usual way, exercising their own discretion. This can be done via the Bluetooth toggle through the usual way, that is either through GUI settings application or command line commands.
- **Enhanced Privacy Settings**: We enforce more private defaults for Bluetooth connections. This includes the use of private addresses and strict timeout settings for discoverability and visibility.
- **Security Considerations**: Despite these measures, it's important to note that Bluetooth technology, by its nature, may still be prone to exploits due to its history of security vulnerabilities. Thus, we recommend users to opt-out of using Bluetooth when possible.
### Configuration Details
- See configuration: `/etc/bluetooth/30_security-misc.conf`
- For more information and discussion: [GitHub Pull Request ](https://github.com/Kicksecure/security-misc/pull/145 )
### Understanding Bluetooth Terms
- **Disabling Bluetooth**: This means the absence of the Bluetooth kernel module. When disabled, Bluetooth is non-existent in the system - it cannot be seen, set, configured, or interacted with in any way.
- **Turning Bluetooth On/Off**: This refers to a software toggle. Normally, on Debian systems, Bluetooth is 'on' when the system boots up. It actively searches for known devices to auto-connect and may be discoverable or visible under certain conditions. Our default ensures that Bluetooth is off on startup. However, it remains 'enabled' in the kernel, meaning the kernel can use the Bluetooth protocol and has the necessary modules.
### Quick Toggle Guide
- **Turning Bluetooth On**: Simply click the Bluetooth button in the settings application or on the tray, and switch the toggle. It's a straightforward action that can be completed in less than a second.
2023-11-05 14:54:05 -05:00
2023-12-25 09:10:31 -05:00
- **Turning Bluetooth Off**: Follow the same procedure as turning it on but switch the toggle to the off position.
2023-11-04 10:33:35 -04:00
2021-01-11 21:17:13 -05:00
## Entropy collection improvements
2019-11-23 09:06:28 -05:00
2024-07-17 10:43:16 -04:00
- The `jitterentropy_rng` kernel module is loaded as early as possible during
boot to gather more entropy via the
`/usr/lib/modules-load.d/30_security-misc.conf` configuration file.
2019-11-23 09:06:28 -05:00
2024-07-17 10:43:16 -04:00
- Distrusts the CPU for initial entropy at boot as it is not possible to
audit, may contain weaknesses or a backdoor. Similarly, do not credit the
bootloader seed for initial entropy. For references, see:
`/etc/default/grub.d/40_kernel_hardening.cfg`
2020-02-25 02:08:10 -05:00
2024-07-17 10:43:16 -04:00
- Gathers more entropy during boot if using the linux-hardened kernel patch.
2019-12-06 09:30:05 -05:00
2021-01-11 21:17:13 -05:00
## Restrictive mount options
2019-12-06 09:30:05 -05:00
2023-12-25 08:37:23 -05:00
A systemd service is triggered on boot to remount all sensitive partitions and
directories with significantly more secure hardened mount options. Since this
would require manual tuning for a given specific system, we handle it by
creating a very solid configuration file for that very system on package
2024-07-17 10:43:16 -04:00
installation.
2023-11-04 10:33:35 -04:00
2021-01-12 03:24:11 -05:00
Not enabled by default yet. In development. Help welcome.
2024-07-17 10:43:16 -04:00
- https://www.kicksecure.com/wiki/Dev/remount-secure
- https://github.com/Kicksecure/security-misc/issues/157
- https://forums.whonix.org/t/re-mount-home-and-other-with-noexec-and-nosuid-among-other-useful-mount-options-for-better-security/
2021-01-12 03:24:11 -05:00
2021-01-11 21:17:13 -05:00
## Root access restrictions
2019-07-13 12:29:10 -04:00
2024-07-17 10:43:16 -04:00
- `su` is restricted to only users within the group `sudo` which prevents
users from using `su` to gain root access or to switch user accounts -
`/usr/share/pam-configs/wheel-security-misc` (which results in a change in
file `/etc/pam.d/common-auth` ).
2019-07-31 11:15:30 -04:00
2024-07-17 10:43:16 -04:00
- Add user `root` to group `sudo` . This is required due to the above
restriction so that logging in from a virtual console is still possible -
`debian/security-misc.postinst`
2019-07-31 11:15:30 -04:00
2024-07-17 10:43:16 -04:00
- Abort login for users with locked passwords -
`/usr/libexec/security-misc/pam-abort-on-locked-password` .
2019-08-17 06:53:45 -04:00
2024-07-17 10:43:16 -04:00
- Logging into the root account from a virtual, serial, or other console is
prevented by shipping an existing and empty `/etc/securetty` file (deletion
of `/etc/securetty` has a different effect).
2019-08-15 11:08:48 -04:00
2023-12-25 08:37:23 -05:00
This package does not yet automatically lock the root account password. It is
2024-07-17 10:43:16 -04:00
not clear if this would be sane in such a package, although it is recommended to
2023-12-25 08:37:23 -05:00
lock and expire the root account.
2019-08-15 11:08:48 -04:00
2024-07-17 10:43:16 -04:00
In new Kicksecure builds, the root account will be locked by package
2020-04-08 08:30:05 -04:00
dist-base-files.
2021-01-11 21:17:13 -05:00
See:
2024-07-17 10:43:16 -04:00
- https://www.kicksecure.com/wiki/Root
- https://www.kicksecure.com/wiki/Dev/Permissions
- https://forums.whonix.org/t/restrict-root-access/7658
2021-01-11 21:17:13 -05:00
2019-07-17 17:06:17 -04:00
However, a locked root password will break rescue and emergency shell.
2023-12-25 08:37:23 -05:00
Therefore, this package enables passwordless rescue and emergency shell. This is
2024-07-17 10:49:21 -04:00
the same solution that Debian will likely adopt for the Debian installer:
2023-12-25 08:37:23 -05:00
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802211
2021-01-11 21:17:13 -05:00
See:
2024-07-17 10:49:21 -04:00
- `/etc/systemd/system/emergency.service.d/override.conf`
- `/etc/systemd/system/rescue.service.d/override.conf`
2021-01-11 21:17:13 -05:00
2019-07-17 17:06:17 -04:00
Adverse security effects can be prevented by setting up BIOS password
2024-07-17 10:49:21 -04:00
protection, GRUB password protection, and/or full disk encryption.
2019-07-17 17:06:17 -04:00
2021-01-11 21:17:13 -05:00
## Console lockdown
2024-07-17 10:49:21 -04:00
This uses pam_access to allow members of group `console` to use the console but
2021-01-11 21:17:13 -05:00
restrict everyone else (except members of group `console-unrestricted` ) from
2024-07-17 10:49:21 -04:00
using the console with ancient, unpopular login methods such as `/bin/login` over
2023-12-25 08:37:23 -05:00
networks as this might be exploitable. (CVE-2001-0797)
2021-01-11 21:17:13 -05:00
2023-12-25 08:37:23 -05:00
This is not enabled by default in this package since this package does not know
2024-07-17 10:49:21 -04:00
which users should be added to group 'console' and thus, would break console access.
2021-01-11 21:17:13 -05:00
See:
2024-07-17 10:49:21 -04:00
- `/usr/share/pam-configs/console-lockdown-security-misc`
- `/etc/security/access-security-misc.conf`
2021-01-11 21:17:13 -05:00
## Brute force attack protection
2021-08-10 15:11:01 -04:00
User accounts are locked after 50 failed login attempts using `pam_faillock` .
2021-01-11 21:17:13 -05:00
Informational output during Linux PAM:
2024-07-17 10:49:21 -04:00
- Show failed and remaining password attempts.
- Document unlock procedure if Linux user account got locked.
- Point out that there is no password feedback for `su` .
- Explain locked root account if locked.
2021-01-11 21:17:13 -05:00
See:
2024-07-17 10:49:21 -04:00
- `/usr/share/pam-configs/tally2-security-misc`
- `/usr/libexec/security-misc/pam-info`
- `/usr/libexec/security-misc/pam-abort-on-locked-password`
2020-04-09 05:45:29 -04:00
2021-01-11 21:17:13 -05:00
## Access rights restrictions
### Strong user account separation
2023-11-03 10:44:48 -04:00
#### Permission Lockdown
2024-07-17 10:49:21 -04:00
Read, write, and execute access for "others" are removed during package
installation, upgrade, or PAM `mkhomedir` for all users who have home folders in
2023-12-25 08:37:23 -05:00
`/home` by running, for example:
2021-01-11 21:17:13 -05:00
2024-07-17 10:49:21 -04:00
```
chmod o-rwx /home/user
```
2021-01-11 21:17:13 -05:00
2023-12-25 08:37:23 -05:00
This will be done only once per folder in `/home` so users who wish to relax
file permissions are free to do so. This is to protect files in a home folder
that were previously created with lax file permissions prior to the installation
of this package.
2021-01-11 21:17:13 -05:00
See:
2024-07-17 10:49:21 -04:00
- `debian/security-misc.postinst`
- `/usr/libexec/security-misc/permission-lockdown`
- `/usr/share/pam-configs/mkhomedir-security-misc`
2021-01-11 21:17:13 -05:00
2023-11-03 10:44:48 -04:00
#### umask
2024-07-17 10:49:21 -04:00
Default `umask` is set to `027` for files created by non-root users such as
user `user` . Broken. Disabled. See:
2024-01-06 09:10:45 -05:00
* https://github.com/Kicksecure/security-misc/issues/184
2023-11-03 10:44:48 -04:00
2024-07-17 10:49:21 -04:00
This is done using the PAM module `pam_mkhomedir.so umask=027` .
2023-11-03 10:44:48 -04:00
2024-07-17 10:49:21 -04:00
This means files created by non-root users cannot be read by other non-root
2023-12-25 08:37:23 -05:00
users by default. While Permission Lockdown already protects the `/home` folder,
this protects other folders such as `/tmp` .
2023-11-03 10:44:48 -04:00
2023-12-25 08:37:23 -05:00
`group` read permissions are not removed. This is unnecessary due to Debian's
use of User Private Groups (UPGs). See also:
https://wiki.debian.org/UserPrivateGroups
2023-11-03 10:44:48 -04:00
2024-07-17 10:49:21 -04:00
Default `umask` is unchanged for root because then configuration files created
2023-12-25 08:37:23 -05:00
in `/etc` by the system administrator would be unreadable by "others" and break
applications. Examples include `/etc/firefox-esr` and `/etc/thunderbird` .
2023-11-03 10:44:48 -04:00
See:
2024-07-17 10:49:21 -04:00
- `/usr/share/pam-configs/umask-security-misc`
2023-11-03 10:44:48 -04:00
2021-01-11 21:17:13 -05:00
### SUID / SGID removal and permission hardening
2023-11-04 10:33:35 -04:00
#### SUID / SGID removal
2023-12-25 08:37:23 -05:00
A systemd service removes SUID / SGID bits from non-essential binaries as these
are often used in privilege escalation attacks.
2023-11-04 10:33:35 -04:00
#### File permission hardening
2023-12-25 08:37:23 -05:00
Various file permissions are reset with more secure and hardened defaults. These
include but are not limited to:
2023-11-04 10:33:35 -04:00
2024-07-17 10:49:21 -04:00
- Limiting `/home` and `/root` to the root only.
- Limiting crontab to root as well as all the configuration files for cron.
- Limiting the configuration for cups and ssh.
- Protecting the information of sudoers from others.
- Protecting various system-relevant files and modules.
2023-11-05 14:41:01 -05:00
2024-07-17 10:49:21 -04:00
##### permission-hardener
2023-12-25 09:04:10 -05:00
`permission-hardener` removes SUID / SGID bits from non-essential binaries as
2024-01-16 09:26:21 -05:00
these are often used in privilege escalation attacks. It is enabled by default
and applied at security-misc package installation and upgrade time.
2021-01-12 03:24:11 -05:00
2023-12-25 09:04:10 -05:00
There is also an optional systemd unit which does the same at boot time that
2024-01-02 07:34:29 -05:00
can be enabled by running `systemctl enable permission-hardener.service` as
2023-12-25 09:04:10 -05:00
root. The hardening at boot time is not the default because this slows down
2024-07-17 10:49:21 -04:00
the boot process too much.
2021-01-11 21:17:13 -05:00
See:
2024-01-02 07:34:29 -05:00
* `/usr/bin/permission-hardener`
2023-12-25 09:04:10 -05:00
* `debian/security-misc.postinst`
2024-01-02 07:34:29 -05:00
* `/lib/systemd/system/permission-hardener.service`
* `/etc/permission-hardener.d`
2021-01-11 21:17:13 -05:00
* https://forums.whonix.org/t/disable-suid-binaries/7706
2022-05-19 17:25:58 -04:00
* https://www.kicksecure.com/wiki/SUID_Disabler_and_Permission_Hardener
2021-01-11 21:17:13 -05:00
### Access rights relaxations
2021-01-12 03:24:11 -05:00
This is not enabled yet because hidepid is not enabled by default.
2021-01-11 21:17:13 -05:00
Calls to `pkexec` are redirected to `lxqt-sudo` because `pkexec` is
incompatible with `hidepid=2` .
See:
* `/usr/bin/pkexec.security-misc`
* https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860040
* https://forums.whonix.org/t/cannot-use-pkexec/8129
2023-12-25 09:04:10 -05:00
2021-01-11 21:17:13 -05:00
## Application-specific hardening
2024-07-17 10:49:21 -04:00
- Enables "`apt-get --error-on=any`" which makes apt exit non-zero for
transient failures. - `/etc/apt/apt.conf.d/40error-on-any` .
- Enables APT seccomp-BPF sandboxing - `/etc/apt/apt.conf.d/40sandbox` .
- Deactivates previews in Dolphin.
- Deactivates previews in Nautilus -
`/usr/share/glib-2.0/schemas/30_security-misc.gschema.override` .
- Deactivates thumbnails in Thunar.
- Rationale: lower attack surface when using the file manager
- https://forums.whonix.org/t/disable-preview-in-file-manager-by-default/18904
- Thunderbird is hardened with the following options:
- Displays domain names in punycode to prevent IDN homograph attacks (a
form of phishing).
- Strips email client information from sent email headers.
- Strips user time information from sent email headers by replacing the
originating time zone with UTC and rounding the timestamp to the nearest
minute.
- Disables scripting when viewing PDF files.
- Disables implicit outgoing connections.
- Disables all and any kind of telemetry.
- Security and privacy enhancements for gnupg's config file
`/etc/skel/.gnupg/gpg.conf` . See also:
- https://raw.github.com/ioerror/torbirdy/master/gpg.conf
- https://github.com/ioerror/torbirdy/pull/11
### Project scope of application-specific hardening
2021-01-11 21:17:13 -05:00
2023-12-04 10:58:16 -05:00
Added in December 2023.
2023-12-25 08:37:23 -05:00
Before sending pull requests to harden arbitrary applications, please note the
scope of security-misc is limited to default installed applications in
2024-07-17 10:49:21 -04:00
Kicksecure and Whonix. This includes:
2023-11-06 13:47:30 -05:00
2024-07-17 10:49:21 -04:00
- Thunderbird, VLC Media Player, KeePassXC
- Debian Specific System Components (APT, DPKG)
- System Services (NetworkManager IPv6 privacy options, MAC address
randomization)
- Actually used development utilities such as `git` .
2023-11-06 13:47:30 -05:00
2023-12-25 08:37:23 -05:00
It will not be possible to review and merge "1500" settings profiles for
arbitrary applications outside of this context.
2023-11-06 13:47:30 -05:00
2023-12-25 08:37:23 -05:00
The main objective of security-misc is to harden Kicksecure and its derivatives,
such as Whonix, by implementing robust security settings. It's designed to be
compatible with Debian, reflecting a commitment to clean implementation and
sound design principles. However, it's important to note that security-misc is a
component of Kicksecure, not a substitute for it. The intention isn't to
recreate Kicksecure within security-misc. Instead, specific security
2024-07-17 10:49:21 -04:00
enhancements, like recommending a curated list of security-focused
2023-12-25 08:37:23 -05:00
default packages (e.g., `libpam-tmpdir` ), should be integrated directly into
2024-07-17 10:49:21 -04:00
those appropriate areas of Kicksecure (e.g. `kicksecure-meta-packages` ).
2023-12-04 10:48:27 -05:00
2023-12-25 08:37:23 -05:00
Discussion: https://github.com/Kicksecure/security-misc/issues/154
2019-09-15 10:07:50 -04:00
2024-07-17 10:49:21 -04:00
### Development philosophy
2023-12-04 10:58:16 -05:00
Added in December 2023.
2024-07-17 10:49:21 -04:00
Maintainability is a key priority \[1\]. Before modifying settings in the
2023-12-25 08:37:23 -05:00
downstream security-misc, it's essential to first engage with upstream
developers to propose these changes as defaults. This step should only be
bypassed if there's a clear, prior indication from upstream that such changes
won't be accepted. Additionally, before implementing any workarounds, consulting
2024-07-17 10:49:21 -04:00
with upstream is necessary to avoid future unmaintainable complexity.
2023-12-04 10:58:16 -05:00
2023-12-25 08:37:23 -05:00
If debugging features are disabled, pull requests won't be merged until there is
a corresponding pull request for the debug-misc package to re-enable these. This
2024-07-17 10:49:21 -04:00
is to avoid configuring the system into a corner where it can no longer be
2023-12-25 08:37:23 -05:00
debugged.
2023-12-04 10:58:16 -05:00
2023-12-25 08:37:23 -05:00
\[1\] https://www.kicksecure.com/wiki/Dev/maintainability
2023-12-04 10:58:16 -05:00
2021-01-11 21:17:13 -05:00
## Opt-in hardening
Some hardening is opt-in as it causes too much breakage to be enabled by
default.
2024-07-17 10:49:21 -04:00
- An optional systemd service mounts `/proc` with `hidepid=2` at boot to
prevent users from seeing another user's processes. This is disabled by
default because it is incompatible with `pkexec` . It can be enabled by
executing `systemctl enable proc-hidepid.service` as root.
2021-01-11 21:17:13 -05:00
2024-07-17 10:49:21 -04:00
- A systemd service restricts `/proc/cpuinfo` , `/proc/bus` , `/proc/scsi` , and
`/sys` to the root user. This hides a lot of hardware identifiers from
unprivileged users and increases security as `/sys` exposes a lot of
information that shouldn't be accessible to unprivileged users. As this will
break many things, it is disabled by default and can optionally be enabled
by executing `systemctl enable hide-hardware-info.service` as root.
2021-01-11 21:17:13 -05:00
2024-07-17 10:49:21 -04:00
## Miscellaneous
2021-08-17 15:23:49 -04:00
2024-07-17 10:49:21 -04:00
- Hardened malloc compatibility for haveged workaround
`/lib/systemd/system/haveged.service.d/30_security-misc.conf`
2021-08-17 15:23:49 -04:00
2024-07-17 10:49:21 -04:00
- Set `dracut` `reproducible=yes` setting
2021-09-04 18:28:37 -04:00
2024-07-17 10:49:21 -04:00
## Legal
2023-12-04 11:38:49 -05:00
`/usr/lib/issue.d/20_security-misc.issue`
https://github.com/Kicksecure/security-misc/pull/167
2021-01-11 21:17:13 -05:00
## Related
2019-12-16 06:24:14 -05:00
2023-12-25 08:37:23 -05:00
- Linux Kernel Runtime Guard (LKRG)
- tirdad - TCP ISN CPU Information Leak Protection.
- Kicksecure (TM) - a security-hardened Linux Distribution
- And more.
- https://www.kicksecure.com/wiki/Linux_Kernel_Runtime_Guard_LKRG
- https://github.com/Kicksecure/tirdad
- https://www.kicksecure.com
- https://github.com/Kicksecure
2019-12-16 06:24:14 -05:00
2021-01-11 21:17:13 -05:00
## Discussion
2019-09-15 10:07:50 -04:00
2022-05-19 17:25:58 -04:00
Happening primarily in forums.
2021-01-11 21:17:13 -05:00
2019-09-15 10:07:50 -04:00
https://forums.whonix.org/t/kernel-hardening/7296
2021-01-11 21:17:13 -05:00
## How to install `security-misc`
2015-12-14 21:00:24 -05:00
2022-05-19 17:25:58 -04:00
See https://www.kicksecure.com/wiki/Security-misc#install
2015-12-14 21:00:24 -05:00
2021-01-11 21:17:13 -05:00
## How to Build deb Package from Source Code
2015-12-14 21:00:24 -05:00
2020-04-02 07:22:47 -04:00
Can be build using standard Debian package build tools such as:
2023-12-25 08:37:23 -05:00
dpkg-buildpackage -b
2020-04-02 07:22:47 -04:00
2023-12-25 08:37:23 -05:00
See instructions. (Replace `generic-package` with the actual name of this
package `security-misc` .)
2020-04-15 14:05:37 -04:00
2023-12-25 08:37:23 -05:00
- **A)**
[easy ](https://www.kicksecure.com/wiki/Dev/Build_Documentation/generic-package/easy ),
*OR*
- **B)** [including verifying software
signatures](https://www.kicksecure.com/wiki/Dev/Build_Documentation/generic-package)
2015-12-14 21:00:24 -05:00
2021-01-11 21:17:13 -05:00
## Contact
2015-12-14 21:00:24 -05:00
2023-12-25 08:37:23 -05:00
- [Free Forum Support ](https://forums.kicksecure.com )
- [Professional Support ](https://www.kicksecure.com/wiki/Professional_Support )
2015-12-14 21:00:24 -05:00
2021-01-11 21:17:13 -05:00
## Donate
2015-12-14 21:00:24 -05:00
2023-12-25 08:37:23 -05:00
`security-misc` requires [donations ](https://www.kicksecure.com/wiki/Donate ) to
stay alive!