security-misc/etc/default/grub.d/40_kernel_hardening.cfg

59 lines
2.3 KiB
INI
Raw Normal View History

2019-11-05 09:55:43 -05:00
## Copyright (C) 2019 - 2019 ENCRYPTED SUPPORT LP <adrelanos@riseup.net>
## See the file COPYING for copying conditions.
2019-12-23 14:57:43 -05:00
kver="$(dpkg-query --show --showformat='${Version}' linux-image-amd64)"
2019-12-23 05:00:35 -05:00
#echo "## kver: $kver"
2019-12-18 15:43:01 -05:00
## Disables the merging of slabs of similar sizes.
## Sometimes a slab can be used in a vulnerable way which an attacker can exploit.
2019-05-05 10:42:03 -04:00
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX slab_nomerge"
2019-05-05 16:17:33 -04:00
2019-12-18 15:43:01 -05:00
## Enables sanity checks (F) and redzoning (Z).
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX slub_debug=FZ"
2019-05-05 16:17:33 -04:00
2019-12-18 15:43:01 -05:00
## Zero memory at allocation and free time.
2019-12-23 05:00:35 -05:00
if dpkg --compare-versions "$kver" ge "5.3"; then
#echo "## $kver grater or equal 5.3: yes"
2019-12-18 15:43:01 -05:00
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX init_on_alloc=1 init_on_free=1"
else
2019-12-23 05:00:35 -05:00
#echo "## $kver grater or equal 5.3: no"
2019-12-18 15:43:01 -05:00
## SLUB poisoning and page poisoning is used if the kernel
## does not yet support init_on_{,alloc,free}.
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX slub_debug=P"
if command -v "qubesdb-read" >/dev/null 2>&1 ; then
## https://github.com/QubesOS/qubes-issues/issues/5212#issuecomment-533873012
true "skip adding page_poison=1 in Qubes"
else
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX page_poison=1"
fi
fi
2019-05-05 16:17:33 -04:00
2019-11-05 09:55:43 -05:00
## Makes the kernel panic on uncorrectable errors in ECC memory that an attacker could exploit.
2019-05-05 16:17:33 -04:00
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX mce=0"
2019-06-23 13:54:34 -04:00
2019-11-05 09:55:43 -05:00
## Enables Kernel Page Table Isolation which mitigates Meltdown and improves KASLR.
2019-06-23 13:54:34 -04:00
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX pti=on"
2019-11-05 09:55:43 -05:00
## Enables all mitigations for the MDS vulnerability.
## Disables smt which can be used to exploit the MDS vulnerability.
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX mds=full,nosmt"
2019-12-18 15:43:01 -05:00
## Vsyscalls are obsolete, are at fixed addresses and are a target for ROP.
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX vsyscall=none"
## Enables page allocator freelist randomization.
if dpkg --compare-versions "${kver}" ge "5.2"; then
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX page_alloc.shuffle=1"
fi
## Enables kernel lockdown.
##
## Disabled for now as it enforces module signature verification which breaks
## too many things.
2019-12-23 03:46:02 -05:00
## https://forums.whonix.org/t/enforce-kernel-module-software-signature-verification-module-signing-disallow-kernel-module-loading-by-default/7880
##
#if dpkg --compare-versions "${kver}" ge "5.4"; then
# GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX lockdown=confidentiality"
#fi