Merge remote-tracking branch 'raja/sysctl'

This commit is contained in:
Patrick Schleizer 2024-07-17 08:02:45 -04:00
commit 070bb46a08
No known key found for this signature in database
GPG Key ID: CB8D50BB77BB3C48
5 changed files with 57 additions and 8 deletions

View File

@ -36,8 +36,8 @@ space, user space, core dumps, and swap space.
- Entirely disables the SysRq key so that the Secure Attention Key (SAK)
can no longer be utilised. See [documentation](https://www.kicksecure.com/wiki/SysRq).
- Provide option to disable unprivileged user namespaces as they can lead to
privilege escalation.
- Provide the option to disable unprivileged user namespaces as they can lead to
substantial privilege escalation.
- Restrict kernel profiling and the performance events system to `CAP_PERFMON`.
@ -46,8 +46,8 @@ space, user space, core dumps, and swap space.
- Disable asynchronous I/O (when using Linux kernel version >= 6.6).
- Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it
enables programs to inspect and modify other active processes. Provide option
to also entirely disable the use of `ptrace()` for all processes.
enables programs to inspect and modify other active processes. Provide the
option to also entirely disable the use of `ptrace()` for all processes.
- Prevent hardlink and symlink TOCTOU races in world-writable directories.
@ -82,13 +82,15 @@ Various networking components of the TCP/IP stack are hardened for IPv4/6.
- Do not accept IPv6 router advertisements and solicitations.
- Provide option to disable SACK and DSACK as they have historically been a
vector for exploitation.
- Provide the option to disable SACK and DSACK as they have historically been
a known vector for exploitation.
- Disable TCP timestamps as it can allow detecting the system time.
- Provide option to log of packets with impossible source or destination
addresses to enable inspection and further analysis.
- Provide the option to log of packets with impossible source or destination
addresses to enable further inspection and analysis.
- Provide the option to enable IPv6 Privacy Extensions.
### mmap ASLR
@ -227,6 +229,12 @@ disabling should first be blacklisted for a suitable amount of time.
## Network hardening
Not yet due to issues:
- https://github.com/Kicksecure/security-misc/pull/145
- https://github.com/Kicksecure/security-misc/issues/184
- Unlike version 4, IPv6 addresses can provide information not only about the
originating network, but also the originating device. We prevent this from
happening by enabling the respective privacy extensions for IPv6.

View File

@ -1,2 +1,10 @@
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
##
## https://datatracker.ietf.org/doc/html/rfc4941
## https://github.com/Kicksecure/security-misc/pull/145
## https://github.com/Kicksecure/security-misc/issues/184
##
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
#[connection]
#ipv6.ip6-privacy=2

View File

@ -1,3 +1,11 @@
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
##
## https://datatracker.ietf.org/doc/html/rfc4941
## https://github.com/Kicksecure/security-misc/pull/145
## https://github.com/Kicksecure/security-misc/issues/184
##
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
#[device-mac-randomization]
#wifi.scan-rand-mac-address=yes

View File

@ -337,3 +337,20 @@ net.ipv4.tcp_timestamps=0
##
#net.ipv4.conf.all.log_martians=1
#net.ipv4.conf.default.log_martians=1
## Enable IPv6 Privacy Extensions prefer temporary addresses over public addresses.
## The temporary/privacy address is used as the source of all outgoing traffic.
## Must be used in combination with /usr/lib/systemd/networkd.conf.d/80_ipv6-privacy-extensions.conf.
## Must be used in combination with /usr/lib/NetworkManager/conf.d/80_ipv6-privacy.conf.
## Should be used with MAC randomisation in /usr/lib/NetworkManager/conf.d/80_randomize-mac.conf.
##
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
##
## https://datatracker.ietf.org/doc/html/rfc4941
## https://github.com/Kicksecure/security-misc/pull/145
## https://github.com/Kicksecure/security-misc/issues/184
##
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
##
#net.ipv6.conf.all.use_tempaddr=2
#net.ipv6.conf.default.use_tempaddr=2

View File

@ -1,2 +1,10 @@
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
##
## https://datatracker.ietf.org/doc/html/rfc4941
## https://github.com/Kicksecure/security-misc/pull/145
## https://github.com/Kicksecure/security-misc/issues/184
##
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
#[Network]
#IPv6PrivacyExtensions=kernel