Merge remote-tracking branch 'raja/sysctl'

This commit is contained in:
Patrick Schleizer 2024-07-17 08:02:45 -04:00
commit 070bb46a08
No known key found for this signature in database
GPG Key ID: CB8D50BB77BB3C48
5 changed files with 57 additions and 8 deletions

View File

@ -36,8 +36,8 @@ space, user space, core dumps, and swap space.
- Entirely disables the SysRq key so that the Secure Attention Key (SAK) - Entirely disables the SysRq key so that the Secure Attention Key (SAK)
can no longer be utilised. See [documentation](https://www.kicksecure.com/wiki/SysRq). can no longer be utilised. See [documentation](https://www.kicksecure.com/wiki/SysRq).
- Provide option to disable unprivileged user namespaces as they can lead to - Provide the option to disable unprivileged user namespaces as they can lead to
privilege escalation. substantial privilege escalation.
- Restrict kernel profiling and the performance events system to `CAP_PERFMON`. - Restrict kernel profiling and the performance events system to `CAP_PERFMON`.
@ -46,8 +46,8 @@ space, user space, core dumps, and swap space.
- Disable asynchronous I/O (when using Linux kernel version >= 6.6). - Disable asynchronous I/O (when using Linux kernel version >= 6.6).
- Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it - Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it
enables programs to inspect and modify other active processes. Provide option enables programs to inspect and modify other active processes. Provide the
to also entirely disable the use of `ptrace()` for all processes. option to also entirely disable the use of `ptrace()` for all processes.
- Prevent hardlink and symlink TOCTOU races in world-writable directories. - Prevent hardlink and symlink TOCTOU races in world-writable directories.
@ -82,13 +82,15 @@ Various networking components of the TCP/IP stack are hardened for IPv4/6.
- Do not accept IPv6 router advertisements and solicitations. - Do not accept IPv6 router advertisements and solicitations.
- Provide option to disable SACK and DSACK as they have historically been a - Provide the option to disable SACK and DSACK as they have historically been
vector for exploitation. a known vector for exploitation.
- Disable TCP timestamps as it can allow detecting the system time. - Disable TCP timestamps as it can allow detecting the system time.
- Provide option to log of packets with impossible source or destination - Provide the option to log of packets with impossible source or destination
addresses to enable inspection and further analysis. addresses to enable further inspection and analysis.
- Provide the option to enable IPv6 Privacy Extensions.
### mmap ASLR ### mmap ASLR
@ -227,6 +229,12 @@ disabling should first be blacklisted for a suitable amount of time.
## Network hardening ## Network hardening
Not yet due to issues:
- https://github.com/Kicksecure/security-misc/pull/145
- https://github.com/Kicksecure/security-misc/issues/184
- Unlike version 4, IPv6 addresses can provide information not only about the - Unlike version 4, IPv6 addresses can provide information not only about the
originating network, but also the originating device. We prevent this from originating network, but also the originating device. We prevent this from
happening by enabling the respective privacy extensions for IPv6. happening by enabling the respective privacy extensions for IPv6.

View File

@ -1,2 +1,10 @@
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
##
## https://datatracker.ietf.org/doc/html/rfc4941
## https://github.com/Kicksecure/security-misc/pull/145
## https://github.com/Kicksecure/security-misc/issues/184
##
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
#[connection] #[connection]
#ipv6.ip6-privacy=2 #ipv6.ip6-privacy=2

View File

@ -1,3 +1,11 @@
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
##
## https://datatracker.ietf.org/doc/html/rfc4941
## https://github.com/Kicksecure/security-misc/pull/145
## https://github.com/Kicksecure/security-misc/issues/184
##
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
#[device-mac-randomization] #[device-mac-randomization]
#wifi.scan-rand-mac-address=yes #wifi.scan-rand-mac-address=yes

View File

@ -337,3 +337,20 @@ net.ipv4.tcp_timestamps=0
## ##
#net.ipv4.conf.all.log_martians=1 #net.ipv4.conf.all.log_martians=1
#net.ipv4.conf.default.log_martians=1 #net.ipv4.conf.default.log_martians=1
## Enable IPv6 Privacy Extensions prefer temporary addresses over public addresses.
## The temporary/privacy address is used as the source of all outgoing traffic.
## Must be used in combination with /usr/lib/systemd/networkd.conf.d/80_ipv6-privacy-extensions.conf.
## Must be used in combination with /usr/lib/NetworkManager/conf.d/80_ipv6-privacy.conf.
## Should be used with MAC randomisation in /usr/lib/NetworkManager/conf.d/80_randomize-mac.conf.
##
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
##
## https://datatracker.ietf.org/doc/html/rfc4941
## https://github.com/Kicksecure/security-misc/pull/145
## https://github.com/Kicksecure/security-misc/issues/184
##
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
##
#net.ipv6.conf.all.use_tempaddr=2
#net.ipv6.conf.default.use_tempaddr=2

View File

@ -1,2 +1,10 @@
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
##
## https://datatracker.ietf.org/doc/html/rfc4941
## https://github.com/Kicksecure/security-misc/pull/145
## https://github.com/Kicksecure/security-misc/issues/184
##
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
#[Network] #[Network]
#IPv6PrivacyExtensions=kernel #IPv6PrivacyExtensions=kernel