mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-02-23 10:49:50 -05:00
Merge remote-tracking branch 'raja/sysctl'
This commit is contained in:
commit
070bb46a08
24
README.md
24
README.md
@ -36,8 +36,8 @@ space, user space, core dumps, and swap space.
|
|||||||
- Entirely disables the SysRq key so that the Secure Attention Key (SAK)
|
- Entirely disables the SysRq key so that the Secure Attention Key (SAK)
|
||||||
can no longer be utilised. See [documentation](https://www.kicksecure.com/wiki/SysRq).
|
can no longer be utilised. See [documentation](https://www.kicksecure.com/wiki/SysRq).
|
||||||
|
|
||||||
- Provide option to disable unprivileged user namespaces as they can lead to
|
- Provide the option to disable unprivileged user namespaces as they can lead to
|
||||||
privilege escalation.
|
substantial privilege escalation.
|
||||||
|
|
||||||
- Restrict kernel profiling and the performance events system to `CAP_PERFMON`.
|
- Restrict kernel profiling and the performance events system to `CAP_PERFMON`.
|
||||||
|
|
||||||
@ -46,8 +46,8 @@ space, user space, core dumps, and swap space.
|
|||||||
- Disable asynchronous I/O (when using Linux kernel version >= 6.6).
|
- Disable asynchronous I/O (when using Linux kernel version >= 6.6).
|
||||||
|
|
||||||
- Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it
|
- Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it
|
||||||
enables programs to inspect and modify other active processes. Provide option
|
enables programs to inspect and modify other active processes. Provide the
|
||||||
to also entirely disable the use of `ptrace()` for all processes.
|
option to also entirely disable the use of `ptrace()` for all processes.
|
||||||
|
|
||||||
- Prevent hardlink and symlink TOCTOU races in world-writable directories.
|
- Prevent hardlink and symlink TOCTOU races in world-writable directories.
|
||||||
|
|
||||||
@ -82,13 +82,15 @@ Various networking components of the TCP/IP stack are hardened for IPv4/6.
|
|||||||
|
|
||||||
- Do not accept IPv6 router advertisements and solicitations.
|
- Do not accept IPv6 router advertisements and solicitations.
|
||||||
|
|
||||||
- Provide option to disable SACK and DSACK as they have historically been a
|
- Provide the option to disable SACK and DSACK as they have historically been
|
||||||
vector for exploitation.
|
a known vector for exploitation.
|
||||||
|
|
||||||
- Disable TCP timestamps as it can allow detecting the system time.
|
- Disable TCP timestamps as it can allow detecting the system time.
|
||||||
|
|
||||||
- Provide option to log of packets with impossible source or destination
|
- Provide the option to log of packets with impossible source or destination
|
||||||
addresses to enable inspection and further analysis.
|
addresses to enable further inspection and analysis.
|
||||||
|
|
||||||
|
- Provide the option to enable IPv6 Privacy Extensions.
|
||||||
|
|
||||||
### mmap ASLR
|
### mmap ASLR
|
||||||
|
|
||||||
@ -227,6 +229,12 @@ disabling should first be blacklisted for a suitable amount of time.
|
|||||||
|
|
||||||
## Network hardening
|
## Network hardening
|
||||||
|
|
||||||
|
Not yet due to issues:
|
||||||
|
|
||||||
|
- https://github.com/Kicksecure/security-misc/pull/145
|
||||||
|
|
||||||
|
- https://github.com/Kicksecure/security-misc/issues/184
|
||||||
|
|
||||||
- Unlike version 4, IPv6 addresses can provide information not only about the
|
- Unlike version 4, IPv6 addresses can provide information not only about the
|
||||||
originating network, but also the originating device. We prevent this from
|
originating network, but also the originating device. We prevent this from
|
||||||
happening by enabling the respective privacy extensions for IPv6.
|
happening by enabling the respective privacy extensions for IPv6.
|
||||||
|
@ -1,2 +1,10 @@
|
|||||||
|
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
|
||||||
|
##
|
||||||
|
## https://datatracker.ietf.org/doc/html/rfc4941
|
||||||
|
## https://github.com/Kicksecure/security-misc/pull/145
|
||||||
|
## https://github.com/Kicksecure/security-misc/issues/184
|
||||||
|
##
|
||||||
|
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
|
||||||
|
|
||||||
#[connection]
|
#[connection]
|
||||||
#ipv6.ip6-privacy=2
|
#ipv6.ip6-privacy=2
|
||||||
|
@ -1,3 +1,11 @@
|
|||||||
|
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
|
||||||
|
##
|
||||||
|
## https://datatracker.ietf.org/doc/html/rfc4941
|
||||||
|
## https://github.com/Kicksecure/security-misc/pull/145
|
||||||
|
## https://github.com/Kicksecure/security-misc/issues/184
|
||||||
|
##
|
||||||
|
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
|
||||||
|
|
||||||
#[device-mac-randomization]
|
#[device-mac-randomization]
|
||||||
#wifi.scan-rand-mac-address=yes
|
#wifi.scan-rand-mac-address=yes
|
||||||
|
|
||||||
|
@ -337,3 +337,20 @@ net.ipv4.tcp_timestamps=0
|
|||||||
##
|
##
|
||||||
#net.ipv4.conf.all.log_martians=1
|
#net.ipv4.conf.all.log_martians=1
|
||||||
#net.ipv4.conf.default.log_martians=1
|
#net.ipv4.conf.default.log_martians=1
|
||||||
|
|
||||||
|
## Enable IPv6 Privacy Extensions prefer temporary addresses over public addresses.
|
||||||
|
## The temporary/privacy address is used as the source of all outgoing traffic.
|
||||||
|
## Must be used in combination with /usr/lib/systemd/networkd.conf.d/80_ipv6-privacy-extensions.conf.
|
||||||
|
## Must be used in combination with /usr/lib/NetworkManager/conf.d/80_ipv6-privacy.conf.
|
||||||
|
## Should be used with MAC randomisation in /usr/lib/NetworkManager/conf.d/80_randomize-mac.conf.
|
||||||
|
##
|
||||||
|
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
|
||||||
|
##
|
||||||
|
## https://datatracker.ietf.org/doc/html/rfc4941
|
||||||
|
## https://github.com/Kicksecure/security-misc/pull/145
|
||||||
|
## https://github.com/Kicksecure/security-misc/issues/184
|
||||||
|
##
|
||||||
|
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
|
||||||
|
##
|
||||||
|
#net.ipv6.conf.all.use_tempaddr=2
|
||||||
|
#net.ipv6.conf.default.use_tempaddr=2
|
@ -1,2 +1,10 @@
|
|||||||
|
## MAC randomisation breaks root server and VirtualBox DHCP likely due to IPv6 Privacy Extensions.
|
||||||
|
##
|
||||||
|
## https://datatracker.ietf.org/doc/html/rfc4941
|
||||||
|
## https://github.com/Kicksecure/security-misc/pull/145
|
||||||
|
## https://github.com/Kicksecure/security-misc/issues/184
|
||||||
|
##
|
||||||
|
## The use of IPv6 Privacy Extenstions is currently diasbled due to these breakages.
|
||||||
|
|
||||||
#[Network]
|
#[Network]
|
||||||
#IPv6PrivacyExtensions=kernel
|
#IPv6PrivacyExtensions=kernel
|
||||||
|
Loading…
x
Reference in New Issue
Block a user