Revert "Disable the usage of ptrace() by all processes"

This reverts commit b04828f858.
This commit is contained in:
Raja Grewal 2024-07-27 13:24:08 +10:00
parent b04828f858
commit 1c9f33f906
No known key found for this signature in database
GPG Key ID: 92CA473C156B64C4
2 changed files with 7 additions and 4 deletions

View File

@ -45,8 +45,9 @@ space, user space, core dumps, and swap space.
- Disable asynchronous I/O (when using Linux kernel version >= 6.6).
- Disable the usage of `ptrace()` by all processes as it enables programs to
inspect and modify other active processes.
- Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it
enables programs to inspect and modify other active processes. Provide the
option to entirely disable the use of `ptrace()` for all processes.
- Prevent hardlink and symlink TOCTOU races in world-writable directories.

View File

@ -128,7 +128,7 @@ kernel.io_uring_disabled=2
##
## https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-userspace
## Disable the usage of ptrace() system calls by all processes.
## Restrict usage of the ptrace() system call to only processes with CAP_SYS_PTRACE.
## Limit ptrace() as it enables programs to inspect and modify other active processes.
## Prevents native code debugging which some programs use as a method to detect tampering.
## May cause breakages in 'anti-cheat' software and programs running under Proton/WINE.
@ -139,7 +139,9 @@ kernel.io_uring_disabled=2
## https://github.com/GrapheneOS/os-issue-tracker/issues/651#issuecomment-917599928
## https://github.com/netblue30/firejail/issues/2860
##
kernel.yama.ptrace_scope=3
## It is possible to harden further by disabling ptrace() for all users, see documentation.
##
kernel.yama.ptrace_scope=2
## Maximize bits of entropy for improved effectiveness of mmap ASLR.
## The maximum number of bits depends on CPU architecture (the ones shown below are for x86).