security-misc split string changes

This commit is contained in:
Aaron Rainbolt 2025-09-21 16:06:11 -05:00
parent 5738bb6104
commit 2a39d5997c
No known key found for this signature in database
GPG key ID: A709160D73C79109
47 changed files with 72 additions and 53 deletions

View file

@ -449,9 +449,9 @@ See:
### Bluetooth Status: Enabled but Defaulted to Off
- **Default Behavior**: Although Bluetooth capability is 'enabled' in the kernel,
security-misc deviates from the usual behavior by starting with Bluetooth
turned off at system start. This setting remains until the user explicitly opts
to activate Bluetooth.
security-misc-desktop deviates from the usual behavior by starting with
Bluetooth turned off at system start. This setting remains until the user
explicitly opts to activate Bluetooth.
- **User Control**: Users have the freedom to easily switch Bluetooth on and off
in the usual way, exercising their own discretion. This can be done via the
@ -745,7 +745,7 @@ Before sending pull requests to harden arbitrary applications, please note the
scope of security-misc is limited to default installed applications in
Kicksecure and Whonix. This includes:
- Thunderbird, VLC Media Player, KeePassXC
- VLC Media Player, KeePassXC
- Debian Specific System Components (APT, DPKG)
- System Services (NetworkManager IPv6 privacy options, MAC address
randomization)

View file

@ -52,10 +52,10 @@ user_groups_modifications() {
}
output_skip_checks() {
echo "security-misc '$0' INFO: Allow installation of security-misc anyway." >&2
echo "security-misc '$0' INFO: (technical reason: $@)" >&2
echo "security-misc '$0' INFO: If this is a chroot this is probably OK." >&2
echo "security-misc '$0' INFO: Otherwise you might not be able to login." >&2
echo "security-misc-shared '$0' INFO: Allow installation of security-misc-shared anyway." >&2
echo "security-misc-shared '$0' INFO: (technical reason: $@)" >&2
echo "security-misc-shared '$0' INFO: If this is a chroot this is probably OK." >&2
echo "security-misc-shared '$0' INFO: Otherwise you might not be able to login." >&2
}
sudo_users_check () {

View file

@ -1,7 +1,7 @@
## Copyright (C) 2019 - 2025 ENCRYPTED SUPPORT LLC <adrelanos@whonix.org>
## See the file COPYING for copying conditions.
## Disable coredumps.
## Disable core dumps.
## `-` in the second field sets both hard and soft limits at the same time.
## See `man 5 limits.conf`.
* - core 0

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This Bluetooth kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This Bluetooth kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This CD-ROM/DVD kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This CD-ROM/DVD kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This file system kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This file system kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This FireWire (IEEE 1394) kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This FireWire (IEEE 1394) kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This framebuffer (fbdev) kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This framebuffer (fbdev) kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This Global Positioning System (GPS) kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This Global Positioning System (GPS) kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This Intel Management Engine (ME) kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This Intel Management Engine (ME) kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This Intel Platform Monitoring Technology (PMT) Telemetry kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This Intel Platform Monitoring Technology (PMT) Telemetry kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This network file system kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This network file system kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This network protocol kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This network protocol kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -5,6 +5,6 @@
## Alerts user that a kernel module failed to load due to it being explicitly disabled by default.
echo "$0: ALERT: This Thunderbolt kernel module is disabled by package security-misc by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
echo "$0: ALERT: This Thunderbolt kernel module is disabled by package security-misc-shared by default. See the configuration file /etc/modprobe.d/30_security-misc_disable.conf for details. | args: $@" >&2
exit 1

View file

@ -3,6 +3,7 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
/usr/bin/bwrap exactwhitelist

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## Chrome/Chromium now uses namespace-based sandboxing rather than a SUID
## sandbox for most use cases, and while the SUID sandbox is still technically

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## Needed for D-Bus system activation to work.
## https://dbus.freedesktop.org/doc/system-activation.txt

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## There is a controversy about firejail but those who choose to install it
## should be able to use it.

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## Critical component of FUSE (Filesystem in USErspace)
##

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
libhardened_malloc.so matchwhitelist
libhardened_malloc-light.so matchwhitelist

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## https://forums.whonix.org/t/disable-suid-binaries/7706/61
## Protect from 'chmod -x' (and SUID removal).

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## Used by the pam_tmpdir module to create a secure temporary directory for the
## user that is logging in.

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
# Keep the `passwd` utility executable to prevent issues with the
# /usr/libexec/security-misc/pam-abort-on-locked-password script blocking

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## user-sysmaint-split hardens this further.
/usr/bin/pkexec exactwhitelist

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## TODO: research and document
postqueue matchwhitelist

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## TODO: research
## https://github.com/QubesOS/qubes-core-agent-linux/blob/master/qubes-rpc/qfile-unpacker.c

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## TODO: research and document
/utempter/utempter matchwhitelist

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## TODO: research and document
spice-client-glib-usb-acl-helper matchwhitelist

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## Used for SSH client key management
## https://manpages.debian.org/ssh-agent

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## user-sysmaint-split hardens this further.
/usr/bin/sudo exactwhitelist

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## required for performing password validation from unprivileged user
## processes such as KScreenLocker's unlock prompt

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## TODO: research
/usr/lib/virtualbox/ matchwhitelist

View file

@ -3,7 +3,8 @@
## Please use "/etc/permission-hardener.d/20_user.conf" or
## "/usr/local/etc/permission-hardener.d/20_user.conf" for your custom
## configuration. When security-misc is updated, this file may be overwritten.
## configuration. When security-misc-shared is updated, this file may be
## overwritten.
## File permission hardening.
##

View file

@ -351,7 +351,7 @@ vm.max_map_count=1048576
## Disable core dump files by preventing any pattern names.
## This setting may be overwritten by systemd and is not comprehensive.
## Core dumps are also disabled in security-misc via other means.
## Core dumps are also disabled in security-misc-shared via other means.
##
## https://wiki.archlinux.org/title/Core_dump#Disabling_automatic_core_dumps
##

View file

@ -2,7 +2,7 @@
## See the file COPYING for copying conditions.
[Unit]
Description=Permission Hardener at Boot Time (opt-in in addition to security-misc package installation time hardening)
Description=Permission Hardener at Boot Time (opt-in in addition to security-misc-shared package installation time hardening)
Documentation=https://github.com/Kicksecure/security-misc
DefaultDependencies=no

View file

@ -2,7 +2,7 @@
## See the file COPYING for copying conditions.
[Unit]
Description=sys-init.target by security-misc
Description=sys-init.target by security-misc-shared
After=sysinit.target
Before=basic.target

View file

@ -8,4 +8,4 @@ set -e
sysctl -w kernel.modules_disabled=1
true "The loading of new modules to the kernel has been disabled by security-misc."
true "The loading of new modules to the kernel has been disabled by package security-misc-shared."

View file

@ -1,4 +1,4 @@
Name: allow only members of group console to use login (by package security-misc)
Name: allow only members of group console to use login (by package security-misc-shared)
Default: no
Priority: 280
Account-Type: Primary

View file

@ -1,4 +1,4 @@
Name: lock accounts after 50 failed authentication attempts (preauth component) (by package security-misc)
Name: lock accounts after 50 failed authentication attempts (preauth component) (by package security-misc-shared)
Default: yes
Priority: 1024
Auth-Type: Primary

View file

@ -1,4 +1,4 @@
Name: Create home directory on login (by package security-misc)
Name: Create home directory on login (by package security-misc-shared)
Default: yes
Priority: 100
Session-Type: Additional

View file

@ -1,4 +1,4 @@
Name: abort on locked password (by package security-misc)
Name: abort on locked password (by package security-misc-shared)
Default: yes
Priority: 300
Auth-Type: Primary

View file

@ -1,4 +1,4 @@
Name: Restrict umask to 027 for non-root users (by package security-misc)
Name: Restrict umask to 027 for non-root users (by package security-misc-shared)
Default: yes
Priority: 100
Session-Type: Additional

View file

@ -1,4 +1,4 @@
Name: Unix authentication with faillock (by package security-misc)
Name: Unix authentication with faillock (by package security-misc-shared)
Default: yes
Priority: 384
Auth-Type: Primary

View file

@ -1,4 +1,4 @@
Name: group sudo membership required to use su (by package security-misc)
Name: group sudo membership required to use su (by package security-misc-shared)
Default: yes
Priority: 1050
Auth-Type: Primary

View file

@ -13,7 +13,7 @@
## /usr/share/security-misc/lkrg/30-lkrg-virtualbox.conf
## to:
## /etc/sysctl.d/30-lkrg-virtualbox.conf
## by package security-misc, files:
## by package security-misc-shared, files:
## /usr/share/security-misc/lkrg/lkrg-virtualbox
## /usr/lib/systemd/system/lkrg.service.d/40-virtualbox.conf

View file

@ -318,7 +318,7 @@ void print_usage() {
print(fd_stderr, " not use.\n");
print(fd_stderr, "Example:\n");
print(fd_stderr, " emerg-shutdown --devices=/dev/sda3 --keys=KEY_POWER\n");
print(fd_stderr, "See /etc/security-misc/emerg-shutdown/30_security-misc.cofn to\n");
print(fd_stderr, "See /etc/security-misc/emerg-shutdown/30_security-misc.conf to\n");
print(fd_stderr, "configure the emerg-shutdown service.\n");
}