This commit is contained in:
Patrick Schleizer 2022-05-19 17:25:58 -04:00
parent bb0307290b
commit 4a3ed17160
No known key found for this signature in database
GPG Key ID: CB8D50BB77BB3C48

View File

@ -243,13 +243,13 @@ This package does not yet automatically lock the root account password. It
is not clear if this would be sane in such a package although, it is recommended is not clear if this would be sane in such a package although, it is recommended
to lock and expire the root account. to lock and expire the root account.
In new Whonix builds, root account will be locked by package In new Kicksecure builds, root account will be locked by package
dist-base-files. dist-base-files.
See: See:
* https://www.whonix.org/wiki/Root * https://www.kicksecure.com/wiki/Root
* https://www.whonix.org/wiki/Dev/Permissions * https://www.kicksecure.com/wiki/Dev/Permissions
* https://forums.whonix.org/t/restrict-root-access/7658 * https://forums.whonix.org/t/restrict-root-access/7658
However, a locked root password will break rescue and emergency shell. However, a locked root password will break rescue and emergency shell.
@ -335,7 +335,7 @@ See:
* `/lib/systemd/system/permission-hardening.service` * `/lib/systemd/system/permission-hardening.service`
* `/etc/permission-hardening.d` * `/etc/permission-hardening.d`
* https://forums.whonix.org/t/disable-suid-binaries/7706 * https://forums.whonix.org/t/disable-suid-binaries/7706
* https://www.whonix.org/wiki/SUID_Disabler_and_Permission_Hardener * https://www.kicksecure.com/wiki/SUID_Disabler_and_Permission_Hardener
### Access rights relaxations ### Access rights relaxations
@ -400,24 +400,22 @@ executing `systemctl enable hide-hardware-info.service` as root.
* Linux Kernel Runtime Guard (LKRG) * Linux Kernel Runtime Guard (LKRG)
* tirdad - TCP ISN CPU Information Leak Protection. * tirdad - TCP ISN CPU Information Leak Protection.
* Whonix ™ - Anonymous Operating System * Kicksecure ™ - a security-hardened Linux Distribution
* Kicksecure ™ - A Security-hardened, Non-anonymous Linux Distribution
* And more. * And more.
* https://www.whonix.org/wiki/Linux_Kernel_Runtime_Guard_LKRG * https://www.kicksecure.com/wiki/Linux_Kernel_Runtime_Guard_LKRG
* https://github.com/Whonix/tirdad * https://github.com/Kicksecure/tirdad
* https://www.whonix.org * https://www.kicksecure.com
* https://www.whonix.org/wiki/Kicksecure * https://github.com/Kicksecure
* https://github.com/Whonix
## Discussion ## Discussion
Happening primarily in Whonix forums. Happening primarily in forums.
https://forums.whonix.org/t/kernel-hardening/7296 https://forums.whonix.org/t/kernel-hardening/7296
## How to install `security-misc` ## How to install `security-misc`
See https://www.whonix.org/wiki/Security-misc#install See https://www.kicksecure.com/wiki/Security-misc#install
## How to Build deb Package from Source Code ## How to Build deb Package from Source Code
@ -429,14 +427,14 @@ dpkg-buildpackage -b
See instructions. (Replace `generic-package` with the actual name of this package `security-misc`.) See instructions. (Replace `generic-package` with the actual name of this package `security-misc`.)
* **A)** [easy](https://www.whonix.org/wiki/Dev/Build_Documentation/generic-package/easy), _OR_ * **A)** [easy](https://www.kicksecure.com/wiki/Dev/Build_Documentation/generic-package/easy), _OR_
* **B)** [including verifying software signatures](https://www.whonix.org/wiki/Dev/Build_Documentation/generic-package) * **B)** [including verifying software signatures](https://www.kicksecure.com/wiki/Dev/Build_Documentation/generic-package)
## Contact ## Contact
* [Free Forum Support](https://forums.whonix.org) * [Free Forum Support](https://forums.kicksecure.com)
* [Professional Support](https://www.whonix.org/wiki/Professional_Support) * [Professional Support](https://www.kicksecure.com/wiki/Professional_Support)
## Donate ## Donate
`security-misc` requires [donations](https://www.whonix.org/wiki/Donate) to stay alive! `security-misc` requires [donations](https://www.kicksecure.com/wiki/Donate) to stay alive!