mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-11-27 12:10:26 -05:00
Seperate ptrace() disabling into own file
This commit is contained in:
parent
194b8fce4e
commit
7161430a60
2 changed files with 27 additions and 1 deletions
|
|
@ -0,0 +1,24 @@
|
||||||
|
## Copyright (C) 2025 - 2025 ENCRYPTED SUPPORT LLC <adrelanos@whonix.org>
|
||||||
|
## See the file COPYING for copying conditions.
|
||||||
|
|
||||||
|
## Definitions:
|
||||||
|
## KSPP=yes: compliant with recommendations by the KSPP
|
||||||
|
## KSPP=partial: partially compliant with recommendations by the KSPP
|
||||||
|
## KSPP=no: not (currently) compliant with recommendations by the KSPP
|
||||||
|
## If there is no explicit KSPP compliance notice, the setting is not mentioned by the KSPP.
|
||||||
|
|
||||||
|
## Diable the usage of the ptrace() system call by all processes.
|
||||||
|
## Restrict ptrace() as it enables programs to inspect and modify other active processes.
|
||||||
|
## Prevents native code debugging which some programs use as a method to detect tampering.
|
||||||
|
## May cause breakages in 'anti-cheat' software and programs running under Proton/WINE.
|
||||||
|
##
|
||||||
|
## https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html#ptrace-scope
|
||||||
|
## https://en.wikipedia.org/wiki/Ptrace
|
||||||
|
## https://grapheneos.org/features#attack-surface-reduction
|
||||||
|
## https://github.com/GrapheneOS/os-issue-tracker/issues/651#issuecomment-917599928
|
||||||
|
## https://github.com/netblue30/firejail/issues/2860
|
||||||
|
##
|
||||||
|
## KSPP=yes
|
||||||
|
## KSPP sets the sysctl.
|
||||||
|
##
|
||||||
|
kernel.yama.ptrace_scope=3
|
||||||
|
|
@ -241,7 +241,9 @@ kernel.io_uring_disabled=2
|
||||||
## KSPP=yes
|
## KSPP=yes
|
||||||
## KSPP sets the sysctl.
|
## KSPP sets the sysctl.
|
||||||
##
|
##
|
||||||
kernel.yama.ptrace_scope=3
|
## See /usr/lib/sysctl.d/30_security_misc-ptrace-disable.conf for implementation.
|
||||||
|
##
|
||||||
|
#kernel.yama.ptrace_scope=3
|
||||||
|
|
||||||
## Maximize bits of entropy for improved effectiveness of mmap ASLR.
|
## Maximize bits of entropy for improved effectiveness of mmap ASLR.
|
||||||
## The maximum number of bits depends on CPU architecture (the ones shown below are for x86).
|
## The maximum number of bits depends on CPU architecture (the ones shown below are for x86).
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue