Merge pull request #38 from madaidan/distrust-cpu

Distrust the CPU for initial entropy
This commit is contained in:
Patrick Schleizer 2019-12-03 06:51:31 +00:00 committed by GitHub
commit 73c6410a0e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 12 additions and 0 deletions

3
debian/control vendored
View File

@ -102,6 +102,9 @@ Description: enhances misc security settings
.
* Load jitterentropy_rng kernel module.
/usr/lib/modules-load.d/30_security-misc.conf
.
* Distrusts the CPU for initial entropy at boot as it is
not possible to audit and may be backdoored. /etc/default/grub.d/40_distrust_cpu.cfg
.
Uncommon network protocols are blacklisted:
These are rarely used and may have unknown vulnerabilities.

View File

@ -0,0 +1,9 @@
## Copyright (C) 2019 - 2019 ENCRYPTED SUPPORT LP <adrelanos@riseup.net>
## See the file COPYING for copying conditions.
## Distrust the CPU for initial entropy as it is not possible to audit
## and may have unknown backdoors.
##
## https://en.wikipedia.org/wiki/RDRAND#Reception
## https://forums.whonix.org/t/entropy-config-random-trust-cpu-yes-or-no-rng-core-default-quality/8566/
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX random.trust_cpu=off"