This commit is contained in:
Patrick Schleizer 2019-12-21 07:47:00 -05:00
parent 8fb17624bc
commit b74e5ca972
No known key found for this signature in database
GPG Key ID: CB8D50BB77BB3C48
2 changed files with 2 additions and 2 deletions

2
debian/control vendored
View File

@ -223,7 +223,7 @@ Description: enhances misc security settings
often used in privilege escalation attacks.
It is disabled by default for now during testing and can optionally be enabled
by running `systemctl enable permission-hardening.service` as root.
https://forums.whonix.org/t/permission-hardening/8655
https://forums.whonix.org/t/disable-suid-binaries/7706
/usr/lib/security-misc/permission-hardening
/lib/systemd/system/permission-hardening.service
/etc/permission-hardening.d/30_default.conf

View File

@ -3,7 +3,7 @@
## Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP <adrelanos@riseup.net>
## See the file COPYING for copying conditions.
## https://forums.whonix.org/t/permission-hardening/8655
## https://forums.whonix.org/t/disable-suid-binaries/7706
## https://forums.whonix.org/t/re-mount-home-and-other-with-noexec-and-nosuid-among-other-useful-mount-options-for-better-security/7707
## To view previous modes and how these were changed: