Commit Graph

77 Commits

Author SHA1 Message Date
Ben Grande
abf72c2ee4
Rename file permission hardening script
Hardener as the script is the agent that is hardening the file
permissions.
2024-01-02 13:34:29 +01:00
Patrick Schleizer
a51674410c
fix 2023-11-11 17:29:37 -05:00
Patrick Schleizer
fd1f38b2eb
remount-secure systemd unit
https://github.com/Kicksecure/security-misc/pull/152
2023-11-06 16:22:42 -05:00
Patrick Schleizer
79f9c1fb3a
add sysinit-post.target
https://github.com/Kicksecure/security-misc/pull/152
2023-11-06 15:48:09 -05:00
Patrick Schleizer
e1f413c1ee
disable harden-module-loading.service for now
due to issues

https://github.com/Kicksecure/security-misc/issues/159
2023-11-05 20:53:26 -05:00
Patrick Schleizer
f2ea1abc9b
comment 2023-11-05 20:53:03 -05:00
Patrick Schleizer
95d1cfb4a0
Revert "remove no longer required remount-service systemd unit"
This reverts commit 479ab61a1d.

https://github.com/Kicksecure/security-misc/pull/152
2023-11-05 20:49:36 -05:00
Patrick Schleizer
4482f1841c
newline 2023-11-05 20:13:14 -05:00
Patrick Schleizer
c5167c8f0d
fix systemd unit
https://github.com/Kicksecure/security-misc/issues/159
2023-11-05 20:12:03 -05:00
Patrick Schleizer
2571bbf315
duplicate 2023-11-05 18:42:25 -05:00
Patrick Schleizer
aa17087883
update path 2023-11-05 18:42:08 -05:00
Patrick Schleizer
4ebab940c7
description too long, fixed 2023-11-05 17:56:35 -05:00
monsieuremre
a187d23c41
big fix 2023-11-04 20:56:08 +00:00
monsieuremre
3e604618a8
harden-module-loading.service 2023-11-02 10:24:35 +00:00
Patrick Schleizer
479ab61a1d
remove no longer required remount-service systemd unit 2023-10-22 12:55:20 -04:00
Patrick Schleizer
ed11c68ac6
move remount-secure to /usr/bin/remount-secure to make it easier to manually run 2023-10-22 06:51:52 -04:00
Patrick Schleizer
59a5fea25d
documentation 2023-10-22 05:41:56 -04:00
Patrick Schleizer
ac63b0eb3d
remove duplicate 2023-10-22 05:41:11 -04:00
Raja Grewal
7a4212dd76
Update copyright 2023-03-30 17:08:47 +11:00
Patrick Schleizer
7bda2ad3e8
move ram-wipe scripts to dedicated ram-wipe package 2023-01-24 06:34:17 -05:00
Patrick Schleizer
c9107bb044
debugging 2023-01-07 16:11:48 -05:00
Patrick Schleizer
b7bb24f984
description 2023-01-07 16:09:11 -05:00
Friedrich Doku
7cf51a1b43 Checking job queue instead of dbus 2023-01-06 21:32:57 -05:00
Friedrich Doku
014d10b977
Update cold-boot-attack-defense-kexec-prepare.service 2023-01-06 13:52:09 -05:00
Friedrich Doku
f463750920
Update cold-boot-attack-defense-kexec-prepare.service 2023-01-06 13:48:22 -05:00
Friedrich Doku
73913ea5af Added checks 2023-01-06 12:49:34 -05:00
Friedrich Doku
a7015f4ddf added files 2023-01-06 10:50:34 -05:00
Patrick Schleizer
2d37e3a1af
copyright 2022-05-20 14:46:38 -04:00
Patrick Schleizer
7d73b3ffa0
add hardened malloc compatibility for haveged workaround
`/lib/systemd/system/haveged.service.d/30_security-misc.conf`

`SystemCallFilter=getrandom`

Otherwise haveged will exit with a core dump.
2021-08-17 15:21:26 -04:00
Patrick Schleizer
50bdd097df
move /usr/lib/security-misc to /usr/libexec/security-misc as per lintian FHS 2021-08-03 12:56:31 -04:00
Patrick Schleizer
5a65c35479
port LKRG compatibility settings automation for VirtualBox hosts from systemd to dpkg trigger 2021-08-01 13:11:18 -04:00
Patrick Schleizer
257cef24ba
add LKRG compatibility settings automation for VirtualBox hosts
https://github.com/openwall/lkrg/issues/82
2021-07-24 18:03:40 -04:00
Patrick Schleizer
41734ec523
systemd RemainAfterExit=yes
for better usability

https://forums.whonix.org/t/restrict-hardware-information-to-root-testers-wanted/8618/33
2021-04-03 11:44:13 -04:00
Patrick Schleizer
a67007f4b7
copyright 2021-03-17 09:45:21 -04:00
Patrick Schleizer
8851c9ed29
fix: disable proc-hidepid.service 2020-04-14 12:39:34 -04:00
Patrick Schleizer
72be31e870
disable proc-hidepid by default because incompatible with pkexec
and undo pkexec wrapper
2020-04-12 16:48:13 -04:00
Patrick Schleizer
2ceea8d1fe
update copyright year 2020-04-01 08:49:59 -04:00
Patrick Schleizer
a37da1c968
add digits to drop-in file names 2020-01-24 04:39:06 -05:00
Patrick Schleizer
9c0d6b6057
copyright 2019-12-29 05:09:07 -05:00
Patrick Schleizer
edc08988f2
copyright 2019-12-29 05:08:53 -05:00
Patrick Schleizer
9156d3584c
Description 2019-12-29 04:59:05 -05:00
Patrick Schleizer
3ea946b365
RemainAfterExit=yes 2019-12-29 04:56:51 -05:00
Patrick Schleizer
2787ae9765
copyright 2019-12-29 04:56:35 -05:00
Patrick Schleizer
6d56eb9ef0
minor 2019-12-29 04:56:18 -05:00
Patrick Schleizer
0e14706f32
copyright 2019-12-29 04:45:26 -05:00
Patrick Schleizer
617c0a0e15
disable remount-secure.service - Disable for now until development finished / tested. 2019-12-23 07:21:26 -05:00
Patrick Schleizer
7f20160477
comment 2019-12-20 05:24:00 -05:00
Patrick Schleizer
a135ae9400
use must manually enable permission-hardening.service
until development finished
2019-12-20 05:22:59 -05:00
Patrick Schleizer
d80bf036f3
Disable permission hardening now until development finished / tested. 2019-12-09 03:50:43 -05:00
madaidan
d7e2deae92
Create permission-hardening.service 2019-12-08 16:50:54 +00:00