Patrick Schleizer
|
ae90107e6d
|
Merge pull request #76 from flawedworld/patch-2
Add IPv6 sysctl options and enforce kernel.perf_event_paranoid=3
|
2020-09-28 14:23:42 +00:00 |
|
Patrick Schleizer
|
9239c8b807
|
Merge pull request #71 from onions-knight/patch-1
Update thunar.xml
|
2020-09-19 10:54:21 +00:00 |
|
flawedworld
|
8f7727e823
|
Add some IPv6 options
|
2020-09-18 23:36:30 +01:00 |
|
flawedworld
|
944fed3c45
|
Disallow kernel profiling by users without CAP_SYS_ADMIN
It's the default on a lot of stuff, but still nice to have.
|
2020-09-18 23:29:04 +01:00 |
|
Patrick Schleizer
|
7e267ab498
|
fix, allow group sudo and console to use consoles
fix /etc/security/access-security-misc.conf syntax error
Thanks to @81a989 for the bug report!
https://forums.whonix.org/t/etc-security-hardening-console-lockdown-pam-access-access-conf/8592/31
|
2020-08-03 08:12:19 -04:00 |
|
Patrick Schleizer
|
3cd7b144bb
|
move "kernel.printk = 3 3 3 3" to separate file /etc/sysctl.d/30_silent-kernel-printk.conf
so package debug-misc can easily disable it
https://phabricator.whonix.org/T950
|
2020-05-14 13:47:58 -04:00 |
|
Patrick Schleizer
|
6485df8126
|
Prevent kernel info leaks in console during boot.
add kernel parameter `quiet loglevel=0`
https://phabricator.whonix.org/T950
|
2020-04-23 12:26:31 -04:00 |
|
Patrick Schleizer
|
8d2e4b68dc
|
Prevent kernel info leaks in console during boot.
By setting `kernel.printk = 3 3 3 3`.
https://phabricator.whonix.org/T950
Thanks to @madaidan for the suggestion!
|
2020-04-16 08:00:31 -04:00 |
|
Patrick Schleizer
|
4898a9e753
|
fix, sysctl-initramfs: switch log to /run/initramfs/sysctl-initramfs-error.log
since ephemeral, in RAM, not written to disk, no conflict with grub-live
https://forums.whonix.org/t/kernel-hardening/7296/435
|
2020-04-16 07:54:33 -04:00 |
|
Patrick Schleizer
|
701da5f6cc
|
formatting
|
2020-04-16 07:24:44 -04:00 |
|
Patrick Schleizer
|
253578afdf
|
/etc/security/access-security-misc.conf white list ttyS0 etc.
ttyS0 ttyS1 ttyS2 ttyS3 ttyS4 ttyS5 ttyS6 ttyS7 ttyS8 ttyS9
Thanks to @subpar_marlin for the bug report and helping to fix this!
https://forums.whonix.org/t/how-do-i-enter-the-whonix-shell-from-cli/7271/43
https://forums.whonix.org/t/etc-security-hardening/8592
|
2020-04-13 06:50:32 -04:00 |
|
Patrick Schleizer
|
b3ce18f0f9
|
disable proc-hidepid by default because incompatible with pkexec
and undo pkexec wrapper
|
2020-04-12 16:54:10 -04:00 |
|
Patrick Schleizer
|
4429315291
|
disable proc-hidepid by default because incompatible with pkexec
and undo pkexec wrapper
|
2020-04-12 16:52:55 -04:00 |
|
Patrick Schleizer
|
938e929f39
|
add pkexec to suid default whitelist
/usr/bin/pkexec exactwhitelist
/usr/bin/pkexec.security-misc-orig exactwhitelist
|
2020-04-12 16:37:51 -04:00 |
|
Patrick Schleizer
|
565ff136e5
|
vm.swappiness=1
import from swappiness-lowest
https://forums.whonix.org/t/vm-swappiness-1-set-swapiness-to-lowest-setting-still-useful-swappiness-lowest/9278
|
2020-04-08 21:04:02 +00:00 |
|
Patrick Schleizer
|
72228946dc
|
fix etc/default/grub.d/40_kernel_hardening.cfg
in Qubes if no kernel package is installed
|
2020-04-08 16:46:11 +00:00 |
|
Patrick Schleizer
|
5c81e1f23f
|
import from anon-gpg-conf
|
2020-04-06 09:25:45 -04:00 |
|
Patrick Schleizer
|
a7f2a2a3b6
|
console lockdown: allow members of group sudo to use console
https://forums.whonix.org/t/etc-security-hardening/8592
https://github.com/Whonix/security-misc/pull/74#issuecomment-607748407
https://www.whonix.org/wiki/Dev/Strong_Linux_User_Account_Isolation#Console_Lockdown
|
2020-04-02 06:04:45 -04:00 |
|
Patrick Schleizer
|
7764ee0d20
|
comments
|
2020-04-02 05:58:16 -04:00 |
|
Patrick Schleizer
|
2ceea8d1fe
|
update copyright year
|
2020-04-01 08:49:59 -04:00 |
|
Patrick Schleizer
|
814f613a2f
|
When using systemd-nspawn (chroot) then login requires console 'console' to be permitted.
|
2020-03-31 07:08:25 -04:00 |
|
Patrick Schleizer
|
5f0dd8270b
|
consistent use of quotes
|
2020-03-21 14:14:35 -04:00 |
|
Patrick Schleizer
|
66ea1a3a12
|
minor
|
2020-03-21 14:14:15 -04:00 |
|
Patrick Schleizer
|
23bd7ead59
|
remove trailing space
|
2020-03-21 14:12:42 -04:00 |
|
madaidan
|
89ada11cf9
|
Only remount if already mounted read-only
|
2020-03-21 17:49:07 +00:00 |
|
madaidan
|
c8826d6702
|
Fix sysctl-initramfs logs
|
2020-03-21 17:15:25 +00:00 |
|
onions-knight
|
8dfdec1d3b
|
Update thunar.xml
Adding Delete option for thunar on right mouse click (removed in Debian 10). See https://forums.whonix.org/t/whonix-host-calamares-branding-suggestion/7772/26
|
2020-03-17 16:38:53 +00:00 |
|
madaidan
|
4d0de87f79
|
Disable unprivileged userfaultfd use again
|
2020-03-08 17:49:49 +00:00 |
|
madaidan
|
efb2683cfc
|
Hide unprivileged_userfaultfd error
|
2020-03-08 17:49:12 +00:00 |
|
Patrick Schleizer
|
284a491100
|
disable vm.unprivileged_userfaultfd=0 for now
because broken
https://forums.whonix.org/t/kernel-hardening/7296/406
reverts "Restrict the userfaultfd() syscall to root as it can make heap sprays easier."
https://duasynt.com/blog/linux-kernel-heap-spray
|
2020-03-08 08:07:10 -04:00 |
|
madaidan
|
6b64b36b01
|
Restrict the userfaultfd() syscall to root
|
2020-02-24 18:23:15 +00:00 |
|
madaidan
|
f6b6ab374e
|
Gather more entropy during boot
|
2020-02-16 19:51:32 +00:00 |
|
madaidan
|
a79ce7fa68
|
Document ldisc_autoload better
|
2020-02-15 17:30:21 +00:00 |
|
Patrick Schleizer
|
1e5946c795
|
Merge branch 'master' into sysrq
|
2020-02-15 10:41:52 +00:00 |
|
Patrick Schleizer
|
5124f8cebc
|
Merge pull request #61 from madaidan/disable_early_pci_dma
Avoid holes in IOMMU
|
2020-02-15 10:18:56 +00:00 |
|
madaidan
|
9b767139ef
|
Avoid holes in IOMMU
|
2020-02-14 18:52:01 +00:00 |
|
madaidan
|
d251c43344
|
Restrict the SysRq key
|
2020-02-14 18:17:20 +00:00 |
|
madaidan
|
0ea7dd161b
|
Restrict loading line disciplines to CAP_SYS_MODULE
|
2020-02-14 17:50:19 +00:00 |
|
Patrick Schleizer
|
ad6b766886
|
Merge pull request #57 from madaidan/sysctl
Prevent symlink/hardlink TOCTOU races
|
2020-02-13 18:40:58 +00:00 |
|
madaidan
|
700c7ed908
|
Create 40_cpu_mitigations.cfg
|
2020-02-12 18:42:13 +00:00 |
|
madaidan
|
ba0043b8a7
|
Update 40_kernel_hardening.cfg
|
2020-02-12 18:36:05 +00:00 |
|
madaidan
|
5cb21d0d4d
|
Prevent symlink/hardlink TOCTOU races
|
2020-02-12 18:03:23 +00:00 |
|
HulaHoop0
|
e4c6e897cf
|
kvm.nx_huge_pages=force
|
2020-02-03 16:06:46 +00:00 |
|
Patrick Schleizer
|
85d2aa1365
|
hide stdout (but not stderr) by sysctl during initramfs
|
2020-01-30 06:13:42 -05:00 |
|
Patrick Schleizer
|
b9d65338bc
|
unconditionally enable all CPU bugs (spectre, meltdown, L1TF, ...)
this might reduce performance
* `spectre_v2=on`
* `spec_store_bypass_disable=on`
* `tsx=off`
* `tsx_async_abort=full,nosmt`
Thanks to @madaidan for the suggestion!
https://forums.whonix.org/t/should-all-kernel-patches-for-cpu-bugs-be-unconditionally-enabled-vs-performance-vs-applicability/7647
|
2020-01-30 05:55:13 -05:00 |
|
Patrick Schleizer
|
c1a0da60be
|
set kernel boot parameter l1tf=full,force and nosmt=force
https://forums.whonix.org/t/should-all-kernel-patches-for-cpu-bugs-be-unconditionally-enabled-vs-performance-vs-applicability/7647/17
|
2020-01-30 00:46:48 -05:00 |
|
Patrick Schleizer
|
a37da1c968
|
add digits to drop-in file names
|
2020-01-24 04:39:06 -05:00 |
|
Patrick Schleizer
|
e0aa67677d
|
merge the many modprobe.d config files into 1
and use a name starting with double digits
to make it easier to disable settings using a lexically higher config file
|
2020-01-24 04:30:36 -05:00 |
|
Patrick Schleizer
|
6a4c493213
|
merge the many sysctl config files into 1
and use a name starting with double digits
to make it easier to disable settings using a lexically higher config file
|
2020-01-24 04:26:36 -05:00 |
|
Patrick Schleizer
|
6f8d89c6c5
|
error handling
|
2020-01-15 15:54:06 -05:00 |
|