Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separation; Enhances Misc Security Settings - https://www.kicksecure.com/wiki/Security-misc
Go to file
Patrick Schleizer 7352b2ac31
description
2019-07-17 21:03:54 +00:00
debian description 2019-07-17 21:03:54 +00:00
etc fix path 2019-07-17 21:02:48 +00:00
lib/systemd Move disable-coredumps.conf to correct position 2019-07-10 15:28:48 +00:00
rpm_spec update files list 2019-06-28 03:02:49 -04:00
usr Revert "set back to default group "root" rather than group "sudo" membership required to use su" 2019-07-17 14:25:19 -04:00
changelog.upstream bumped changelog version 2019-07-17 19:13:57 +00:00
CONTRIBUTING.md update 2019-05-03 10:56:56 +00:00
COPYING remove no longer shipped files in etc/pam.d/* 2019-07-13 14:57:51 +00:00
GPLv3 initial commit 2015-12-15 02:00:24 +00:00
Makefile update copyright 2018-01-29 15:22:05 +00:00
Makefile.builder Add rpm packaging 2019-06-21 04:52:01 +02:00
README.md readme 2019-07-15 13:03:30 +00:00
version Add rpm packaging 2019-06-21 04:52:01 +02:00

enhances misc security settings

kernel hardening;

  • deactivates Netfilter's connection tracking helper Netfilter's connection tracking helper module increases kernel attack surface by enabling superfluous functionality such as IRC parsing in the kernel. (!) Hence, this package disables this feature by shipping the /etc/modprobe.d/30_nf_conntrack_helper_disable.conf configuration file.

  • Kernel symbols in /proc/kallsyms are hidden to prevent malware from reading them and using them to learn more about what to attack on your system.

  • Kexec is disabled as it can be used for live patching of the running kernel.

  • ASLR effectiveness for mmap is increased.

  • The TCP/IP stack is hardened.

  • his package makes some data spoofing attacks harder.

  • SACK is disabled as it is commonly exploited and is rarely used.

  • This package disables the merging of slabs of similar sizes to prevent an attacker from exploiting them.

  • Sanity checks, redzoning, and memory poisoning are enabled.

  • The kernel now panics on uncorrectable errors in ECC memory which could be exploited.

  • Kernel Page Table Isolation is enabled to mitigate Meltdown and increase KASLR effectiveness.

  • SMT is disabled as it can be used to exploit the MDS vulnerability.

  • All mitigations for the MDS vulnerability are enabled.

  • The SysRq key is restricted to only allow shutdowns/reboots. A systemd service clears System.map on boot as these contain kernel symbols that could be useful to an attacker.

  • Coredumps are disabled as they may contain important information such as encryption keys or passwords.

  • The thunderbolt and firewire modules are blacklisted as they can be used for DMA (Direct Memory Access) attacks.

  • IOMMU is enabled with a boot parameter to prevent DMA attacks.

  • The kernel now panics on oopses to prevent it from continuing running a flawed process.

Uncommon network protocols are blacklisted: These are rarely used and may have unknown vulnerabilities. /etc/modprobe.d/uncommon-network-protocols.conf The network protocols that are blacklisted are:

  • DCCP - Datagram Congestion Control Protocol
  • SCTP - Stream Control Transmission Protocol
  • RDS - Reliable Datagram Sockets
  • TIPC - Transparent Inter-process Communication
  • HDLC - High-Level Data Link Control
  • AX25 - Amateur X.25
  • NetRom
  • X25
  • ROSE
  • DECnet
  • Econet
  • af_802154 - IEEE 802.15.4
  • IPX - Internetwork Packet Exchange
  • AppleTalk
  • PSNAP - Subnetwork Access Protocol
  • p8023 - Novell raw IEEE 802.3
  • LLC - IEEE 802.2
  • p8022 - IEEE 802.2

user restrictions:

  • A systemd service mounts /proc with hidepid=2 at boot to prevent users from seeing each other's processes.

  • The kernel logs are restricted to root only.

  • The BPF JIT compiler is restricted to the root user and is hardened.

  • The ptrace system call is restricted to the root user only.

restricts access to the root account:

  • Su is restricted to only users within the root group which prevents users from using su to gain root access or switch user accounts.

  • Logging into the root account from a terminal is prevented.

access rights restrictions:

  • The default umask is changed to 006. This allows only the owner and group to read and write to newly created files.

  • Removes read, write and execute access for others for all users who have home folders under folder /home by running for example "chmod o-rwx /home/user" during package installation or upgrade. This will be done only once per folder in folder /home so users who wish to relax file permissions are free to do so. This is to protect previously created files in user home folder which were previously created with lax file permissions prior installation of this package.

Disables TCP Time Stamps:

TCP time stamps (RFC 1323) allow for tracking clock information with millisecond resolution. This may or may not allow an attacker to learn information about the system clock at such a resolution, depending on various issues such as network lag. This information is available to anyone who monitors the network somewhere between the attacked system and the destination server. It may allow an attacker to find out how long a given system has been running, and to distinguish several systems running behind NAT and using the same IP address. It might also allow one to look for clocks that match an expected value to find the public IP used by a user.

Hence, this package disables this feature by shipping the /etc/sysctl.d/tcp_timestamps.conf configuration file.

Note that TCP time stamps normally have some usefulness. They are needed for:

  • the TCP protection against wrapped sequence numbers; however, to trigger a wrap, one needs to send roughly 2^32 packets in one minute: as said in RFC 1700, "The current recommended default time to live (TTL) for the Internet Protocol (IP) [45,105] is 64". So, this probably won't be a practical problem in the context of Anonymity Distributions.
  • "Round-Trip Time Measurement", which is only useful when the user manages to saturate their connection. When using Anonymity Distributions, probably the limiting factor for transmission speed is rarely the capacity of the user connection.

Application specific hardening:

  • deactivates previews in Dolphin;
  • deactivates previews in Nautilus;
  • deactivates thumbnails in Thunar;

How to install security-misc using apt-get

1. Add Whonix's Signing Key.

sudo apt-key --keyring /etc/apt/trusted.gpg.d/whonix.gpg adv --keyserver hkp://ipv4.pool.sks-keyservers.net:80 --recv-keys 916B8D99C38EAF5E8ADC7A2A8D66066A2EEACCDA

3. Add Whonix's APT repository.

echo "deb http://deb.whonix.org buster main contrib non-free" | sudo tee /etc/apt/sources.list.d/whonix.list

4. Update your package lists.

sudo apt-get update

5. Install security-misc.

sudo apt-get install security-misc

How to Build deb Package

Replace apparmor-profile-torbrowser with the actual name of this package with security-misc and see instructions.

Contact

Donate

security-misc requires donations to stay alive!