Update README.md

This commit is contained in:
Raja Grewal
2024-08-16 13:24:25 +10:00
parent 9212a4e937
commit a132980023

View File

@ -42,19 +42,19 @@ space, user space, core dumps, and swap space.
- Restrict kernel profiling and the performance events system to `CAP_PERFMON`. - Restrict kernel profiling and the performance events system to `CAP_PERFMON`.
- Force the kernel to panic on "oopses" that can potentially indicate and thwart - Force the kernel to panic on "oopses" that can potentially indicate and thwart
certain kernel exploitation attempts. Provide the option to reboot immediately certain kernel exploitation attempts. Optional - Force immediate reboot on the
on a kernel panic. occurrence of a kernel panic.
- Randomize the addresses (ASLR) for mmap base, stack, VDSO pages, and heap. - Randomize the addresses (ASLR) for mmap base, stack, VDSO pages, and heap.
- Disable the use of legacy TIOCSTI operations which can be used to inject keypresses. - Disable the use of legacy TIOCSTI operations which can be used to inject keypresses.
- Disable asynchronous I/O as `io_uring` has been the source - Disable asynchronous I/O (when using Linux kernel >= 6.6) as `io_uring` has been
of numerous kernel exploits (when using Linux kernel version >= 6.6). the source of numerous kernel exploits.
- Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it - Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it
enables programs to inspect and modify other active processes. Provide the enables programs to inspect and modify other active processes. Optional - Disable
option to entirely disable the use of `ptrace()` for all processes. usage of `ptrace()` by all processes.
- Maximize the bits of entropy used for mmap ASLR across all architectures. - Maximize the bits of entropy used for mmap ASLR across all architectures.
@ -91,15 +91,15 @@ Various networking components of the TCP/IP stack are hardened for IPv4/6.
- Do not accept IPv6 router advertisements and solicitations. - Do not accept IPv6 router advertisements and solicitations.
- Provide the option to disable SACK and DSACK as they have historically been - Optional - Disable SACK and DSACK as they have historically been a known
a known vector for exploitation. vector for exploitation.
- Disable TCP timestamps as they can allow detecting the system time. - Disable TCP timestamps as they can allow detecting the system time.
- Provide the option to log packets with impossible source or destination - Optional - Log packets with impossible source or destination addresses to
addresses to enable further inspection and analysis. enable further inspection and analysis.
- Provide the option to enable IPv6 Privacy Extensions. - Optional - Enable IPv6 Privacy Extensions.
### mmap ASLR ### mmap ASLR
@ -145,7 +145,7 @@ configuration file.
- Force kernel panics on "oopses" to potentially indicate and thwart certain - Force kernel panics on "oopses" to potentially indicate and thwart certain
kernel exploitation attempts. kernel exploitation attempts.
- Provide the option to modify the machine check exception handler. - Optional - Modify the machine check exception handler.
- Prevent sensitive kernel information leaks in the console during boot. - Prevent sensitive kernel information leaks in the console during boot.
@ -154,12 +154,12 @@ configuration file.
- Disable 32-bit vDSO mappings as they are a legacy compatibility feature. - Disable 32-bit vDSO mappings as they are a legacy compatibility feature.
- Provide the option to use kCFI as the default CFI implementation since it may be - Optional - Use kCFI as the default CFI implementation (when using Linux kernel >= 6.2)
slightly more resilient to attacks that are able to write arbitrary executables since it may be slightly more resilient to attacks that are able to write
in memory (when using Linux kernel version >= 6.2). arbitrary executables in memory.
- Provide the option to disable support for all x86 processes and syscalls to reduce - Optional - Disable support for all x86 processes and syscalls (when using Linux kernel >= 6.7)
attack surface (when using Linux kernel version >= 6.7). to reduce attack surface.
- Enable strict IOMMU translation to protect against some DMA attacks via the use - Enable strict IOMMU translation to protect against some DMA attacks via the use
of both CPU manufacturer-specific drivers and kernel settings. of both CPU manufacturer-specific drivers and kernel settings.
@ -173,7 +173,7 @@ configuration file.
- Obtain more entropy at boot from RAM as the runtime memory allocator is - Obtain more entropy at boot from RAM as the runtime memory allocator is
being initialized. being initialized.
- Provide the option to disable the entire IPv6 stack to reduce attack surface. - Optional - Disable the entire IPv6 stack to reduce attack surface.
### Kernel Modules ### Kernel Modules