mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-07-13 17:29:47 +07:00
Update README.md
This commit is contained in:
36
README.md
36
README.md
@ -42,19 +42,19 @@ space, user space, core dumps, and swap space.
|
|||||||
- Restrict kernel profiling and the performance events system to `CAP_PERFMON`.
|
- Restrict kernel profiling and the performance events system to `CAP_PERFMON`.
|
||||||
|
|
||||||
- Force the kernel to panic on "oopses" that can potentially indicate and thwart
|
- Force the kernel to panic on "oopses" that can potentially indicate and thwart
|
||||||
certain kernel exploitation attempts. Provide the option to reboot immediately
|
certain kernel exploitation attempts. Optional - Force immediate reboot on the
|
||||||
on a kernel panic.
|
occurrence of a kernel panic.
|
||||||
|
|
||||||
- Randomize the addresses (ASLR) for mmap base, stack, VDSO pages, and heap.
|
- Randomize the addresses (ASLR) for mmap base, stack, VDSO pages, and heap.
|
||||||
|
|
||||||
- Disable the use of legacy TIOCSTI operations which can be used to inject keypresses.
|
- Disable the use of legacy TIOCSTI operations which can be used to inject keypresses.
|
||||||
|
|
||||||
- Disable asynchronous I/O as `io_uring` has been the source
|
- Disable asynchronous I/O (when using Linux kernel >= 6.6) as `io_uring` has been
|
||||||
of numerous kernel exploits (when using Linux kernel version >= 6.6).
|
the source of numerous kernel exploits.
|
||||||
|
|
||||||
- Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it
|
- Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it
|
||||||
enables programs to inspect and modify other active processes. Provide the
|
enables programs to inspect and modify other active processes. Optional - Disable
|
||||||
option to entirely disable the use of `ptrace()` for all processes.
|
usage of `ptrace()` by all processes.
|
||||||
|
|
||||||
- Maximize the bits of entropy used for mmap ASLR across all architectures.
|
- Maximize the bits of entropy used for mmap ASLR across all architectures.
|
||||||
|
|
||||||
@ -91,15 +91,15 @@ Various networking components of the TCP/IP stack are hardened for IPv4/6.
|
|||||||
|
|
||||||
- Do not accept IPv6 router advertisements and solicitations.
|
- Do not accept IPv6 router advertisements and solicitations.
|
||||||
|
|
||||||
- Provide the option to disable SACK and DSACK as they have historically been
|
- Optional - Disable SACK and DSACK as they have historically been a known
|
||||||
a known vector for exploitation.
|
vector for exploitation.
|
||||||
|
|
||||||
- Disable TCP timestamps as they can allow detecting the system time.
|
- Disable TCP timestamps as they can allow detecting the system time.
|
||||||
|
|
||||||
- Provide the option to log packets with impossible source or destination
|
- Optional - Log packets with impossible source or destination addresses to
|
||||||
addresses to enable further inspection and analysis.
|
enable further inspection and analysis.
|
||||||
|
|
||||||
- Provide the option to enable IPv6 Privacy Extensions.
|
- Optional - Enable IPv6 Privacy Extensions.
|
||||||
|
|
||||||
### mmap ASLR
|
### mmap ASLR
|
||||||
|
|
||||||
@ -145,7 +145,7 @@ configuration file.
|
|||||||
- Force kernel panics on "oopses" to potentially indicate and thwart certain
|
- Force kernel panics on "oopses" to potentially indicate and thwart certain
|
||||||
kernel exploitation attempts.
|
kernel exploitation attempts.
|
||||||
|
|
||||||
- Provide the option to modify the machine check exception handler.
|
- Optional - Modify the machine check exception handler.
|
||||||
|
|
||||||
- Prevent sensitive kernel information leaks in the console during boot.
|
- Prevent sensitive kernel information leaks in the console during boot.
|
||||||
|
|
||||||
@ -154,12 +154,12 @@ configuration file.
|
|||||||
|
|
||||||
- Disable 32-bit vDSO mappings as they are a legacy compatibility feature.
|
- Disable 32-bit vDSO mappings as they are a legacy compatibility feature.
|
||||||
|
|
||||||
- Provide the option to use kCFI as the default CFI implementation since it may be
|
- Optional - Use kCFI as the default CFI implementation (when using Linux kernel >= 6.2)
|
||||||
slightly more resilient to attacks that are able to write arbitrary executables
|
since it may be slightly more resilient to attacks that are able to write
|
||||||
in memory (when using Linux kernel version >= 6.2).
|
arbitrary executables in memory.
|
||||||
|
|
||||||
- Provide the option to disable support for all x86 processes and syscalls to reduce
|
- Optional - Disable support for all x86 processes and syscalls (when using Linux kernel >= 6.7)
|
||||||
attack surface (when using Linux kernel version >= 6.7).
|
to reduce attack surface.
|
||||||
|
|
||||||
- Enable strict IOMMU translation to protect against some DMA attacks via the use
|
- Enable strict IOMMU translation to protect against some DMA attacks via the use
|
||||||
of both CPU manufacturer-specific drivers and kernel settings.
|
of both CPU manufacturer-specific drivers and kernel settings.
|
||||||
@ -173,7 +173,7 @@ configuration file.
|
|||||||
- Obtain more entropy at boot from RAM as the runtime memory allocator is
|
- Obtain more entropy at boot from RAM as the runtime memory allocator is
|
||||||
being initialized.
|
being initialized.
|
||||||
|
|
||||||
- Provide the option to disable the entire IPv6 stack to reduce attack surface.
|
- Optional - Disable the entire IPv6 stack to reduce attack surface.
|
||||||
|
|
||||||
### Kernel Modules
|
### Kernel Modules
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user