From b74e5ca97244209e041f55483027365eacdf44c9 Mon Sep 17 00:00:00 2001 From: Patrick Schleizer Date: Sat, 21 Dec 2019 07:47:00 -0500 Subject: [PATCH] comment --- debian/control | 2 +- usr/lib/security-misc/permission-hardening | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/debian/control b/debian/control index 6ddb85b..33fe7d4 100644 --- a/debian/control +++ b/debian/control @@ -223,7 +223,7 @@ Description: enhances misc security settings often used in privilege escalation attacks. It is disabled by default for now during testing and can optionally be enabled by running `systemctl enable permission-hardening.service` as root. - https://forums.whonix.org/t/permission-hardening/8655 + https://forums.whonix.org/t/disable-suid-binaries/7706 /usr/lib/security-misc/permission-hardening /lib/systemd/system/permission-hardening.service /etc/permission-hardening.d/30_default.conf diff --git a/usr/lib/security-misc/permission-hardening b/usr/lib/security-misc/permission-hardening index 44b0460..264a370 100755 --- a/usr/lib/security-misc/permission-hardening +++ b/usr/lib/security-misc/permission-hardening @@ -3,7 +3,7 @@ ## Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP ## See the file COPYING for copying conditions. -## https://forums.whonix.org/t/permission-hardening/8655 +## https://forums.whonix.org/t/disable-suid-binaries/7706 ## https://forums.whonix.org/t/re-mount-home-and-other-with-noexec-and-nosuid-among-other-useful-mount-options-for-better-security/7707 ## To view previous modes and how these were changed: