This commit is contained in:
Patrick Schleizer
2019-12-21 07:47:00 -05:00
parent 8fb17624bc
commit b74e5ca972
2 changed files with 2 additions and 2 deletions

2
debian/control vendored
View File

@ -223,7 +223,7 @@ Description: enhances misc security settings
often used in privilege escalation attacks. often used in privilege escalation attacks.
It is disabled by default for now during testing and can optionally be enabled It is disabled by default for now during testing and can optionally be enabled
by running `systemctl enable permission-hardening.service` as root. by running `systemctl enable permission-hardening.service` as root.
https://forums.whonix.org/t/permission-hardening/8655 https://forums.whonix.org/t/disable-suid-binaries/7706
/usr/lib/security-misc/permission-hardening /usr/lib/security-misc/permission-hardening
/lib/systemd/system/permission-hardening.service /lib/systemd/system/permission-hardening.service
/etc/permission-hardening.d/30_default.conf /etc/permission-hardening.d/30_default.conf

View File

@ -3,7 +3,7 @@
## Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP <adrelanos@riseup.net> ## Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP <adrelanos@riseup.net>
## See the file COPYING for copying conditions. ## See the file COPYING for copying conditions.
## https://forums.whonix.org/t/permission-hardening/8655 ## https://forums.whonix.org/t/disable-suid-binaries/7706
## https://forums.whonix.org/t/re-mount-home-and-other-with-noexec-and-nosuid-among-other-useful-mount-options-for-better-security/7707 ## https://forums.whonix.org/t/re-mount-home-and-other-with-noexec-and-nosuid-among-other-useful-mount-options-for-better-security/7707
## To view previous modes and how these were changed: ## To view previous modes and how these were changed: