Commit Graph

925 Commits

Author SHA1 Message Date
0326cd5ee9 bumped changelog version 13.4-1 2019-12-24 08:07:55 -05:00
ede536913d no longer hardcode amd64 2019-12-24 06:00:41 -05:00
d03a3d9ac0 Merge remote-tracking branch 'origin/master' 2019-12-24 05:57:24 -05:00
27a42a9da8 Merge pull request #50 from madaidan/modules
Make /lib/modules unreadable
2019-12-24 10:55:11 +00:00
ac49c55d1f Merge pull request #49 from madaidan/kver
Detect kernel upgrades
2019-12-24 10:55:03 +00:00
0c3d4ad255 Merge pull request #48 from madaidan/kernel-hardening
Use only one slub_debug parameter
2019-12-24 10:54:23 +00:00
79241c5d09 Make /lib/modules unreadable 2019-12-23 20:28:29 +00:00
98e88d1456 Detect kernel upgrades 2019-12-23 19:57:43 +00:00
d1a0650fd9 Use only one slub_debug parameter 2019-12-23 19:44:52 +00:00
9d77d88a4d comments 2019-12-23 09:39:50 -05:00
7a80837b4f bumped changelog version 13.3-1 2019-12-23 08:48:04 -05:00
617c0a0e15 disable remount-secure.service - Disable for now until development finished / tested. 2019-12-23 07:21:26 -05:00
3e131174d5 comments 2019-12-23 05:00:35 -05:00
bef41a38c2 bumped changelog version 13.2-1 2019-12-23 03:58:00 -05:00
046ceeae4d readme 2019-12-23 03:57:36 -05:00
9f072ce4f9 comment 2019-12-23 03:46:02 -05:00
26fe9394ff disable lockdown for now due to module loading 2019-12-23 03:41:54 -05:00
9ec5b0ee82 description: lockdown not enabled yet 2019-12-23 03:38:49 -05:00
b05669accf Merge branch 'madaidan-kernel-hardening' 2019-12-23 03:38:04 -05:00
1ff51ee061 merge 2019-12-23 03:37:28 -05:00
535c258b83 More kernel hardening 2019-12-23 03:35:07 -05:00
11b4192fbd comments 2019-12-23 03:28:42 -05:00
42ff53e9ad bumped changelog version 13.1-1 2019-12-23 02:42:07 -05:00
2152fa2d61 comment 2019-12-23 02:38:53 -05:00
f8f2e6c704 fix disablewhitelist feature 2019-12-23 02:35:13 -05:00
47ddcad0c0 rename keyword whitelist to exactwhitelist
add new keyword disablewhitelist

refactoring
2019-12-23 02:29:47 -05:00
175d1c2845 bumped changelog version 13.0-1 2019-12-23 02:13:13 -05:00
0409aac3ae readme 2019-12-23 02:09:04 -05:00
1ff56625a1 polkit-agent-helper-1 matchwhitelist to match both
- /usr/lib/policykit-1/polkit-agent-helper-1 matchwhitelist
- /lib/policykit-1/polkit-agent-helper-1
2019-12-23 01:42:03 -05:00
d484b299ea matchwhitelist /qubes/qfile-unpacker to match both
- /usr/lib/qubes/qfile-unpacker whitelist
- /lib/qubes/qfile-unpacker
2019-12-23 01:38:31 -05:00
34bf245713 output 2019-12-23 01:35:45 -05:00
ba30e45d15 output 2019-12-23 01:32:42 -05:00
ee9c5742da output 2019-12-23 01:29:48 -05:00
6d05359abc output 2019-12-23 01:21:52 -05:00
a1e78e8515 fix needlessly re-adding entries 2019-12-23 01:20:56 -05:00
906b3d32e7 output 2019-12-23 01:09:57 -05:00
4f76867da6 lower debugging 2019-12-23 01:08:02 -05:00
dc6e5d8508 fix 2019-12-23 01:06:38 -05:00
87b999f92a refactoring 2019-12-23 00:59:43 -05:00
065ff4bd05 sanity_tests 2019-12-23 00:59:24 -05:00
fef1469fe6 exit non-zero if capability removal failed 2019-12-23 00:51:14 -05:00
3670fcf48b depend on libcap2-bin for setcap / getcap / capsh 2019-12-23 00:49:33 -05:00
17a8c29470 fix capability removal error handling
https://forums.whonix.org/t/disable-suid-binaries/7706/45
2019-12-23 00:47:49 -05:00
b631e2ecd8 refactoring 2019-12-23 00:36:41 -05:00
7aea304549 comment 2019-12-23 00:26:15 -05:00
f4b1df02ee Remove suid / gid and execute permission for 'group' and 'others'.
Similar to: chmod og-ugx /path/to/filename

Removing execution permission is useful to make binaries such as 'su' fail closed rather
than fail open if suid was removed from these.

Do not remove read access since no security benefit and easier to manually undo for users.

chmod 744
2019-12-22 19:42:40 -05:00
58a4e0bc7d dbus-daemon-launch-helper matchwhitelist 2019-12-22 19:12:10 -05:00
15e3a2832d comment 2019-12-22 18:57:23 -05:00
6eb8fd257a suid utempter/utempter matchwhitelist
to cover both:

/usr/lib/x86_64-linux-gnu/utempter/utempter
/lib/x86_64-linux-gnu/utempter/utempter
2019-12-22 18:56:36 -05:00
9409209b48 Merge remote-tracking branch 'origin/master' 2019-12-22 10:29:08 -05:00