Commit Graph

73 Commits

Author SHA1 Message Date
74293bcd2f output 2019-11-05 01:59:25 -05:00
2b5b06b602 output 2019-11-05 01:59:19 -05:00
d6977becba refactoring 2019-11-05 01:51:14 -05:00
daf0006795 comment 2019-11-05 01:50:27 -05:00
203d5cfa68 copyright 2019-10-31 11:19:44 -04:00
d4e02de43a set SUDO_ASKPASS for pkexec wrapper when using sudo --askpass 2019-10-22 09:04:44 -04:00
343d9cc916 fix 2019-10-21 09:53:55 +00:00
40707e70db Redirect calls for pkexec to lxqt-sudo because pkexec is incompatible with hidepid.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860040

https://forums.whonix.org/t/cannot-use-pkexec/8129

Thanks to AnonymousUser for the bug report!
2019-10-21 05:46:49 -04:00
a5045dc26e set -e 2019-10-17 06:18:32 -04:00
4aba027566 syntax check 2019-10-17 06:12:36 -04:00
8b9aa8841a fix 2019-10-17 06:11:01 -04:00
cfbd77040a set "shopt -s nullglob" to avoid failing when folder /etc/hide-hardware-info.d
does not exist or is empty
2019-10-17 06:10:29 -04:00
b05663c5f6 shuffle
https://forums.whonix.org/t/restrict-hardware-information-to-root/7329/80
2019-10-17 06:08:55 -04:00
28a440091d code simplification 2019-10-17 06:08:16 -04:00
3c4e261c20 remove trailing spaces 2019-10-17 06:05:23 -04:00
8a42c5b023 Merge pull request #34 from madaidan/whitelist
Add a whitelist for /sys and /proc/cpuinfo
2019-10-17 09:59:12 +00:00
61f742304d return 0 2019-10-16 19:46:59 +00:00
ffba0e0179 Elaborate 2019-10-16 19:04:15 +00:00
f08c03ab21 Restrict sysfs/cpuinfo if the whitelist is disabled 2019-10-16 15:39:23 +00:00
6b78dbcd07 Add way to whitelist things 2019-10-15 20:57:02 +00:00
d2bc3a2a08 chmod +x usr/lib/security-misc/hide-hardware-info 2019-10-05 09:14:41 +00:00
87917d2f03 Add licensing 2019-10-03 21:38:07 +00:00
9449f5017a Create hide-hardware-info 2019-10-03 20:45:14 +00:00
75258843e9 copyright 2019-09-16 13:03:43 +00:00
8e39cea876 comment 2019-09-16 13:03:25 +00:00
bac462f211 comment 2019-09-16 13:03:02 +00:00
bec680d4f3 pam_tally2-info: fix, do nothing when started as user "user"
xscreensaver runs as user "user", therefore pam_tally2 cannot function.
xscreensaver has its own failed login counter.

as user "user"
/sbin/pam_tally2 -u user
pam_tally2: Error opening /var/log/tallylog for update: Permission denied
/sbin/pam_tally2: Authentication error

https://askubuntu.com/questions/983183/how-lock-the-unlock-screen-after-wrong-password-attempts

https://forums.whonix.org/t/how-strong-do-linux-user-account-passwords-have-to-be-when-using-full-disk-encryption-fde-too/7698
2019-09-16 12:30:23 +00:00
0140df8668 virusforget 2019-08-19 08:43:28 +00:00
113ab42568 virusforget 2019-08-19 08:31:23 +00:00
416906d4f9 virusforget 2019-08-19 08:19:35 +00:00
2d867d9fee virusforget 2019-08-19 08:10:18 +00:00
8e76e6b8b3 fix 2019-08-19 07:48:12 +00:00
3f068f77fe keep cache folder outside of reach of user since even user can remove files
owned by root in its home folder
2019-08-19 07:47:20 +00:00
1fa1efa58e credits 2019-08-19 07:22:09 +00:00
1e026a3ebb initial development version of VirusForget 2019-08-18 22:50:44 +00:00
41b2819ec8 PAM: abort on locked password
to avoid needlessly bumping pam_tally2 counter

https://forums.whonix.org/t/restrict-root-access/7658/1
2019-08-17 10:33:47 +00:00
17cfcb63b6 code simplification; report locked account earlier 2019-08-16 10:50:56 -04:00
ff9bc1d7ea informational output during PAM:
* Show failed and remaining password attempts.
* Document unlock procedure if Linux user account got locked.
* Point out, that there is no password feedback for `su`.
* Explain locked (root) account if locked.
* /usr/share/pam-configs/tally2-security-misc
* /usr/lib/security-misc/pam_tally2-info
2019-08-15 13:37:28 +00:00
547ba91d79 sanity test 2019-08-14 09:45:30 +00:00
799acad724 skip, if not a folder 2019-08-14 09:39:43 +00:00
6321ff5ad5 refactoring 2019-08-14 09:38:44 +00:00
f8c828b69a output 2019-08-14 05:19:02 -04:00
e5da6d9699 copyright 2019-08-14 05:17:54 -04:00
1595789d7c comment 2019-08-14 05:17:16 -04:00
21489111d1 run permission lockdown during pam
https://forums.whonix.org/t/change-default-umask/7416
2019-08-14 08:34:03 +00:00
dbea7d1511 add hook etc/kernel/postinst.d/30_remove-system-map to remove system.map
on kernel package upgrade;

self-document this package: during upgrade the following will be written
to stdout:

Setting up linux-image-4.19.0-5-amd64 (4.19.37-5+deb10u2) ...
/etc/kernel/postinst.d/30_remove-system-map:
removed '/boot/System.map-4.19.0-5-amd64
2019-08-14 07:22:14 +00:00
6af2d7facb copyright 2019-07-13 18:12:25 +00:00
75f0ca565d set -e 2019-07-13 18:12:04 +00:00
c389e13e1a use pre.bsh 2019-07-13 17:59:49 +00:00
bea98474ba chmod +x usr/lib/security-misc/panic-on-oops 2019-07-11 07:07:21 +00:00