Commit Graph

328 Commits

Author SHA1 Message Date
14aa6c5077 comment 2019-12-07 06:26:23 -05:00
8b3f5a555b add console lockdown to pam info output 2019-12-07 06:25:45 -05:00
6479c883bf Console Lockdown.
Allow members of group 'console' to use tty1 to tty7. Everyone else except
members of group 'console-unrestricted' are restricted from using console
using ancient, unpopular login methods such as using /bin/login over networks,
which might be exploitable. (CVE-2001-0797)

Not enabled by default in this package since this package does not know which
users shall be added to group 'console'.

In new Whonix builds, user 'user" will be added to group 'console' and
pam console-lockdown enabled by package anon-base-files.

/usr/share/pam-configs/console-lockdown

/etc/security/access-security-misc.conf

https://forums.whonix.org/t/etc-security-hardening/8592
2019-12-07 05:40:20 -05:00
5a4eda0d05 also support /usr/local/etc/remount-disable and /usr/local/etc/noexec 2019-12-07 01:53:33 -05:00
9b14f24d5e refactoring 2019-12-06 11:17:32 -05:00
a6133f5912 output 2019-12-06 11:16:43 -05:00
c1ea35e2ef output 2019-12-06 11:15:54 -05:00
4bec41379d fix remount with noexec if /etc/noexec exists 2019-12-06 11:15:13 -05:00
470cad6e91 remount /home /tmp /dev/shm /run with nosuid,nodev (default) and noexec (opt-in)
https://forums.whonix.org/t/re-mount-home-and-other-with-noexec-and-nosuid-among-other-useful-mount-options-for-better-security/7707
2019-12-06 05:14:02 -05:00
aa5451c8cd Lock user accounts after 50 rather than 100 failed login attempts.
https://forums.whonix.org/t/how-strong-do-linux-user-account-passwords-have-to-be-when-using-full-disk-encryption-fde-too/7698/19
2019-11-25 01:39:53 -05:00
fe1f1b73a7 load jitterentropy_rng kernel module for better entropy collection
https://www.whonix.org/wiki/Dev/Entropy

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927972

https://forums.whonix.org/t/jitterentropy-rngd/7204
2019-11-23 11:20:32 +00:00
03e8023847 output 2019-11-22 14:11:30 -05:00
2e73c053b5 fix lintian warning 2019-11-09 12:55:00 +00:00
74293bcd2f output 2019-11-05 01:59:25 -05:00
2b5b06b602 output 2019-11-05 01:59:19 -05:00
d6977becba refactoring 2019-11-05 01:51:14 -05:00
daf0006795 comment 2019-11-05 01:50:27 -05:00
203d5cfa68 copyright 2019-10-31 11:19:44 -04:00
bce5274a15 quotes fix 2019-10-22 09:22:29 -04:00
e20b9e2133 better solution when using pkexec with --user: wrap sudo --user with lxqt-sudo 2019-10-22 09:08:18 -04:00
d4e02de43a set SUDO_ASKPASS for pkexec wrapper when using sudo --askpass 2019-10-22 09:04:44 -04:00
1a65a91039 long rather than short option 2019-10-22 08:56:05 -04:00
b55913637b silence output by mount/grep 2019-10-22 08:54:48 -04:00
a1154170c9 Call original pkexec in case there are no arguments. 2019-10-22 08:54:17 -04:00
1e4d0ea1d0 fix lintian warning 2019-10-21 09:55:05 +00:00
343d9cc916 fix 2019-10-21 09:53:55 +00:00
40707e70db Redirect calls for pkexec to lxqt-sudo because pkexec is incompatible with hidepid.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860040

https://forums.whonix.org/t/cannot-use-pkexec/8129

Thanks to AnonymousUser for the bug report!
2019-10-21 05:46:49 -04:00
a5045dc26e set -e 2019-10-17 06:18:32 -04:00
4aba027566 syntax check 2019-10-17 06:12:36 -04:00
8b9aa8841a fix 2019-10-17 06:11:01 -04:00
cfbd77040a set "shopt -s nullglob" to avoid failing when folder /etc/hide-hardware-info.d
does not exist or is empty
2019-10-17 06:10:29 -04:00
b05663c5f6 shuffle
https://forums.whonix.org/t/restrict-hardware-information-to-root/7329/80
2019-10-17 06:08:55 -04:00
28a440091d code simplification 2019-10-17 06:08:16 -04:00
3c4e261c20 remove trailing spaces 2019-10-17 06:05:23 -04:00
8a42c5b023 Merge pull request #34 from madaidan/whitelist
Add a whitelist for /sys and /proc/cpuinfo
2019-10-17 09:59:12 +00:00
61f742304d return 0 2019-10-16 19:46:59 +00:00
ffba0e0179 Elaborate 2019-10-16 19:04:15 +00:00
f08c03ab21 Restrict sysfs/cpuinfo if the whitelist is disabled 2019-10-16 15:39:23 +00:00
6b78dbcd07 Add way to whitelist things 2019-10-15 20:57:02 +00:00
d2bc3a2a08 chmod +x usr/lib/security-misc/hide-hardware-info 2019-10-05 09:14:41 +00:00
87917d2f03 Add licensing 2019-10-03 21:38:07 +00:00
9449f5017a Create hide-hardware-info 2019-10-03 20:45:14 +00:00
75258843e9 copyright 2019-09-16 13:03:43 +00:00
8e39cea876 comment 2019-09-16 13:03:25 +00:00
bac462f211 comment 2019-09-16 13:03:02 +00:00
bec680d4f3 pam_tally2-info: fix, do nothing when started as user "user"
xscreensaver runs as user "user", therefore pam_tally2 cannot function.
xscreensaver has its own failed login counter.

as user "user"
/sbin/pam_tally2 -u user
pam_tally2: Error opening /var/log/tallylog for update: Permission denied
/sbin/pam_tally2: Authentication error

https://askubuntu.com/questions/983183/how-lock-the-unlock-screen-after-wrong-password-attempts

https://forums.whonix.org/t/how-strong-do-linux-user-account-passwords-have-to-be-when-using-full-disk-encryption-fde-too/7698
2019-09-16 12:30:23 +00:00
0ae5c5ff14 remove umask changes since these are causing issues are are not needed anymore
thanks to home folder permission lockdown

https://forums.whonix.org/t/change-default-umask/7416/45
2019-08-24 12:14:22 -04:00
0140df8668 virusforget 2019-08-19 08:43:28 +00:00
113ab42568 virusforget 2019-08-19 08:31:23 +00:00
416906d4f9 virusforget 2019-08-19 08:19:35 +00:00