X-Git-Url: https://jxself.org/git/?a=blobdiff_plain;f=README.md;h=9d557b861f2b44b77ff6d0c3546e1963184137ea;hb=b7f680ac37b139d02f109cfff9ad9344a8415aad;hp=a6794f6296f9e830203d676c849352d33c1f8ad5;hpb=91a16ec55f51c1fed542bcca0cf02099d34a6047;p=kconfig-hardened-check.git diff --git a/README.md b/README.md index a6794f6..9d557b8 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -# Kconfig hardened check +# kconfig-hardened-check ## Motivation @@ -26,7 +26,7 @@ or exploitation techniques. - ARM64 - ARM -## Script output examples +## Output examples ### Usage ``` @@ -45,7 +45,7 @@ optional arguments: --json print results in JSON format ``` -### Script output for `Ubuntu 18.04 (Bionic Beaver with HWE)` kernel config +### Output for `Ubuntu 18.04 (Bionic Beaver with HWE)` kernel config ``` $ ./kconfig-hardened-check.py -c config_files/distros/ubuntu-bionic-generic.config [+] Trying to detect architecture in "config_files/distros/ubuntu-bionic-generic.config"... @@ -209,7 +209,7 @@ The current version of `kconfig-hardened-check` is __0.5.5__, it's marked with t __Q:__ How disabling `CONFIG_USER_NS` cuts the attack surface? It's needed for containers! __A:__ Yes, the `CONFIG_USER_NS` option provides some isolation between the userspace programs, -but the script recommends disabling it to cut the attack surface __of the kernel__. +but the tool recommends disabling it to cut the attack surface __of the kernel__. The rationale: