X-Git-Url: https://jxself.org/git/?a=blobdiff_plain;f=kconfig-hardened-check.py;h=b24918a0b067eae7ae4bc3b1082b6944858e9f4d;hb=c513c49e4fd866cc85ce5aa42a59f30d103f6388;hp=197d82ed33d8c2db2ac0ddd09d09cb2be3970b6c;hpb=b66e0ce2796947670b2dc15ad28f5fdc8164e82e;p=kconfig-hardened-check.git diff --git a/kconfig-hardened-check.py b/kconfig-hardened-check.py index 197d82e..b24918a 100755 --- a/kconfig-hardened-check.py +++ b/kconfig-hardened-check.py @@ -13,7 +13,6 @@ # N.B Hardening command line parameters: # slub_debug=FZP # slab_nomerge -# kernel.kptr_restrict=1 # page_alloc.shuffle=1 # iommu=force (does it help against DMA attacks?) # page_poison=1 (if enabled) @@ -35,17 +34,24 @@ # ssbd=force-on # # N.B. Hardening sysctls: -# net.core.bpf_jit_harden=2 -# kptr_restrict=2 -# vm.unprivileged_userfaultfd=0 +# kernel.kptr_restrict=2 +# kernel.dmesg_restrict=1 # kernel.perf_event_paranoid=3 -# kernel.yama.ptrace_scope=1 (or even 3?) +# kernel.kexec_load_disabled=1 +# kernel.yama.ptrace_scope=3 +# user.max_user_namespaces=0 # kernel.unprivileged_bpf_disabled=1 +# net.core.bpf_jit_harden=2 +# +# vm.unprivileged_userfaultfd=0 +# +# dev.tty.ldisc_autoload=0 +# fs.protected_symlinks=1 +# fs.protected_hardlinks=1 +# fs.protected_fifos=2 +# fs.protected_regular=2 # fs.suid_dumpable=0 -# fs.protected_symlinks = 1 -# fs.protected_hardlinks = 1 -# fs.protected_fifos = 2 -# fs.protected_regular = 2 +# kernel.modules_disabled=1 import sys from argparse import ArgumentParser @@ -426,6 +432,8 @@ def construct_checklist(checklist, arch): checklist.append(AND(OptCheck('LDISC_AUTOLOAD', 'is not set', 'clipos', 'cut_attack_surface'), \ VerCheck((5, 1)))) # LDISC_AUTOLOAD can be disabled since v5.1 + checklist.append(OptCheck('AIO', 'is not set', 'grapheneos', 'cut_attack_surface')) + checklist.append(OptCheck('MMIOTRACE', 'is not set', 'my', 'cut_attack_surface')) # refers to LOCKDOWN (permissive) checklist.append(OptCheck('LIVEPATCH', 'is not set', 'my', 'cut_attack_surface')) checklist.append(OptCheck('IP_DCCP', 'is not set', 'my', 'cut_attack_surface'))