summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Tyler Hicks [Thu, 17 Jan 2019 17:53:43 +0000 (17:53 +0000)]
Add a KSPP recommendations config for x86_32
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Tyler Hicks [Thu, 17 Jan 2019 17:47:44 +0000 (17:47 +0000)]
Make KSPP recommendations config x86_64 specific
Rename the file so that it is clear that the recommendations are x86-64
specific.
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Tyler Hicks [Sat, 12 Jan 2019 00:04:46 +0000 (00:04 +0000)]
Update kspp-recommendations.config to look like an x86_64 config
Add a header that will make the checker script think that it is dealing
with a x86_64 config file. Additionally, update the stackprotector
related options to reflect the >= 4.18 names.
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Alexander Popov [Mon, 14 Jan 2019 22:45:35 +0000 (01:45 +0300)]
Add x86_64_defconfig for v4.20
Alexander Popov [Mon, 14 Jan 2019 22:28:03 +0000 (01:28 +0300)]
Merge branch 'decision-cleanup'
Thanks to @Bernhard40 for a nice idea.
Alexander Popov [Mon, 14 Jan 2019 22:26:10 +0000 (01:26 +0300)]
Update README
Alexander Popov [Mon, 14 Jan 2019 22:22:22 +0000 (01:22 +0300)]
Change the last 'ubuntu18' checks (about lockdown)
Alexander Popov [Mon, 14 Jan 2019 22:19:44 +0000 (01:19 +0300)]
Change 'decision' to 'grsecurity' for their additional 'cut_attack_surface' recommendations
Alexander Popov [Mon, 14 Jan 2019 22:22:37 +0000 (01:22 +0300)]
Change 'decision' to 'kspp' for non-default options recommended by KSPP
Alexander Popov [Mon, 14 Jan 2019 22:08:00 +0000 (01:08 +0300)]
Change 'decision' to 'defconfig' for hardening features enabled by default
Alexander Popov [Fri, 21 Dec 2018 15:45:44 +0000 (18:45 +0300)]
Add kernel command line options enabling mitigations of side-channel attacks
Alexander Popov [Wed, 12 Dec 2018 22:01:22 +0000 (01:01 +0300)]
Add TODO (hardening preferences for ARM) and update README
Alexander Popov [Wed, 12 Dec 2018 21:55:34 +0000 (00:55 +0300)]
Check x86 hardening features: X86_SMAP and X86_INTEL_UMIP
Alexander Popov [Wed, 12 Dec 2018 21:54:51 +0000 (00:54 +0300)]
Add SECURITY_LOADPIN check
Alexander Popov [Wed, 12 Dec 2018 21:54:23 +0000 (00:54 +0300)]
Add SLAB_MERGE_DEFAULT check
Alexander Popov [Wed, 12 Dec 2018 21:53:22 +0000 (00:53 +0300)]
Mention net.core.bpf_jit_harden
Alexander Popov [Wed, 12 Dec 2018 21:52:40 +0000 (00:52 +0300)]
Recommend slub_debug=FZP
Alexander Popov [Fri, 7 Dec 2018 12:54:32 +0000 (15:54 +0300)]
Mark options connected with CONFIG_LOCK_DOWN_KERNEL (and add some new)
Alexander Popov [Fri, 7 Dec 2018 09:35:21 +0000 (12:35 +0300)]
Add CONFIG_LOCK_DOWN_KERNEL
Alexander Popov [Wed, 5 Dec 2018 21:29:34 +0000 (00:29 +0300)]
Add a hint about gcc plugins support
Alexander Popov [Wed, 8 Aug 2018 12:29:23 +0000 (15:29 +0300)]
Merge branch 'from-hackurx-3'
Alexander Popov [Wed, 8 Aug 2018 12:21:20 +0000 (15:21 +0300)]
Move kspp-recommendations.config to config_files
Alexander Popov [Wed, 8 Aug 2018 12:20:22 +0000 (15:20 +0300)]
Add missing configs
Alexander Popov [Wed, 8 Aug 2018 12:18:21 +0000 (15:18 +0300)]
Fix links to configs
Alexander Popov [Wed, 8 Aug 2018 12:00:13 +0000 (15:00 +0300)]
Update UEK config
Loïc [Thu, 26 Jul 2018 09:41:13 +0000 (11:41 +0200)]
Add links.txt
The file indicates where you can find kernel configurations.
Alexander Popov [Mon, 30 Jul 2018 20:06:05 +0000 (23:06 +0300)]
Minor fixes for the script output
Alexander Popov [Mon, 30 Jul 2018 20:02:24 +0000 (23:02 +0300)]
Merge branch 'from-iad42-1'
Anatoly Ivanov [Mon, 30 Jul 2018 14:17:05 +0000 (17:17 +0300)]
get_option_state function now looks a lot prettier using dict.get() method
Anatoly Ivanov [Mon, 30 Jul 2018 11:36:47 +0000 (14:36 +0300)]
Made long lines in major output shorter
Alexander Popov [Mon, 30 Jul 2018 14:07:44 +0000 (17:07 +0300)]
And update README
Alexander Popov [Mon, 30 Jul 2018 14:06:04 +0000 (17:06 +0300)]
Add DEBUG_RODATA as old alternative to STRICT_KERNEL_RWX
Alexander Popov [Mon, 30 Jul 2018 13:47:33 +0000 (16:47 +0300)]
Align lines better
Alexander Popov [Mon, 30 Jul 2018 13:53:42 +0000 (16:53 +0300)]
Add DEBUG_SET_MODULE_RONX as old alternative to STRICT_MODULE_RWX
Alexander Popov [Mon, 30 Jul 2018 10:49:30 +0000 (13:49 +0300)]
Update the README (LKDTM is commented out)
Alexander Popov [Mon, 30 Jul 2018 10:47:05 +0000 (13:47 +0300)]
Update the function names according to the new meaning
Alexander Popov [Fri, 27 Jul 2018 21:16:26 +0000 (00:16 +0300)]
Merge branch 'from-hackurx-2'
Loïc [Thu, 26 Jul 2018 11:13:50 +0000 (13:13 +0200)]
Add debian-stretch.config
config check is NOT PASSED: 56 errors
Loïc [Thu, 26 Jul 2018 09:36:44 +0000 (11:36 +0200)]
Delete debian-sid-amd64.config
Loïc [Thu, 26 Jul 2018 09:34:43 +0000 (11:34 +0200)]
Delete Archlinux-Testing.config
Loïc [Mon, 23 Jul 2018 07:32:10 +0000 (09:32 +0200)]
Add SLE15.config
Source: https://kernel.opensuse.org/cgit/kernel-source/plain/config/x86_64/default?h=SLE15
config check is NOT PASSED: 58 errors
Alexander Popov [Fri, 27 Jul 2018 21:13:56 +0000 (00:13 +0300)]
Comment out LKDTM
Alexander Popov [Wed, 25 Jul 2018 11:26:26 +0000 (14:26 +0300)]
Avoid false positive errors if CONFIG_MODULES is not set
Alexander Popov [Wed, 25 Jul 2018 11:33:35 +0000 (14:33 +0300)]
Support both versions of the STACKPROTECTOR_STRONG option
Alexander Popov [Tue, 24 Jul 2018 22:41:29 +0000 (01:41 +0300)]
Merge branch 'OR-from-anthraxx'
Alexander Popov [Tue, 24 Jul 2018 22:39:31 +0000 (01:39 +0300)]
Update the README
Alexander Popov [Tue, 24 Jul 2018 22:36:25 +0000 (01:36 +0300)]
Improve the OR result calculation
1. don't duplicate opts[0].name in the successful output;
2. fix the bug with printing None state, just reuse the OptCheck.result.
Alexander Popov [Tue, 24 Jul 2018 21:30:21 +0000 (00:30 +0300)]
Adjust the output format
anthraxx [Mon, 25 Jun 2018 22:26:50 +0000 (00:26 +0200)]
support DEVMEM not set when considering STRICT_DEVMEM/IO_STRICT_DEVMEM
Detect STRICT_DEVMEM and IO_STRICT_DEVMEM as not being needed whenever
DEVMEM is not set.
Conflicts resolved by @a13xp0p0v
Alexander Popov [Tue, 24 Jul 2018 20:33:57 +0000 (23:33 +0300)]
Add the comment describing OR use case
Alexander Popov [Tue, 24 Jul 2018 20:33:26 +0000 (23:33 +0300)]
OR needs OptCheck.check() return values
anthraxx [Mon, 25 Jun 2018 22:21:10 +0000 (00:21 +0200)]
support logical OR operations on options
The OR class implementation supports combining Opt's logically
with an or-operator. If any of the Opt's provided to the OR class
returns True, the check is considered OK.
Fixes #1
Conflicts resolved by @a13xp0p0v
Alexander Popov [Fri, 20 Jul 2018 17:53:52 +0000 (20:53 +0300)]
Update usage in README.md
Alexander Popov [Fri, 20 Jul 2018 17:52:37 +0000 (20:52 +0300)]
Merge branch 'from-hackurx-1'
HacKurx [Fri, 20 Jul 2018 14:56:09 +0000 (16:56 +0200)]
Add config_files directory
Loïc [Fri, 20 Jul 2018 11:29:41 +0000 (13:29 +0200)]
Add Alpinelinux-edge.config
config check is NOT PASSED: 44 errors
Loïc [Fri, 20 Jul 2018 11:25:13 +0000 (13:25 +0200)]
Add Archlinux-hardened.config
config check is NOT PASSED: 33 errors
Loïc [Thu, 19 Jul 2018 18:28:10 +0000 (20:28 +0200)]
Add CONFIG_BINFMT_AOUT to ubuntu18
As requested by a13xp0p0v.
Loïc [Wed, 18 Jul 2018 19:41:17 +0000 (21:41 +0200)]
Add Archlinux-Testing.config
config check is NOT PASSED: 49 errors
Loïc [Wed, 18 Jul 2018 19:34:52 +0000 (21:34 +0200)]
Add debian-sid-amd64.config
config check is NOT PASSED: 49 errors
Loïc [Wed, 18 Jul 2018 18:34:28 +0000 (20:34 +0200)]
Add Grsecurity recommendation on BINFMT_AOUT
Linux historical interest is not secure ;)
Conflicts resolved by @a13xp0p0v
Alexander Popov [Fri, 20 Jul 2018 17:40:27 +0000 (20:40 +0300)]
Merge branch 'arch-changes-from-anthraxx'
Alexander Popov [Fri, 20 Jul 2018 17:27:30 +0000 (20:27 +0300)]
Count errors in the end
Alexander Popov [Fri, 20 Jul 2018 16:55:36 +0000 (19:55 +0300)]
Rename 'opt_list' as well
anthraxx [Mon, 9 Jul 2018 00:49:16 +0000 (02:49 +0200)]
rename Opt to better matching OptCheck
Alexander Popov [Fri, 20 Jul 2018 16:36:52 +0000 (19:36 +0300)]
Don't return the result from Opt.check(), we don't use it
anthraxx [Mon, 9 Jul 2018 00:30:42 +0000 (02:30 +0200)]
store option check result as class member
Conflicts resolved by @a13xp0p0v:
Alexander Popov [Fri, 20 Jul 2018 16:09:08 +0000 (19:09 +0300)]
Please forgive me, I fear lambdas :\
Also print the value of the unknown option
Alexander Popov [Fri, 20 Jul 2018 16:06:18 +0000 (19:06 +0300)]
Debug mode output should be printed before the final results
Alexander Popov [Fri, 20 Jul 2018 16:04:54 +0000 (19:04 +0300)]
Fix the output: ERROR, not BUG
Alexander Popov [Fri, 20 Jul 2018 16:03:11 +0000 (19:03 +0300)]
Rename check_state() according the new meaning
Alexander Popov [Fri, 20 Jul 2018 16:00:20 +0000 (19:00 +0300)]
Fix the check against multiple options in config file
Alexander Popov [Fri, 20 Jul 2018 15:55:43 +0000 (18:55 +0300)]
Use None as state of the options which are not found
That will change the check result
FAIL: "not found"
onto initial
FAIL: not found
Alexander Popov [Fri, 20 Jul 2018 15:57:16 +0000 (18:57 +0300)]
Drop assertions which are now useless
anthraxx [Wed, 20 Jun 2018 21:27:40 +0000 (23:27 +0200)]
improve architecture in preparation for new features
This improves the opt storage using a kconfig key based dict to
avoid looping through all opts to get a certain entry by allowing
key based lookups.
Alexander Popov [Fri, 13 Jul 2018 23:11:41 +0000 (02:11 +0300)]
ArgumentParser: drop unneeded default=False for args with action='store_true'
Alexander Popov [Fri, 13 Jul 2018 23:10:23 +0000 (02:10 +0300)]
ArgumentParser: Improve description
anthraxx [Mon, 9 Jul 2018 00:25:23 +0000 (02:25 +0200)]
argparse: using python module instead of manual getopt
Alexander Popov [Thu, 5 Jul 2018 11:44:04 +0000 (14:44 +0300)]
Consider 'not found' as an equivalent of 'is not set'
Alexander Popov [Thu, 5 Jul 2018 10:54:40 +0000 (13:54 +0300)]
Add rules for options disabled by grsecurity
Carefully extracted from their last public patch
Alexander Popov [Wed, 4 Jul 2018 18:08:21 +0000 (21:08 +0300)]
Move some features to 'cut_attack_surface' category
STRICT_DEVMEM and IO_STRICT_DEVMEM, SECCOMP and SECCOMP_FILTER
are not self protection features. They cut attack surface.
I'm also not sure about SYN_COOKIES. Mark it with a comment.
Alexander Popov [Wed, 4 Jul 2018 09:29:39 +0000 (12:29 +0300)]
More decisions on kernel options
Alexander Popov [Tue, 3 Jul 2018 20:31:48 +0000 (23:31 +0300)]
Add Oracle Unbreakable Enterprise Kernel 5 (UEK-5) config
Alexander Popov [Fri, 22 Jun 2018 12:34:23 +0000 (15:34 +0300)]
Drop CONFIG_DEBUG_KERNEL from kspp-recommendations.config
It is needed only for kernels prior to v4.11 (Kees has updated the wiki)
Alexander Popov [Wed, 20 Jun 2018 21:07:52 +0000 (00:07 +0300)]
Disable buggy IP_SCTP to cut attack surface
Alexander Popov [Wed, 20 Jun 2018 21:09:12 +0000 (00:09 +0300)]
Disable only CONFIG_USER_NS, not whole CONFIG_NAMESPACES
Thanks to @Bernhard40 for the correction
Signed-off-by: Alexander Popov <alex.popov@linux.com>
Alexander Popov [Wed, 20 Jun 2018 14:09:42 +0000 (17:09 +0300)]
Add kconfig-hardened-check.py
This script helps me to check the Linux kernel Kconfig option list
against my hardening preferences for x86_64.
Nobody likes checking configs manually. Let the computers do their job!
Signed-off-by: Alexander Popov <alex.popov@linux.com>