mirror of
https://github.com/optim-enterprises-bv/secureblue.git
synced 2025-11-02 03:18:00 +00:00
Provide Link to Implimentation Details (#191)
* Provide Link to Implimentation Details Provide link to the file that implements the changes stated in readme. Inspired by, https://github.com/secureblue/secureblue/issues/180
This commit is contained in:
@@ -22,11 +22,11 @@ The following are not in scope for this project:
|
||||
|
||||
Hardening applied:
|
||||
|
||||
- Setting numerous hardened sysctl values (Inspired by but not the same as Kicksecure's)
|
||||
- Setting numerous hardened sysctl values (Inspired by but not the same as Kicksecure's) <sup>[details](https://github.com/secureblue/secureblue/blob/live/config/files/usr/etc/sysctl.d/hardening.conf)</sup>
|
||||
- Disabling coredumps in limits.conf
|
||||
- Disabling all ports and services for firewalld
|
||||
- Adds per-network MAC randomization
|
||||
- Blacklisting numerous unused kernel modules to reduce attack surface
|
||||
- Blacklisting numerous unused kernel modules to reduce attack surface <sup>[details](https://github.com/secureblue/secureblue/blob/live/config/files/usr/etc/modprobe.d/blacklist.conf)</sup>
|
||||
- Require a password for sudo every time it's called
|
||||
- Disable passwordless sudo for rpm-ostree
|
||||
- Brute force protection by locking user accounts for 24 hours after 50 failed login attempts, hardened password encryption and password quality suggestions
|
||||
@@ -36,7 +36,7 @@ Hardening applied:
|
||||
- (Non-userns variants) Disabling unprivileged user namespaces
|
||||
- (Non-userns variants) Replacing bubblewrap with bubblewrap-suid so flatpak can be used without unprivileged user namespaces
|
||||
- Enabling only the [flathub-verified](https://flathub.org/apps/collection/verified/1) remote by default
|
||||
- Sets numerous hardening kernel parameters (Inspired by [Madaidan's Hardening Guide](https://madaidans-insecurities.github.io/guides/linux-hardening.html))
|
||||
- Sets numerous hardening kernel parameters (Inspired by [Madaidan's Hardening Guide](https://madaidans-insecurities.github.io/guides/linux-hardening.html)) <sup>[details](https://github.com/secureblue/secureblue/blob/live/config/files/usr/share/ublue-os/just/60-custom.just.readme.md)</sup>
|
||||
- Installs and enables [hardened_malloc](https://github.com/GrapheneOS/hardened_malloc) globally, including for flatpaks
|
||||
- Installing Chromium instead of Firefox in the base image <sup>[Why chromium?](https://grapheneos.org/usage#web-browsing)</sup> <sup>[Why not flatpak chromium?](https://forum.vivaldi.net/post/669805)</sup>
|
||||
- Including a hardened chromium config that disables JIT javascript <sup>[why?](https://microsoftedge.github.io/edgevr/posts/Super-Duper-Secure-Mode/#is-jit-worth-it)</sup>
|
||||
|
||||
Reference in New Issue
Block a user