3.1 KiB
secureblue
After rebasing to secureblue, the following steps are recommended.
kargs
Documentation is available here for the kargs set by the commands below.
Set hardened kargs
ujust set-kargs-hardening
Set unstable hardened kargs
Can cause issues on some hardware, but stable on other hardware
ujust set-kargs-hardening-unstable
GRUB
Set a password
Setting a GRUB password helps protect the device from physical tampering and mitigates various attack vectors, such as booting from malicious media devices and changing boot or kernel parameters.
To set a GRUB password, use the following command. By default, the password will be required when modifying boot entries, but not when booting existing entries.
sudo grub2-setpassword
GRUB will prompt for a username and password. The default username is root.
If you wish to password-protect booting existing entries, you can add the grub_users root entry in the specific configuration file located in the /boot/loader/entries directory.
Create a separate wheel account for admin purposes
Creating a dedicated wheel user and removing wheel from your primary user helps prevent certain attack vectors, like:
- https://www.kicksecure.com/wiki/Dev/Strong_Linux_User_Account_Isolation#LD_PRELOAD
- https://www.kicksecure.com/wiki/Root#Prevent_Malware_from_Sniffing_the_Root_Password
adduser adminusermod -aG wheel adminpasswd admingpasswd -d {your username here} wheelreboot
When not in the wheel group, a user can be added to a dedicated group, otherwise certain actions are blocked:
- use virtual machines:
libvirt - use
adbandfastboot:plugdev - use systemwide flatpaks:
flatpak
Some actions don't have an associated group yet, you can create your own rules and groups to fix this.
Example: To allow a non-wheel user to use LUKS encrypted external drives:
sudo groupadd diskadminsudo usermod -aG diskadmin {your username here}- execute this command (explanation below)
cat >> /etc/polkit-1/rules.d/80-udisks2.rules <<EOF
polkit.addRule(function(action, subject) {
if (action.id == "org.freedesktop.udisks2.encrypted-unlock-system" || action.id == "org.freedesktop.udisks2.filesystem-mount-system" &&
subject.active == true && subject.local == true &&
subject.isInGroup("diskadmin"))
{
return polkit.Result.YES;
}
});
EOF
The custom rule allows the groupdiskadmin to do the actions for unlocking and mounting these drives. Note the requirement on active and local, and the exactly specified actions.
Chromium
Extension
- Go to uBlock Origin Lite (Why Lite?)
- Install it
- In the extension's settings, make sure all of the lists under Default and Miscellaneous are checked (and at your preference, lists in the Annoyances section or country-specific lists)