public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH 00/11] Kernel: Improve hardening
@ 2022-03-19 21:08 Peter Müller
  2022-03-19 21:08 ` [PATCH 01/11] Kernel: Set CONFIG_ARCH_MMAP_RND_BITS to 32 bits Peter Müller
                   ` (10 more replies)
  0 siblings, 11 replies; 30+ messages in thread
From: Peter Müller @ 2022-03-19 21:08 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2483 bytes --]

This patchset improves hardening of our Linux kernel configurations for all
architectures. Most importantly, it features the activation of the "Linux
Security Module", also known as "kernel lockdown" (a phrase coined before the
pandemic), or LSM for short.

Being set to "integrity" mode for a start, LSM prevents the kernel from being
modified by various mechanisms, of which we have some already covered. However,
it comes as a more holistic approach, which is why enabling it is desirable
for our userbase.

Most of this patchset is based on recommendations by the "kconfig-hardened-check"
tool (https://github.com/a13xp0p0v/kconfig-hardened-check/), with some inspiration
taken directly from KSPP and grsecurity.

Being unable to cross-compile IPFire for non-x86_64-architectures on my own,
and my VM on the Mustang currently being offline, this patchset does not come
with aligned kernel rootfiles for other architectures than x86_64. I am sorry
for any inconvenience and extra workload caused by this.

Also, for the sake of completeness, the effect of LSM on virtualisation has not
been tested due to time constraints, and a lack of oversight _which_ virtualisation
features we officially support and which we don't. In doubt, however, I believe
the security benefit gained from LSM outweighs a partial functional loss of
virtualisation - but that is a highly biased opinion. :-)

Peter Müller (11):
  Kernel: Set CONFIG_ARCH_MMAP_RND_BITS to 32 bits
  Kernel: Disable support for tracing block I/O actions
  Kernel: Pin loading kernel files to one filesystem
  Kernel: Enable undefined behaviour sanity checker
  Kernel: Gate SETID transitions to limit CAP_SET(G|U)ID capabilities
  Kernel: Enable LSM support and set security level to "integrity"
  Kernel: Trigger BUG if data corruption is detected
  Kernel: Do not automatically load TTY line disciplines, only if
    necessary
  Kernel: Enable SVA support for both Intel and AMD CPUs
  Kernel: Disable function and stack tracers
  Kernel: Update rootfile for x86_64

 config/kernel/kernel.config.aarch64-ipfire | 47 ++++++++++--------
 config/kernel/kernel.config.armv6l-ipfire  | 47 ++++++++++--------
 config/kernel/kernel.config.riscv64-ipfire | 47 ++++++++++--------
 config/kernel/kernel.config.x86_64-ipfire  | 57 ++++++++++++----------
 config/rootfiles/common/x86_64/linux       | 33 +++++++------
 5 files changed, 131 insertions(+), 100 deletions(-)

-- 
2.34.1

^ permalink raw reply	[flat|nested] 30+ messages in thread
[parent not found: <265D481E-78F1-4A6D-AAF4-47A5997D5741@ipfire.org>]

end of thread, other threads:[~2022-04-14 14:51 UTC | newest]

Thread overview: 30+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-03-19 21:08 [PATCH 00/11] Kernel: Improve hardening Peter Müller
2022-03-19 21:08 ` [PATCH 01/11] Kernel: Set CONFIG_ARCH_MMAP_RND_BITS to 32 bits Peter Müller
2022-03-23 11:42   ` Michael Tremer
2022-03-19 21:08 ` [PATCH 02/11] Kernel: Disable support for tracing block I/O actions Peter Müller
2022-03-23 11:44   ` Michael Tremer
2022-03-19 21:09 ` [PATCH 03/11] Kernel: Pin loading kernel files to one filesystem Peter Müller
2022-03-21 17:15   ` Arne Fitzenreiter
2022-03-21 18:50     ` Michael Tremer
2022-03-21 20:24       ` alf
2022-03-22 11:17         ` Michael Tremer
2022-03-19 21:09 ` [PATCH 04/11] Kernel: Enable undefined behaviour sanity checker Peter Müller
2022-03-23 11:45   ` Michael Tremer
2022-03-19 21:09 ` [PATCH 05/11] Kernel: Gate SETID transitions to limit CAP_SET(G|U)ID capabilities Peter Müller
2022-03-23 11:46   ` Michael Tremer
2022-03-19 21:10 ` [PATCH 06/11] Kernel: Enable LSM support and set security level to "integrity" Peter Müller
2022-03-23 17:50   ` Michael Tremer
2022-03-19 21:10 ` [PATCH 07/11] Kernel: Trigger BUG if data corruption is detected Peter Müller
2022-03-23 17:53   ` Michael Tremer
2022-03-19 21:10 ` [PATCH 08/11] Kernel: Do not automatically load TTY line disciplines, only if necessary Peter Müller
2022-03-23 17:54   ` Michael Tremer
2022-03-19 21:10 ` [PATCH 09/11] Kernel: Enable SVA support for both Intel and AMD CPUs Peter Müller
2022-03-23 17:54   ` Michael Tremer
2022-03-19 21:11 ` [PATCH 10/11] Kernel: Disable function and stack tracers Peter Müller
2022-03-23 17:56   ` Michael Tremer
2022-03-19 21:11 ` [PATCH 11/11] Kernel: Update rootfile for x86_64 Peter Müller
     [not found] <265D481E-78F1-4A6D-AAF4-47A5997D5741@ipfire.org>
2022-04-13  9:18 ` [PATCH 00/11] Kernel: Improve hardening Peter Müller
2022-04-13  9:20   ` Michael Tremer
2022-04-14  6:16     ` Peter Müller
2022-04-14  7:11       ` Michael Tremer
2022-04-14 14:51         ` Peter Müller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox