forums.whonix.org/t/kernel-hardening-security-misc/7296/285

Preview meta tags from the forums.whonix.org website.

Linked Hostnames

4

Thumbnail

Search Engine Appearance

Google

https://forums.whonix.org/t/kernel-hardening-security-misc/7296/285

Kernel Hardening - security-misc

Whonix should implement more kernel hardening. All of these settings add no or a very minimal performance decrease. Setting “kernel.kptr_restrict=1” makes kernel symbols in /proc/kallsyms only accessible to root which c…



Bing

Kernel Hardening - security-misc

https://forums.whonix.org/t/kernel-hardening-security-misc/7296/285

Whonix should implement more kernel hardening. All of these settings add no or a very minimal performance decrease. Setting “kernel.kptr_restrict=1” makes kernel symbols in /proc/kallsyms only accessible to root which c…



DuckDuckGo

https://forums.whonix.org/t/kernel-hardening-security-misc/7296/285

Kernel Hardening - security-misc

Whonix should implement more kernel hardening. All of these settings add no or a very minimal performance decrease. Setting “kernel.kptr_restrict=1” makes kernel symbols in /proc/kallsyms only accessible to root which c…

  • General Meta Tags

    8
    • title
      Kernel Hardening - security-misc - #285 by Patrick - Development - Whonix Forum
    • charset
      utf-8
    • description
      Whonix should implement more kernel hardening. All of these settings add no or a very minimal performance decrease. Setting “kernel.kptr_restrict=1” makes kernel symbols in /proc/kallsyms only accessible to root which c…
    • generator
      Discourse 3.5.0 - https://github.com/discourse/discourse version 333e8d4ba24f41e936bdd269db0de9f3d97f2a1a
    • theme-color
      #fff
  • Open Graph Meta Tags

    9
    • og:site_name
      Whonix Forum
    • og:type
      website
    • og:image
      https://forums.whonix.org/uploads/default/original/2X/5/5ac973ff4302e69269667e09e67d850c0b628c7a.jpeg
    • og:url
      https://forums.whonix.org/t/kernel-hardening-security-misc/7296/285
    • og:title
      Kernel Hardening - security-misc
  • Twitter Meta Tags

    5
    • twitter:card
      summary_large_image
    • twitter:image
      https://forums.whonix.org/uploads/default/original/2X/a/ac61071d4245560068a380cd1c08c97d1da2201d.jpeg
    • twitter:url
      https://forums.whonix.org/t/kernel-hardening-security-misc/7296/285
    • twitter:title
      Kernel Hardening - security-misc
    • twitter:description
      Yes. Solving SUID Disabler and Permission Hardener too would be amazing! Yes, stuff we don’t use (such as pkexec) should surely have SUID removed. But we’ll need a SUID whitelist too? For now, we shouldn’t remove SUID from sudo, right? I don’t understand how such a whitelist would be possible with above code? Maybe first remove all SUID, then opt-in re-add sudo? For the upcoming boot to auto login into admin vs limited user boot option (multiple boot modes for better security: persistent user |...
  • Item Prop Meta Tags

    12
    • position
      1
    • headline
      Kernel Hardening - security-misc
    • datePublished
      2019-05-02T17:33:08Z
    • articleSection
      Development
    • keywords
  • Link Tags

    26
    • alternate nofollow
      https://forums.whonix.org/t/kernel-hardening-security-misc/7296.rss
    • apple-touch-icon
      https://forums.whonix.org/uploads/default/optimized/2X/2/222b7257d0600f2bc69cf77e6bc273aa0074ed4e_2_180x180.png
    • canonical
      https://forums.whonix.org/t/kernel-hardening-security-misc/7296?page=13
    • icon
      https://forums.whonix.org/uploads/default/optimized/2X/3/37fe81e592143b0c01c9656c44069b4bfdd3990e_2_32x32.ico
    • url
      https://forums.whonix.org/u/madaidan

Links

26