1
1
Fork 0
mirror of https://gitlab.archlinux.org/archlinux/infrastructure.git synced 2024-05-26 16:36:04 +02:00
infrastructure/roles/hardening
Levente Polyak b2ba187738
kernel: further default sysctl hardening
- unprivileged bpf: we do not need this on our infra, we can assume
  bpf() calls will happen with CAP_SYS_ADMIN if required.

- unprivileged userns: we do not need this on our infra for none of
  our services or similar. Reduce attack surface by a huge margin
  including most recent CVE-2020-14386.

- kptr restrict: we already check for CAP_SYSLOG and real ids but we
  really do not require any specific kernel pointers to be logged.
  Settings this to 2 instead to blank out all kernel pointers to
  protect against info leak.

- kexec: disable kexec as we do never want to kexec our running servers
  into something else. Settings this sysctl disables kexec even if its
  compiled into the kernel.

- bpf jit harden: harden BPF JIT compiler to mitigate JIT spraying for
  the sacrifices off a bit performance for all users including
  privileged.
2020-09-15 19:31:05 +02:00
..
files kernel: further default sysctl hardening 2020-09-15 19:31:05 +02:00
handlers roles: add a hardening role for sysctl hardening options 2019-05-07 21:07:14 +02:00
tasks kernel: further default sysctl hardening 2020-09-15 19:31:05 +02:00