Kernel Hardening - security-misc

1 Like
1 Like
1 Like
1 Like
1 Like
1 Like

bdev_allow_write_mounted=0 revert?

2 Likes
2 Likes
2 Likes
2 Likes
1 Like
1 Like

“efi_pstore.pstore_disable=1” is set. Why “lsmod | grep pstore” shows that efi_pstore is loaded? The same issue persists on Tails.

Is efi_pstore.pstore_disable=1 not working since kernel 6.12?

efi_pstore /bin/false works. I think a boot parameter is better solution

1 Like

Tails developers say that everything is working. It is not a problem that the module loads

1 Like

That’s not really surprising to me. efi_pstore.pstore_disable=1 is a parameter to the kernel module, which implies that the module is being loaded and is then obeying the parameter.

1 Like

Tails are blocking new kernel modules. Related to recent LPEs. Will Kicksecure block them too? Do it bring problems with VM networking when they are applied on host?

algif_aead
esp4
esp6
rxrpc
1 Like

Quote oss-sec: Re: CVE-2026-31431: CopyFail: linux local privilege scalation

Related:
Kicksecure wiki - copy.fail: Mitigation

1 Like

Great to see Whonix is active in oss-sec discussions. Aaron, what do you think about blocking rxrpc? Only “Andrew File System” use this module? Any opinions on esp4/esp6? It is used by IPSec. It could be added to sysctl but with a comment?

1 Like

In general, we have to be careful what we block because of the damage it could cause. That being said, we already block quite a few rare network protocols (in security-misc/etc/modprobe.d/30_security-misc_disable.conf), so if rxrpc is really used by almost nothing except AFS, I definitely think it’s a good idea to disable it (especially since the same config file already disables AFS).

IPSec feels too important to want to block. Tails might get away with it since they’re a primarily portable OS, Whonix is more persistent and I can imagine someone having a legitimate use for IPSec there.