bdev_allow_write_mounted=0 revert?
“efi_pstore.pstore_disable=1” is set. Why “lsmod | grep pstore” shows that efi_pstore is loaded? The same issue persists on Tails.
Is efi_pstore.pstore_disable=1 not working since kernel 6.12?
efi_pstore /bin/false works. I think a boot parameter is better solution
Tails developers say that everything is working. It is not a problem that the module loads
That’s not really surprising to me. efi_pstore.pstore_disable=1 is a parameter to the kernel module, which implies that the module is being loaded and is then obeying the parameter.
Tails are blocking new kernel modules. Related to recent LPEs. Will Kicksecure block them too? Do it bring problems with VM networking when they are applied on host?
algif_aead
esp4
esp6
rxrpc
Great to see Whonix is active in oss-sec discussions. Aaron, what do you think about blocking rxrpc? Only “Andrew File System” use this module? Any opinions on esp4/esp6? It is used by IPSec. It could be added to sysctl but with a comment?
In general, we have to be careful what we block because of the damage it could cause. That being said, we already block quite a few rare network protocols (in security-misc/etc/modprobe.d/30_security-misc_disable.conf), so if rxrpc is really used by almost nothing except AFS, I definitely think it’s a good idea to disable it (especially since the same config file already disables AFS).
IPSec feels too important to want to block. Tails might get away with it since they’re a primarily portable OS, Whonix is more persistent and I can imagine someone having a legitimate use for IPSec there.