mirror of
https://github.com/PrivSec-dev/privsec.dev
synced 2025-02-20 18:31:35 -05:00
Update content/posts/linux/Desktop-Linux-Hardening.md
Co-authored-by: WfKe9vLwSvv7rN <96372288+WfKe9vLwSvv7rN@users.noreply.github.com> Signed-off-by: Raja Grewal <rg_public@proton.me>
This commit is contained in:
parent
16ac651487
commit
dc28dd7fec
@ -284,7 +284,8 @@ random.trust_cpu=off random.trust_bootloader=off
|
||||
|
||||
As sources of initial entropy at boot, both the CPU and bootloader should be [distrusted](https://lkml.org/lkml/2022/6/5/271). For CPUs, the RBRAND instructions set is [impossible to audit](https://madaidans-insecurities.github.io/guides/linux-hardening.html#rdrand), and moving forward as a precaution, the bootloader should be treated identically. Note that both of these kernel parameters will increase boot time.
|
||||
|
||||
- DMA mitigations
|
||||
#### DMA mitigations
|
||||
|
||||
```
|
||||
intel_iommu=on amd_iommu=on efi=disable_early_pci_dma iommu.passthrough=0 iommu.strict=1
|
||||
```
|
||||
|
Loading…
Reference in New Issue
Block a user