mirror of
https://github.com/tommytran732/Linux-Setup-Scripts
synced 2024-11-24 18:21:34 -05:00
Compare commits
4 Commits
acf3e6ae11
...
88918cf7dc
Author | SHA1 | Date | |
---|---|---|---|
88918cf7dc | |||
236f650566 | |||
603738ff45 | |||
5e58a06876 |
@ -63,20 +63,10 @@ sudo systemctl daemon-reload
|
|||||||
sudo systemctl restart sshd
|
sudo systemctl restart sshd
|
||||||
|
|
||||||
# Security kernel settings
|
# Security kernel settings
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/etc/modprobe.d/30_security-misc.conf | sudo tee /etc/modprobe.d/30_security-misc.conf
|
unpriv curl https://raw.githubusercontent.com/secureblue/secureblue/live/config/files/usr/etc/modprobe.d/blacklist.conf | sudo tee /etc/modprobe.d/server-blacklist.conf
|
||||||
sudo chmod 644 /etc/modprobe.d/30_security-misc.conf
|
sudo chmod 644 /etc/modprobe.d/server-blacklist.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install msr/install msr/g' /etc/modprobe.d/30_security-misc.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/sysctl.d/99-server.conf | sudo tee /etc/sysctl.d/99-server.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install bluetooth/install bluetooth/g' /etc/modprobe.d/30_security-misc.conf
|
sudo chmod 644 /etc/sysctl.d/99-server.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install btusb/install btusb/g' /etc/modprobe.d/30_security-misc.conf
|
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/990-security-misc.conf | sudo tee /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sudo chmod 644 /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sudo sed -i 's/kernel\.yama\.ptrace_scope[[:space:]]*=.*/kernel.yama.ptrace_scope=3/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sudo sed -i 's/net\.ipv4\.icmp_echo_ignore_all[[:space:]]*=.*/net.ipv4.icmp_echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sudo sed -i 's/net\.ipv6\.icmp.echo_ignore_all[[:space:]]*=.*/net.ipv6.icmp.echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_silent-kernel-printk.conf | sudo tee /etc/sysctl.d/30_silent-kernel-printk.conf
|
|
||||||
sudo chmod 644 /etc/sysctl.d/30_silent-kernel-printk.conf
|
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_security-misc_kexec-disable.conf | sudo tee /etc/sysctl.d/30_security-misc_kexec-disable.conf
|
|
||||||
sudo chmod 644 /etc/sysctl.d/30_security-misc_kexec-disable.conf
|
|
||||||
sudo dracut -f
|
sudo dracut -f
|
||||||
sudo sysctl -p
|
sudo sysctl -p
|
||||||
|
|
||||||
@ -88,7 +78,11 @@ else
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
# Disable coredump
|
# Disable coredump
|
||||||
|
umask 022
|
||||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
||||||
|
mkdir -p /etc/systemd/coredump.conf.d
|
||||||
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/systemd/coredump.conf.d/disable.conf | sudo tee /etc/systemd/coredump.conf.d/disable.conf
|
||||||
|
umask 077
|
||||||
|
|
||||||
# Setup ZRAM
|
# Setup ZRAM
|
||||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/systemd/zram-generator.conf | sudo tee /etc/systemd/zram-generator.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/systemd/zram-generator.conf | sudo tee /etc/systemd/zram-generator.conf
|
||||||
@ -105,6 +99,10 @@ sudo systemctl enable --now dnf-automatic.timer
|
|||||||
# Remove unnecessary packages
|
# Remove unnecessary packages
|
||||||
sudo dnf remove -y cockpit*
|
sudo dnf remove -y cockpit*
|
||||||
|
|
||||||
|
# Install hardened_malloc
|
||||||
|
sudo dnf copr enable secureblue/hardened_malloc -y
|
||||||
|
sudo dnf install -y hardened_malloc
|
||||||
|
|
||||||
# Install appropriate virtualization drivers
|
# Install appropriate virtualization drivers
|
||||||
if [ "$virtualization" = 'kvm' ]; then
|
if [ "$virtualization" = 'kvm' ]; then
|
||||||
sudo dnf install -y qemu-guest-agent
|
sudo dnf install -y qemu-guest-agent
|
||||||
@ -150,22 +148,9 @@ MACHINE_TYPE=$(uname -m)
|
|||||||
if [ "$virtualization" = 'none' ] || [ "${MACHINE_TYPE}" == 'x86_64' ]; then
|
if [ "$virtualization" = 'none' ] || [ "${MACHINE_TYPE}" == 'x86_64' ]; then
|
||||||
sudo dnf install -y 'https://divested.dev/rpm/fedora/divested-release-20231210-2.noarch.rpm'
|
sudo dnf install -y 'https://divested.dev/rpm/fedora/divested-release-20231210-2.noarch.rpm'
|
||||||
sudo sed -i 's/^metalink=.*/&?protocol=https/g' /etc/yum.repos.d/divested-release.repo
|
sudo sed -i 's/^metalink=.*/&?protocol=https/g' /etc/yum.repos.d/divested-release.repo
|
||||||
if [ "${MACHINE_TYPE}" != 'x86_64' ]; then
|
sudo dnf config-manager --save --setopt=divested.includepkgs=divested-release,real-ucode,microcode_ctl,amd-ucode-firmware
|
||||||
sudo dnf config-manager --save --setopt=divested.includepkgs=divested-release,real-ucode,microcode_ctl,amd-ucode-firmware
|
sudo dnf install -y real-ucode
|
||||||
sudo dnf install -y real-ucode
|
sudo dracut -f
|
||||||
sudo dracut -f
|
|
||||||
elif [ "$virtualization" != 'none' ]; then
|
|
||||||
sudo dnf config-manager --save --setopt=divested.includepkgs=divested-release,hardened_malloc
|
|
||||||
sudo dnf install -y hardened_malloc
|
|
||||||
else
|
|
||||||
sudo dnf config-manager --save --setopt=divested.includepkgs=divested-release,real-ucode,microcode_ctl,amd-ucode-firmware,hardened_malloc
|
|
||||||
sudo dnf install -y real-ucode hardened_malloc
|
|
||||||
echo 'libhardened_malloc.so' | sudo tee /etc/ld.so.preload
|
|
||||||
sudo dracut -f
|
|
||||||
fi
|
|
||||||
elif [ "${MACHINE_TYPE}" == 'aarch64' ]; then
|
|
||||||
sudo dnf copr enable secureblue/hardened_malloc -y
|
|
||||||
sudo dnf install -y hardened_malloc
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Setup networking
|
# Setup networking
|
||||||
|
@ -62,16 +62,14 @@ unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/m
|
|||||||
sudo chmod 644 /etc/ssh/ssh_config.d/10-custom.conf
|
sudo chmod 644 /etc/ssh/ssh_config.d/10-custom.conf
|
||||||
|
|
||||||
# Security kernel settings
|
# Security kernel settings
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/etc/modprobe.d/30_security-misc.conf | sudo tee /etc/modprobe.d/30_security-misc.conf
|
if [ "${virtualization}" = 'parallels' ]; then
|
||||||
sudo chmod 644 /etc/modprobe.d/30_security-misc.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Kernel-Module-Blacklist/main/etc/modprobe.d/workstation-blacklist.conf | sudo tee /etc/modprobe.d/workstation-blacklist.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install msr/install msr/g' /etc/modprobe.d/30_security-misc.conf
|
else
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/990-security-misc.conf | sudo tee /etc/sysctl.d/990-security-misc.conf
|
unpriv curl https://raw.githubusercontent.com/secureblue/secureblue/live/config/files/usr/etc/modprobe.d/blacklist.conf | sudo tee /etc/modprobe.d/workstation-blacklist.conf
|
||||||
sudo chmod 644 /etc/sysctl.d/990-security-misc.conf
|
fi
|
||||||
sudo sed -i 's/kernel\.yama\.ptrace_scope[[:space:]]*=.*/kernel.yama.ptrace_scope=3/g' /etc/sysctl.d/990-security-misc.conf
|
sudo chmod 644 /etc/modprobe.d/workstation-blacklist.conf
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_silent-kernel-printk.conf | sudo tee /etc/sysctl.d/30_silent-kernel-printk.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/sysctl.d/99-workstation.conf | sudo tee /etc/sysctl.d/99-workstation.conf
|
||||||
sudo chmod 644 /etc/sysctl.d/30_silent-kernel-printk.conf
|
sudo chmod 644 /etc/sysctl.d/99-workstation.conf
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_security-misc_kexec-disable.conf | sudo tee /etc/sysctl.d/30_security-misc_kexec-disable.conf
|
|
||||||
sudo chmod 644 /etc/sysctl.d/30_security-misc_kexec-disable.conf
|
|
||||||
sudo dracut -f
|
sudo dracut -f
|
||||||
sudo sysctl -p
|
sudo sysctl -p
|
||||||
|
|
||||||
@ -91,7 +89,11 @@ else
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
# Disable coredump
|
# Disable coredump
|
||||||
|
umask 022
|
||||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
||||||
|
mkdir -p /etc/systemd/coredump.conf.d
|
||||||
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/systemd/coredump.conf.d/disable.conf | sudo tee /etc/systemd/coredump.conf.d/disable.conf
|
||||||
|
umask 077
|
||||||
|
|
||||||
# Disable XWayland
|
# Disable XWayland
|
||||||
umask 022
|
umask 022
|
||||||
@ -162,6 +164,10 @@ sudo dnf config-manager --set-disabled fedora-cisco-openh264
|
|||||||
# Update packages
|
# Update packages
|
||||||
sudo dnf -y upgrade
|
sudo dnf -y upgrade
|
||||||
|
|
||||||
|
# Install hardened_malloc
|
||||||
|
sudo dnf copr enable secureblue/hardened_malloc -y
|
||||||
|
sudo dnf install -y hardened_malloc
|
||||||
|
|
||||||
# Install packages that I use
|
# Install packages that I use
|
||||||
sudo dnf -y install adw-gtk3-theme gnome-console gnome-shell-extension-appindicator gnome-shell-extension-blur-my-shell gnome-shell-extension-background-logo
|
sudo dnf -y install adw-gtk3-theme gnome-console gnome-shell-extension-appindicator gnome-shell-extension-blur-my-shell gnome-shell-extension-background-logo
|
||||||
|
|
||||||
@ -218,26 +224,13 @@ else
|
|||||||
sudo tuned-adm profile virtual-guest
|
sudo tuned-adm profile virtual-guest
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Setup real-ucode and hardened_malloc
|
# Setup real-ucode
|
||||||
if [ "$virtualization" = 'none' ] || [ "${MACHINE_TYPE}" == 'x86_64' ]; then
|
if [ "$virtualization" = 'none' ] || [ "${MACHINE_TYPE}" == 'x86_64' ]; then
|
||||||
sudo dnf install -y 'https://divested.dev/rpm/fedora/divested-release-20231210-2.noarch.rpm'
|
sudo dnf install -y 'https://divested.dev/rpm/fedora/divested-release-20231210-2.noarch.rpm'
|
||||||
sudo sed -i 's/^metalink=.*/&?protocol=https/g' /etc/yum.repos.d/divested-release.repo
|
sudo sed -i 's/^metalink=.*/&?protocol=https/g' /etc/yum.repos.d/divested-release.repo
|
||||||
if [ "${MACHINE_TYPE}" != 'x86_64' ]; then
|
sudo dnf config-manager --save --setopt=divested.includepkgs=divested-release,real-ucode,microcode_ctl,amd-ucode-firmware
|
||||||
sudo dnf config-manager --save --setopt=divested.includepkgs=divested-release,real-ucode,microcode_ctl,amd-ucode-firmware
|
sudo dnf install -y real-ucode
|
||||||
sudo dnf install -y real-ucode
|
sudo dracut -f
|
||||||
sudo dracut -f
|
|
||||||
elif [ "$virtualization" != 'none' ]; then
|
|
||||||
sudo dnf config-manager --save --setopt=divested.includepkgs=divested-release,hardened_malloc
|
|
||||||
sudo dnf install -y hardened_malloc
|
|
||||||
else
|
|
||||||
sudo dnf config-manager --save --setopt=divested.includepkgs=divested-release,real-ucode,microcode_ctl,amd-ucode-firmware,hardened_malloc
|
|
||||||
sudo dnf install -y real-ucode hardened_malloc
|
|
||||||
echo 'libhardened_malloc.so' | sudo tee /etc/ld.so.preload
|
|
||||||
sudo dracut -f
|
|
||||||
fi
|
|
||||||
elif [ "${MACHINE_TYPE}" == 'aarch64' ]; then
|
|
||||||
sudo dnf copr enable secureblue/hardened_malloc -y
|
|
||||||
sudo dnf install -y hardened_malloc
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Setup networking
|
# Setup networking
|
||||||
|
22
Proxmox-8.sh
22
Proxmox-8.sh
@ -73,23 +73,23 @@ proxmox-boot-tool refresh
|
|||||||
###
|
###
|
||||||
|
|
||||||
# Kernel hardening
|
# Kernel hardening
|
||||||
curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/etc/modprobe.d/30_security-misc.conf -o /etc/modprobe.d/30_security-misc.conf
|
curl https://raw.githubusercontent.com/secureblue/secureblue/live/config/files/usr/etc/modprobe.d/blacklist.conf | tee /etc/modprobe.d/server-blacklist.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install msr/install msr/g' /etc/modprobe.d/30_security-misc.conf
|
chmod 644 /etc/modprobe.d/server-blacklist.conf
|
||||||
sed -i 's/#[[:space:]]*install bluetooth/install bluetooth/g' /etc/modprobe.d/30_security-misc.conf
|
sed -i 's/kernel_io_uring_disable = 2/#ernel_io_uring_disable = 2/g'
|
||||||
sed -i 's/#[[:space:]]*install btusb/install btusb/g' /etc/modprobe.d/30_security-misc.conf
|
curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/sysctl.d/99-server.conf | tee /etc/sysctl.d/99-server.conf
|
||||||
curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/990-security-misc.conf -o /etc/sysctl.d/990-security-misc.conf
|
chmod 644 /etc/sysctl.d/99-server.conf
|
||||||
sed -i 's/kernel\.yama\.ptrace_scope[[:space:]]*=.*/kernel.yama.ptrace_scope=3/g' /etc/sysctl.d/990-security-misc.conf
|
dracut -f
|
||||||
sed -i 's/net\.ipv4\.icmp_echo_ignore_all[[:space:]]*=.*/net.ipv4.icmp_echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sed -i 's/net\.ipv6\.icmp.echo_ignore_all[[:space:]]*=.*/net.ipv6.icmp.echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_silent-kernel-printk.conf -o /etc/sysctl.d/30_silent-kernel-printk.conf
|
|
||||||
curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_security-misc_kexec-disable.conf -o /etc/sysctl.d/30_security-misc_kexec-disable.conf
|
|
||||||
sysctl -p
|
sysctl -p
|
||||||
|
|
||||||
# Rebuild initramfs
|
# Rebuild initramfs
|
||||||
update-initramfs -u
|
update-initramfs -u
|
||||||
|
|
||||||
# Disable coredump
|
# Disable coredump
|
||||||
curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
umask 022
|
||||||
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
||||||
|
mkdir -p /etc/systemd/coredump.conf.d
|
||||||
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/systemd/coredump.conf.d/disable.conf | sudo tee /etc/systemd/coredump.conf.d/disable.conf
|
||||||
|
umask 077
|
||||||
|
|
||||||
# Harden SSH
|
# Harden SSH
|
||||||
sed -i 's/#GSSAPIAuthentication no/GSSAPIAuthentication no/g' /etc/ssh/sshd_config
|
sed -i 's/#GSSAPIAuthentication no/GSSAPIAuthentication no/g' /etc/ssh/sshd_config
|
||||||
|
22
RHEL-9.sh
22
RHEL-9.sh
@ -57,27 +57,21 @@ sudo systemctl daemon-reload
|
|||||||
sudo systemctl restart sshd
|
sudo systemctl restart sshd
|
||||||
|
|
||||||
# Security kernel settings
|
# Security kernel settings
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/etc/modprobe.d/30_security-misc.conf | sudo tee /etc/modprobe.d/30_security-misc.conf
|
unpriv curl https://raw.githubusercontent.com/secureblue/secureblue/live/config/files/usr/etc/modprobe.d/blacklist.conf | sudo tee /etc/modprobe.d/server-blacklist.conf
|
||||||
sudo chmod 644 /etc/modprobe.d/30_security-misc.conf
|
sudo chmod 644 /etc/modprobe.d/server-blacklist.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install msr/install msr/g' /etc/modprobe.d/30_security-misc.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/sysctl.d/99-server.conf | sudo tee /etc/sysctl.d/99-server.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install bluetooth/install bluetooth/g' /etc/modprobe.d/30_security-misc.conf
|
sudo chmod 644 /etc/sysctl.d/99-server.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install btusb/install btusb/g' /etc/modprobe.d/30_security-misc.conf
|
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/990-security-misc.conf | sudo tee /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sudo chmod 644 /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sudo sed -i 's/kernel\.yama\.ptrace_scope[[:space:]]*=.*/kernel.yama.ptrace_scope=3/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sudo sed -i 's/net\.ipv4\.icmp_echo_ignore_all[[:space:]]*=.*/net.ipv4.icmp_echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sudo sed -i 's/net\.ipv6\.icmp.echo_ignore_all[[:space:]]*=.*/net.ipv6.icmp.echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_silent-kernel-printk.conf | sudo tee /etc/sysctl.d/30_silent-kernel-printk.conf
|
|
||||||
sudo chmod 644 /etc/sysctl.d/30_silent-kernel-printk.conf
|
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_security-misc_kexec-disable.conf | sudo tee /etc/sysctl.d/30_security-misc_kexec-disable.conf
|
|
||||||
sudo chmod 644 /etc/sysctl.d/30_security-misc_kexec-disable.conf
|
|
||||||
sudo dracut -f
|
sudo dracut -f
|
||||||
sudo sysctl -p
|
sudo sysctl -p
|
||||||
|
|
||||||
sudo grubby --update-kernel=ALL --args='mitigations=auto,nosmt spectre_v2=on spectre_bhi=on spec_store_bypass_disable=on tsx=off kvm.nx_huge_pages=force nosmt=force l1d_flush=on spec_rstack_overflow=safe-ret gather_data_sampling=force reg_file_data_sampling=on random.trust_bootloader=off random.trust_cpu=off intel_iommu=on amd_iommu=force_isolation efi=disable_early_pci_dma iommu=force iommu.passthrough=0 iommu.strict=1 slab_nomerge init_on_alloc=1 init_on_free=1 pti=on vsyscall=none ia32_emulation=0 page_alloc.shuffle=1 randomize_kstack_offset=on debugfs=off lockdown=confidentiality module.sig_enforce=1 console=tty0 console=ttyS0,115200'
|
sudo grubby --update-kernel=ALL --args='mitigations=auto,nosmt spectre_v2=on spectre_bhi=on spec_store_bypass_disable=on tsx=off kvm.nx_huge_pages=force nosmt=force l1d_flush=on spec_rstack_overflow=safe-ret gather_data_sampling=force reg_file_data_sampling=on random.trust_bootloader=off random.trust_cpu=off intel_iommu=on amd_iommu=force_isolation efi=disable_early_pci_dma iommu=force iommu.passthrough=0 iommu.strict=1 slab_nomerge init_on_alloc=1 init_on_free=1 pti=on vsyscall=none ia32_emulation=0 page_alloc.shuffle=1 randomize_kstack_offset=on debugfs=off lockdown=confidentiality module.sig_enforce=1 console=tty0 console=ttyS0,115200'
|
||||||
|
|
||||||
# Disable coredump
|
# Disable coredump
|
||||||
|
umask 022
|
||||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
||||||
|
mkdir -p /etc/systemd/coredump.conf.d
|
||||||
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/systemd/coredump.conf.d/disable.conf | sudo tee /etc/systemd/coredump.conf.d/disable.conf
|
||||||
|
umask 077
|
||||||
|
|
||||||
# Setup DNF
|
# Setup DNF
|
||||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/dnf/dnf.conf | sudo tee /etc/dnf/dnf.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/dnf/dnf.conf | sudo tee /etc/dnf/dnf.conf
|
||||||
|
@ -52,24 +52,27 @@ fi
|
|||||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/ssh/ssh_config.d/10-custom.conf | sudo tee /etc/ssh/ssh_config.d/10-custom.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/ssh/ssh_config.d/10-custom.conf | sudo tee /etc/ssh/ssh_config.d/10-custom.conf
|
||||||
sudo chmod 644 /etc/ssh/ssh_config.d/10-custom.conf
|
sudo chmod 644 /etc/ssh/ssh_config.d/10-custom.conf
|
||||||
|
|
||||||
# Kernel hardening
|
# Security kernel settings
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/etc/modprobe.d/30_security-misc.conf | sudo tee /etc/modprobe.d/30_security-misc.conf
|
if [ "${virtualization}" = 'parallels' ]; then
|
||||||
sudo chmod 644 /etc/modprobe.d/30_security-misc.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Kernel-Module-Blacklist/main/etc/modprobe.d/workstation-blacklist.conf | sudo tee /etc/modprobe.d/workstation-blacklist.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install msr/install msr/g' /etc/modprobe.d/30_security-misc.conf
|
else
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/990-security-misc.conf | sudo tee /etc/sysctl.d/990-security-misc.conf
|
unpriv curl https://raw.githubusercontent.com/secureblue/secureblue/live/config/files/usr/etc/modprobe.d/blacklist.conf | sudo tee /etc/modprobe.d/workstation-blacklist.conf
|
||||||
sudo chmod 644 /etc/sysctl.d/990-security-misc.conf
|
fi
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_silent-kernel-printk.conf | sudo tee /etc/sysctl.d/30_silent-kernel-printk.conf
|
sudo chmod 644 /etc/modprobe.d/workstation-blacklist.conf
|
||||||
sudo chmod 644 /etc/sysctl.d/30_silent-kernel-printk.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/sysctl.d/99-workstation.conf | sudo tee /etc/sysctl.d/99-workstation.conf
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_security-misc_kexec-disable.conf | sudo tee /etc/sysctl.d/30_security-misc_kexec-disable.conf
|
sudo chmod 644 /etc/sysctl.d/99-workstation.conf
|
||||||
sudo chmod 644 /etc/sysctl.d/30_security-misc_kexec-disable.conf
|
sudo dracut -f
|
||||||
sudo sed -i 's/kernel\.yama\.ptrace_scope[[:space:]]*=.*/kernel.yama.ptrace_scope=3/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sudo sysctl -p
|
sudo sysctl -p
|
||||||
|
|
||||||
# Rebuild initramfs
|
# Rebuild initramfs
|
||||||
sudo update-initramfs -u
|
sudo update-initramfs -u
|
||||||
|
|
||||||
# Disable coredump
|
# Disable coredump
|
||||||
|
umask 022
|
||||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
||||||
|
mkdir -p /etc/systemd/coredump.conf.d
|
||||||
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/systemd/coredump.conf.d/disable.conf | sudo tee /etc/systemd/coredump.conf.d/disable.conf
|
||||||
|
umask 077
|
||||||
|
|
||||||
# Update GRUB config
|
# Update GRUB config
|
||||||
sed -i 's/splash/splash mitigations=auto,nosmt spectre_v2=on spectre_bhi=on spec_store_bypass_disable=on tsx=off kvm.nx_huge_pages=force nosmt=force l1d_flush=on spec_rstack_overflow=safe-ret gather_data_sampling=force reg_file_data_sampling=on random.trust_bootloader=off random.trust_cpu=off intel_iommu=on amd_iommu=force_isolation efi=disable_early_pci_dma iommu=force iommu.passthrough=0 iommu.strict=1 slab_nomerge init_on_alloc=1 init_on_free=1 pti=on vsyscall=none ia32_emulation=0 page_alloc.shuffle=1 randomize_kstack_offset=on debugfs=off/g' /etc/default/grub
|
sed -i 's/splash/splash mitigations=auto,nosmt spectre_v2=on spectre_bhi=on spec_store_bypass_disable=on tsx=off kvm.nx_huge_pages=force nosmt=force l1d_flush=on spec_rstack_overflow=safe-ret gather_data_sampling=force reg_file_data_sampling=on random.trust_bootloader=off random.trust_cpu=off intel_iommu=on amd_iommu=force_isolation efi=disable_early_pci_dma iommu=force iommu.passthrough=0 iommu.strict=1 slab_nomerge init_on_alloc=1 init_on_free=1 pti=on vsyscall=none ia32_emulation=0 page_alloc.shuffle=1 randomize_kstack_offset=on debugfs=off/g' /etc/default/grub
|
||||||
|
@ -57,24 +57,23 @@ unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/sys
|
|||||||
sudo systemctl daemon-reload
|
sudo systemctl daemon-reload
|
||||||
sudo systemctl restart ssh
|
sudo systemctl restart ssh
|
||||||
|
|
||||||
# Kernel hardening
|
# Security kernel settings
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/etc/modprobe.d/30_security-misc.conf | sudo tee /etc/modprobe.d/30_security-misc.conf
|
unpriv curl https://raw.githubusercontent.com/secureblue/secureblue/live/config/files/usr/etc/modprobe.d/blacklist.conf | sudo tee /etc/modprobe.d/server-blacklist.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install msr/install msr/g' /etc/modprobe.d/30_security-misc.conf
|
sudo chmod 644 /etc/modprobe.d/server-blacklist.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install bluetooth/install bluetooth/g' /etc/modprobe.d/30_security-misc.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/sysctl.d/99-server.conf | sudo tee /etc/sysctl.d/99-server.conf
|
||||||
sudo sed -i 's/#[[:space:]]*install btusb/install btusb/g' /etc/modprobe.d/30_security-misc.conf
|
sudo chmod 644 /etc/sysctl.d/99-server.conf
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/990-security-misc.conf | sudo tee /etc/sysctl.d/990-security-misc.conf
|
sudo dracut -f
|
||||||
sudo sed -i 's/kernel.yama.ptrace_scope[[:space:]]*=.*/kernel.yama.ptrace_scope=3/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sudo sed -i 's/net\.ipv4\.icmp_echo_ignore_all[[:space:]]*=.*/net.ipv4.icmp_echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
sudo sed -i 's/net\.ipv6\.icmp.echo_ignore_all[[:space:]]*=.*/net.ipv6.icmp.echo_ignore_all=0/g' /etc/sysctl.d/990-security-misc.conf
|
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_silent-kernel-printk.conf | sudo tee /etc/sysctl.d/30_silent-kernel-printk.conf
|
|
||||||
unpriv curl https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/30_security-misc_kexec-disable.conf | sudo tee /etc/sysctl.d/30_security-misc_kexec-disable.conf
|
|
||||||
sudo sysctl -p
|
sudo sysctl -p
|
||||||
|
|
||||||
# Rebuild initramfs
|
# Rebuild initramfs
|
||||||
sudo update-initramfs -u
|
sudo update-initramfs -u
|
||||||
|
|
||||||
# Disable coredump
|
# Disable coredump
|
||||||
|
umask 022
|
||||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/security/limits.d/30-disable-coredump.conf | sudo tee /etc/security/limits.d/30-disable-coredump.conf
|
||||||
|
mkdir -p /etc/systemd/coredump.conf.d
|
||||||
|
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/systemd/coredump.conf.d/disable.conf | sudo tee /etc/systemd/coredump.conf.d/disable.conf
|
||||||
|
umask 077
|
||||||
|
|
||||||
# Update GRUB config
|
# Update GRUB config
|
||||||
if [ ! -d /boot/efi/EFI/ZBM ]; then
|
if [ ! -d /boot/efi/EFI/ZBM ]; then
|
||||||
|
114
etc/sysctl.d/99-server.conf
Normal file
114
etc/sysctl.d/99-server.conf
Normal file
@ -0,0 +1,114 @@
|
|||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl
|
||||||
|
dev.tty.ldisc_autoload = 0
|
||||||
|
|
||||||
|
# https://access.redhat.com/solutions/1985633
|
||||||
|
# Seems dangerous
|
||||||
|
fs.binfmt_misc.status = 0
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-userspace
|
||||||
|
# Enable fs.protected sysctls
|
||||||
|
fs.protected_regular = 2
|
||||||
|
fs.protected_fifos = 2
|
||||||
|
fs.protected_symlinks = 1
|
||||||
|
fs.protected_hardlinks = 1
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#core-dumps
|
||||||
|
# Disable coredumps
|
||||||
|
# For additional safety, disable coredumps using ulimit and systemd too.
|
||||||
|
kernel.core_pattern=|/bin/false
|
||||||
|
fs.suid_dumpable = 0
|
||||||
|
|
||||||
|
# Restrict dmesg to CAP_SYS_LOG
|
||||||
|
# https://www.kernel.org/doc/Documentation/sysctl/kernel.txt
|
||||||
|
kernel.dmesg_restrict = 1
|
||||||
|
|
||||||
|
# https://www.kernel.org/doc/Documentation/sysctl/kernel.txt
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-kernel
|
||||||
|
# https://kernsec.org/wiki/index.php/Bug_Classes/Kernel_pointer_leak
|
||||||
|
# Restrict access to /proc
|
||||||
|
kernel.kptr_restrict = 2
|
||||||
|
|
||||||
|
# Not needed, I don't do livepatching and reboot regularly.
|
||||||
|
# On Ubuntu LTS just sed this to be 0 if you use livepatch.
|
||||||
|
kernel.kexec_load_disabled = 1
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl
|
||||||
|
# Basically, restrict eBPF to CAP_BPF.
|
||||||
|
kernel.unprivileged_bpf_disabled = 1
|
||||||
|
net.core.bpf_jit_harden = 2
|
||||||
|
|
||||||
|
# Docker running as root do not require unpriv user ns, which is dangerous, so we disabe it
|
||||||
|
kernel.unprivileged_userns_clone = 0
|
||||||
|
|
||||||
|
# Needed for gVisor, which is used on almost all of my servers
|
||||||
|
kernel.yama.ptrace_scope = 1
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl
|
||||||
|
# Restrict performance events from unprivileged users as much as possible.
|
||||||
|
# We are using 4 here, since Ubuntu supports such a level.
|
||||||
|
# Official Linux kernel documentation only says >= so it probably will work.
|
||||||
|
kernel.perf_event_paranoid = 4
|
||||||
|
|
||||||
|
# https://github.com/containerd/containerd/issues/9048
|
||||||
|
# Disable io_uring, a very sus feature.
|
||||||
|
# Note that this will make using Proxmox extremely annoying though, so you might wanna comment this out
|
||||||
|
# on a Proxmox node.
|
||||||
|
kernel_io_uring_disable = 2
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-kernel
|
||||||
|
# Disable sysrq
|
||||||
|
kernel.sysrq = 0
|
||||||
|
|
||||||
|
# https://www.stigviewer.com/stig/red_hat_enterprise_linux_6/2020-09-03/finding/V-217911
|
||||||
|
# Not running a router here, so no redirects
|
||||||
|
net.ipv4.conf.*.send_redirects = 0
|
||||||
|
net.ipv4.conf.*.accept_redirects = 0
|
||||||
|
net.ipv6.conf.*.accept_redirects = 0
|
||||||
|
|
||||||
|
# Check if the source of the IP address is reachable through the same interface it came in
|
||||||
|
# Basic IP spoofing mitigation
|
||||||
|
net.ipv4.conf.*.rp_filter = 1
|
||||||
|
|
||||||
|
# Respond to ICMP
|
||||||
|
net.ipv4.icmp_echo_ignore_all = 1
|
||||||
|
net.ipv6.icmp.echo_ignore_all = 1
|
||||||
|
|
||||||
|
# Enable IP Forwarding
|
||||||
|
# Almost all of my servers run Docker anyways, and Docker absolutely requires this.
|
||||||
|
net.ipv4.ip_forward = 1
|
||||||
|
net.ipv6.conf.all.forwarding = 1
|
||||||
|
|
||||||
|
# https://www.stigviewer.com/stig/red_hat_enterprise_linux_6/2016-06-05/finding/V-38537
|
||||||
|
# Ignore bogus icmp response
|
||||||
|
net.ipv4.icmp_ignore_bogus_error_responses = 1
|
||||||
|
|
||||||
|
# Protection against time-wait assasination attacks
|
||||||
|
net.ipv4.tcp_rfc1337 = 1
|
||||||
|
|
||||||
|
# Enable SYN cookies
|
||||||
|
# Basic SYN flood mitigation
|
||||||
|
net.ipv4.tcp_syncookies = 1
|
||||||
|
|
||||||
|
# https://access.redhat.com/sites/default/files/attachments/20150325_network_performance_tuning.pdf
|
||||||
|
# Make sure TCP timestamp is enabled
|
||||||
|
net.ipv4.tcp_timestamps = 1
|
||||||
|
|
||||||
|
# https://access.redhat.com/sites/default/files/attachments/20150325_network_performance_tuning.pdf
|
||||||
|
# Disable TCP SACK
|
||||||
|
# We have good networking :)
|
||||||
|
net.ipv4.tcp_sack = 0
|
||||||
|
|
||||||
|
# No SACK, therefore no Duplicated SACK
|
||||||
|
net.ipv4.tcp_dsack = 0
|
||||||
|
|
||||||
|
# Improve ALSR effectiveness for mmap
|
||||||
|
vm.mmap_rnd_bits = 32
|
||||||
|
vm.mmap_rnd_compat_bits = 16
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-kernel
|
||||||
|
# Restrict userfaultfd to CAP_SYS_PTRACE
|
||||||
|
# https://bugs.archlinux.org/task/62780
|
||||||
|
# Interestingly enough, Arch does not even have userfaultfd in their kernel, so it is
|
||||||
|
# probably not used in the real world at all.
|
||||||
|
vm.unprivileged_userfaultfd = 0
|
114
etc/sysctl.d/99-workstation.conf
Normal file
114
etc/sysctl.d/99-workstation.conf
Normal file
@ -0,0 +1,114 @@
|
|||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl
|
||||||
|
dev.tty.ldisc_autoload = 0
|
||||||
|
|
||||||
|
# https://access.redhat.com/solutions/1985633
|
||||||
|
# Seems dangerous
|
||||||
|
fs.binfmt_misc.status = 0
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-userspace
|
||||||
|
# Enable fs.protected sysctls
|
||||||
|
fs.protected_regular = 2
|
||||||
|
fs.protected_fifos = 2
|
||||||
|
fs.protected_symlinks = 1
|
||||||
|
fs.protected_hardlinks = 1
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#core-dumps
|
||||||
|
# Disable coredumps
|
||||||
|
# For additional safety, disable coredumps using ulimit and systemd too.
|
||||||
|
kernel.core_pattern=|/bin/false
|
||||||
|
fs.suid_dumpable = 0
|
||||||
|
|
||||||
|
# Restrict dmesg to CAP_SYS_LOG
|
||||||
|
# https://www.kernel.org/doc/Documentation/sysctl/kernel.txt
|
||||||
|
kernel.dmesg_restrict = 1
|
||||||
|
|
||||||
|
# https://www.kernel.org/doc/Documentation/sysctl/kernel.txt
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-kernel
|
||||||
|
# https://kernsec.org/wiki/index.php/Bug_Classes/Kernel_pointer_leak
|
||||||
|
# Restrict access to /proc
|
||||||
|
kernel.kptr_restrict = 2
|
||||||
|
|
||||||
|
# Not needed, I don't do livepatching and reboot regularly.
|
||||||
|
# On a workstation, this shouldn't be used at all. Don't live patch, just reboot.
|
||||||
|
kernel.kexec_load_disabled = 1
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl
|
||||||
|
# Basically, restrict eBPF to CAP_BPF.
|
||||||
|
kernel.unprivileged_bpf_disabled = 1
|
||||||
|
net.core.bpf_jit_harden = 2
|
||||||
|
|
||||||
|
# Needed for Flatpak and Bubblewrap
|
||||||
|
kernel.unprivileged_userns_clone = 1
|
||||||
|
|
||||||
|
# Disable ptrace. Not needed on workstations.
|
||||||
|
kernel.yama.ptrace_scope = 3
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl
|
||||||
|
# Restrict performance events from unprivileged users as much as possible.
|
||||||
|
# We are using 4 here, since Ubuntu supports such a level.
|
||||||
|
# Official Linux kernel documentation only says >= so it probably will work.
|
||||||
|
kernel.perf_event_paranoid = 4
|
||||||
|
|
||||||
|
# https://github.com/containerd/containerd/issues/9048
|
||||||
|
# Disable io_uring, a very sus feature.
|
||||||
|
# Note that this will make using Proxmox extremely annoying though, so you might wanna comment this out
|
||||||
|
# on a Proxmox node.
|
||||||
|
kernel_io_uring_disable = 2
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-kernel
|
||||||
|
# Disable sysrq
|
||||||
|
kernel.sysrq = 0
|
||||||
|
|
||||||
|
# https://www.stigviewer.com/stig/red_hat_enterprise_linux_6/2020-09-03/finding/V-217911
|
||||||
|
# Not running a router here, so no redirects
|
||||||
|
net.ipv4.conf.*.send_redirects = 0
|
||||||
|
net.ipv4.conf.*.accept_redirects = 0
|
||||||
|
net.ipv6.conf.*.accept_redirects = 0
|
||||||
|
|
||||||
|
# Check if the source of the IP address is reachable through the same interface it came in
|
||||||
|
# Basic IP spoofing mitigation
|
||||||
|
net.ipv4.conf.*.rp_filter = 1
|
||||||
|
|
||||||
|
# Do not respond to ICMP
|
||||||
|
net.ipv4.icmp_echo_ignore_all = 1
|
||||||
|
net.ipv6.icmp.echo_ignore_all = 1
|
||||||
|
|
||||||
|
# Enable IP Forwarding
|
||||||
|
# Needed for VM networking and whatnot.
|
||||||
|
net.ipv4.ip_forward = 1
|
||||||
|
net.ipv6.conf.all.forwarding = 1
|
||||||
|
|
||||||
|
# https://www.stigviewer.com/stig/red_hat_enterprise_linux_6/2016-06-05/finding/V-38537
|
||||||
|
# Ignore bogus icmp response
|
||||||
|
net.ipv4.icmp_ignore_bogus_error_responses = 1
|
||||||
|
|
||||||
|
# Protection against time-wait assasination attacks
|
||||||
|
net.ipv4.tcp_rfc1337 = 1
|
||||||
|
|
||||||
|
# Enable SYN cookies
|
||||||
|
# Basic SYN flood mitigation
|
||||||
|
net.ipv4.tcp_syncookies = 1
|
||||||
|
|
||||||
|
# https://access.redhat.com/sites/default/files/attachments/20150325_network_performance_tuning.pdf
|
||||||
|
# Make sure TCP timestamp is enabled
|
||||||
|
net.ipv4.tcp_timestamps = 1
|
||||||
|
|
||||||
|
# https://access.redhat.com/sites/default/files/attachments/20150325_network_performance_tuning.pdf
|
||||||
|
# Disable TCP SACK
|
||||||
|
# We have good networking :)
|
||||||
|
net.ipv4.tcp_sack = 0
|
||||||
|
|
||||||
|
# No SACK, therefore no Duplicated SACK
|
||||||
|
net.ipv4.tcp_dsack = 0
|
||||||
|
|
||||||
|
# Improve ALSR effectiveness for mmap
|
||||||
|
vm.mmap_rnd_bits = 32
|
||||||
|
vm.mmap_rnd_compat_bits = 16
|
||||||
|
|
||||||
|
# https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-kernel
|
||||||
|
# Restrict userfaultfd to CAP_SYS_PTRACE
|
||||||
|
# https://bugs.archlinux.org/task/62780
|
||||||
|
# Interestingly enough, Arch does not even have userfaultfd in their kernel, so it is
|
||||||
|
# probably not used in the real world at all.
|
||||||
|
vm.unprivileged_userfaultfd = 0
|
2
etc/systemd/coredump.conf.d/disable.conf
Normal file
2
etc/systemd/coredump.conf.d/disable.conf
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
[Coredump]
|
||||||
|
Storage=none
|
Loading…
Reference in New Issue
Block a user