diff options
author | Silvino Silva <silvino@bk.ru> | 2017-02-20 09:06:21 +0000 |
---|---|---|
committer | Silvino Silva <silvino@bk.ru> | 2017-02-20 09:06:21 +0000 |
commit | 0e7880313b3a3e016c0d2e287802cc6ddff9edd1 (patch) | |
tree | 4ab03821ada4e4817dd58d161ae46041e24575b0 /core/linux.html | |
parent | fd15c7a1ea378eaea467a741253483b2f5b31ea9 (diff) | |
download | doc-0e7880313b3a3e016c0d2e287802cc6ddff9edd1.tar.gz |
core revision
Diffstat (limited to 'core/linux.html')
-rw-r--r-- | core/linux.html | 676 |
1 files changed, 625 insertions, 51 deletions
diff --git a/core/linux.html b/core/linux.html index 53fc304..0304884 100644 --- a/core/linux.html +++ b/core/linux.html @@ -2,12 +2,12 @@ <html dir="ltr" lang="en"> <head> <meta charset='utf-8'> - <title>2.3. Kernel Linux</title> + <title>2.1. Kernel Linux</title> </head> <body> <a href="index.html">Core OS Index</a> - <h1 id="kernel">2.3. Kernel Linux</h1> + <h1 id="kernel">2.1. Kernel Linux</h1> <p>Linux is a monolith kernel, a big one ! Visit <a href="http://www.fsfla.org/ikiwiki/selibre/linux-libre/">Linux Libre</a> @@ -15,58 +15,41 @@ <a href="https://www.kernel.org/">Linux Non-Libre</a> pages for more links and information.</p> - <h2 id="#linuxlibre">2.3.1. Port Linux Libre</h2> + <h2 id="#linuxlibre">2.1.1. Port Linux Libre</h2> - <p>Collection c9-ports have linux-libre port with default crux - configuration, this port depends on dracut and grub but is not - required to install them. To build and install this port using - prt-get;</p> + <p>Default crux configuration can be obtained from iso, this port depends + on dracut and grub but is not required to install them. To build and install + this port using prt-get;</p> <pre> $ prt-get depinst linux-libre </pre> - <h2 id="kinstall">2.3.2. Manual Install</h2> + <h2 id="kinstall">2.1.2. Manual Install</h2> <p>Download Linux Source from <a href="http://linux-libre.fsfla.org/pub/linux-libre/releases/">linux libre</a>, or using the port system;</p> - <pre> - $ cd /usr/ports/c9-ports/linux-libre - $ sudo -u pkgmk pkgmk -do - </pre> - - <p>Crux iso comes with config that is used in this port, is - a good starting point to personalize according to your needs;</p> + <p>Crux iso comes with config that is more generic than used on linux-libre + port, crux default is a good starting point to personalize according to your + needs (build default, detect modules needed);</p> <pre> $ mkdir ~/kernel $ cd ~/kernel - $ cp /usr/ports/c9-ports/linux-libre/linux-4.1.32.defconfig . - $ cp /usr/ports/distfiles/linux-libre-4.1.32-gnu.tar.xz . - $ tar xf linux-libre-4.1.32-gnu.tar.xz - $ cp linux-4.1.32.defconfig linux-4.1.32/.config + $ cp /usr/ports/distfiles/linux-libre-4.9.11-gnu.tar.xz . + $ tar xf linux-libre-4.9.11-gnu.tar.xz + $ cd linux-4.9.11/ </pre> - <p>If you like <a href="https://github.com/graysky2/kernel_gcc_patch/">graysky2</a> kernel_gcc_patch (<a href="https://github.com/graysky2/kernel_gcc_patch/archive/master.zip">download master</a>) that adds more cpu options (FLAGS native)</p> - - <pre> - $ cp /usr/ports/distfiles/enable_additional_cpu_optimizations_for_gcc_v4.9%2B_kernel_v3.15%2B.patch cpu_optimizations.patch - </pre> - - <pre> - $ cd ~/linux-4.1.32/ - $ patch -p1 < ../cpu_optimizations.patch - patching file arch/x86/include/asm/module.h - patching file arch/x86/Kconfig.cpu - patching file arch/x86/Makefile - Hunk #1 succeeded at 85 with fuzz 1 (offset -9 lines). - patching file arch/x86/Makefile_32.cpu - $ - </pre> - - <p>Read <a href="https://en.wikibooks.org/wiki/Grsecurity/Configuring_and_Installing_grsecurity#Patching_Your_Kernel_with_grsecurity">Gresecurity</a>.</p> + <p><a href="grsecurity.net">Grsecurity</a> patch for + <a href="https://grsecurity.net/test/grsecurity-3.1-4.9.9-201702122044.patch">4.9.11</a>. + Gcc <a href="https://github.com/graysky2/kernel_gcc_patch/">graysky2</a> kernel_gcc_patch (<a href="https://github.com/graysky2/kernel_gcc_patch/archive/master.zip">master.zip</a>) + that adds more cpu options (FLAGS native). + Check <a href="ports/linux-libre/Pkgfile">Pkgfile</a> for instructions and + more patches used on linux-libre port. Read patching your kernel with + <a href="https://en.wikibooks.org/wiki/Grsecurity/Configuring_and_Installing_grsecurity#Patching_Your_Kernel_with_grsecurity">gresecurity</a>.</p> <p>Configure kernel according to your current kernel hardware support;</p> @@ -77,11 +60,10 @@ <p>This will disable all unloaded modules, you can use localyesconfig mark all loaded - to be built in the kernel.</p> - - <p>To get information about your hardware, - for example information about which graphic - module (driver) is in use as root run;</p> + to be built in the kernel. To get information + about your hardware, for example information + about which graphic module (driver) is in use + as root run;</p> <pre> # lspci -nnk | grep -i vga -A3 | grep 'in use' @@ -95,16 +77,16 @@ </pre> <pre> - $ make -j $(nproc) all + $ make -j $(nproc) bzImage modules $ sudo make modules_install - $ sudo cp arch/x86/boot/bzImage /boot/vmlinuz-4.1.32-gnu_crux - $ sudo cp System.map /boot/System.map-4.1.32-gnu_crux + $ sudo cp arch/x86/boot/bzImage /boot/vmlinuz-4.9.11-gnu + $ sudo cp System.map /boot/System.map-4.9.11-gnu </pre> <p>Create dracut initramfs;</p> <pre> - $sudo dracut --fstab /boot/initramfs-4.1.32-gnu_crux.img 4.1.32-gnu_crux + $sudo dracut --fstab /boot/initramfs-4.9.11-gnu.img 4.9.11-gnu </pre> <p>Update grub;</p> @@ -113,17 +95,609 @@ # grub-mkconfig -o /boot/grub/grub.cfg </pre> - <h2 id="kuninstall">2.3.3. Manual Remove</h2> + <h2 id="kuninstall">2.1.3. Manual Remove</h2> <pre> - $ sudo rm -r /lib/modules/4.1.12-gnu_crux - $ sudo rm /boot/vmlinuz-4.1.12-gnu_crux - $ sudo rm /boot/System.map-4.1.12-gnu_crux + $ sudo rm -r /lib/modules/4.9.11-gnu + $ sudo rm /boot/vmlinuz-4.9.11-gnu + $ sudo rm /boot/System.map-4.9.11-gnu </pre> + <h2 id="sysctl">2.1.4. Sysctl</h2> + + <p>Sysctl references + <a href="https://wiki.archlinux.org/index.php/sysctl#TCP.2FIP_stack_hardening">Arch TCP/IP stack hardening</a>, + <a href="http://www.cyberciti.biz/tips/linux-unix-bsd-nginx-webserver-security.html">Cyberciti Nginx Hardning</a>, + <a href="http://www.cyberciti.biz/faq/linux-kernel-etcsysctl-conf-security-hardening/">Cyberciti Security Hardening</a>, + <a href="https://en.wikibooks.org/wiki/Grsecurity/Appendix/Grsecurity_and_PaX_Configuration_Options">Grsecurity and PaX Configuration</a>.</p> + + <p>Since kernels on c9-ports have <a href="pax.grsecurity.net">PaX</a> + and <a href="http://grsecurity.net/announce.php">grsecurity</a>, + <a href="conf/sysctl.conf">/etc/sysctl.conf</a> can have follow + values;</p> + + <pre> + # + # /etc/sysctl.conf: configuration for system variables, see sysctl.conf(5) + # + + kernel.printk = 15 1 1 4 + kernel.randomize_va_space = 1 + kernel.shmmax = 500000000 + # Allow for more PIDs (to reduce rollover problems); may break some programs 32768 + kernel.pid_max = 65536 + + # + # Memory Protections + # + + # If you say Y here, all ioperm and iopl calls will return an error. + # Ioperm and iopl can be used to modify the running kernel. + # Unfortunately, some programs need this access to operate properly, + # the most notable of which are XFree86 and hwclock. hwclock can be + # remedied by having RTC support in the kernel, so real-time + # clock support is enabled if this option is enabled, to ensure + # that hwclock operates correctly. + # + # If you're using XFree86 or a version of Xorg from 2012 or earlier, + # you may not be able to boot into a graphical environment with this + # option enabled. In this case, you should use the RBAC system instead. + #kernel.grsecurity.disable_priv_io = 1 + kernel.grsecurity.disable_priv_io = 0 + + # If you say Y here, attempts to bruteforce exploits against forking + # daemons such as apache or sshd, as well as against suid/sgid binaries + # will be deterred. When a child of a forking daemon is killed by PaX + # or crashes due to an illegal instruction or other suspicious signal, + # the parent process will be delayed 30 seconds upon every subsequent + # fork until the administrator is able to assess the situation and + # restart the daemon. + # In the suid/sgid case, the attempt is logged, the user has all their + # existing instances of the suid/sgid binary terminated and will + # be unable to execute any suid/sgid binaries for 15 minutes. + # + # It is recommended that you also enable signal logging in the auditing + # section so that logs are generated when a process triggers a suspicious + # signal. + # If the sysctl option is enabled, a sysctl option with name + # "deter_bruteforce" is created. + #kernel.grsecurity.deter_bruteforce = 1 + + # + # Filesystem Protections + # + + # Optimization for port usefor LBs + # Increase system file descriptor limit + fs.file-max = 65535 + + # If you say Y here, /tmp race exploits will be prevented, since users + # will no longer be able to follow symlinks owned by other users in + # world-writable +t directories (e.g. /tmp), unless the owner of the + # symlink is the owner of the directory. users will also not be + # able to hardlink to files they do not own. If the sysctl option is + # enabled, a sysctl option with name "linking_restrictions" is created. + kernel.grsecurity.linking_restrictions = 1 + + + # Apache's SymlinksIfOwnerMatch option has an inherent race condition + # that prevents it from being used as a security feature. As Apache + # verifies the symlink by performing a stat() against the target of + # the symlink before it is followed, an attacker can setup a symlink + # to point to a same-owned file, then replace the symlink with one + # that targets another user's file just after Apache "validates" the + # symlink -- a classic TOCTOU race. If you say Y here, a complete, + # race-free replacement for Apache's "SymlinksIfOwnerMatch" option + # will be in place for the group you specify. If the sysctl option + # is enabled, a sysctl option with name "enforce_symlinksifowner" is + # created. + #kernel.grsecurity.enforce_symlinksifowner = 1 + #kernel.grsecurity.symlinkown_gid = 33 + + # if you say Y here, users will not be able to write to FIFOs they don't + # own in world-writable +t directories (e.g. /tmp), unless the owner of + # the FIFO is the same owner of the directory it's held in. If the sysctl + # option is enabled, a sysctl option with name "fifo_restrictions" is + # created. + #kernel.grsecurity.fifo_restrictions = 1 + + # If you say Y here, a sysctl option with name "romount_protect" will + # be created. By setting this option to 1 at runtime, filesystems + # will be protected in the following ways: + # * No new writable mounts will be allowed + # * Existing read-only mounts won't be able to be remounted read/write + # * Write operations will be denied on all block devices + # This option acts independently of grsec_lock: once it is set to 1, + # it cannot be turned off. Therefore, please be mindful of the resulting + # behavior if this option is enabled in an init script on a read-only + # filesystem. + # Also be aware that as with other root-focused features, GRKERNSEC_KMEM + # and GRKERNSEC_IO should be enabled and module loading disabled via + # config or at runtime. + # This feature is mainly intended for secure embedded systems. + #kernel.grsecurity.romount_protect = 0 + + # if you say Y here, the capabilities on all processes within a + # chroot jail will be lowered to stop module insertion, raw i/o, + # system and net admin tasks, rebooting the system, modifying immutable + # files, modifying IPC owned by another, and changing the system time. + # This is left an option because it can break some apps. Disable this + # if your chrooted apps are having problems performing those kinds of + # tasks. If the sysctl option is enabled, a sysctl option with + # name "chroot_caps" is created. + kernel.grsecurity.chroot_caps = 1 + + #kernel.grsecurity.chroot_deny_bad_rename = 1 + + # If you say Y here, processes inside a chroot will not be able to chmod + # or fchmod files to make them have suid or sgid bits. This protects + # against another published method of breaking a chroot. If the sysctl + # option is enabled, a sysctl option with name "chroot_deny_chmod" is + # created. + kernel.grsecurity.chroot_deny_chmod = 1 + + # If you say Y here, processes inside a chroot will not be able to chroot + # again outside the chroot. This is a widely used method of breaking + # out of a chroot jail and should not be allowed. If the sysctl + # option is enabled, a sysctl option with name + # "chroot_deny_chroot" is created. + kernel.grsecurity.chroot_deny_chroot = 1 + + # If you say Y here, a well-known method of breaking chroots by fchdir'ing + # to a file descriptor of the chrooting process that points to a directory + # outside the filesystem will be stopped. If the sysctl option + # is enabled, a sysctl option with name "chroot_deny_fchdir" is created. + kernel.grsecurity.chroot_deny_fchdir = 1 + + # If you say Y here, processes inside a chroot will not be allowed to + # mknod. The problem with using mknod inside a chroot is that it + # would allow an attacker to create a device entry that is the same + # as one on the physical root of your system, which could range from + # anything from the console device to a device for your harddrive (which + # they could then use to wipe the drive or steal data). It is recommended + # that you say Y here, unless you run into software incompatibilities. + # If the sysctl option is enabled, a sysctl option with name + # "chroot_deny_mknod" is created. + kernel.grsecurity.chroot_deny_mknod = 1 + + # If you say Y here, processes inside a chroot will not be able to + # mount or remount filesystems. If the sysctl option is enabled, a + # sysctl option with name "chroot_deny_mount" is created. + kernel.grsecurity.chroot_deny_mount = 1 + + # If you say Y here, processes inside a chroot will not be able to use + # a function called pivot_root() that was introduced in Linux 2.3.41. It + # works similar to chroot in that it changes the root filesystem. This + # function could be misused in a chrooted process to attempt to break out + # of the chroot, and therefore should not be allowed. If the sysctl + # option is enabled, a sysctl option with name "chroot_deny_pivot" is + # created. + kernel.grsecurity.chroot_deny_pivot = 1 + + # If you say Y here, processes inside a chroot will not be able to attach + # to shared memory segments that were created outside of the chroot jail. + # It is recommended that you say Y here. If the sysctl option is enabled, + # a sysctl option with name "chroot_deny_shmat" is created. + kernel.grsecurity.chroot_deny_shmat = 1 + + # If you say Y here, an attacker in a chroot will not be able to + # write to sysctl entries, either by sysctl(2) or through a /proc + # interface. It is strongly recommended that you say Y here. If the + # sysctl option is enabled, a sysctl option with name + # "chroot_deny_sysctl" is created. + kernel.grsecurity.chroot_deny_sysctl = 1 + + # If you say Y here, processes inside a chroot will not be able to + # connect to abstract (meaning not belonging to a filesystem) Unix + # domain sockets that were bound outside of a chroot. It is recommended + # that you say Y here. If the sysctl option is enabled, a sysctl option + # with name "chroot_deny_unix" is created. + kernel.grsecurity.chroot_deny_unix = 1 + + # If you say Y here, the current working directory of all newly-chrooted + # applications will be set to the the root directory of the chroot. + # The man page on chroot(2) states: + # Note that usually chhroot does not change the current working + # directory, so that `.' can be outside the tree rooted at + # `/'. In particular, the super-user can escape from a + # `chroot jail' by doing `mkdir foo; chroot foo; cd ..'. + # + # It is recommended that you say Y here, since it's not known to break + # any software. If the sysctl option is enabled, a sysctl option with + # name "chroot_enforce_chdir" is created. + kernel.grsecurity.chroot_enforce_chdir = 1 + + # If you say Y here, processes inside a chroot will not be able to + # kill, send signals with fcntl, ptrace, capget, getpgid, setpgid, + # getsid, or view any process outside of the chroot. If the sysctl + # option is enabled, a sysctl option with name "chroot_findtask" is + # created. + kernel.grsecurity.chroot_findtask = 1 + + # If you say Y here, processes inside a chroot will not be able to raise + # the priority of processes in the chroot, or alter the priority of + # processes outside the chroot. This provides more security than simply + # removing CAP_SYS_NICE from the process' capability set. If the + # sysctl option is enabled, a sysctl option with name "chroot_restrict_nice" + # is created. + kernel.grsecurity.chroot_restrict_nice = 1 + + # + # Kernel Auditing + # + + # If you say Y here, the exec and chdir logging features will only operate + # on a group you specify. This option is recommended if you only want to + # watch certain users instead of having a large amount of logs from the + # entire system. If the sysctl option is enabled, a sysctl option with + # name "audit_group" is created. + kernel.grsecurity.audit_group = 0 + + # If you say Y here, the exec and chdir logging features will only operate + # on a group you specify. This option is recommended if you only want to + # watch certain users instead of having a large amount of logs from the + # entire system. If the sysctl option is enabled, a sysctl option with + # name "audit_group" is created. + #kernel.grsecurity.audit_gid = 201 + + # If you say Y here, all execve() calls will be logged (since the + # other exec*() calls are frontends to execve(), all execution + # will be logged). Useful for shell-servers that like to keep track + # of their users. If the sysctl option is enabled, a sysctl option with + # name "exec_logging" is created. + # WARNING: This option when enabled will produce a LOT of logs, especially + # on an active system. + kernel.grsecurity.exec_logging = 0 + + # If you say Y here, all attempts to overstep resource limits will + # be logged with the resource name, the requested size, and the current + # limit. It is highly recommended that you say Y here. If the sysctl + # option is enabled, a sysctl option with name "resource_logging" is + # created. If the RBAC system is enabled, the sysctl value is ignored. + #kernel.grsecurity.resource_logging = 1 + kernel.grsecurity.resource_logging = 0 + + # If you say Y here, all executions inside a chroot jail will be logged + # to syslog. This can cause a large amount of logs if certain + # applications (eg. djb's daemontools) are installed on the system, and + # is therefore left as an option. If the sysctl option is enabled, a + # sysctl option with name "chroot_execlog" is created. + kernel.grsecurity.chroot_execlog = 0 + + # If you say Y here, all attempts to attach to a process via ptrace + # will be logged. If the sysctl option is enabled, a sysctl option + # wi |