Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

review secureblue sysctl #283

Open
adrelanos opened this issue Nov 30, 2024 · 1 comment
Open

review secureblue sysctl #283

adrelanos opened this issue Nov 30, 2024 · 1 comment

Comments

@raja-grewal
Copy link
Contributor

raja-grewal commented Dec 17, 2024

They do not include any settings that are not already included in our settings, however, they do enable certain settings that we for a variety of reasons keep disabled.

The discrepancies are:

  1. net.ipv6.conf.*.use_tempaddr=2: We keep the IPv6 privacy extensions disabled due to breakages.
  2. net.ipv4.conf.*.log_martians=1: We keep the logging of these packets optional.
  3. fs.binfmt_misc.status=0: We keep this enabled due to current file/folder permissions issue.

Furthermore, we can also review their kernel arguments:

Across all these there are only minor explainable discrepancies:

  1. lockdown=confidentiality and module.sig_enforce=1: We do not enable these due to compatibility issues.
  2. ia32_emulation=0: We can not currently enable this as it is only applicable when using Linux kernel >= 6.7.
  3. kvm-intel.vmentry_l1d_flush=always: We do not include this, however according kernel docs, this parameter is redundant if using l1tf=full,force (which we enable by default).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants