Announcement

Collapse
No announcement yet.

Linux 6.10's Hardening Configuration Now Enables KCFI & Other Features

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Linux 6.10's Hardening Configuration Now Enables KCFI & Other Features

    Phoronix: Linux 6.10's Hardening Configuration Now Enables KCFI & Other Features

    Introduced last year with the Linux 6.7 kernel was a hardening configuration to allow for "make hardening.config" as an easy way of building a security-hardened Linux kernel with sane defaults. With Linux 6.10 there are some additional security minded features now enabled...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    I would like see LD_PRELOAD disabled.

    Since PDF is a common attack vector I would like to see distributions use sandboxing for PDF readers and email clients.

    Comment


    • #3
      Originally posted by uid313 View Post
      I would like see LD_PRELOAD disabled.
      Since PDF is a common attack vector I would like to see distributions use sandboxing for PDF readers and email clients.
      I do agree that LD_PRELOAD​ is an invitation to do nasty things ... but that PDFs are a main problem ...
      and especially that sandboxing really helps in that case is absolutely not my understanding - even
      real virtualization is not secure at all.
      Sandboxing is just an excuse to do silly things (concerning desktop - it may be of some limited use
      on toy devices like smartphone, tablets etc.).

      Hardening is something for servers, i.e. in best case one application and everything is tailored
      to secure that service.

      But a desktop with all its possibilities can not be hardened in a reasonable way.

      And when looking into security breaches, social engineering is typically an important factor.
      Another is lazyness or convinience of users and in rare cases administrators.
      Those two spoil any notion of security - and is experienced extremely often right now.

      Comment


      • #4
        Originally posted by uid313 View Post
        I would like see LD_PRELOAD disabled.

        Since PDF is a common attack vector I would like to see distributions use sandboxing for PDF readers and email clients.
        They are not Linux kernel features. This article talks about Linux kernel hardening.

        Comment


        • #5
          I saw KCFI, and my first thought was Kentucky Fried Chicken! (I know, that reverses the letter order, but explain that to my unconscious!)

          Comment


          • #6
            Originally posted by Eumaios View Post
            I saw KCFI, and my first thought was Kentucky Fried Chicken! (I know, that reverses the letter order, but explain that to my unconscious!)
            And I read that as "Kernel Certified Flight Instructor".

            Comment

            Working...
            X