You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/FEATURES.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,47 +8,47 @@ permalink: /features
8
8
9
9
## [Exploit mitigation](#exploit-mitigation)
10
10
{: #exploit-mitigation}
11
-
-Installing and enabling[hardened_malloc](https://github.com/GrapheneOS/hardened_malloc) globally, including for Flatpaks. <sup>[Thanks to rusty-snake's spec](https://github.com/rusty-snake/fedora-extras)</sup>
12
-
-Installing our Chromium-based browser [Trivalent](https://github.com/secureblue/Trivalent), which is inspired by [Vanadium](https://github.com/GrapheneOS/Vanadium). <sup>[Why Chromium?](https://grapheneos.org/usage#web-browsing)</sup> <sup>[Why not Flatpak Chromium?](https://forum.vivaldi.net/post/669805)</sup>
13
-
-SELinux-restricted[unprivileged user namespaces](/articles/userns)
-Install and enable[hardened_malloc](https://github.com/GrapheneOS/hardened_malloc) globally, including for Flatpaks. <sup>[Thanks to rusty-snake's spec](https://github.com/rusty-snake/fedora-extras)</sup>
12
+
-Install our Chromium-based browser [Trivalent](https://github.com/secureblue/Trivalent), which is inspired by [Vanadium](https://github.com/GrapheneOS/Vanadium). <sup>[Why Chromium?](https://grapheneos.org/usage#web-browsing)</sup> <sup>[Why not Flatpak Chromium?](https://forum.vivaldi.net/post/669805)</sup>
13
+
-Restrict[unprivileged user namespaces](/articles/userns) via SELinux policy
14
+
-Harden the kernel via numerous sysctl values <sup>[details](https://github.com/secureblue/secureblue/blob/live/files/system/etc/sysctl.d/60-hardening.conf)</sup>
15
+
-Harden the kernel via numerous kernel arguments (Inspired by [Madaidan's Hardening Guide](https://madaidans-insecurities.github.io/guides/linux-hardening.html)) <sup>[details](/articles/kargs)</sup>
16
16
- Configure chronyd to use Network Time Security (NTS) <sup>[using chrony config from GrapheneOS](https://github.com/GrapheneOS/infrastructure/blob/main/chrony.conf)</sup>
17
17
- Set opportunistic DNSSEC and DNS over TLS for systemd-resolved
18
-
-Installing USBGuard and providing`ujust` commands to automatically configure it
18
+
-Install USBGuard and provide`ujust` commands to automatically configure it
19
19
20
20
## [Filling known security holes](#filling-security-holes)
21
21
{: #filling-security-holes}
22
22
- Remove [suid-root](https://en.wikipedia.org/wiki/Setuid) from [numerous binaries](https://github.com/secureblue/secureblue/blob/live/files/scripts/removesuid.sh), replacing functionality [using capabilities](https://github.com/secureblue/secureblue/blob/live/files/system/usr/bin/setcapsforunsuidbinaries), and remove `sudo`, `su`, and `pkexec` entirely in favor of `run0` <sup>[why?](https://mastodon.social/@pid_eins/112353324518585654)</sup>
23
23
- Disable XWayland by default (for GNOME, Plasma, and Sway images)
24
-
-Mitigation of[LD_PRELOAD attacks](https://github.com/Aishou/wayland-keylogger) via `ujust toggle-bash-environment-lockdown`
24
+
-Mitigate[LD_PRELOAD attacks](https://github.com/Aishou/wayland-keylogger) via `ujust toggle-bash-environment-lockdown`
25
25
- Disable install & usage of GNOME user extensions by default
26
26
- Disable KDE GHNS by default <sup>[why?](https://blog.davidedmundson.co.uk/blog/kde-store-content/)</sup>
27
-
-Removal of the unmaintained and suid-root fuse2 by default
28
-
-Disabling unprivileged user namespaces by default for the unconfined domain and the container domain <sup>[why?](/articles/userns)</sup>
- Set all default container policies to `reject`, `signedBy`, or `sigstoreSigned`
36
-
-Enabling only the [Flathub-verified](https://flathub.org/apps/collection/verified/1) remote by default
36
+
-Enable only the [Flathub-verified](https://flathub.org/apps/collection/verified/1) remote by default
37
37
38
-
## [Reduce information leakage](#info-leak)
38
+
## [Reducing information leakage](#info-leak)
39
39
{: #info-leak}
40
-
-Adds per-network MAC randomization
41
-
-Disabling coredumps
40
+
-Add per-network MAC randomization
41
+
-Disable coredumps
42
42
43
43
## [Attack surface reduction](#attack-surface)
44
44
{: #attack-surface}
45
-
-Blacklisting numerous unused kernel modules to reduce attack surface <sup>[details](https://github.com/secureblue/secureblue/blob/live/files/system/etc/modprobe.d/blacklist.conf)</sup>
46
-
-Brute force protection by locking user accounts for 24 hours after 50 failed login attempts, hardened password encryption and password quality suggestions
45
+
-Blacklist numerous unused kernel modules to reduce attack surface <sup>[details](https://github.com/secureblue/secureblue/blob/live/files/system/etc/modprobe.d/blacklist.conf)</sup>
46
+
-Protect against brute force by locking user accounts for 24 hours after 50 failed login attempts, providing password quality suggestions and making use of hardened password encryption
47
47
- Disable and mask a variety of services by default (including cups, geoclue, passim, and others)
48
48
49
49
## [Security ease-of-use](#ease)
50
50
{: #ease}
51
-
-Installing Bubblejail for additional sandboxing tooling
52
-
-Tooling for automatically setting up and enabling LUKS TPM2 integration for unlocking LUKS drives
53
-
-Tooling for automatically setting up and enabling LUKS FIDO2 integration for unlocking LUKS drives
54
-
-Toggles for a variety of the hardening set by default, for user convenience (`ujust --choose`)
51
+
-Install Bubblejail for additional sandbox tooling
52
+
-Provide tooling for automatically setting up and enabling LUKS TPM2 integration for unlocking LUKS drives
53
+
-Provide tooling for automatically setting up and enabling LUKS FIDO2 integration for unlocking LUKS drives
54
+
-Provide toggles for a variety of the hardening set by default, for user convenience (`ujust --choose`)
0 commit comments