Skip to content

Commit b58c36f

Browse files
authored
docs: unify and improve language and wording in the feature list (#72)
1 parent 5d2a1de commit b58c36f

1 file changed

Lines changed: 21 additions & 21 deletions

File tree

content/FEATURES.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -8,47 +8,47 @@ permalink: /features
88

99
## [Exploit mitigation](#exploit-mitigation)
1010
{: #exploit-mitigation}
11-
- Installing and enabling [hardened_malloc](https://github.com/GrapheneOS/hardened_malloc) globally, including for Flatpaks. <sup>[Thanks to rusty-snake's spec](https://github.com/rusty-snake/fedora-extras)</sup>
12-
- Installing our Chromium-based browser [Trivalent](https://github.com/secureblue/Trivalent), which is inspired by [Vanadium](https://github.com/GrapheneOS/Vanadium). <sup>[Why Chromium?](https://grapheneos.org/usage#web-browsing)</sup> <sup>[Why not Flatpak Chromium?](https://forum.vivaldi.net/post/669805)</sup>
13-
- SELinux-restricted [unprivileged user namespaces](/articles/userns)
14-
- Setting numerous hardening sysctl values <sup>[details](https://github.com/secureblue/secureblue/blob/live/files/system/etc/sysctl.d/60-hardening.conf)</sup>
15-
- Sets numerous hardening kernel arguments (Inspired by [Madaidan's Hardening Guide](https://madaidans-insecurities.github.io/guides/linux-hardening.html)) <sup>[details](/articles/kargs)</sup>
11+
- Install and enable [hardened_malloc](https://github.com/GrapheneOS/hardened_malloc) globally, including for Flatpaks. <sup>[Thanks to rusty-snake's spec](https://github.com/rusty-snake/fedora-extras)</sup>
12+
- Install our Chromium-based browser [Trivalent](https://github.com/secureblue/Trivalent), which is inspired by [Vanadium](https://github.com/GrapheneOS/Vanadium). <sup>[Why Chromium?](https://grapheneos.org/usage#web-browsing)</sup> <sup>[Why not Flatpak Chromium?](https://forum.vivaldi.net/post/669805)</sup>
13+
- Restrict [unprivileged user namespaces](/articles/userns) via SELinux policy
14+
- Harden the kernel via numerous sysctl values <sup>[details](https://github.com/secureblue/secureblue/blob/live/files/system/etc/sysctl.d/60-hardening.conf)</sup>
15+
- Harden the kernel via numerous kernel arguments (Inspired by [Madaidan's Hardening Guide](https://madaidans-insecurities.github.io/guides/linux-hardening.html)) <sup>[details](/articles/kargs)</sup>
1616
- Configure chronyd to use Network Time Security (NTS) <sup>[using chrony config from GrapheneOS](https://github.com/GrapheneOS/infrastructure/blob/main/chrony.conf)</sup>
1717
- Set opportunistic DNSSEC and DNS over TLS for systemd-resolved
18-
- Installing USBGuard and providing `ujust` commands to automatically configure it
18+
- Install USBGuard and provide `ujust` commands to automatically configure it
1919

2020
## [Filling known security holes](#filling-security-holes)
2121
{: #filling-security-holes}
2222
- Remove [suid-root](https://en.wikipedia.org/wiki/Setuid) from [numerous binaries](https://github.com/secureblue/secureblue/blob/live/files/scripts/removesuid.sh), replacing functionality [using capabilities](https://github.com/secureblue/secureblue/blob/live/files/system/usr/bin/setcapsforunsuidbinaries), and remove `sudo`, `su`, and `pkexec` entirely in favor of `run0` <sup>[why?](https://mastodon.social/@pid_eins/112353324518585654)</sup>
2323
- Disable XWayland by default (for GNOME, Plasma, and Sway images)
24-
- Mitigation of [LD_PRELOAD attacks](https://github.com/Aishou/wayland-keylogger) via `ujust toggle-bash-environment-lockdown`
24+
- Mitigate [LD_PRELOAD attacks](https://github.com/Aishou/wayland-keylogger) via `ujust toggle-bash-environment-lockdown`
2525
- Disable install & usage of GNOME user extensions by default
2626
- Disable KDE GHNS by default <sup>[why?](https://blog.davidedmundson.co.uk/blog/kde-store-content/)</sup>
27-
- Removal of the unmaintained and suid-root fuse2 by default
28-
- Disabling unprivileged user namespaces by default for the unconfined domain and the container domain <sup>[why?](/articles/userns)</sup>
29-
- Prohibiting ptrace attachment <sup>[why?](https://www.kernel.org/doc/Documentation/security/Yama.txt)</sup>
27+
- Remove the unmaintained and suid-root fuse2 by default
28+
- Disable unprivileged user namespaces by default for the unconfined domain and the container domain <sup>[why?](/articles/userns)</sup>
29+
- Prohibit ptrace attachment <sup>[why?](https://www.kernel.org/doc/Documentation/security/Yama.txt)</sup>
3030

3131
## [Security by default](#security-by-default)
3232
{: #security-by-default}
33-
- Disabling all ports and services for firewalld
33+
- Disable all ports and services for firewalld
3434
- Use HTTPS for all rpm mirrors
3535
- Set all default container policies to `reject`, `signedBy`, or `sigstoreSigned`
36-
- Enabling only the [Flathub-verified](https://flathub.org/apps/collection/verified/1) remote by default
36+
- Enable only the [Flathub-verified](https://flathub.org/apps/collection/verified/1) remote by default
3737

38-
## [Reduce information leakage](#info-leak)
38+
## [Reducing information leakage](#info-leak)
3939
{: #info-leak}
40-
- Adds per-network MAC randomization
41-
- Disabling coredumps
40+
- Add per-network MAC randomization
41+
- Disable coredumps
4242

4343
## [Attack surface reduction](#attack-surface)
4444
{: #attack-surface}
45-
- Blacklisting numerous unused kernel modules to reduce attack surface <sup>[details](https://github.com/secureblue/secureblue/blob/live/files/system/etc/modprobe.d/blacklist.conf)</sup>
46-
- Brute force protection by locking user accounts for 24 hours after 50 failed login attempts, hardened password encryption and password quality suggestions
45+
- Blacklist numerous unused kernel modules to reduce attack surface <sup>[details](https://github.com/secureblue/secureblue/blob/live/files/system/etc/modprobe.d/blacklist.conf)</sup>
46+
- Protect against brute force by locking user accounts for 24 hours after 50 failed login attempts, providing password quality suggestions and making use of hardened password encryption
4747
- Disable and mask a variety of services by default (including cups, geoclue, passim, and others)
4848

4949
## [Security ease-of-use](#ease)
5050
{: #ease}
51-
- Installing Bubblejail for additional sandboxing tooling
52-
- Tooling for automatically setting up and enabling LUKS TPM2 integration for unlocking LUKS drives
53-
- Tooling for automatically setting up and enabling LUKS FIDO2 integration for unlocking LUKS drives
54-
- Toggles for a variety of the hardening set by default, for user convenience (`ujust --choose`)
51+
- Install Bubblejail for additional sandbox tooling
52+
- Provide tooling for automatically setting up and enabling LUKS TPM2 integration for unlocking LUKS drives
53+
- Provide tooling for automatically setting up and enabling LUKS FIDO2 integration for unlocking LUKS drives
54+
- Provide toggles for a variety of the hardening set by default, for user convenience (`ujust --choose`)

0 commit comments

Comments
 (0)