summaryrefslogtreecommitdiff
path: root/kernels/linux-libre-grsec/sysctl.conf
diff options
context:
space:
mode:
Diffstat (limited to 'kernels/linux-libre-grsec/sysctl.conf')
-rw-r--r--kernels/linux-libre-grsec/sysctl.conf103
1 files changed, 103 insertions, 0 deletions
diff --git a/kernels/linux-libre-grsec/sysctl.conf b/kernels/linux-libre-grsec/sysctl.conf
new file mode 100644
index 000000000..5c70de4a2
--- /dev/null
+++ b/kernels/linux-libre-grsec/sysctl.conf
@@ -0,0 +1,103 @@
+#
+# Notes
+#
+# disable_priv_io: Useless if grsec_lock is not activated.
+# symlinkown_gid: Group http.
+# romount_protect: Deny rw mounts after boot.
+# audit_group: Restrict exec/chdir log to group.
+# exec_logging: Verbose!
+# chroot_execlog: Verbose!
+# audit_chdir: Verbose!
+# dmesg: Restrict dmesg to root.
+# tpe_gid: Group tpe-trusted.
+# socket_all_gid: Group socket-deny-all.
+# socket_client_gid: Group socket-deny-client.
+# socket_server_gid: Group socket-deny-server.
+# deny_new_usb: No new USB after boot.
+
+
+#
+# Memory Protections
+#
+
+#kernel.grsecurity.disable_priv_io = 1
+#kernel.grsecurity.deter_bruteforce = 1
+
+#
+# Filesystem Protections
+#
+
+#kernel.grsecurity.linking_restrictions = 1
+#kernel.grsecurity.enforce_symlinksifowner = 1
+#kernel.grsecurity.symlinkown_gid = 33
+#kernel.grsecurity.fifo_restrictions = 1
+#kernel.grsecurity.romount_protect = 0
+#kernel.grsecurity.chroot_caps = 1
+#kernel.grsecurity.chroot_deny_chmod = 1
+#kernel.grsecurity.chroot_deny_chroot = 1
+#kernel.grsecurity.chroot_deny_fchdir = 1
+#kernel.grsecurity.chroot_deny_mknod = 1
+#kernel.grsecurity.chroot_deny_mount = 1
+#kernel.grsecurity.chroot_deny_pivot = 1
+#kernel.grsecurity.chroot_deny_shmat = 1
+#kernel.grsecurity.chroot_deny_sysctl = 1
+#kernel.grsecurity.chroot_deny_unix = 1
+#kernel.grsecurity.chroot_enforce_chdir = 1
+#kernel.grsecurity.chroot_findtask = 1
+#kernel.grsecurity.chroot_restrict_nice = 1
+
+#
+# Kernel Auditing
+#
+
+kernel.grsecurity.audit_group = 0
+#kernel.grsecurity.audit_gid = 9994
+kernel.grsecurity.exec_logging = 0
+#kernel.grsecurity.resource_logging = 1
+kernel.grsecurity.chroot_execlog = 0
+#kernel.grsecurity.audit_ptrace = 1
+kernel.grsecurity.audit_chdir = 0
+#kernel.grsecurity.audit_mount = 1
+#kernel.grsecurity.signal_logging = 1
+#kernel.grsecurity.forkfail_logging = 1
+#kernel.grsecurity.timechange_logging = 1
+#kernel.grsecurity.rwxmap_logging = 1
+
+#
+# Executable Protections
+#
+
+#kernel.grsecurity.dmesg = 1
+#kernel.grsecurity.harden_ptrace = 1
+#kernel.grsecurity.ptrace_readexec = 1
+#kernel.grsecurity.consistent_setxid = 1
+#kernel.grsecurity.harden_ipc = 1
+#kernel.grsecurity.tpe = 1
+#kernel.grsecurity.tpe_gid = 9999
+#kernel.grsecurity.tpe_invert = 1
+#kernel.grsecurity.tpe_restrict_all = 1
+
+#
+# Network Protections
+#
+
+#kernel.grsecurity.ip_blackhole = 1
+#kernel.grsecurity.lastack_retries = 4
+#kernel.grsecurity.socket_all = 1
+#kernel.grsecurity.socket_all_gid = 9995
+#kernel.grsecurity.socket_client = 1
+#kernel.grsecurity.socket_client_gid = 9996
+#kernel.grsecurity.socket_server = 1
+#kernel.grsecurity.socket_server_gid = 9997
+
+#
+# Physical Protections
+#
+
+#kernel.grsecurity.deny_new_usb = 0
+
+#
+# Restrict grsec sysctl changes after this was set
+#
+
+kernel.grsecurity.grsec_lock = 1