Comparison of secureblue with Kicksecure and Development Notes

From Kicksecure
< Dev
Revision as of 11:48, 30 November 2024 by Patrick (talk | contribs)
Jump to navigation Jump to search

TODO

Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

https://github.com/secureblue/securebluearchive.org iconarchive.today icon

Quote secureblue README.md as of Nov 30, 2024, commit hash e40b70df06a30c3a2d99f337f3cbfe3d5a54aa83archive.org iconarchive.today icon.

Hardening

- Installing and enabling [hardened_malloc](https://github.com/GrapheneOS/hardened_mallocarchive.org iconarchive.today icon) globally, including for flatpaks. [Thanks to rusty-snake's spec](https://github.com/rusty-snake/fedora-extrasarchive.org iconarchive.today icon)

- Installing [hardened-chromium](https://github.com/secureblue/hardened-chromiumarchive.org iconarchive.today icon), which is inspired by [Vanadium](https://github.com/GrapheneOS/Vanadiumarchive.org iconarchive.today icon). [Why chromium?](https://grapheneos.org/usage#web-browsingarchive.org iconarchive.today icon) [Why not flatpak chromium?](https://forum.vivaldi.net/post/669805archive.org iconarchive.today icon) - Setting numerous hardened sysctl values [details](https://github.com/secureblue/secureblue/blob/live/files/system/etc/sysctl.d/hardening.confarchive.org iconarchive.today icon) - Remove SUID-root from [numerous binaries](https://github.com/secureblue/secureblue/blob/live/files/scripts/removesuid.sharchive.org iconarchive.today icon) and replace functionality [using capabilities](https://github.com/secureblue/secureblue/blob/live/files/system/usr/bin/setcapsforunsuidbinariesarchive.org iconarchive.today icon) - Disable Xwayland by default (for GNOME, Plasma, and Sway images) - Mitigation of [LD_PRELOAD attacks](https://github.com/Aishou/wayland-keyloggerarchive.org iconarchive.today icon) via `ujust toggle-bash-environment-lockdown` - Disabling coredumps - Disabling all ports and services for firewalld - Adds per-network MAC randomization - Blacklisting numerous unused kernel modules to reduce attack surface [details](https://github.com/secureblue/secureblue/blob/live/files/system/etc/modprobe.d/blacklist.confarchive.org iconarchive.today icon) - Enabling only the [flathub-verified](https://flathub.org/apps/collection/verified/1archive.org iconarchive.today icon) remote by default - Sets numerous hardening kernel arguments (Inspired by [Madaidan's Hardening Guide](https://madaidans-insecurities.github.io/guides/linux-hardening.htmlarchive.org iconarchive.today icon)) [details](KARGS.md) - Require wheel user authentication via polkit for `rpm-ostree install` [why?](https://github.com/rohanssrao/silverblue-privescarchive.org iconarchive.today icon) - Brute force protection by locking user accounts for 24 hours after 50 failed login attempts, hardened password encryption and password quality suggestions - Installing usbguard and providing `ujust` commands to automatically configure it - Installing bubblejail for additional sandboxing tooling - Set opportunistic DNSSEC and DNSOverTLS for systemd-resolved - Configure chronyd to use Network Time Security (NTS) [using chrony config from GrapheneOS](https://github.com/GrapheneOS/infrastructure/blob/main/chrony.confarchive.org iconarchive.today icon) - Disable KDE GHNS by default [why?](https://blog.davidedmundson.co.uk/blog/kde-store-content/archive.org iconarchive.today icon) - Disable install & usage of GNOME user extensions by default - Use HTTPS for all rpm mirrors - Set all default container policies to `reject`, `signedBy`, or `sigstoreSigned` - Disable a variety of services by default (including cups, geoclue, passim, and others) - Removal of the unmaintained and suid-root fuse2 by default - (Non-userns variants) Disabling unprivileged user namespaces - (Non-userns variants) Replacing bubblewrap with suid-root bubblewrap so flatpak can be used without unprivileged user namespaces

Footnotes

Notification image

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!