-
Notifications
You must be signed in to change notification settings - Fork 55
Open
Description
https://tails.net/contribute/design/kernel_hardening/
https://gitlab.tails.boum.org/tails/tails/-/issues/19613
https://kspp.github.io/Recommended_Settings
slub_debug is not apparently used in Kicksecure (and friends Whonix and QubesOS).
Tails and KSPP, however, do recommend using slub_debug=FZ, still used in Tails to this day.
In summary of these sources, the consensus is that slub debugging is not generally harmful because the "information leak" is only to root when kernel lockdown is enabled, and that it therefore doesn't matter that kernel pointer hashing is disabled because root should never be compromised.
Concerns of risk of slub debugging would therefore be overstated.
Not sure about any other contraindictions, though.
Metadata
Metadata
Assignees
Labels
No labels