-
Notifications
You must be signed in to change notification settings - Fork 55
Description
Reason why the kernel parameter lockdown=confidentiality got disabled in the past:
Have to disable kernel lockdown. Unfortunately. Because that enforces kernel module signature verification. Which we don’t have yet.
Should we be enabling kernel lockdown during the boot process? After the kernel modules (tirdad; VirtualBox guest additions, if applicable) have been load, we could enable lockdown mode.
Thanks to @ArrayBolt3 for suggesting this!
How to enable lockdown mode during the boot process?
Requires root.
echo confidentiality > /sys/kernel/security/lockdown
How does that work?
cat /sys/kernel/security/lockdown
[none] integrity confidentiality
Kernel boots with lockdown mode none. Let's enable lockdown=confidentiality.
echo confidentiality > /sys/kernel/security/lockdown
Done. Let's see if that worked.
cat /sys/kernel/security/lockdown
confidentiality
Yes, lockdown=confidentiality has been enabled.
Once enabled, it cannot be reset, see:
echo none > /sys/kernel/security/lockdown
echo: write error: operation not permitted
zsh: exit 1
older discussions:
- https://forums.whonix.org/t/kernel-hardening-security-misc/7296/315
- https://forums.whonix.org/t/activating-lockdown/18740
related:
todo:
- APT trigger to point out that unsigned kernel modules which have been updated cannot be re-load without a reboot
needrestartwould be great in theory but had LPE (https://forums.whonix.org/t/add-package-needrestart/19078)