Actions

Operating System Hardening

From Whonix


Oshardening34234.jpg

Debian[edit]

Debian Security Announcements[edit]

Since Whonix ™ is based on Debian, it takes advantage of all the hard work done by their security team: [1]

Debian takes security very seriously. We handle all security problems brought to our attention and ensure that they are corrected within a reasonable timeframe. Many advisories are coordinated with other free software vendors and are published the same day a vulnerability is made public and we also have a Security Audit team that reviews the archive looking for new or unfixed security bugs. Experience has shown that "security through obscurity" does not work. Public disclosure allows for more rapid and better solutions to security problems. In that vein, this page addresses Debian's status with respect to various known security holes, which could potentially affect Debian.

Users should consider subscribing to the Debian security announcement mailing list [archive] to stay informed about the latest security advisories.

Harden Debian[edit]

Most hardening steps cannot be easily added to Whonix ™ by default. Any major changes require careful research and significant developer/tester effort, otherwise system errors or breakage may occur. This is an open topic and Whonix ™ developers are amenable to suggestions - improving operating system security will always be a primary design goal.

Before attempting additional hardening measures below, be sure to fully understand them and apply the steps carefully:

Readers are welcome to add any additional hardening resources to this list.

Hardened Kernels[edit]

The upstream Kernel Self Protection Project (KSPP) [2] was established in 2015 with the goal of introducing more hardening features into mainline Linux. This includes many features found in the Grsecurity patchset, which was publicly available until early 2017 [archive]. One advantage of KSPP is that users will no longer need to compile and tweak settings to create a secure kernel. Instead, many hardening features will become the default over time in various distributions. Up-to-date information on available hardening features can be viewed here [archive].

The Hardened Kernel Project is a collaborative effort between Arch and Gentoo developers who handled Grsecurity packaging in their respective distributions with the goal of accelerating mainlining of the patchset. [3] [4]

While kernel hardening is important, it only addresses a subset of security risks. It cannot protect against backdoors or security issues related to design, policy or yet unknown exploit classes.

Module Loading[edit]

Restricting module loading can protect the kernel.

Chapter "Module Loading" is for advanced users only since it could break various things. This is still under development. See Whonix development discussion: allow loading signed kernel modules by default / disallow kernel module loading by default [archive]

See also Linux_Kernel_Runtime_Guard (LKRG) and LKRG module blocking.

/usr/lib/modules-load.d/whonix-firewall.conf

ipt_REJECT
ip6t_REJECT

nft_chain_nat_ipv4
nft_chain_route_ipv4
nft_chain_route_ipv6
nft_compat
nft_counter

xt_conntrack
xt_state
xt_tcpudp

/usr/lib/modules-load.d/xfce.conf

snd_intel8x0

## Platform specific?
## is autoloaded by snd_intel8x0
#snd

evdev
drm

## works without too
#binfmt_misc

Whonix-Workstation ™ only: /usr/lib/modules-load.d/kloak.conf

uinput

VirtualBox only: /usr/lib/modules-load.d/vbox.conf

vboxguest
vboxsf
vboxvideo

Disable module loading by creating this file: /etc/sysctl.d/module-loading.conf

kernel.modules_disabled=1

After reboot, test if module loading is really disabled. Try to load any module, for example apanel.

sudo modprobe apanel

Should show.

modprobe: ERROR: could not insert 'apanel': Operation not permitted

Harden Software Repositories[edit]

Many operating systems provide multiple repositories. Since the Whonix ™ implementation is based on Debian, these resources provide a suitable introduction for interested readers:

In summary, these resources confirm the main repository receives the most developer attention and security updates. This suggests a degree of hardening might involve editing /etc/apt/sources.list to strictly limit software to the main repository, while only installing security fixes and no other updates.

Whonix ™ has not implemented this design by default and it is an open research question whether this will actually improve security.

Vulnerabilities at Install Time[edit]

Introduction[edit]

Various installation media expose users to vulnerabilities, including:

The threat arises because the latest stable releases sometimes contain vulnerable, remotely exploitable applications. These applications are very likely to be used over untrusted networks [5] which are in a position to run Man-in-the-Middle Attacks.

One recent example is the January, 2019 apt-get vulnerability (CVE-2019-3462 [archive]) which allowed content injection by a MiTM attacker, thereby enabling remote code execution on the affected Linux machine. Specifically, improper sanitization of parameters in HTTP redirects allowed malicious content (altered packages) to be installed via a harmful mirror or direct injection into the network traffic. [6] For another example, see CVE-2014-6273 [archive] which affected apt-get in 2014.

Readers are welcome to help research this issue further and document sane and effective solutions. [7] For example, users who solely rely on Debian and Whonix ™ onion services for updates may have had (partial) protection against the 2019 apt-get bug, but this requires investigation.

Possible Solutions[edit]

Always Up-to-date Builds[edit]

If Whonix ™ regularly released up-to-date builds, this would be an optimal solution for end users. However, the maintenance effort -- building, testing and uploading -- is resource-intensive and not currently feasible for the Whonix ™ team.

Greater community support is needed for testing proposed Whonix ™ package updates and major new releases, alongside an automated test suite for Whonix ™.

apt-cache[edit]

When using virtual machines, Whonix-Gateway ™ could be configured to use the host apt-cache. Physically-isolated Whonix-Gateway ™ could use an apt-cache running on a separate machine. apt-cacher-ng [archive] is an example implementation of such an apt-cache.

This configuration does not anonymize operating system updates by default, which is a big disadvantage. [8] It would be first necessary to determine how to configure apt-cacher-ng on the host to force downloads through Tor.

Eventually Whonix-Workstation ™ could use an apt-cache that is running on Whonix-Gateway ™. Unfortunately, this would increase the Whonix-Gateway ™ attack surface if/when Whonix-Workstation ™ is compromised. On the other hand, it would decrease the Whonix-Workstation ™ attack surface if/when a vulnerable apt-get is used for downloads over untrusted Tor exit relays.

apt-offline[edit]

Another possibility is somehow using apt-offline [archive] to complete the initial updates of both Whonix-Gateway ™ and Whonix-Workstation ™.

Building from Source Code using Current Sources[edit]

Self-created Whonix ™ builds from source code use current sources, thereby solving this problem. Although frozen sources have been deprecated for reasons outlined in the Build documentation, using current sources comes with its own issues.

Footnotes[edit]

  1. https://security.debian.org/ [archive]
  2. https://www.openwall.com/lists/kernel-hardening [archive]
  3. https://github.com/AndroidHardeningArchive/linux-hardened/wiki [archive]
  4. https://github.com/anthraxx/linux-hardened [archive]
  5. Such as Tor exit relays.
  6. https://thehackernews.com/2019/01/linux-apt-http-hacking.html [archive]
  7. Forum discussion [archive].
  8. This leaks a list of installed packages to ISP-level adversaries and update servers. For example, if a user installed a webserver that is likely to be used to host a hidden web service, then this information would leak.


Fosshost is sponsors Kicksecure stage server Whonix old logo.png
Fosshost About Advertisements

Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki


Follow: 1024px-Telegram 2019 Logo.svg.png Iconfinder Apple Mail 2697658.png Twitter.png Facebook.png Rss.png Reddit.jpg 200px-Mastodon Logotype (Simple).svg.png

Support: 1024px-Telegram 2019 Logo.svg.png Discourse logo.png Matrix logo.svg.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate Whonix.png United Federation of Planets 1000px.png

Twitter-share-button.png Facebook-share-button.png Telegram-share.png link=mailto:?subject=Operating System Hardening&body=https://www.whonix.org/wiki/Operating_System_Hardening link=https://reddit.com/submit?url=https://www.whonix.org/wiki/Operating_System_Hardening&title=Operating System Hardening link=https://news.ycombinator.com/submitlink?u=https://www.whonix.org/wiki/Operating_System_Hardening&t=Operating System Hardening link=https://mastodon.technology/share?message=Operating System Hardening%20https://www.whonix.org/wiki/Operating_System_Hardening&t=Operating System Hardening

Please consider a recurring donation! Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

https link onion link Priority Support | Investors | Professional Support

Whonix | © ENCRYPTED SUPPORT LP | Heckert gnu.big.png Freedom Software / Osi standard logo 0.png Open Source (Why?)

The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent.