kconfig-hardened-check icon indicating copy to clipboard operation
kconfig-hardened-check copied to clipboard

A tool for checking the security hardening options of the Linux kernel

Results 53 kconfig-hardened-check issues
Sort by recently updated
recently updated
newest added

Instead of having to specify Kconfig file and /proc/cmdline, --autodetect will try to infer them. This is related to #129

new_feature

Splitting the checks by arch family makes the code a tad more readable and self-contains, and makes it easier to inspect what checks are architecture-specific, instead of having the read...

new_feature

The CI scripts of `kernel-hardening-checker` run on Python versions that are currently officially supported: ![CI](https://github.com/a13xp0p0v/kernel-hardening-checker/assets/1419667/4a628a03-f5ab-4aaf-9e14-0a75680616fa) ![Python versions](https://github.com/a13xp0p0v/kernel-hardening-checker/assets/1419667/66c799ce-ed19-4d68-90e8-636d686d4b89) (from https://devguide.python.org/versions/) **Question** Should `kernel-hardening-checker` also work on some older Python versions? Is...

question

I have an idea: to add a column `|with care|` for the options that may break some kernel functionality or introduce significant performance impact. (refers to #137)

new_feature

Encrypted RAM is a security mechanism, if only against forensic.

idea_for_the_future

```console $ python3 ./bin/kernel-hardening-checker -h usage: kernel-hardening-checker [-h] [--version] [-m {verbose,json,show_ok,show_fail}] [-c CONFIG] [-l CMDLINE] [-s SYSCTL] [-v KERNEL_VERSION] [-p {X86_64,X86_32,ARM64,ARM}] [-g {X86_64,X86_32,ARM64,ARM}] A tool for checking the security hardening...

new_feature

realised issue #153 tested on `bullseye` image, also there is an default option for my ubutu. didnt cause any issuses with booting or something this option can reduces chances to...

new_check

there is an implementation of #149 a few words about logic: `OK` is `cfi=kcfi` in __cmdline__. if this parameter is not set, we looking for `CONFIG_CFI_AUTO_DEFAULT` which should be off,...

new_check

implementation of of issue #158 some **sysct** checks depend on the microarchitecture, for example: #157 what i did: - renamed the existing `detect_arch()` into `detect_arch_kconfig()` - implemented `detect_arch_sysctl()`. now we...