<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=4388&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=4388</link>
		<description><![CDATA[The most recent posts in [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux.]]></description>
		<lastBuildDate>Mon, 28 Jun 2021 19:52:14 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30460#p30460</link>
			<description><![CDATA[<div class="quotebox"><cite>dice wrote:</cite><blockquote><div><p>I havent used your list of parameters, i tried some of the tails linux recommended&#160; parameters , not sure exactly which one locked up my computer but the mds=full,nosmt seems to stand out to me, after removing that i had no issues. It definitely a case by case basis, not all intel computers are made the same.</p><p><a href="https://tails.boum.org/contribute/design/kernel_hardening/" rel="nofollow">https://tails.boum.org/contribute/desig … hardening/</a></p></div></blockquote></div><p>Tails and Whonix have a much smaller set of security options than what I have proposed. In each specific case, you need to select your own set of security parameters for the Linux kernel. In my case, everything works due to the fact that I have a fairly ancient Intel processor. I am glad that you are interested in this topic, since few people are interested in the information security of their operating system and hardware.</p>]]></description>
			<author><![CDATA[dummy@example.com (Eaglet)]]></author>
			<pubDate>Mon, 28 Jun 2021 19:52:14 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30460#p30460</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30458#p30458</link>
			<description><![CDATA[<div class="quotebox"><cite>Eaglet wrote:</cite><blockquote><div><div class="quotebox"><cite>dice wrote:</cite><blockquote><div><p>Thanks for sharing</p><p>one should definitely read up on linux kernel parameters. <a href="https://www.kernel.org/doc/html/v4.14/admin-guide/kernel-parameters.html" rel="nofollow">https://www.kernel.org/doc/html/v4.14/a … eters.html</a></p><p>I tried a few of those parameters awhile ago, i think disabling smt caused my rig to lock up.</p></div></blockquote></div><p>If you have problems booting with the new Linux kernel parameters, then you can edit the boot parameters in the Grub menu when the bootloader starts. Unfortunately, I cannot check the performance of these parameters on many computers, since I do not have such an opportunity. I only urge specialists, especially in information security, to carefully read the official documentation for the possibility of self-defense of the Linux kernel.</p></div></blockquote></div><p>I havent used your list of parameters, i tried some of the tails linux recommended&#160; parameters , not sure exactly which one locked up my computer but the mds=full,nosmt seems to stand out to me, after removing that i had no issues. It definitely a case by case basis, not all intel computers are made the same.</p><p><a href="https://tails.boum.org/contribute/design/kernel_hardening/" rel="nofollow">https://tails.boum.org/contribute/desig … hardening/</a></p>]]></description>
			<author><![CDATA[dummy@example.com (dice)]]></author>
			<pubDate>Mon, 28 Jun 2021 12:12:24 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30458#p30458</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30452#p30452</link>
			<description><![CDATA[<p>It&#039;s a shame that no one wants to discuss the technical details of the proposed parameters. There are parameters in the proposed parameters, the use of which I could not get a definite answer from some specialists in configuring the Linux kernel:</p><div class="codebox"><pre><code>kmemleak=on kmemleak.stack=on kmemleak.scan=on kmemleak=scan kmemleak=clear </code></pre></div><p>But, I think, the solution I proposed with these parameters will be correct, based on the logic of this subset of the Linux kernel.</p>]]></description>
			<author><![CDATA[dummy@example.com (Eaglet)]]></author>
			<pubDate>Mon, 28 Jun 2021 07:47:32 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30452#p30452</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30450#p30450</link>
			<description><![CDATA[<div class="quotebox"><cite>ComputerBob wrote:</cite><blockquote><div><div class="quotebox"><cite>Eaglet wrote:</cite><blockquote><div><p>I am not forcing you to do anything if you have not noticed. A smart person will study the proposal, perhaps with the help of other people, if his knowledge is not enough, and then decide whether he needs it. Don&#039;t insult me with your distrust!</p></div></blockquote></div><p>I didn&#039;t mean to insult you. </p><p>When it comes to my computer, I distrust ANYONE who hasn&#039;t already earned my trust over time.</p><p>Also, I run a web site that has had 22 million visits from all over the world. I study its server logs every day. In all these years, I can&#039;t even remember the last time my site received a visitor from Russia (you have since changed your location to USSR) that wasn&#039;t malicious and needed to be blocked. So, I am especially suspicious of security advice from anyone who is from Russia.</p><p>Sorry, my feelings are based on my own experience, and are not personal against you.</p></div></blockquote></div><p>1. I, unlike you, trust only myself. 2. No need to spam and talk off topic. 3. In every country in the world there are different people, both good and bad. 4. This is my last reply to your posts, I will only reply to posts on a technical topic.</p>]]></description>
			<author><![CDATA[dummy@example.com (Eaglet)]]></author>
			<pubDate>Sun, 27 Jun 2021 16:57:21 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30450#p30450</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30449#p30449</link>
			<description><![CDATA[<div class="quotebox"><cite>Eaglet wrote:</cite><blockquote><div><div class="quotebox"><cite>ComputerBob wrote:</cite><blockquote><div><p>In order for me to even CONSIDER making these types of changes, the person who wants me to do them has to be someone who has long- established themself as a TRUSTED expert who has a documented history of helping people like me.</p></div></blockquote></div><p>I am not forcing you to do anything if you have not noticed. A smart person will study the proposal, perhaps with the help of other people, if his knowledge is not enough, and then decide whether he needs it. Don&#039;t insult me with your distrust!</p></div></blockquote></div><p>I didn&#039;t mean to insult you. </p><p>When it comes to my computer, I distrust ANYONE who hasn&#039;t already earned my trust over time.</p><p>Also, I run a web site that has had 22 million visits from all over the world. I study its server logs every day. In all these years, I can&#039;t even remember the last time my site received a visitor from Russia (you have since changed your location to USSR) that wasn&#039;t malicious and needed to be blocked. So, I am especially suspicious of security advice from anyone who is from Russia.</p><p>Sorry, my feelings are based on my own experience, and are not personal against you.</p>]]></description>
			<author><![CDATA[dummy@example.com (ComputerBob)]]></author>
			<pubDate>Sun, 27 Jun 2021 16:31:08 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30449#p30449</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30447#p30447</link>
			<description><![CDATA[<div class="quotebox"><cite>dice wrote:</cite><blockquote><div><p>Thanks for sharing</p><p>one should definitely read up on linux kernel parameters. <a href="https://www.kernel.org/doc/html/v4.14/admin-guide/kernel-parameters.html" rel="nofollow">https://www.kernel.org/doc/html/v4.14/a … eters.html</a></p><p>I tried a few of those parameters awhile ago, i think disabling smt caused my rig to lock up.</p></div></blockquote></div><p>If you have problems booting with the new Linux kernel parameters, then you can edit the boot parameters in the Grub menu when the bootloader starts. Unfortunately, I cannot check the performance of these parameters on many computers, since I do not have such an opportunity. I only urge specialists, especially in information security, to carefully read the official documentation for the possibility of self-defense of the Linux kernel.</p>]]></description>
			<author><![CDATA[dummy@example.com (Eaglet)]]></author>
			<pubDate>Sun, 27 Jun 2021 15:56:12 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30447#p30447</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30446#p30446</link>
			<description><![CDATA[<div class="quotebox"><cite>ComputerBob wrote:</cite><blockquote><div><p>In order for me to even CONSIDER making these types of changes, the person who wants me to do them has to be someone who has long- established themself as a TRUSTED expert who has a documented history of helping people like me.</p></div></blockquote></div><p>I am not forcing you to do anything if you have not noticed. A smart person will study the proposal, perhaps with the help of other people, if his knowledge is not enough, and then decide whether he needs it. Don&#039;t insult me with your distrust!</p>]]></description>
			<author><![CDATA[dummy@example.com (Eaglet)]]></author>
			<pubDate>Sun, 27 Jun 2021 15:50:18 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30446#p30446</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30442#p30442</link>
			<description><![CDATA[<p>Thanks for sharing</p><p>one should definitely read up on linux kernel parameters. <a href="https://www.kernel.org/doc/html/v4.14/admin-guide/kernel-parameters.html" rel="nofollow">https://www.kernel.org/doc/html/v4.14/a … eters.html</a></p><p>I tried a few of those parameters awhile ago, i think disabling smt caused my rig to lock up.</p>]]></description>
			<author><![CDATA[dummy@example.com (dice)]]></author>
			<pubDate>Sun, 27 Jun 2021 13:44:14 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30442#p30442</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30441#p30441</link>
			<description><![CDATA[<p>In order for me to even CONSIDER making these types of changes, the person who wants me to do them has to be someone who has long- established themself as a TRUSTED expert who has a documented history of helping people like me.</p>]]></description>
			<author><![CDATA[dummy@example.com (ComputerBob)]]></author>
			<pubDate>Sun, 27 Jun 2021 12:47:32 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30441#p30441</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30435#p30435</link>
			<description><![CDATA[<p>Hello comrades! If you have technical questions on this topic, ask, I will be happy to answer them.</p>]]></description>
			<author><![CDATA[dummy@example.com (Eaglet)]]></author>
			<pubDate>Sun, 27 Jun 2021 07:42:56 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30435#p30435</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30434#p30434</link>
			<description><![CDATA[<div class="quotebox"><cite>andyprough wrote:</cite><blockquote><div><p>I&#039;ve seen a number of people post these lists of &quot;super secure settings&quot; that the poster allegedly has learned about, but for which they leave little or no description as to what each change does. I can only assume that zero readers try them, since it&#039;s just a &quot;trust me this works&quot; list.</p></div></blockquote></div><p>For an explanation of each kernel parameter, see the official documentation for the Linux kernel (different versions). You, if you have the necessary qualifications, can check each parameter I have given. I don&#039;t think you will argue that the official Linux kernel documentation is lying to you? ;-)</p>]]></description>
			<author><![CDATA[dummy@example.com (Eaglet)]]></author>
			<pubDate>Sat, 26 Jun 2021 20:00:00 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30434#p30434</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30432#p30432</link>
			<description><![CDATA[<p>I&#039;ve seen a number of people post these lists of &quot;super secure settings&quot; that the poster allegedly has learned about, but for which they leave little or no description as to what each change does. I can only assume that zero readers try them, since it&#039;s just a &quot;trust me this works&quot; list.</p>]]></description>
			<author><![CDATA[dummy@example.com (andyprough)]]></author>
			<pubDate>Sat, 26 Jun 2021 19:33:10 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30432#p30432</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30429#p30429</link>
			<description><![CDATA[<div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><div class="quotebox"><cite>Eaglet wrote:</cite><blockquote><div><p>Smart people learn from their mistakes</p></div></blockquote></div><p>Only a fool learns from their own mistakes <img src="https://dev1galaxy.org/img/smilies/wink.png" width="15" height="15" alt="wink" /></p></div></blockquote></div><p>You are wrong: you cannot teach a fool, because he is a fool! ;-)</p>]]></description>
			<author><![CDATA[dummy@example.com (Eaglet)]]></author>
			<pubDate>Sat, 26 Jun 2021 18:37:38 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30429#p30429</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30428#p30428</link>
			<description><![CDATA[<div class="quotebox"><cite>Eaglet wrote:</cite><blockquote><div><p>Smart people learn from their mistakes</p></div></blockquote></div><p>Only a fool learns from their own mistakes <img src="https://dev1galaxy.org/img/smilies/wink.png" width="15" height="15" alt="wink" /></p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Sat, 26 Jun 2021 18:33:49 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30428#p30428</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Kernel hardening for Intel CPU and fix memory leak in Linux]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30426#p30426</link>
			<description><![CDATA[<div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>The <a href="https://pkginfo.devuan.org/cgi-bin/package-query.html?c=package&amp;q=hardening-runtime=1" rel="nofollow">hardening-runtime</a> package will apply several of those parameters automatically.<br />Note that the kernel tuning can be applied via /etc/sysctl.d/ if a bootloader-independent configuration method is required.</p></div></blockquote></div><p>1. The <a href="https://pkginfo.devuan.org/cgi-bin/package-query.html?c=package&amp;q=hardening-runtime=1" rel="nofollow">hardening-runtime</a> package contains very few security options for the Linux kernel compared to the FULL list of security options that I have provided!</p><p>2. The <a href="https://pkginfo.devuan.org/cgi-bin/package-query.html?c=package&amp;q=hardening-runtime=1" rel="nofollow">hardening-runtime</a> package contains very few security options for <em>sysctl</em>. I current use over 96 parameters in my <em>sysctl.conf</em> for heavy security hardening my Linux system: for kernel, network &amp; etc.</p><p>I can read, study, analyze and apply the written in the documentation in the primary sources for Linux in practice. The Debian Help is very incomplete. As long as sysadmins, information security professionals, and engineers do not read the primary sources of technical information, the security of Linux systems will be threatened by their gullibility. I prefer to protect my systems myself, not using ready-made solutions with a limited (not complete) set of security parameters. My solutions take advantage of all the Linux systems security hardening capabilities that are provided by the Linux kernel, as well as those subsystems that are additionally used to secure Linux systems. Life and bitter practical experience taught me this. Smart people learn from their mistakes, it is impossible to teach fools!</p>]]></description>
			<author><![CDATA[dummy@example.com (Eaglet)]]></author>
			<pubDate>Sat, 26 Jun 2021 18:27:18 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30426#p30426</guid>
		</item>
	</channel>
</rss>
