{{Header}}
{{#seo:
|description={{project_name_workstation_long}} Security Hardening. This page is targeted at users who wish to improve the security of their {{project_name_workstation_long}} to become even more secure.
|image=Doors-1767563_640.jpg
}}
[[File:Doors-1767563_640.jpg|thumb]]
{{security_intro}}
This page is targeted at users who wish to improve the security of their {{project_name_workstation_short}} to become even more secure.
= Introduction =
{{project_name_long}} is by no means a perfectly hardened system. Additional hardening measures are most welcome, but at the same time hardening by default is very difficult. Until the {{project_name_long}} project realizes a significant increase in resources or community assistance, extra measures will remain out of scope and hardening will be left to the upstream operating system. See [[Dev/Virtualization_Platform|Virtualization Platform]] for further details.
= AppArmor =
Learn more about [https://wiki.apparmor.net AppArmor], which helps to protect against vulnerabilities by confining a program's file access based upon strict rule-sets. It is recommended to apply the available [[AppArmor#Installation|{{project_name_short}} AppArmor profiles]] to contain various applications which are run in {{project_name_gateway_long}} ({{project_name_gateway_vm}}
) and/or {{project_name_workstation_short}} ({{project_name_workstation_vm}}
), like Tor, Tor Browser, Thunderbird and others.
= Disable TCP SACK =
[https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Selective_acknowledgments TCP Selective Acknowledgement (SACK)] is a commonly exploited option in the TCP protocol and not needed for many people. [For example, it has been used for [https://en.wikipedia.org/wiki/SACK_Panic#SACK_Panic remote denial of service attacks] and can even lead to a Linux kernel panic.] For this reason, it is recommended to disable it unless required.
{{Open with root rights|filename=
/etc/sysctl.d/30_security-misc.conf
}}
Uncomment all lines starting with net.ipv4
.
This procedure can also be repeated on the {{project_name_gateway_short}}.
TCP SACK is not disabled by default because on some systems it can greatly decrease network performance. [
https://forums.whonix.org/t/disabling-tcp-sack-dsack-fack/8109/5
]
= Restrict Hardware Information to Root =
See [[Security-misc#Restrict_Hardware_Information_to_Root|Restrict Hardware Information to Root]].
= Footnotes =
{{reflist|close=1}}
{{Footer}}
[[Category:Documentation]]