Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make /sys hardening optional and allow access to /sys/fs to make polkit work #204

Merged
merged 2 commits into from Feb 26, 2024

Conversation

DanWin
Copy link
Contributor

@DanWin DanWin commented Feb 22, 2024

Fixes #172

@monsieuremre
Copy link
Contributor

monsieuremre commented Feb 26, 2024

Has this been tested? The reason I had more subsets of /sys as exceptions is that I experienced breakage with them hidden. /sys/fs for polkit was not enough. A difference of DE's maybe? Seems rushed to be enabled by default. Will comment if I find the time to test again and to report if breakage happens.

@adrelanos
Copy link
Member

Tested.

hide-hardware-information.service hasn't been enabled by default.

Not enabled by default as per:
https://github.com/Kicksecure/security-misc/blob/master/usr/lib/systemd/system-preset/50-security-misc.preset#L5

There's no ticket to enable it by default either.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

improve hide-hardware-info.service, make /sys hiding optional
3 participants