In my last post I presented Grsecurity kernel packages for Debian Wheezy. Now would be a good time to review the hows and whys of Grsecurity, so you can decide if it is something you need.
Today we will quickly look at Grsecurity’s viability and impact on a typical desktop or laptop.
Why do I need Grsecurity on the desktop?
- Often run unsecure code? Limit its impact on the system.
- Employ chroots and containers? Enforce stricter containment.
- Connect to hostile networks? Reduce and mitigate impact of exploitation attacks.
- Allow others to use your system? Increase monitoring and control over your machine.
Or perhaps you choose to run Grsecurity on your laptop simply for the sheer paranoia-factor and to impress friends.
How does Grsecurity behave on the desktop?
In addition to the invisible yet significant hardening efforts againt kernel exploitation, there are some changes that an experienced user will notice immediately:
- you need root to dmesg
- grsec reports denied resource oversteps in dmesg
- top only shows this user’s running processes
- mappings and other sensitive information is only available to the process owner in
The very few programs that depend on a specific kernel version, or that read /sys/kcore or write directly to kernel constructs will not work under Grsecurity.
And of course, there is the feeling of solidity and the sight of the reported kernel version:
~# uname -a Linux amaeth 3.2.60-grsec-lied #1 SMP Wed Aug 6 17:40:27 CEST 2014 x86_64 GNU/Linux