Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I've done

I've done

Scheduled Pinned Locked Moved Uncategorized
copyfaildirtyfrag
3 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • whreq@hsnl.socialW This user is from outside of this forum
    whreq@hsnl.socialW This user is from outside of this forum
    whreq@hsnl.social
    wrote last edited by
    #1

    I've done

    echo 1 > /proc/sys/kernel/modules_disabled

    on some servers that don't need to load additional modules after startup. I've just configured this to run 5 minutes after boot. (Timing was an arbitrary choice.)

    This reduces the attack surface and should help mitigate against vulnerabilities exploitable via kernel modules that you don't normally use, at the expense of on-demand loading of modules of course (including e.g. usbhid for remote kvm, so make sure whatever you might need is loaded first).

    The setting takes a reboot to undo.

    #copyfail #dirtyfrag

    vive_levant@masto.bikeV 1 Reply Last reply
    1
    0
    • whreq@hsnl.socialW whreq@hsnl.social

      I've done

      echo 1 > /proc/sys/kernel/modules_disabled

      on some servers that don't need to load additional modules after startup. I've just configured this to run 5 minutes after boot. (Timing was an arbitrary choice.)

      This reduces the attack surface and should help mitigate against vulnerabilities exploitable via kernel modules that you don't normally use, at the expense of on-demand loading of modules of course (including e.g. usbhid for remote kvm, so make sure whatever you might need is loaded first).

      The setting takes a reboot to undo.

      #copyfail #dirtyfrag

      vive_levant@masto.bikeV This user is from outside of this forum
      vive_levant@masto.bikeV This user is from outside of this forum
      vive_levant@masto.bike
      wrote last edited by
      #2

      @whreq you can’t echo 0 in /proc/sys/kernel/modules_disabled to revert ?

      whreq@hsnl.socialW 1 Reply Last reply
      0
      • vive_levant@masto.bikeV vive_levant@masto.bike

        @whreq you can’t echo 0 in /proc/sys/kernel/modules_disabled to revert ?

        whreq@hsnl.socialW This user is from outside of this forum
        whreq@hsnl.socialW This user is from outside of this forum
        whreq@hsnl.social
        wrote last edited by
        #3

        @Vive_Levant

        echo 0 > /proc/sys/kernel/modules_disabled
        -bash: echo: write error: Invalid argument

        1 Reply Last reply
        0
        • R relay@relay.infosec.exchange shared this topic
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups