Howto configure the Linux kernel / security
- Security configuration
Security options[]
- Option: KEYS
- Kernel Versions: 2.6.15.6 ...
- (on/off) Enable access key retention support
- This option provides support for retaining authentication tokens and access keys in the kernel.
- It also includes provision of methods by which such keys might be associated with a process so that network filesystems, encryption support and the like can find them.
- Furthermore, a special type of key is available that acts as keyring: a searchable sequence of keys. Each process is equipped with access to five standard keyrings: UID-specific, GID-specific, session, process and thread.
- If you are unsure as to whether this is required, answer N.
- Option: KEYS_DEBUG_PROC_KEYS
- Kernel Versions: 2.6.15.6 ...
- (on/off) Enable the /proc/keys file by which all keys may be viewed
- depends on KEYS
- This option turns on support for the /proc/keys file through which all the keys on the system can be listed.
- This option is a slight security risk in that it makes it possible for anyone to see all the keys on the system. Normally the manager pretends keys that are inaccessible to a process don't exist as far as that process is concerned.
- Option: SECURITY
- Kernel Versions: 2.6.15.6 ...
- (on/off) Enable different security models
- depends on SYSFS
- This allows you to choose different security modules to be configured into your kernel.
- If this option is not selected, the default Linux security model will be used.
- If you are unsure how to answer this question, answer N.
- Option: SECURITY_NETWORK
- Kernel Versions: 2.6.15.6 ...
- (on/off) Socket and Networking Security Hooks
- depends on SECURITY
- This enables the socket and networking security hooks. If enabled, a security module can use these hooks to implement socket and networking access controls. If you are unsure how to answer this question, answer N.
- Option: SECURITY_CAPABILITIES
- Kernel Versions: 2.6.15.6 ...
- (on/off/module) Default Linux Capabilities
- depends on SECURITY
- This enables the "default" Linux capabilities functionality. If you are unsure how to answer this question, answer Y.
- Option: SECURITY_ROOTPLUG
- Kernel Versions: 2.6.15.6 ...
- (on/off/module) Root Plug Support
- depends on USB && SECURITY
- This is a sample LSM module that should only be used as such. It prevents any programs running with egid == 0 if a specific USB device is not present in the system.
- See <http://www.linuxjournal.com/article.php?sid=6279> for more information about this module. If you are unsure how to answer this question, answer N.
- Option: SECURITY_SECLVL
- Kernel Versions: 2.6.15.6 ...
- (on/off/module) BSD Secure Levels
- depends on SECURITY
- select CRYPTO
- select CRYPTO_SHA1
- Implements BSD Secure Levels as an LSM. See <file:Documentation/seclvl.txt> for instructions on how to use this module.
- If you are unsure how to answer this question, answer N.
Linux Kernel Configuration