Hardened kernel with Grsecurity is coming along nicely - and there is yet more 
to come, as this medium-post shows 
https://medium.com/@securitystreak/living-with-qubes-os-r3-2-rc3-for-a-week-1a37e04c799e

Here's the background, I just sent this mail to coldhak.ca:
---
Referring to https://coldhak.ca/coldkernel/

1.
Please add that error-messages from "sudo update-grub2" can safely be ignored.
As also stated in https://www.qubes-os.org/doc/managing-vm-kernel/ , 
"Installing PV GRUB2".

2.
Also please add that one needs to change the kernel in appvms to pvgrub2

3.
And related, that one should also install paxtest and run it to confirm that 
grsecurity is running
As mentioned at https://micahflee.com/2016/01/debian-grsecurity/

4.
And that there is the option to add further to securing the appvm, by using 
gradm2 in learning mode as explained at 
https://en.wikibooks.org/wiki/Grsecurity/The_Administration_Utility#Full_System_Learning
---

And so I'd like to hear if you have any suggestions for RBAC given the 
opportunities for compartmentalization that Qubes OS provides.

Cheers,
C-c & C-v


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0dfeb459-3b7f-438f-b028-e8d8a32848c8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to