Features
- Remove suid-root from numerous binaries, replacing functionality using capabilities, and remove
sudo
, su
, and pkexec
entirely in favor of run0
why?
- Disable XWayland by default (for GNOME, Plasma, and Sway images)
- Mitigate LD_PRELOAD attacks via
ujust toggle-bash-environment-lockdown
- Disable install & usage of GNOME user extensions by default
- Disable KDE GHNS by default why?
- Remove the unmaintained and suid-root fuse2 by default
- Disable unprivileged user namespaces by default for the unconfined domain and the container domain why?
- Prohibit ptrace attachment why?
- Disable all ports and services for firewalld
- Use HTTPS for all rpm mirrors
- Set all default container policies to
reject
, signedBy
, or sigstoreSigned
- Enable only the Flathub-verified remote by default
- Add per-network MAC randomization
- Disable coredumps
- Blacklist numerous unused kernel modules to reduce attack surface details
- Protect against brute force by locking user accounts for 24 hours after 50 failed login attempts, providing password quality suggestions and making use of hardened password encryption
- Disable and mask a variety of services by default (including cups, geoclue, passim, and others)
- Install Bubblejail for additional sandbox tooling
- Provide tooling for automatically setting up and enabling LUKS TPM2 integration for unlocking LUKS drives
- Provide tooling for automatically setting up and enabling LUKS FIDO2 integration for unlocking LUKS drives
- Provide toggles for a variety of the hardening set by default, for user convenience (
ujust --choose
)