Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 19 Sep 2021 16:44:40 -0400
From: Tad <>
Subject: Self introduction

My name is Tad.

I have a few personal projects for the past five or so years for making
available kernel hardening features to more users.

My main project is DivestOS, which provides more secure images for older/legacy
Android devices.
I harden all device kernels via the following:
 * My automatic CVE checker/patcher program [1]. It is able to apply many dozen
   to many hundred CVE patches to trees. It is backed by an extensive versioned
   list [2] of CVE patches that I origianlly maintained by hand. In the past
   year or so I pull in using a scraper I made for the CIP scripts [3].
 * My hardenDefconfig function [4], inspired by the KSPP recommendations and
   later Popov's kconfig-hardened-check. It simply enables and disables various
 * My hardenBootArgs function [5], currently just enables slub_debug=FZP for
 * Some misc tweaks [6], currently for disabling slub/slab merging.
 * And lastly some sysctl tweaks [7].

I also maintain another project for providing some extra security to modern
distros, without recompilation.
It is called Brace [8] and compatible with Arch/Fedora/Debian/OpenSUSE.
In the kernel relations, it is mostly just sysctl [9] changes and kernel
commandline [10] changes.

Lastly some background:
Micay inspired me to work on this area back in mid-2015, after he helped me port
his Android PaX patchset to the OnePlus One phone [11].

Sharing for any comments.
Also most of you are likely working on mainline, not ancient kernels, so maybe
you'll find this interesting.

Best regards,


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.