CNF-21196: RAN Hardening (Sysctl) - High Severity#528
CNF-21196: RAN Hardening (Sysctl) - High Severity#528sebrandon1 wants to merge 1 commit intoopenshift-kni:mainfrom
Conversation
Add 75-sysctl-high.yaml MachineConfig to apply top 5 kernel hardening sysctl flags for worker nodes: - kernel.dmesg_restrict=1 - Restrict kernel log access - kernel.randomize_va_space=2 - Full ASLR enabled - kernel.unprivileged_bpf_disabled=1 - Disable unprivileged BPF - kernel.yama.ptrace_scope=1 - Restrict ptrace scope - net.core.bpf_jit_harden=2 - Harden BPF JIT compiler Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
|
@sebrandon1: This pull request references CNF-21196 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: sebrandon1 The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Closing this PR - the sysctl settings here are actually MEDIUM/LOW severity per the Compliance Operator, not HIGH severity as originally labeled. We are currently focusing on HIGH severity remediations only. HIGH severity items are tracked in PR #529 (CNF-21212). These sysctl settings may be revisited in a future PR when we address MEDIUM severity items. |
Summary
We'll have a single
MachineConfigper path, per severity. Future high level severity flags will be added to this file and rebuilt with new comment andsourcekey/values.Kernel hardening via sysctl:
75-sysctl-high.yamlto apply top 5 kernel hardening sysctl flags for worker nodesSysctl Settings Applied
kernel.dmesg_restrictkernel.randomize_va_spacekernel.unprivileged_bpf_disabledkernel.yama.ptrace_scopenet.core.bpf_jit_hardenTest Plan
sysctl -a | grep -E 'dmesg_restrict|randomize_va_space|unprivileged_bpf|ptrace_scope|bpf_jit'shows expected valuesRelated