Applies To
Halcyon Linux Agent running on:
- Ubuntu 22.04, 24.04
- Debian 11
- Oracle Linux (latest supported versions)
Overview
Tamper Protection relies on the Linux Security Module (LSM) framework. For it to function correctly, the bpf LSM must be explicitly enabled in the kernel boot parameters. This ensures that Tamper Guard can hook into the kernel's security infrastructure and protect Halcyon Linux from unauthorized stop or uninstall.
Action
Enable the bpf LSM in the kernel boot parameters:
Debian and Ubuntu
- Edit
grubconfiguration:
sudo nano /etc/default/grub
- Modify Kernel Parameters by locating the line starting with
GRUB_CMDLINE_LINUXand appending the following:
lsm=$(cat /sys/kernel/security/lsm),bpf
Example:
GRUB_CMDLINE_LINUX="quiet splash lsm=$(cat /sys/kernel/security/lsm),bpf"
NOTE: Some Ubuntu distributions append a semicolon to theGRUB_CMDLINE_LINUXline. Remove this semicolon.
- Update
grub:
sudo grub-mkconfig | sudo tee /boot/grub/grub.cfg
- Reboot the system to apply changes.
Oracle Linux
- Update Kernel Arguments using
grubto append the required LSM parameters:
sudo grubby --update-kernel ALL --args "lsm=$(cat /sys/kernel/security/lsm),bpf,integrity"
- Reboot the system to apply changes.
- After rebooting, confirm
bpfLSM is active:
cat /sys/kernel/security/lsm
Comments
0 comments
Please sign in to leave a comment.