{{Header}} {{hide_all_banners}} {{title|title= {{project_name_long}} - A Security Hardened Linux Distribution }} {{#css:/src-copy/_Page_About.css}} {{#seo: |description={{project_name_long}} Overview. Security by Design, Usability by default. A Hardened Fork of Debian. |image=Kicksecure-image-twitter-post.jpg }} {{intro| {{project_name_short}} is a free and open-source Linux distribution that aims to provide a highly secure computing environment. It has been developed from the ground up according to a formidable -- and time proven -- defense in-depth security design. In the default configuration, {{project_name_short}} provides superior layered defenses of protection from many types of [[Malware_and_Firmware_Trojans#Malware|Malware]]. {{project_name_short}} is a complete computer operating system. Numerous applications come pre-installed with safe defaults which can be used immediately upon installation with minimal user input. }}
{{LeftRightImageText |image=Kicksecure-promo.jpg |addToClass=promo-style |imagelink=About#Hardening_by_Default |imageAlt=Kicksecure promo image |text={{project_name_short}} uses an extensively security reconfigured of the Debian base (Hardened) which is run inside multiple virtual machines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input.
}} {{LeftRightImageText |image=Onion-website-promo.jpg |addToClass=promo-style |imageright=1 |imagelink=About#Hardening_by_Default |imageAlt=Torified apt promo image |text=The security and privacy of default software management (installing and upgrading software) are much better, making it harder for anyone to send you targeted, malicious software updates. This only applies to system updates over Tor, not all your internet traffic. [[#Hardening_by_Default|Learn more]]
}} {{LeftRightImageText |image=Selected-software-promo.jpg |addToClass=promo-style |imagelink=About#Hardening_by_Default |imageAlt=Selected software promo image |text=In {{project_name_short}} no unnecessary software is installed by default such as exim, samba, cups etc. At the same time security enhancing software like AppArmor, sdwdate and tirdad are preinstalled. [[#Hardening_by_Default|Learn more]].
}} {{LeftRightImageText |image=Optimized-defaults-promo.jpg |addToClass=promo-style |imageright=1 |imagelink=About#Hardening_by_Default |imageAlt=Optimized defaults promo image |text={{project_name_short}} enhances all kinds of security settings, including: kernel hardening, Strong Linux User Account Isolation, disabling legacy login methods, higher quality randomness (entropy), network hardening, root access restrictions, application-specific hardening and much more. [[#Hardening_by_Default|Learn more]].
}} {{ThumbGallery| [[File:Kicksecure-basic-logo.png|thumb|100px|[[Dev/Logo|{{project_name_short}} logo]]|alt=Kicksecure Logo]] [[File:Debian.png|thumb|100px|alt=Debian logo|Debian logo]] [[File:Linuxkerneltux.png|thumb|100px|alt=Linux logo|Linux logo]] [[File:Osi_standard_logo_0.png|thumb|100px|alt=OSI logo|OSI logo]] [[File:Heckert_gnu.big.png|thumb|100px|alt=GNU logo|GNU logo]] [[File:Kicksecure-seal.png|thumb|100px|alt=Kicksecure seal|Kicksecure seal]] }} __TOC__ = Hardening by Default = {{project_name_short}} is a hardened operating system designed to be resistant to viruses and various attacks. It is based on Debian in accordance with an advanced multi-layer defense model, thereby providing in-depth security. {{project_name_short}} provides protection from many types of malware in its default configuration with no customization required. '''Table:''' ''{{project_name_short}} Hardening Features'' {| class="wikitable" |- ! scope="col"| '''Feature''' ! scope="col"| '''Description''' |- ! scope="row"| Default Package Selection | No unnecessary software is installed by default such as exim, samba, cups that otherwise gets installed by some flavors of Debian. Debian bookworm Xfce live ISO installed exim, samba, cups by default. |- ! scope="row"| {{Anchor|torified_updates}} Secure and privacy-protected operating system (apt
) upgrades
[[File:Tor-logo.png|thumb|100px|alt=Tor logo]]
| [[File:Malware-updates-promo.jpg|thumb|alt=Malware updates promo]]
This helps protect against targeted, malicious software upgrades.
By default, when using APT (Advanced Package Tool) to upgrade the system or install new software, {{project_name_short}} uses torified operating system upgrades. This means all default APT package manager source files are set to only update over the Tor anonymity network. This makes sure that update servers cannot know who the user is or their IP address. As a result, this mitigates targeted malicious software attacks. This protection is not only much stronger than what iPhones or Android devices offer, but it's also better than what most Linux distributions provide.
* Worst: Most iPhone / Android devices connect to official app stores, and these app stores know the user's identity and IP address, creating a large risk for targeted attacks.
* Better: Some Linux distributions like Debian do not link the user's identity to update servers, but they still update over the clearnet (regular internet) using the user's real IP address by default.
* Best: {{Kicksecure}} ensures all system updates are done over the Tor network by default. This way, update servers cannot know the user's identity or IP address.
* https://github.com/Kicksecure/anon-apt-sources-list/blob/master/etc/apt/sources.list.d/debian.list
This only applies to system updates. This does not mean that all of your internet traffic is automatically torified (protected by Tor). See also: [[Privacy|Privacy Goals and Non-Goals of Kicksecure]]
|-
! scope="row"| Secure Package Sources Configuration
| HTTPS (TLS) is enabled by default in APT.
Debian installed using a Debian bookworm Xfce live ISO calamares came with an /etc/apt/sources.list
file using http://
(unencrypted) instead of the more secure https://
(TLS) by default.
|-
! scope="row"| TCP ISN CPU The Linux kernel has a side-channel information leak bug. It is leaked in any outgoing traffic. This can allow side-channel attacks because sensitive information about a system's CPU activity is leaked. It may prove very dangerous for long-running cryptographic operations. Research has demonstrated that it can be used for de-anonymization of location-hidden services.|- ! scope="row"|
security-misc
| [https://github.com/{{project_name_short}}/security-misc security-misc
] enhances miscellaneous security settings related to:
* kernel hardening settings as recommended by the Kernel Self Protection Project (KSPP)
* protecting Linux user accounts against brute force attacks
* enforcing [[Dev/Strong Linux User Account Isolation|Strong Linux User Account Isolation]]
* disabling legacy login methods via [[Dev/Strong_Linux_User_Account_Isolation#Console_Lockdown|Console Lockdown]] for improved security hardening
* higher quality randomness (entropy) generation
Better encryption is achieved via preinstalled random number generators, specifically:
* Loading of the jitterentropy-rng kernel module by default.
* Installation of the user space entropy gathering daemons haveged and jitterentropy-rng by default.
* See also: [[Dev/Entropy]].
* sysctl
* boot parameters
* various blacklisted kernel modules
* network hardening
* restrictive mount options
* root access restrictions
* access rights restrictions
* application-specific hardening
|-
! scope="row"| Secure network time synchronization using sdwdate
| Secure Distributed Web Date ([[sdwdate]]) mitigates threats from [[TimeSync#Attacks|time based attacks]] by not relying upon unauthenticated NTP.
|-
! scope="row"| Default security software /etc/apt/sources.list
file by default.
* Debian default /etc/apt/sources.list
comes with a broken deb cd-rom:
line.
* Debian default /etc/apt/sources.list
comes with http
instead of https
by default.
* Debian default /etc/apt/sources.list
has only the debian-security
repository enabled by default but not the debian
repository. As a result, no packages are installable until the user figures out how to add that line to APT sources.
When using Debian Installer (not Calamares), installing while not using a network mirror, Debian default /etc/apt/sources.list
comes empty except fora broken deb cd-rom:
line.
* sudo
pre-configured by default.
On Debian, the user must run after a new installation su
followed by /usr/bin/adduser user sudo
and reboot (or re-login) to be able to user sudo
.
* bash-completion
installed by default so for example by typing sudo apt install libreo
followed by the TAB key a word completion to libreoffice
will be suggested.
* zsh
installed as default shell that supports TAB word completion, colorful output, etc.
|-
! scope="row"| Simplicity and flexibility
|
* Package [https://github.com/{{project_name_short}}/vm-config-dist shared folder help] simplifies shared folder set up for virtual machines.
It currently only assists with using shared folders in VirtualBox. Other virtualizers -- such as KVM shared folder setup -- might be possible in the future.
* Package [https://github.com/{{project_name_short}}/usability-misc usabilty-misc] is installed by default, increasing flexibility and providing numerous, miscellaneous usability features. Such as creating default folders, allowing commands to be run without a password, simplifying the running of OpenVPN as an unpriveleged user, and much more.
|-
! scope="row"| Popular applications
| Popular applications come [[Software|pre-installed]] and configured with safe defaults to make them ready for use right out of the box.
|-
! scope="row"| Data protection
| Sensitive user data is protected by state-of-the-art cryptographic tools:
* Local user data can be protected by Linux Unified Key Setup ([https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home LUKS]) which uses strong encryption to safeguard personal information. See [[Full Disk Encryption]].
* Communications (email) can be both [https://en.wikipedia.org/wiki/End-to-end_encryption end-to-end encrypted] and [https://en.wikipedia.org/wiki/Digital_signature signed] with [[OpenPGP]].
|-
|}
== Based on Debian ==
{{Based_on_Debian}}
== Based on Freedom Software ==
Many people wonder why developers would spend countless hours of their own time to build an operating system and then give it away. {{project_name_short}} developers believe it is immoral to benefit from those [https://en.wikipedia.org/wiki/Free_software Free] / [[Reasons for Freedom Software|Freedom Software]] components and give back nothing to the community. We stand on the shoulders of giants. {{project_name_short}} and many other Libre software projects are only made possible because people invested time in writing code and kept it accessible for the public's benefit. Of course, a lot of us just find it great fun.
== User Population / Promotion ==
* Apply as many security settings by default without breaking usability too much.
* {{project_name_short}} is already the base for [[Whonix]] - Anonymous Operating System.
https://www.wilderssecurity.com/threads/hardened-debian-in-development-feedback-wanted.408245/
= Releases =
== {{project_name_short}} Version ==
Each {{project_name_short}} release is based on a particular version of Debian:
{| class="wikitable"
|-
! {{project_name_short}} version !! ''Debian Version'' !! ''Debian Codename''
|-
| {{project_name_short}} {{VersionNew}}
|| ''{{Stable_project_version_based_on_Debian_version_short}}
'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ {{Stable project version based on Debian codename}}
]
|}
Users can manually check the {{project_name_short}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].
{{Anchor|Release and Support Schedule}}
== Release Schedule ==
{{project_name_short}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready.
== Support Schedule ==
'''Table:''' ''{{project_name_short}} Support Schedule''
{| class="wikitable"
|-
! scope="col"| '''Release'''
! scope="col"| '''Description'''
|-
! scope="row"| New Debian Release
| ''One month'' after a new stable version of Debian is released, {{project_name_short}} VMs may no longer be supported on any older version of Debian. All users must upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_short}} safely.
|-
! scope="row"| New {{project_name_short}} Release
| ''One month'' after a new stable version of {{project_name_short}} is released, older versions will no longer be supported. All users must upgrade the {{project_name_short}} platform promptly in order to remain safe.
|-
! scope="row"| Deprecation Notices
| The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_clearnet}}
news forum]. [[Stay Tuned]]! All users must upgrade the respective platform promptly in order to remain safe.
|-
|}
= Next Steps =
Learning more about {{project_name_short}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:
* The [[Warning]] page to understand the security limitations of {{project_name_short}}.
* Further information about {{project_name_short}} [[Features]].
* The implied [[Trust]] placed in {{project_name_short}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_short}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_short}} safely.
= Help Wanted =
* {{project_name_short}} will hopefully soon become available as a Template for [https://www.qubes-os.org/ Qubes OS].
= Footnotes =
{{reflist|close=1}}
{{Footer}}
[[Category:Documentation]]