

How I have it set up here, since I don't really need security, is starting X and running a user .xsession directly from init. For a multi-user system you can't really do that though.jagdpanther wrote:However, on my home system I am not the only user, so the display manager is handy.

Code: Select all
exec ssh-agent openbox-session Code: Select all
exec dbus-launch --exit-with-session openbox-session



SLiM still works, with elogind, if you fork the ebuild into your /usr/local/portage. I had done so a few years back because of a patch I'd put in to fix a bug with handling of expired accounts.A.S. Pushkin wrote:Thanks for the heads up on slim. I've been rather satisfied with it so I'll be sorry to see it go.
Code: Select all
play /scratch/wav/startup.wav &> /dev/null &
startxCode: Select all
setxkbmap -option terminate:ctrl_alt_bksp
xhost +local:root > /dev/null
/usr/bin/numlockx on
dbus-launch --sh-syntax --exit-with-session startlxdeCode: Select all
~ $ zgrep YAMA /proc/config.gz
That's the kernel option that makes our sandbox print funny error messages like the one below:??? YAMA?
Code: Select all
* /var/tmp/portage/sys-apps/sandbox-2.13/work/sandbox-2.13/libsandbox/trace.c:_do_ptrace():75: failure (Operation not permitted):
* ISE:_do_ptrace: ptrace(PTRACE_TRACEME, ..., 0x0000000000000000, 0x0000000000000000): Operation not permittedDo you have "kernel.yama.ptrace_scope = 3" (with hardened sources) or do you have "...=2" ?mike155 wrote:That's the kernel option that makes our sandbox print funny error messages like the one below:??? YAMA?Code: Select all
* /var/tmp/portage/sys-apps/sandbox-2.13/work/sandbox-2.13/libsandbox/trace.c:_do_ptrace():75: failure (Operation not permitted): * ISE:_do_ptrace: ptrace(PTRACE_TRACEME, ..., 0x0000000000000000, 0x0000000000000000): Operation not permitted
Code: Select all
$ grep -i yama /usr/src/linux/.config
CONFIG_SECURITY_YAMA=y
CONFIG_LSM="lockdown,yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor"YAMA is a Linux Security Module. See security/yama/Kconfig for a brief and unhelpful description, or follow the instructions there to the fuller documentation at Documentation/admin-guide/LSM/Yama.rst. (Choice of v5.14 kernel sources is arbitrary, and based on it being the most recent non-rc as of this writing.)Tony0945 wrote:??? YAMA?Code: Select all
~ $ zgrep YAMA /proc/config.gz
That is a sysctl setting. You would most commonly access it via /proc/sys/kernel/yama/ptrace_scope, though I think sysctl could be used as well. The notation you quoted is popularly used because that is how you would write it in /etc/sysctl.conf if you wanted to have your system boot scripts set it to a particular value.figueroa wrote:YAMA=But, I'm lost at "kernel.yama.ptrace_scope =" which is from where?Code: Select all
$ grep -i yama /usr/src/linux/.config CONFIG_SECURITY_YAMA=y CONFIG_LSM="lockdown,yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor"