If you wanna use sysctl option deny_new_usb, you have to allow GRKERNSEC_SYSCTL; otherwise it is not in /proc/sys/kernel/grsecurity. But that is a problem, since you have to lock the change at boot due to the security reason. But the lock also forbids to change deny_new_usb and therefore it is unusable. I use deny_new_usb against various security issues with USB drivers (direct memory in IEEE 1394 etc.) and allow it only temporarily for mounting USB disks. It worked at least in v3.18.9. Reproducible: Always Steps to Reproduce: 1. Configure with GRKERNSEC_DENYUSB=y & GRKERNSEC_SYSCTL=n. 2. Reboot with the new kernel. Actual Results: Option deny_new_usb is not available. Expected Results: Option deny_new_usb should be available without GRKERNSEC_SYSCTL.
The package is masked, I don't know how much sense can have a bugreport on it..
I know, but I am sure I am not the only one who use it. Grsecurity is one of the best protection against programmers' mistakes and it is not available in gentoo-sources.
Yes,but how many security fixes landed in the latter releases since 4.8.x? GregKh would say - use a recent lts - they try hard to bring you the best they can. Hardened sources were good,but it's time to switch to mainline imho..
I am not quite convinced that quantity also means quality. Imho, hardened-sources with all grsecurity hardening features on (even with v4.8) is much more secure than the most recent kernels. But I think it is a personal choice and that is what Gentoo is about.
Of course, it's your choice :) What about spectre/meltdown on hardened?
I am not an expert as for spectre/meltdown, but if I understand it clearly, the attacker has to get into the system first. If you run single-user client machine and don't run any scripts/executables not on your computer than he must abuse another bug to run an executable and that's what grsecurity fends against. The key of grsecurity is about protecting against yet unknown bugs (of course it is not 100% safe, but at least it tries) and there can be other flaws in CPUs which are unknown yet and therefore not taken care of in recent kernels.
Outdated and masked.