Documentation

Slarpx Overview

Hardened Slarpx is an advanced, security-oriented Debian derivative engineered to withstand highly hostile network environments and persistent local threats. It abandons convenience in favor of absolute system integrity. Slarpx operates under the assumption that the system is constantly under attack, deploying stringent defense-in-depth methodologies across the kernel, network stack, package management, and runtime environments.

Critical Audience Warning & Legal Disclaimer

TARGET AUDIENCE: This distribution is strictly designed for security researchers, extreme threat-model environments, and isolated analytical workstations. It is fundamentally incompatible with daily consumer workloads, standard gaming, or casual browsing.

LIABILITY DISCLAIMER: Slarpx modifies low-level hardware interactions, flushes volatile memory forcefully, and actively self-sabotages user-space processes if it suspects intrusion. By deploying this system, the user waives Nixovena Labs of any liability regarding hardware degradation, catastrophic data loss, or network isolation failures.

Use exclusively at your own risk. Support is not guaranteed for packages outside the minimal core.

Post-Installation: Secure Boot Initialization

Following the graphical installation, it is absolutely critical that the system administrator manually configures and enables UEFI Secure Boot. The Slarpx kernel lock-down mechanisms (integrity/confidentiality modes) rely heavily on the hardware trust anchors provided by Secure Boot.

For comprehensive instructions on establishing Secure Boot keys and enrolling signatures, strictly adhere to the official Debian SecureBoot documentation.

Installation Process

Slarpx installation utilizes a variant of the Debian graphical installer environment.

Kernel Hardening Analysis

This section provides a comprehensive technical analysis of the Kernel-level security and networking hardening measures applied in the HardenedSlarpx distribution. The configurations reviewed orchestrate one of the most aggressive security baselines available for Linux, closely following the Kernel Self Protection Project (KSPP) guidelines. The settings span GRUB boot parameters and kernel sysctl configurations.

1. Microarchitectural Mitigation (CPU Vulnerabilities)

File: /etc/default/grub.d/40_cpu_mitigations.cfg

HardenedSlarpx adopts a "security over performance" philosophy. It forces all available hardware and software mitigations for side-channel physical vulnerabilities:

2. Kernel Memory and Process Protections

Files: /etc/default/grub.d/40_kernel_hardening.cfg, /etc/sysctl.d/sysctl.conf

Exploit mitigation is drastically heightened by destroying predictability and restricting process interactions within kernel space:

3. Direct Memory Access (DMA) Defense

File: /etc/default/grub.d/40_kernel_hardening.cfg

To neutralize external hardware exploits (e.g. plugging a malicious Thunderbolt/PCIe device to suck keys directly out of RAM):

4. Drastic System Integrity & Panic Policies

Files: /etc/default/grub.d/40_kernel_hardening.cfg, /etc/default/grub.d/41_recovery_restrict.cfg, /etc/sysctl.d/sysctl.conf

Once compromised, it is better for the machine to stop than to serve the attacker:

5. Network Stack Hardening (TCP/IP)

File: /etc/sysctl.d/sysctl.conf

An exhaustive networking clampdown designed to deter Man-in-the-Middle (MitM), Spoofing, and Denial of Service (DoS) attacks:

Network Hardening Analysis

The network hardening architecture in HardenedSlarpx utilizes a dual approach: a highly restrictive ingress/egress firewall (nftables) and an immutable, enforced DNS management system. This strategy is designed to protect against internal data exfiltration, thwart local network attacks, and deter broad-spectrum Internet reconnaissance.

1. Nftables Firewall (Ingress & Egress Filtering)

File: /etc/nftables.conf

Unlike typical desktop firewalls that only block incoming traffic, HardenedSlarpx dictates a strict "Default Drop" policy on both incoming (input) and outgoing (output) chains. This serves as a significant hurdle for malware looking to communicate outside the local machine.

Key Ingress (Incoming) Protections:

Key Egress (Outgoing) Protections:

2. DNS Guard (Immutable Static DNS Enforcement)

File: /etc/systemd/system/slarpx-dns.service

Purpose: It is a common vulnerability on modern operating systems that DHCP assignments, local routers, or Network Management daemons will automatically overwrite /etc/resolv.conf, effectively intercepting the user's DNS queries. HardenedSlarpx resolves this via a dedicated systemd service.

Security Engines Detailed Analysis

The HardenedSlarpx distribution utilizes three powerful, custom backend security engines (daemons) designed to protect the operating system's security and integrity. These engines ensure the system is protected against various threat vectors: Poison (Timing Disruption), Silencer (Information Leak Prevention), and Xennytsu (Advanced Behavioral Analysis & EDR).

1. POISON (Timing Disruption Engine)

Purpose: Instead of completely blocking malicious or suspicious process attempts, this engine actively disrupts them by dynamically slowing them down. This approach is generally used to sabotage buffer-overflow or race conditions that exploits rely on.

2. SILENCER (Kernel Info Leak Prevention Engine)

Purpose: Limits privilege escalation vulnerabilities in the system environment and prevents reconnaissance operations where an attacker or malicious application tries to gather information about the system.

3. XENNYTSU (Behavioral Execution Guard)

Purpose: Acts as an ultra-low-footprint, modern EDR mechanism. By analyzing the operating system, process trees, and memory in real-time, it instantly detects malicious activities and ruthlessly kills the process with a hardware SIGKILL.

System Hardening Analysis

The HardenedSlarpx distribution implements a robust, multi-layered "Defense in Depth" strategy by hardening various aspects of the operating system configuration. The hardening configurations are deeply embedded within the system's package management, hardware modules, user environments, physical access vectors, and boot/shutdown processes.

1. Package Management Security (APT Hardening)

2. Hardware and Kernel Module Restrictions

3. Bluetooth Security

4. Shell and User Environment Hardening

5. Execution Privileges (Sudo Security)

6. Systemd Hardening and Anti-Cold Boot Measures