Desktop Linux Security Review – Pop!_OS
This post documents my testing results for the Desktop Linux distro Pop!_OS. I performed the same testing on the following distros:
- [13 points] Elementary OS (results)
- [13 points] Linux Mint (results)
- [12 points] Ubuntu (results)
- [12 points] Manjaro (results)
- [10 points] MX Linux (results)
- [10 points] Garuda Linux (results)
- [9 points] Endeavour OS (results)
The results are based on the methodology described here:
Pop!_OS collected 9 out of 18 possible points – An OK balance between user experience and security.
Distro Name: Pop!_OS (https://pop.system76.com)
Tested Version: 21.10 (AMD64), downloaded on 2022-01-18
ISO MD5: 3b5855209aabce15c5f099f544818b38
Total Score: 9 / 18
Summary of Installer – Security Features:
- [Y] Does the Installer offer to fully encrypt the main disk?
- [Y] Does the installer indicate the strength of chosen passwords?
Pop!_OS’ graphical installer makes it very easy to fully encrypt the disk. The installer also comes with a password strength indicator, which is being used for the disk encryption password and the password of the main user.
Score: 2 / 2
Summary of Firewall:
- [Y] Is a host firewall installed by default?
- [N] Is the host firewall enabled by default?
- [N] Does the host firewall block all incoming/ingress traffic by default?
- [N] Does the host firewall filter outgoing/egress traffic by default?
Pop!_OS installs UFW per default. However, UFW is not enabled by default.
Score: 1 / 4
Summary of Automatic Updates:
- [N] Are updates automatically downloaded during installation?
- [Y] Is the package manager configured to automatically download updates and notify the user about new updates being available?
- [Y] Are the package sources properly authenticated by default?
Pop!_OS does not download updates during installation. The Update Manager is configured to notify the user about available updates by default. Signature checking for packages is enabled by default as well.
Score: 2 / 3
Vulnerability Scanning Results:
-  How many critical vulnerabilities are present right after installation?
-  How many high vulnerabilities are present right after installation?
-  How many critical vulnerabilities are present after a full software update run?
-  How many high vulnerabilities are present after a full software update run?
Nessus scans identified 1 critical and 2 high vulnerabilities right after installation. After a round of updates have been applied, there was still one critical and one high vulnerability present.
Here are the vulnerabilities that need to be remediated:
Score: 0 / 4
Summary of User Privileges:
- [Y] Is sudo required to use root privileges?
- [Y] Does sudo require a password?
Pop!_OS is using sudo for admin task elevation and protects the use of sudo with a password.
Score: 2 / 2
Summary of Default Browser:
- [Y] Is the default browser updated regularly?
- [N] Does the default browser warn about the execution of downloaded files?
Pop!_OS is installing Firefox as the default browser. It is regularly updated. However, it does not warn about the execution of downloaded files.
Score: 1 / 2
Summary of Application Sand-boxing:
Pop!_OS installs AppArmor by default and enables it. It also installs a great set of AppArmor profiles. Profiles for CUPS and LibreOffice are also included. Another good example of application sand-boxing usage to improve overall security.
Score: 1 / 1
Contact via Mastodon: @firstname.lastname@example.org