Attention

This documentation is deprecated and only applicable to the EWAOL 1.x series.
For more information about EWAOL 2.0.0, see https://gitlab.com/soafee/ewaol/meta-ewaol

Security Hardening

EWAOL distribution images can be hardened to reduce potential sources or attack vectors of security vulnerabilities. EWAOL security hardening modifies the distribution to:

  • Force password update for each user account after first logging in. An empty and expired password is set for each user account by default.

  • Enhance the kernel security, kernel configuration is extended with the security.scc in KERNEL_FEATURES.

  • Enable the ‘Secure Computing Mode’ (seccomp) Linux kernel feature by appending seccomp to DISTRO_FEATURES.

  • Ensure that all available packages from meta-openembedded, meta-virtualization and poky layers are configured with: --with-libcap[-ng].

  • Remove debug-tweaks from IMAGE_FEATURES.

  • Disable all login access to the root account.

  • Sets the umask to 0027 (which translates permissions as 640 for files and 750 for directories).

Security hardening is not enabled by default, see Security Hardening for details on including the security hardening on the EWAOL distribution image.

EWAOL security hardening does not reduce the scope of the Run-Time Integration Tests.