Security Hardening
Cassini distribution images can be hardened to reduce potential sources or attack vectors of security vulnerabilities. Cassini security hardening modifies the distribution to:
Force password update for each user account after first logging in. An empty and expired password is set for each user account by default.
Enhance the kernel security, kernel configuration is extended with the
security.sccinKERNEL_FEATURES.
Enable the ‘Secure Computing Mode’ (seccomp) Linux kernel feature by appending
seccomptoDISTRO_FEATURES.
Ensure that all available packages from
meta-openembeddedandpokylayers are configured with:--with-libcap[-ng].
Remove
empty-root-password allow-root-login post-install-loggingfromIMAGE_FEATURES
Enable
allow-empty-passwordto allow empty password on Cassini image boot.
Disable all login access to the
rootaccount.Note
When
cassini-testdistro feature is enabled thenrootlogin is enabled. Currently, runninginline testsin LAVA require login asrootto run transfer-overlay commands.
Sets the umask to
0027(which translates permissions as640for files and750for directories).
Security hardening is enabled by default, see Security Hardening for details.
Note
Cassini security hardening does not reduce the scope of the Run-Time Integration Tests.