2020 <title >Post-deployment considerations</title >
2121 <abstract >
2222 <para >
23- This article includes important information and tasks that you need to
24- consider after you successfully deploy &productname; .
23+ This article includes important information and tasks that you need to consider after you
24+ successfully deploy &productname; .
2525 </para >
2626 </abstract >
2727 </info >
3030 <section xml : id =" alp-post-deploy-full-disk-encryption-password" >
3131 <title >Change encryption password</title >
3232 <para >
33- During the &productnameshort; deployment, you entered a password that
34- is used for disk encryption. To change the password, run the following
35- command:
33+ During the &productnameshort; deployment, you entered a password that is used for disk
34+ encryption. To change the password, run the following command:
3635 </para >
3736<screen >&prompt.root; fdectl passwd</screen >
3837 </section >
4241 Without a TPM chip, you need to enter the encryption password to decrypt the disk on each
4342 &productnameshort; boot.
4443 </para >
45- <para condition =" alp-deployment-agama-interactive;alp-deployment-agama-automated" >On
46- systems that have a TPM 2.0 chip, &productnameshort; deployed with the &alp-installer;
44+ <para condition =" alp-deployment-agama-interactive;alp-deployment-agama-automated" >
45+ On systems that have a TPM 2.0 chip, &productnameshort; deployed with the &alp-installer;
4746 installer supports the automatic protection of the LUKS volume with a TPM device. The
4847 requirement is that the machine must use the &uefisecboot; enabled. If the &alp-installer;
4948 installer detects a TPM 2.0 chip and &uefisecboot; , it creates a secondary LUKS key. On the
6261 <section xml : id =" alp-post-deploy-selinux" >
6362 <title >&selnx; </title >
6463 <para >
65- Security-Enhanced Linux (&selnx; ) is a security framework that increases
66- system security by defining access controls for applications, processes
67- and files on the file system.
64+ Security-Enhanced Linux (&selnx; ) is a security framework that increases system security by
65+ defining access controls for applications, processes and files on the file system.
6866 </para >
6967 <para >
7068 &productnameshort; ships with &selnx; enabled and set to the restrictive
71- <emphasis >enforce</emphasis > mode for increased security. The enforce
72- mode can lead to processes or workloads not behaving correctly because
73- the default policy may be too strict. If you observe such unexpected
74- issues, set &selnx; to the <emphasis >permissive</emphasis > mode that does
75- not enforce &selnx; policies but still logs offenses against them called
69+ <emphasis >enforce</emphasis > mode for increased security. The enforce mode can lead to
70+ processes or workloads not behaving correctly because the default policy may be too strict.
71+ If you observe such unexpected issues, set &selnx; to the <emphasis >permissive</emphasis >
72+ mode that does not enforce &selnx; policies but still logs offenses against them called
7673 <emphasis >Access Vector Rules</emphasis > (AVCs).
7774 </para >
7875 <para >
8279 <tip >
8380 <para >
8481 To set &selnx; to the permissive mode permanently, edit
85- <filename >/etc/selinux/config</filename > and update it to include the
86- following line:
82+ <filename >/etc/selinux/config</filename > and update it to include the following line:
8783 </para >
8884<screen >SELINUX=permissive</screen >
8985 </tip >
9086 <important >
9187 <para >
92- If you entered an &selnx; permissive mode, you need to relabel your
93- system until it is back in a good state. The reason is that the
94- permissive mode allows you to reach states that are not reachable
95- otherwise. To relabel the system, run the following command and reboot
96- the system:
88+ If you entered an &selnx; permissive mode, you need to relabel your system until it is back
89+ in a good state. The reason is that the permissive mode allows you to reach states that are
90+ not reachable otherwise. To relabel the system, run the following command and reboot the
91+ system:
9792 </para >
9893<screen >
9994&prompt.root; touch /etc/selinux/.autorelabel
10095&prompt.root; reboot
10196</screen >
10297 </important >
10398 <para >
104- To monitor AVCs, search the Audit log and &systemd; journal for log
105- messages similar to the following one:
99+ To monitor AVCs, search the Audit log and &systemd; journal for log messages similar to the
100+ following one:
106101 </para >
107102<screen >
108103type=AVC msg=audit(1669971354.731:25): avc: denied { create } \
@@ -122,28 +117,27 @@ tcontext=system_u:system_r:modemmanager_t:s0 tclass=qipcrtr_socket permissive=0
122117 </para >
123118<screen >&prompt.root; ausearch -m avc,user_avc,selinux_err -i</screen >
124119 <para >
125- If such messages appear while using the application that did not behave
126- correctly when &selnx; was set to the enforce mode, the policies are too
127- restrictive and need updating. You can help to fine-tune &selnx; policies
128- by creating a bug report at
120+ If such messages appear while using the application that did not behave correctly when
121+ &selnx; was set to the enforce mode, the policies are too restrictive and need updating. You
122+ can help to fine-tune &selnx; policies by creating a bug report at
129123 <link xlink : href =" https://bugzilla.suse.com/enter_bug.cgi?classification=SUSE%20ALP%20-%20SUSE%20Adaptable%20Linux%20Platform" />.
130124 Specify <literal >Basesystem</literal > as a component, include the word
131- <literal >&selnx; </literal > in the bug subject, and attach the gathered
132- unique lines that include AVCs together with reproduction steps.
125+ <literal >&selnx; </literal > in the bug subject, and attach the gathered unique lines that
126+ include AVCs together with reproduction steps.
133127 </para >
134128 </section >
135129 <section xml : id =" alp-post-deploy-enable-root-ssh-login" >
136- <title >Enabling &rootuser; SSH login</title >
130+ <title >Enabling password-based &rootuser; SSH login</title >
137131 <para >
138- &rootuser; login via SSH is not permitted in &productnameshort; by
139- default for security reasons . To enable it, you have the following
132+ By default, &rootuser; SSH login in &productnameshort; is permitted only by using the SSH
133+ key. &rootuser; SSH login with password is prohibited . To enable it, you have the following
140134 options:
141135 </para >
142136 <itemizedlist >
143137 <listitem >
144138 <para >
145- install the <package >openssh-server-config-rootlogin</package >
146- package and reboot the system.
139+ install the <package >openssh-server-config-rootlogin</package > package and reboot the
140+ system.
147141 </para >
148142<screen >
149143&prompt.root; <command >transactional-update pkg in openssh-server-config-rootlogin</command >
@@ -152,9 +146,8 @@ tcontext=system_u:system_r:modemmanager_t:s0 tclass=qipcrtr_socket permissive=0
152146 </listitem >
153147 <listitem >
154148 <para >
155- Add a file containing the snippet <literal >PermitRootLogin
156- yes</literal > in the <filename >/etc/sshd/sshd_config.d/</filename >
157- directory and reboot, for example:
149+ Add a file containing the snippet <literal >PermitRootLogin yes</literal > in the
150+ <filename >/etc/sshd/sshd_config.d/</filename > directory and reboot, for example:
158151 </para >
159152<screen >
160153&prompt.root; echo 'PermitRootLogin yes' >> /etc/sshd/sshd_config.d/root_login_config
0 commit comments