- 
        
            
                
Overview
 - 
        
            
                
redpesk OS releases
 - 
        
            
                
Security updates
 - 
        
            
                
Application Framework Manager
 - 
        
            
                
Application Framework Binder
 - 
        
            
                
APIs & Services
 - 
        
            
                
Security manager
 - 
        
            
                
OP-TEE within redpesk
 - 
        
            
                
Trusted Boot
 - 
        
            
                
Recovery features
 - 
        
            
                
redpak
 - 
        
            
                
Minimal image
- Reduce image size
 - Optimizing boot time
 - 
        
            
                Kernel fragments description
            
        
        
        
        
        
        
- Introduction to Linux Kernel Configuration
 - 01 Disable IPC, Timers and Audit
 - 02 Disable Kconfig, Scheduler and Initrd
 - 03 Disable Perf, Profiling and Errata
 - 04 Disable EFI, Power Management Debug and Energy Model
 - 05 Disable Schedutil, CPUFreq Governors and Virtualization
 - 06 Disable Kprobes and Jump Labels
 - 07 Disable GCC Plugins and Function Alignment
 - 08 Disable Partition Parsers
 - 09 Enable Inline Spinlocks and Kernel Operations
 - 10 Disable Swap, Memory Hotplug and KSM
 - 11 Disable Networking IPv4, IPv6, Netfilter
 - 12 Disable SCTP, VLAN, TIPC, BATMAN
 - 13 Disable Wireless, Bluetooth, CAN and RFKILL
 - 14 Disable PCI and Firmware
 - 15 Disable GNSS and ProcEvents
 - 16 Disable Block Storage NBD and AoE
 - 17 Disable EEPROM and Misc Drivers
 - 18 Disable Network Device Drivers
 - 19 Disable PHY Drivers
 - 20 Disable PPP, WLAN Coexistence, and Failover
 - 21 Disable Input Devices
 - 22 Disable Serial, TTY and TPM
 - 23 Disable I2C, Power and Sensor Drivers
 - 24 Disable MFD, Display and Media Drivers
 - 25 Disable USB, Sound, RTC and VirtIO
 - 26 Disable Filesystem Encodings and Compatibility
 - 27 Enable Minimal Cryptographic Core with SHA3 and XTS
 - 28 Disable Hardware Cryptography, Keep DRBG and Jitter Entropy
 - 29 Disable Kernel Debugging Features
 - 30 Disable Filesystem Verity and SecurityFS
 
 
 - 
        
            
                
Zephyr in Redpesk
 - 
        
            
                
Mender redpesk (OTA)
 - 
        
            
                
Hardware support
- Download images
 - Image metrics
 - Trusted Boot
 - Boards - ARM64
 - Boards - x86_64
 - Boards - Virtual
 - Miscs
 
 
SELinux
Basics
Policy module
A policy module will define your application rules. It is easy to install and uninstall.
It contains three files :
- type enforcement (.te): contains the rules to confine your application.
 - file context (.fc): defines which label to give to each file.
 - interfaces (.if): contains interfaces to say how applications interact with the modules
 
Compile
To compile a SELinux module, we place our different files in a folder. The output is a policy package (.pp) file.
Package requirement: selinux-policy-dev for Debian, selinux-policy-devel for RHEL
make -f /usr/share/selinux/devel/Makefile -C /usr/share/sec-lsm-manager/selinux-rules demo-app.pp
Install / Uninstall
To install the newly created SELinux module, use the following command :
semodule -i demo-app.pp
And to remove it :
semodule -r demo-app.pp
Sources
- Vermeulen, S. (2015). Selinux Cookbook. Packt Publishing.
 - https://mgrepl.fedorapeople.org/PolicyCourse/writingSELinuxpolicy_MUNI.pdf
 - https://debian-handbook.info/browse/fr-FR/stable/sect.selinux.html