Compare commits
3 Commits
813229d505
...
a5219c6754
| Author | SHA256 | Date | |
|---|---|---|---|
|
a5219c6754
|
|||
|
96504a40fb
|
|||
|
661ae7cb7f
|
@@ -66,8 +66,8 @@ add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; prelo
|
|||||||
The CI runners operate on a dedicated host system located in a completely separate Autonomous System (AS). This host is solely
|
The CI runners operate on a dedicated host system located in a completely separate Autonomous System (AS). This host is solely
|
||||||
dedicated to providing CI runners and does not perform any other tasks. Each runner is hermetically isolated from others using
|
dedicated to providing CI runners and does not perform any other tasks. Each runner is hermetically isolated from others using
|
||||||
non-privileged, shell-less user accounts with no direct login capability. Additionally, each runner executes within its own
|
non-privileged, shell-less user accounts with no direct login capability. Additionally, each runner executes within its own
|
||||||
separate directory tree, employs `DynamicUser` features, and adheres to strict systemd hardening policies (achieving a security
|
separate directory tree, employs `DynamicUser` features, and adheres to strict systemd hardening policies (achieving a ``systemd-analyze security``
|
||||||
rating of 2.6). Docker containers used by runners do not run in privileged mode. Security is further enhanced through the use
|
rating of **``2.6``**). Docker containers used by runners do not run in privileged mode. Security is further enhanced through the use
|
||||||
of both UFW software firewalls and dedicated hardware firewall appliances.
|
of both UFW software firewalls and dedicated hardware firewall appliances.
|
||||||
|
|
||||||
## 1.2. Immutable Source-of-Truth System
|
## 1.2. Immutable Source-of-Truth System
|
||||||
|
|||||||
@@ -14,7 +14,7 @@ include_toc: true
|
|||||||
|
|
||||||
## 2.1. Autobuild Information
|
## 2.1. Autobuild Information
|
||||||
|
|
||||||
The latest information about the public CISS.debian.live.ISO is available at `./LIVE_ISO.public`.
|
The latest information about the public **``CISS.debian.live.ISO``** is available at **`/LIVE_ISO.public`**.
|
||||||
|
|
||||||
## 2.2. URL
|
## 2.2. URL
|
||||||
|
|
||||||
@@ -22,14 +22,14 @@ Download the latest Auto-Generated [CISS.debian.live.ISO_PUBLIC](https://cloud.e
|
|||||||
|
|
||||||
## 2.3. Root Passwd
|
## 2.3. Root Passwd
|
||||||
|
|
||||||
Use the following Root Passwd:
|
Use the following ``Root`` Password:
|
||||||
````text
|
````text
|
||||||
Mvnz#zENbf2vsAYEAbfPcnbDcmct7XefPXfRJxSQQH
|
Mvnz#zENbf2vsAYEAbfPcnbDcmct7XefPXfRJxSQQH
|
||||||
````
|
````
|
||||||
|
|
||||||
## 2.4. Root SSH Keys
|
## 2.4. Root SSH Keys
|
||||||
|
|
||||||
Use the following Root SSH Key Material:
|
Use the following ``Root`` SSH Key Material:
|
||||||
|
|
||||||
### 2.4.1. SSH Public Key
|
### 2.4.1. SSH Public Key
|
||||||
````text
|
````text
|
||||||
@@ -73,7 +73,7 @@ Private-MAC: 3c87f88ee5306c56e7b2240d7bddda3ce4369d6d296b9101d8a8c5834fdf5e25
|
|||||||
|
|
||||||
### 2.4.4. SSH Private Key Encryption Key (KEK)
|
### 2.4.4. SSH Private Key Encryption Key (KEK)
|
||||||
````text
|
````text
|
||||||
Mvnz#zENbf2vsAYEAbfPcnbDcmct7XefPXfRJxSQQH
|
^QbHsh#WPdaVwyWbkb5fpejDawhaKP9hx74dnCzD#W
|
||||||
````
|
````
|
||||||
|
|
||||||
# 3. Login
|
# 3. Login
|
||||||
|
|||||||
Reference in New Issue
Block a user