https://github.com/aguslr/bluerock
A Fedora Silverblue image that has been hardened for extra security
https://github.com/aguslr/bluerock
fedora fedora-silverblue oci ostree security
Last synced: 20 days ago
JSON representation
A Fedora Silverblue image that has been hardened for extra security
- Host: GitHub
- URL: https://github.com/aguslr/bluerock
- Owner: aguslr
- License: apache-2.0
- Created: 2023-07-20T18:17:24.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2025-02-04T12:47:48.000Z (3 months ago)
- Last Synced: 2025-03-24T02:12:09.312Z (about 1 month ago)
- Topics: fedora, fedora-silverblue, oci, ostree, security
- Language: Dockerfile
- Homepage:
- Size: 94.7 KB
- Stars: 4
- Watchers: 4
- Forks: 0
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
[BlueRock][1]
=============[](https://github.com/aguslr/bluerock/actions/workflows/build.yml)
A Fedora Silverblue image that has been hardened for extra security.
Usage
-----1. Rebase to an unsigned image to get proper signing keys:
rpm-ostree rebase -r ostree-unverified-registry:ghcr.io/aguslr/bluerock:stable
2. Rebase to a signed image to finish the installation:
rpm-ostree rebase -r ostree-image-signed:docker://ghcr.io/aguslr/bluerock:stable
Alternatively, an [ISO file for offline installation][5] can be generated with
the following command:sudo podman run --rm --privileged \
--volume .:/build-container-installer/build \
--security-opt label=disable --pull=newer \
ghcr.io/jasonn3/build-container-installer:latest \
IMAGE_REPO="ghcr.io/aguslr" \
IMAGE_NAME="bluerock" \
IMAGE_TAG="latest" \
VARIANT="Silverblue"Features
--------- Start with a custom Fedora Silverblue image.
- Set automatic updates for the system.
- Set automatic updates for Flatpaks.
- Set automatic updates for [Homebrew][6].
- Set automatic updates for [Nix][7].
- Set additional kernel boot parameters.
- Set additional kernel runtime parameters.
- Blacklist rarely used kernel modules.
- Install Chromium.
- Allow only verified Flathub apps.Verification
------------These images are signed with Sisgstore's [Cosign][4]. You can verify the
signature by downloading the `cosign.pub` key from this repo and running the
following command:cosign verify --key cosign.pub ghcr.io/aguslr/bluerock
References
----------- [Linux Hardening Guide | Madaidan's Insecurities][2]
- [Security - ArchWiki][3][1]: https://github.com/aguslr/bluerock
[2]: https://madaidans-insecurities.github.io/guides/linux-hardening.html
[3]: https://wiki.archlinux.org/title/Security
[4]: https://docs.sigstore.dev/cosign/overview/
[5]: https://blue-build.org/learn/universal-blue/#fresh-install-from-an-iso
[6]: https://brew.sh/
[7]: https://nixos.org/