diff --git a/README.md b/README.md index d3d3250..00c11a0 100644 --- a/README.md +++ b/README.md @@ -186,6 +186,8 @@ Coming Soons ```sh echo "$SSH" >> ~/.ssh/authorized_keys ``` +

(back to top)

+ ### SSH Permissions ```sh mkdir -p ~/.ssh @@ -193,22 +195,38 @@ Coming Soons chmod 700 ~/.ssh chmod 600 ~/.ssh/authorized_keys ``` + +

(back to top)

+ ### Disabling password based SSH ```sh cd /etc/ssh sed -i 's/#PasswordAuthentication yes/PasswordAuthentication no/g' sshd_config systemctl restart sshd ``` +

(back to top)

+ ### Allow user to SUDO without password ```sh sudo su - visudo ``` + Press `Insert` on keyboard, substitute `$USER` with the user you created during installation. ```sh $USER ALL=(ALL) NOPASSWD: ALL ``` + + Press `esc` then type + ```sh + :wq + ``` + + This will save and close the terminal. + +

(back to top)

+ ### Working with fapolicyd fapolicyd starts in protection mode. We need to set fapolicyd to permissive mode to allow us to build the necessary rule sets for our individual systems. ```sh @@ -218,6 +236,8 @@ Coming Soons ``` See RHEL: Blocking and Allowing applications with fapolicyd for more information on building rules. +

(back to top)

+ ### Fixing wget As of current GnuTLS is not properly working with FIPS. To correct this we tell GnuTLS to disable health checks. @@ -230,6 +250,7 @@ Coming Soons echo "export GNUTLS_SKIP_FIPS_INTEGRITY_CHECKS=1" > gnutls.sh ``` `wget` will now function as intended. +

(back to top)