4 KiB
4 KiB
Spare-laptop validation checklist
Run after installing a fresh veilor-os ISO. Each item should pass before the build is considered green.
Install flow
- Anaconda only prompts for LUKS passphrase — no account wizard, no initial-setup screen
- Install completes without
%posterrors (check/var/log/veilor-install.log) - Reboot succeeds, USB removed cleanly
First boot
- LUKS prompt appears at boot
- TTY1 shows veilor-os banner + password prompt
- Password rejection on weak input (try
password123— should fail) - Password set succeeds with strong input
- SDDM starts after password set
admin@veilor-osshell prompt visible after first loginveilor-firstboot.serviceshowsinactive (dead)anddisabledafter first run
Identity
passwd -S rootreportsL(locked)getent passwd | wc -lshows base + admin onlyid adminshowsgroups=...,wheel
Branding
hostnamectlreportsveilor-oscat /etc/os-releaseshowsNAME="veilor-os"andID=veilorgrep -ri onyx /etc /usr/local /usr/share/fontsreturns zerogrep -ri '192\.168\.0\.\|admin@gmail\|fedora\.local' /etc /usr/localreturns zero
Theme
- KDE color scheme shows
veilor-blackin System Settings - Konsole renders in DuckSans (
fc-match sans-serifreturnsDuckSansif the font was vendored) - Background is pure black (#000000), not Breeze dark grey
Power
veilor-power statusruns without sudo, shows current profileveilor-power saveswitches toveilor-powersaveveilor-power perfswitches toveilor-performance- Unplugging AC auto-switches to
veilor-powersave(udev rule) - Plugging AC auto-switches to
veilor-performance
Hardening — services
systemctl is-active fail2ban→ activesystemctl is-active usbguard→ activesystemctl is-active auditd→ activesystemctl is-active firewalld→ activesystemctl is-active tuned→ activesystemctl is-active chronyd→ activesystemctl is-active sshd→ activesystemctl is-active cups→ inactive / not-foundsystemctl is-active avahi-daemon→ inactive / not-foundsystemctl is-active bluetooth→ inactivesystemctl is-active veilor-modules-lock(after 30s) → active
Hardening — kernel/sysctl
getenforce→Enforcingmokutil --sb-state→SecureBoot enabledsysctl kernel.yama.ptrace_scope→2sysctl kernel.kptr_restrict→2sysctl fs.suid_dumpable→0sysctl dev.tty.ldisc_autoload→0sysctl kernel.modules_disabled(after 30s post graphical) →1
Hardening — network
firewall-cmd --get-default-zone→dropfirewall-cmd --zone=drop --list-services→sshresolvectl statusshows DNSSEC + DoT, LLMNR offchronyc sources -vshows NTS-authenticated peers
Hardening — SSH
sshd -T | grep -E 'permitrootlogin|passwordauth|allowusers|x11forwarding'shows:permitrootlogin no,passwordauthentication no,allowusers admin,x11forwarding no
Disk
lsblk -fshows LUKS2 on the main partitioncryptsetup luksDump /dev/...shows argon2id, aes-xts-plain64swaponshowszramdevice, no disk swap
SELinux module
semodule -l | grep veilor-systemd→ present- No SELinux denials in
ausearch -m AVC -ts bootrelated tosystemd_modules_load_t
USBGuard
systemctl status usbguard→ activewc -l /etc/usbguard/rules.conf→ 0 (empty allowlist by design)- After
sudo usbguard generate-policy > /etc/usbguard/rules.confand restart, all currently-connected USB devices remain functional
Findings
Log issues and fixes here:
| Date | Item | Issue | Fix in kickstart? |
|---|---|---|---|