172dc1336f
This module implements a significant refactoring in grsecurity configuration for NixOS, making it far more usable by default and much easier to configure. - New security.grsecurity NixOS attributes. - All grsec kernels supported - Allows default 'auto' grsec configuration, or custom config - Supports custom kernel options through kernelExtraConfig - Defaults to high-security - user must choose kernel, server/desktop mode, and any virtualisation software. That's all. - kptr_restrict is fixed under grsecurity (it's unwriteable) - grsecurity patch creation is now significantly abstracted - only need revision, version, and SHA1 - kernel version requirements are asserted for sanity - built kernels can have the uname specify the exact grsec version for development or bug reports. Off by default (requires `security.grsecurity.config.verboseVersion = true;`) - grsecurity sysctl support - By default, disabled. - For people who enable it, NixOS deploys a 'grsec-lock' systemd service which runs at startup. You are expected to configure sysctl through NixOS like you regularly would, which will occur before the service is started. As a result, changing sysctl settings requires a reboot. - New default group: 'grsecurity' - Root is a member by default - GRKERNSEC_PROC_GID is implicitly set to the 'grsecurity' GID, making it possible to easily add users to this group for /proc access - AppArmor is now automatically enabled where it wasn't before, despite implying features.apparmor = true The most trivial example of enabling grsecurity in your kernel is by specifying: security.grsecurity.enable = true; security.grsecurity.testing = true; # testing 3.13 kernel security.grsecurity.config.system = "desktop"; # or "server" This specifies absolutely no virtualisation support. In general, you probably at least want KVM host support, which is a little more work. So: security.grsecurity.enable = true; security.grsecurity.stable = true; # enable stable 3.2 kernel security.grsecurity.config = { system = "server"; priority = "security"; virtualisationConfig = "host"; virtualisationSoftware = "kvm"; hardwareVirtualisation = true; } This module has primarily been tested on Hetzner EX40 & VQ7 servers using NixOps. Signed-off-by: Austin Seipp <aseipp@pobox.com>
113 lines
2.9 KiB
Nix
113 lines
2.9 KiB
Nix
{ stdenv, fetchurl, fetchgit, apparmor }:
|
|
|
|
let
|
|
|
|
makeTuxonicePatch = { version, kernelVersion, sha256,
|
|
url ? "http://tuxonice.nigelcunningham.com.au/downloads/all/tuxonice-for-linux-${kernelVersion}-${version}.patch.bz2" }:
|
|
{ name = "tuxonice-${kernelVersion}";
|
|
patch = stdenv.mkDerivation {
|
|
name = "tuxonice-${version}-for-${kernelVersion}.patch";
|
|
src = fetchurl {
|
|
inherit url sha256;
|
|
};
|
|
phases = [ "installPhase" ];
|
|
installPhase = ''
|
|
source $stdenv/setup
|
|
bunzip2 -c $src > $out
|
|
'';
|
|
};
|
|
};
|
|
|
|
grsecPatch = { grversion ? "3.0", kversion, revision, branch, sha256 }:
|
|
{ name = "grsecurity-${grversion}-${kversion}";
|
|
inherit grversion kversion revision;
|
|
patch = fetchurl {
|
|
url = "http://grsecurity.net/${branch}/grsecurity-${grversion}-${kversion}-${revision}.patch";
|
|
inherit sha256;
|
|
};
|
|
features.grsecurity = true;
|
|
# The grsec kernel patchset includes AppArmor patches
|
|
features.apparmor = true;
|
|
};
|
|
|
|
makeAppArmorPatch = {apparmor, version}:
|
|
stdenv.mkDerivation {
|
|
name = "apparmor-${version}.patch";
|
|
phases = ["installPhase"];
|
|
installPhase = ''
|
|
cat ${apparmor}/kernel-patches/${version}/* > $out
|
|
'';
|
|
};
|
|
|
|
in
|
|
|
|
rec {
|
|
|
|
apparmor_3_2 = rec {
|
|
version = "3.2";
|
|
name = "apparmor-${version}";
|
|
patch = makeAppArmorPatch { inherit apparmor version; };
|
|
features.apparmor = true;
|
|
};
|
|
|
|
apparmor_3_4 = rec {
|
|
version = "3.4";
|
|
name = "apparmor-${version}";
|
|
patch = makeAppArmorPatch { inherit apparmor version; };
|
|
features.apparmor = true;
|
|
};
|
|
|
|
no_xsave =
|
|
{ name = "no-xsave";
|
|
patch = ./no-xsave.patch;
|
|
features.noXsave = true;
|
|
};
|
|
|
|
mips_fpureg_emu =
|
|
{ name = "mips-fpureg-emulation";
|
|
patch = ./mips-fpureg-emulation.patch;
|
|
};
|
|
|
|
mips_fpu_sigill =
|
|
{ name = "mips-fpu-sigill";
|
|
patch = ./mips-fpu-sigill.patch;
|
|
};
|
|
|
|
mips_ext3_n32 =
|
|
{ name = "mips-ext3-n32";
|
|
patch = ./mips-ext3-n32.patch;
|
|
};
|
|
|
|
tuxonice_3_10 = makeTuxonicePatch {
|
|
version = "2013-11-07";
|
|
kernelVersion = "3.10.18";
|
|
sha256 = "00b1rqgd4yr206dxp4mcymr56ymbjcjfa4m82pxw73khj032qw3j";
|
|
};
|
|
|
|
grsecurity_stable = grsecPatch
|
|
{ kversion = "3.2.57";
|
|
revision = "201404111812";
|
|
branch = "stable";
|
|
sha256 = "1kp2f5g5jdl6r833fm5l2sgf7qsjddl2br7mislc37iqgwzjmhlx";
|
|
};
|
|
|
|
grsecurity_vserver = grsecPatch
|
|
{ kversion = "3.2.57";
|
|
revision = "vs2.3.2.16-201404111814";
|
|
branch = "vserver";
|
|
sha256 = "025kxk4j8kx7v5gmpafls67747l39ssfmzh0drg0hyg2yc0hjk2c";
|
|
};
|
|
|
|
grsecurity_unstable = grsecPatch
|
|
{ kversion = "3.13.9";
|
|
revision = "201404111815";
|
|
branch = "test";
|
|
sha256 = "1ikqvi0hv32m5rgxa8dpqr5v84hx7bnjfr6c1bvsfqikc818isvy";
|
|
};
|
|
|
|
grsec_fix_path =
|
|
{ name = "grsec-fix-path";
|
|
patch = ./grsec-path.patch;
|
|
};
|
|
}
|