!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

699 Members
Coordination and triage of security issues in nixpkgs216 Servers

Load older messages


SenderMessageTime
22 Jul 2021
@andi:kack.itandi-On an enterprise scale you might what to look into the CIS benchmarks (there is a discourse thread on that). You'll probably not be very happy as they talk about many things that simply do not apply for NixOS.15:57:50
@andi:kack.itandi-https://discourse.nixos.org/t/nixos-in-cis-benchmark-level-1/218915:58:13
@janne.hess:helsinki-systems.dedas_jCurrently reading that document and it does have some weird stuff in it16:05:13
@janne.hess:helsinki-systems.dedas_jLike adding to the score when you have cron enabled (??)16:05:40
@ryantm:matrix.orgryantmThis could be another crude benchmark: https://repology.org/repositories/statistics/pvulnerable16:05:42
@linus.heckemann:matrix.mayflower.deLinux HackermanThere's also lynis, which is also in nixpkgs (but not that well adapted to NixOS)16:06:18
@ryantm:matrix.orgryantm Cool lynis runs systemd-analyze security as one of its tests. 16:11:52
@noch3:matrix.orgElliotYeah lynis looks really cool16:12:02
@j-k:matrix.orgj-k
In reply to @noch3:matrix.org
ryantm: Sandro Yes I only wish/hope there is a thorough audit/analysis of NixOS. It has many theoretical advantages but have they been demonstrated evidentially somehow?

There's currently some interest in using nix for high security environments from orgs such as the CNCF https://discourse.nixos.org/t/generating-software-bill-of-materials-from-derivation/14089

building containers with nix without a container daemon is very desirable
building all that rootless would be even better, currently pretty doable through nix-portable

a full tree of dependencies is super nice (see the SBOM discourse post above)

nix + trustix is a super interesting project for zero/low trust software supply chains and "software factories", promising for governments, financial orgs, people on the cutting edge of "DevSecOps")

https://software.af.mil/software-factories/
https://www.lockheedmartin.com/en-us/capabilities/space/software-factory.html
https://www.cncf.io/announcements/2021/05/14/cncf-paper-defines-best-practices-for-supply-chain-security/
https://www.youtube.com/watch?v=bC4IbGKV9CY (one of the video calls during writing the CNCF doc, Michael Lieberman from the discourse post I linked was on the call too)

16:45:03
@mlieberman85:matrix.orgMichael Lieberman joined the room.16:50:34
@j-k:matrix.orgj-ko/16:51:21
@mlieberman85:matrix.orgMichael Lieberman
In reply to @j-k:matrix.org

There's currently some interest in using nix for high security environments from orgs such as the CNCF https://discourse.nixos.org/t/generating-software-bill-of-materials-from-derivation/14089

building containers with nix without a container daemon is very desirable
building all that rootless would be even better, currently pretty doable through nix-portable

a full tree of dependencies is super nice (see the SBOM discourse post above)

nix + trustix is a super interesting project for zero/low trust software supply chains and "software factories", promising for governments, financial orgs, people on the cutting edge of "DevSecOps")

https://software.af.mil/software-factories/
https://www.lockheedmartin.com/en-us/capabilities/space/software-factory.html
https://www.cncf.io/announcements/2021/05/14/cncf-paper-defines-best-practices-for-supply-chain-security/
https://www.youtube.com/watch?v=bC4IbGKV9CY (one of the video calls during writing the CNCF doc, Michael Lieberman from the discourse post I linked was on the call too)

Just wanted to throw it out there, I'm the chief architect of that CNCF secure supply chain project. Recently spoke to grahamc (he/him) about some of this as well. Definitely looking to involve the Nix community in some of this as I think Nix is doing a lot of awesome work in this space. Definitely interested in figuring out how we can collaborate in this space.
16:54:16
@mlieberman85:matrix.orgMichael LiebermanPersonally I'm looking at building a tool that can generate SPDX and/or CycloneDX formatted SBOMs based on Nix derivations. I have some thoughts on it but would definitely be interested in bouncing my ideas off of some folks who have more experience in the Nix derivation space.16:56:40
@disrupt_the_flow:matrix.orgdisrupt_the_flowHello. Any1 using the hardened profile and Wayland? It seems scudo doesn't let shit to run. Like Firefox or telegram-desktop. Changing it to graphene-allocator which works way better? And way the fuck less loc. I think hardened_malloc has 18k and scudo 400k.19:44:53
@mic92:nixos.devMic92 joined the room.19:57:52
@sushi_dude:matrix.orgSushi Dude
In reply to @disrupt_the_flow:matrix.org
Hello. Any1 using the hardened profile and Wayland? It seems scudo doesn't let shit to run. Like Firefox or telegram-desktop. Changing it to graphene-allocator which works way better? And way the fuck less loc. I think hardened_malloc has 18k and scudo 400k.
https://github.com/NixOS/nixpkgs/issues/100799#issuecomment-728935064
20:05:47
@disrupt_the_flow:matrix.orgdisrupt_the_flow
In reply to @sushi_dude:matrix.org
https://github.com/NixOS/nixpkgs/issues/100799#issuecomment-728935064
Yeah thanks. I've seen such mentions. But it's very very weird that Firefox for example crashes.
20:18:31
@hexa:lossy.networkhexa ris_: are you up for some curl shenanigans? 23:00:53
@r_i_s:matrix.orgris_not tonight23:01:09
@hexa:lossy.networkhexano problem, the issues are not going anywhere23:01:32
@hexa:lossy.networkhexahttps://github.com/NixOS/nixpkgs/pull/124502#issuecomment-88194444423:02:12
@hexa:lossy.networkhexathat comment is the most intriguing23:02:29
@r_i_s:matrix.orgris_yeah i saw it - it's probably a good idea all in all23:03:07
23 Jul 2021
@nixinator:nixos.devnixinator
In reply to @mlieberman85:matrix.org
Personally I'm looking at building a tool that can generate SPDX and/or CycloneDX formatted SBOMs based on Nix derivations. I have some thoughts on it but would definitely be interested in bouncing my ideas off of some folks who have more experience in the Nix derivation space.
what do you need?
02:08:37
@gytis-ivaskevicius:matrix.orgGytis IvaskeviciusDoes nixos have some sort of security newsletter? Currently I am subscribing to manjaro one and I feel ashamed for it :D07:04:13
@sandro:supersandro.deSandroNo07:07:15
@mic92:nixos.devMic92There was one on google groups quite some time ago07:49:41
@m:marvid.frSamæ joined the room.08:26:07
@m:marvid.frSamæHi everyone. How can I check that my system (kernel) is patched against CVE-2021-33909? I found this PR https://github.com/NixOS/nixpkgs/pull/131113 related to zen-kernels, but it doesn't clearly answer my question.08:27:59
@janne.hess:helsinki-systems.dedas_j Samæ: It's patched if you updated and rebooted recently. But you could try the exploit from the oss mailing lsit 08:28:45

There are no newer messages yet.


Back to Room ListRoom Version: 6