!tCyGickeVqkHsYjWnh:nixos.org

NixOS Networking

902 Members
Declaratively manage your switching, routing, wireless, tunneling and more.263 Servers

Load older messages


SenderMessageTime
21 Aug 2021
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneand the network administrator is a BOFH03:00:54
@6aa4fd:tchncs.de6aa4fddo they just use Mac based firewalling?03:01:01
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneNot sure about the firewall details, it's a free for all.03:01:18
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zonehttps://youtu.be/GE94BJg3U1Q03:01:26
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneThis video should explain it.03:01:28
@6aa4fd:tchncs.de6aa4fd
In reply to @matthewcroughan:defenestrate.it
Not sure about the firewall details, it's a free for all.
time to get ya shit out brotha
03:06:05
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneI'm not that paranoid really.03:06:16
@6aa4fd:tchncs.de6aa4fdanyways good luck with the tunnel, ping me if it hisses03:06:37
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneA NixOS machine is a pretty good and secure internet facing base.03:06:39
@6aa4fd:tchncs.de6aa4fdsure unless they get any user with read access03:07:00
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneOnly two users on the machine. Me and the other Administrator.03:07:31
@6aa4fd:tchncs.de6aa4fduntil we have granular store permissions its pretty dicey as production03:07:37
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneTwo users with a shell, and ssh access, ssh keys only.03:07:47
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zone
In reply to @6aa4fd:tchncs.de
until we have granular store permissions its pretty dicey as production
How do you figure? What does the store have to do with it?
03:08:08
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneNothing sensitive is in the nix store.03:08:19
@6aa4fd:tchncs.de6aa4fdyeah well if you don't expose anything but ssh, back ports are the only thing that matters, its not exactly a conpetjtkve field03:08:26
@6aa4fd:tchncs.de6aa4fdwell sure but a shit load of services you configure with the nix store do have write-sensitive information in the store03:09:10
@6aa4fd:tchncs.de6aa4fdso not actually true, though it would be nice03:09:28
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneThe nix store is not world writable.03:09:29
@6aa4fd:tchncs.de6aa4fdread-sensitive, sorry03:09:40
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneI disagree, what are you thinking of?03:09:51
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneI mean, you can put it there yourself, but you'd be mad to.03:10:00
@6aa4fd:tchncs.de6aa4fdso do you use environment variables instead03:10:18
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneI use agenix which stores secrets encrypted in the store.03:10:36
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zonehttps://github.com/MatthewCroughan/nixcfg/commit/add19ff13691d39b0da7f1601f1d3299a05d986f03:10:57
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneexample of some usage03:10:59
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zonehttps://github.com/MatthewCroughan/nixcfg/commit/2d0b2a11a9bfd3a2d831fd13715c1bb16e191ef703:11:10
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zonea second example of some usage03:11:13
@6aa4fd:tchncs.de6aa4fdokay, maybe nix-sops or this will save the day03:11:50
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zone The secrets are then decrypted in the activation script, to /run/secrets which the correct permissions 03:11:52

There are no newer messages yet.


Back to Room ListRoom Version: 6