NixOS Security Triage | 747 Members | |
| Coordination and triage of security issues in nixpkgs | 228 Servers |
| Sender | Message | Time |
|---|---|---|
| 13 Jul 2021 | ||
| 14:47:11 | ||
| 14:48:03 | ||
| 14:48:29 | ||
| 14 Jul 2021 | ||
| 09:19:44 | ||
| 15 Jul 2021 | ||
| 18:23:13 | ||
| 17 Jul 2021 | ||
| 00:50:35 | ||
| 16:50:46 | ||
| 18 Jul 2021 | ||
| 14:04:18 | ||
| 15:56:13 | ||
| 15:58:45 | ||
| 20:21:43 | ||
| 19 Jul 2021 | ||
| 03:10:54 | ||
Has anyone run NixOS with noexec on / and /home while /run/current-system/sw and /nix/store are not nonexec? Does that work? I could imagine that user profiles would break even though they go through several layers of indirection and just point to /nix/store. | 09:38:11 | |
| andi-: /run shouldn't even need to be noexec, since it's just symlinks into the store. I think eyJhb uses noexec extensively, but isn't in here | 09:43:16 | |
| * andi-: /run could probably even be noexec too, since it's just symlinks into the store. I think eyJhb uses noexec extensively, but isn't in here | 09:43:41 | |
| just not /run/wrappers | 09:43:44 | |
| andi- : maybe this blogpost is relevant https://christine.website/blog/paranoid-nixos-2021-07-18 | 09:53:57 | |
In reply to @tnias:stratum0.orgRead it and not to discredit the author but I don't see what is paranoid about that setup. It sounds like every other nixos machine I've seen for many years? | 09:54:34 | |
| If I were paranoid I'd probably also not trust tailscale but that is just me... | 09:55:24 | |
Paranoid is probably for clicks. Looks like a "normal" hardening guide. I just saw the noexec while skimming over it, thats why i posted it. | 10:20:15 | |
In reply to @tnias:stratum0.orgNot a bad read but far from a good guide. | 10:46:04 | |
| I like that someone is doing all the blogging that I'll never get to so I try to not criticise these posts too much :) | 10:47:04 | |
In reply to @andi:kack.itI don't agree. I believe criticism is a good thing. For example this specific blog. Says paranoid yet it uses systemd even if it used it's sandbox. Doesn't mention kernel hardening. Doesn't mention sandboxing such as bubblewrap. | 10:50:18 | |
| Mentioning that those and more steps are missing with some good references is an acceptable and needed criticism. | 10:51:17 | |
In reply to @disrupt_the_flow:matrix.orgI should extend my reasoning: I also don't have the energy & motivation to get into discussing these blog posts. I have to do things that a) pay my bills & b) keep my interested in stuff as otherwise why am I alive? This isn't the place where we should criticise the post. Perhaps the Lobsters comments? I don't know. | 10:51:58 | |
In reply to @disrupt_the_flow:matrix.org* I should extend my reasoning: I also don't have the energy & motivation to get into discussing these blog posts. I have to do things that a) pay my bills & b) keep me interested in stuff as otherwise why am I alive? This isn't the place where we should criticise the post. Perhaps the Lobsters comments? I don't know. | 10:52:16 | |
| That's one problem of Linux hardening guides I believe. I think Patrick(founder of whonix)has written a small article on that. If I'll find it I'll post it. | 10:52:38 | |
In reply to @andi:kack.itYes I see. No I'm not really criticizing it or discussing it. Just saying my tldr opinion. | 10:54:01 | |
| andi- https://forums.whonix.org/t/the-problem-with-security-guides-and-how-we-can-fix-it/8563 | 11:03:54 | |
| 15:00:54 | ||