mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-25 16:33:15 +00:00
nixos/avahi-daemon: set up sandboxing
This commit is contained in:
parent
889dd46a3c
commit
8a2439f1c2
@ -317,6 +317,47 @@ in
|
|||||||
Type = "dbus";
|
Type = "dbus";
|
||||||
ExecStart = "${cfg.package}/sbin/avahi-daemon --syslog -f ${avahiDaemonConf}";
|
ExecStart = "${cfg.package}/sbin/avahi-daemon --syslog -f ${avahiDaemonConf}";
|
||||||
ConfigurationDirectory = "avahi/services";
|
ConfigurationDirectory = "avahi/services";
|
||||||
|
|
||||||
|
# Hardening
|
||||||
|
CapabilityBoundingSet = [
|
||||||
|
# https://github.com/avahi/avahi/blob/v0.9-rc1/avahi-daemon/caps.c#L38
|
||||||
|
"CAP_SYS_CHROOT"
|
||||||
|
"CAP_SETUID"
|
||||||
|
"CAP_SETGID"
|
||||||
|
];
|
||||||
|
DevicePolicy = "closed";
|
||||||
|
LockPersonality = true;
|
||||||
|
MemoryDenyWriteExecute = true;
|
||||||
|
NoNewPrivileges = true;
|
||||||
|
PrivateDevices = true;
|
||||||
|
PrivateTmp = true;
|
||||||
|
PrivateUsers = false;
|
||||||
|
ProcSubset = "pid";
|
||||||
|
ProtectClock = true;
|
||||||
|
ProtectControlGroups = true;
|
||||||
|
ProtectHome = true;
|
||||||
|
ProtectHostname = true;
|
||||||
|
ProtectKernelLogs = true;
|
||||||
|
ProtectKernelModules = true;
|
||||||
|
ProtectKernelTunables = true;
|
||||||
|
ProtectProc = "invisible";
|
||||||
|
ProtectSystem = "strict";
|
||||||
|
RestrictAddressFamilies = [
|
||||||
|
"AF_INET"
|
||||||
|
"AF_INET6"
|
||||||
|
"AF_NETLINK"
|
||||||
|
"AF_UNIX"
|
||||||
|
];
|
||||||
|
RestrictNamespaces = true;
|
||||||
|
RestrictRealtime = true;
|
||||||
|
RestrictSUIDSGID = true;
|
||||||
|
SystemCallArchitectures = "native";
|
||||||
|
SystemCallFilter = [
|
||||||
|
"@system-service"
|
||||||
|
"~@privileged"
|
||||||
|
"@chown setgroups setresuid"
|
||||||
|
];
|
||||||
|
UMask = "0077";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -75,5 +75,7 @@ import ./make-test-python.nix {
|
|||||||
one.succeed("test `wc -l < out` -gt 0")
|
one.succeed("test `wc -l < out` -gt 0")
|
||||||
two.succeed("avahi-browse -r -t _ssh._tcp | tee out >&2")
|
two.succeed("avahi-browse -r -t _ssh._tcp | tee out >&2")
|
||||||
two.succeed("test `wc -l < out` -gt 0")
|
two.succeed("test `wc -l < out` -gt 0")
|
||||||
|
|
||||||
|
one.log(one.execute("systemd-analyze security avahi-daemon.service | grep -v ✓")[1])
|
||||||
'';
|
'';
|
||||||
} args
|
} args
|
||||||
|
Loading…
Reference in New Issue
Block a user