2014-04-14 15:26:48 +01:00
|
|
|
{ config, lib, pkgs, ... }:
|
2013-05-11 06:41:36 +01:00
|
|
|
let
|
|
|
|
cfg = config.security.apparmor;
|
|
|
|
in
|
2014-04-14 15:26:48 +01:00
|
|
|
with lib;
|
2013-05-11 06:41:36 +01:00
|
|
|
{
|
2019-12-10 01:51:19 +00:00
|
|
|
imports = [
|
|
|
|
(mkRenamedOptionModule [ "security" "virtualization" "flushL1DataCache" ] [ "security" "virtualisation" "flushL1DataCache" ])
|
|
|
|
];
|
2013-05-11 06:41:36 +01:00
|
|
|
|
|
|
|
options.security.apparmor.confineSUIDApplications = mkOption {
|
|
|
|
default = true;
|
|
|
|
description = ''
|
|
|
|
Install AppArmor profiles for commonly-used SUID application
|
|
|
|
to mitigate potential privilege escalation attacks due to bugs
|
|
|
|
in such applications.
|
|
|
|
|
|
|
|
Currently available profiles: ping
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf (cfg.confineSUIDApplications) {
|
|
|
|
security.apparmor.profiles = [ (pkgs.writeText "ping" ''
|
|
|
|
#include <tunables/global>
|
2017-01-29 10:11:01 +00:00
|
|
|
/run/wrappers/bin/ping {
|
2013-05-13 14:13:06 +01:00
|
|
|
#include <abstractions/base>
|
|
|
|
#include <abstractions/consoles>
|
|
|
|
#include <abstractions/nameservice>
|
2013-05-11 06:41:36 +01:00
|
|
|
|
2013-05-13 14:13:06 +01:00
|
|
|
capability net_raw,
|
|
|
|
capability setuid,
|
|
|
|
network inet raw,
|
2013-05-11 06:41:36 +01:00
|
|
|
|
2018-03-25 02:51:32 +01:00
|
|
|
${pkgs.stdenv.cc.libc.out}/lib/*.so mr,
|
2016-05-07 20:48:29 +01:00
|
|
|
${pkgs.libcap.lib}/lib/libcap.so* mr,
|
2016-01-24 07:28:56 +00:00
|
|
|
${pkgs.attr.out}/lib/libattr.so* mr,
|
2013-05-28 15:15:10 +01:00
|
|
|
|
|
|
|
${pkgs.iputils}/bin/ping mixr,
|
|
|
|
|
2013-05-13 14:13:06 +01:00
|
|
|
#/etc/modules.conf r,
|
2013-05-11 06:41:36 +01:00
|
|
|
|
2013-05-13 14:13:06 +01:00
|
|
|
## Site-specific additions and overrides. See local/README for details.
|
|
|
|
##include <local/bin.ping>
|
2013-05-11 06:41:36 +01:00
|
|
|
}
|
|
|
|
'') ];
|
|
|
|
};
|
|
|
|
|
|
|
|
}
|