Security: Difference between revisions

SELinux: Added a note since I'm working on it
Golbinex (talk | contribs)
Add NixOS Hardening link
 
(4 intermediate revisions by 4 users not shown)
Line 46: Line 46:
==== Flatpaks ====
==== Flatpaks ====


[https://en.wikipedia.org/wiki/Flatpak Flatpak]'ed applications are [https://docs.flatpak.org/en/latest/sandbox-permissions.html sandboxed] and require explicit privilege declaration for most access outside their own path. NixOS includes [https://nixos.org/manual/nixos/unstable/index.html#module-services-flatpak support for Flatpak]. Note that, since Flatpak application dependencies are [https://stackoverflow.com/questions/26217488/what-is-vendoring bundled/vendored], this introduces [https://blogs.gentoo.org/mgorny/2021/02/19/the-modern-packagers-security-nightmare/ other security risks] for the application . Also, most application flatpaks [https://flatkill.org/ do no not make meaningful use of the sandbox].
[https://en.wikipedia.org/wiki/Flatpak Flatpak]'ed applications are [https://docs.flatpak.org/en/latest/sandbox-permissions.html sandboxed] and require explicit privilege declaration for most access outside their own path. NixOS includes [https://nixos.org/manual/nixos/unstable/index.html#module-services-flatpak support for Flatpak]. Note that, since Flatpak application dependencies are [https://stackoverflow.com/questions/26217488/what-is-vendoring bundled/vendored], this introduces [https://blogs.gentoo.org/mgorny/2021/02/19/the-modern-packagers-security-nightmare/ other security risks] for the application . Also, most application flatpaks [https://flatkill.org/ do not make meaningful use of the sandbox].


==== Linux Containers ====
==== Linux Containers ====
Line 110: Line 110:
=== Secure Boot ===
=== Secure Boot ===


Development of [https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface#Secure_Boot UEFI Secure Boot] support is [https://github.com/NixOS/nixpkgs/issues/42127 in flight]. An experimental secure boot implementation is available in [https://github.com/nix-community/lanzaboote Lanzaboote]
Development of [https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface#Secure_Boot UEFI Secure Boot] support is [https://github.com/NixOS/nixpkgs/issues/42127 in flight]. An experimental Secure Boot implementation is available in [https://github.com/nix-community/lanzaboote Lanzaboote]. [[Limine]] bootloader also supports Secure Boot.


=== SELinux ===
=== SELinux ===
Line 124: Line 124:
=== NixOS ===
=== NixOS ===


* [[NixOS Hardening]]
* [https://christine.website/blog/paranoid-nixos-2021-07-18 Blog - Paranoid NixOS Setup]
* [https://christine.website/blog/paranoid-nixos-2021-07-18 Blog - Paranoid NixOS Setup]
* [https://github.com/flyingcircusio/vulnix vulnix] - Vulnerability (CVE) scanner for Nix/NixOS
* [https://github.com/flyingcircusio/vulnix vulnix] - Vulnerability (CVE) scanner for Nix/NixOS
Line 142: Line 143:
* [https://github.com/decalage2/awesome-security-hardening awesome-security-hardening] - Collection of security hardening guides, tools and other resources.
* [https://github.com/decalage2/awesome-security-hardening awesome-security-hardening] - Collection of security hardening guides, tools and other resources.


=== Supply chain security ===
* [https://nixcademy.com/posts/secure-supply-chain-with-nix/ Demonstrably Secure Software Supply Chains with Nix], Nixcademy


[[Category:Guide]]
[[Category:Guide]]
[[Category:NixOS]]
[[Category:NixOS]]
[[Category:Nix]]
[[Category:Nix]]
[[Category:Security]]