summary refs log tree commit diff
path: root/nixos/modules/security/hidepid.nix
Commit message (Collapse)AuthorAge
* [bot] nixos/*: remove unused arguments in lambdasvolth2018-07-20
|
* hidepid: polkit and systemd-logind compatibilityJoachim Fasting2016-12-07
| | | | | | | | | | | | `systemd.hideProcessInformation = true`, would break interactions requiring polkit arbitration such as initating poweroff/reboot as a normal user; the polkit daemon cannot be expected to make decisions about processes that don't exist as far as it is concerned. systemd-logind lacks the `sys_ptrace` capability and so needs to be part of the designated proc gid, even though it runs as root. Fixes https://github.com/NixOS/nixpkgs/issues/20948
* hidepid module: detailed description to external docJoachim Fasting2016-09-15
|
* hidepid service: use new boot.specialFileSystemsNikolay Amiantov2016-08-31
|
* nixos filesystems: unify early filesystems handlingNikolay Amiantov2016-08-27
| | | | | | | | | | A new internal config option `fileSystems.<name>.early` is added to indicate that the filesystem needs to be loaded very early (i.e. in initrd). They are transformed to a shell script in `system.build.earlyMountScript` with calls to an undefined `specialMount` function, which is expected to be caller-specific. This option is used by stage-1, stage-2 and activation script to set up and remount those filesystems. Options for them are updated according to systemd defaults.
* nixos: add optional process information hidingJoachim Fasting2016-04-10
This module adds an option `security.hideProcessInformation` that, when enabled, restricts access to process information such as command-line arguments to the process owner. The module adds a static group "proc" whose members are exempt from process information hiding. Ideally, this feature would be implemented by simply adding the appropriate mount options to `fileSystems."/proc".fsOptions`, but this was found to not work in vmtests. To ensure that process information hiding is enforced, we use a systemd service unit that remounts `/proc` after `systemd-remount-fs.service` has completed. To verify the correctness of the feature, simple tests were added to nixos/tests/misc: the test ensures that unprivileged users cannot see process information owned by another user, while members of "proc" CAN. Thanks to @abbradar for feedback and suggestions.