{ config, lib, pkgs, ... }: let cfg = config.security.apparmor; in with lib; { options.security.apparmor.confineSUIDApplications = mkOption { default = true; description = '' Install AppArmor profiles for commonly-used SUID application to mitigate potential privilege escalation attacks due to bugs in such applications. Currently available profiles: ping ''; }; config = mkIf (cfg.confineSUIDApplications) { security.apparmor.profiles = [ (pkgs.writeText "ping" '' #include /var/setuid-wrappers/ping { #include #include #include capability net_raw, capability setuid, network inet raw, ${pkgs.glibc}/lib/*.so mr, ${pkgs.libcap}/lib/libcap.so* mr, ${pkgs.attr}/lib/libattr.so* mr, ${pkgs.iputils}/bin/ping mixr, /var/setuid-wrappers/ping.real r, #/etc/modules.conf r, ## Site-specific additions and overrides. See local/README for details. ##include } '') ]; }; }