nixpkgs/nixos/modules/security/apparmor-suid.nix

47 lines
1.1 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
let
cfg = config.security.apparmor;
in
with lib;
{
options.security.apparmor.confineSUIDApplications = mkOption {
default = true;
description = ''
Install AppArmor profiles for commonly-used SUID application
to mitigate potential privilege escalation attacks due to bugs
in such applications.
Currently available profiles: ping
'';
};
config = mkIf (cfg.confineSUIDApplications) {
security.apparmor.profiles = [ (pkgs.writeText "ping" ''
#include <tunables/global>
/var/setuid-wrappers/ping {
2013-05-13 14:13:06 +01:00
#include <abstractions/base>
#include <abstractions/consoles>
#include <abstractions/nameservice>
2013-05-13 14:13:06 +01:00
capability net_raw,
capability setuid,
network inet raw,
${pkgs.glibc.out}/lib/*.so mr,
${pkgs.libcap.lib}/lib/libcap.so* mr,
${pkgs.attr.out}/lib/libattr.so* mr,
${pkgs.iputils}/bin/ping mixr,
/var/setuid-wrappers/ping.real r,
2013-05-13 14:13:06 +01:00
#/etc/modules.conf r,
2013-05-13 14:13:06 +01:00
## Site-specific additions and overrides. See local/README for details.
##include <local/bin.ping>
}
'') ];
};
}