nixos/common/security.nix
Ivan Bushchik 06d253b189
Aughhthghhhgh
Signed-off-by: Ivan Bushchik <ivabus@ivabus.dev>
2023-08-24 11:06:09 +03:00

57 lines
1.6 KiB
Nix

{ lib, ... }:
{
systemd.coredump.enable = false;
security = {
lockKernelModules = true;
protectKernelImage = true;
allowSimultaneousMultithreading = false;
forcePageTableIsolation = true;
virtualisation.flushL1DataCache = "always";
apparmor = {
enable = true;
killUnconfinedConfinables = true;
};
allowUserNamespaces = true;
};
boot.kernel.sysctl = {
"kernel.sysrq" = 0;
# Picked from https://github.com/trimstray/the-practical-linux-hardening-guide/wiki/Network-stack
"net.ipv4.icmp_ignore_bogus_error_responces" = 1;
"net.ipv4.icmp_echo_ignore_broadcasts" = 1;
"net.ipv4.conf.default.rp_filter" = 1;
"net.ipv4.conf.all.rp_filter" = 1;
"net.ipv4.conf.all.accept_source_route" = 0;
"net.ipv6.conf.all.accept_source_route" = 0;
"net.ipv4.conf.all.send_redirects" = 0;
"net.ipv4.conf.default.send_redirects" = 0;
"net.ipv4.conf.all.accept_redirects" = 0;
"net.ipv4.conf.default.accept_redirects" = 0;
"net.ipv4.conf.all.secure_redirects" = 0;
"net.ipv4.conf.default.secure_redirects" = 0;
"net.ipv6.conf.all.accept_redirects" = 0;
"net.ipv6.conf.default.accept_redirects" = 0;
"net.ipv4.ip_forward" = 1;
"net.ipv6.conf.all.accept_ra" = 0;
"net.ipv6.conf.default.accept_ra" = 0;
"net.ipv4.tcp_syncookies" = 1;
"net.ipv4.conf.default.log_martians" = 1;
"net.ipv4.conf.all.log_martians" = 1;
"net.ipv4.tcp_rfc1337" = 1;
"net.ipv4.tcp_fastopen" = 3;
"net.ipv4.tcp_congestion_control" = "bbr";
"net.core.default_qdisc" = "cake";
};
boot.kernelModules = [ "tcp_bbr" ];
}