Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

rhababerbarbar@tux.socialR

rhababerbarbar@tux.social

@rhababerbarbar@tux.social
About
Posts
1
Topics
1
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:
    rhababerbarbar@tux.socialR rhababerbarbar@tux.social

    While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

    Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

    Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

    I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

    ```nix
    boot.blacklistedKernelModules = [
    "algif_aead"
    ];

    security.sudo.enable = false;

    security.wrappers = {
    su.enable = false;
    pkexec.enable = false;

    # example setuid binary
    chsh = {
    source = "${pkgs.shadow}/bin/chsh";
    setuid = lib.mkForce false;
    owner = "root";
    group = "root";
    };
    };
    ```

    Uncategorized nixos copyfail sudo pkexec
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups