add global hardening options

This commit is contained in:
Yureka 2024-07-10 00:46:20 +02:00
parent afaf49eb97
commit 4c5ac2fa0e
2 changed files with 24 additions and 0 deletions

View file

@ -5,5 +5,6 @@
./raito-proxy-aware-nginx.nix ./raito-proxy-aware-nginx.nix
./base-server.nix ./base-server.nix
./sysadmin ./sysadmin
./hardening.nix
]; ];
} }

23
common/hardening.nix Normal file
View file

@ -0,0 +1,23 @@
{ config, lib, ... }:
{
nix.settings.allowed-users = [ "root" ];
boot.specialFileSystems = lib.mkIf (!config.security.rtkit.enable && !config.security.polkit.enable) {
"/proc".options = [ "hidepid=2" ];
};
boot.kernel.sysctl."kernel.dmesg_restrict" = 1;
services.openssh = {
settings.PasswordAuthentication = false;
settings.KbdInteractiveAuthentication = false;
# prevents mutable /home/$user/.ssh/authorized_keys from being loaded to ensure that all user keys are config managed
authorizedKeysFiles = lib.mkForce [
"/etc/ssh/authorized_keys.d/%u"
];
};
users.mutableUsers = false;
}