mirror of
https://github.com/ItsDrike/nixdots
synced 2024-11-09 22:49:42 +00:00
Add auditd
This commit is contained in:
parent
4ea6be120d
commit
c3dda54f90
|
@ -59,6 +59,13 @@
|
||||||
hasTPM = true;
|
hasTPM = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
security = {
|
||||||
|
auditd = {
|
||||||
|
enable = true;
|
||||||
|
autoPrune.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
workstation = {
|
workstation = {
|
||||||
printing.enable = true;
|
printing.enable = true;
|
||||||
};
|
};
|
||||||
|
|
|
@ -4,5 +4,6 @@ _: {
|
||||||
./home
|
./home
|
||||||
./system
|
./system
|
||||||
./workstation
|
./workstation
|
||||||
|
./security
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
61
options/security/auditd.nix
Normal file
61
options/security/auditd.nix
Normal file
|
@ -0,0 +1,61 @@
|
||||||
|
{ lib, config, ... }: with lib; let
|
||||||
|
inherit (lib) mkEnableOption mkOption literalExpression types;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.myOptions.security.auditd = {
|
||||||
|
enable = mkEnableOption "the audit daemon.";
|
||||||
|
autoPrune = {
|
||||||
|
enable = mkEnableOption ''
|
||||||
|
automatic pruning of audit logs.
|
||||||
|
|
||||||
|
Enabling this is HEAVILY recommended, as audit logs
|
||||||
|
can grow very large very quickly.
|
||||||
|
'';
|
||||||
|
|
||||||
|
size = mkOption {
|
||||||
|
type = types.int;
|
||||||
|
default = 524288000; # roughly 500MB
|
||||||
|
description = ''
|
||||||
|
The maximum size of the audit log in bytes.
|
||||||
|
|
||||||
|
The default is 500MB.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
schedule = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "daily";
|
||||||
|
example = "weekly";
|
||||||
|
description = "How often cleaning is triggered. Passed to systemd.time";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
extraFiles = mkOption {
|
||||||
|
default = [];
|
||||||
|
type = types.listOf types.path;
|
||||||
|
example = literalExpression ''["/etc/nix/id_rsa"]'';
|
||||||
|
description = ''
|
||||||
|
Additional files in root to link to persistent storage.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
extraDirectories = mkOption {
|
||||||
|
default = [];
|
||||||
|
type = types.listOf types.path;
|
||||||
|
example = literalExpression ''["/etc/nix/id_rsa"]'';
|
||||||
|
description = ''
|
||||||
|
Additional directories in root to link to persistent storage.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
persistentMountPoint = mkOption {
|
||||||
|
default = "/persist";
|
||||||
|
description = ''
|
||||||
|
Path to a persistent directory (usually a mount point to a
|
||||||
|
standalone partition / subvolume), which will hold the persistent
|
||||||
|
system state files.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
5
options/security/default.nix
Normal file
5
options/security/default.nix
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
{
|
||||||
|
imports = [
|
||||||
|
./auditd.nix
|
||||||
|
];
|
||||||
|
}
|
52
system/shared/security/auditd.nix
Normal file
52
system/shared/security/auditd.nix
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
{ config, lib, ... }: let
|
||||||
|
inherit (lib) mkIf;
|
||||||
|
|
||||||
|
cfg = config.myOptions.security.auditd;
|
||||||
|
in {
|
||||||
|
config = mkIf cfg.enable {
|
||||||
|
security = {
|
||||||
|
auditd.enable = true;
|
||||||
|
audit = {
|
||||||
|
enable = true;
|
||||||
|
# maximum number of outstanding audit buffers allowed
|
||||||
|
# exceeding this is considered a failure and handled in
|
||||||
|
# a manner specified by failureMode
|
||||||
|
backlogLimit = 8192;
|
||||||
|
# how to handle critical errors in the auditing system
|
||||||
|
failureMode = "printk"; # "silent" | "printk" | "panic"
|
||||||
|
rules = [
|
||||||
|
"-a exit,always -F arch=b64 -S execve"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd = mkIf cfg.autoPrune.enable {
|
||||||
|
# Systemd timer to clean /var/log/audit.log on configured schedule
|
||||||
|
timers."clean-audit-log" = {
|
||||||
|
description = "Periodically clean audit log";
|
||||||
|
wantedBy = ["timers.target"];
|
||||||
|
timerConfig = {
|
||||||
|
OnCalendar = cfg.autoPrune.schedule;
|
||||||
|
Persistent = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# clean audit log if it's larger than the configured size
|
||||||
|
services."clean-audit-log" = {
|
||||||
|
script = ''
|
||||||
|
set -eu
|
||||||
|
if [[ $(stat -c "%s" /var/log/audit/audit.log) -gt ${cfg.autoPrune.size} ]]; then
|
||||||
|
echo "Clearing Audit Log";
|
||||||
|
rm -rvf /var/log/audit/audit.log;
|
||||||
|
echo "Done!"
|
||||||
|
fi
|
||||||
|
'';
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
User = "root";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./apparmor.nix
|
./apparmor.nix
|
||||||
|
./auditd.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue