summary refs log tree commit diff
path: root/nixos/modules/services/networking
Commit message (Collapse)AuthorAge
* Merge pull request #95050 from paumr/bind-fmtSandro2021-05-10
|\
| * nixos/bind: formatted with nixpkgs-fmtpaumr2021-05-08
| |
* | Merge pull request #121395 from bjornfor/nixos-wpa-supplicantMichele Guerini Rocco2021-05-10
|\ \ | |/ |/| nixos/wpa_supplicant: prefer 'install' over 'touch/chmod/mkdir/chgrp'
| * nixos/wpa_supplicant: prefer 'install' over 'touch/chmod/mkdir/chgrp'Bjørn Forsman2021-05-01
| | | | | | | | Ref #121293.
* | Merge pull request #121927 from rissson/nixos-unbound-fix-top-level-includeRobert Hensing2021-05-08
|\ \ | | | | | | nixos/unbound: allow list of strings in top-level settings option type
| * | nixos/unbound: allow list of strings in top-level settings option typeMarc 'risson' Schmitt2021-05-08
| | | | | | | | | | | | Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space>
* | | Merge pull request #121746 from j0hax/monero-optionsAaron Andersen2021-05-08
|\ \ \ | | | | | | | | nixos/monero: add dataDir option
| * | | nixos/monero: use isSystemUser = trueJohannes Arnold2021-05-08
| | | |
| * | | nixos/monero: fix typoJohannes Arnold2021-05-04
| | | |
| * | | nixos/monero: add dataDir optionJohannes Arnold2021-05-04
| | | |
* | | | nixos/yggdrasil: set directory permissions before writing keysGemini Lasswell2021-05-08
| |/ / |/| | | | | | | | | | | Remove the opportunity for someone to read the keys in between when they are written and when the chmod is done. Addresses #121293.
* | | Merge pull request #113716 from Ma27/wpa_multipleMaximilian Bosch2021-05-06
|\ \ \ | |/ / |/| | wpa_supplicant: allow both imperative and declarative networks
| * | wpa_supplicant: review fixesMaximilian Bosch2021-04-16
| | |
| * | nixos/wpa_supplicant: make new behavior opt-inMaximilian Bosch2021-04-16
| | |
| * | wpa_supplicant: allow both imperative and declarative networksMaximilian Bosch2021-04-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For a while now it's possible to specify an additional config file in `wpa_supplicant`[1]. In contrast to the file specified via `-c` this was supposed to be used for immutable settings and not e.g. additional networks. However I'm a little bit unhappy about the fact that one has to choose between a fully imperative setup and a fully declarative one where the one would have to write credentials for e.g. WPA2-enterprise networks into the store. The primary problem with the current state of `wpa_supplicant` is that if the `SAVE_CONFIG` command is invoked (e.g. via `wpa_cli`), all known networks will be written to `/etc/wpa_supplicant.conf` and thus all declarative networks would get out of sync with the declarative settings. To work around this, I had to change the following things: * The `networking.wireless`-module now uses `-I` for declarative config, so the user-controlled mode can be used along with the `networks`-option. * I added an `ro`-field to the `ssid`-struct in the `wpa_supplicant`-sources. This will be set to `1` for each network specified in the config passed via `-I`. Whenever config is written to the disk, those networks will be skipped, so changes to declarative networks are only temporary. [1] https://w1.fi/cgit/hostap/commit/wpa_supplicant?id=e6304cad47251e88d073553042f1ea7805a858d1
* | | Merge pull request #121512 from rnhmjoj/searxMichele Guerini Rocco2021-05-04
|\ \ \ | | | | | | | | searx: set settings.yml permissions using umask
| * | | nixos/searx: set settings.yml permissions using umaskrnhmjoj2021-05-03
| | |/ | |/| | | | | | | This should solve a leakage of secrets as suggested in #121293
* | | Merge pull request #89572 from rissson/nixos/unboundAndreas Rammhold2021-05-03
|\ \ \ | | | | | | | | nixos/unbound: add settings option, deprecate extraConfig
| * | | nixos/unbound: deprecate extraConfig in favor of settingsMarc 'risson' Schmitt2021-05-03
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Follow RFC 42 by having a settings option that is then converted into an unbound configuration file instead of having an extraConfig option. Existing options have been renamed or kept if possible. An enableRemoteAccess has been added. It sets remote-control setting to true in unbound.conf which in turn enables the new wrapping of unbound-control to access the server locally. Also includes options 'remoteAccessInterfaces' and 'remoteAccessPort' for remote access. Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space>
* | | | Merge pull request #121172 from eyJhb/bind-list-to-attrsSilvan Mosberger2021-05-03
|\ \ \ \ | |/ / / |/| | | nixos/bind: refactor zones from a list to attrset
| * | | nixos/bind: refactor zones from a list to attrseteyjhb2021-05-03
| | | | | | | | | | | | | | | | | | | | This commit uses coercedTo to make zones a attrset instead of list. Makes it easier to access/change zones in multiple places.
* | | | Merge pull request #121294 from nh2/issue-121288-wireguard-fix-chmod-raceSilvan Mosberger2021-05-03
|\ \ \ \ | | | | | | | | | | wireguard module: generatePrivateKeyFile: Fix chmod security race
| * | | | wireguard module: generatePrivateKeyFile: Fix chmod security race. Fixes #121288Niklas Hambüchen2021-04-30
| |/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Until now, the `touch + chmod 600 + write` approach made it possible for an unprivileged local user read the private key file, by opening the file after the touch, before the read permissions are restricted. This was only the case if `generatePrivateKeyFile = true` and the parent directory of `privateKeyFile` already existed and was readable. This commit fixes it by using `umask`, which ensures kernel-side that the `touch` creates the file with the correct permissions atomically. This commit also: * Removes `mkdir --mode 0644 -p "${dirOf values.privateKeyFile}"` because setting permissions `drw-r--r--` ("nobody can enter that dir") is awkward. `drwx------` would perhaps make sense, like for `.ssh`. However, setting the permissions on the private key file is enough, and likely better, because `privateKeyFile` is about that file specifically and no docs suggest that there's something special about its parent dir. * Removes the `chmod 0400 "${values.privateKeyFile}"` because there isn't really a point in removing write access from the owner of the private key.
* | | | Merge pull request #120791 from mweinelt/babeldLuke Granger-Brown2021-05-03
|\ \ \ \ | | | | | | | | | | babeld: 1.9.2 -> 1.10
| * | | | nixos/babeld: start maintaining the moduleMartin Weinelt2021-04-27
| | | | |
* | | | | nixos/mosquitto: Migrate away from bind_address/port config keysMartin Weinelt2021-05-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes these two deprecation warnings, by moving away from these options towards a simple listener configuration. > The 'bind_address' option is now deprecated and will be removed in a future version. The behaviour will default to true. > The 'port' option is now deprecated and will be removed in a future version. Please use 'listener' instead. Fixes: #120860
* | | | | nixos/mosquitto: harden systemd unitMartin Weinelt2021-05-01
| |_|/ / |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It can still network, it can only access the ssl related files if ssl is enabled. ✗ PrivateNetwork= Service has access to the host's network 0.5 ✗ RestrictAddressFamilies=~AF_(INET|INET6) Service may allocate Internet sockets 0.3 ✗ DeviceAllow= Service has a device ACL with some special devices 0.1 ✗ IPAddressDeny= Service does not define an IP address allow list 0.2 ✗ RootDirectory=/RootImage= Service runs within the host's root directory 0.1 ✗ RestrictAddressFamilies=~AF_UNIX Service may allocate local sockets 0.1 → Overall exposure level for mosquitto.service: 1.1 OK 🙂
* | | | nixos/adguardhome: init (#120568)lunik12021-04-30
| |/ / |/| |
* | | Merge #120493: nixos/kresd: allow package to be configuredVladimír Čunát2021-04-29
|\ \ \ | |/ / |/| |
| * | nixos/kresd.package: improve the generated docsVladimír Čunát2021-04-27
| | |
| * | nixos/kresd: allow package to be configuredSandro Jäckel2021-04-24
| | |
* | | Merge master into staging-nextgithub-actions[bot]2021-04-25
|\ \ \
| * | | nixos/babeld: run as DynamicUserMartin Weinelt2021-04-25
| |/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | The last bits to prevent babeld from running unprivileged was its kernel_setup_interface routine, that wants to set per interface rp_filter. This behaviour has been disabled in a patch that has been submitted upstream at https://github.com/jech/babeld/pull/68 and reuses the skip-kernel-setup config option. → Overall exposure level for babeld.service: 1.7 OK 🙂
* | | Merge master into staging-nextgithub-actions[bot]2021-04-22
|\| |
| * | quagga: removeJörg Thalheim2021-04-22
| | | | | | | | | | | | | | | | | | Upstream repositories do no longer exists. There has been no release in a while. - Not a good combination for a network daemon running as root in C that parses network packets...
* | | Merge master into staging-nextgithub-actions[bot]2021-04-22
|\| |
| * | maintainers: remove tavycMichael Weiss2021-04-22
| | | | | | | | | | | | | | | Their last commit was dcc84d8 from 2017. Thank you for your contributions.
* | | Merge master into staging-nextgithub-actions[bot]2021-04-21
|\| |
| * | Merge pull request #111518 from Jaculabilis/nebulaOleksii Filonenko2021-04-21
| |\ \ | | | | | | | | nixos/nebula: add basic module
| | * | nixos/nebula: Add enable option defaulting to true to Nebula networksMorgan Jones2021-04-16
| | | |
| | * | nixos/nebula: Add final newline to module and testTim Van Baak2021-03-04
| | | |
| | * | nixos/nebula: Update systemd service to be more like the source repo'sTim Van Baak2021-03-04
| | | |
| | * | nixos/nebula: Remove default punch option in favor of setting it through the ↵Tim Van Baak2021-03-01
| | | | | | | | | | | | | | | | settings option
| | * | nixos/nebula: Remove unnecessary package from service userTim Van Baak2021-02-28
| | | |
| | * | nixos/nebula: Refactor module to allow for multiple nebula services on the ↵Tim Van Baak2021-02-28
| | | | | | | | | | | | | | | | same machine
| | * | nixos/nebula: conditionally provision the nebula userAaron Andersen2021-02-09
| | | |
| | * | nixos/nebula: simply service user logicAaron Andersen2021-02-09
| | | |
| | * | nixos/nebula: replace extraConfig option with a settings optionAaron Andersen2021-02-09
| | | |
| | * | nixos/nebula: add basic moduleTim Van Baak2021-01-31
| | | |
* | | | Merge master into staging-nextgithub-actions[bot]2021-04-19
|\| | |