mirror of
https://github.com/anotherhadi/nixy.git
synced 2026-05-20 05:12:34 +02:00
2326857f65
Signed-off-by: Hadi <112569860+anotherhadi@users.noreply.github.com>
36 lines
1002 B
Nix
36 lines
1002 B
Nix
# Kernel hardening for the server
|
|
{
|
|
boot.kernel.sysctl = {
|
|
# Restrict access to kernel logs and pointers
|
|
"kernel.dmesg_restrict" = 1;
|
|
"kernel.kptr_restrict" = 2;
|
|
|
|
# BPF hardening
|
|
"net.core.bpf_jit_harden" = 2;
|
|
"kernel.unprivileged_bpf_disabled" = 1;
|
|
|
|
# Reverse path filtering (anti-spoofing)
|
|
"net.ipv4.conf.all.rp_filter" = 1;
|
|
"net.ipv4.conf.default.rp_filter" = 1;
|
|
|
|
# SYN flood protection
|
|
"net.ipv4.tcp_syncookies" = 1;
|
|
|
|
# Disable IP source routing
|
|
"net.ipv4.conf.all.accept_source_route" = 0;
|
|
"net.ipv4.conf.default.accept_source_route" = 0;
|
|
|
|
# Ignore ICMP redirects (prevent MITM)
|
|
"net.ipv4.conf.all.accept_redirects" = 0;
|
|
"net.ipv4.conf.default.accept_redirects" = 0;
|
|
"net.ipv4.conf.all.secure_redirects" = 0;
|
|
"net.ipv6.conf.all.accept_redirects" = 0;
|
|
|
|
# Don't send ICMP redirects
|
|
"net.ipv4.conf.all.send_redirects" = 0;
|
|
|
|
# Restrict ptrace to parent processes only
|
|
"kernel.yama.ptrace_scope" = 1;
|
|
};
|
|
}
|