2021-08-01 16:06:53 +02:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
cfg = config.services.opensnitch;
|
2022-02-23 11:08:49 +01:00
|
|
|
format = pkgs.formats.json {};
|
2022-11-19 16:08:21 +01:00
|
|
|
|
|
|
|
predefinedRules = flip mapAttrs cfg.rules (name: cfg: {
|
|
|
|
file = pkgs.writeText "rule" (builtins.toJSON cfg);
|
|
|
|
});
|
|
|
|
|
2021-08-01 16:06:53 +02:00
|
|
|
in {
|
|
|
|
options = {
|
|
|
|
services.opensnitch = {
|
2022-11-19 16:08:21 +01:00
|
|
|
enable = mkEnableOption "Opensnitch application firewall";
|
|
|
|
|
|
|
|
rules = mkOption {
|
|
|
|
default = {};
|
|
|
|
example = literalExpression ''
|
|
|
|
{
|
|
|
|
"tor" = {
|
|
|
|
"name" = "tor";
|
|
|
|
"enabled" = true;
|
|
|
|
"action" = "allow";
|
|
|
|
"duration" = "always";
|
|
|
|
"operator" = {
|
|
|
|
"type" ="simple";
|
|
|
|
"sensitive" = false;
|
|
|
|
"operand" = "process.path";
|
|
|
|
"data" = "''${lib.getBin pkgs.tor}/bin/tor";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
'';
|
|
|
|
|
|
|
|
description = ''
|
|
|
|
Declarative configuration of firewall rules.
|
2023-12-24 14:04:26 +01:00
|
|
|
All rules will be stored in `/var/lib/opensnitch/rules` by default.
|
|
|
|
Rules path can be configured with `settings.Rules.Path`.
|
2022-11-19 16:08:21 +01:00
|
|
|
See [upstream documentation](https://github.com/evilsocket/opensnitch/wiki/Rules)
|
|
|
|
for available options.
|
|
|
|
'';
|
|
|
|
|
|
|
|
type = types.submodule {
|
|
|
|
freeformType = format.type;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2022-02-23 11:08:49 +01:00
|
|
|
settings = mkOption {
|
|
|
|
type = types.submodule {
|
|
|
|
freeformType = format.type;
|
|
|
|
|
|
|
|
options = {
|
|
|
|
Server = {
|
|
|
|
|
|
|
|
Address = mkOption {
|
|
|
|
type = types.str;
|
2022-11-19 16:08:21 +01:00
|
|
|
description = ''
|
2022-02-23 11:08:49 +01:00
|
|
|
Unix socket path (unix:///tmp/osui.sock, the "unix:///" part is
|
|
|
|
mandatory) or TCP socket (192.168.1.100:50051).
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
LogFile = mkOption {
|
|
|
|
type = types.path;
|
2022-11-19 16:08:21 +01:00
|
|
|
description = ''
|
2022-02-23 11:08:49 +01:00
|
|
|
File to write logs to (use /dev/stdout to write logs to standard
|
|
|
|
output).
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
DefaultAction = mkOption {
|
|
|
|
type = types.enum [ "allow" "deny" ];
|
2022-11-19 16:08:21 +01:00
|
|
|
description = ''
|
2022-02-23 11:08:49 +01:00
|
|
|
Default action whether to block or allow application internet
|
|
|
|
access.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
InterceptUnknown = mkOption {
|
|
|
|
type = types.bool;
|
2022-11-19 16:08:21 +01:00
|
|
|
description = ''
|
2022-11-03 15:52:19 +01:00
|
|
|
Whether to intercept spare connections.
|
2022-02-23 11:08:49 +01:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
ProcMonitorMethod = mkOption {
|
|
|
|
type = types.enum [ "ebpf" "proc" "ftrace" "audit" ];
|
2022-11-19 16:08:21 +01:00
|
|
|
description = ''
|
2022-02-23 11:08:49 +01:00
|
|
|
Which process monitoring method to use.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
LogLevel = mkOption {
|
|
|
|
type = types.enum [ 0 1 2 3 4 ];
|
2022-11-19 16:08:21 +01:00
|
|
|
description = ''
|
2022-02-23 11:08:49 +01:00
|
|
|
Default log level from 0 to 4 (debug, info, important, warning,
|
|
|
|
error).
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
Firewall = mkOption {
|
|
|
|
type = types.enum [ "iptables" "nftables" ];
|
2022-11-19 16:08:21 +01:00
|
|
|
description = ''
|
2022-02-23 11:08:49 +01:00
|
|
|
Which firewall backend to use.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
Stats = {
|
|
|
|
|
|
|
|
MaxEvents = mkOption {
|
|
|
|
type = types.int;
|
2022-11-19 16:08:21 +01:00
|
|
|
description = ''
|
2022-02-23 11:08:49 +01:00
|
|
|
Max events to send to the GUI.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
MaxStats = mkOption {
|
|
|
|
type = types.int;
|
2022-11-19 16:08:21 +01:00
|
|
|
description = ''
|
2022-02-23 11:08:49 +01:00
|
|
|
Max stats per item to keep in backlog.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
2023-12-24 14:04:26 +01:00
|
|
|
|
|
|
|
Ebpf.ModulesPath = mkOption {
|
|
|
|
type = types.path;
|
|
|
|
default = if cfg.settings.ProcMonitorMethod == "ebpf" then "${config.boot.kernelPackages.opensnitch-ebpf}/etc/opensnitchd" else null;
|
|
|
|
defaultText = literalExpression ''
|
|
|
|
if cfg.settings.ProcMonitorMethod == "ebpf" then
|
|
|
|
"\\$\\{config.boot.kernelPackages.opensnitch-ebpf\\}/etc/opensnitchd"
|
|
|
|
else null;
|
|
|
|
'';
|
|
|
|
description = ''
|
|
|
|
Configure eBPF modules path. Used when
|
|
|
|
`settings.ProcMonitorMethod` is set to `ebpf`.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
Rules.Path = mkOption {
|
|
|
|
type = types.path;
|
|
|
|
default = "/var/lib/opensnitch/rules";
|
|
|
|
description = ''
|
|
|
|
Path to the directory where firewall rules can be found and will
|
|
|
|
get stored by the NixOS module.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2022-02-23 11:08:49 +01:00
|
|
|
};
|
|
|
|
};
|
2022-11-19 16:08:21 +01:00
|
|
|
description = ''
|
|
|
|
opensnitchd configuration. Refer to [upstream documentation](https://github.com/evilsocket/opensnitch/wiki/Configurations)
|
2022-02-23 11:08:49 +01:00
|
|
|
for details on supported values.
|
|
|
|
'';
|
|
|
|
};
|
2021-08-01 16:06:53 +02:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
|
2022-02-23 11:08:49 +01:00
|
|
|
# pkg.opensnitch is referred to elsewhere in the module so we don't need to worry about it being garbage collected
|
2023-05-03 10:43:17 +02:00
|
|
|
services.opensnitch.settings = mapAttrs (_: v: mkDefault v) (builtins.fromJSON (builtins.unsafeDiscardStringContext (builtins.readFile "${pkgs.opensnitch}/etc/opensnitchd/default-config.json")));
|
2022-02-23 11:08:49 +01:00
|
|
|
|
2021-08-01 16:06:53 +02:00
|
|
|
systemd = {
|
|
|
|
packages = [ pkgs.opensnitch ];
|
2023-12-24 14:04:26 +01:00
|
|
|
services.opensnitchd = {
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
serviceConfig = {
|
|
|
|
ExecStart = [
|
|
|
|
""
|
|
|
|
"${pkgs.opensnitch}/bin/opensnitchd --config-file ${format.generate "default-config.json" cfg.settings}"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
preStart = mkIf (cfg.rules != {}) (let
|
|
|
|
rules = flip mapAttrsToList predefinedRules (file: content: {
|
|
|
|
inherit (content) file;
|
|
|
|
local = "${cfg.settings.Rules.Path}/${file}.json";
|
|
|
|
});
|
|
|
|
in ''
|
|
|
|
# Remove all firewall rules from rules path (configured with
|
|
|
|
# cfg.settings.Rules.Path) that are symlinks to a store-path, but aren't
|
|
|
|
# declared in `cfg.rules` (i.e. all networks that were "removed" from
|
|
|
|
# `cfg.rules`).
|
|
|
|
find ${cfg.settings.Rules.Path} -type l -lname '${builtins.storeDir}/*' ${optionalString (rules != {}) ''
|
|
|
|
-not \( ${concatMapStringsSep " -o " ({ local, ... }:
|
|
|
|
"-name '${baseNameOf local}*'")
|
|
|
|
rules} \) \
|
|
|
|
''} -delete
|
|
|
|
${concatMapStrings ({ file, local }: ''
|
|
|
|
ln -sf '${file}' "${local}"
|
|
|
|
'') rules}
|
|
|
|
'');
|
|
|
|
};
|
|
|
|
tmpfiles.rules = [
|
|
|
|
"d ${cfg.settings.Rules.Path} 0750 root root - -"
|
|
|
|
"L+ /etc/opensnitchd/system-fw.json - - - - ${pkgs.opensnitch}/etc/opensnitchd/system-fw.json"
|
|
|
|
];
|
2021-08-01 16:06:53 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
};
|
2023-12-24 14:04:26 +01:00
|
|
|
|
|
|
|
meta.maintainers = with lib.maintainers; [ onny ];
|
2021-08-01 16:06:53 +02:00
|
|
|
}
|
|
|
|
|