Skip to content

NixOS/MacOS Nix Minimalist-Hardened-Privacy-oriented Configs

License

Notifications You must be signed in to change notification settings

dscv101/hardenflakes

Repository files navigation

NixOS/macOS Flake

License: MIT

"A man and his tools make a man and his trade"

-Vita Sackville-West

"We shape our tools and then the tools shape us"

-Winston Churchill

These are my NixOS/macOS Nix setup.

NixOS macOS
macOS NixOS

Common Features

NixOS

This is paranoid build with root on tmpfs. This means that everything outside of some directories of /etc and some directories of /home will be wiped out. Read more about this in the NixOs Paranoid Guide (this is also a good source NixOS tmpfs as /home).

Features

How to Install

As root:

  1. Prepare a 64-bit NixOS 23.11 minimal iso image or 64-bit NixOS unstable minimal iso image and burn it, then enter the live system. Suppose I have divided two partitions: /dev/nvme0n1p1 and /dev/nvme0n1p2

  2. Format the partitions:

    mkfs.fat -F 32 /dev/nvme0n1p1
    mkfs.ext4 /dev/nvme0n1p2 # or use LUKS with cryptsetup luksFormat /dev/nvme0n1p2 encryptedroot

    or use the disko script for Btrfs with LUKS (don't forget to clone the repo first):

    nix run github:nix-community/disko -- --mode disko linux/disko.nix
    # verify the mount
    mount | grep /mnt
    # you may need to skip some commands in the next "mount" step
  3. Mount:

    mount -t tmpfs none /mnt
    mkdir -p /mnt/{boot,nix,etc/nixos}
    mount /dev/nvme0n1p2 /mnt/nix # or LUKS with mount /dev/mapper/encryptedroot /mnt/nix
    mount /dev/nvme0n1p1 /mnt/boot
    mkdir -p /mnt/nix/persist/etc/nixos
    mount -o bind /mnt/nix/persist/etc/nixos /mnt/etc/nixos
  4. Generate a basic configuration:

    nixos-generate-config --root /mnt
  5. Clone the repository locally:

    nix-shell -p git
    # recursive for git submodules
    git clone --recursive https://github.com/storopoli/flakes.git /mnt/etc/nixos/flakes
    cd /mnt/etc/nixos/flakes/
    nix develop --extra-experimental-features "nix-command flakes" --extra-experimental-features flakes
  6. Copy hardware-configuration.nix from /mnt/etc/nixos to /mnt/etc/nixos/flakes/hosts/laptop/hardware-configuration.nix:

    cp /mnt/etc/nixos/hardware-configuration.nix /mnt/etc/nixos/flakes/hosts/laptop/hardware-configuration.nix
  7. Modify the overwritten hardware-configuration.nix:

    vi /mnt/etc/nixos/flakes/hosts/laptop/hardware-configuration.nix
    ...
    # This is just an example
    # Please refer to `https://elis.nu/blog/2020/05/nixos-tmpfs-as-root/#step-4-1-configure-disks`
    
      fileSystems."/" =
        { device = "none";
          fsType = "tmpfs";
          options = [ "defaults" "size=12G" "mode=755"  ];
        };
    
      fileSystems."/nix" =
        { device = "/dev/disk/by-uuid/49e24551-c0e0-48ed-833d-da8289d79cdd";
          fsType = "ext4";
        };
    
      fileSystems."/boot" =
        { device = "/dev/disk/by-uuid/3C0D-7D32";
          fsType = "vfat";
        };
    
      fileSystems."/etc/nixos" =
        { device = "/nix/persist/etc/nixos";
          fsType = "none";
          options = [ "bind" ];
        };
    ...
  8. remove /mnt/etc/nixos/flakes/.git:

    rm -rf .git
  9. Username modification: edit /mnt/etc/nixos/flakes/flake.nix to modify user variable, hostname modification: edit /mnt/etc/nixos/flakes/hosts/system.nix to modify the hostName value in the networking property group

  10. Use the hash password generated by the mkpasswd {PASSWORD} -m sha-512 command to replace the value of users.users.<name>.hashedPassword in /mnt/etc/nixos/flakes/hosts/laptop/wayland/default.nix (there are two places to be edited)

  11. Perform install:

    nixos-install --no-root-passwd --flake .#laptop
  12. Reboot

    reboot
  13. Enjoy it!

How to Update

  1. First, update the input in flake:

    # update the specified input
    nix flake lock --update-input <foo> <foo>
    # or update all inputs
    nix flake update
    # also you can reclaim storage with
    nix-collect-garbage -d
  2. Then, rebuild and switch to the system after rebuild:

    doas nixos-rebuild boot --flake .#<hostname>

Wireguard VPN Configs

Sources: manpage of wg-quick, Mullvad WireGuard on Linux terminal > IVPN Autostart WireGuard in systemd, and IVPN WireGuard Kill Switch

For the extra paranoid, you can use VPNs without installing their apps. You will need WireGuard.

  1. Create your configuration in /etc/wireguard/wg0.conf. You can also name wg0.conf whatever you want. Any free-form string [a-zA-Z0-9_=+.-]{1,15} will work. These configs are generally provided by your VPN provider. They generally look something like this:

    [Interface]
    PrivateKey = abcdefghijklmnopqrstuvwxyz0123456789=
    Address = x.y.z.w/32
    DNS = x.y.z.w
    [Peer]
    PublicKey = abcdefghijklmnopqrstuvwxyz0123456789=
    Endpoint = sub.wg.domain.tld:9999
    AllowedIPs = 0.0.0.0/0
  2. Add "kill switch" configs. Add the following two lines to the [Interface] section, just before the [Peer] section:

    PostUp  = iptables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT && ip6tables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
    PreDown = iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT && ip6tables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT

    You may get a problem to connect to your local network. You can modify the kill switch, so it includes an exception for your local network, for example ! -d 192.168.1.0/24:

    PostUp  = iptables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL ! -d 192.168.1.0/24 -j REJECT && ip6tables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
    PreDown = iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL ! -d 192.168.1.0/24 -j REJECT && ip6tables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
  3. Make sure that you have the correct permissions, so only root can read them:

    sudo chown root:root -R /etc/wireguard && sudo chmod 600 -R /etc/wireguard
  4. Start the WireGuard connection with:

    sudo wg-quick up wg0
    # to disconnect
    sudo wg-quick down wg0

Autostart WireGuard in systemd

If you are using a Linux distribution that comes with systemd, you can autostart a WireGuard connection with:

sudo systemctl enable wg-quick@wg0.service
sudo systemctl daemon-reload
sudo systemctl start wg-quick@wg0

To check status: sudo systemctl status wg-quick@wg0

To remove the service and clean up the system:

sudo systemctl stop wg-quick@wg0
sudo systemctl disable wg-quick@wg0.service
sudo rm -i /etc/systemd/system/wg-quick@wg0*
sudo systemctl daemon-reload
sudo systemctl reset-failed

Testing the Kill Switch

One way to test a down tunnel is to delete the IP address from the WireGuard network interface, like this via the Terminal:

sudo ip a del [IP address] dev [interface]

In this example, it’s possible to remove x.y.z.w from the wg0 interface:

sudo ip a del x.y.z.w/32 dev wg0

The PostUP iptables rule from above restricts all traffic to the tunnel, and all outgoing attempts to get traffic out fail. To gracefully recover from this, you will likely have to use the wg-quick command to take the connection down, then bring it back up.

macOS

The macOS configs are minimalist in approach and geared towards enhancing security and privacy. It uses the best practices described in the MacOS Hardening Guide and the MacOS Security and Privacy Guide.

Why not Homebrew?

Honestly, Homebrew is a Ruby bloatware. It is slow, non-reproducible, and a mess to maintain.

Nix is superior in every way. It is fast as fuck, and it is 100% reproducible. Migrating to new hardware or rebuilding old hardware after a wipe is a breeze.

Features

  • Tiling window manager with Rectangle.

  • Apps:

  • Common developer enhancements in Finder and Search

  • MacOS privacy and security enhancements

  • Debloating of animations

Prepare your system

Before installing anything you'll need to prepare your system:

  1. Don't register an Apple ID

  2. Enable Lockdown Mode

  3. Disable all Sharing stuff: General > Sharing: Disable All

  4. Disable Notifications previews:

    • Notifications > Show Previews: Never
    • Notifications: Disable "Allow notifications when the screen is locked"
    • Lock Screen > Require password immediately
  5. Change NTP Server: General > Date & Time > Source: Change to "pool.ntp.org"

  6. Set the smart battery saver: Boost mode on AC and Low Power mode on battery

  7. Disable Siri:

    • Siri and Spotlight: Disable "Ask Siri"
    • Siri and Spotlight > Siri Suggestions > Disable all
  8. Disable Analytics:

    • Privacy and Security > Analytics > Improvements: Disable all
    • Privacy and Security > Apple Advertising > Disable personalized ads
    • Game Center: Disable all

How to Install

  1. Install Xcode Command Line Tools:

    xcode-select --install
  2. Install Nix using the official installer:

    sh <(curl -L https://nixos.org/nix/install) --daemon
  3. Enable Flake support:

    echo 'experimental-features = nix-command flakes' >> /etc/nix/nix.conf
  4. Install nix-darwin:

    # aarch64
    nix run nix-darwin -- switch --flake .#macbook
    # x86_64
    nix run nix-darwin -- switch --flake .#macbook_x86
  5. Apply changes to your system:

    darwin-rebuild switch --flake .

How to Update

  1. First, update the input in flake:

    # update the specified input
    nix flake lock --update-input <foo> <foo>
    # or update all inputs
    nix flake update
    # also you can reclaim storage with
    nix-collect-garbage -d
  2. Then, rebuild and switch to the system after rebuild:

    nix --experimental-features 'nix-command flakes' build '.#darwinConfigurations.macbook.system'
    nix run --extra-experimental-features 'nix-command flakes' nix-darwin -- switch --flake .
    # or if nix-command and flakes are enabled:
    nix run nix-darwin -- switch --flake .

About

NixOS/MacOS Nix Minimalist-Hardened-Privacy-oriented Configs

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Nix 83.0%
  • Shell 7.7%
  • Vim Script 6.7%
  • CSS 2.6%