Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement Process Visibility Restrictions in NixOS #98

Open
TanvirOnGH opened this issue Jul 7, 2024 · 0 comments
Open

Implement Process Visibility Restrictions in NixOS #98

TanvirOnGH opened this issue Jul 7, 2024 · 0 comments

Comments

@TanvirOnGH
Copy link

Title

Implement hide_uids, hide_gids, and hide_jail Functionality in NixOS.

Description

Implement features in NixOS to restrict process visibility, enhancing system security. These features would include:

  1. Hide Processes Running as Other Users (hide_uids):
    Similar to the hide_uids option in FreeBSD, this feature would hide processes running as other users. This would limit the visibility of processes to the users who own them, enhancing security.

  2. Hide Processes Running as Other Groups (hide_gids):
    Similar to the hide_gids option in FreeBSD, this feature would hide processes running as other groups. This would restrict process visibility based on group membership, further enhancing security.

  3. Hide Processes Running in Jails (hide_jail):
    Similar to the hide_jail option in FreeBSD, this feature would hide processes running in containers or isolated environments. This would improve security by isolating process information within containers.

Implementing these features would bring FreeBSD-level process visibility control to NixOS, improving overall system security.

#67

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants