Compare commits
6 Commits
2016-08-27
...
2016-09-15
| Author | SHA1 | Date | |
|---|---|---|---|
| 9b4a4f1b67 | |||
| b622554b42 | |||
| 332f40265d | |||
|
|
781973228f | ||
|
|
65e1c6ff0e | ||
| b42c8e3080 |
@@ -20,6 +20,7 @@ in {
|
|||||||
|
|
||||||
users.extraUsers.root = {
|
users.extraUsers.root = {
|
||||||
openssh.authorizedKeys.keys = [
|
openssh.authorizedKeys.keys = [
|
||||||
|
mbpJPierre03
|
||||||
radxJPierre03
|
radxJPierre03
|
||||||
radxRoot
|
radxRoot
|
||||||
phenomTaeradan
|
phenomTaeradan
|
||||||
|
|||||||
@@ -18,4 +18,5 @@ mkIf profiles.isDesktop {
|
|||||||
slock # vérouiller l''écran. "cannot disable the out-of-memory killer for this process (make sure to suid or sgid slock)" --> en root
|
slock # vérouiller l''écran. "cannot disable the out-of-memory killer for this process (make sure to suid or sgid slock)" --> en root
|
||||||
yubikey-personalization-gui # utilisation de la clef Yubikey
|
yubikey-personalization-gui # utilisation de la clef Yubikey
|
||||||
];
|
];
|
||||||
|
security.setuidPrograms = [ "slock" ];
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -49,6 +49,7 @@ in
|
|||||||
];
|
];
|
||||||
shellAliases = {
|
shellAliases = {
|
||||||
byobu = "byobu-tmux";
|
byobu = "byobu-tmux";
|
||||||
|
jacques-a-dit = "sudo";
|
||||||
tree = "tree -C";
|
tree = "tree -C";
|
||||||
tree1 = "tree -d -L 1";
|
tree1 = "tree -d -L 1";
|
||||||
tree2 = "tree -d -L 2";
|
tree2 = "tree -d -L 2";
|
||||||
@@ -58,6 +59,10 @@ in
|
|||||||
};
|
};
|
||||||
etc.gitconfig.text = builtins.readFile ./gitconfig;
|
etc.gitconfig.text = builtins.readFile ./gitconfig;
|
||||||
};
|
};
|
||||||
|
# programmes qui n'ont pas besoin de sudo pour fonctionner
|
||||||
|
security.setuidPrograms = [
|
||||||
|
"mtr"
|
||||||
|
];
|
||||||
programs.bash = {
|
programs.bash = {
|
||||||
enableCompletion = true;
|
enableCompletion = true;
|
||||||
promptInit = builtins.readFile ./bash-prompt.sh;
|
promptInit = builtins.readFile ./bash-prompt.sh;
|
||||||
|
|||||||
@@ -14,6 +14,7 @@ mkIf true {
|
|||||||
services.openssh = {
|
services.openssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
# https://wiki.mozilla.org/Security/Guidelines/OpenSSH#Modern_.28OpenSSH_6.7.2B.29
|
# https://wiki.mozilla.org/Security/Guidelines/OpenSSH#Modern_.28OpenSSH_6.7.2B.29
|
||||||
|
# http://www.cyberciti.biz/tips/linux-unix-bsd-openssh-server-best-practices.html
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
KexAlgorithms curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256
|
KexAlgorithms curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256
|
||||||
Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
|
Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
|
||||||
|
|||||||
@@ -13,5 +13,6 @@ mkIf true {
|
|||||||
|
|
||||||
security.sudo.extraConfig = ''
|
security.sudo.extraConfig = ''
|
||||||
%users ALL = NOPASSWD: ${pkgs.mtr}/bin/mtr
|
%users ALL = NOPASSWD: ${pkgs.mtr}/bin/mtr
|
||||||
|
%users ALL = NOPASSWD: ${pkgs.slock}/bin/slock
|
||||||
'';
|
'';
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user