diff options
author | EuAndreh <eu@euandre.org> | 2020-11-16 22:10:25 -0300 |
---|---|---|
committer | EuAndreh <eu@euandre.org> | 2020-11-16 22:26:54 -0300 |
commit | 1bf3861318f9cc362384722d4f312f3dd439c749 (patch) | |
tree | 2f06c18b3ede05a935cdbc55787941ee6fe42179 /secrets/terraform/terraform.tfstate | |
parent | Fix tests.sh (diff) | |
download | server-1bf3861318f9cc362384722d4f312f3dd439c749.tar.gz server-1bf3861318f9cc362384722d4f312f3dd439c749.tar.xz |
Add base Guix configuration and start switching to it
- remove NixOS stateVersion from .envrc;
- add guix-reconfigure.sh;
- add vps.scm with initial Guix system configuration;
- update vps.tf to use the new "base-guix" snapshot.
The "base-guix" image doesn't need a password. The "andreh" users has one, but
it is configured for not requiring it when running commands as "sudo".
The expected minimal steps one has to go through for privilege scalation is via
the SSH private key, and accessing the VPS via SSH. Since password login is
disabled and root can't login via SSH either, only the private SSH key allows
access to the server. After that, the attacker will be able to run commands as
root.
Diffstat (limited to 'secrets/terraform/terraform.tfstate')
-rw-r--r-- | secrets/terraform/terraform.tfstate | bin | 264 -> 3079 bytes |
1 files changed, 0 insertions, 0 deletions
diff --git a/secrets/terraform/terraform.tfstate b/secrets/terraform/terraform.tfstate Binary files differindex df179b7..135ef81 100644 --- a/secrets/terraform/terraform.tfstate +++ b/secrets/terraform/terraform.tfstate |