Compare commits

..

2 commits

4 changed files with 72 additions and 26 deletions

View file

@ -1,9 +1,12 @@
{ {
boot.loader.grub = { boot.loader = {
timeout = 1;
grub = {
enable = true; enable = true;
device = "nodev"; device = "nodev";
efiSupport = true; efiSupport = true;
efiInstallAsRemovable = true; efiInstallAsRemovable = true;
enableCryptodisk = true; enableCryptodisk = true;
}; };
};
} }

View file

@ -7,7 +7,11 @@
./users ./users
]; ];
local.yubikey.enable = true; local.yubikey = {
enable = true;
serial = "28058247";
unplug.enable = true;
};
################################################################################ ################################################################################
# Services # Services

View file

@ -11,7 +11,7 @@ in
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
programs.i3lock = { programs.i3lock = {
enable = true; enable = true;
u2fSupport = lib.mkDefault config.local.yubikey.enable; u2fSupport = lib.mkDefault config.security.pam.u2f.enable;
}; };
programs.xss-lock.enable = true; programs.xss-lock.enable = true;

View file

@ -1,32 +1,71 @@
{ config, lib, pkgs, ... }: { config, lib, pkgs, ... }:
let cfg = config.local.yubikey; in let
cfg = config.local.yubikey;
control = if cfg.multi-factor.enable then "required" else "sufficient";
in
{ {
options.local.yubikey = with lib; { options.local.yubikey = with lib; {
enable = mkEnableOption "yubikey"; enable = mkEnableOption "yubikey";
serial = mkOption {
type = types.nullOr types.str;
default = null;
};
multi-factor.enable = mkEnableOption "multi-factor" // { default = true; };
unplug = {
enable = mkEnableOption "Do action when a Yubikey is unplugged";
model = mkOption {
type = types.str;
default = "407";
};
command = mkOption {
type = types.str;
default = "${pkgs.systemd}/bin/loginctl lock-sessions";
};
};
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
environment.systemPackages = [ pkgs.yubikey-manager pkgs.yubikey-personalization ]; environment.systemPackages = [ pkgs.yubikey-manager pkgs.yubikey-personalization ];
security.pam.u2f = { security.pam =
if cfg.serial == null then
{
u2f = {
enable = true; enable = true;
control = "required"; inherit control;
cue = lib.mkDefault true; cue = lib.mkDefault true;
}; };
services.udev.packages = [ pkgs.yubikey-personalization ]; services = {
security.pam.services = { login.u2fAuth = lib.mkDefault true;
login.u2fAuth = true; sudo.u2fAuth = lib.mkDefault true;
sudo.u2fAuth = true; };
}; }
services.pcscd.enable = true; else
{
services.udev.extraRules = lib.mkIf config.programs.xss-lock.enable '' yubico = {
ACTION=="remove",\ enable = true;
ENV{DEVTYPE}=="usb_device",\ inherit control;
ENV{PRODUCT}=="1050/402/543",\ mode = "challenge-response";
RUN+="${pkgs.systemd}/bin/loginctl lock-sessions" id = [ cfg.serial ];
''; };
};
services.pcscd.enable = cfg.serial != null;
services.udev = {
packages = [ pkgs.yubikey-personalization ];
extraRules = lib.mkIf cfg.unplug.enable ''
ACTION=="remove",\
ENV{DEVTYPE}=="usb_device",\
ENV{PRODUCT}=="1050/${cfg.unplug.model}/543",\
RUN+="${cfg.unplug.command}"
'';
};
}; };
} }