Skip Navigation
is there a guideline for using nix packages?
  • I lookup for the package here https://search.nixos.org/packages? I can find multiple versions.

    It'd help if you mentioned the package itself.

    two that sound right, two sound like rubbish and one is a plugin for something. How do I decide which of the two good sounding packages I should choose

    Let's say you wanted to install neovim, there are many similar packages available, viz. neovim, neovim-gtk, neovim-qt, etc. they all have description and most packages have link to homepage, hinting their purpose. But you can ignore *-unwrapped packages if you are not packaging yourself.

    What if the package or even both not work?

    This seems like packaging problem, most of the time it works. If not, notifying the maintainers via issues could help or you'll have to fix it for yourself or use other package manager.

    How do I know that it is up to date?

    Go to package homepage if available and check their releases and compare them with version shown on search.nixos.org. If homepage is not available, go to source and get the url from src attribute and check the original source and compare with version shown on search.nixos.org.

    How do I know that it will be updated in a timely manner? Can I update it?

    You can check the commit history for the "source" file. Also you can update it yourself. If you're lucky and know nix, then you'll only have to update the url/version and hash like here.

    is there a guideline for using nix packages?

    you can checkout https://nixos.wiki/wiki/Nix_command and may be https://nix.dev/manual/nix/2.18/. Unfortunately I can't find an comprehensive guideline for begineers. Others can chime in if they know.


    Notice about experimental features nix-command and flakes.

    If you see documentations other official sources, most often they'll use flakes/nix-command but since they're not officially stabilised (not as in broken) yet, documentation/blogs may vary. This can be quite frustrating if you don't know about it.

    Without flakes/nix-command, to install (let's say) neovim on non-NixOS distro nix-env -iA nixos.neovim, you can see that when search on search.nixos.org and click on the required packages, then choose one of the three tabs: nix-env, nix-shell or NixOS-configuration.

    nix-env installs the packages in your user environment, you can rollback and stuff.

    nix-shell downloads the package and spawns a new shell (your shell prompt changes to [nix-shell]:) and you can use the package there and package won't be installed. This is good for trying packages before installing.

    For using flakes/nix-command, first you'll have to enable them otherwise you'll get this error

    $ nix shell nixpkgs#neovim
    error: experimental Nix feature 'nix-command' is disabled; use '--extra-experimental-features nix-command' to override
    

    you can append --extra-experimental-features nix-command to the above command nix shell nixpkgs#neovim --extra-experimental-features nix-command and it'll work temporarily.

    OR

    Append this line experimental-features = nix-command flakes to /etc/nix/nix.conf to enable nix-command and flakes.

    nix shell nixpkgs#neovim is equivalent to nix-shell -p neovim though in the former it's using nixpkgs-unstable branch of github.com/nixos/nixpkgs. nix profile install nixpkgs#neovim is equivalent to nix-env -iA nixos.neovim though it's said to stop using nix-env

    PS: This could be more comprehensive, my writing skills are shit lol

  • it'll take some time and patience
  • What do you like about ansible? I guess it abstracts away the need to check for OS/init system? How else does it help in place of shell scripts?

    Also after using NixOS, it's amazing what NixOS does and disappointing that ansible is not so great for deterministic config [^ansible_drawback], its more or less a batch of commands executed together. The closest thing, to NixOS, I've been able to achieve is load a variables file in playbook.yml and enable/disable service or install/purge pkg based on variables declared. I might be nitpicking/wrong given I've not been using long enough but directory layout is kinda too verbose. I say that because it'll get really messy very quickly when writing modules for more services. NixOS is great, you only have to have configuration.nix or flake.nix+flake.lock too (if using flakes) and rest you can import however you like.

    [^ansible_drawback]: I know that nix stores its state in /nix and ansible doesn't have any such assumption about the target host so it can't rollback to previous state

  • I still don't get buffers
  • You can see all registers in use with :registers, to paste from a register say "2 in insert mode use key combination <ctrl-r>2 or in normal mode "2p. You can check out more in :help registers. Unnamed register or "" is the system clipboard I think. To copy texts in a register you can prepend yank (/delete/cut, etc.) with that register "_ (for black hole register[^black_hole]) This is for neovim. Have keybinds for them and there saved you a plugin :D

    [^black_hole]: Text yanked in this register is gone, i.e. it's not saved in any register.

  • Thinking of switching to NixOS, but I'm not sure about a few things
  • Secondly, the dotfiles. I hear there is the Home Manager for that, but it doesn’t have support for everything

    In this case, you can use home.file option of home-manager similar to environment.etc of NixOS configuration.

    For example, let's configure dunst with home-manager [^1]: [^1]: https://nix-community.github.io/home-manager/options.xhtml

    In case home-manager doesn't support it:
    # installing the package
    home.packages = [ pkgs.dunst ];
    
    # configure dunst
    
    ## writing new config
    home.file.".config/dunst/dunstrc" = {
        text = ''
            [urgency_critical]
                timeout = 15
        '';
    };
    
    ## using existing config
    home.file.".config/dunst/dunstrc".source = "/path/to/existing/dunst/config";
    
    If home-manager supports:
    services.dunst = {
        enable = true;
        # using existing config
        configFile = "/path/to/existing/dunst/config";
    
        # new config
        settings = {
            urgency_critical = {
                timeout = 15;
            };
        };
    };
    

    Is there a way to manage everything at the same time?

    Yes, create a git repo and keep your configuration there. Don't keep secrets unencrypted in there as those will end up in world readable /nix/store. Any user where system or human can access those. You can use any scheme to manage secrets at wiki^2.

    Even better if everything is in configuration.nix

    You can do everything in single file but I wouldn't recommend it as configuration may grow quickly and be difficult to manage later. Instead you may split the configuration.nix into multiple files and import those in configuration.nix.

    Flakes simply helps to manage the inputs easily (e.g. nixpkgs, home-manager), i.e., which version of input your config uses. Traditionally inputs is managed by nix-channel imperatively. It generates flake.lock to store the hash of inputs which won't be updated unless you update it. If you copy the config between different machines (or reinstall), you'll get exact same version of packages. It also helps avoid adding nix-channel, which you have to add manually during reinstall and you may not get the same version of packages. So, it's not important as you can do all things with/without it.

    I found this guide ^3 quite helpful to start with flakes. You may use one of Misterio77's starter configs^4. Also, a big surprise with flakes is that if you don't use git, then your all files from config dir will end up in /nix/store (world-readable[^5]) ^6 ^7. So, you should use git with flakes that way only commited files will end up in /nix/store(world-readable).

    [^5]: By world-readable, I mean any service or program can access those files

  • How do you track security vulnerabilities?

    Do you rely on mailing lists or news articles for security vulnerabilities? Please share.

    I only got to know about xz/liblzma ^[[1]] and curl ^[[2]] ^[[3]] vulnerabilities through lemmy (maybe because of high severity?).

    [1]:https://www.openwall.com/lists/oss-security/2024/03/29/4 [2]:https://curl.se/docs/CVE-2023-38545.html [3]:https://curl.se/docs/CVE-2023-38546.html

    34
    Who needs FHS, anyways?
  • I wouldn't be so sure it doesn't affect NixOS^[1].

    I am not a security researcher, nor a reverse engineer. There's lots of stuff I have not analyzed and most of what I observed is purely from observation rather than exhaustively analyzing the backdoor code.

    Also, it may take 10 days to downgrade the package^[2].

  • Right way to check free/used storage of btrfs filesystem [SOLVED]
  • You are right. I shouldn't have used diff. I'll fix that

    Also, incremental changes from subvolume to its snapshot might be incorrect as that will be new data added to subvolume, rather that old data deleted from subvolume while still present in snapshot. I'll have to check carefully.

  • Right way to check free/used storage of btrfs filesystem [SOLVED]
  • just comparing the subvolume with its snapshot with btrfs send -p /example/subvol /snapshot/of/example/subvol >examplediff.btrfs.

    From man btrfs-send

    generate a stream of instructions that describe changes between two subvolume snapshots

    Thanks for btdu, it seems useful as 'btrfs fi du' probably doesn't account for compression, will check it out sometime.

  • Right way to check free/used storage of btrfs filesystem [SOLVED]
  • Thanks that helped. I have one snapshot of home. Size of diff between btrfs subvolume and Additional space used by snapshot is 11GiB (probably) and btrfs fi du -s / is 72GiB, making 83GiB (closer to btrfs fi df /).

  • how to check free/used storage of btrfs

    cross-posted from: https://programming.dev/post/12030162

    > While checking for used and free space in a btrfs subvolume, I'm not getting a consistent value. It's confusing and doesn't help. > > 1. What is the correct way to find used/free space? > 2. Why are these values inconsistent (except normal du)? > > --- > According to btrfs fi usage /home, 83.21 GiB is used. > > Overall: > Device size: 149.98GiB > Device allocated: 100.07GiB > Device unallocated: 49.91GiB > Device missing: 0.00B > Device slack: 0.00B > Used: 83.21GiB > Free (estimated): 63.06GiB (min: 38.10GiB) > Free (statfs, df): 63.06GiB > Data ratio: 1.00 > Metadata ratio: 2.00 > ... > > As per btrfs fi df /home, used space is 82.86 GiB, not 83.21 GiB. > > Data, single: total=96.01GiB, used=82.86GiB > System, DUP: total=32.00MiB, used=16.00KiB > Metadata, DUP: total=2.00GiB, used=178.61MiB > GlobalReserve, single: total=99.50MiB, used=0.00B > > As per btrfs fi du -s /home , used space is 63.11 GiB. > > Total Exclusive Set shared Filename > 63.11GiB 13.64GiB 49.01GiB /home > > While according to du -hs /home, 64GiB is used. > > --- > Also, maximum space used should be close to 72 GiB as per btrfs fi du -s / and 73 GiB as per du -hs /, if btrfs fi usage includes all subvolumes . '/home' and '/' are on separate subvolumes.

    0
    Right way to check free/used storage of btrfs filesystem [SOLVED]
  • Between btrfs filesystem usage / and btrfs filesystem du -s / there's nearly 11GiB difference for used space. I have checked btrfs du -hs <path/to/subvolume> for all subvolume in the filesystem, and total seems to be 72 GiB, hence the confusion. Still I don't know if I'm using the tools properly or something else is at fault here.

    To correct myself, 11GiB is additional space used by snapshot probably used space difference between btrfs fi usage and btrfs fi du -s / is because of diff between snapshot and parent volume (didn't consider that while adding all used GiB of subvolumes). So btrfs filesystem usage works well to check used/free space.

    edit: fix incorrect args; additional space is not diff

  • Right way to check free/used storage of btrfs filesystem [SOLVED]

    While checking for used and free space in a btrfs subvolume, I'm not getting a consistent value. It's confusing and doesn't help.

    1. What is the correct way to find used/free space?
    2. Why are these values inconsistent (except normal du)?

    --- According to btrfs fi usage /home, 83.21 GiB is used. Overall: Device size: 149.98GiB Device allocated: 100.07GiB Device unallocated: 49.91GiB Device missing: 0.00B Device slack: 0.00B Used: 83.21GiB Free (estimated): 63.06GiB (min: 38.10GiB) Free (statfs, df): 63.06GiB Data ratio: 1.00 Metadata ratio: 2.00 ... As per btrfs fi df /home, used space is 82.86 GiB, not 83.21 GiB. Data, single: total=96.01GiB, used=82.86GiB System, DUP: total=32.00MiB, used=16.00KiB Metadata, DUP: total=2.00GiB, used=178.61MiB GlobalReserve, single: total=99.50MiB, used=0.00B As per btrfs fi du -s /home , used space is 63.11 GiB. Total Exclusive Set shared Filename 63.11GiB 13.64GiB 49.01GiB /home While according to du -hs /home, 64GiB is used.

    --- Also, maximum space used should be close to 72 GiB as per btrfs fi du -s / and 73 GiB as per du -hs /, if btrfs fi usage includes all subvolumes . '/home' and '/' are on separate subvolumes.

    11
    How to block certain words on lemmy feed
  • I remember seeing a post on lemmy blocking posts with certain words on firefox (and its derivatives) with ublock origin.

    1. Open My filters tab in ublock origin extension settings.
    2. To block posts with word random on lemmy.ml, add this to text field lemmy.ml##div.post-listing:has(span:has-text("/random/i"))'. i after random/ matches case insensitively.
  • Encrypted hard drive asking for password every time
  • user's password can be totally different from luks password if you're using autologin. You can keep it same but that's totally optional. You can login without entering any password at all if not using luks (or using autodecrypt), you can see that in live isos.

  • Encrypted hard drive asking for password every time
  • I have no idea what TPM is

    Read Skull giver's reply or look it up.


    Re-reading your post, I take you want to avoid typing long and tedious password? And that's why you want to auto-decrypt?

    1. (Recommended) You could use strong memorable passwords that are not difficult to type and enable autologin. Related xfcd comic:

    1. systemd-cryptenroll: For TPM usage, I highly recommend using secure boot. Though not sure if you can easily do that. A less secure alternative using systemd-cryptenroll would be use tpm2-pin and bind key to no pcrs (discouraged). But then you'll have to use luks2 for encryption. Notice from man systemd-cryptenroll regarding tpm2-pin:

    Note that incorrect PIN entry when unlocking increments the TPM dictionary attack lockout mechanism, and may lock out users for a prolonged time, depending on its configuration. The lockout mechanism is a global property of the TPM, systemd-cryptenroll does not control or configure the lockout mechanism. You may use tpm2-tss tools to inspect or configure the dictionary attack lockout, with tpm2_getcap(1) and tpm2_dictionarylockout(1) commands, respectively Also tpm2-pin is not disk encryption password and short alphanumeric password needed so tpm decrypts the device; so encryption password should be secured in a safe place. Also check if your distro supports systemd-cryptenroll.

    1. usb drive: read previous comment

    2. clevis: It probably isn't as simple as systemd-cryptenroll but I guess you can use zfs and combine that with tpm2-pin if not using secure boot (discouraged).


    You'll have to make a compromise somewhere between security and convenience. Even if you use pam mount, you'll have to enter the password, biometrics won't do.


    Edit: remove unnecessary user tag and add img uri

  • Encrypted hard drive asking for password every time
  • Assuming you want:

    1. Single password prompt instead of auto-decrypt with tpm
    2. User's files to be encrypted

    There are several ways to achieve this:

    1. autologin (recommended for single user system): / is encrypted using luks or zfs native encryption and user's home needs to be unencrypted. User's password may be same as encryption password for convenience, though they still are two passwords used for different purposes.

    2. pam mount: / is unencrypted or auto-decrypted and user's home is encrypted independently from / using zfs,luks,fscrypt,etc. In this case, user's login password must be same as user's home encryption password. It's suitable for multi-user system. NOTE: It cannot be used with autologin since user's home needs to be decrypted to log in.

    WARNING: For tpm usage, using secure boot is highly recommended to prevent unauthorized user from accessing key stored in tpm.

    To prevent auto-decrypt with tpm, tpm-pin can be used (with autologin for requirement #1).

    1. systemd-cryptenroll with/without tpm: As far as I know it can be only used to unlock disk encrypted with luks2. It can be used without tpm with pkcs11-token (e.g. YubiKey) or fido2-device. It also uses parameter encryption while key is unsealed, so safe from key sniffing via communication bus. This is easy if secure boot is enabled and luks2 is used for encryption.

    2. clevis with tpm: It can be used in place of systemd-cryptenroll. May be used with zfs native encryption. Though I'm not sure if it uses parameter encryption (correct me).

    3. unencrypted keyfile on usb: Not sure about zfs, but you can use keyfile on a usb drive to decrypt luks containers.


    NOTE: I'm not a forensic/security expert. I listed a brief overview of methods I could think of to keep user's files encrypted while providing single password till login.

  • Should you allow username to use Apostrophe (aka quotes )
  • you should be using prepared queries where it does not matter what chars you have in your username or password

    Can you elaborate this part given following pseudocode in python

    # Define POST variables
    uname = request.POST['username']
    passwd = request.POST['password']
    
    # SQL query vulnerable to SQLi
    sql = “SELECT id FROM users WHERE username=’” + uname + “’ AND password=’” + passwd + “’”
    
    # Execute the SQL statement
    database.execute(sql)
    

    How can I avoid string concatenation?

    I'm trying to understand what prepared queries are.

  • tell me your experience using zfs/btrfs

    cross-posted from: https://programming.dev/post/9319044

    > Hey, > > I am planning to implement authenticated boot inspired from [Pid Eins' blog][1]. > I'll be using pam mount for /home/user. I need to check integrity of all partitions. > > I have been using luks+ext4 till now. I am hesistant hesitant to switch to zfs/btrfs, afraid I might fuck up. > A while back I accidently purged '/' trying out timeshift which was my fault. > > Should I use zfs/btrfs for /home/user? > As for root, I'm considering luks+(zfs/btrfs) to be restorable to blank state. > > [1]: https://0pointer.net/blog/authenticated-boot-and-disk-encryption-on-linux.html

    72
    tell me your experience using zfs/btrfs

    Hey,

    I am planning to implement authenticated boot inspired from [Pid Eins' blog][1]. I'll be using pam mount for /home/user. I need to check integrity of all partitions.

    I have been using luks+ext4 till now. I am hesistant hesitant to switch to zfs/btrfs, afraid I might fuck up. A while back I accidently purged '/' trying out timeshift which was my fault.

    Should I use zfs/btrfs for /home/user? As for root, I'm considering luks+(zfs/btrfs) to be restorable to blank state.

    [1]: https://0pointer.net/blog/authenticated-boot-and-disk-encryption-on-linux.html

    10
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)UN
    unhinge @programming.dev
    Posts 6
    Comments 25