Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group (you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW,CAP_NET_ADMINandCAP_BPFstill give unlimited network manipulation possibilites,- older kernels don't have
CAP_BPFand useCAP_SYS_ADMINinstead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpassis an experimental feature configurable solely through--enable-rosenpassflag on thenetbird upcommand, see the docs.