| | 1 | = Potential risks |
| | 2 | |
| | 3 | == Mitigation strategies |
| | 4 | |
| | 5 | Recommendations specific to Guix in air-gapped, classified use |
| | 6 | |
| | 7 | === Security Risks in an Air-Gapped Guix Workflow |
| | 8 | |
| | 9 | ==== Supply Chain Attacks via Source Code |
| | 10 | |
| | 11 | Even though you're building from source, the upstream source code (tarballs, Git repos) may be maliciously modified. |
| | 12 | Guix uses cryptographic hash verification, but only against what is declared in the Guix package definition — not against independent trust anchors. |
| | 13 | |
| | 14 | '''Mitigations:''' |
| | 15 | |
| | 16 | * Use guix build --source with hash-locked package definitions (content-addressed derivations). |
| | 17 | |
| | 18 | * Use reproducible builds and determinism checks (e.g., compare build outputs across trusted builders). |
| | 19 | |
| | 20 | * Consider maintaining a private mirror of trusted source code, and pin hash checks yourself. |
| | 21 | |
| | 22 | * Use content scanning tools (e.g., static analyzers) on all .tar.gz and Git checkouts. |
| | 23 | |
| | 24 | ==== Compromise via Channel Updates |
| | 25 | |
| | 26 | Your Guix package definitions come from Git channels (e.g., guix.git, or your own). |
| | 27 | |
| | 28 | If your channel is compromised, malicious package definitions could be delivered. |
| | 29 | |
| | 30 | '''Mitigations:''' |
| | 31 | |
| | 32 | * Use a pinned commit hash in your channels.scm. |
| | 33 | |
| | 34 | * Verify the channel commit with signed Git commits or tags (Guix supports this). |
| | 35 | |
| | 36 | * Host your own internal Guix channel for critical environments — control what definitions are trusted. |
| | 37 | |
| | 38 | * Use guix time-machine to avoid rolling updates. |
| | 39 | |
| | 40 | ==== Media Transfer Risks (USB, SD cards) |
| | 41 | |
| | 42 | USB drives used for transferring .nar files or source archives can be a vector for malware, even in an air-gapped setup. |
| | 43 | |
| | 44 | '''Mitigations:''' |
| | 45 | |
| | 46 | * Always format and scan USB media on a controlled, known-clean staging machine before inserting into classified systems. |
| | 47 | |
| | 48 | * Use write-once optical media (DVD-R) where appropriate for immutable transfer. |
| | 49 | |
| | 50 | * Prefer hash verification of transferred files (sha256sum sources.nar) using offline-known-good hashes. |
| | 51 | |
| | 52 | ==== Build Environment Leakage |
| | 53 | |
| | 54 | If the build process writes temporary files or outputs data to places outside the Guix store, secrets or traces of sensitive data could leak or persist. |
| | 55 | |
| | 56 | '''Mitigations:''' |
| | 57 | |
| | 58 | * Use guix build inside a dedicated, minimal, reproducible system (e.g., a guix system vm). |
| | 59 | |
| | 60 | * Enable build sandboxing (enabled by default in Guix). |
| | 61 | |
| | 62 | * Disable networking in builders if not already (Guix does this by default, but confirm your configuration). |
| | 63 | |
| | 64 | * Consider full-disk encryption for the build system. |
| | 65 | |
| | 66 | ==== Tampered Nar Archives |
| | 67 | |
| | 68 | .nar archives imported into your air-gapped server could be tampered with in transit. |
| | 69 | |
| | 70 | '''Mitigations:''' |
| | 71 | |
| | 72 | * Sign the archive on the export side and verify the signature on the import side. |
| | 73 | |
| | 74 | * Use GPG or minisign for signing hashes. |
| | 75 | |
| | 76 | * Maintain a hash whitelist of approved .nar files on the classified system. |
| | 77 | |
| | 78 | * Store all .nar imports in a sealed append-only log for auditing. |
| | 79 | |
| | 80 | == High-Security Recommendations for Guix in Classified Environments |
| | 81 | |
| | 82 | || '''Concern''' || '''Recommendation''' || |
| | 83 | || Source authenticity || Use fixed-output derivations with pinned hashes || |
| | 84 | || Package definition trust || Host internal Guix channel; pin commit hashes || |
| | 85 | || Archive integrity || Sign .nar files and verify signatures || |
| | 86 | || Reproducibility || Use multiple offline builders to cross-check outputs || |
| | 87 | || Logging || Keep an audit trail of all imports and builds || |
| | 88 | || Isolation || Build in virtual machines or system containers with no network || |
| | 89 | || Transfer media || Sanitize USBs or use write-once optical media || |
| | 90 | || User separation || Separate users for import, build, audit, and deployment tasks || |
| | 91 | |
| | 92 | == Final Thoughts |
| | 93 | |
| | 94 | Guix offers an excellent foundation for secure, reproducible software environments. |
| | 95 | |
| | 96 | But air-gapped security is about the whole process, not just the tooling. |
| | 97 | |
| | 98 | You should treat the Guix channel, source transport, build environment, and auditability as a single trusted pipeline. |