!9IQChSjwSHXPPWTa:lix.systems

Lix

1123 Members
Lix user channel. Feel free to discuss on-topic issues here and give each other help. For matrix.to links to the rest of the Lix channels, see: https://wiki.lix.systems/books/lix-organisation/page/matrix-rooms304 Servers

Load older messages


SenderMessageTime
3 Feb 2026
@raitobezarius:matrix.orgraitobezariusmore complicated than tpm but yes00:09:04
@raitobezarius:matrix.orgraitobezariusthe secrets manager needs to be able to verify a proof that the outputs is the result of the execution code with some inputs with known hashes and trust the execution code, some inputs with known hashes needs to be verified to be the outputs of some evaluation code with some new inputs with new known hashes, up to the srcs and that the roots are all trusted (bootstrap tarball, source tarballs signed by an authority, etc.), it's just a long policy check via a DFS where you have to come up with a way to establish trust of a certain output assuming that the inputs are trusted and then you recurse to prove that the inputs are themselves trustables assuming their own inputs are trustables; at some point, you will find yourself in the roots of the "eval-build graph", that way, maybe you can push the risk into having people to compromise your sources' signature hygiene at this point00:14:03
@raitobezarius:matrix.orgraitobezariusbut this is mostly theoretical or abstract again00:14:09
@raitobezarius:matrix.orgraitobezariusno one is properly doing source tarball signing among a non trivial dependency graph00:14:21
@raitobezarius:matrix.orgraitobezariusso assuming such a scheme could be devised, it could only work on a custom userspace with very well chosen components, that's super unrealistic00:14:53
@raitobezarius:matrix.orgraitobezarius* no one is properly doing source tarball signing, esp. with a non trivial dependency graph00:15:11
@522_:catgirl.cloud0x4fbb09 it/its ⛯✇ΘΔ i've seen some zero knowledge proof type stuff to allow fast verification that a given output was an execution of a given program
but as-is, it's so incredibly slow to compile that it's not worth it for just reproducible build verification, you're better off just asking people to rebuild the binaries themselves
more trustworthy than "just trust that attacks on enclaves aren't a thing(they are)"
09:00:44
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her)Is there a way to add extrafiles for systemd boot and extraEntries in Lanzaboote?09:54:23
@raitobezarius:matrix.orgraitobezariusyes there's people working on ZKPing builds11:38:52
@raitobezarius:matrix.orgraitobezariusi don't disagree that it's easier to rebuild the things but enclaves as an additional thing — if it doesn't cost a lot — doesn't shock me a lot11:39:26
@raitobezarius:matrix.orgraitobezariusno, lanzaboote works with kernel images, it doesn't touch the config file11:41:31
@raitobezarius:matrix.orgraitobezariusthe only way to add extra entries is to drop more kernel images inside the boot directory11:41:41
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her)but it disables the systemd thing13:39:17
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her)like13:39:23
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her)the option13:39:25
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her)Redacted or Malformed Event13:40:08
@k900:0upti.meK900You can just copy the files to /boot/loader13:40:22
@k900:0upti.meK900You'd still have to sign them separately though13:40:43
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her)Redacted or Malformed Event13:41:46
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her)Redacted or Malformed Event13:41:57
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her)moving to offtopic13:43:18
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her)I did read the about page tho13:43:24
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her) * 13:43:29
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her)about thte links13:43:34
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her) * 13:44:15
@boogiewoogie:bopsen.clubboogiewoogie changed their profile picture.16:24:02
@thewholeworldisburning123:rougebordeaux.xyzmissbehaves changed their profile picture.16:52:06
@neobrain:matrix.orgneobrain ... did nix/lix run/build always use impure evaluation? I could've sworn it uses pure eval and hence wouldn't consider any local changes that haven't been committed yet 17:46:49
@aloisw:julia0815.dealoisw With -f it always uses impure, with flakes even with pure eval it will copy dirty files to the store as long as they are tracked. 17:47:49
@sofiedotcafe:matrix.orgSofie 🏳️‍⚧️ (she/her)

Installing Lanzaboote to "/boot"...
Failed to install generation 1: Get stub name: Failed to read public key from /var/lib/sbctl/keys/db/db.pem: No such file or directory (os error 2)
Failed to install bootloader

[nixos@nixos:~]$ cat /mnt/persistent/var/lib/sbctl/db/db.key
cat: /mnt/persistent/var/lib/sbctl/db/db.key: Permission denied

???
it exists tho

17:49:46

Show newer messages


Back to Room ListRoom Version: 10