!DBFhtjpqmJNENpLDOv:nixos.org

NixOS systemd

600 Members
NixOS ❤️ systemd165 Servers

Load older messages


SenderMessageTime
3 Oct 2024
@raitobezarius:matrix.orgraitobezariusprobably if you infiltrate the UEFI forum21:03:37
@raitobezarius:matrix.orgraitobezariusyou can find the informations21:03:39
@elvishjerricco:matrix.orgElvishJerriccoheh bummer21:03:50
@raitobezarius:matrix.orgraitobezariusclassical :)21:03:57
@emilazy:matrix.orgemilyany chance of per-OS keys/security levels like Apple Silicon has?21:13:21
@elvishjerricco:matrix.orgElvishJerriccoTPM21:13:55
@elvishjerricco:matrix.orgElvishJerriccojust bind keys and stuff to measurements for your OS21:14:15
@emilazy:matrix.orgemilythat's not quite the same, but sure21:14:32
@elvishjerricco:matrix.orgElvishJerriccowhat's different?21:14:40
@emilazy:matrix.orgemily you can't have, say, one OS partition where you can boot unsigned arbitrary kernels for development but another where you have strict requirements. admittedly segregating secrets is most of why it makes sense to do this on Apple Silicon, but you can segregate secrets and still want to enforce certain OS signing keys per-OS 21:18:02
@emilazy:matrix.orgemily(or else why do Secure Boot at all? just rely on the measurements)21:18:08
@k900:0upti.meK900You can do that with secure boot?21:18:38
@elvishjerricco:matrix.orgElvishJerriccoisn't that essentially just having one signed OS that doesn't check signatures of following boot components and one that does?21:19:00
@elvishjerricco:matrix.orgElvishJerriccoIIRC macs do this by enrolling what is essentially a MOK for your custom OS21:19:55
@elvishjerricco:matrix.orgElvishJerricco(look at that, Apple has MOK built in, unlike UEFI :P)21:20:38
@emilazy:matrix.orgemily
In reply to @elvishjerricco:matrix.org
isn't that essentially just having one signed OS that doesn't check signatures of following boot components and one that does?
I guess this is true in the same sense that Secure Boot is the same as a facility to store one trusted hash of a bootloader that handles chain-loading and enforcing any other security policy
21:21:54
@emilazy:matrix.orgemilyi.e., in terms of raw capabilities, sure I guess, but in terms of the UX and what's reasonable to set up not really21:22:09
@emilazy:matrix.orgemilyadmittedly the less integration with your secure element you have the less sense a lot of the Apple Silicon boot design makes21:22:36
@elvishjerricco:matrix.orgElvishJerriccoI dunno, apple's mechanism for letting you boot your own OS really does just seem like first party MOK to me21:23:26
@raitobezarius:matrix.orgraitobezarius
In reply to @emilazy:matrix.org
any chance of per-OS keys/security levels like Apple Silicon has?
i know there's a lot of activity on the concept of multiboot
21:23:54
@elvishjerricco:matrix.orgElvishJerriccolike even in terms of UX, I can just boot into the MOK manager thingy and say "please allow my other OS now please", which is basically what you do with apple21:23:58
@raitobezarius:matrix.orgraitobezariusthere's a big problem that has been realized regarding dual boot operations21:24:10
@raitobezarius:matrix.orgraitobezarius https://github.com/uapi-group/specifications/pull/117 21:24:34
@raitobezarius:matrix.orgraitobezariusso maybe maybe there could be per-OS specific stuff21:24:42
@raitobezarius:matrix.orgraitobezariusbut unclear to me yet21:24:44
@elvishjerricco:matrix.orgElvishJerriccowell, DPS isn't necessary for secure boot, strictly speaking21:26:13
@elvishjerricco:matrix.orgElvishJerriccoI was about to complain I wish I could read that diff in actual markdown, and then I discovered github has a "rich diff" view. Neat21:27:07
@elvishjerricco:matrix.orgElvishJerricco ... and it's not useful for tables :P 21:27:26
@arianvp:matrix.orgArianBtw i dont think After=multi-user.target is a hack21:39:17
@arianvp:matrix.orgArianIt's even documented in https://systemd.io/AUTOMATIC_BOOT_ASSESSMENT/21:39:42

Show newer messages


Back to Room ListRoom Version: 6