!DBFhtjpqmJNENpLDOv:nixos.org

NixOS systemd

600 Members
NixOS ❤️ systemd165 Servers

Load older messages


SenderMessageTime
3 Oct 2024
@elvishjerricco:matrix.orgElvishJerriccoother than SBAT by default, what would you change?21:02:38
@raitobezarius:matrix.orgraitobezariuswell21:02:45
@raitobezarius:matrix.orgraitobezariussecureboot 2.0 is already a thing21:02:48
@elvishjerricco:matrix.orgElvishJerriccooh?21:02:53
@elvishjerricco:matrix.orgElvishJerriccodidn't know that21:02:55
@raitobezarius:matrix.orgraitobezarius~6 months ago, there was a presentation / discussions among the secureboot folks21:03:06
@elvishjerricco:matrix.orgElvishJerriccois there a link?21:03:14
@raitobezarius:matrix.orgraitobezariusi think they want to fix things like the fact that's it very non-democratic / non user owned21:03:16
@raitobezarius:matrix.orgraitobezarius
In reply to @elvishjerricco:matrix.org
is there a link?
not that i'm aware of
21:03:29
@raitobezarius:matrix.orgraitobezariusprobably if you infiltrate the UEFI forum21:03:37
@raitobezarius:matrix.orgraitobezariusyou can find the informations21:03:39
@elvishjerricco:matrix.orgElvishJerriccoheh bummer21:03:50
@raitobezarius:matrix.orgraitobezariusclassical :)21:03:57
@emilazy:matrix.orgemilyany chance of per-OS keys/security levels like Apple Silicon has?21:13:21
@elvishjerricco:matrix.orgElvishJerriccoTPM21:13:55
@elvishjerricco:matrix.orgElvishJerriccojust bind keys and stuff to measurements for your OS21:14:15
@emilazy:matrix.orgemilythat's not quite the same, but sure21:14:32
@elvishjerricco:matrix.orgElvishJerriccowhat's different?21:14:40
@emilazy:matrix.orgemily you can't have, say, one OS partition where you can boot unsigned arbitrary kernels for development but another where you have strict requirements. admittedly segregating secrets is most of why it makes sense to do this on Apple Silicon, but you can segregate secrets and still want to enforce certain OS signing keys per-OS 21:18:02
@emilazy:matrix.orgemily(or else why do Secure Boot at all? just rely on the measurements)21:18:08
@k900:0upti.meK900You can do that with secure boot?21:18:38
@elvishjerricco:matrix.orgElvishJerriccoisn't that essentially just having one signed OS that doesn't check signatures of following boot components and one that does?21:19:00
@elvishjerricco:matrix.orgElvishJerriccoIIRC macs do this by enrolling what is essentially a MOK for your custom OS21:19:55
@elvishjerricco:matrix.orgElvishJerricco(look at that, Apple has MOK built in, unlike UEFI :P)21:20:38
@emilazy:matrix.orgemily
In reply to @elvishjerricco:matrix.org
isn't that essentially just having one signed OS that doesn't check signatures of following boot components and one that does?
I guess this is true in the same sense that Secure Boot is the same as a facility to store one trusted hash of a bootloader that handles chain-loading and enforcing any other security policy
21:21:54
@emilazy:matrix.orgemilyi.e., in terms of raw capabilities, sure I guess, but in terms of the UX and what's reasonable to set up not really21:22:09
@emilazy:matrix.orgemilyadmittedly the less integration with your secure element you have the less sense a lot of the Apple Silicon boot design makes21:22:36
@elvishjerricco:matrix.orgElvishJerriccoI dunno, apple's mechanism for letting you boot your own OS really does just seem like first party MOK to me21:23:26
@raitobezarius:matrix.orgraitobezarius
In reply to @emilazy:matrix.org
any chance of per-OS keys/security levels like Apple Silicon has?
i know there's a lot of activity on the concept of multiboot
21:23:54
@elvishjerricco:matrix.orgElvishJerriccolike even in terms of UX, I can just boot into the MOK manager thingy and say "please allow my other OS now please", which is basically what you do with apple21:23:58

Show newer messages


Back to Room ListRoom Version: 6