!DBFhtjpqmJNENpLDOv:nixos.org

NixOS systemd

600 Members
NixOS ❤️ systemd165 Servers

Load older messages


SenderMessageTime
3 Oct 2024
@mjm:midna.devmjmright, you could do either17:33:01
@elvishjerricco:matrix.orgElvishJerricco but I think the goal is to eventually improve boot.initrd.secrets so that instead of literally appending secrets into your initrd, it copies them into place for use with the systemd stub 17:33:14
@elvishjerricco:matrix.orgElvishJerriccoand automatically encrypts them with the tpm or something like that if so desired by the user17:33:32
@elvishjerricco:matrix.orgElvishJerriccooh cool. I hadn't tried bcachefs-fstab-generator's credential support with the TPM yet, and it just worked out of the box. I mean, I expected as much, but I also expect most of my expectations to be broken, so it's a nice surprise :P20:17:54
@jaredbaur:matrix.orgJared Baur @arianvp:matrix.org: just following up, did you post a minimal broken config with stc-ng? I may have missed it 20:21:14
@emilazy:matrix.orgemily
In reply to @elvishjerricco:matrix.org
It's one more thing for me to have to avoid leaking
I think that if you leak your TPM key you need to rotate all your secrets anyway tbh
20:21:38
@raitobezarius:matrix.orgraitobezarius
In reply to @elvishjerricco:matrix.org
raitobezarius: do you think that would be reasonable?
it's possible but the stub needs to understand that profile thing
20:57:52
@raitobezarius:matrix.orgraitobezarius(and basically we are just reinventing systemd addons, right?)20:58:17
@raitobezarius:matrix.orgraitobezarius(our manifest is just a PE binary with a manifest section containing the data we care about)20:58:27
@elvishjerricco:matrix.orgElvishJerriccoyes except systemd addons have the problem that you can use the wrong combination of them20:59:12
@raitobezarius:matrix.orgraitobezariusright, with manifest, this wouldn't happen20:59:26
@raitobezarius:matrix.orgraitobezarius(and so you'd sign N + 1 things, the main stub, the N profiles)20:59:58
@elvishjerricco:matrix.orgElvishJerriccoyea21:00:07
@raitobezarius:matrix.orgraitobezariusand each profile is a (kernel, initrd, etc…) combination21:00:10
@raitobezarius:matrix.orgraitobezarius* and each profile is a (kernel, initrd, etc…) choice21:00:15
@elvishjerricco:matrix.orgElvishJerriccoyea, and like regular lanzaboote stub it would just contain the path and hash of the component rather than its contents21:00:42
@elvishjerricco:matrix.orgElvishJerriccobut yea the point is to separate code from manifest21:01:21
@elvishjerricco:matrix.orgElvishJerriccoe.g. so that one day we can have vendor signed lanzaboote and MOK signed manifests21:01:34
@raitobezarius:matrix.orgraitobezariuswhich is achieved ironically by making the manifest an executable21:01:35
@elvishjerricco:matrix.orgElvishJerriccoyes :P21:01:44
@raitobezarius:matrix.orgraitobezariussomeday, secureboot 2.0 will happen21:01:59
@elvishjerricco:matrix.orgElvishJerriccoother than SBAT by default, what would you change?21:02:38
@raitobezarius:matrix.orgraitobezariuswell21:02:45
@raitobezarius:matrix.orgraitobezariussecureboot 2.0 is already a thing21:02:48
@elvishjerricco:matrix.orgElvishJerriccooh?21:02:53
@elvishjerricco:matrix.orgElvishJerriccodidn't know that21:02:55
@raitobezarius:matrix.orgraitobezarius~6 months ago, there was a presentation / discussions among the secureboot folks21:03:06
@elvishjerricco:matrix.orgElvishJerriccois there a link?21:03:14
@raitobezarius:matrix.orgraitobezariusi think they want to fix things like the fact that's it very non-democratic / non user owned21:03:16
@raitobezarius:matrix.orgraitobezarius
In reply to @elvishjerricco:matrix.org
is there a link?
not that i'm aware of
21:03:29

Show newer messages


Back to Room ListRoom Version: 6