!LemuOOvbWqRXodtSsw:nixos.org

NixOS Reproducible Builds

543 Members
Report: https://reproducible.nixos.org Project progress: https://github.com/orgs/NixOS/projects/30122 Servers

Load older messages


SenderMessageTime
21 Jun 2021
@foxboron:archlinux.orgFoxboron(Self-promotion: https://github.com/Foxboron/sbctl/)08:37:16
@linus.heckemann:matrix.mayflower.deLinux HackermanNice!08:37:41
@linus.heckemann:matrix.mayflower.deLinux HackermanOh but if keys can be loaded from the initramfs that's perfect.08:38:22
@foxboron:archlinux.orgFoxboronWell, not without additional patching.08:38:37
@foxboron:archlinux.orgFoxboronI haven't figured out how the initrd key insertion works. I have been trying to figure out lockdown mode + secureboot. (But now we are moving into offtopic territory)08:39:02
@linus.heckemann:matrix.mayflower.deLinux Hackerman hm, I was thinking that the kernel could boot in non-lockdown mode, then the initramfs (which is also a signed efi image ergo trustable) can load some keys in via sysfs/procfs/whatever, and then enable lockdown 08:39:48
@linus.heckemann:matrix.mayflower.deLinux HackermanIMHO, it's on-topic enough :p08:40:15
@foxboron:archlinux.orgFoxboronThere is no support. Currently you need to insert a key into the initrd or add the canonical/redhat patches which yeets the secure boot keys into the kernel keyring.08:40:41
@foxboron:archlinux.orgFoxboronBut initrd != efistub (or something)08:40:54
@foxboron:archlinux.orgFoxboron(I never dug deep into that part of the problem)08:41:01
@linus.heckemann:matrix.mayflower.deLinux HackermanWell yeah, inserting the key into the initramfs is what I'm describing08:41:34
@linus.heckemann:matrix.mayflower.deLinux HackermanThe efi stub is part of the linux kernel which makes it into an EFI-bootable image IIUC.08:42:02
@foxboron:archlinux.orgFoxboroninitramfs isn't actually protected by secure boot. But if you make a unified EFI image with initramfs+kernel it is. Hmmmm. Ahh this would be a cool feature08:43:33
@linus.heckemann:matrix.mayflower.deLinux HackermanOh right, yeah, just saw that in https://github.com/NixOS/nixpkgs/pull/53901/files#diff-14341d580318ebe4f2ce22e4fc94c02f6a56229cdc7ae939728628a47b9e6b39R144-R149 :)08:44:00
@foxboron:archlinux.orgFoxboron Make a seperate initramfs with the key in kernel/x86/key/somecert.cert (this is what microcode does for early boot loading) which you can concat with microcode + initramfs. 08:44:49
@foxboron:archlinux.orgFoxboronThis is me theorizing what alternative key loading would look like fwiw08:45:32
@fgaz:matrix.orgfgaz joined the room.10:05:45
@baloo_:matrix.orgbaloo1486 out of 1486 (100.00%) paths in the minimal installation image are reproducible! πŸŽ‰πŸŽ‰πŸŽ‰12:48:25
@baloo_:matrix.orgbaloo
In reply to @foxboron:archlinux.org
initramfs isn't actually protected by secure boot. But if you make a unified EFI image with initramfs+kernel it is. Hmmmm. Ahh this would be a cool feature

That is pretty easy to do actually.

https://github.com/baloo/reproducibility-lab/tree/main/pkgs/uefi-bundle

I haven’t worked on injecting the key from the secureboot but that does not sound impossible.

13:32:28
@baloo_:matrix.orgbalooAlthough if I might be pessimistic a bit. Not too sure all too many people have a practical use case for it13:33:46
@grahamc:nixos.org@grahamc:nixos.org Foxboron: how do you deal with the key? 20:56:34
@foxboron:archlinux.orgFoxboron
In reply to @grahamc:nixos.org
Foxboron: how do you deal with the key?
for which part? The discussion above refers to quite a few keys :p
22:20:00
22 Jun 2021
@siraben:matrix.orgsirabenis there a collection of patches we sent upstream to achieve 100% reproducibility?04:19:19
@raboof:matrix.orgraboof
In reply to @siraben:matrix.org
is there a collection of patches we sent upstream to achieve 100% reproducibility?
I don't think so, no
07:26:03
@davidak:matrix.orgdavidak
In reply to @baloo_:matrix.org
1486 out of 1486 (100.00%) paths in the minimal installation image are reproducible! πŸŽ‰πŸŽ‰πŸŽ‰
i have just checked and noticed it. congratulations to everyone involved! can we have a big announcement with short introduction what this effort is about, link to https://reproducible-builds.org/ and then include it in their newsletter? also announce on twitter, mastodon, hackernews, reddit, lemmy, ... with link to our blog post. that's how we can make people interested in NixOS ;) #marketing
19:37:58
@tomberek:matrix.orgtomberek Ideally, yes. It was on HN yesterday for a while. I’d suggest one aspect of the marketing is to describe why this is a good thing and what this allows. The Nix/NixOS marketing team meets tomorrow, we can bring it up to have a coordinated thing. 20:05:47
@liff:matrix.orgollijh joined the room.20:12:40
23 Jun 2021
@siraben:matrix.orgsiraben tomberek: is there an invite link for the marketing meeting? 03:21:32
@anubhavkini:matrix.organubhavkini joined the room.06:52:49
@raboof:matrix.orgraboofwe should definitely make sure it makes it to the reproduce-builds monthly newsletter, I'll write something up unless someone beats me to it07:40:03

Show newer messages


Back to Room ListRoom Version: 6