!NBBFPbiuttRgTqbrcY:nixos.org

NixOS Security Discussions

363 Members
Discussions around Security | Triaging happens in #security:nixos.org126 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
3 Oct 2024
@emilazy:matrix.orgemilyyou can at least explain the current model in terms of being a total hack that violates the model, which it is18:03:50
@elvishjerricco:matrix.orgElvishJerriccoyea, I know it's more confusing, which is a good argument against it18:04:03
@emilazy:matrix.orgemilyI don't think you can get anyone to expect that renaming their SSH host key affects the security properties of a rollback18:04:14
@elvishjerricco:matrix.orgElvishJerricco and you've made a fairly convincing point about generational secrets not being such an issue because rollbacks are always a security risk 18:04:40
@elvishjerricco:matrix.orgElvishJerriccobut I'm still convinced I don't want encrypted secrets in the store18:05:12
@elvishjerricco:matrix.orgElvishJerriccolike, if encrypted forms of someone's iCloud photo library were publicly accessible on Apple's servers, I think they'd be rightly criticized for the leak, even if the files are hopefully useless18:05:57
@elvishjerricco:matrix.orgElvishJerriccoand of course in the case of agenix that's more analogous to publishing your git repo with your age encrypted secrets in it to github (which many people do) rather than being readable by all users on one system18:06:46
@emilazy:matrix.orgemilypeople with that level of paranoia shouldn't let other users access the host filesystem, though18:07:19
@emilazy:matrix.orgemilyanyway, I think it makes more sense to let the TPM handle all key management if possible rather than wrapping keys with TPM keys18:07:30
@emilazy:matrix.orgemilyfor preventing post-boot leaks, that's why you can use the TPM to make key access conditional on the stage of boot, right?18:07:42
@emilazy:matrix.orgemily(I haven't actually worked with TPM2 because the API is awful to me, but I believe this is meant to be part of the capabilities.)18:08:01
@elvishjerricco:matrix.orgElvishJerriccoyes but nixos doesn't implement that right now because systemd wants you to be booting ukis for their tpm stuff to work18:08:34
@emilazy:matrix.orgemily well, so we fix that and then kill off initrd secrets :) 18:08:52
@elvishjerricco:matrix.orgElvishJerriccomeh18:09:01
@elvishjerricco:matrix.orgElvishJerriccoinitrd secrets are useful18:09:06
@emilazy:matrix.orgemilynobody should be relying on any of this for security without secure boot anyway18:09:09
@elvishjerricco:matrix.orgElvishJerriccoThere are things to use initrd secrets for, like clevis JWTs, and I'm still unconvinced that it's ok to just toss them in the store.18:09:59
@elvishjerricco:matrix.orgElvishJerricco now, we could implement it way better, but that's another matter 18:10:57
@emilazy:matrix.orgemilyworth nothing that e.g. WebAuthn depends on shipping around blobs of secure element-encrypted private keys18:11:29
@emilazy:matrix.orgemily * worth noting that e.g. WebAuthn depends on shipping around blobs of secure element-encrypted private keys18:11:33
@elvishjerricco:matrix.orgElvishJerriccoI need to learn more about how WebAuthn actually works...18:12:24
@emilazy:matrix.orgemily(technically that's an implementation detail, but it's how all the serious hardware implementations work for non-resident keys)18:13:00
@elvishjerricco:matrix.orgElvishJerriccooh, but resident keys are the default, aren't they?18:13:24
@elvishjerricco:matrix.orgElvishJerriccoand by far more common?18:13:29
@emilazy:matrix.orgemilynah18:13:31
@emilazy:matrix.orgemilythey're the hot new thing in the form of passkeys, but they were very uncommon for a very long time18:13:42
@emilazy:matrix.orgemilyWebAuthn used as a second factor is non-resident18:13:48
@emilazy:matrix.orgemilyit's still an explicit opt-in to get resident keys18:13:58
@emilazy:matrix.orgemilybut yeah "passkeys" are resident18:14:02

Show newer messages


Back to Room ListRoom Version: 9