!NBBFPbiuttRgTqbrcY:nixos.org

NixOS Security Discussions

363 Members
Discussions around Security | Triaging happens in #security:nixos.org126 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
2 Oct 2024
@insurgo:matrix.orgtlaurion aka Insurgo [UTC-4] changed their display name from tlaurion aka Insurgo [UTC-4] (πŸ›«πŸ—ΊοΈπŸ›¬: Back 2024-10-01) to tlaurion aka Insurgo [UTC-4].12:42:36
3 Oct 2024
@elvishjerricco:matrix.orgElvishJerricco emily: point was that you'd do your idea of storing per generation secrets in terms of their names, along with a store of name -> secret. That way any generation always gets the most up to date version of the secret for the name. But if the name changes, the old generation still gets whatever was stored for the old name 18:02:39
@emilazy:matrix.orgemily(wrong emily :) )18:03:02
@elvishjerricco:matrix.orgElvishJerriccodamn autocorrect18:03:09
@emilazy:matrix.orgemilyI don't think it's intuitive that the name is semantically relevant in a way that is dependent on previous generations18:03:24
@elvishjerricco:matrix.orgElvishJerricco * damn autocorrect autocomplete (that one was autocorrect) 18:03:27
@emilazy:matrix.orgemilythat's both a weird CVS-like model for versioning, and totally inconsistent with how NixOS configurations work in general18:03:38
@emilazy:matrix.orgemilyyou can at least explain the current model in terms of being a total hack that violates the model, which it is18:03:50
@elvishjerricco:matrix.orgElvishJerriccoyea, I know it's more confusing, which is a good argument against it18:04:03
@emilazy:matrix.orgemilyI don't think you can get anyone to expect that renaming their SSH host key affects the security properties of a rollback18:04:14
@elvishjerricco:matrix.orgElvishJerricco and you've made a fairly convincing point about generational secrets not being such an issue because rollbacks are always a security risk 18:04:40
@elvishjerricco:matrix.orgElvishJerriccobut I'm still convinced I don't want encrypted secrets in the store18:05:12
@elvishjerricco:matrix.orgElvishJerriccolike, if encrypted forms of someone's iCloud photo library were publicly accessible on Apple's servers, I think they'd be rightly criticized for the leak, even if the files are hopefully useless18:05:57
@elvishjerricco:matrix.orgElvishJerriccoand of course in the case of agenix that's more analogous to publishing your git repo with your age encrypted secrets in it to github (which many people do) rather than being readable by all users on one system18:06:46
@emilazy:matrix.orgemilypeople with that level of paranoia shouldn't let other users access the host filesystem, though18:07:19
@emilazy:matrix.orgemilyanyway, I think it makes more sense to let the TPM handle all key management if possible rather than wrapping keys with TPM keys18:07:30
@emilazy:matrix.orgemilyfor preventing post-boot leaks, that's why you can use the TPM to make key access conditional on the stage of boot, right?18:07:42
@emilazy:matrix.orgemily(I haven't actually worked with TPM2 because the API is awful to me, but I believe this is meant to be part of the capabilities.)18:08:01
@elvishjerricco:matrix.orgElvishJerriccoyes but nixos doesn't implement that right now because systemd wants you to be booting ukis for their tpm stuff to work18:08:34
@emilazy:matrix.orgemily well, so we fix that and then kill off initrd secrets :) 18:08:52
@elvishjerricco:matrix.orgElvishJerriccomeh18:09:01
@elvishjerricco:matrix.orgElvishJerriccoinitrd secrets are useful18:09:06
@emilazy:matrix.orgemilynobody should be relying on any of this for security without secure boot anyway18:09:09
@elvishjerricco:matrix.orgElvishJerriccoThere are things to use initrd secrets for, like clevis JWTs, and I'm still unconvinced that it's ok to just toss them in the store.18:09:59
@elvishjerricco:matrix.orgElvishJerricco now, we could implement it way better, but that's another matter 18:10:57
@emilazy:matrix.orgemilyworth nothing that e.g. WebAuthn depends on shipping around blobs of secure element-encrypted private keys18:11:29
@emilazy:matrix.orgemily * worth noting that e.g. WebAuthn depends on shipping around blobs of secure element-encrypted private keys18:11:33
@elvishjerricco:matrix.orgElvishJerriccoI need to learn more about how WebAuthn actually works...18:12:24

Show newer messages


Back to Room ListRoom Version: 9