!PSmBFWNKoXmlQBzUQf:helsinki-systems.de

Stage 1 systemd

73 Members
systemd in NixOs's stage 1, replacing the current bash tooling https://github.com/NixOS/nixpkgs/projects/5123 Servers

Load older messages


SenderMessageTime
20 Feb 2023
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de🤔09:06:56
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgthe big problem is, as evident by the linked PR, wrapper script09:07:05
@elvishjerricco:matrix.org@elvishjerricco:matrix.org * the big problem is, as evident by the linked PR, wrapper scripts09:07:06
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.deWill investigate. Asking because we have a certrain customer who is interested in this09:07:20
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @elvishjerricco:matrix.org
the big problem is, as evident by the linked PR, wrapper scripts
nixos test that takes the initrd and does find /nix/store -name bash -or -name irb -or -name … seems likely. If anyone really wants their bean shell in there, so be it
09:08:01
@elvishjerricco:matrix.org@elvishjerricco:matrix.org hm? My point was that e.g. if you want cryptsetup stuff or gzip stuff (vconsole), you need wrapper scripts via makeWrapper that just set environment variables before executing the real program 09:09:24
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgthose scripts are almost universally bash in nixos09:09:47
@elvishjerricco:matrix.org@elvishjerricco:matrix.org oh but I guess isn't there a C version of makeWrapper? 09:10:06
@k900:0upti.meK900I just don't get the threat model09:10:07
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @elvishjerricco:matrix.org
oh but I guess isn't there a C version of makeWrapper?
makeBinaryWrapper
09:10:12
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @k900:0upti.me
I just don't get the threat model
Neither do I but it seems like a interesting challenge
09:10:26
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgI kind of get it09:10:42
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @janne.hess:helsinki-systems.de
Neither do I but it seems like a interesting challenge
I also told them having AppArmor everywhere would get you to a more secure system but who am I to judge
09:11:03
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgThe more turing complete parameters you include, the greater the fuckups09:11:05
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgbut like the kernel already has turing complete shit with bpf or whatever it's called so you're already screwed09:11:37
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @elvishjerricco:matrix.org
but like the kernel already has turing complete shit with bpf or whatever it's called so you're already screwed
Ah so you think they don't have a custom one with grsecurity? But yeah, it's hard to defend this measure
09:12:31
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgI mean I think it's an entirely reasonable thing to want09:12:55
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de Will try when I find time, probably just need to use makeBinaryWrapper and rewrite my shitty bash code to shitty c code 09:13:10
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgI think it's ridiculous that the kernel allows turing complete logic from userspace09:13:11
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgzfs made a more egregious version of this mistake by including a Lua interpreter in kernel space09:13:32
@elvishjerricco:matrix.org@elvishjerricco:matrix.orglike... please don't do that09:13:42
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @elvishjerricco:matrix.org
zfs made a more egregious version of this mistake by including a Lua interpreter in kernel space
I mean … still better than a fully ruby env?
09:13:59
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgOh no is there ruby in the kernel??09:14:27
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.deNo, that's the point. Rather have lua than ruby09:14:41
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgah lol fair enough09:14:50
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.deOr just go the way of anti-cheat on windows and open an unauthenticated pipe and execute whatever comes out of it 🎉09:15:02
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de * Or just go the way of anti-cheat on windows and open an unauthenticated pipe and execute whatever comes out of it in the kernel 🎉09:15:11
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgoof09:15:12
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgThe trusted boot crowd has a lot of ambition around separating root from kernel so that even root can't ruin trusted boot. I think this falls in an adjacent category; initrd shouldn't be capable of undermining system security by allowing arbitrary logic encoded at runtime09:17:14
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgIt's.... probably not actually all that helpful09:17:42

Show newer messages


Back to Room ListRoom Version: 6