!PSmBFWNKoXmlQBzUQf:helsinki-systems.de

Stage 1 systemd

79 Members
systemd in NixOs's stage 1, replacing the current bash tooling https://github.com/NixOS/nixpkgs/projects/5127 Servers

Load older messages


SenderMessageTime
11 Jun 2023
@elvishjerricco:matrix.orgElvishJerriccomy system does it by having the tailscale state dir shared between stages and stored on a disk that's TPM2 encrypted, and unlocked in initrd without user input06:42:19
@elvishjerricco:matrix.orgElvishJerriccoletting me log in so I can enter the key for the root fs and get the system booted06:42:43
@k900:0upti.meK900I have a horrible idea now06:43:15
@elvishjerricco:matrix.orgElvishJerriccodo tell06:43:23
@k900:0upti.meK900You could, in theory, do OIDC with a key stored on the TPM06:44:20
@elvishjerricco:matrix.orgElvishJerriccowhat's OIDC?06:44:38
@k900:0upti.meK900OpenID Connect, which is the thing Tailscale uses for auth06:44:49
@elvishjerricco:matrix.orgElvishJerriccoso what does it mean to store a key for it on the TPM?06:46:02
@k900:0upti.meK900It's just auth06:46:10
@k900:0upti.meK900You sign a token with your private key06:46:16
@k900:0upti.meK900And send it to the server that knows your public key06:46:23
@k900:0upti.meK900So you can log in to Tailscale without any secrets ever being persisted outside the TPM06:46:43
@elvishjerricco:matrix.orgElvishJerriccooh that's a really cool idea actually06:47:01
@elvishjerricco:matrix.orgElvishJerriccothough usually people don't actually store shit in the tpm06:47:08
@elvishjerricco:matrix.orgElvishJerriccosince space there is very limited06:47:12
@elvishjerricco:matrix.orgElvishJerriccoand I think it can only store tpm key hierarchy things?06:47:30
@elvishjerricco:matrix.orgElvishJerriccobut sealing a key is just as good06:48:01
@elvishjerricco:matrix.orgElvishJerriccoor, no, you want to do the actual auth crypto on the tpm and never on the host06:48:17
@elvishjerricco:matrix.orgElvishJerriccohm06:48:23
@k900:0upti.meK900Yep06:48:26
@k900:0upti.meK900You should be able to06:48:32
@elvishjerricco:matrix.orgElvishJerriccoyea I dunno the details well enough to be sure06:48:41
@elvishjerricco:matrix.orgElvishJerriccobut it sounds possible06:48:48
@k900:0upti.meK900 One problem with that is that I'm not sure you can authenticate as the same machine more than once on Tailscale 06:52:21
@k900:0upti.meK900At least with Headscale you have to manually remove the old node06:52:38
@elvishjerricco:matrix.orgElvishJerriccooh, wait, which level of auth are we talking about? The SSO thing where you actually login for the first time and add the node? Or the auth that occurs just be starting tailscaled back up again?06:53:37
@elvishjerricco:matrix.orgElvishJerricco * oh, wait, which level of auth are we talking about? The SSO thing where you actually login for the first time and add the node? Or the auth that occurs just by starting tailscaled back up again?06:53:50
@k900:0upti.meK900The SSO auth06:54:30
@elvishjerricco:matrix.orgElvishJerriccoI see06:54:37
@k900:0upti.meK900The second auth just uses the token that's persisted on disk06:54:40

Show newer messages


Back to Room ListRoom Version: 6