!PSmBFWNKoXmlQBzUQf:helsinki-systems.de

Stage 1 systemd

80 Members
systemd in NixOs's stage 1, replacing the current bash tooling https://github.com/NixOS/nixpkgs/projects/5125 Servers

Load older messages


SenderMessageTime
20 Feb 2023
@elvishjerricco:matrix.org@elvishjerricco:matrix.org oh but I guess isn't there a C version of makeWrapper? 09:10:06
@k900:0upti.meK900I just don't get the threat model09:10:07
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @elvishjerricco:matrix.org
oh but I guess isn't there a C version of makeWrapper?
makeBinaryWrapper
09:10:12
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @k900:0upti.me
I just don't get the threat model
Neither do I but it seems like a interesting challenge
09:10:26
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgI kind of get it09:10:42
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @janne.hess:helsinki-systems.de
Neither do I but it seems like a interesting challenge
I also told them having AppArmor everywhere would get you to a more secure system but who am I to judge
09:11:03
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgThe more turing complete parameters you include, the greater the fuckups09:11:05
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgbut like the kernel already has turing complete shit with bpf or whatever it's called so you're already screwed09:11:37
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @elvishjerricco:matrix.org
but like the kernel already has turing complete shit with bpf or whatever it's called so you're already screwed
Ah so you think they don't have a custom one with grsecurity? But yeah, it's hard to defend this measure
09:12:31
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgI mean I think it's an entirely reasonable thing to want09:12:55
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de Will try when I find time, probably just need to use makeBinaryWrapper and rewrite my shitty bash code to shitty c code 09:13:10
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgI think it's ridiculous that the kernel allows turing complete logic from userspace09:13:11
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgzfs made a more egregious version of this mistake by including a Lua interpreter in kernel space09:13:32
@elvishjerricco:matrix.org@elvishjerricco:matrix.orglike... please don't do that09:13:42
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @elvishjerricco:matrix.org
zfs made a more egregious version of this mistake by including a Lua interpreter in kernel space
I mean … still better than a fully ruby env?
09:13:59
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgOh no is there ruby in the kernel??09:14:27
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.deNo, that's the point. Rather have lua than ruby09:14:41
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgah lol fair enough09:14:50
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.deOr just go the way of anti-cheat on windows and open an unauthenticated pipe and execute whatever comes out of it 🎉09:15:02
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de * Or just go the way of anti-cheat on windows and open an unauthenticated pipe and execute whatever comes out of it in the kernel 🎉09:15:11
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgoof09:15:12
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgThe trusted boot crowd has a lot of ambition around separating root from kernel so that even root can't ruin trusted boot. I think this falls in an adjacent category; initrd shouldn't be capable of undermining system security by allowing arbitrary logic encoded at runtime09:17:14
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgIt's.... probably not actually all that helpful09:17:42
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgbut I can see the perspective that values it09:17:55
@lily:lily.flowers@lily:lily.flowersIf your threat model just wants to avoid arbitrary execution by an attacker physically present at the machine (but cannot open the machine and muck with the electronics -- you're always screwed in that case), you really just need to ensure no custom kernel cmdline is passed in at all (like lanzaboote started doing). Also I don't think the recovery shell will run by default anyway except maybe if it makes it to rescue.target and you enter the root password (I may be misremembering that though)11:21:45
@lily:lily.flowers@lily:lily.flowersI can get the desire to want to avoid any dynamic interpretation, but if the initrd always runs the same code (and said code doesn't depend on external factors hopefully...) just restricting cmdline should handle most reasonable threat models in conjunction with secure boot/bios password/etc I feel11:23:52
@lily:lily.flowers@lily:lily.flowers(Also assuming initrd is cryptographically verified like with lanzaboote or if you are just generating UKIs or something)11:24:49
@mixis:bau-ha.us@mixis:bau-ha.us set a profile picture.18:09:05
@elvishjerricco:matrix.org@elvishjerricco:matrix.org

Also I don't think the recovery shell will run by default anyway

yea by default the root password isn't set, so systemd-sulogin-shell just rejects you altogether. You have to actually set it in your nixos config.

19:09:21
22 Feb 2023
@lgcl:lgcl.delgcl (she/they) changed their display name from lgcl to lgcl (they/them).20:32:54

Show newer messages


Back to Room ListRoom Version: 6