!RROtHmAaQIkiJzJZZE:nixos.org

NixOS Infrastructure

391 Members
Next Infra call: 2024-07-11, 18:00 CEST (UTC+2) | Infra operational issues backlog: https://github.com/orgs/NixOS/projects/52 | See #infra-alerts:nixos.org for real time alerts from Prometheus.120 Servers

Load older messages


SenderMessageTime
5 Jan 2025
@hexa:lossy.networkhexa * 15:13:29
@raitobezarius:matrix.orgraitobezariusreaction has something to block on the L3 level the scrapers15:19:37
@raitobezarius:matrix.orgraitobezarius https://reaction.ppom.me/filters/ai-crawlers.html 15:20:39
@k900:0upti.meK900Oh sorry I meant Fastly 15:21:47
@adam:robins.wtf@adam:robins.wtfthat makes more sense :) 15:22:36
@adam:robins.wtf@adam:robins.wtfi didn't mean to imply fastly was scraping us. i was just wondering if we could leverage fastly to protect hydra15:22:55
@hexa:lossy.networkhexatbh, the hydra-server needs to be more robust16:29:19
@hexa:lossy.networkhexait can't just lock up16:29:24
@vcunat:matrix.orgVladimír ČunátMaybe we should separate the external-facing web somehow.16:31:53
@emilazy:matrix.orgemilythe web UI runs on the same machine that holds the signing key, right?16:33:26
@hexa:lossy.networkhexayes16:37:59
@emilazy:matrix.orgemilyscary16:39:16
@emilazy:matrix.orgemilysigning key rotation when16:39:28
@hexa:lossy.networkhexadifferent user16:39:33
@raitobezarius:matrix.orgraitobezariusthe power of unix perm isolation16:39:50
@hexa:lossy.networkhexanot that the hydra services had any hardening 16:40:09
@emilazy:matrix.orgemilyour signing keys are hardware-protected (Linux uses the x86 MMU)16:40:56
@raitobezarius:matrix.orgraitobezariuscan we have the meme16:41:10
@raitobezarius:matrix.orgraitobezariuswith like AMD SEV, Intel TDX, etc.16:41:19
@hexa:lossy.networkhexaif you want to contribute to a hardening effort the hydra repo is open for contributions16:41:59
@hexa:lossy.networkhexaif you want to brainstorm ideas to rotate keys, there is an open RFC for that16:42:15
@hexa:lossy.networkhexa if you want to meme, maybe take it to #offtopic:nixos.org? 🤔 16:42:31
@hexa:lossy.networkhexabecause I want all of those things as well, but poking won't make it go any faster16:43:09
@raitobezarius:matrix.orgraitobezariusi will prefer implementing key rotation directly, sorry for disturbing the forces at work here :)16:43:11
@vcunat:matrix.orgVladimír ČunátI believe the RFC is complete and easy to just plan/deploy.16:45:15
@vcunat:matrix.orgVladimír ČunátIt just got very little feedback (in my opinion).16:45:36
@vcunat:matrix.orgVladimír Čunát * I believe the RFC is complete and easy to just plan/deploy. 16:47:23
@emilazy:matrix.orgemilyis it more elaborate than just "ship the new signing keys in default configurations alongside the old ones, wait M time, switch over signing to new keys, wait N time, remove old key from config"?16:47:29
@emilazy:matrix.orgemily(or I guess you could sign with both keys for a while?)16:47:34
@emilazy:matrix.orgemilyok I'll just read it :)16:47:41

Show newer messages


Back to Room ListRoom Version: 6