!UUqahLbShAYkkrXmKs:matrix.org

DevOS

32 Members
Seeking help and geeking out together on https://github.com/divnix/devos & https://github.com/divnix/digga10 Servers

Load older messages


SenderMessageTime
25 Oct 2021
@blaggacao:matrix.orgDavid Arnold (blaggacao)Because knowledge is fundamentally fungible.18:55:06
@blaggacao:matrix.orgDavid Arnold (blaggacao)Observable attributes are not.18:55:34
@timdeh:matrix.org@timdeh:matrix.orgwell I guess it depends on what you mean by knowledge, because kernel hashes of running processes still fall into the category of knowledge to my mind 18:55:42
@blaggacao:matrix.orgDavid Arnold (blaggacao)Those would be trustes, observable, attributes. After having got past the problem of boostrapping trust.18:56:19
@blaggacao:matrix.orgDavid Arnold (blaggacao)* Those would be trusted, observable attributes. After having got past the problem of boostrapping trust.18:56:36
@blaggacao:matrix.orgDavid Arnold (blaggacao)And the quality of the trust anchor remains, as always, no constant.18:57:10
@blaggacao:matrix.orgDavid Arnold (blaggacao)If the kernal is compromised, then...18:57:21
@blaggacao:matrix.orgDavid Arnold (blaggacao)* If the kernal is compromised, so is trust.18:57:33
@blaggacao:matrix.orgDavid Arnold (blaggacao)* If the kernel is compromised, so is trust.18:57:48
@blaggacao:matrix.orgDavid Arnold (blaggacao)If the attestor is compromised, so is trust.18:57:59
@blaggacao:matrix.orgDavid Arnold (blaggacao)A short lived certificate is only fungible during its TTL.18:58:58
@blaggacao:matrix.orgDavid Arnold (blaggacao)I think all this kind of shows: keeping high frust levels about an identity is primarily a runtime concern.19:05:31
@blaggacao:matrix.orgDavid Arnold (blaggacao)* I think all this kind of shows: keeping high trust levels about an identity is primarily a runtime concern.19:05:41
@blaggacao:matrix.orgDavid Arnold (blaggacao)* I think all this kind of shows: keeping high trust levels about an identity is primarily a runtime concern. Since it's at runtime that intruders operate.19:05:57
@blaggacao:matrix.orgDavid Arnold (blaggacao)I can imagine scenarios where fungible yet long lasting identities is actually what is desired, for example a crypto wallet's private key.19:10:17
@teutat3s:pub.solar@teutat3s:pub.solar
In reply to @teutat3s:pub.solar
❯ nixos-option -I nixpkgs=/nix/store/37gmnpdbgcfhfd577ijm1b0yxaxp2pwk-source/lib/compat boot.loader
terminate called after throwing an instance of 'nix::EvalError'
  what():  cannot import '/nix/store/bc0cqsq1fklw4k61y5v3xinalshrfz8k-6mfkswqi67m35qwv0vh7kpk8rypbl2rq-source/flake.nix', since path '/nix/store/bc0cqsq1fklw4k61y5v3xinalshrfz8k-6mfkswqi67m35qwv0vh7kpk8rypbl2rq-source' is not valid, at /nix/store/0n6nqnb6b6cs3hjqprq9k10a1nc2rgiy-source/default.nix:134:19
zsh: abort (core dumped)  nixos-option -I  -I  boot.loader
Any ideas how I could make nixos-option work again after the garbage collector struck? (I'm stuck in this state, altough I applied the fixing commit)
22:43:59
@teutat3s:pub.solar@teutat3s:pub.solar
In reply to @teutat3s:pub.solar
❯ nixos-option -I nixpkgs=/nix/store/37gmnpdbgcfhfd577ijm1b0yxaxp2pwk-source/lib/compat boot.loader
terminate called after throwing an instance of 'nix::EvalError'
  what():  cannot import '/nix/store/bc0cqsq1fklw4k61y5v3xinalshrfz8k-6mfkswqi67m35qwv0vh7kpk8rypbl2rq-source/flake.nix', since path '/nix/store/bc0cqsq1fklw4k61y5v3xinalshrfz8k-6mfkswqi67m35qwv0vh7kpk8rypbl2rq-source' is not valid, at /nix/store/0n6nqnb6b6cs3hjqprq9k10a1nc2rgiy-source/default.nix:134:19
zsh: abort (core dumped)  nixos-option -I  -I  boot.loader
* Any ideas how I could make nixos-option work again after the garbage collector struck? (I'm stuck in this state, although I applied the fixing commit)
22:44:14
@timdeh:matrix.org@timdeh:matrix.orgforget about nixos-option, we should remove our old hack22:46:03
@timdeh:matrix.org@timdeh:matrix.org just enter a repl and load the flake with :lf . 22:46:12
@timdeh:matrix.org@timdeh:matrix.org then you can see all the declared options from nixosConfigurations.yourSystem.config 22:46:32
@teutat3s:pub.solar@teutat3s:pub.solarah great, thanks - I'll try that instead22:46:49
26 Oct 2021
@blaggacao:matrix.orgDavid Arnold (blaggacao)We should probably remove that then. 🙂00:14:08
@blaggacao:matrix.orgDavid Arnold (blaggacao)... an opportuity for PR-merged-in-5-mins. 😆00:15:02
@timdeh:matrix.org@timdeh:matrix.orgindeed, bonus points if you replace it with a script that just does the above repl trick for you perhaps?00:19:01
@grahamc:nixos.org@grahamc:nixos.orgchanged room power levels.01:15:49
@mjolnir:nixos.org@mjolnir:nixos.org changed their display name from mjolnir to NixOS Moderation Bot.02:00:11
@mjolnir:nixos.org@mjolnir:nixos.org set a profile picture.02:00:28
@mjolnir:nixos.org@mjolnir:nixos.org changed their profile picture.02:23:42
@mjolnir:nixos.org@mjolnir:nixos.org changed their profile picture.02:33:13
@teutat3s:pub.solar@teutat3s:pub.solar Do we still need lib/compat for other things in the template?
Do you know how to pass arguments for execution to the interactive command nix repl?
08:31:43

Show newer messages


Back to Room ListRoom Version: 6