!coeAONBrWyDJnYMbMi:nixos.org

NixOS System Operations

563 Members
About system administration for running NixOS systems in production. Declaratively manage your operations. | Room recommendations: #networking:nixos.org150 Servers

Load older messages


SenderMessageTime
30 Oct 2024
@flare:matrix.darkc0de.oneflarehaven't tried it yet tho since most of my nvmes get exposed as USB UAS device from enclosures23:14:05
@paulgdpr:matrix.orgPaul joined the room.23:38:42
31 Oct 2024
@frederic:scs.ems.hostFrédéric Christ joined the room.08:55:09
@shaderoit99:matrix.org@shaderoit99:matrix.org joined the room.12:26:26
@elvishjerricco:matrix.orgElvishJerricco
In reply to @adam:robins.wtf
I just got a new nvme for my main desktop/server. Should I do disk encryption this time?
I always encrypt but it's usually because I have some new overly complicated thing I want to try out
20:26:57
@elvishjerricco:matrix.orgElvishJerricco see: this wonderful disaster 20:28:22
@elvishjerricco:matrix.orgElvishJerricco or this one 20:29:06
@sophie:sophiecat.pwsophie
In reply to @elvishjerricco:matrix.org
see: this wonderful disaster
what is this...?
21:10:55
@elvishjerricco:matrix.orgElvishJerricco sophie: some (slightly outdated) modules I use to do a cursed combination of remote attestation and TPM2-bound disk encryption with tailscale 21:11:50
@sophie:sophiecat.pwsophieI'm just trying to unpick how the remote attestation works21:12:35
@elvishjerricco:matrix.orgElvishJerriccobasically, there's a TPM2-bound zvol that contains SSH host keys and tailscale state. This allows me to remote in, and the fact that tailscale and SSH host keys were automatically decrypted informs me that the TPM2's boot measurements were correct. Once logged in, I can enter the TPM2 pin for decrypting the root FS21:13:36
@elvishjerricco:matrix.orgElvishJerricco it would be better to do, like, actual remote attestation, but this is adequate 21:14:13
@sophie:sophiecat.pwsophieah so the system boots into a state and waits for the TPM2 pin to be provided over the SSH session it started with the protected host keys21:15:07
@elvishjerricco:matrix.orgElvishJerriccoyep21:15:15
@elvishjerricco:matrix.orgElvishJerriccoso the host keys are critical. They basically are the attestation21:15:29
@sophie:sophiecat.pwsophieinteresting. I've always wanted to try out that remote attestation and stuff21:16:01
@elvishjerricco:matrix.orgElvishJerriccoeventually I'm going to get it set up with some kind of app on my phone, so the server sends a notification to my phone with a remote attestation report and asks the phone to decrypt the volume key. I check the app, give it a nod of approval, and the system boots21:17:06
@sophie:sophiecat.pwsophieif you're using Android, you can put the keys into an encrypted space with the encryption keys protected by the secure element too :) might be possible on iOS too but not tried that21:18:52
@elvishjerricco:matrix.orgElvishJerriccoyea, tough choice between storing a wrapped key on the disk vs storing a wrapped key on the phone21:20:40
@elvishjerricco:matrix.orgElvishJerriccodifferent tradeoffs between the two21:20:46
@sophie:sophiecat.pwsophiecould either use the stored key on the phone as the TPM2 pin or have the password be a combination of both keys21:22:15
@elvishjerricco:matrix.orgElvishJerriccoyea that's interesting21:23:17
1 Nov 2024
@thamenato:matrix.orgThales Menato joined the room.01:28:00
@ryan4yi:matrix.orgRyan Yin joined the room.14:20:56
2 Nov 2024
@birhaman:pub.solarBirhaman changed their profile picture.03:42:05
@birhaman:pub.solarBirhaman changed their profile picture.03:45:35
@icarus_dh:matrix.org@icarus_dh:matrix.org joined the room.14:07:03
3 Nov 2024
@oneeyed:matrix.orgSam joined the room.14:34:19
@mrtrk:matrix.org@mrtrk:matrix.org left the room.16:15:51
@kyaru:ptt.moeKiruya Momochi 百地希留耶 joined the room.19:50:31

Show newer messages


Back to Room ListRoom Version: 10