!oNSIfazDqEcwhcOjSL:matrix.org

disko

353 Members
disko - declarative disk partitioning - https://github.com/nix-community/disko89 Servers

Load older messages


SenderMessageTime
22 Dec 2024
@enzime:nixos.devEnzimeas an immutable root?00:35:25
@waltmck:matrix.orgwaltmck sys is unencrypted 00:35:37
@enzime:nixos.devEnzimewhy not just encrypt it all?00:36:19
@enzime:nixos.devEnzimeI'm not sure if you already have code to auto-rollback the root on each boot, you should be able to do something like: https://github.com/Enzime/dotfiles-nix/blob/main/hosts/sigma/hardware-configuration.nix#L57-L59 https://github.com/Enzime/dotfiles-nix/blob/main/modules/impermanence.nix#L20-L3100:37:16
@waltmck:matrix.orgwaltmckThat would also be reasonable. I don't see why it would necessarily be better than encrypting just the mutable parts00:37:16
@enzime:nixos.devEnzime
In reply to @waltmck:matrix.org
That would also be reasonable. I don't see why it would necessarily be better than encrypting just the mutable parts
I guess it would just simplify because you could make sys your rootfs dataset and have one less dataset
00:37:43
@waltmck:matrix.orgwaltmck
In reply to @enzime:nixos.dev
I'm not sure if you already have code to auto-rollback the root on each boot, you should be able to do something like:
https://github.com/Enzime/dotfiles-nix/blob/main/hosts/sigma/hardware-configuration.nix#L57-L59
https://github.com/Enzime/dotfiles-nix/blob/main/modules/impermanence.nix#L20-L31
yeah, I do that on my laptop. I think it's more inconvenience than it's worth so I'm planning on scrapping it
00:37:44
@waltmck:matrix.orgwaltmckI have ran into terrible issues where impermanence fails to mount something and it prevents a usable system from booting00:38:19
@waltmck:matrix.orgwaltmck
In reply to @enzime:nixos.dev
I guess it would just simplify because you could make sys your rootfs dataset and have one less dataset
One reason is that I am using dedup on my /nix partition, so it has to be a separate dataset anyway. dedup on root would be ill-advised
00:39:00
@waltmck:matrix.orgwaltmck
In reply to @enzime:nixos.dev
I guess it would just simplify because you could make sys your rootfs dataset and have one less dataset
* One reason is that I am using dedup on my /nix dataset, so it has to be a separate dataset anyway. dedup on root would be ill-advised
00:39:18
@enzime:nixos.devEnzime I'm not too familiar with dedup, sys and sys/nix are separate-ish datasets no? 00:40:06
@enzime:nixos.devEnzime
In reply to @waltmck:matrix.org
I have ran into terrible issues where impermanence fails to mount something and it prevents a usable system from booting
I haven't had a chance to try it but I heard this is better than impermanence
00:40:20
@enzime:nixos.devEnzimehttps://github.com/willibutz/preservation00:40:22
@enzime:nixos.devEnzime
In reply to @waltmck:matrix.org
I have ran into terrible issues where impermanence fails to mount something and it prevents a usable system from booting
* I haven't had a chance to try it but I've heard this is better than impermanence
00:40:28
@waltmck:matrix.orgwaltmck
In reply to @enzime:nixos.dev
https://github.com/willibutz/preservation
I'll take a look at that!
00:41:17
@waltmck:matrix.orgwaltmck
In reply to @enzime:nixos.dev
I'm not too familiar with dedup, sys and sys/nix are separate-ish datasets no?
ah I see what you mean here. Yeah, root could be mounted on sys (if I encrypted sys)
00:41:41
@waltmck:matrix.orgwaltmck There is some performance improvement to not encrypting /nix, though it probably isn't very large. Mostly I think it is just cool to be able to have encrypted and unencrypted data on the same filesystem 00:43:18
@enzime:nixos.devEnzime
In reply to @waltmck:matrix.org
There is some performance improvement to not encrypting /nix, though it probably isn't very large. Mostly I think it is just cool to be able to have encrypted and unencrypted data on the same filesystem
the only thing to be aware of is if you don't have anything ensuring the integrity of /nix, theoretically an attacker could update sudo in your /nix/store
00:48:42
@waltmck:matrix.orgwaltmckMy hardware doesn't support verified boot anyway, they could just modify /boot00:49:42
@waltmck:matrix.orgwaltmck * My hardware doesn't support secure boot anyway, they could just modify /boot00:50:11
@enzime:nixos.devEnzimeyeah fair enough00:51:02
@waltmck:matrix.orgwaltmckalso, at least in principle AES does not verify data integrity (only confidentiality). I don't know if ZFS has an additional MAC for integrity, but I don't see that in their docs00:53:48
@waltmck:matrix.orgwaltmckAh wait never mind, ZFS uses galois counter mode which does guarantee integrity00:56:27
@enzime:nixos.devEnzime
In reply to @waltmck:matrix.org
also, at least in principle AES does not verify data integrity (only confidentiality). I don't know if ZFS has an additional MAC for integrity, but I don't see that in their docs
would someone not need your key to encrypt the bytes the same so that when they're decrypted they come out as what the attacker wants?
00:56:53
@waltmck:matrix.orgwaltmck
In reply to @enzime:nixos.dev
would someone not need your key to encrypt the bytes the same so that when they're decrypted they come out as what the attacker wants?
no, not necessarily. Like in CTR mode they could easily compute an encryption of the XOR of your plaintext with an arbitrary string
00:57:52
@enzime:nixos.devEnzimeI guess I'm not super familiar with the different AES modes00:58:16
@enzime:nixos.devEnzime
In reply to @waltmck:matrix.org
Ah wait never mind, ZFS uses galois counter mode which does guarantee integrity
never knew what GCM stood for 😆
00:58:25
@enzime:nixos.devEnzime
In reply to @waltmck:matrix.org
no, not necessarily. Like in CTR mode they could easily compute an encryption of the XOR of your plaintext with an arbitrary string
that's just because it's been broken, not by design right?
00:58:51
@waltmck:matrix.orgwaltmckAES in CTR mode is provably confidential (assuming AES is actually a pseudorandom function, which is thought to be the case)01:01:00
@waltmck:matrix.orgwaltmckThat was always its only guarantee. It can be combined with other cryptographic primitives (like message authentication codes) to get integrity/authenticity, but by itself it is neither01:01:41

Show newer messages


Back to Room ListRoom Version: 10