!LemuOOvbWqRXodtSsw:nixos.org

NixOS Reproducible Builds

533 Members
Report: https://reproducible.nixos.org Project progress: https://github.com/orgs/NixOS/projects/30119 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
21 Jun 2021
@foxboron:archlinux.orgFoxboroninitramfs isn't actually protected by secure boot. But if you make a unified EFI image with initramfs+kernel it is. Hmmmm. Ahh this would be a cool feature08:43:33
@linus.heckemann:matrix.mayflower.deLinux HackermanOh right, yeah, just saw that in https://github.com/NixOS/nixpkgs/pull/53901/files#diff-14341d580318ebe4f2ce22e4fc94c02f6a56229cdc7ae939728628a47b9e6b39R144-R149 :)08:44:00
@foxboron:archlinux.orgFoxboron Make a seperate initramfs with the key in kernel/x86/key/somecert.cert (this is what microcode does for early boot loading) which you can concat with microcode + initramfs. 08:44:49
@foxboron:archlinux.orgFoxboronThis is me theorizing what alternative key loading would look like fwiw08:45:32
@fgaz:matrix.orgfgaz joined the room.10:05:45
@baloo_:matrix.orgbaloo1486 out of 1486 (100.00%) paths in the minimal installation image are reproducible! πŸŽ‰πŸŽ‰πŸŽ‰12:48:25
@baloo_:matrix.orgbaloo
In reply to @foxboron:archlinux.org
initramfs isn't actually protected by secure boot. But if you make a unified EFI image with initramfs+kernel it is. Hmmmm. Ahh this would be a cool feature

That is pretty easy to do actually.

https://github.com/baloo/reproducibility-lab/tree/main/pkgs/uefi-bundle

I haven’t worked on injecting the key from the secureboot but that does not sound impossible.

13:32:28
@baloo_:matrix.orgbalooAlthough if I might be pessimistic a bit. Not too sure all too many people have a practical use case for it13:33:46

Show newer messages


Back to Room ListRoom Version: 6