NixOS Security Triage | 691 Members | |
| Coordination and triage of security issues in nixpkgs | 215 Servers |
| Sender | Message | Time |
|---|---|---|
| 4 Jul 2024 | ||
| 16:01:33 | ||
| 19:10:30 | ||
| 5 Jul 2024 | ||
| Hey,
Which doesn't really make sense to me, because the original CVE applied to BIOS systems mostly. So leaving BIOS systems the same wouldn't fix the issue. Someone reported this here, I could reproduce this with the latest Nixos-GNOME ISO, with the following steps:
After the installation is done, there is an luks-keyfile in an zstd/cpio archive in /boot/kernels/***-secrets, which does open the root partition. | 11:36:34 | |
| thank you for the report | 11:48:34 | |
| https://github.com/NixOS/calamares-nixos-extensions/pull/25 says "#21 broke encrypted swap by mishandling the removal of crypto_keyfile.bin. This reverts the original fix. Instead, we leave BIOS the same; that was secure as it was before", I guess this was just a misunderstanding of the vuln? :/ | 11:49:21 | |
| maybe it's better to revert and let encrypted swap be broken while we figure out what the proper fix is? | 11:50:59 | |
| (I guess this is going to require another GHSA? it's the month of security regressions…) | 11:51:25 | |
| not an expert in this area though so I'll defer to those who are | 11:51:32 | |
| pinged elvishjerrico in #dev:nixos.org | 11:54:40 | |
| i'm confused by the reports | 11:57:01 | |
| it took me time to reload the context | 11:57:05 | |
| but BIOS GRUB users are protected by cryptodisk | 11:57:13 | |
In reply to @emilazy:matrix.org Thanks, I didn't look at the pull request yet. They also write:
Since they are specifically writing about unencrypted root partitions only, it seems like they thought it wouldn't be an issue for an encrypted root partiton? Anyway, I guess this was a misunderstanding about the vulnerability. BIOS setups were definitly affected, the GHSA did specifically say it affects "non-UEFI systems". | 11:57:52 | |
In reply to @raitobezarius:matrix.org the advisory says
| 11:58:16 | |
I guess the key there is "unencrypted /boot"? | 11:58:22 | |
In reply to @raitobezarius:matrix.orgCould you elaborate on that? | 11:58:27 | |
UEFI ~always has unencrypted /boot, but on BIOS the happy path is for it to be encrypted? | 11:58:36 | |
| ok the key is indeed forcing to create an unencrypted /boot | 11:58:40 | |
| this should be an invalid configuration | 11:58:51 | |
| without manual partitioning, you cannot reach that state, right? | 11:59:08 | |
| so not sure if it's vuln or (big big) footgun | 11:59:22 | |
| the manual partitioning caveats are pretty scary if users have managed to independently construct an insecure configuration in the wild :( | 11:59:41 | |
In reply to @septem9er:fairydust.spacewell /boot is a cryptodisk in that situation so the keys over there are still as protected as before | 11:59:49 | |
| original reporter says | 12:00:27 | |
| 12:00:28 | |
| but makes no mention of BIOs or UEFI | 12:00:37 | |
| * but makes no mention of BIOS or UEFI | 12:00:41 | |
In reply to @raitobezarius:matrix.orgYeah. The key is an unencryped boot partition, like it was already said. | 12:00:48 | |
In reply to @septem9er:fairydust.spaceyeah but let's distinguish two things | 12:01:04 | |
| (a) the installer creates an unencrypted /boot with an encrypted / by itself | 12:01:15 | |