GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Lennart Poettering (pid_eins@mastodon.social)

  1. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:52 JST Lennart Poettering Lennart Poettering
    in reply to
    • Klaus Frank
    • Timothée Ravier

    @agowa338 @siosm not sure what you are going on about, but the way the trust chain concept works on modern computers is that you boot up in a trusted state, and then chain everything else from there. Hence of course, you reboot to reset the state, to get your trust chain into a clean state again?

    Note that all of systemd's factory reset work actually runs from the initrd, i.e. under the assumption of an UKI world in a fully vendor signed part of the OS with only minimal input from elsewhere.

    In conversation about 11 days ago from gnusocial.jp permalink
  2. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:50 JST Lennart Poettering Lennart Poettering
    in reply to
    • Timothée Ravier

    @siosm you definitely need to reboot, to get back into an unbroken chain of trust. Now you have two ways to ensure this works. First of all you physically request the reset early during boot. That's why we have this in the boot menu. Or you ask for the reset from the compromised running system, and then use some form of attestation to validate that the reboot was genuine. The latter is stuff bigger deployments (i.e. companies which actually do attestation) can do, …

    In conversation about 11 days ago from gnusocial.jp permalink
  3. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:48 JST Lennart Poettering Lennart Poettering
    • Klaus Frank
    • Timothée Ravier

    @agowa338 @siosm sure, if you can afford to dump all hw on the trash and never use them again, if you have the suspicion that they got compromised, knock yourself out. Not cool for the environment, kinda wasteful, but whatever.

    I am pretty sure most people outside your bubble probably prefer a reasonable mechanism to maybe not waste all those resources, and get a clear and reasonably secure way to get the systems back to work.

    In conversation about 11 days ago from mastodon.social permalink
  4. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:47 JST Lennart Poettering Lennart Poettering
    in reply to
    • Klaus Frank
    • Timothée Ravier

    @agowa338 @siosm

    also, it's actually mostly fine to boot from a compromised disk as long as every resource involved is properly authenticated. Of course, the less you boot the better, but again when resetting the disks like this we do this from the initrd, i.e. from the signed, vendor-supplied UKI in a short-lived environment, not from the rootfs that might be user (and thus attacker) controlled.

    But I think ultimately we can just agree to disagree on the security model, no?

    In conversation about 11 days ago from gnusocial.jp permalink
  5. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:46 JST Lennart Poettering Lennart Poettering
    in reply to
    • Klaus Frank
    • Timothée Ravier

    @agowa338 @siosm

    we are dumping the *state* on the trash. But a signed UKI isn't precisely "state". It's firmware-authenticated immutable vendor code.

    But dunno, I think we should end this here. You have your security model, I have mine, let's just agree to disagree on it.

    In conversation about 11 days ago from gnusocial.jp permalink
  6. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:45 JST Lennart Poettering Lennart Poettering
    • bluca
    • Klaus Frank
    • Timothée Ravier

    @agowa338 @bluca @siosm you can store the UKI signing key on any pkcs11 device btw, i.e. a yubikey if you like. An attacker who takes over your system shouldn't be able to get to that, if you lock it with pin + fingerprint.

    In conversation about 11 days ago from mastodon.social permalink
  7. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:45 JST Lennart Poettering Lennart Poettering
    in reply to
    • Klaus Frank
    • Timothée Ravier

    @agowa338 @siosm sure if you make your UKI signing keys accessible to an attacker then of course there's no way to recover. Maybe don't do that then...

    In conversation about 11 days ago from gnusocial.jp permalink
  8. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:44 JST Lennart Poettering Lennart Poettering
    in reply to
    • Klaus Frank
    • Timothée Ravier

    @agowa338 @siosm if you compile your own kernels you are your own OS vendor. In that case you better take care of your signing keys.

    But this is not how most Linux distros or big installs are set up: they run kernels put together and signed on build systems, and those are distinct from the systems they are run on, and the signing keys are not available there.

    In conversation about 11 days ago from gnusocial.jp permalink
  9. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:23 JST Lennart Poettering Lennart Poettering

    1️⃣2️⃣ Here's the 12th post highlighting key new features of the upcoming v258 release of systemd. #systemd258

    I believe a fundamental aspect of OS security must be a secure way to return the OS into a well-defined, secure state if a compromise has been identified.

    Fending of an attacker is one thing, accepting that it might happen anyway and that you can recover from that in a reasonable way is another. And that's the case not only if you think about "cattle" style installs…

    In conversation about 11 days ago from mastodon.social permalink
  10. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:22 JST Lennart Poettering Lennart Poettering
    in reply to

    But only to some point. First of all "reinstalling your Linux" is not precisely a trivial operation, and secondly, in today's world it's actually not really going to suffice in many ways. That's because it's not sufficient to erase your HDD an reinitialize it. There's more state to reset. One of them in particular is the TPM: local key material is derived from or protected by a "seed" key stored on the TPM.

    In conversation about 11 days ago from mastodon.social permalink
  11. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:22 JST Lennart Poettering Lennart Poettering
    in reply to

    … (i.e. lots of similar systems running the same OS image), but equally on "pet" style installs (i.e. your personal device).

    Or to turn this around, a system that doesn't come with a clean, well defined mechanism to reset it fully, erase all unauthenticated data and return it to a vendor image without any local modifications, is highly problematic I believe.

    Now you might say: "I can always reinstall my Linux" and start from scratch. And to some point you are right even.

    In conversation about 11 days ago from mastodon.social permalink
  12. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:21 JST Lennart Poettering Lennart Poettering
    in reply to

    And once the system comes back again the system is fully reset.

    This currently does not cover EFI var NVRAM reset natively, but there's a clean plugin interface now to do that eventually (two actually: one place where you can plug in such code *before* we reboot, and one place *after* we reboot). [I'd expect that in one of the next releases we'll add another plugin for this, that erases certain EFI vars in NVRAM].

    In conversation about 11 days ago from mastodon.social permalink
  13. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:21 JST Lennart Poettering Lennart Poettering
    in reply to

    With v258 we considerably extended this work.There's now a well defined way to extend the factory reset logic so that other subsystems can be reset too. And we do ship one plugin for that (which is enabled by default), that requests a TPM reset from the firmware.

    If your OS is properly set up for that you can now issue "systemctl start factory-reset.target". This will initiate a reboot, but a special one, where first the firmware will reset the TPM, and then the OS will reset its own state.

    In conversation about 11 days ago from mastodon.social permalink
  14. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:21 JST Lennart Poettering Lennart Poettering
    in reply to

    If you do not invalidate the old seed key and generate a new one, then all secrets associated with the compromised install (and thus tainted) will remain valid.

    And there's more: there are various bits stored in EFI vars NVRAM that need to be reset too (shim keys for example).

    systemd for a longer time has had really nice support for resetting your HDD (i.e. securely erase partitions, via the systemd-repart FactoryReset= knob) if a factory reset is requested.

    In conversation about 11 days ago from mastodon.social permalink
  15. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:20 JST Lennart Poettering Lennart Poettering
    in reply to

    There's also now a Varlink based API to query the current factory reset state (i.e. is a factory reset pending for the next reboot, or are we currently executing one for the current boot, or did we already finish one for the current boot, or is none pending nor executing).

    If you want to learn more about the factory reset concepts in systemd, there is a new document for this:

    https://github.com/systemd/systemd/blob/main/docs/FACTORY_RESET.md

    In conversation about 11 days ago from mastodon.social permalink
  16. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:05:23 JST Lennart Poettering Lennart Poettering
    in reply to

    In v258 we updated this area substantially. There's now a Varlink IPC call to subscribe to all DNS configuration changes (io.systemd.Resolve.Monitor.SubscribeDNSConfiguration() on /run/systemd/resolve/io.systemd.Resolve.Monitor).

    If you issue this you'll get a stream of updates of the DNS configuration as they happen.

    Why is this useful? This is used by systemd-networkd-wait-online's new --dns switch. If specified it will not only wait until a suitable network interface with…

    In conversation about 11 days ago from mastodon.social permalink
  17. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:05:23 JST Lennart Poettering Lennart Poettering

    1️⃣3️⃣ Here's the 13th post highlighting key new features of the upcoming v258 release of systemd. #systemd258

    One of systemd-resolved's fundamental jobs is to maintain per-interface and global DNS configuration (as well as per-delegate configuration, as described earlier in this series). We always provided D-Bus APIs to query the current state of this, and "resolvectl" to a large degree is just a wrapper around that.

    In conversation about 11 days ago from mastodon.social permalink
  18. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:03:51 JST Lennart Poettering Lennart Poettering

    1️⃣4️⃣ Here's the 14th post highlighting key new features of the upcoming v258 release of systemd. #systemd258

    The concept of system credentials has existed since a while in systemd. It allows parameterizing the system (and the services running on it) in a secure and hierarchical way. You can pass them into containers and into VMs, for example via SMBIOS Type #11 vendor strings. While the transport is low-level and firmware compatible, they can reasonably only be consumed in userspace.

    In conversation about 11 days ago from mastodon.social permalink
  19. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Tuesday, 03-Jun-2025 18:52:05 JST Lennart Poettering Lennart Poettering

    9️⃣ Here's the 9th post highlighting key new features of the upcoming v258 release of systemd. #systemd258

    Most Linux folks probably spend much of their day in their terminal emulator. Such emulators ultimately reimplement in software what dedicated hardware terminals did in the 1980's and before. While the protocol terminals speak didn't change much in its most basic concepts, various extensions have been added over the years to integrate terminal emulators better with the windowing…

    In conversation about 20 days ago from mastodon.social permalink
  20. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Saturday, 31-May-2025 15:08:30 JST Lennart Poettering Lennart Poettering

    5️⃣ Here's the 5th post highlighting key new features of the upcoming v258 release of systemd. #systemd258

    On modern Linux systems the persistent hostname is configured in /etc/hostname. Linux people treating their devices like pets tend to come up with nice, imaginative names for their hosts.

    But this doesn't scale: if you have a large number of devices to manage (i.e. "cattle") then you typically want something more automatic: the hostnames used should follow some specific pattern, …

    In conversation about 23 days ago from mastodon.social permalink
  • Before

User actions

    Lennart Poettering

    Lennart Poettering

    ⛵ I write software. ⛵

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          92094
          Member since
          26 Jan 2023
          Notices
          191
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.