GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Lennart Poettering (pid_eins@mastodon.social), page 3

  1. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 13-Feb-2025 09:02:23 JST Lennart Poettering Lennart Poettering
    in reply to

    3. You simply reboot that target machine. It will now fetch the UKI kernel, which then fetches the root disk image. And everytime you reboot this happens again. The target's machine#s local disks are unnaffected.

    4. …

    5. Profit!!

    In conversation about 9 months ago from mastodon.social permalink
  2. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 13-Feb-2025 09:02:23 JST Lennart Poettering Lennart Poettering
    in reply to
    • Gerd Hoffmann

    It's mostly to tighten my test loop a bit, for physical devices. So here's what this entails:

    1. You build your image with mkosi one your development machine, and ask it to serve your image as HTTP. In other words: `mkosi -f serve`.

    2. You boot into the target machine once, and register an EFI variable that enables HTTP boot from your development machine. Simply do `kernel-bootcfg --add-uri=http://192.168.47.11:8081/image.efi --title=testloop --boot-order=0`, using @kraxel's wonderful tool.

    In conversation about 9 months ago from mastodon.social permalink
  3. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 13-Feb-2025 09:02:23 JST Lennart Poettering Lennart Poettering
    in reply to

    Net result of this: I can now point my UEFI to a single URL where it will load the UKI from. A few seconds later the initrd will pick up the rootfs from the same source, and boot it up. Magic!

    Why all this though?

    In conversation about 9 months ago from mastodon.social permalink
  4. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 13-Feb-2025 09:02:22 JST Lennart Poettering Lennart Poettering
    in reply to

    and even one more comment:

    next steps: instead of downloading root fs via http, access it via nvme-over-tcp.

    Benefit: better performance (no ahead of time download, but download as needed), and even better: persistency!

    In conversation about 9 months ago from mastodon.social permalink
  5. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 13-Feb-2025 09:02:22 JST Lennart Poettering Lennart Poettering
    in reply to

    oh, and one more comment: this will only work on systems that are relatively high on the systemd adoption scale: you definitely need a systemd-based initrd for this. For deriving the rootfs URL from the UEFI network boot URL you need a systemd-stub based UKI.

    In conversation about 9 months ago from mastodon.social permalink
  6. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 13-Feb-2025 09:02:22 JST Lennart Poettering Lennart Poettering
    in reply to

    WIP PR for all of this is here:

    https://github.com/systemd/systemd/pull/36314

    In conversation about 9 months ago from mastodon.social permalink
  7. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 13-Feb-2025 09:02:22 JST Lennart Poettering Lennart Poettering
    in reply to

    So, two take-aways here:

    1. Really nice test loop now for testing immutable, modern OSes on physical devices, with onboard tooling

    2. Yeah, you can frickin' boot into a damn tarball now, with just an UKI.

    In conversation about 9 months ago from mastodon.social permalink
  8. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Tuesday, 28-Jan-2025 05:13:32 JST Lennart Poettering Lennart Poettering
    in reply to

    And then there are three other talks, in the aforementioned Image-based Linux & Boot Integrity devroom (about systemd & TPMs), in the bootloader devrom (about supercharged UKIs) and in the identity management devroom (about systemd' userdb API).

    In conversation about 9 months ago from mastodon.social permalink
  9. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Tuesday, 28-Jan-2025 05:13:32 JST Lennart Poettering Lennart Poettering

    And then your's truly will give four talks, at various different places. First of all I have a keynote:

    https://fosdem.org/2025/schedule/event/fosdem-2025-6648-14-years-of-systemd/

    And unlike some well-known billionaire I am not going to chicken out of my mine. Ha!

    In conversation about 9 months ago from mastodon.social permalink
  10. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Tuesday, 28-Jan-2025 05:13:32 JST Lennart Poettering Lennart Poettering

    PSA: There's going to be a lot of systemd related stuff going on at FOSDEM this weekend. Many folks from the systemd camp and adjacent will be hanging out at the Image-Based Linux & Boot Integrity devroom:

    https://fosdem.org/2025/schedule/track/image-based-linux/

    In conversation about 9 months ago from mastodon.social permalink
  11. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Tuesday, 28-Jan-2025 05:13:29 JST Lennart Poettering Lennart Poettering

    And of course, outside of the image-based linux track, and other than my own talks there's some more systemd adjacent talks in other tracks, for example, Ani Sinha talks about bring-your-own-firmware UKIs, in confidential computing cloud stuff, booting from mkosi initrd in the network in the distributions devroom (by Antonio Feijoo), running podman containers as systemd services (by Axel Stefanini), and probably some more I missed.

    See you all in Brussels!

    In conversation about 9 months ago from mastodon.social permalink
  12. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Tuesday, 28-Jan-2025 05:13:22 JST Lennart Poettering Lennart Poettering
    • Michel Lind :fedora: :debian:

    @michelin yeah, all the money in the world, and yet he's chickening out when seeing just a tiny bit of opposition...

    In conversation about 9 months ago from mastodon.social permalink
  13. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Tuesday, 21-Jan-2025 06:03:58 JST Lennart Poettering Lennart Poettering
    in reply to
    • Jarkko Sakkinen

    @jarkko It's a long text, but the person writing this is basically saying that a TPM2 policy for a disk that only locks to PCR 7 or not even that is not secure? I mean, no shit sherlock, of course it doesn't. If you policy doesn't lock to anything then it doesn't lock to anything...

    A full boot chain that gets things right would include at least a UKI with a signed PCR policy + a dynamic systemd-pcrlock policy. The combination should be reasonably secure, I'd claim, but if you have neither…

    In conversation about 10 months ago from mastodon.social permalink
  14. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Tuesday, 21-Jan-2025 06:03:57 JST Lennart Poettering Lennart Poettering
    in reply to
    • Jarkko Sakkinen

    @jarkko … then you have only a very weak model, probably to the point it's not worth it.

    What matters is that distributions actually start deploying UKIs like this, and enable systemd-pcrlock by default. This is not trivial, but some distros are further ahead there then others.

    In conversation about 10 months ago from mastodon.social permalink
  15. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Tuesday, 21-Jan-2025 02:43:23 JST Lennart Poettering Lennart Poettering
    in reply to
    • Jens Axboe
    • Omar Sandoval

    @axboe @osandov but the folks who commented there are marked "senior" in their UI. Hence, they are the true *pros*, and you, you are are just ... *somebody*.

    In conversation about 10 months ago from mastodon.social permalink
  16. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Friday, 17-Jan-2025 04:15:52 JST Lennart Poettering Lennart Poettering
    in reply to
    • Morten Linderud

    @Foxboron christ. I guess that means that I am not the only asshole doing a keynote there, eh? ;-)

    In conversation about 10 months ago from mastodon.social permalink
  17. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Friday, 20-Dec-2024 05:05:55 JST Lennart Poettering Lennart Poettering
    in reply to

    …the AF_VSOCK "CID" (which is like an IP address, i.e. an identifier for the local VM) you can specify a friendly machine name, if the VM in question is registered with systemd-machined. systemd-vmspawn sets things up that way out of the box, of course. That means, with current off-the-shelf systemd inside a VM and on the host you can now just do "ssh machine/foobar" to connect to a local VM called "foobar", via AF_VSOCK, i.e. independently of any fragile network.

    In conversation about 11 months ago from mastodon.social permalink
  18. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Friday, 20-Dec-2024 05:05:55 JST Lennart Poettering Lennart Poettering

    3️⃣7️⃣ Here's the 37th post highlighting key new features of the current v257 release of systemd. #systemd257

    In systemd v256 we added a small tool "systemd-ssh-proxy" whose job is to allow connecting to local VMs with ssh via the AF_VSOCK protocol (as opposed to AF_INET/AF_INET6). It acts as host-side counterpart to the guest-side systemd-ssh-generator that automatically binds sshd to AF_VSOCK.

    In systemd v257 the functionality has been updated so that instead of specifying…

    In conversation about 11 months ago from mastodon.social permalink

    Attachments


  19. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Friday, 20-Dec-2024 05:05:54 JST Lennart Poettering Lennart Poettering
    in reply to

    And that's it! After 37 installments I think I covered pretty much all the bigger things in the NEWS file with a story.

    Of course, there's a lot more in this release. For the full list, consult our NEWS file:

    https://github.com/systemd/systemd/blob/70bae7648f2c18010187c9cf20093155eaa26029/NEWS

    Stay tuned so that you won't miss out on the #systemd258 series when the time comes for the next release!

    In conversation about 11 months ago from mastodon.social permalink
  20. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Friday, 20-Dec-2024 05:05:54 JST Lennart Poettering Lennart Poettering
    in reply to

    This is extremely handy, since it "just works" here. In fact, I switched over to this for my private VM needs entirely now.

    (In related news, systemd-ssh-proxy now supports the AF_VSOCK "MUX" protocol too. This means it's now compatible not only with AF_VSOCK how it's implemented by qemu, but also with the implementations in Firecracker/CloudHypervisor)

    In conversation about 11 months ago from mastodon.social permalink
  • After
  • Before

User actions

    Lennart Poettering

    Lennart Poettering

    ⛵ I write software. ⛵

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          92094
          Member since
          26 Jan 2023
          Notices
          202
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.