• user28282912@piefed.social
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    19 hours ago

    So … device attestation … the same shit coming from Google, Microslop and others. At least Poettering is consistent with his shit ideation.

  • fruitycoder@sh.itjust.works
    link
    fedilink
    arrow-up
    4
    ·
    19 hours ago

    People are wild. Its just like locks on doors. Yes very useful, the user should have the keys, yeah corperate ownership of keys is nightmare.

  • khorovodoved@lemmy.zip
    link
    fedilink
    arrow-up
    22
    arrow-down
    11
    ·
    1 day ago

    So, basically, they want to do to Linux what google is doing to android and tried to do to web. No, thanks.

    • ashx64@lemmy.world
      link
      fedilink
      arrow-up
      26
      arrow-down
      1
      ·
      1 day ago

      That’s not at all what this about. Poettering has given quite a few talks about this subject, that being Linux boot chain verification and integrity.

      One of the core concepts is measured boot. The TPM on your CPU measures the values of various pieces of software in the boot chain. If a measurement does not match, then the system will not boot because it could be compromised.

      And unlike secure boot, this is a decentralized system. It’s not some corporation like Microsoft saying “this software is signed with this approved key, so it may boot”. It’s your own system checking the software and recording the expected value so that when you boot up, it checks again to make sure they match.

      It’s not about apps asking doing things like DRM checks or anything like that. In fact, it can’t. GrapheneOS implements a system just like this to ensure the OS has not been tampered with.

      • khorovodoved@lemmy.zip
        link
        fedilink
        arrow-up
        3
        arrow-down
        4
        ·
        22 hours ago

        The problem is that this value can be compared to a list of “allowed” values. Therefore it opens the gate to creating software that would require only certain “whitelisted” systems to run it. Such list can be easily updated automatically once those “whitelisted” systems update. Therefore an argument “updates would break it” do not actually work.

        This is precisely how play integrity works on android. And Poettering intensions do not matter much. His system can be used like that and therefore it will be used like that.

        • ashx64@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          12 hours ago

          The problem I see with that is that these values are far from regular. At the very least, the TPM will be checking the Linux kernel, bootloader, BIOS firmware. Any update to those will result in different measurements. And it’s not just the version that matters, but also the configuration. And there’s more things the TPM can measure, like connected hardware devices.

          To reiterate, it’s not the case that the distro provides a hash of what the measurement should be. When you install, the actual software gets installed gets measured and recorded. That first measurement is automatically trusted, assumed to be good. It’s unique to your machine. Your machine will only boot so long as those measurements match. Those measurements only get updated when measurements are re-run, which is done after system upgrades.

          Creating an allow list that works for most people would be next to impossible. The Secure Boot approach is much more suited for this task. I can only see this TPM allow-list approach working on corporate machines with controlled hardware and software updates. But at that point, using a custom secureboot key is easier and less liable to break.

      • khorovodoved@lemmy.zip
        link
        fedilink
        arrow-up
        8
        arrow-down
        1
        ·
        edit-2
        1 day ago

        They want to create a mechanism for software to determine on which system it allows a user to run itself. Google “play integrity” on android and google’s proposal for web integrity API.

        • DFX4509B@lemmy.wtf
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          1
          ·
          edit-2
          1 day ago

          Good luck. Take away the main reason people move off Windows to begin with and see how well that goes, especially for alt-init distros.

        • anothermember@feddit.uk
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 day ago

          They haven’t announced anything other than a vague outline of what they’re trying to solve, it could be implemented in so many ways at this point.

          • ashx64@lemmy.world
            link
            fedilink
            arrow-up
            7
            ·
            1 day ago

            It’s not vague at all if you know Poettering and have watched his talks.

            This is about securing the boot chain to ensure the integrity of the OS. Ie, someone hasn’t replaced your GRUB with one that looks exactly the same but secretly records your disk password.

            It does so in a decentralized way, so anything like Play Integrity would not make sense in the slightest. It’s the TPM chip measuring values and ensuring they match previous recorded values (and the values to change, such as after updates, so after updates are run, the expected values are updated). It’s not a Secureboot-like system that would make it more feasible to have a Play Integrity-like system.

            • notabot@piefed.social
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              11 hours ago

              The problem with entire concept is the assertion that “after updates are run, the expected values are updated”. If the administrator can cause the expected values to be updated, you must assume that an attacker who can replace GRUB, in your example, can too, rendering the whole thing ineffective. If the administrator can not cause the expected values to be updated, we’re into an Android like situation, where the vendor decides what you’re allowed to run on your machine. Neither outcome is better than what we have now.

              Lennart Pottering has an unfortunate habbit of deciding to fix problems that don’t actually need fixing, then coming up with a vastly overcomplicated solution, takes years to implement, and doesn’t actually provide much or any benefit over what existed before. Any benefit that does occur tends to be the sort of thing that could easily have been added to the previous system, but noone had because it wasn’t actually a pressing concern. One need only look at his history with PulseAudio and systemd to see examples of this. He also tends to be quite rude and dismissive to anyone questioning him, or pointing out architectural issues.

          • khorovodoved@lemmy.zip
            link
            fedilink
            arrow-up
            8
            arrow-down
            4
            ·
            1 day ago

            The language used speaks for itself. We already know what “integrity” means in this context.

            the company wants Linux systems to be built so their correctness can be explicitly defined and continuously verified.

            This does not seem vague to me. It explicitly states what they are creating.

            • anothermember@feddit.uk
              link
              fedilink
              English
              arrow-up
              5
              arrow-down
              1
              ·
              1 day ago

              But how it’s implemented means everything. Google’s play integrity is corrupting because it’s designed to lock vendors in to Google’s proprietary ecosystem. You’re not getting that from this ‘language’ alone, it could be the case but it’s a massive leap at this point.

              • khorovodoved@lemmy.zip
                link
                fedilink
                arrow-up
                6
                ·
                edit-2
                1 day ago

                I do not care if it is connected to proprietary ecosystem or not. The freedom to decide what software am I allowed to run on my PC is important for me though. Any system that limits that freedom is evil by definition.

                • anothermember@feddit.uk
                  link
                  fedilink
                  English
                  arrow-up
                  3
                  ·
                  1 day ago

                  The freedom to decide what software am I allowed to run on my PC is important for me though

                  I’m right with you there, and it’s proprietary software that threatens that, nothing included in this announcement does though.

      • khorovodoved@lemmy.zip
        link
        fedilink
        arrow-up
        12
        arrow-down
        2
        ·
        1 day ago

        Voluntary for developer? Sure. Voluntary for the user who can’t run software because it requires this shit? Not so sure.

    • Soot [any]@hexbear.net
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 day ago

      I don’t think this is accurate. What Google is doing is making the whole ecosystem depend on Google’s approval to be allowed to work.

      In this case, they seem to be claiming they’re just doing real-time checking of processes as they run (presumably stuff like checksuming loaded libraries, looking for memory overruns, etc.), and so detecting certain signs of malware or system corruption.

      To be honest, based on the announcement it sounds completely unnecessary, but I don’t think they’re at all doing what Google is doing.

      • khorovodoved@lemmy.zip
        link
        fedilink
        arrow-up
        6
        ·
        1 day ago

        That is kinda what google does as well. It calculates checksums of certain system components and compares it to a checksum in database.

        What you are describing is usually called antivirus. But they call their system “integrity”. That word is used for other things in this context.

        • Soot [any]@hexbear.net
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          edit-2
          22 hours ago

          Then I have no idea what you’re referring to by ‘what google is doing to android and tried to do to web’ because as far as I know, that isn’t relevant.

          What I’m describing is definitively not antivirus. Antiviruses use heuristics (and known checksums of bad things) to scan processes/files/network traffic/system calls for dangerous patterns. They’re not doing real-time checksuming to detect system corruption or malfunction, they’re not comparing known system files because that’s complex and hard to do, and seems to be what the company is claiming here.

          I have no idea what Google checksuming you’re referring to but as far as I’m aware that’s a not thing they’re doing to android and trying to do web. Everything Linux (including Android) does some amount of checksums at certain points because they’re useful, but not real-time process checksums. I assumed you were surely referring to them requiring that apps get signed by their certificates, making everything subject to their approval. Which is different from realtime checksumming for integrity.

    • jokro@feddit.org
      link
      fedilink
      arrow-up
      1
      ·
      22 hours ago

      It sounds like verifying the integrity of servers to me and used by the administrator

    • P03 Locke@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      2
      ·
      20 hours ago

      It’s amazing that this is now a downvoted opinion.

      The overall concept seemed fine, but it’s mired in some truly dogshit design decisions.

    • ∟⊔⊤∦∣≶@lemmy.nz
      link
      fedilink
      arrow-up
      4
      ·
      1 day ago

      I like SystemD. I’ve found it fairly simple to use one thing to do all the basics I want, instead of 20 different programs with different config locations etc.

      • RalfWausE@feddit.org
        link
        fedilink
        arrow-up
        2
        ·
        1 day ago

        This is fine, and one of the strong points of a diverse software ecosystem: Chose what works best for you.

    • trevor (he/they)@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      21 hours ago

      Binary logging is some of the most asinine shit I’ve ever had to deal with on Linux (and yes, I know you can change it, but it being the default behavior is beyond absurd).

    • notabot@piefed.social
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 day ago

      I’m with you on that, it’s massively over complex, intrudes into systems it has no place in, and has way too many bad design choices. The designers made the fundamental mistake of wanting it to do everything okish, rather than one thing well. The worst part is that pretty much everything people poibt to as benefits could have trivially been added to tools like sysvinit and rsyslogd.

      It’s probably a lost cause, and I don’t think there are many of of us left who remember how to work with the tools that embody the “do one thing, well” philosophy, or how that led to stable, predictable, and easy to manage systems.

    • rav3n@ttrpg.network
      link
      fedilink
      arrow-up
      1
      ·
      1 day ago

      I notice a lot of the Linux community tends to dislike things that makes life easier for users.

      • notabot@piefed.social
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        11 hours ago

        It really isn’t. It feels fancy and like it does allsorts of clever stuff, but actually what you have is a massively over complex architecture, a non-deterministic (or perhaps a better term would be unpredictable) boot order, binary logging, excessively verbose configuration, and still some fundamental bugs in important daemons. You can fix almost all of that, but you shouldn’t have to. We had a solid, simple system before, now we have an over complex mess.

        • Laurel Raven@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          11 hours ago

          And everything it touches, it feels like it does differently just to be incompatible and extra, and like it goes out of its way to obfuscate everything to force you to use their programs to configure it rather than config files