This comment is particularly concerning (as is the functionality regression implied by this new "more secure" approach):
> This means for example, that an encrypted system must use an ext4 /boot partition; it is no longer possible to encrypt the /boot partition.
So, they want to let attackers modify /boot, including grub.conf and the kernel command line? This is better? Look at all these fun knobs attackers will be able to turn!
This lets you disable machine check exceptions + the iommu. That means it'll force people to use a configuration that lets attackers stick a memory probe hardware device into the system + bypass a bunch of hardware security checks. Nice!
I also found module.sig_enforce which lets the attacker disable kernel module signature verification. Sadly, I couldn't find anything that lets you directly load a kernel module from /boot.
However, init.rd lives in /boot. I wonder if its signature is verified or not. At the very least, this approach implies that attackers can piecemeal downgrade stuff early in the boot process.
jburgess777 14 minutes ago [-]
If you want to avoid the initrd loophole then you will want to look into UKI images. These extend the secure boot signature to include the kernel and ramdisk:
encryption does not protect against malicious modification; authentication does.
izacus 3 hours ago [-]
All those switches and we still can't disable kernel lockdown when hibernation is enabled with secure boot.
longislandguido 6 hours ago [-]
Have they replaced it with grub-rs yet?
On a more serious note, grub is ancient bloatware, it is way overcomplicated for what it does, it's asking to be replaced by systemd-boot distro-wide.
Look at Apple and Microsoft's bootloaders, they are dead simple and have barely changed in 20 years, it makes you wonder how the hell grub was even conceived. It has config files for config files.
grub tries to do the kitchen sink. But we live in a UEFI world now. Boot is simple. None of that is necessary anymore.
pixl97 5 hours ago [-]
> it makes you wonder how the hell grub was even conceived
I'm wondering how much was interop with trying to boot multiple operating systems off the same disk?
justsomehnguy 3 hours ago [-]
In the last 5 years I had too many times when I need to spend literally hours to properly boot the same OS it was installed with. Booting the Win*-like is just a matter of chain loading for CSM or straight pointing to bootmgr.efi on UEFI systems.
I'd like a better boot manager but I sure as hell do not want systemd cancer to spread any further. Especially not after Poettering has started a remote attestation company.
sourcegrift 4 hours ago [-]
Wow, when did he leave microsoft? (I know some might be asking when he joined lol)
systemd-boot is only similar to systemd in name; it started as another project and was renamed.
mirashii 5 hours ago [-]
It’s been merged into the systemd project, so one must assume that the systemd maintainers have some level of influence over it.
longislandguido 5 hours ago [-]
Remind me why I'm supposed to care who the maintainer is for a piece of software that runs for a few seconds then gets tf out of the way.
dirasieb 2 hours ago [-]
because it “runs for a few seconds” until the maintainers decide it should run for a few minutes, see init for an example
logicchains 5 hours ago [-]
Because they're going to try to use it to make it impossible for you to run an operating system that isn't spyware.
ethin 4 hours ago [-]
Can you actually definitively prove this, or is this just more fearmongering from the anti-systemd crowd that I at least don't at all take seriously?
plagiarist 55 minutes ago [-]
What fearmongering has the anti-systemd crowd been selling you? Genuinely curious because I wish I wasn't running systemd. My perspective is that the things they (we?) are saying are basically correct. But the service manager works well enough that most distros have accepted the downsides.
dirasieb 2 hours ago [-]
it is really fearmongering when the systemd people literally founded a company to develop attestation for linux?
at some point you people need to stop pretending it’s all just a slippery “slope fallacy” every single time they push for more control
bitwize 2 hours ago [-]
Sir, this is a Wendy's
longislandguido 3 hours ago [-]
Fortunately your doctor has medication for this.
fluffybucktsnek 5 hours ago [-]
Now that's rich. Are you indirectly telling us that Arch Linux and NixOS are spyware?
gorgoiler 6 hours ago [-]
Regarding dropping support for a LUKS encrypted /boot, one of the comments chimes in with “[but] full disk encryption is mandatory in many environments in Europe for security conformity”.
Surely some user editable data has to be stored in plaintext to be able to boot a system? Does grub.cfg need to be signed by the trust chain to be able to boot?
ahartmetz 5 hours ago [-]
When I hear full disk encryption, I think of what I'm using: Using the encryption feature of the disk with a password / keyphrase prompt built into the system firmware (UEFI). It is 100% transparent to any software.
The only major downside is that you need to trust the hardware manufacturer (and their FIPS certification), which is fine for my purposes, but might not be fine for state secrets or extremely valuable trade secrets.
pona-a 2 hours ago [-]
I don't know if FIPS standards have improved, but combining my priors about products boasting FIPS and manufacturer code quality in general, I would actively not trust it with any data, full expecting it either leaks them, corrupts them, or somehow both.
ahartmetz 2 hours ago [-]
Works just fine for legal ass coverage
Zardoz84 5 hours ago [-]
I glad that I moved to green pastures... Aka Debian.
theandrewbailey 4 hours ago [-]
If Ubuntu, the most widely used distro, is doing this, it's conceivable that other distros will follow. (Maintainers: "It solved some problems Ubuntu was having, so it will probably solve them for us, too.")
tmtvl 4 hours ago [-]
Yea, like when Ubuntu switched from System V init to Upstart. Or when they created Mir to replace X. Or when they created Snap for distro-independent packages. Or when they forked GNOME into Unity.
...man, when did Ubuntu start losing every battle they fought?
estimator7292 3 hours ago [-]
When they started slipping ads into aptitude. I think that's when most of us started giving Canonical the side-eye
hedora 5 hours ago [-]
This sort of crap keeps getting upstreamed into Debian.
Consider devuan for your next machine. I've switched almost all my linux boxes to it, and it's great.
opengrass 1 hours ago [-]
Up voted for Devuan. Getting services to work is a hassle but really easy after using the same template for start/stops.
unmayx 5 hours ago [-]
[dead]
Rendered at 21:36:49 GMT+0000 (Coordinated Universal Time) with Vercel.
> This means for example, that an encrypted system must use an ext4 /boot partition; it is no longer possible to encrypt the /boot partition.
So, they want to let attackers modify /boot, including grub.conf and the kernel command line? This is better? Look at all these fun knobs attackers will be able to turn!
https://www.kernel.org/doc/Documentation/x86/x86_64/boot-opt...
This lets you disable machine check exceptions + the iommu. That means it'll force people to use a configuration that lets attackers stick a memory probe hardware device into the system + bypass a bunch of hardware security checks. Nice!
I also found module.sig_enforce which lets the attacker disable kernel module signature verification. Sadly, I couldn't find anything that lets you directly load a kernel module from /boot.
However, init.rd lives in /boot. I wonder if its signature is verified or not. At the very least, this approach implies that attackers can piecemeal downgrade stuff early in the boot process.
https://uapi-group.org/specifications/specs/unified_kernel_i...
On a more serious note, grub is ancient bloatware, it is way overcomplicated for what it does, it's asking to be replaced by systemd-boot distro-wide.
Look at Apple and Microsoft's bootloaders, they are dead simple and have barely changed in 20 years, it makes you wonder how the hell grub was even conceived. It has config files for config files.
grub tries to do the kitchen sink. But we live in a UEFI world now. Boot is simple. None of that is necessary anymore.
I'm wondering how much was interop with trying to boot multiple operating systems off the same disk?
https://github.com/jeffv03/yaboot/blob/master/ybin/ybin#L902
at some point you people need to stop pretending it’s all just a slippery “slope fallacy” every single time they push for more control
Surely some user editable data has to be stored in plaintext to be able to boot a system? Does grub.cfg need to be signed by the trust chain to be able to boot?
The only major downside is that you need to trust the hardware manufacturer (and their FIPS certification), which is fine for my purposes, but might not be fine for state secrets or extremely valuable trade secrets.
...man, when did Ubuntu start losing every battle they fought?
Consider devuan for your next machine. I've switched almost all my linux boxes to it, and it's great.