-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secureboot with Shim #45
Comments
CC @zimbatm @Mic92 @Lassulus @infinisil and others (I honestly don't know who else to ping) |
Cross-referencing the discussion on Matrix: https://matrix.to/#/!kjdutkOsheZdjqYmqp:nixos.org/$Q-frAR48XsHN25KMe_Rc_Lx5BittuR7kfWAVA53YAN0?via=nixos.org&via=matrix.org&via=tchncs.de |
That sounds good to me! Ultimately, it's up to the SC to decide if they are OK supporting this project. But overall, if there are no significant objections, the main question I see is who is going to drive this effort. If you are, I'm happy to help you by giving you access to the necessary resources and connections. |
As discussed in yesterday's meeting on matrix,
Relevant PRs: NixOS/nixpkgs#353052 |
Is there a tracking Nixpkgs issue to link here? Hopefully the ability for users to build their own boot images with modified/unsigned kernels stays, so an option to sign should probably be mergeable without intervention from SC, and its development is better tracked in a Nixpkgs tracking issue linking the PRs in that direction. |
There is NixOS/nixpkgs#42127, I haven't found any recent issues. |
SecureBoot support on a Linux distribution requires a shim binary signed by Microsoft to be loaded before boot, and there was some efforts to make it happen on NixOS.
A lot has changed since then, both above mentioned people are not actively participating in Nixpkgs, and we have an entirely new management structure with the SC.
Could the SC move forward with this? I believe it's not something a random contributor like us, can move it to the finish line. A security contact from the foundation/organisation is needed.
We can argue over and over about how SecureBoot setup benefits Microsoft, and the UX design is just bad, but it has undoubtedly been adopted by all modern hardware vendors.
Currently, to install NixOS, one needs to disable SecureBoot, which just ends up painting the bad picture, unlike Fedora or Ubuntu, which installs fine from the ISO out of the box. Disabling SecureBoot is not something good for security, even though it has its caveats.
Sure, we can reuse the shim binary that are provided by Ubuntu or Fedora, but again reusing things from other distros is not a good idea. We'd not have any control over the builds, and those distros can just stop making those builds publicly accessible.
It's time we actually address this issue.
The text was updated successfully, but these errors were encountered: