Re: rpm-ostree/bootc uid/gid drift problem

2025-04-28 Thread Lennart Poettering
;re essentially asking "how does rpm-ostree work?". > I won't try to repeat the rpm-ostree/bootc docs inline here. > The design of those systems is fairly well documented online. > Please read those docs. Nah, this seems to be an option, not the defa

Re: rpm-ostree/bootc uid/gid drift problem

2025-04-28 Thread Lennart Poettering
am pretty sure there are many other tools like that in a similar situation, and not sure you want to rule out all of them. systemd-firstboot's --image=/--root= tool also wouldn't work btw, nor systemd-tmpfiles --image=/--root=). Again, I am not sure I grok why ostree insists on managi

Re: rpm-ostree/bootc uid/gid drift problem

2025-04-28 Thread Lennart Poettering
On Mi, 23.04.25 13:27, Zbigniew Jędrzejewski-Szmek (zbys...@in.waw.pl) wrote: > On Tue, Apr 22, 2025 at 03:57:42PM +0200, Lennart Poettering wrote: > > I don't follow? The UID assignments are stored in /etc/passwd, > > i.e. your example config file and the UID assignme

Re: f42: hostname vs. sendmail (vs. systemd depsolver) bug?

2025-04-28 Thread Lennart Poettering
etworkManager. Hence it's really pointless to enable systemd-networkd-wait-online, it's never gonna work if you use a different network management solution. Hence, you have to look at NetworkManager's wait-online tool, and figure out if and how to configure it, but that's so

Re: rpm-ostree/bootc uid/gid drift problem

2025-04-22 Thread Lennart Poettering
hat the UID column of sysusers.d/ snippets actually can take a path in the fs instead of a numeric UID. If you really want to do weird stuff, such as flushing out /etc/ on boot (though I seriously don't grok why in heaven you'd do that? you are just shooting off the legs you stand on that

Re: rpm-ostree/bootc uid/gid drift problem

2025-04-22 Thread Lennart Poettering
he user upgrades, and the file in the image is owned by a gid that > maps to a different group in the local database or to no group and > is listed as unowned. How does this bootc thing update? it deletes /etc/passwd? Why would it do that? seems, humm, weird? I don't follow at all

Re: f42: hostname vs. sendmail (vs. systemd depsolver) bug?

2025-04-22 Thread Lennart Poettering
as something similar. Note that means your boot will be delayed until networking is complete. Depending on your setup that might or might not be what you want. And if you have more than a single interface you might want to fine-tune what "being onlin

Re: [rfc] mass package change to introduce sysusers.d configs

2025-01-27 Thread Lennart Poettering
s and there would not be any conflict of ownership anymore. Lennart -- Lennart Poettering, Berlin -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: http

Re: systemd unit access to /etc/shadow

2024-11-24 Thread Lennart Poettering
ng with us on this, would be happy to! For example, if you think that exposing JSON user group records via said API would be an option for kanidm, then I'd be happy to add the fields you need to the spec (i.e. this spec: https://systemd.io/USER_RECORD

Re: systemd unit access to /etc/shadow

2024-11-24 Thread Lennart Poettering
ium capabilities to make /etc/shadow changes, which are probably CAP_CHOWN + CAP_DAC_OVERRIDE. These two caps single handedly are easily escalated to full root however, hence this doesn't improve things too much, but maybe a bit (because any files the service write are unpriv owned at least)

Re: Improvements in name resolution, DNS and HTTPS RR and SVCB future usage

2024-10-21 Thread Lennart Poettering
orry, but marhsalling is not where the cost is for local IPC. In current Linux systems it's roundtrips, roundtrips, roundtrips. Forget everything else. Lennart -- Lennart Poettering, Berlin -- ___ devel mailing list -- devel@lists.fedoraproject

Re: Improvements in name resolution, DNS and HTTPS RR and SVCB future usage

2024-10-21 Thread Lennart Poettering
packet.Especially when applications needing > expanded responses already have DNS packet parsing implemented. Well DNS RRsets are tiny, even in a DNSSEC world. "raw" bytes are typically encoded in base64 in json, and that's what resolved does if you ask for the raw bytes. b

Re: Improvements in name resolution, DNS and HTTPS RR and SVCB future usage

2024-10-21 Thread Lennart Poettering
#x27;s socket for that into the container. This is a model not available to D-Bus (since *everything* is multiplex over the same socket). Lennart -- Lennart Poettering, Berlin -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe

Re: Improvements in name resolution, DNS and HTTPS RR and SVCB future usage

2024-10-21 Thread Lennart Poettering
s relying on it. I trust you > know about D-Bus much more than me and that it can pass binary encoded and > structured information too. But I am not sure whether complete name > resolution history on machine should pass via DBus. In whatever

Re: Improvements in name resolution, DNS and HTTPS RR and SVCB future usage

2024-10-18 Thread Lennart Poettering
to > > go. There's work going on to add ALPN and stuff hooked into > > systemd-resolved already. It provides simple SRV resolution APIs > > already, asynchronously. > > > > Lennart > > > > -- > > Lennart Poettering, Berlin > > There is not any

Re: problem with run0 in f41 that I'm trying to debug

2024-10-17 Thread Lennart Poettering
0's pty). This > > matters a lot and makes a major difference. > > As I said this is under Plasma KDE Konsole. That does not answer the question. Is it the inner or the outer pty you are issuing that stty command on? Lennart -- Lennart Poettering, Berlin -- _

Re: problem with run0 in f41 that I'm trying to debug

2024-10-16 Thread Lennart Poettering
t; QQQ io-util.c:218 ppoll_usec fds 0 nfds 1 timeout 9 > > $ > > > -- > ___ > devel mailing list -- devel@lists.fedoraproject.org > To unsubscribe send an email to devel-le...@lists.fedoraproject.org > Fedora Cod

Re: Improvements in name resolution, DNS and HTTPS RR and SVCB future usage

2024-10-16 Thread Lennart Poettering
s simple SRV resolution APIs already, asynchronously. Lennart -- Lennart Poettering, Berlin -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://

Re: strawman proposal: homed directories for users

2024-10-11 Thread Lennart Poettering
On Do, 10.10.24 17:22, Simo Sorce (s...@redhat.com) wrote: > On Thu, 2024-10-10 at 17:29 +0200, Lennart Poettering wrote: > > On Mi, 09.10.24 11:12, Simo Sorce (s...@redhat.com) wrote: > > > > > > > > > This was again a reference to the fact that IPA folks

Re: strawman proposal: homed directories for users

2024-10-10 Thread Lennart Poettering
ot is a much fine grained approach, i.e. it can lock disk encryption to the OS vendor, the device vendor and its configuration. I wished Fedora would focus more on making Measured Boot by default a thing (other distros are working towards that, for example SUSE has been investing in that), but Fedora

Re: strawman proposal: homed directories for users

2024-10-10 Thread Lennart Poettering
different time, it is from a different use case. > In general you expect full disk encryption on corporate/centrally > managed machines, not per-user encryption, unless you can escrow per- > user encryption credentials, which I do not think systemd-homed is well > positioned to d

Re: RFC should authselect require nss_altfiles

2024-10-09 Thread Lennart Poettering
still ongoing on how this should look like in the end, and particular what the right paths are to use for the 2nd copy. I'd recommend to wait for this discussion to be resolved. Lennart -- Lennart Poettering, Berlin -- ___ dev

Re: strawman proposal: homed directories for users

2024-10-09 Thread Lennart Poettering
e trying to say here? > > Read-only snapshot contents are immutable, even by the root user. Sure, but that's fine in an idmapped world. Lennart -- Lennart Poettering, Berlin -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscri

Re: strawman proposal: homed directories for users

2024-10-09 Thread Lennart Poettering
On Mi, 09.10.24 09:59, Lennart Poettering (mzerq...@0pointer.de) wrote: > That said, for compat with traditional subuid/subgid as per the table > on https://systemd.io/UIDS-GIDS the UID/GID range 524288…1879048191 is > mapped 1:1 on homed homes, thus if you use those things work as

Re: strawman proposal: homed directories for users

2024-10-09 Thread Lennart Poettering
On Di, 08.10.24 11:42, Chris Adams (li...@cmadams.net) wrote: > Once upon a time, Lennart Poettering said: > > Oh, that hasn't been the case for a long time anymore. Nowadays files > > on disk are owned by the "nobody" user always, and idmapped mounts are > >

Re: strawman proposal: homed directories for users

2024-10-09 Thread Lennart Poettering
the login.defs or overflow UID stuff really should be avoided, and good documentation helps for that. I'd also be happy to update the UID/GID table on aforementioned systemd documentation and delegate some range explicitly to IPA (or IPA-like usecases) there, but for that I'd need some committment

Re: strawman proposal: homed directories for users

2024-10-08 Thread Lennart Poettering
On Di, 08.10.24 12:23, Stephen Gallagher (sgall...@redhat.com) wrote: > On Tue, Oct 8, 2024 at 12:19 PM Lennart Poettering > wrote: > > > > On Di, 08.10.24 18:07, Fedora Development ML > > (devel@lists.fedoraproject.org) wrote: > > > > > Am 08.10

Re: strawman proposal: homed directories for users

2024-10-08 Thread Lennart Poettering
k-like behaviour, that you can basically say "allow logins from any @google.com" account or similar, and we'd generate a home dir from that automatically, as you log in. But quite frankly, we have more pressing issues in systemd-homed land right now. It's a bigger project, would re

Re: strawman proposal: homed directories for users

2024-10-08 Thread Lennart Poettering
On Di, 08.10.24 18:07, Fedora Development ML (devel@lists.fedoraproject.org) wrote: > Am 08.10.24 um 17:32 schrieb Lennart Poettering: > > For example, I am fundamentally opposed to the model > > these systems generally pursue of turning UID numbers into centrally, > > orga

Re: strawman proposal: homed directories for users

2024-10-08 Thread Lennart Poettering
d in selinux is kinda small to non-existing. Anyway, if all people want is to stick another "relabel" this call after we create a new homedir, i am fine with that, but this would be not be a full fix in my eyes. Lennart -- Lennart Poettering, Berlin --

Re: strawman proposal: homed directories for users

2024-10-08 Thread Lennart Poettering
on my setup with many read-only snapshots in > ~/, permissions changes wouldn't be permitted, even by the root > user. Not sure I grok what you are trying to say here? Lennart -- Lennart Poettering, Berlin -- ___ devel mailing list -- devel@

Re: strawman proposal: homed directories for users

2024-10-08 Thread Lennart Poettering
requires an fs that supports fscrypt), at mid-level security (because fscrypt protectes file contents, not metadata, unlike the LUKS/dm-crypt backend which protects everything.) Lennart -- Lennart Poettering, Berlin -- ___ devel mailing list -- devel@li

Re: strawman proposal: homed directories for users

2024-10-08 Thread Lennart Poettering
benefit from its use (see parallel > discussion by Neal). I also see it as a sole contributor to SELinux AVCs > in OpenQA tests we run for FreeIPA use cases. That seems like a bug in the SELinux policy really. Lennart -- Lennart Poettering, Berlin -- _

Re: strawman proposal: homed directories for users

2024-10-08 Thread Lennart Poettering
does, and then take benefit of systemd-logind resource logic too. So far there's was literal interest in that though. But yeah, would be great if sssd/ipa world would integrate with systemd-logind/systemd-userdbd and all that stuff more tightly, but that should be on equal footing

Re: strawman proposal: homed directories for users

2024-10-07 Thread Lennart Poettering
ere is very > little benefit to doing any integration work for homed if we can't > universally reap the benefits of it. Well, that's a bit like saying we shouldn't adopt mysql because it is a shit web browser, no? I mean, it's true, mysql *is* a shit web br

Re: strawman proposal: homed directories for users

2024-10-07 Thread Lennart Poettering
d that's entirely fine. glibc NSS defines a somewhat OK'ish abstraction over homed and sssd so that most apps don#t really have to care where a user comes from, from the network (i.e. sssd) or from a locally managed thing (i.e. homed). Lennart -- Lennart Poettering, Berlin -- _

Re: strawman proposal: homed directories for users

2024-10-07 Thread Lennart Poettering
and not try to abstract each other. Hence: if you have some user in ldap/ipa, and another in homed, that's entirely fine, they should not affect each other. Lennart -- Lennart Poettering, Berlin -- ___ devel mailing list -- devel@lists.fedo

Re: `Unix-domain socket path "..." is too long (maximum 107 bytes)` can we change that?

2024-08-26 Thread Lennart Poettering
they throw at you then. It's an instance of the rule to be lenient in what you accept, and strict with what you generate i guess. Hence, in systemd's tree, we do the O_PATH thing only for connect(), we do not actually bother with any of that for the binding of sockets. Lennart --

Re: `Unix-domain socket path "..." is too long (maximum 107 bytes)` can we change that?

2024-08-22 Thread Lennart Poettering
lobal property of a process, hence will affect all threads. Hence, maybe do this in a short-lived forked off process. Lennart -- Lennart Poettering, Berlin -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to d

Re: systemd 256~rc1 in rawhide

2024-04-26 Thread Lennart Poettering
untime. Writing to /usr/ should be off limits for anything that isn't really a package manager (and maybe very few other exceptions). Lennart -- Lennart Poettering, Berlin -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe s

Re: xz backdoor

2024-04-03 Thread Lennart Poettering
https://www.freedesktop.org/software/systemd/man/devel/sd_notify.html#Notes) and adjust it to your framework of choice, coding style and so on. i.e. adjust the error handling, logging to your choice.] Use this when: - Your project is not in C or - You really don't want an

Re: xz backdoor

2024-04-02 Thread Lennart Poettering
rstanding of UNIX APIs should be able to hack that up in a a few lines of code. It's a protocol I can summarize and explain in *one* frickin' sentence. sshd upstream understood this btw: https://bugzilla.mindrot.org/show_bug.cgi?id=2641 Lennart -- Lennart Poetterin

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-02 Thread Lennart Poettering
he attacker could have used various other vehicle libs for their goal, too. I mean, sshd uses PAM, and that pull in variety of things through its modules, and that's just very hard to properly review even when one just focusses on the default PAM config on Fedora. Lennart -- Lennart Poettering, Ber

Re: Three steps we could take to make supply chain attacks a bit harder

2024-04-02 Thread Lennart Poettering
t it can be processed by initrd generators, automatic dep generators in dpkg/rpm, ldd-like tools and everything else that wants this info. This would require some C macro magic, but could be added in probably just a few lines of codes added t

Re: Mounting USB Storage devices with "sync" option ?

2024-02-02 Thread Lennart Poettering
On Fr, 02.02.24 10:10, Roberto Ragusa (m...@robertoragusa.it) wrote: > On 1/31/24 09:41, Lennart Poettering wrote: > > > This tanks performance when writing to the device though. There's a > > much better approach however: use an automount in between with a very > > s

Re: Mounting USB Storage devices with "sync" option ?

2024-01-31 Thread Lennart Poettering
to work, but after 2s everything is forced out to disk anyway and it is guaranteed the superblock of the disk is put back into a clean state. systemd supports this natively, for example with a simple "systemd-mount -A /dev/sda1". I wished the desktop UIs woul

Re: goal: booting with an empty /etc

2023-12-12 Thread Lennart Poettering
On Mo, 11.12.23 11:10, DJ Delorie (d...@redhat.com) wrote: > Lennart Poettering writes: > > Well, as you might be aware many distributions these days do more than > > "files dns" for "hosts", and similar for the other databases, and > > hence a bui

Re: goal: booting with an empty /etc

2023-12-11 Thread Lennart Poettering
On Fr, 08.12.23 20:20, DJ Delorie (d...@redhat.com) wrote: > Lennart Poettering writes: > > That said, I would certainly enjoy more if glibc would natively > > fallback to /usr/lib/glibc/nsswitch.conf or something like that if > > /etc/nsswitch.conf does not exist. >

Re: goal: booting with an empty /etc

2023-12-08 Thread Lennart Poettering
r/lib/glibc/nsswitch.conf or something like that if /etc/nsswitch.conf does not exist. Lennart -- Lennart Poettering, Berlin -- ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fed

Re: goal: booting with an empty /etc

2023-12-08 Thread Lennart Poettering
c that allows users to split things up doesn't leak into the contents of the files, but remains in the structure of the file system. That said, if you give me an "include" style logic in glibc's database handling I'd also be happy. Beggars can't be choosers, after al

Re: Dropping of sshd.socket unit

2023-09-11 Thread Lennart Poettering
On Mo, 21.08.23 11:07, Lennart Poettering (mzerq...@0pointer.de) wrote: > On Do, 17.08.23 08:25, Chris Adams (li...@cmadams.net) wrote: > > > Once upon a time, Lennart Poettering said: > > > Yes, and if this is not what you want, then disable the > > > rate

Re: Dropping of sshd.socket unit

2023-08-21 Thread Lennart Poettering
On Do, 17.08.23 08:25, Chris Adams (li...@cmadams.net) wrote: > Once upon a time, Lennart Poettering said: > > Yes, and if this is not what you want, then disable the > > ratelimit. That's what I am saying? > > It would be useful for systemd to have "cooldown pe

Re: Dropping of sshd.socket unit

2023-08-17 Thread Lennart Poettering
> ("sshd.socket: Trigger limit hit, refusing further activation."). Yes, and if this is not what you want, then disable the ratelimit. That's what I am saying? Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@

Re: Restricting automounting of uncommon filesystems?

2023-08-07 Thread Lennart Poettering
ment what you are asking for is what I proposed here: https://github.com/util-linux/util-linux/issues/1969 And as it turns out Karel actually implemented this recently, see https://github.com/util-linux/util-linux/commit/1592425a0a1472db3168cd9247f001d7c5dd84b6. I think it would be a good

Re: Dropping of sshd.socket unit

2023-08-07 Thread Lennart Poettering
/man/systemd.socket.html#TriggerLimitIntervalSec= I don't care too much whether you make ssh socket-activated by default or not. But at least the option should exist, already for compat with existing setups. Lennart -- Lennart Poettering, Berlin ___

Re: Towards enabling rpm sysusers integration

2023-06-28 Thread Lennart Poettering
need to send us patches for this, if this matters to them. I don't think anyone in systemd upstream wil work on this on their own. Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an e

Re: F39 Change Proposal: Clean Systemd-boot installs (Self-Contained_

2023-06-26 Thread Lennart Poettering
OTLDR partition is supposed to be the escape hatch if the ESP is pre-existing and too small to contain multiple full sized UKIs. But you could also make it an escape hatch for simplifying transitions from the status quo ante. Lennart -- Lennart Poettering, Berlin ___

Re: Towards enabling rpm sysusers integration

2023-06-26 Thread Lennart Poettering
the same time, and then create a symlink from /etc/services to it, including via tmpfiles.d/, to at least push people away from assuming that this was actually configurable config file, and not just a dump of some outdated IANA data). Lennart -- Lennart Poettering, Berlin __

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-11 Thread Lennart Poettering
and then see if for that count you actually manage to reach the OS. Hence, if you care about realibility, automatic fallback and such things, you need a writable boot partition. And that doesn't leave many options, but VFAT. Lennart -- Lennart Poettering, Berlin ___

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-11 Thread Lennart Poettering
On Mi, 10.05.23 17:54, Chris Murphy (li...@colorremedies.com) wrote: > > > On Wed, May 10, 2023, at 5:21 PM, Lennart Poettering wrote: > > So to add to this. I happen to be at LFSMMBPF at the moment, the Linux > > File System summit (among other things) where all the Linux

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Lennart Poettering
ainly not *everything*. You can stick your head in the sand and pretend that nothing of this mattered, and you don't have to authenticate and things, but then you simply didn't solve the problem at hand. Lennart -- Lennart Poettering, Berlin __

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Lennart Poettering
you do it the other way round. Hence, unless you established trust in your btrfs fs *before* you go into and and look for kernel you are not doing security, you are just doing nonsense. > I would rather have a multi-stage boot process, where the first stage > does just enough to unlo

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Lennart Poettering
On Mi, 10.05.23 15:13, Lennart Poettering (mzerq...@0pointer.de) wrote: > > We're generally looking toward encrypting subvolumes individually > > using the upcoming Btrfs native encryption capability rather than > > using LUKS. That allows us to > > How do you esta

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Lennart Poettering
nel. Pre-compiled UKIs provided by Fedora should be comprehensive and suitable enough to be rescue images, I don't see why we need a second version of that. The only difference between a rescue boot and a regular boot should be one of parameterization, not of picking different k

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Lennart Poettering
lex storage again. You are arguing here into two opposing directions. One one hand you want to chainload multiple kernels+initrd (claiming this was a good idea out of the problem of sizing ESP/XBOOTLDR sufficientlly), and then on the other hand you claim there's too much kernel+initrd in the b

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Lennart Poettering
ou want to boot from, and thus you'll also have alrge images, and then what did you gain? You ave to put that in the ESP too, and the size limits still apply. It's illusionary to believe that the size constraints for a kernel + drivers + complex storage stack + crypto stack + auth

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Lennart Poettering
On Di, 09.05.23 12:37, Neal Gompa (ngomp...@gmail.com) wrote: > On Tue, May 9, 2023 at 12:31 PM Lennart Poettering > wrote: > > > > On Di, 09.05.23 08:22, Neal Gompa (ngomp...@gmail.com) wrote: > > > > > I've been asked to consider converting /boot to

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-09 Thread Lennart Poettering
to reduce the time where the partitions are mounted to a minimum, and autofs makes that very simple and natural, as it means the file systems are only mounted for a very short period of time when actually accessed, and unmounted a seconds later. Lennart -- Lennart Poettering, Berlin _

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-09 Thread Lennart Poettering
gt; nice to get rid of this anachronism if this area is being touched.) I guess this might not be surprising, but this proposal makes a ton of sense to me and has my full support, FWTW Lennart -- Lennart Poettering, Berlin ___ devel mailing list -

Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-09 Thread Lennart Poettering
ver, and a FIDO2 EFI driver, and so on and so on. Basically, you have to reimplement a good chunk of the Linux kernel, of Linux userspace, systemd and so on in EFI mode. Good luck with that. Lennart -- Lennart Poettering, Berlin ___ devel mailing list -

Re: Improving Fedora boot time when libvirt is installed

2023-01-23 Thread Lennart Poettering
On Fr, 20.01.23 14:04, Colin Walters (walt...@verbum.org) wrote: > > > On Thu, Jan 19, 2023, at 11:53 AM, Gordon Messmer wrote: > > On 2023-01-19 00:55, Lennart Poettering wrote: > >> > >> What you could do is split up the problem: have iscsi-starter.service >

Re: Improving Fedora boot time when libvirt is installed

2023-01-19 Thread Lennart Poettering
On Do, 19.01.23 08:53, Gordon Messmer (gordon.mess...@gmail.com) wrote: > On 2023-01-19 00:55, Lennart Poettering wrote: > > > > What you could do is split up the problem: have iscsi-starter.service > > or so, that is separate from the iscsi.service main service. The > &g

Re: Improving Fedora boot time when libvirt is installed

2023-01-19 Thread Lennart Poettering
ly like this btw: [Unit] DefaultDependencies=no Before=sysinit.target iscsi.service RequiresMountsFor=/var/lib/iscsi/nodes ConditionDirectoryNotEmpty=/var/lib/iscsi/nodes [Service] Type=oneshot RemainAfterExit=true ExecStart=/usr/bin/systemctl start --no-block

Re: F38 proposal: Shorter Shutdown Timer (System-Wide Change proposal)

2023-01-16 Thread Lennart Poettering
ink a policy of "aggressive time-out by default, individual opt-outs per-service" is a better policy for a stable OS than the current "conservative time-out by default, individual opt-in per-service for something more aggressive". So yes, lowering the time-outs

Re: static USERMODEHELPER_PATH

2023-01-10 Thread Lennart Poettering
m the kernel, and the kernel typically speaks netlink, not AF_UNIX. But quite frankly, I really don't care what transport would be used. I'd just be happy if we could get rid of the kernel forking its own stuff. Lennart -- Lennart Poettering, Berlin

Re: F38 proposal: Shorter Shutdown Timer (System-Wide Change proposal)

2023-01-09 Thread Lennart Poettering
ting is also the stuff that is expensive to dump. Hence, I am not sure you'll gain that much via this mechanism: you cut a long operation short and then execute long operation as result. You might end delaying things more than you hope shortening them. Lennart -- Lennart Poettering, Berlin

Re: static USERMODEHELPER_PATH

2023-01-06 Thread Lennart Poettering
On Fr, 06.01.23 10:10, Steve Grubb (sgr...@redhat.com) wrote: > Hello, > > On Friday, January 6, 2023 9:33:12 AM EST Lennart Poettering wrote: > > On Do, 05.01.23 20:17, Steve Grubb (sgr...@redhat.com) wrote: > > > I work on RHEL security problems. I have been

Re: static USERMODEHELPER_PATH

2023-01-06 Thread Lennart Poettering
itself. The init system could then hook into that and dispatch things in proper services with sandboxing, resource controls and everything applied, in a sensible cgroup. Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproj

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-23 Thread Lennart Poettering
nything about this. To fix a situation one needs actionable reports. > No one helped anyway, even back when I could provide more information. > They're even less likely now that I can't provide that information. You do realise that you are are complaining but not giving anyone the c

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-23 Thread Lennart Poettering
rom the write patterns Windows 9x did on its file systems. Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: http

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-23 Thread Lennart Poettering
will be built-in. But once you enroll other certs things should be fine. Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Condu

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-22 Thread Lennart Poettering
k for a bug report? Please be specific, otherwise noone will be able to help you! Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code o

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-22 Thread Lennart Poettering
On Do, 22.12.22 10:43, Neal Gompa (ngomp...@gmail.com) wrote: > On Thu, Dec 22, 2022 at 10:39 AM Lennart Poettering > wrote: > > > > On Do, 22.12.22 05:38, Neal Gompa (ngomp...@gmail.com) wrote: > > > > > > I understand the big issue you have is that the cert

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-22 Thread Lennart Poettering
roll hashes? Were was this dicussed? Without any of that the vagueness just constitutes FUD... Hence, please be more specific! Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email t

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-22 Thread Lennart Poettering
> You *need* to think about these problems when designing this stuff. > You can't take a myopic x86-only view to this. I have not heard of > anything about UKI security for non-x86 because it seems to all be > tied up in UEFI stuff. I work for a company that is working on ARM UE

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-22 Thread Lennart Poettering
nd bad things happen. ukify hence calculates the offsets manually (by adding up the section sizes so that this cannot happen. Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an emai

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
so not charged against NVRAM but are built into fedora shim. And the shim signature key is the msft key. Yeah, if you want to build your own UKIs + sysext, then you have to use mokutil to enroll a cert, but it would be entirely sufficient to enroll one for that, a

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
same keyring as kmods basically. Hence there's nothing really new here when it comes to key management. If you have beef with how Linux manages the keys for authenticating kmods then bring that up with the kernel community, it has nothing to do with the way UKIs/sysext works. Lennart -- Lenn

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
t; provide something useful to the Linux world here and I would be > extremely apprehensive about Fedora adopting any portion of this > stuff. Umpfh. This is FUD. Please read up before writing scathing comments like that. Lennart -- Lennart Poettering, Berlin ___

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
. > We can only really have one boot manager, especially with how broken > multiple ESPs on a system are. Why would you have multiple ESPs? I don't follow? Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproj

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
hat writes to the ESP/VFAT are actually OK, then I think it's just a minor step to say that /boot/ as VFAT is also OK given these writes are more seldom, are done from the safer OS environment, and can be tightly controlled. Lennart -- Lennart Poettering, Berlin _

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
s impossible to ever get lost, pile up or so. Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproj

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
his own machines, but not every Fedora system comes with a Neal Gompa deployment included. Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fe

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
linearly in full, then syncing, and then renaming it to the final name (and syncing again) you should get equal/better guarantees from the fs, in a way actually compatible with the pre-boot env. Lennart -- Lennart Poettering, Berlin ___ devel mailing

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
driver might need to allocate a bunch of separate long file name dir entries, which might then span multiple sectors) Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@li

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
ESP to the level this could be possible. Sure, it's still no journalling, but it's as close as it can get. -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@li

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
so much by the OS. What do you think a boot laoder is going to do with access modes, file ownership, selinux labels? I am pretty sure we should reduce problems and simplify things by just using VFAT for boot loader stuff, and put everything at the least number of places possible. Lennart -- L

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
4 for upgrades, but outside of that, for new installs it's something that really should be avoided I am sure. Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
. Anyway, if you want to know more about choice of the fs for /boot/, see my ideas here: https://0pointer.net/blog/linux-boot-partitions.html Lennart -- Lennart Poettering, Berlin ___ devel mailing list -- devel@lists.fedoraproject.org To unsubsc

Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-21 Thread Lennart Poettering
secure as your DHCP leases are protected, but the security is definitely not going to be worse than in the status quo ante that way) (you could also build/sign your own UKIs with the network boot info baked in. Or you could use TPM-bound systemd "credentials" to prov

  1   2   3   4   5   6   7   8   9   10   >