Re: [systemd-devel] RFC: userdb authentication protocol

2025-07-22 Thread Adrian Vovk
Hi all, I'm packing for travel today, so unfortunately I'm not fully read up on the thread. However, I wanted to leave a comment about this so that the conversation is informed by it There are ongoing conversations between the GDM devs, KDE/SDDM/PlasmaDM devs, and systemd upstream about "upstream

Re: [systemd-devel] Howto detect a program/service is started by systemd?

2025-07-16 Thread Adrian Vovk
Hello, Most projects handle this using a CLI argument, like --foreground or --no-daemonize or something like that. Then in the systemd unit file, you'd pass that CLI argument on the ExecStart line. Best, Adrian On Mon, Jun 30, 2025, 06:26 Stef Bon wrote: > Hi, > > it's important for a program

Re: [systemd-devel] systemd-tmpfiles, unsafe path transitions

2025-03-27 Thread Adrian Vovk
Hello, Isn't there UID mapping support for this purpose? For that specific NFS mount, you could map whatever UID it is to UID 0 Best, Adrian On Thu, Mar 27, 2025, 15:03 James Muir (jamesmui) wrote: > > > Is there a conf option or an environment variable I can use to disable > the unsafe path t

Re: [systemd-devel] Is tpm2-measure-pcr really an additional security?

2025-03-11 Thread Adrian Vovk
Hello, On Mon, Mar 10, 2025, 12:06 Mikko Rapeli wrote: > Hi, > > On Mon, Mar 10, 2025 at 11:16:25AM -0400, Adrian Vovk wrote: > > Hello, > > > > Just to see if I understand your concern correctly, I'll try boiling it > > down to its simplest, by cutting o

Re: [systemd-devel] Is tpm2-measure-pcr really an additional security?

2025-03-11 Thread Adrian Vovk
Hello, Just to see if I understand your concern correctly, I'll try boiling it down to its simplest, by cutting out the need for two partitions. Here's the scenario: - An attacker replaces the real rootfs with a malicious one that just drops to a shell. The attacker keeps a copy of the original r

[systemd-devel] DOSing the TPM to leak the rootfs encryption key

2025-03-10 Thread Adrian Vovk
Hello all, This is spawned from another recent thread on this list, with the subject "Is tpm2-measure-pcr really an additional security?", started by Yann Diorcet. There's some confusion of what scenario exactly is being discussed in that thread, and in an attempt to clarify I think I came up with

Re: [systemd-devel] systemctl kexec failed with error if /boot/efi on the mdraid

2025-02-15 Thread Adrian Vovk
Hello, UEFI doesn't support RAID for the ESP, and neither does systemd. So it's not unexpected that systemd is unable to find your ESP: your ESP isn't a valid ESP. You may be able to work around your issue by setting an env var: SYSTEMD_RELAX_ESP_CHECKS=1 See also: https://github.com/systemd/sys

Re: [systemd-devel] First? non-systemd app using sd-varlink

2024-12-07 Thread Adrian Vovk
Hi, Very cool to hear! Could you open an issue about that last point? It's probably an oversight when making sd-varlink a public API. Thanks, Adrian On Fri, Dec 6, 2024, 09:03 Thorsten Kukuk wrote: > Hi, > > in the last days I rewrote openSUSEs rebootmgr to only use sd-varlink, > sd-json and s

Re: [systemd-devel] systemd-sysupdate and systemd-sysext images

2024-10-31 Thread Adrian Vovk
Hi Thorsten, If I understand correctly, you're looking for a way to distribute sysexts such that they can be enabled/disabled, and they're updated in lock step with each other and the base OS. Is that correct? If so, you're looking for Optional Features [1], which will release with 257 Best, Adr

Re: [systemd-devel] systemd-repart HOWTO + demo code

2024-10-19 Thread Adrian Vovk
Responses inline On Sat, Oct 19, 2024, 21:52 Thayne Harbaugh wrote: > Response in line: > > On Sat, 2024-10-19 at 20:36 -0400, Adrian Vovk wrote: > > Hello, > > I might have spotted something > > Thank you for reviewing my long email. > > > You tell repa

Re: [systemd-devel] systemd-repart HOWTO + demo code

2024-10-19 Thread Adrian Vovk
Hello, I might have spotted something You tell repart to encrypt with a keyfile, but it seems like you don't pass in which keyfile to use. By default, repart will encrypt with a null key in that case. IIRC, you have to pass in the keyfile (or maybe socket) to use in your drop-in. Apologies if I'

Re: [systemd-devel] [EXT] Re: Understanding the effect of AccuracySec=

2024-08-19 Thread Adrian Vovk
I don't have the initial email for some reason (got caught in spam filter? Idk) so I don't have the full context. On Mon, Aug 19, 2024, 03:55 Andrei Borzenkov wrote: > On Mon, Aug 19, 2024 at 10:11 AM Barry wrote: > > > > > > > > On 19 Aug 2024, at 06:55, Windl, Ulrich wrote: > > > > > > Despit

Re: [systemd-devel] Please clarify osVersion in ELF package metadata

2024-06-17 Thread Adrian Vovk
I think it makes most sense for a distro to pick one thing and stick to it. Otherwise there's no good way to compare packages (i.e. imagine a custom build of libfoo relying on osVersion but the distro build relying on osVersionCodename - you can't programmatically tell if both packages are compatib

Re: [systemd-devel] systemd prerelease 256-rc1

2024-04-26 Thread Adrian Vovk
systemd has been recommending against an arrangement like that for a long time now. These partitions are often fragile (read from bootloader code, or worse firmware! VFAT has no data integrity), and they really have no reason to be mounted unless they're about to be accessed. Stacking the mount poi

Re: [systemd-devel] Howto unshare when user session starts.

2024-02-21 Thread Adrian Vovk
On 2/21/24 15:09, Stef Bon wrote: Hi, I know that I can use a session file, and I know I can use a pamfile (I've written one myself) but what I want to know is how can I use systemd for that? Systemd handles the system, sessions and containers, so is it for example possible to set some paramet

Re: [systemd-devel] Howto unshare when user session starts.

2024-02-21 Thread Adrian Vovk
On 2/21/24 12:57, Stef Bon wrote: Hi, maybe this is a question simple to answer. I want the user sessions to start in a {mount,user} namespace. How can I do this? I know there is the command systemd-nspawn. But to use this I have to adjust the first command to start a session. Or is it possible

Re: How to correctly setup the partition table for systemd-sysupdate?

2024-01-08 Thread Adrian Vovk
You shouldn't be using a linux-generic partition for updates. You need (at least) two of the same kind of partition to switch between whenever there's an update On Mon, Jan 8, 2024, 06:46 Renjaya Raga Zenta wrote: > Hi, > > I've been experimenting with systemd-sysupdate, trying to understand how

[systemd-devel] Anonymous SYSTEMD_NOTIFY socket

2023-06-27 Thread Adrian Vovk
Hello! I'm working on passing sd_notify events from systemd-{pull,import} through sysupdate. All services that consume sd_notify events (systemd itself, importd, machined, homed, etc) act as daemons and own a directory in /run. Thus, they can open a notification socket at, say, /run/SERVICENAME/n

Re: [systemd-devel] sd-boot setup and PCRs

2023-06-19 Thread Adrian Vovk
(whoops accidentally send this only to Felix. Resending to the mailing list too) I wouldn't bind anything to PCR4, because it'll wipe out your decryption key on any update of any component in the boot chain. In other words: PCR4 is not rollback prevention, it's also roll forward prevention as well

[systemd-devel] Children of systemd user instance can't see root user

2023-06-14 Thread Adrian Vovk
Hello I've got a problem in my systemd --user instance that I can't quite grok nor can I explain it very well. Essentially I have no idea what could possibly be going on. Hoping someone here can help. Basically, the OS boots and I can log in. Once I do, I experience the following symptoms: - Not

[systemd-devel] Usage of PCR[7]

2023-06-05 Thread Adrian Vovk
tion fails (PCR[7] has changed!). We try the new decryption and it passes - We delete the old TPM keyslot Any thoughts and ideas about any of this? Thanks, Adrian Vovk For reference, here are some of my previous possible solutions to this problem, and why I decided they won't work: 1.

[systemd-devel] Fwd: Immutable Images: Single Data Patition

2023-03-02 Thread Adrian Vovk
Whoops, forgot to reply-all and replied directly to Lennart. Forwarding to the ML -- Forwarded message - From: Adrian Vovk Date: Thu, Mar 2, 2023 at 16:59 Subject: Re: [systemd-devel] Immutable Images: Single Data Patition To: Lennart Poettering > /home/ with dm-integrity

Re: [systemd-devel] Immutable Images: Updating

2023-03-02 Thread Adrian Vovk
> I figure this would be a 20 line patch. Would be happy to review a patch for that. Got it. That sounds reasonable to me. I'll get you a patch > wouldn't it make more sense, to allow declaration of a "ReleaseNotes=" link > inside a sysupdate .conf file, that can optionally take an URL parameter

Re: [systemd-devel] Linking /lib64 to /usr/lib

2023-02-25 Thread Adrian Vovk
b vs lib64" confusion) Best, Adrian On Sat, Feb 25, 2023, 10:01 Neal Gompa wrote: > On Sat, Feb 25, 2023 at 9:45 AM Lennart Poettering > wrote: > > > > On Di, 21.02.23 16:00, Adrian Vovk (adrianv...@gmail.com) wrote: > > > > > Hello all, > > > &g

[systemd-devel] Immutable Images: Single Data Patition

2023-02-21 Thread Adrian Vovk
them to be encrypted. Maybe there could be a generator that mounts everything in /state/encrypted and in /state to the appropriate destination based on escaped filenames relative to / (e.g. /state/home -> /home, /state/encrypted/my-fancy-dir -> /my/fancy/dir, /state/encrypted/fancy\x2ddir -&g

[systemd-devel] Immutable Images: Updating

2023-02-21 Thread Adrian Vovk
haps down the road systemd-sysext can intelligently create sysupdate files based on a template shipped in the sysext, or sysupdate itself can look for updatable sysexts, but that's a different discussion for a different place I think. As far as I can tell this issue of updating sysexts is already on your radar. Thoughts? Thank you, Adrian Vovk

[systemd-devel] Linking /lib64 to /usr/lib

2023-02-21 Thread Adrian Vovk
PLE"\0" "usr/lib64\0" to "usr/lib/"LIB_ARCH_TUPLE"\0" "usr/lib64\0" "usr/lib\0", and ditto for all the other architectures. That way no matter what, /lib64 always exists when necessary. Thank you, Adrian Vovk

Re: [systemd-devel] How to disable user@UID.service when starting gdm user

2021-12-18 Thread Adrian Vovk
Hi Chengyi, > In fact, gdm user doesn't need these services I'm almost certain that this is incorrect. There's a good chance if you remove the systemd --user instance from GDM, you will end up with a broken/unbootable system. Basically, instead of being its own service manager, new versions

Re: [systemd-devel] Authenticated Boot: dm-integrity modes

2021-12-02 Thread Adrian Vovk
es to the block device. Thus a write to the home dir is 4 writes to the block device. Am I mistaken? Regards, Adrian On Thu, Dec 2, 2021 at 6:45 PM Wol wrote: > > On 02/12/2021 21:24, Adrian Vovk wrote: > > Hello Wol, > > > > Please, read the blog post I'm responding

Re: [systemd-devel] Authenticated Boot: dm-integrity modes

2021-12-02 Thread Adrian Vovk
Hello Wol, Please, read the blog post I'm responding to for context to what I'm saying: https://0pointer.net/blog/authenticated-boot-and-disk-encryption-on-linux.html > dm-integrity is NOT ABOUT authentication dm-integrity provides authentication when configured to use sha256-hmac. I am not conf

Re: [systemd-devel] Authenticated Boot: dm-integrity modes

2021-12-01 Thread Adrian Vovk
Some more thoughts about the usefulness of dm-integrity: 1. There's some past work[1] on authenticated Btrfs, where the whole filesystem is authenticated w/ a keyed hash algorithm. It's basically dm-integrity built directly into the filesystem, with none of the performance and complexity penal

Re: [systemd-devel] Authenticated Boot: dm-integrity modes

2021-12-01 Thread Adrian Vovk
> Why can't you just enable journalling in systemd-homed, so we have LUKS+dm-integrity-journalling? That's why there's two layers of dm-integrity stacked on top of each other (one protecting the filesystem, one baked into the systemd-homed LUKS image) > If the user needs to separate / and /ho

[systemd-devel] Authenticated Boot: dm-integrity modes

2021-11-28 Thread Adrian Vovk
icious modifications. I might be wrong, though: is there anything protecting the bitmap from arbitrary modifications? What are your thoughts on these points? What mode did you plan to have systemd-homed use? Regards, Adrian Vovk