45
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 28 Aug 2023
45 points (100.0% liked)
Linux
48048 readers
764 users here now
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Rules
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
- No misinformation
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
founded 5 years ago
MODERATORS
Sounds like cope to me. You don't get to tell an attacker which component they can attack when you have misconfigured your security guards.
I keep the LTS kernel around for that. It's a "one-click solution" for boot problems. And anyway, a simple chroot should allow me to fix any problems.
Don't see what advantage snapper rollbacks have for me when I would need to use it rarely. I don't have a habit of intentionally breaking things. And when things break on me (I use Arch btw), they rarely introduce fatal errors.
There is only a single thing on my system unencrypted: the grubx64.efi binary. This binary is verified via secure boot. Unless an attacker can break luks2 encryption, they cannot get to anything else.
Did you read your own post? The lts kernel was affected too. That's why I used it as an example.
You could also just nab the older kernel from the archive or something, if your system still boots. But I don't want to have to do that. I have better things to spend my time on then going through the pain of disabling all my security features so I can chroot into an encrypted system.
I don't know enough about the subject of a secure grub to tell you how wrong you are.
Yes I did. It was a terrible example. As all I would need to know was the last working version for TPM. Regression in LTS does not factor in this equation.
And most importantly, it would not stop me from booting.
You think you are saying something smart here but I assure you, you couldn't be more conceited. You are maintaining a patch of grub for a bug that grub has no idea it exists. And you claim not to have time to fix your installation...
If you don't know, then why don't you shut up, yeah? I've spent 3 weeks researching this, even going as far to read the source of grub. Don't just assume you're right without doing any research.
I have the time now. Classes are just getting started. But I'll be busier in the future. Due to the way that arch is setup, this is easier than signing everything, plus I get instant restores.
And it's not a bug. It's intended behavior for systems like high value servers where security is valued over all else, to prevent privilege escalation by an attacker exploiting a kernel bug to load more kernel modules or taking advantage of a similar exploit. But for my desktop system, such an attack is not in my threat model.
Asswipe.
Why not write your own bug-free grub then....
If you think reading about secure boot for 3 weeks is enough for you know everything about the subject, I don't know what to tell you.
You were never worth my salt anyways, go back to whatever dungeon you crawled from. You pathetic vermin.
Stooping to insults now, huh?
Unironically good advice. Although I would probably just contribute to systemd-boot or refind so that it gets the features I want rather than forking grub, or writing my own bootloader.
You can never know everything. But you can know enough.
Besides, you walked in with no knowledge, simply telling me I was wrong. This isn't an actual rebuttal to the points I have brought up.
I was so "not worth your salt" that you made 6 replies to me. Sounds like you're crying some salty tears. Am I worth that salt?
To echo your words from earlier in this thread: