all messages for Guix-related lists mirrored at yhetil.org
 help / color / mirror / code / Atom feed
From: Giovanni Biscuolo <g@xelera.eu>
To: Raghav Gururajan <rvgn@disroot.org>, Timothy Sample <samplet@ngyro.com>
Cc: help-guix@gnu.org
Subject: Guix and intrusion detection (was Re: Help with writing custom boot-loader configuration)
Date: Wed, 05 Jun 2019 20:01:03 +0200	[thread overview]
Message-ID: <87lfyfud28.fsf@roquette.mug.biscuolo.net> (raw)
In-Reply-To: <5a8da2409fa4fef22e064d5ac55f0c49b03a51df.camel@disroot.org>

[-- Attachment #1: Type: text/plain, Size: 1488 bytes --]

Hello Raghav,

Raghav Gururajan <rvgn@disroot.org> writes:

[...]

> It works. Was curious about other alternatives. Btw, is it possible make guix to
>  automatically GPG-Sign the "grub.cfg" it generates during "guix system init" or
> "guix system reconfigure" ??

I cannot (still) help patching guix this way, but from a security POV
this is interesting, providing you explain what you are trying to
achieve :-)

Anyway:

1. to sign, guix should have a secret key and that key may be easily
stolen (modulo encryption but that's another story...)

2. to verify a list of system admins signatures guix just needs public
keys and that's easy to provide, the not so easy part is patching guix I
guess

3. signature of "grub.cfg" - or other store items - should be done on
*another* machine and items deployed to the host (there is some POC and
custom code around in guix-devel for this)

Could GPG signature *verification* of selected core parts (bootloader,
initrd, kernel... guix itself) of our reproducible system make us
confident that instrusions via physical access to hardware are
automatically detected and notified by guix? [1]

...or I'm exagerating here and Guix already provides a good path to do
effective intrusion detection, even with remote hosts potentially
available to physical instrusion?

Thoughts?

[...]

Thanks! Gio'.


[1] let's call it Trusting Remote Trust problem

-- 
Giovanni Biscuolo

Xelera IT Infrastructures

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 832 bytes --]

      reply	other threads:[~2019-06-05 18:01 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-05-30 10:11 Help with writing custom boot-loader configuration Raghav Gururajan
2019-06-03 23:27 ` Raghav Gururajan
2019-06-04  0:49   ` Timothy Sample
2019-06-04 15:40     ` Raghav Gururajan
2019-06-04  1:15   ` Jack Hill
2019-06-04 15:48     ` Raghav Gururajan
2019-06-05 13:36       ` Timothy Sample
2019-06-05 15:30         ` Raghav Gururajan
2019-06-05 18:01           ` Giovanni Biscuolo [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87lfyfud28.fsf@roquette.mug.biscuolo.net \
    --to=g@xelera.eu \
    --cc=help-guix@gnu.org \
    --cc=rvgn@disroot.org \
    --cc=samplet@ngyro.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this external index

	https://git.savannah.gnu.org/cgit/guix.git

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.