-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Aiming to a readonly dom0 #7839
Comments
Duplicate of #5777 |
This appears to be a duplicate of an existing issue. If so, please comment on the appropriate existing issue instead. If anyone believes this is not really a duplicate, please leave a comment briefly explaining why. We'll be happy to take another look and, if appropriate, reopen this issue. Thank you. |
@andrewdavidwong I am not sure if those are really duplicates. This issue, "aiming to a read only dom0" is an attempt to take practical steps based on current observations of what is changing across dom0 reboots today without Qubes configuration changes, in the goal of first taking notice of what is changing, and then taking steps toward that goal, as a subset of a more important goal: being able to take external measurements of dom0 to quickly measure it externally prior of boot, being a goal of pre-boot environements (Heads, safeboot, others). This issue provides simple tool to investigate those changes (snapshots of dom0-root volume at shutdown) to ease comparisons of filesystem and file level changes toward attaining that goal through iterations. As of the time that post was written under #4371 (comment), the following files/dirs changeed through a simple reboot without any Qubes configuration changes:
This means that dom0-root volume's integrity cannot be sealed/verified in pre-boot environment prior to being addressed, and to address other changes and scope what changes should be considered as a tampering, otherwise being externalized. Easier to externalize:
Harder to externalize (might be ok to trigger dom0-root volume integrity invalidation):
This issue was originally reported under #4371 (comment), which was followed by @DemiMarie answer:
Basically @andrewdavidwong, this issue is an attempt to address the issue iteratively and track progress of that, without replacing fedora by silverblue or expecting this to just magically happen. I can continue under #5777 if still considered a duplicate. |
The reporter's reasoning is not really that relevant, IMO. What matters more is the goal ("make dom0 read-only"), whether the devs think the goal is worth pursuing, and what the devs think is the best means for achieving that goal.
Actually, there is only one very brief comment (aside from mine, which was also just a brief historical note), and it didn't really propose anything radical. It just said "maybe it's possible to use this thing." Also, anyone is free to comment on posts, no matter how wrong-headed their ideas or remarks. We generally only hide or delete their comments if they're spam, off-topic, violate our code of conduct, etc. So, you shouldn't really assign any weight to random people's comments on issues, otherwise other people will also be able to devalue issues you open simply by making uninformed comments on them.
So, you agree that you have the same goal as #5777; you just want to take iterative steps to reach that goal. But no one on #5777 said they were opposed to taking such iterative steps. In fact, the only comment was, "Maybe it's possible to adapt fedora silverblue for that purpose." I read this as someone simply saying, "Hey, maybe this thing might be useful for you, in case you haven't heard of it." To me, it sounds like you want to pursue your own path toward the goal of making dom0 read-only, but IMO the open-source ethos instead indicates that you should seek to persuade others that your path is the better one (or at least give it a try), especially when the existing issue is very brief and general and not really opposed to yours. In other words, I still don't see why this issue isn't a duplicate of #5777. |
When comparing two root snapshots per
And then we compare the content of the filesystems, we see that:
Would need to be out of root fs to be able to have a RO QubesOS dom0 with dmverity
Originally posted by @tlaurion in #4371 (comment)
The text was updated successfully, but these errors were encountered: