Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NUC11 hardware: network device unsupported by SecureDrop custom kernel #6170

Closed
gonzalo-bulnes opened this issue Nov 16, 2021 · 5 comments · Fixed by #6242
Closed

NUC11 hardware: network device unsupported by SecureDrop custom kernel #6170

gonzalo-bulnes opened this issue Nov 16, 2021 · 5 comments · Fixed by #6242
Assignees
Milestone

Comments

@gonzalo-bulnes
Copy link
Contributor

Description

On a NUC11i5PAK, the network connectivity is lost during installation after the first reboot.

Steps to Reproduce

I am following the documentation instructions and the issue appeared when running ./securedrop-admin install from the Admin workstation. However, I believe that booting the NUC11 using the 5.4.136-grsec-securedrop kernel may be enough to reproduce the issue.

Expected Behavior

After the servers reboot, the installation script resumes normally. Even if it that wasn't the case, I'd expect to be able to connect to both servers via: ssh [email protected] and ssh [email protected].

Actual Behavior

There is no route to either app or mon.
When logging into the servers directly (physical access) this is what I see:

sudo lshw -class network
# prints that the network device is UNCLAIMED

The (wired) network device of the NUC11i5PAK is: Ethernet controller [...] Intel CorporationDevice [8086:15f3] (rev 03), which seems to be supported via the igc kernel module. (I might be wrong about his, or there might be other ways.)
That module seems to be missing from the hardened kernel that SecureDrop uses:

modinfo igc
# modinfo: ERROR: Module alias igc not found.

Finally, for reference, by default Ubuntu 20.04 allows to use the network device as enp0s25. (Which is why the installation script behaves as expected until the servers are rebooted with the custom kernel.)

Comments

Using the SecureDrop kernel-builder to get a build based on the 5.10 release might be a good starting point.

@gonzalo-bulnes
Copy link
Contributor Author

@zenmonkeykstop @eloquence @conorsch Please let me know if I missed anything that would be useful documenting in this issue!

@zenmonkeykstop
Copy link
Contributor

Looks like grsec's 5.15 series might actually be the way to go. the 5.10 patch is EOL in Q1 2022.

@conorsch
Copy link
Contributor

the 5.10 patch is EOL in Q1 2022.

Agreed, that's what https://grsecurity.net/download/ says. However, the EOL dates there are substantially different from what's on https://www.kernel.org/category/releases.html :

EOL dates 5.10 5.15
grsec 2022Q1 2024Q4
kernel.org 2026Q4 2023Q4

If what we want is long-term support for hardware, tracking the 5.10 series seems like the biggest win for us. The discrepancy is great enough that I suspect the grsec page is perhaps out of date. I suggest we reach out to spender and and ask for clarification.

@eloquence eloquence added this to the 2.2.0 milestone Jan 19, 2022
@conorsch
Copy link
Contributor

The kind folks at grsecurity strongly recommended we target 5.15, as @zenmonkeykstop rightly proposed. We'll continue to test patches and revise the build process, if necessary, in freedomofpress/kernel-builder#18

@gonzalo-bulnes
Copy link
Contributor Author

☝️ I installed the 5.15.18 kernel above on a fresh Ubuntu 20.04.3 installation:

  • The enp2s0 network device is not UNCLAIMED anymore ✔️
  • sudo modinfo igc does print information of the module ✔️

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants