Hi Rick,

On Mon, Jan 25, 2016 at 08:13:04PM -0800, Rick Thomas wrote:
...
> If something goes wrong with installing grub, you can boot from a CD or
> via ethernet and recover or re-install.
> If something goes wrong with installing u-boot, you have bricked your
> device.  The only recourse is J-tag.  Not fun at all!

Especially when your boot device is a SD or microSD card, I don't see why
J-tag would be anywhere near what you need to recover. Even when a system
usually runs off an eMMC my impression is that most devices out there still
would allow booting off the SD cards slot if you only inserted a properly
formatted card. T.b.h. I don't really see the risk you try to outline here
(for the platforms I have). If you have the impression that "most" of the
ARM systems out there are only equipped with a single boot device that's not
removable, please do give a list. Otherwise, unbricking a vfat or ext4
partition on a PC should be piece of cake.


> Installing u-boot is something that should only be undertaken very
> carefully if you know what you're doing and are prepared to recover from a
> mishap.  Doing it automatically every time there's an update is not wise.

Well, let's assume this:

1.) We've got a growing platform (i.e. current popcon isn't anywhere near
    what we expect to have in the next 3-4 year - read: lifespan of next
    stable).  And we're not talking about the one single box in a lab or
    being your one-and-only private server plattform. We're talking about
    larger deployments where you would *want* to have unattended-upgrades
    and needrestart and alike mechanisms to take certain tasks off your
    shoulders (which is what I assume/hope IoT will look like).

2.) We're talking about a Debian stretch being stable (or maybe even what
    comes after stretch) - i.e. the u-boot package does only receive
    maintenance and security updates.

3.) You're installing u-boot on a platform that you very well know and where
    the procedure for updating u-boot is clearly outlined, i.e. no fancy
    magic, e.g. just a plain dd file into constant partition.

4.) Assume that we have security hole in u-boot that needs fixing. Debian
    security is putting together a DSA and the backported security fix for
    the stable release version.

5.) The admin of each and every system has had the chance to enable
    auto-updates for u-boot if they feel this a good thing for them under
    the configuration they run (e.g. booting from uSD card). The default of
    u-boot (for now) shall safely remain that auto-updates aren't enabled
    (unless of course the maintainer feels that there's reason to default
    otherwise on a given installation).

In this scenario I would think DSA is much happier to just roll out the fix
as-is compared to what we have now. Updating u-boot in jessie will catch at
best 30%, probably rather 3% (or even less) due to the lack of people
understand they need this update *and* knowing how to manually install it.
The part of which platforms and setups can be considered auto-upgrade-safe
would be something I'd leave for further discussion once we have a hook
mimic in place and have some first experiences (and maybe some bugreports).

So, to summarize: all I'm asking for is a hook that I can configure
willingly (if I feel confident enough) to enable this auto-updating for my
systems, in case there'd be any security issues with u-boot in the future
and ensure I don't forget to enable/install them.

Best,
Kilian

Attachment: signature.asc
Description: Digital signature

Reply via email to