Re: Firmware - what are we going to do about it?

2022-04-23 Thread Marc Haber
On Thu, 21 Apr 2022 10:12:19 -0700, Russ Allbery 
wrote:
>I've been a Debian Developer for quite some time and can usually manage to
>figure out most tasks like this, and providing separate firmware to the
>installer has completely defeated me every time I've tried it.  I've spent
>frustrated hours trying to follow the documentation and doing things that
>look right only to have the installer say that there's no firmware visible
>without any clue as to how to debug the errors.  Every time I have tried
>this, I have eventually given up and found the non-free images, which just
>worked.

Amen. I know one installation with a five digit number of Debian
systems that uses a hacked installer with the Kernel from CentOS
because that one just works. I have talked to the guy who did that
operation (one of the most competent IT people I know) and he said
nearly the same as Russ said.

>If this is going to be the solution, it has to be WAY easier to do.

Yes, absolutely.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



shim-signed (was: Firmware - what are we going to do about it?)

2022-04-23 Thread Marc Haber
On Fri, 22 Apr 2022 11:16:42 +0200, Philip Hands 
wrote:
>I understand the urge to insist upon absolute DFSG purity in the media
>we produce, but when it comes to wanting to avoid every last shred of
>data that we could not regenerate ourselves, I think we crossed that
>line some time ago.
>
>I'm thinking of shim-signed, which is included in our official media.
>
>Despite being free software in source form, it is signed by Microsoft,
>and can only be expected to work with that signature ... which we cannot
>create.
>
>On most (all?) hardware one is able to avoid UEFI secure-boot, so won't
>need to use shim-signed, but I'd imagine that some hardware insists on
>secure-boot, or the opt-outs are somehow broken and so is not usable
>without shim-signed.

Excuse me for asking a user question on -devel, but do we have any
docs where someone explains how much a security trade off is
shim-signed relativ to the optimum? I think that using shim-signed is
surely worse than a directly signed kernel, but I don't know whether I
can tell my system (or shim-signed?) to accept MY or Debian's signed
kernel without the Microsoft intermediate signature, and whether this
is any more secure than running an encrypted system without secure
boot at all.

Do we have docs for that?

>Is the presence of shim-signed on the install media enough to make
>people feel somehow contaminated?

I think so, yes. Personally, I don't care too much but i can
understand why some people might.

>If not, is the problem having other blobs of data on the media that we
>also cannot generate, or is it the licensing of that data, or something
>else?

We can compile shim-signed and compare the signed code with our own
object code, can't we?  That we we would only have to worry about the
validity and benignness of the signature and not worry about having
undocumented functionality in the signed code.

>If it ensures that fewer people abandon Debian out of frustration with
>the install then I'd suggest that it will actually result in less
>non-free software being used overall, as will having the option to
>enable only non-free-firmware without also enabling non-free.

Those are the people who use Ubuntu without even trying Debian because
somebody told them that Debian is SO hard to install.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Bug#1010055: ITP: base16384 -- Encode binary file to printable utf16be, and vise versa.

2022-04-23 Thread fumiama
Package: wnpp
Severity: wishlist
Owner: fumiama 

* Package name: base16384
  Version : 2.2.0
  Upstream Author : fumiama 
* URL : https://launchpad.net/base16384
* License : GPLv3
  Programming Lang: C
  Description : Encode binary file to printable utf16be, and vise versa.

We use 16384 Chinese characters (from \u4E00 to \u8DFF) as the "alphabet",
just like what base64 did.
If length of the data has a remainder after mod 7,
we will use \u3Dxx to present it with xx ranging from 01 to 06.

 - I designed this base64-like algorithm and had published it
   to my lauchpad PPA https://code.launchpad.net/~fumiama/+archive/ubuntu/ppa
   It seems to work well so that I hope to see more people
   who can use this util easily by entering apt-get directly.

 - I have read the wiki and found that in order to pubish my
   package to Debian, I am requested to get a sponsor for it.
   So I will file a RFS bug report later.



Re: shim-signed (was: Firmware - what are we going to do about it?)

2022-04-23 Thread Ansgar
On Sat, 2022-04-23 at 12:21 +0200, Marc Haber wrote:
> >Is the presence of shim-signed on the install media enough to make
> >people feel somehow contaminated?
>
> I think so, yes. Personally, I don't care too much but i can
> understand why some people might.

Why? Because it contains a third-party signature for which the private
key is not included in Debian? The same is true for signatures in
debian-archive-keyring, debian-keyring, ca-certificates, wireless-
regdb, and many other packages.

If we were to include more signatures in binary packages (e.g., a
signed manifest listing files (with hashes) shipped by the package,
signed executables, an embedded signature for the .deb itself), would
that be a problem?

We do include signatures for source packages (*.dsc and also for
upstream tarballs) as well.

> We can compile shim-signed and compare the signed code with our own
> object code, can't we?  That we we would only have to worry about the
> validity and benignness of the signature and not worry about having
> undocumented functionality in the signed code.

Debian's buildds build shim (binary package: shim-unsigned); the binary
generated by Debian is then signed by Microsoft's key.

Ansgar



Re: Firmware - what are we going to do about it?

2022-04-23 Thread Paul van der Vlis

Op 19-04-2022 om 02:30 schreef Steve McIntyre:


I see several possible options that the images team can choose from here.
However, several of these options could undermine the principles of Debian. We
don't want to make fundamental changes like that without the clear backing of
the wider project. That's why I'm writing this...


I have an idea for an extra option:

6. Put the closed source firmware somewhere in the Debian images, but 
never install closed source firmware by default. "No" should be the 
default. And to put "non-free" into sources.list should also be an 
non-default choice, even when you install closed source firmware.


Maybe there could also be a patch, what removes the closed-source 
firmware from the image.


With regards,
Paul



--
Paul van der Vlis Linux systeembeheer Groningen
https://vandervlis.nl



Bug#1010063: ITP: golang-github-mndrix-tap-go -- Test Anything Protocol for Go

2022-04-23 Thread Reinhard Tartler
Package: wnpp
Severity: wishlist
Owner: Reinhard Tartler 

* Package name: golang-github-mndrix-tap-go
  Version : 0.0~git20171203.629fa40-1
  Upstream Author : Michael Hendricks
* URL : https://github.com/mndrix/tap-go
* License : Public Domain
  Programming Lang: Go
  Description : Test Anything Protocol for Go

 Test Anything Protocol for Go
 .
 The Test Anything Protocol (http://testanything.org/) ("TAP") is a text-
 based interface between tests and a test harness.  This package helps Go
 to generate TAP output.
 .
 Read the full package documentation
 (https://godoc.org/github.com/mndrix/tap-go)

I'm going be maintain this under the pkg-golang team umbrella

Build dependency for golang-github-opencontainers-runtime-tools



Re: Firmware - what are we going to do about it?

2022-04-23 Thread Andrey Rahmatullin
On Sat, Apr 23, 2022 at 03:13:29PM +0200, Paul van der Vlis wrote:
> > I see several possible options that the images team can choose from here.
> > However, several of these options could undermine the principles of Debian. 
> > We
> > don't want to make fundamental changes like that without the clear backing 
> > of
> > the wider project. That's why I'm writing this...
> 
> I have an idea for an extra option:
> 
> 6. Put the closed source firmware somewhere in the Debian images, but never
> install closed source firmware by default. "No" should be the default.
That's the option 3 more or less.

> to put "non-free" into sources.list should also be an non-default choice,
> even when you install closed source firmware.
No, that's a bad idea, which is one of the main reasons for the option 5.

-- 
WBR, wRAR


signature.asc
Description: PGP signature


Bug#1010065: ITP: swagger-ui -- Swagger UI is a collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API.

2022-04-23 Thread Jelmer Vernooij
Package: wnpp
Severity: wishlist
Owner: Jelmer Vernooij 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: swagger-ui
  Version : 4.10.3
  Upstream Author : Name 
* URL : https://github.com/swagger-api/swagger-ui
* License : Apache-2.0
  Programming Lang: Javsscript
  Description : generate beautiful documentation from a Swagger-compliant 
API

Swagger UI allows anyone — be it your development team or your end consumers —
to visualize and interact with the API’s resources without having any of the
implementation logic in place. It’s automatically generated from your OpenAPI
(formerly known as Swagger) Specification, with the visual documentation making
it easy for back end implementation and client side consumption.



Re: shim-signed (was: Firmware - what are we going to do about it?)

2022-04-23 Thread Steve McIntyre
Marc Haber wrote:
>On Fri, 22 Apr 2022 11:16:42 +0200, Philip Hands 
>wrote:
>>I understand the urge to insist upon absolute DFSG purity in the media
>>we produce, but when it comes to wanting to avoid every last shred of
>>data that we could not regenerate ourselves, I think we crossed that
>>line some time ago.
>>
>>I'm thinking of shim-signed, which is included in our official media.
>>
>>Despite being free software in source form, it is signed by Microsoft,
>>and can only be expected to work with that signature ... which we cannot
>>create.
>>
>>On most (all?) hardware one is able to avoid UEFI secure-boot, so won't
>>need to use shim-signed, but I'd imagine that some hardware insists on
>>secure-boot, or the opt-outs are somehow broken and so is not usable
>>without shim-signed.
>
>Excuse me for asking a user question on -devel, but do we have any
>docs where someone explains how much a security trade off is
>shim-signed relativ to the optimum? I think that using shim-signed is
>surely worse than a directly signed kernel, but I don't know whether I
>can tell my system (or shim-signed?) to accept MY or Debian's signed
>kernel without the Microsoft intermediate signature, and whether this
>is any more secure than running an encrypted system without secure
>boot at all.

We don't have good docs around this in general (hey, it's security
software - it's against the law to write good and complete docs!), but
I've certainly discussed this with a few folks over the years.

Fundamentally, shim is a compromise. It lets us use an existing root
of trust (that's already installed on the vast majority of x86
machines) to bootstrap our own secure setup.

If you don't like the fact that Microsoft's keys are involved. it's
possible on a lot of machines to enrol your own keys and remove
Microsoft's entirely. If you go that way, you could absolutely sign
grub and/or the kernel directly. But that's not something that's easy
to do - it's not likely to work well for the vast majority of users.

Running an encrypted system without secure boot *at all* is a
difficult thing to support well. The entire point of SB is that the
firmware can use keys to validate the next stage in the boot
process. An *encrypted* kernel stops other people logging in to your
system, but it does not give you protection against somebody tampering
with the system behind your back and doing a MitM attack.

Alternatively, people can build replacement shim-signed packages using
their own root of trust if desired. If we had a large enough number of
users wanting a different root of trust, we could even offer our own
different shim-signed package to match.

...

>>If not, is the problem having other blobs of data on the media that we
>>also cannot generate, or is it the licensing of that data, or something
>>else?
>
>We can compile shim-signed and compare the signed code with our own
>object code, can't we?  That we we would only have to worry about the
>validity and benignness of the signature and not worry about having
>undocumented functionality in the signed code.

Better than that, our shim-signed source package always double-checks
things here. At build time it removes the Microsoft signature and
compares that shim binary to the binary that we submitted for
signing. We would spot immediately if there was any code added.

-- 
Steve McIntyre, Cambridge, UK.st...@einval.com
"We're the technical experts.  We were hired so that management could
 ignore our recommendations and tell us how to do our jobs."  -- Mike Andrews



Re: Re: Firmware - what are we going to do about it

2022-04-23 Thread Steven Robbins
Luca Boccassi wrote:

> Personally, I'd even go for option 4, so that other drivers are covered
> too (the general advice that can be found on the internet for users
> with nvidia hardware seems to be: "avoid Debian, go Ubuntu/Mint/etc",
> which is just a sad state of affairs). But option 5 is already a great
> improvement upon the status quo.

Agree!  

The original post did mention video cards, but I'm left unsure whether the 
non-free stuff in the NVidia case, for example, would fall into "firmware" 
(hence included) or "drivers".  If the latter, my sense is that Option 5 was 
intended to be narrowly focused and exclude such drivers.  I'd rather support 
a wider focus that would include drivers -- basically any "non-free hardware 
support package".  So if Option 5 is narrow and Option 4 is wide-open "non-
free" maybe there's room for an option in between?

-Steve



signature.asc
Description: This is a digitally signed message part.


Re: Firmware - what are we going to do about it?

2022-04-23 Thread Paul van der Vlis

Op 23-04-2022 om 16:10 schreef Andrey Rahmatullin:

On Sat, Apr 23, 2022 at 03:13:29PM +0200, Paul van der Vlis wrote:

I see several possible options that the images team can choose from here.
However, several of these options could undermine the principles of Debian. We
don't want to make fundamental changes like that without the clear backing of
the wider project. That's why I'm writing this...


I have an idea for an extra option:

6. Put the closed source firmware somewhere in the Debian images, but never
install closed source firmware by default. "No" should be the default.

That's the option 3 more or less.


Option 3 says to publish two sets of images.
And it says nothing about defaults.


3. We could stop pretending that the non-free images are unofficial, and 
maybe move them alongside the normal free images so they're published 
together. This would make them easier to find for people that need them, 
but is likely to cause users to question why we still make any images 
without firmware if they're otherwise identical.




to put "non-free" into sources.list should also be an non-default choice,
even when you install closed source firmware.

No, that's a bad idea, which is one of the main reasons for the option 5.


The idea is not to promote closed source firmware in any way. Have it 
available, but only for the people who really want it.


Maybe it's also an idea to put the firmware in a seperate partition.

With regards,
Paul

BTW: I sell Debian media like USB-sticks. I know about the problems 
people have to choose a medium-type etc.



--
Paul van der Vlis Linux systeembeheer Groningen
https://vandervlis.nl



Re: Firmware - what are we going to do about it?

2022-04-23 Thread Iustin Pop
On 2022-04-23 22:48:03, Paul van der Vlis wrote:
> Op 23-04-2022 om 16:10 schreef Andrey Rahmatullin:
> > On Sat, Apr 23, 2022 at 03:13:29PM +0200, Paul van der Vlis wrote:
> > > > I see several possible options that the images team can choose from 
> > > > here.
> > > > However, several of these options could undermine the principles of 
> > > > Debian. We
> > > > don't want to make fundamental changes like that without the clear 
> > > > backing of
> > > > the wider project. That's why I'm writing this...
> > > 
> > > I have an idea for an extra option:
> > > 
> > > 6. Put the closed source firmware somewhere in the Debian images, but 
> > > never
> > > install closed source firmware by default. "No" should be the default.
> > That's the option 3 more or less.
> 
> Option 3 says to publish two sets of images.
> And it says nothing about defaults.
> 
> 
> 3. We could stop pretending that the non-free images are unofficial, and
> maybe move them alongside the normal free images so they're published
> together. This would make them easier to find for people that need them, but
> is likely to cause users to question why we still make any images without
> firmware if they're otherwise identical.
> 
> 
> > > to put "non-free" into sources.list should also be an non-default choice,
> > > even when you install closed source firmware.
> > No, that's a bad idea, which is one of the main reasons for the option 5.
> 
> The idea is not to promote closed source firmware in any way. Have it
> available, but only for the people who really want it.

Uh. Have you actually read the start of the thread? Most machines
nowadays *need* it. It's not about wanting, but about the fact that
firmware is needed, and the more barriers you put in front of people,
the more people will just go with Ubuntu or other alternatives.

Making Debian hard to use is a very short-sighted view of how to promote
free software - it works in the very short term only.

regards,
iustin



Re: Firmware - what are we going to do about it?

2022-04-23 Thread Timothy M Butterworth
On Sat, Apr 23, 2022 at 4:50 PM Paul van der Vlis 
wrote:

> Op 23-04-2022 om 16:10 schreef Andrey Rahmatullin:
> > On Sat, Apr 23, 2022 at 03:13:29PM +0200, Paul van der Vlis wrote:
> >>> I see several possible options that the images team can choose from
> here.
> >>> However, several of these options could undermine the principles of
> Debian. We
> >>> don't want to make fundamental changes like that without the clear
> backing of
> >>> the wider project. That's why I'm writing this...
> >>
> >> I have an idea for an extra option:
> >>
> >> 6. Put the closed source firmware somewhere in the Debian images, but
> never
> >> install closed source firmware by default. "No" should be the default.
> > That's the option 3 more or less.
>
> Option 3 says to publish two sets of images.
> And it says nothing about defaults.
>
> 
> 3. We could stop pretending that the non-free images are unofficial, and
> maybe move them alongside the normal free images so they're published
> together. This would make them easier to find for people that need them,
> but is likely to cause users to question why we still make any images
> without firmware if they're otherwise identical.
> 
>
This is the option I like. As a user who needs the closed source binary
blobs they should be easier to find.


> >> to put "non-free" into sources.list should also be an non-default
> choice,
> >> even when you install closed source firmware.
> > No, that's a bad idea, which is one of the main reasons for the option 5.
>
> The idea is not to promote closed source firmware in any way. Have it
> available, but only for the people who really want it.
>
> Maybe it's also an idea to put the firmware in a seperate partition.
>
> With regards,
> Paul
>
> BTW: I sell Debian media like USB-sticks. I know about the problems
> people have to choose a medium-type etc.
>
>
> --
> Paul van der Vlis Linux systeembeheer Groningen
> https://vandervlis.nl
>
>


Re: Firmware - what are we going to do about it?

2022-04-23 Thread Andrey Rahmatullin
On Sat, Apr 23, 2022 at 10:48:03PM +0200, Paul van der Vlis wrote:
> > > I have an idea for an extra option:
> > > 
> > > 6. Put the closed source firmware somewhere in the Debian images, but 
> > > never
> > > install closed source firmware by default. "No" should be the default.
> > That's the option 3 more or less.
> 
> Option 3 says to publish two sets of images.
> 
> 
> 3. We could stop pretending that the non-free images are unofficial, and
> maybe move them alongside the normal free images so they're published
> together. This would make them easier to find for people that need them, but
> is likely to cause users to question why we still make any images without
> firmware if they're otherwise identical.
> 
If you want to drop the non-firmware image then it's the option 4 more or
less.

> And it says nothing about defaults.
d-i defaults are mostly unrelated to the ISO set and the archive setup
questions. You seem to want to add a yet another "free vs usable, with
free as the default" question, which is not too bad, just yet another
thing for most people to change.

> > > to put "non-free" into sources.list should also be an non-default choice,
> > > even when you install closed source firmware.
> > No, that's a bad idea, which is one of the main reasons for the option 5.
> 
> The idea is not to promote closed source firmware in any way. Have it
> available, but only for the people who really want it.
*shrug* that's just "have it available for most people" with extra
complexity. And you seem to miss the problem with installing firmware
packages but not enabling updates for them.

-- 
WBR, wRAR


signature.asc
Description: PGP signature


Re: secnet_0.6.2_multi.changes REJECTED

2022-04-23 Thread Sean Whitton
Hello,

On Mon 11 Apr 2022 at 05:51PM +01, Ian Jackson wrote:

>> They also pointed out that there is some code from StackOverflow,
>> which is not GPL-3+.
>
> I think this is not right?  I think you are referring to
> `argparseactionnoyes.py`.  As I documented in the file header, it is
> part of StackOverflow's TOS that contributors grant a CC-BY-SA 4.0
> licence for the snippets they upload, which would make the
> contributions GPL3+-compatible.  My file comment gives the relevant
> references. [1]
>
> It seems to me that StackOverflow have chosen this approach (making
> the upload licence part of the TOS) precisely to enable people to copy
> code fragments out of StackOverflow into their own projects.  ISTM
> that in (unless it appears that the posting StackOverflow user did not
> write the code in question), we should be able to rely on that.
>
> Can you please confirm whether the opinion of the ftpmaster team, that
> is not sufficient?  If it is not sufficent, I guess I will find
> someone to write a clean room implementation of this 22-line class.

In this case, I believe I was just passing on the other team member's
comment.  What you say seems fine, though it should be documented in
d/copyright -- the code does not become GPL-3+ by being GPL-3-compatible.

>> I noticed that b91dec.{php,awk} have no license information at all.
>
> As you observe, these files as provided by upstream do not themselves
> contain licence information.  But the file base91-c/README (which is
> provided by upstream) says, amongst other things:
>
>  All source code in this package is released under the terms of the BSD 
> license.
>  See the file LICENSE for copying permission.
>
> And these files were (according to their copyright notice) written by
> the same author and clearly part of the base91-c project.  I think
> this licence therefore applies also to the files b91dec.{php,awk}.

Sounds like I was just being confused by directory structure, then.

>> Shouldn't subdirmk be a separate package?
>
> Well.  It is designed to be "git-subtree"'d into one's package.  That
> is the way the upstream package uses it.
>
> It would be possible to make it a separate package and build-depend on
> it, at the cost of some additional work.  The upside would be a very
> small amount of disk space saving, and largely theoretical saving of
> work in case of a need to do a security update for subdirmk (which
> seems unlikely to be critical since it's build system software which
> is designed to execute its input) - and that all only in the case
> where a second package in Debian uses subdirmk.
>
> It seemed me best to me to defer this work until subdirmk becomes more
> widely used.

Cool.  Just wanted to raise the question.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Re: Firmware - what are we going to do about it

2022-04-23 Thread Steve McIntyre
Steven Robbins wrote:
>
>Luca Boccassi wrote:
>
>> Personally, I'd even go for option 4, so that other drivers are covered
>> too (the general advice that can be found on the internet for users
>> with nvidia hardware seems to be: "avoid Debian, go Ubuntu/Mint/etc",
>> which is just a sad state of affairs). But option 5 is already a great
>> improvement upon the status quo.
>
>Agree!  
>
>The original post did mention video cards, but I'm left unsure whether the 
>non-free stuff in the NVidia case, for example, would fall into "firmware" 
>(hence included) or "drivers".  If the latter, my sense is that Option 5 was 
>intended to be narrowly focused and exclude such drivers.  I'd rather support 
>a wider focus that would include drivers -- basically any "non-free hardware 
>support package".  So if Option 5 is narrow and Option 4 is wide-open "non-
>free" maybe there's room for an option in between?

I have no desire to add a wider set of packages from non-free onto our
media, I'm afraid. I'm entirely focused on firmware and **not**
drivers. As and when we start to draft a GR to formalise what the
project wants, feel free to add an option for that too but I
personally wouldn't expect it to gain much traction.

-- 
Steve McIntyre, Cambridge, UK.st...@einval.com
"We're the technical experts.  We were hired so that management could
 ignore our recommendations and tell us how to do our jobs."  -- Mike Andrews



Re: shim-signed (was: Firmware - what are we going to do about it?)

2022-04-23 Thread Paul Wise
On Sat, 2022-04-23 at 18:21 +0100, Steve McIntyre wrote:

> If you don't like the fact that Microsoft's keys are involved,
> it's possible on a lot of machines to enrol your own keys

On machines where this isn't possible in the UEFI firmware interface,
IIRC shim-signed is designed to allow you to enrol your own keys; you
should be able to boot Debian's MS-signed shim-signed once, enrol your
own keys and then switch to your own shim-signed. If UEFI bugs prevent
loading your own shim-signed, then Debian's MS-signed shim-signed will
still let you replace the Debian-signed GRUB, Linux etc images. 

IIRC this was done so that the distro docs can ignore the UEFI firmware
user interface for enrolling keys, which is different for every UEFI
vendor, while the shim interface for this is the same everywhere.

Of course, there may be UEFI bugs that break some of this, and on ARM
the MS requirement to allow enrolling keys was initially not present,
not sure if they re-added it for recent ARM based Windows laptops.

> and remove Microsoft's entirely.

ISTR that I read that even if you can do this on your particular UEFI
firmware, in practice this often *isn't* possible because parts of the
pre-installed firmware for some devices (option ROMs?) are MS-signed.

> we could even offer our own different shim-signed package to match.

Renaming shim-signed to shim-signed-microsoft and adding a new package
shim-signed-debian sounds like a good idea to me.

> If we had a large enough number of users wanting a different root of trust

I've seen a few people over the years wanting this, most want their own
root of trust rather a Debian root of trust though. There probably
aren't enough people to justify the extra effort, but it would make
Debian useful in a few more use-cases.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


Re: Firmware - what are we going to do about it?

2022-04-23 Thread Simon Richter

Hi,

On 4/23/22 11:07 PM, Iustin Pop wrote:


Making Debian hard to use is a very short-sighted view of how to promote
free software - it works in the very short term only.


The same applies in the other direction -- making no real distinction 
between free and non-free software is a short term solution to the 
usability problem, but does not incentivize hardware vendors to open up 
designs in the slightest.


With drivers, user awareness is there at least. People know that the nV 
drivers are essentially unsupported and if it breaks, they get to keep 
the pieces. The same isn't true for firmware, users just expect that 
stuff will work and if it doesn't, it's Debian's fault. We can either 
validate that expectation, or push back on it, saying "this hardware is 
supported on a best-effort basis, but we can't help you because it's 
closed source."


   Simon



Re: shim-signed

2022-04-23 Thread Tollef Fog Heen
]] Marc Haber 

> Excuse me for asking a user question on -devel, but do we have any
> docs where someone explains how much a security trade off is
> shim-signed relativ to the optimum? I think that using shim-signed is
> surely worse than a directly signed kernel, but I don't know whether I
> can tell my system (or shim-signed?) to accept MY or Debian's signed
> kernel without the Microsoft intermediate signature, and whether this
> is any more secure than running an encrypted system without secure
> boot at all.
> 
> Do we have docs for that?

I don't think we have docs for running with a different root of trust
than MS'. To be honest, I'm not sure we even _should_ have a lot of docs
around it, since the general brittleness of the boot process, UEFI and
friends might very well lead to more systems being broken when people
discover the docs and run with the instructions without understanding
the implications.

As for it being more secure, for that to be a good and meaningful
discussion, we have to agree on what the threat model is.  What's the
threat you want to protect against by using your own or Debian's keys?

-- 
Tollef Fog Heen
UNIX is user friendly, it's just picky about who its friends are