Lennart Poettering
Lennart Poettering
> This was discussed in the review: [#24659 (comment)](https://github.com/systemd/systemd/pull/24659#issuecomment-1263635283) I see no discussion. This implements a pattern, not a unit name. If this was actually returning a single unit dump...
So, in my thinking there are two ways to bind a kernel/TPM combination to an OS file system. 1. Use verity, encode the root hash in the kernel cmdline embedded...
I see, so it's a lot more about having measurements of what happened than about blocking what can happen, right? I don't really grok what "confidential computing" really means. I...
> The threat is a malicious host OS that compromises the guest disk image in some manner. Thus the goal is establish trust of the disk mount setup after boot,...
@bluca how can IMA deliver mount measurements btw, if userspace issues them in undetermined order and in context of mount namespaces?
> Well, the gpt is not encrypted so it is easy to make the guest behave in specific ways by the host tampering with it. It must be considered untrusted...
btw, systemd nowadays picks ups credentials (i.e. this stuff: https://systemd.io/CREDENTIALS/) from smbios type 11. Should systemd measure them if we pick them up from there? I presume so?
ok, so i get the sense you don't actually care about what is mounted or which luks volumes are attached. What you do care is that all data that flows...
> Good question. The firmware loads that from qemu, and I remember plans to have the firmware measure everything it gets from qemu via fw_cfg. Need to ask what the...
btw, we have the general problem in linux that, right now /dev/disk/by-*/ based mounts are totally untrusted. if you plug in a usb stick with the same uuids as your...