Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

nixos/luks: offer rekeying procedure at early boot time #240411

Draft
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

RaitoBezarius
Copy link
Member

@RaitoBezarius RaitoBezarius commented Jun 28, 2023

Description of changes

Due to GHSA-3rvf-24q2-24ww We decided to offer rekeying procedures in NixOS based on nixos.rekey command line argument at boot in stage 1.

This is automatically enabled if we heuristically find you are affected by the vulnerability mentioned above.

This is a very early sneak peek because I will finish this tomorrow hopefully.

TODO:

  • systemd stage 1 unit
  • cleanup the bash script in luksroot.nix
  • finish up the tests for both situation
  • ensure resilience mode is the correct one
  • document document document
  • offer rekey "force" disablement
Things done
  • Built on platform(s)
    • x86_64-linux
    • aarch64-linux
    • x86_64-darwin
    • aarch64-darwin
  • For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
  • Tested, as applicable:
  • Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
  • Tested basic functionality of all binary files (usually in ./result/bin/)
  • 23.11 Release Notes (or backporting 23.05 Release notes)
    • (Package updates) Added a release notes entry if the change is major or breaking
    • (Module updates) Added a release notes entry if the change is significant
    • (Module addition) Added a release notes entry if adding a new NixOS module
  • Fits CONTRIBUTING.md.

Due to GHSA-3rvf-24q2-24ww
We decided to offer rekeying procedures in NixOS based on `nixos.rekey` command line argument at boot in stage 1.

This is automatically enabled if we heuristically find you are affected by the vulnerability mentioned above.
@@ -222,6 +229,9 @@ for o in $(cat /proc/cmdline); do
boot.panic_on_fail|stage1panic=1)
panicOnFail=1
;;
nixos.rekey)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we really want this? Looks like a feature creeping in that might be hard/annoying to get rid of again.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you're right

@wegank wegank added the 2.status: stale https://github.com/NixOS/nixpkgs/blob/master/.github/STALE-BOT.md label Mar 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants