Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Red Hat Software Linux

Fedora Change Proposal: Supporting Unified Kernel Images for Improved Security (phoronix.com) 67

While "this proposal will only be implemented if approved by the Fedora Engineering Steering Committee," Phoronix reports: Red Hat and Fedora engineers are plotting a path to supporting Unified Kernel Images (UKI) with Fedora Linux and for the Fedora 38 release in the spring they are aiming to get their initial enablement in place.

Unified Kernel Images have been championed by the systemd folks for better securing and trusting Linux distributions. Unified kernel images are a combination of the kernel image, initrd, and UEFI stub program all distributed as one.... The initial phase would focus on shipping a UKI as an optional sub-RPM that users can opt into initially, updating kernel install scripts so unified kernels are installed and properly updated, and bootloader support for unified kernel images. Adding systemd-boot support to the installers, better measurement and remote attestation support, and switching Fedora Cloud images to using unified kernels are among the additional goals but of lower priority.

Fedora's wiki includes a detailed description of the change proposal: The goal is to move away from initrd images being generated on the installed machine. They are generated while building the kernel package instead, then shipped as part of a unified kernel image. A unified kernel image is an all-in-one efi binary containing kernel, initrd, cmdline and signature....

Main motivation for this move is to make the distro more robust and more secure.

This discussion has been archived. No new comments can be posted.

Fedora Change Proposal: Supporting Unified Kernel Images for Improved Security

Comments Filter:
  • by Anonymous Coward

    I have no experience with Fedora. I've mostly used Debian-based and Arch-based distros.
    But whether you're trying to support some special hardware or use virtualization, a lot of setups need additional kernel modules or other tweaks.
    I really don't know what they mean by "better securing and trusting Linux distributions". What is the threat model here?
    What is the risk in "initrd images being generated on the installed machine"?

    • Because a locally generated initrd isn't signed?
    • https://github.com/AonCyberLab... [github.com]

      Initrd, as it is now, basically negates all the defenses that secure boot was meant to enable.

      • by drkshadow ( 6277460 ) on Saturday December 24, 2022 @04:15PM (#63155606)

        Maybe you're not being pedantic, but...

        Defenses pushed by which organization, initially? How did the Linux community originally respond to those pushes, again?

        How many people are really concerned about a boot-time attack on their computer/server? Which customers are clammoring for this functionality?

        • Re: (Score:2, Informative)

          Secure boot is optional, so is UKI. Fedora/RHEL are just two Linux distros among dozens which will definitely adopt it. Tell me again, why are so enraged?

          I'm looking forward to it because I want to know my laptop's boot hasn't been tampered with (which results in persistent rootkits/full access to my data/spying) while I've not been looking at it.

          You may ask, "What about HW level keyloggers, etc.?" You're right but security is not ultimate, it's multilayered. Installing a HW keylogger requires a ton mor

          • by Schoenlepel ( 1751646 ) on Saturday December 24, 2022 @06:08PM (#63155780)

            Systemd was optional too, initially. Then a lot of software started mysteriously depending on it with no clear reason as to why systemd should be used.

            Now you can either live with it, or miss functionality (logging in sddm, f.e.) or (in some cases) not even be able to use some software anymore (gnome, f.e.).

            So, yes, we're paranoid about this. Lets just hope the other distributions do not pick up on this monumental control grab.

            Don't worry people, it WILL be required soon enough.

            There are other ways to lock down your system in Linux, which will leave it pretty much unhackable, such as signed binaries (the signature of binaries being checked with each execution), kernel and module signing, and a properly configured bootloader along with secure boot turned on; ACL properly configured to make sure nobody (including root) can touch the boot chain, and nobody messes with the core binaries and configuration files - good luck executing untrusted software. Take all these measures and nothing crazy should happen.

            Now, there's bound to be vulnerabilities somewhere in there, but further measures are still possible to lock down the system, which will result in people only being able to use the system for what it was meant to be used.

            • "There are other ways to lock down your system in Linux, which will leave it pretty much unhackable, such as signed binaries (the signature of binaries being checked with each execution), kernel and module signing, and a properly configured bootloader along with secure boot turned on"

              This is an extension of exactly those mechanisms. The thing being addressed here is a huge gap in that security chain: currently if you're taking Secure Boot seriously, then nearly everything in the boot chain is signed...*exce

              • by Anonymous Coward

                Your explanation is insightful and lucid, but I think you're still missing something.
                The only possible use case for Secure Boot is to stop an attacker who already has root.
                But someone who can change every file on the system has no need to mess with the few signed ones.
                That's why that sort of malware doesn't exist.
                Secure Boot is pointless security theater.
                IT admins who want this nonsense should be using some rootless system like Android.

          • Re: (Score:2, Insightful)

            by Anonymous Coward

            Secure boot is optional

            For now. True security will involve systemd refusing to run* unless it has been started in a "secure environment". i.e. Secure Boot and UKI.

            No problem. We can just go back to System V init. Ha! Too many dependencies have been built and are being built into everything from the window managers, login processes and networking to ever unravel that hairball.

            *Like Windows. Gee, I wonder where this idea came from?

            • True security will involve systemd refusing to run* unless it has been started in a "secure environment".

              ...except that all the pieces of software under the "systemd" umbrella are all opensource down to the last one.

              So it's absolutely trivial to make the feature optional, and some distro (let's say openSUSE and Manjaro) to allow an "require-signed-initrd=no" option.
              Or for the people who actually need signed initrd, to have a mecanism to sign their own.
              etc.

              Opensource gives option and entities which are not Red Hat might chose a different default one.

              *Like Windows. Gee, I wonder where this idea came from?

              ...which is a proprietary blob on which you have 0 control.

    • by PPH ( 736903 ) on Saturday December 24, 2022 @04:07PM (#63155598)

      What is the threat model here? What is the risk in "initrd images being generated on the installed machine"?

      That you will build something non-standard to suit your own needs. Rather than just running the signed packages that you are handed without asking any questions.

      You will own nothing and be happy.

  • What a bullshit idea (Score:5, Informative)

    by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Saturday December 24, 2022 @03:55PM (#63155564) Homepage Journal

    The goal is to move away from initrd images being generated on the installed machine. They are generated while building the kernel package instead, then shipped as part of a unified kernel image.

    I'm using that functionality! I'm building drivers that go into the initrd! What kind of asshole thinks ideas like this up?

    Unified Kernel Images have been championed by the systemd folks

    What a shocking surprise. Fuck those fucking fucks right in their stupid fucking faces. Note also that the detailed proposal [fedoraproject.org] says nothing about how they're going to handle the cases where someone needs a driver not shipped with the system.

    • Continue to use the uefi stub?
    • by 93 Escort Wagon ( 326346 ) on Saturday December 24, 2022 @04:07PM (#63155596)

      While arguably trivial, I must say a detailed proposal that includes obvious spelling errors and emoji does not raise my confidence level.

      • Thats why there is 'Phase 1' in title, so we can have more Phases in future releases ðYf That is verbatum from the proposal. Somehow we are supposed to trust all of this security to someone who can't compose a sentence properly. They started a sentence with 'thats' which is not even spelled properly let alone that the correct word would this and not that. Ignoring the spelling error and grammatical mess they also use a smiley face which should make it all okay. Holy fucking hell. How can I trust so
    • by Artem S. Tashkinov ( 764309 ) on Saturday December 24, 2022 @04:11PM (#63155602) Homepage

      I'm using that functionality! I'm building drivers that go into the initrd! What kind of asshole thinks ideas like this up?

      UKI is not mandatory, "NOT planned: remove support for non-UKI kernels", and you're free to use an initrd if you dislike the idea of an additional layer of security.

      Note also that the detailed proposal says nothing about how they're going to handle the cases where someone needs a driver not shipped with the system.

      Or maybe it does: "Phase 2+: Expand UKI support, tackling the use cases which depend on a host-specific initrd or command line (see below) one by one".

      Comments like this are I guess the primary reason people shy away from Linux. Hatred, animosity, superiority/elitism complex, tribalism.

      Dedicated developers are working to make Linux actually secure vs. a gaping hole [github.com] which initrd is now and they get this kind of reception. Appalling really.

      • by fahrbot-bot ( 874524 ) on Saturday December 24, 2022 @04:22PM (#63155618)

        ... you're free to use an initrd if you dislike the idea of an additional layer of security.

        And up-stream control. Just sayin' that I wouldn't be surprised to discover there was more to this move than that.

      • by vbdasc ( 146051 )

        Comments like this are I guess the primary reason people shy away from Linux. Hatred, animosity, superiority/elitism complex, tribalism.

        Lol, this is rich, coming from a guy pushing hard for UKI to be implemented, and even creating bugreports in the bugzilla to that effect, and not bothering to disclose this connection. You have a conflict of interest, dude. Your brainchild is not being received with all the enthusiasm you hoped for, and you now are faking some righteous indignation. Not cool, at all.

        Dedicated developers are working to make Linux actually secure vs. a gaping hole [github.com] which initrd is now and they get this kind of reception. Appalling really.

        Will you trust your laptop after an adversary has booted it from external media, even after this UKI thing gets implemented? Answer honestly.

      • you're free to use an initrd if you dislike the idea of an additional layer of security.

        It's not an extra layer of security. You can't just put layers in places and call it security. That's not how it works.

    • For Linux users not interested in kernel hacking, having "the OS you think you're booting" == "the OS you're actually booting" is important. UKIs are a step towards that goal. And provided the make it easy for power users to load a non UKI system, it is fine.

      • by Entrope ( 68843 )

        It's also useful for people who are comfortable with kernel hacking. I am the lead system engineer on system where this would be really useful -- it will include a bunch of mostly-unstaffed GNSS monitoring stations and I would like more confidence that the software running on those is what we put there. A signed initrd is a good way to establish that chain of trust, and it's currently a huge hassle to get right.

      • For Linux users not interested in kernel hacking, having "the OS you think you're booting" == "the OS you're actually booting" is important.

        Why? Again, what is the threat model here?
        If an attacker has access to alter your initrd, they don't need to alter it.

        • That userspace is still susceptible to some one with root privileges is a different (but still valid) topic/concern. This is about protecting the boot environment and the integrity of the kernel.
    • Note also that the detailed proposal [fedoraproject.org] says nothing about how they're going to handle the cases where someone needs a driver not shipped with the system.

      That is because you cannot use a distro signed UKI when that happens so the only solution for such use cases is to build the initrd locally as is done today. Perhaps stop with your rage and calm down so you can realize basic stuff like this. No is going to force this down your throat so calm down.

      Notice that they even write at the top of that page:

      The goal is to move away from initrd images being generated on the installed machine where possible.

      Note the "where possible" so they already addressed your concerns and will not force a UKI on you since it's not possible in that case. Cheesus you systemd-haters

    • It's worth noting that In The Beginning, one of the foremost reasons someone would use Linux was the ability to modify and recompile the kernel.
    • by AmiMoJo ( 196126 )

      Haven't looked for a while but are we still at the stage where you have to build drivers into the kernel? Windows has been able to load them from disk since the 2000 days, probably before. If your boot disk needed a driver you could put it in a special area along side the kernel so it could be loaded the same way.

      • Haven't looked for a while but are we still at the stage where you have to build drivers into the kernel?

        Into the kernel itself? No. Sign the kernel all you want. Into the initrd? Yes. That's what DKMS is for, and I'm still using it for a driver which is not in the kernel sources.

    • Why are you so angry about something you can choose not to use? Blink twice if someone is holding a gun to your head forcing you to use fedora,

    • FreeBSD had signed UEFI kernels for years and no one said anything. There is some misconfusion this is a DRM scheme invented by Microsoft as a way to kill all open source and turn pcs into Tivios or ATMs all locked down to enforce payment plans etc.

      All this is is to prevent rootkits (root ... that sounds like Unix) from being loaded and turning the host into a virtual machine where the malware can't be removed or detected.

      In UEFI you can add and sign your own bootloaders and kernels. At work we do this with

      • by vbdasc ( 146051 )

        Fair enough... then just sign your initrd's right after you build them. Problem solved.

        • by tlhIngan ( 30335 )

          Fair enough... then just sign your initrd's right after you build them. Problem solved.

          Which defeats the purpose, because if you self-signed the initrd, malware can do the same, so the fact your initrd is signed is meaningless because now you need to verify through some offline means if the initrd was altered without you knowing.

          The thing is, Linux isn't at a crossroads. It's not "us vs them". Linux needs to serve dual purposes that are at odds with each other.

          First, it needs to be an open system for people

          • But people also need Linux to be able to be secured and locked down - you're an IT admin, and want to ensure your Linux server isn't being used for anything other than what you say it is. You don't want malware, rootkits, or other things running on that machine you didn't approve of.

            So don't give root access to anyone who will run that stuff.
            Once an attacker has root, your half-assed Secure Boot means nothing.

      • All this is is to prevent rootkits (root ... that sounds like Unix) from being loaded and turning the host into a virtual machine where the malware can't be removed or detected.

        Has that ever happened ever?

    • +1 & Amen to this, (although I withold endorsement on the expletives:)). All the threat models I see are higher up. I have never become aware of a bootup threat to linux [that's not saying there never was one].

      My guess is: This idea came from Red Hat Sales/Marketing who are trying to sell to managers who have never used linux and only know M$ windoze. Fedora seem to be crash-testers for RHEL anyhow.

      My second guess is that as M$ have that systemd guy, they might try to get that into windows 11 as
    • by ald_a ( 265781 )

      Sadly, I believe, almost all other distros will follow this crappy idea.

  • No (Score:3, Informative)

    by Anonymous Coward on Saturday December 24, 2022 @03:58PM (#63155576)
    if it's championed by systemd folks, it should be ignored!
  • by 93 Escort Wagon ( 326346 ) on Saturday December 24, 2022 @04:05PM (#63155592)

    Given Red Hat's behavior over the last several years, the first question that comes to my mind is - any way this could be used by Red Hat to make life difficult for community re-distributions, such as AlmaLinux or Rocky Linux?

    • Such as?

      Being one of the primary contributors to the kernel, systemd, various unification processes, etc?

      I am not a fan of their pursuit of Wayland/GTK/Gnome considering how it's all being handled ("use Gnome or GTFO [freedesktop.org]") but I don't see simple solutions at all. Development is not free and understaffed projects tend to die off, so there's that.

      Where are all the feature-rich, modern, fast, supported, relatively bug free alternatives to GTK/Qt (both mostly developed commercially)? Nnnnn ... othing? People

  • by Rosco P. Coltrane ( 209368 ) on Saturday December 24, 2022 @04:16PM (#63155608)

    Take modular, separate tools that are designed to do one thing and do it well, and combine them into a single blob that does everything - and doesn't always manage to do certain things right.

    Here's a concrete example of why this is a stupid idea: I have a Linux box here running on one particularly hateful HP laptop. This laptop's screen backlight (and to a certain extent, display itself) only works correctly with Linux 5.8.0. Earlier kernels don't work well, later kernels don't work well. It's just this version. So the package is pinned while I allow the rest of the system to stay current with upgrades.

    With a Unified Kernel Image, not only will the kernel stay at the same version, but all the rest that's been tacked onto it as well.

    This is not desirable.

    You might say it's a rare problem, it's just me and I should buy a better laptop instead of holding everyone back, and I'll tell you this: fuck you, unless you give me the money for a new laptop. Until then, this one will have to do, and I'd rather it stayed as current as it technically can.

    • I think they want you to learn how wayland and works and write your own driver.

    • Well the simple solution for you then is to not enable the UKI in Fedora and keep on using you older kernel. I mean in the very proposal linked in TFS they even spelled it out:

      NOT planed: remove support for non-UKI kernels

      • by ufgrat ( 6245202 )

        Not "planned". Not "never gonna happen", just "not planning on it yet". I'm sure if you dig, you can find a statement from systemd folks early on that it would never be their intention to "require" systemd-- unless you're a Gnome user, in which case you need it. And you need DNS resolution in systemd. I'm sure it's only a matter of time before ssh and ntp get subsumed by systemd.

        Given Red Hat's recent behavior towards applications like Tomcat and Docker, I trust Red Hat about as far as I can throw my da

        • First it was not the systemd folks that made Gnome use logind, that was a decision done by the Gnome devs themselves. Further that was on logind and not systemd and since then there have been multiple 3d party implementations of logind making that argument even more moot. And no you don't need DNS resolution in systemd either, the systemd project does provide a DNS resolver for you to use if you choose to do so but it is completely optional and i will _never_ be a requirement of systemd.

          And not only is it n

          • by ufgrat ( 6245202 )

            So this this all just another conspiracy thoery by the anti systemd and anti Red Hat folks.

            Not at all. I'm merely suggesting that we shouldn't blindly accept something that can lead to lock in. Doesn't mean it will-- but it doesn't mean it won't, either.

            Systemd has demonstrated a belief that anything outside of their control cannot be trusted, and just because systemd wasn't responsible for the Gnome dependency, doesn't mean they're blameless either-- I haven't looked lately, but at one point, there was some definite overlap between the teams.

            As for 3rd party kernel modules, there are factions

            • So basically you are blaming the systemd developers for developing something that other projects feels are great functionality that they want to utilize, I think you should think that one over once more and realize what you actually are saying here.

              As for blessing 3d party drivers this would only work if they where all included in the distro supplied UKI and this will never happen so yes this is a completely unwarranted fear. And _even_ if RH would ever be stupid enough to make such a decision there are pl

              • by ufgrat ( 6245202 )

                Will you get over your incredibly defensive attitude about systemd? I'm not attacking systemd, I'm using it as an example of how something that wasn't supposed to lead to lock in, did.

                That's it.

                • This is not defending systemd this is showing that your argument does not hold water. This is not an example of lock in, not only does it not fit the definition but the interfaces provided (which is what the dependency is on) are completely open.
    • I have a Linux box here running on one particularly hateful HP laptop. This laptop's screen backlight (and to a certain extent, display itself) only works correctly with Linux 5.8.0. Earlier kernels don't work well, later kernels don't work well. It's just this version.

      You should contact Hans de Goede with details because this is exactly what he's trying to fix. [slashdot.org]

    • by AmiMoJo ( 196126 )

      Interesting that you say fuck you, give me money or give me free support. I assume you aren't paying them to support that laptop.

      As an open source developer I've had these kinds of demands before. My response is generally the same as yours, if they don't like me politely deciding their request. I'm sure Red Hat cares even less.

      • Way to disingenuously misread what I wrote...

        I'm not asking for any free support. My laptop works fine (with that particular kernel). And if it stops working, I'll shut up and get another one.

        The hypothetical people I say fuck you to is those who want to break something that works, and that could easily keep on working should they choose to leave an option to keep the old way of doing things around, because they reckon sacrificing edge cases like me is acceptable for the sake of standardizing a single new w

        • by AmiMoJo ( 196126 )

          They aren't going to reach out and remotely break your laptop. They might, possibly, one day, decide to stop supporting it with updates though.

          Support costs time and money. It's not free for them.

          That's what you are complaining about, isn't it? Future updates. Otherwise you can just carry on and not update, so there is no problem.

    • This is not desirable.

      Yeah but it's marginally more desirable than catering a complex design decision to suit the needs of what is probably the most bizarre and strange bug I've seen someone complain about on Slashdot.

  • "Main motivation for this move is to make the user more dependent on the developers by removing control of the system."

    Yet another reason to avoid Redhat and Fedora.

  • Apt with Synaptic is too good a system to walk away from--for the sake of being different.
  • And in this case, all hail our new overlord SystemD.
  • by vbdasc ( 146051 ) on Sunday December 25, 2022 @04:13AM (#63156402)

    And look, folks, technology just made a full circle and Fedora wants to return to the merry pre-initrd times, when adding a new hardware device often meant recompilin... pardon me, downloading a new (potentially enormous) kernel from the distro website. I personally am not entirely surprised that this proposal comes from the systemd boys... but they should really have read at least the initrd-howto before making this proposition, to get some clue what initrd is about.

  • Systemd: svchost.exe for Linux. One great-grandparent PID to rule them all. Violates UNIX philosophy. Tries to do everything on its own and does not even manage to do it well. Therefore, MAJOR security attack surface.
    Secure boot: Get your boot keys from your local hardware vendor (who in turn must get them from M$. Want to run an Operating System your vendor does not like? Bad luck.
    UKI: Your vendor will support it. Nothing else. And given enough time the idiots behind systemd will find "valid" reasons to pr

  • RHEL8 removed from the install image the drivers for a lot of older RAID controllers. No problem - they could be added back in a custom initrd.
    Then they started worked closer with hardware manufacturers to drop support for older (but still good and working) servers. Example: October announcement from RedHat that support and drivers will be dropped for all Dell servers older than Gen13 (and even Gen13 ones). This includes RHEL7 - 7.10 kernels/initrds will come without some drivers that are there today in 7.9

Life's the same, except for the shoes. - The Cars

Working...