LWN: Comments on "Another Fedora integrity-management proposal" https://lwn.net/Articles/880263/ This is a special feed containing comments posted to the individual LWN article titled "Another Fedora integrity-management proposal". en-us Tue, 07 Oct 2025 20:45:33 +0000 Tue, 07 Oct 2025 20:45:33 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Another Fedora integrity-management proposal https://lwn.net/Articles/880718/ https://lwn.net/Articles/880718/ NYKevin <div class="FormattedComment"> Meh, it&#x27;s even useful on individual, human-operated machines. Just because a computer is human-operated, it does not necessarily follow that the human is in fact the legal owner of the computer. Businesses routinely issue devices to their employees, and the business has every right to dictate what software the device&quot;should&quot; be running, because it&#x27;s not the employee&#x27;s device. It&#x27;s the business&#x27;s device.<br> <p> Now, I&#x27;m sure that some of us would never touch such an arrangement with a ten-foot pole, but regarding it as unethical is an extreme overreaction IMHO. You cannot seriously claim that the ownership of the device changes just because someone is being allowed to borrow it, right?<br> </div> Sat, 08 Jan 2022 09:02:01 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880574/ https://lwn.net/Articles/880574/ LtWorf <div class="FormattedComment"> It is trivial to do a partition with the binaries that is mounted as RO and where the vm process has no write access, and separate partitions with noexec for the data. If you want to just verify the base system<br> </div> Thu, 06 Jan 2022 16:55:30 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880567/ https://lwn.net/Articles/880567/ smoogen <div class="FormattedComment"> I think it is a matter of a signed image is only good until it is run. You could only use that signature inside the image if you regenerate it against the entire image before execution of any binary. Once an update, or some other change happens that signature is no longer valid so you would need to drop the image, confirm the changes that were made were legitimate, and resign it and then rerun. These sorts of controls are to allow for updates of artifacts inside the image and knowing they are still valid. <br> <p> When you have hundreds of thousands to millions of deployed systems being able to automatically block N systems versus manually finding them and then blocking is seen as beneficial. When you have just a laptop.. it is seen as not owning your system anymore and someone else deciding what is beneficial or not. <br> </div> Thu, 06 Jan 2022 15:21:37 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880537/ https://lwn.net/Articles/880537/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt; I guess Huawei? It seems the author of the proposed change works there.</font><br> <p> As I already noted, I wasn&#x27;t quoting the author of the proposal. If the software is open source and in user control, we aren&#x27;t limited by author&#x27;s intend anyway.<br> </div> Thu, 06 Jan 2022 12:48:02 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880531/ https://lwn.net/Articles/880531/ LtWorf <div class="FormattedComment"> Why not just sign the entire vm image?<br> </div> Thu, 06 Jan 2022 10:50:38 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880530/ https://lwn.net/Articles/880530/ LtWorf <div class="FormattedComment"> <font class="QuotedText">&gt; Who is &quot;they&quot;? </font><br> <p> I guess Huawei? It seems the author of the proposed change works there.<br> </div> Thu, 06 Jan 2022 10:47:51 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880487/ https://lwn.net/Articles/880487/ martin.langhoff <div class="FormattedComment"> We need this as part of security infra -- mechanisms to validate VM images and container images against SBOM-style manifests. <br> <p> It&#x27;s useful when you fetch images and perhaps when you boot them. <br> <p> It&#x27;s useful during runtime if the kernel enforces read-only, or refuses to open tampered files.<br> <p> And it&#x27;s useful for post-mortems in case of a breach – did the attacker plant or modify files? Which ones?<br> <p> On my personal machine, I only want this kind of mechanism in a format I can trust, that&#x27;s certain. But reinforcing what you can (to a large extent) already do with rpm --verify and dpkg --verify today is a positive.<br> </div> Wed, 05 Jan 2022 19:21:47 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880476/ https://lwn.net/Articles/880476/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt; Oh, I&#x27;m quite aware that they&#x27;ll say this.</font><br> <p> Who is &quot;they&quot;? I was quoting the editorial opinion from the LWN article and not from the proposal owner FYI. Also have you read Neal Gompa&#x27;s post on user control quoted in the article?<br> </div> Wed, 05 Jan 2022 16:37:41 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880440/ https://lwn.net/Articles/880440/ ddevault <div class="FormattedComment"> Oh, I&#x27;m quite aware that they&#x27;ll say this. But, this is not the first time we&#x27;ve seen this kind of thing. What&#x27;s happening here is that they&#x27;re starting with what they want - technology to enable DRM - and trying to come up with use-cases which are not DRM but which use the same technology as an excuse to shove the technology through.<br> </div> Wed, 05 Jan 2022 15:02:25 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880439/ https://lwn.net/Articles/880439/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt; Proponents of Digital Restrictions Management are to be given no quarter</font><br> <p> From the article, &quot;The concerns about locked-down systems and DRM are reasonable to a certain extent, but that is not at all what DIGLIM is targeting&quot;<br> </div> Wed, 05 Jan 2022 14:55:31 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880435/ https://lwn.net/Articles/880435/ ddevault <div class="FormattedComment"> Proponents of Digital Restrictions Management are to be given no quarter. It is unethical for us to write software which is designed to deny the rights of our users. An outright refusal of any such feature requests is the only acceptable answer.<br> </div> Wed, 05 Jan 2022 14:23:54 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880413/ https://lwn.net/Articles/880413/ ballombe <div class="FormattedComment"> I am always skeptical of attempts to increase security by increasing complexity. This opens whole new avenues for attackers for DOSing systems or for blocking the application of security updates.<br> </div> Wed, 05 Jan 2022 09:07:02 +0000 Another Fedora integrity-management proposal https://lwn.net/Articles/880410/ https://lwn.net/Articles/880410/ taladar <div class="FormattedComment"> I am very sceptical about this. I could see some certification authority certifying exact versions of packages (slowly, potentially only once every couple of years) and leaving systems that require that certification (to be more secure on paper) completely vulnerable in practice.<br> <p> In other words I am sceptical about giving the &quot;never change a running system&quot; crowd even a millimetre because they are already been responsible for the vast majority of unpatched security holes on de facto existing systems.<br> </div> Wed, 05 Jan 2022 08:18:39 +0000