update: NixOS still deosn't have
boot.loader.secureboot.enabled = true;
or anything like that? despite using systemd-boot..... that seems really dumb
@freya @ireneista I don't like it but I found it the easiest for when I inevitably have to debug every single program on my OS and just edit the src of everything that runs on my system to fix bugs in upstream
Collecting a bunch of .patch files when yet another random thing breaks, my favorite.
@freya @ireneista I also need to have the debug info hooked up right for GDB to work
Etc
@freya nix just doesn't have an answer for that because the tooling is deeply invested in pretending that user interaction during building is impossible
(we have a bunch of nix things that are authorized by a yubikey touch... which is user interaction, just, not through the obvious UI)
@freya @ireneista you can sign LOS builds, I'm quite curious exactly what Pixels did to the usual ARM boot chain though.
I've been still too lazy to get mine signed (I'm on a Pixel now :D), because why document any of it, amirite. Gotta make the ity go RE things.
@freya oh those funny things
UEFI's secure boot is simply not secure, given its root of trust is a trivially reflashable chip unless you own a device with smth like Intel TXT. It's also why it's trivial to decrypt things like BitLocker, since BitLocker only measures PCR7 and thus uses the same root of trust
I don't like UEFI, but not like we got anything better. Esp. hell on things like RISC-V, but I digress. I'm glad on x86 we have a semi-standardized way of booting an executable + APIs, on ARM and RV all we got is uboot, hopes and dreams.
@freya that's a separate thing, not what I'm thinking of
I should get a spare machine to play with. What about my girlfriend's Framework while she's asleep :3
@freya hmm
I'm gonna probably finally test it myself rather than just trusting my firmware hacking friends' words for it