• priapus@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    19
    ·
    edit-2
    5 hours ago

    Do people in this thread not understand that Microsoft frequently contributes to Linux? They’ve already lost the battle there. They rely on Linux for servers as much as everybody else.

    Not necessarily saying this is a good thing or not, but writing off any Linux contributions Microsoft makes would be pretty silly.

    • InnerScientist@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      5 hours ago

      Preventing kernel modifications to expand upon the work done for kernel lockdown. Add additional layers to system security.

      Kernel_lockdown:

      prevent both direct and indirect access to a running kernel image, attempting to protect against unauthorized modification of the kernel image and to prevent access to security and cryptographic data located in kernel memory, […]

        • InnerScientist@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          4 hours ago

          From the mailing list I’m reading that kernel maintainers have heard a few companies looking for something like this, so yes?

          Edit:

          However, to be clear, the Hornet LSM proposed here seems very reasonable to me and I would have no conceptual objections to merging it upstream. Based on off-list discussions I believe there is a lot of demand for something like this, and I believe many people will be happy to have BPF signature verification in-tree.

  • m33@theprancingpony.in
    link
    fedilink
    arrow-up
    15
    arrow-down
    3
    ·
    11 hours ago

    @ikidd After years of Embrace, extend and extinguish, and now the cloud and copilot stuff, can’t put my faith on Micro$oft anymore, EVER 🙅🙅🙅‍♀️‍

    • ikidd@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      7 hours ago

      Certainly don’t take my posting of this as an endorsement of anything Microsoft does. I loathe Microsoft.

      • BaconIsAVeg@lemmy.ml
        link
        fedilink
        English
        arrow-up
        3
        ·
        7 hours ago

        VSCode is one of the best free editors second only to Neovim (and maybe DoomEmacs), and the world runs off GitHub whether we like it or not. Azure runs Linux, and a lot of work has been put into WSL to where it’s pretty darn handy if you’re forced to use company Windows hardware but need to do Dev/SRE tasks.

        Windows 11 and Teams though can die in a tire fire.

        • utopiah@lemmy.ml
          link
          fedilink
          arrow-up
          4
          ·
          4 hours ago

          the world runs off GitHub whether we like it or not

          It doesn’t and we don’t like it anyway.

          PS: to clarify, yes GitHub is wildly popular but, and the kernel is a particularly interesting example, it does not host ALL projects, only a lot of popular ones. A lot of very popular ones are also NOT there but rather on their own git, mailing list, GitLab instance, Gitea, etc. It’s a shortcut, I understand that, but by ascertaining it as “truth” it’s hiding a reality that is quite different and showing that reliable alternatives do exist.

        • ikidd@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          8
          ·
          6 hours ago

          If you don’t want telemetry, you have to use VScodium, and then you don’t get to use marketplace. Github didn’t start as a Microsoft project or it would be far more enshittified than it is now, but even so Microsoft is sure trying to fuck that up with their Copilot bullshit.

          WSL is the definitition of EEE, and has prevented a great deal of Linux-ward movement that might have happened without it, even with IT department resistance. It’s a crutch to keep devs from having to go to Linux to get the useful tools, like docker which is a mess on Windows, but just usable enough to get by.

          And oh, yes, Teams can get shot with a ball of its own shit and fall into the dumpster fire.

  • WasPentalive@lemmy.one
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    2
    ·
    edit-2
    8 hours ago

    They probably named it HORNET for a reason - think Japanese Murder Hornets… What Could Possibly Go Wrong??

    It will probably start out as little glitches and slowdowns to destroy faith in your system (“Windows works right all the time”) a random 2 second pauses. Finally one day every Linux box in the world crashes, all at the same time, because some ‘dummy’ in Microsoft deleted the private signing key.

  • Magiilaro@feddit.org
    link
    fedilink
    arrow-up
    33
    arrow-down
    3
    ·
    edit-2
    15 hours ago

    I hope we will learn from the SecureBoot debacle and not give Microsoft the primary signing keys and infrastructure for this again.

      • Magiilaro@feddit.org
        link
        fedilink
        arrow-up
        23
        arrow-down
        1
        ·
        15 hours ago

        Yes I can. But I am a Linux system administrator with 20 years of experience. This should not be the level of measurement for stuff like this. 😉

        What I meant was: Don’t put a Microsoft master trusted authority in the Kernel, unless one chooses to install a Microsoft distribution. And don’t go the SSL/TLS way with the huge number of default authorities that get installed on every system. It would be a pain to be forced to always build my own Kernel again just to keep Microsoft or any other institution/company that I find untrustworthy out of it.

  • caseyweederman@lemmy.ca
    link
    fedilink
    arrow-up
    49
    arrow-down
    1
    ·
    edit-2
    11 hours ago

    Ah yes, the “extended Berkeley Packet Filter”.
    Wikipedia:

    eBPF is a technology that can run programs in a privileged context such as the operating system kernel.

    Phoronix:

    Hornet uses a similar signature verification scheme similar to that of kernel modules. A pkcs#7 signature is appended to the end of an executable file. During an invocation of bpf_prog_load, the signature is fetched from the current task’s executable file. That signature is used to verify the integrity of the bpf instructions and maps which where passed into the kernel. Additionally, Hornet implicitly trusts any programs which where loaded from inside kernel rather than userspace, which allows BPF_PRELOAD programs along with outputs for BPF_SYSCALL programs to run.

    So this is to make kernel-level instructions from userspace (something that’s already happening) more secure.

    The thread linked by the OP is Jarkko Sakkinen (kernel maintainer) seemingly saying “show your work, your patch is full of nonsense” in a patch submitted for review to the Linux kernel.
    Edit: the OP has edited the link, it used to point to this comment in the mailing list chain.

    • mina86@lemmy.wtf
      link
      fedilink
      English
      arrow-up
      5
      ·
      7 hours ago

      The thread linked by the OP is Jarkko Sakkinen (kernel maintainer) seemingly saying “show your work, your patch is full of nonsense” in a patch submitted for review to the Linux kernel.

      That’s not what he’s saying. He’s saying: ‘You’re using terms which aren’t that familiar to everyone. Could you explain them?’

    • Magiilaro@feddit.org
      link
      fedilink
      arrow-up
      6
      ·
      14 hours ago

      Loading BPF code from user space is, I hope, only possible with root access to the system. That would mean that an attacker needs root access to exploit BPF, but if an attacker has root access what stops him/her to do anything they want? At this time the system is lost anyway.

      Or am I missing anything?

      • ozymandias117@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        ·
        10 hours ago

        If the executable binary has to be signed with a key, similar to the module signing key, Microsoft could sign their binaries

        This, along with secureboot, would prevent the owner of the machine from running eBPF programs Microsoft doesn’t want you to run, even with root