I used PopOS, but once they announced they’ll start focusing on their Cosmic desktop, I switched to Fedora KDE it worked to some degree until it crashed and I lost some data, now I’m on Ultramarine GNOME and it doesn’t seem to like my hardware ( fans are spinning fast )

my threat model involves someone trying to physically unlock my device, so I always enable disk encryption, but I wonder why Linux doesn’t support secure boot and TPM based encryption ( I know that Ubuntu has plans for the later that’s why I’m considering it rn )

I need something that keeps things updated and adobts newer standards fast ( that’s why I picked Fedora KDE in the first place ), I also use lots of graphical tools and video editing software, so I need the proprietary Nvidia drivers

Idk what to choose ಥ_ಥ ? the only one that seem to care about using hardware based encryption is Ubuntu, while other distros doesn’t support that… the problem with Ubuntu is there push for snaps ( but that can be avoided by the user )

security heads say: if you care about security, you shouldn’t be using systemd, use something like Gentoo or Alpine… yeah but do you expect me to compile my software after ? hell no

  • ikidd@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 年前

    security heads say: if you care about security, you shouldn’t be using systemd

    Yah, ignore that bullshit.

    • th3raid0r@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      1 年前

      Yeah, no kidding. The same systemd that enables the very things OP is trying to enable…

      systemdboot + sbctl + systemd-cryptenroll and voila. TPM backed disk encryption with a PIN or FIDO2 token.

      AFAIK this should be doable in Ubuntu, it just requires some command-line-fu.

      Last I heard the Fedora installer was aiming to better support this type of thing - not so sure about Ubuntu.

  • use something like Gentoo or Alpine… yeah but do you expect me to compile my software after ? hell no

    There are more systemd-free distros like Artix Linux (which is just Arch without systemd), Devuan (which is the same thing but for Debian) and Void Linux. Btw Alpine doesn’t require you to compile anything.

    • th3raid0r@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      1 年前

      TPMs can be extracted with physical access

      Sure, but IIRC, they’d still need my PIN (for TPM+PIN through cryptenroll). I don’t think it’s possible to do TPM backed encryption without a PIN on Linux.

      EDIT: Oh wait, you can… Why anyone would is beyond me though.

  • ericjmorey@programming.dev
    link
    fedilink
    arrow-up
    1
    ·
    1 年前

    Dude, you’re not lost. You have highly specialized requirements that the vast majority of people don’t have so most people won’t be able to help. But you definitely are ahead of the average Linux user here.

    I’m one of the people that can’t help you, but it looks like some others here have good suggestions

  • mcmodknower@programming.dev
    link
    fedilink
    arrow-up
    1
    ·
    1 年前

    You should take a look at linux mint. I recently setup linux mint on a laptop, and it asked me to enroll a mok so that secure boot works with extra media codecs. On my pc i also installed the nvidia drivers pretty easily. Also mint is a ubuntu derivate, but snaps are disabled by default. Its not as fast as rolling release distros, but if you install the lastest mint version, you get the packages of the latest ubuntu lts version.

  • embed_me@programming.dev
    link
    fedilink
    arrow-up
    1
    ·
    1 年前

    Arch Linux is a good choice. You can do most of everything you mention, only downside is you will have to set it up yourself. Provided you read the Arch Wiki, it should not be a difficult task.

  • K, so I’m probably oversimplifying, but almost all distros should allow you to at least encrypt /home, and although I haven’t tried it myself yet, whole-disk encryption via UEFI is possible. You say your threat model is only someone trying to unlock your device, but it sounds as if you’re not worried about espionage - someone gaining access to your computer and replacing the /efi boot process with something that will harvest your password when you log in. If all you’re worried about is seizure and data protection, why isn’t disk encryption sufficient?

    If you really feel like you need TPM, Arch supports it, which means other distros do, too. Although, figuring it out for, e.g., Ubuntu of something you’ll have to research; the Arch wiki is the most fantastic source of Linux documentation on the web, and much (but not all) of it can help with other distros.

    I may be completely misunderstanding what problem you’re encountering, but (a) disk encryption is trivial to set up on both Mint and EndeavorOS installers (the two I’ve used most recently), and (b) TPM certainly seems possible from the Arch wiki.

    • Lojcs@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      1 年前

      In this [default] mode, Aeon will measure all of the following aspects of your systems integrity and store those measurements in your systems TPM:

      UEFI Firmware
      Secureboot state (enabled or disabled)
      Partition Table
      Boot loader and drivers
      Kernel and initrd (including kernel cmdline parameters)

      When your system starts, it will compare the current state to the measurements stored in the TPM.

      If they match, your system will boot.

      As Default Mode establishes a strong ‘chain of trust’ between a more comprehensive list of key boot components, the use of Secureboot in Default Mode can be considered optional.

      As Fallback Mode has no such measurements of boot components, Secureboot should be enabled. Disabling Secureboot in Fallback Mode leaves your system vulnerable to tampering, including attacks which may capture your passphrase when entered.

      If secure boot isn’t needed then what’s stopping an attacker from USB booting and changing the tpm parameters or pulling the luks password? Actually what’s stopping an attacker from USB booting even when secure boot is enabled? Or switching the Aeon kernel with one that won’t do the check at all and registering that with secure boot?

      A quick Google search says secure boot is not intended to protect against someone with physical access. Then why does it matter in the context of fde at all? Malware running after boot would have access to (most of the) unencrypted filesystem anyways. Edit: and if it has the privileges to modify kernel or boot loader it could do the things I wrote above too

      And it’s weird that there isn’t a mode that uses a luks password in combination to the chain of trust. Relying on the user password for protection doesn’t feel very secure since a physical attacker would have more opportunities to see it while the computer is in use than a luks password.

  • Jayb151@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 年前

    I recently installed Bazzite, which is based on fedora. And it can come with Nvidia drivers, and kde. Pretty smooth in all honesty, but it is gaming focused so comes with some gaming stuff preinstalled