Comment by devsda

Comment by devsda 6 days ago

41 replies

The immediate concern seeing this is will the maintainer of systemd use their position to push this on everyone through it like every other extended feature of systemd?

Whatever it is, I hope it doesn't go the usual path of a minimal support, optional support and then being virtually mandatory by means of tight coupling with other subsystems.

DaanDeMeyer 6 days ago

Daan here, founding engineer and systemd maintainer.

So we try to make every new feature that might be disruptive optional in systemd and opt-in. Of course we don't always succeed and there will always be differences in opinion.

Also, we're a team of people that started in open source and have done open source for most of our careers. We definitely don't intend to change that at all. Keeping systemd a healthy project will certainly always stay important for me.

  • bayindirh 6 days ago

    Hi Daan,

    Thanks for the answer. Let me ask you something close with a more blunt angle:

    Considering most of the tech is already present and shipping in the current systemd, what prevents our systems to become a immutable monolith like macOS or current Android with the flick of a switch?

    Or a more grave scenario: What prevents Microsoft from mandating removal of enrollment permissions for user keychains and Secure Boot toggle, hence every Linux distribution has to go through Microsoft's blessing to be bootable?

    • DaanDeMeyer 6 days ago

      So adding all of this technology will certainly make it more easy to be used for either good or bad. And it will certainly become possible to build an OS that will be less hackable than your run of the mill Linux distro.

      But we will never enforce using any of these features in systemd itself. It will always be up to the distro to enable and configure the system to become an immutable monolith. And I certainly don't think distributions like Fedora or Debian will ever go in that direction.

      We don't really have any control over what Microsoft decides to do with Secure Boot. If they decide at one point to make Secure Boot reject any Linux distribution and hardware vendors prevent enrolling user owned keys, we're in just as much trouble as everyone else running Linux will be.

      I doubt that will actually happen in practice though.

      • cwillu 5 days ago

        I would be _shocked_ if, conditional on your project being successful, this _wasn't_ commonly used to lock down computing abilities commonly taken for granted today. And I think you know this.

      • jacquesm 5 days ago

        > So adding all of this technology will certainly make it more easy to be used for either good or bad.

        Then maybe you shouldn't be doing it?

      • egorfine 4 days ago

        > we will never enforce using any of these features in systemd itself. It will always be up to the distro

        So, plausible deniability. It's not the systemd project, it's the distro.

        > I certainly don't think distributions like Fedora or Debian will ever go in that direction.

        In the past they made decisions that we can call unexpected. I believe that in the short term future they won't but in say ten years? I'm not sure. The technology (created by Amutable?) will be mature by that time and ready to close Linux down.

      • alextingle 5 days ago

        Building stuff like this is wrong. You should find a different job.

    • ongy 5 days ago

      Hopefully cartel regulation would prevent Microsoft from using their market leader position to force partners to remove all support for competitors.

      But I'm losing hope with those.

    • Cu3PO42 5 days ago

      > What prevents Microsoft from mandating removal of enrollment permissions for user keychains and Secure Boot toggle

      Theoretically, nothing. But it's worth pointing out that so far they have actually done the opposite. They currently mandate that hardware vendors must allow you to enroll your own keys. There was a somewhat questionable move recently where they introduced a 'more secure by default' branding in which the 3rd party CA (used e.g. go sign shim for Linux) is disabled by default, but again, they mandated there must be an easy toggle to enable it. I don't begrudge them to much for it, because there have been multiple instances of SB bypass via 3rd party signed binaries.

      All of this is to say: this is not a scenario I'm worried about today. Of course this may change down the line.

      • egorfine 4 days ago

        > today. Of course this may change down the line.

        Given Microsoft's track record I don't believe this will stay that way for long.

    • trelane 5 days ago

      > What prevents Microsoft from mandating removal of enrollment permissions for user keychains and Secure Boot toggle, hence every Linux distribution has to go through Microsoft's blessing to be bootable?

      Why are you buying hardware that Microsoft controls if you're concerned about this?

      • egorfine 4 days ago

        With TPM, Microsoft controls practically all the Intel hardware.

    • noosphr 5 days ago

      Nothing, but openbsd is amazing and just works. Anyone still using Linux on the desktop in 2026 should switch.

      • bayindirh 5 days ago

        "Just don't use X" doesn't solve any problems in any space, unfortunately.

        Plus, it's an avoidant and reductionist take.

        Note: I have nothing against BSDs, but again, this is not the answer.

      • yjftsjthsd-h 5 days ago

        (I like OpenBSD, but) It is extremely hard to compete with Linux on hardware support / driver coverage.

      • johnny22 5 days ago

        I like the GPL for the kernel, so I wouldn't switch.

  • devsda 5 days ago

    Thanks Daan for your contributions to systemd.

    If you were not a systemd maintainer and have started this project/company independently targeting systemd, you would have to go through the same process as everyone and I would have expected the systemd maintainers to, look at it objectively and review with healthy skepticism before accepting it. But we cannot rely on that basic checks and balances anymore and that's the most worrying part.

    > that might be disruptive optional in systemd

    > we don't always succeed and there will always be differences in opinion.

    You (including other maintainers) are still the final arbitrator of what's disruptive. The differences of opinion in the past have mostly been settled as "deal with it" and that's the basis of current skepticism.

    • DaanDeMeyer 5 days ago

      Systemd upstream has reviewers and maintainers from a bunch of different companies, and some independent: Red Hat, Meta, Microsoft, etc. This isn't changing, we'll continue to work through consensus of maintainers regardless of which company we work at.

      • egorfine 4 days ago

        > companies

        That's the keyword.

        Companies. Not people.

  • s_dev 6 days ago

    >We are building cryptographically verifiable integrity into Linux systems. Every system starts in a verified state and stays trusted over time.

    What problem does this solve for Linux or people who use Linux? Why is this different from me simply enabling encryption on the drive?

    • NekkoDroid 6 days ago

      Drive encryption is only really securing your data at rest, not while the system is running. Ideally image based systems also use the kernels runtime integrity checking (e.g. dm-verity) to ensure that things are as they are expected to be.

      • cwillu 5 days ago

        “ensure that things are as they are expected to be” according to who, and for who's benefit? Certainly not the person sitting in front of the computer.

    • Nextgrid 5 days ago

      It prevents malware that obtained root access once from forever replacing your kernel/initrd and achieving persistence that way.

      • direwolf20 5 days ago

        Unless that malware is able to activate the secure boot feature on a system where it is not enabled, in which case it permanently prevents me from removing the malware.

  • egorfine 4 days ago

    > we try to make every new feature that might be disruptive optional in systemd and opt-in

    I find it hard to believe. Like, at all. Especially given that the general posture of your project leader is the exact opposite of that.

    > systemd a healthy project

    I can see that we share the same view that there are indeed differences in opinion.

egorfine 4 days ago

> will the maintainer of systemd use their position to push this on everyone

Can you imaging the creator of systemd not to?