Readme updated today:

This repository is no longer actively maintained.

The TrueNAS build system previously hosted here has been moved to an internal infrastructure. This transition was necessary to meet new security requirements, including support for Secure Boot and related platform integrity features that require tighter control over the build and signing pipeline.

No further updates, pull requests, or issues will be accepted. Existing content is preserved here for historical reference only.

https://github.com/truenas/scale-build

Wondering if this is just the first step towards doing a minio in the future.

  • TehPers@beehaw.org
    link
    fedilink
    English
    arrow-up
    11
    ·
    22 hours ago

    This transition was necessary to meet new security requirements, including support for Secure Boot

    Secure boot is dumb, but explains why they’d need a repo to be closed source. To summarize it briefly, you need your bootloader to be signed to work at all with secure boot, which means you have two options: self-sign (which defeats the purpose, though some Linux distros let you do this if you want), or follow all the requirements imposed by Microsoft. As far as I’m aware, one of those requirements is that it must be closed source.

    • yannic@lemmy.ca
      link
      fedilink
      arrow-up
      12
      ·
      edit-2
      19 hours ago

      Pardon my ignorance, but why would something have to be closed source in order to optionally provide secure boot? Couldn’t you provide the secure-boot-enabled binaries in addition to the source for everything except the boot keys?

      You sign binaries, right? You don’t sign source.

      If anyone builds from source they would just have to go through the arduous signing process themselves.

      • TehPers@beehaw.org
        link
        fedilink
        English
        arrow-up
        4
        ·
        15 hours ago

        why would something have to be closed source in order to optionally provide secure boot? Couldn’t you provide the secure-boot-enabled binaries in addition to the source for everything except the boot keys?

        This is also something I don’t fully understand. Unfortunately it’s not easy to find what the requirements are to get a bootloader signed by MS. It’s possible I’m mixing up these requirements with requirements for something else that requires a NDA, but it’s really not that simple to find the requirements online.

        It’s possible that the latter is actually the case and it’s not secure boot that requires it to be closed source. It’s also possible I’m entirely mistaken and they don’t need to make it closed source at all. I wish TrueNAS would give more details why it needs to be closed source - whether it’s due to a NDA or whatnot.

    • Eskuero@lemmy.fromshado.ws
      link
      fedilink
      arrow-up
      11
      ·
      21 hours ago

      Self sign doesn’t defeat the purpose, you can add your own keys to your bios that you use to sign your kernel. I do that and have a secure booted Arch Linux installed.

      • TehPers@beehaw.org
        link
        fedilink
        English
        arrow-up
        3
        ·
        15 hours ago

        Self sign doesn’t defeat the purpose

        The whole point of signing is that the BIOS can verify that the bootloader is legitimate. For a local Arch install, it doesn’t matter because Arch doesn’t distribute signed bootloaders and the environment is wholly personal. TrueNAS sells products and services though, such as enterprise-level support. It isn’t just something used in home labs. Their customers may require things we do not, and secure boot support appears to be one of them.

        Self-signing to work around the idiotic restrictions Microsoft imposes to get it signed would be one way to do that, but then the software is essentially acting as its own authority that it is legitimate. Customers would realistically rather the bootloader’s signature is valid with the built-in key provided by MS since it means that MS is confirming its validity instead - not exactly a name I would trust, but I’m personally not a TrueNAS enterprise customer either.

    • Ek-Hou-Van-Braai@piefed.socialOP
      link
      fedilink
      English
      arrow-up
      11
      ·
      22 hours ago

      I’ve heard others say that you can just use private keys, Debian does that.

      Though I’m not very knowledgeable in this, others can hopefully clarify.

      • TehPers@beehaw.org
        link
        fedilink
        English
        arrow-up
        1
        ·
        15 hours ago

        You can use self-signed keys.

        It’s basically like saying you can trust your own certificates used by TLS on your own machine rather than going through a CA, but realistically businesses would rather use a CA.

        • Ek-Hou-Van-Braai@piefed.socialOP
          link
          fedilink
          English
          arrow-up
          2
          ·
          14 hours ago

          Business could then pay TrueNAS (or someone else) to handle the signing for them.

          All the code can be Open-Source, the handling of they keys just obviously need to be secret.