update TODO

This commit is contained in:
Lennart Poettering 2022-04-08 18:59:47 +02:00
parent 5b06ad5132
commit 6247128902

20
TODO
View file

@ -83,19 +83,27 @@ Features:
virtio-fs. virtio-fs.
* for vendor-built signed initrds: * for vendor-built signed initrds:
- make sysext run in the initrd
- sysext should pick up sysext images from /.extra/ in the initrd, and insist - sysext should pick up sysext images from /.extra/ in the initrd, and insist
on verification on verification if in secureboot mode
- kernel-install should be able to install pre-built unified kernel images in - kernel-install should be able to install pre-built unified kernel images in
type #2 drop-in dir in the ESP. type #2 drop-in dir in the ESP.
- kernel-install should be able encrypt creds automatically from machine id, - kernel-install should be able install encrypted creds automatically for
root pw, rootfs uuid, resum partition uuid, and place next to EFI kernel, machine id, root pw, rootfs uuid, resume partition uuid, and place next to
for sd-stub to pick them up EFI kernel, for sd-stub to pick them up. These creds should be locked to
the TPM, and bind to the right PCR the kernel is measured to.
- systemd-fstab-generator should look for rootfs device to mount in creds - systemd-fstab-generator should look for rootfs device to mount in creds
- pid 1 should look for machine ID in creds - pid 1 should look for machine ID in creds
- make sysext run in the initrd - systemd-resume-generator should look for resume partition uuid in creds
- sd-stub: automatically pick up microcode from ESP and synthesize initrd from - sd-stub: automatically pick up microcode from ESP (/loader/microcode/*) and synthesize initrd from
it, and measure it. Signing is not necessary, as microcode does that on its it, and measure it. Signing is not necessary, as microcode does that on its
own. Pass as first initrd to kernel. own. Pass as first initrd to kernel.
- systemd-creds should have a fallback logic that uses neither TPM nor the
system key in /var for encryption and instead some fixed key. This should
be opt in (since it provides no security properties) but be used by
kernel-install when encrypting the creds it generates on systems that lack
a TPM, so that we can have very similar codepaths on TPM and TPM-less
systems. i.e. --with-key=tpm-graceful or so.
* Add a new service type very similar to Type=notify, that goes one step * Add a new service type very similar to Type=notify, that goes one step
further and extends the protocol to cover reloads. Specifically, SIGHUP will further and extends the protocol to cover reloads. Specifically, SIGHUP will