9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
From: Skip Tavakkolian <skip.tavakkolian@gmail.com>
To: 9fans <9fans@9fans.net>
Subject: Re: [9fans] Solo factotum
Date: Wed, 31 Dec 2025 00:51:20 -0800	[thread overview]
Message-ID: <CAJSxfmLV=i7X3dQNJMqC8f5fRUOPZkA6fiyG2W9U=NehAaNoow@mail.gmail.com> (raw)
In-Reply-To: <082BB1F6719955832AA636A1DF46A15E@eigenstate.org>

To Ori's point, for such a factotum-on-a-stick to be as secure as
possible (the main point), you would need hardware support like
encrypted storage, trusted execution env, hardware root of trust
attestations all the way to the manufacturer, etc.

This level of security is crucial for trustworthy IoT (e.g. trusting
over-the-air updates), which is why some SoC's like Nordicsemi NRF52,
53, 54 and STMicroelectronics STM32L5, H5 have these capabilities.
Arm's Platform Security Architecture framework is a good resource for
considering all the ways that secrets can be compromised and how the
processor architecture can help mitigate them.

If doing embedded development isn't a showstopper, I think working out
how to embed factotum in a suitable device and figuring out the
mechanics of integrating it into the user environment would be a
useful experiment. There are inexpensive dev kits for NRF and STM soc.

On Tue, Dec 30, 2025 at 4:14 PM <ori@eigenstate.org> wrote:
>
> y'all are reinventing a TPM.
>
> Quoth sirjofri via 9fans <9fans@9fans.net>:
> > 30.12.2025 19:22:13 Dworkin Muller <dworkin@weaselfish.com>:
> > > Alternatively, just set it up as a secret store, like is done with
> > > terminals.  Not quite as elegant/cool, but perhaps more practical.
> >
> > In general, you're right. However the big difference (and why I think there's a solid use case for a factotum key) is that the machine that runs factotum has to be secure. If you have a terminal with its own factotum program, that's fine. The program is on a trusted machine. However, if your terminal boots off a fs, you have to trust the factotum program on that fs to not steal your keys when executed. If you run factotum in a remote session, you have to trust the server. If you have a single enclosed factotum key and no way for the host to download the secrets directly, then you can use it even on an untrusted machine.
> >
> > Sure, you still need a way to edit the keys. Maybe a specific mount access using an additional secret for editing or something similar could be invented.
> >
> > In any case, I think for a fully trusted environment you probably don't need a factotum key. I think the whole factotum and secstore stuff is built around this level of trust (you trust the grid). If you consider a public grid with multiple users and people who sign in as guests, I'd prefer to not have my secrets uploaded into the memory of a machine that I can't control myself, if possible. And people do set up grids like that. That's why I welcome experiments into that direction. Not to replace the current status quo, but to extend it in a compatible way for different use cases.
> >
> > sirjofri

------------------------------------------
9fans: 9fans
Permalink: https://9fans.topicbox.com/groups/9fans/Ta60752663ff08448-M49d8a21810679e15bff7ef46
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription

  parent reply	other threads:[~2025-12-31 16:19 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-12-29 10:57 [9fans] Solo factotum (was: Enterable namespaces: /proc/pid/$ns/srv) David Arroyo
2025-12-29 14:40 ` sirjofri via 9fans
2025-12-30  6:28   ` David Arroyo
2025-12-30 17:56     ` [9fans] Solo factotum Dworkin Muller
2025-12-30 21:37       ` sirjofri via 9fans
2025-12-30 23:29         ` ori
2025-12-31  4:24           ` Steve Simon
2025-12-31  5:21             ` David Arroyo
2025-12-31 17:31               ` ori
2025-12-31 21:47                 ` Steve Simon
2025-12-31  9:40             ` sirjofri via 9fans
2025-12-31 16:26             ` ori
2025-12-31  8:51           ` Skip Tavakkolian [this message]
2025-12-29 15:32 ` [9fans] Solo factotum (was: Enterable namespaces: /proc/pid/$ns/srv) Shawn Rutledge

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAJSxfmLV=i7X3dQNJMqC8f5fRUOPZkA6fiyG2W9U=NehAaNoow@mail.gmail.com' \
    --to=skip.tavakkolian@gmail.com \
    --cc=9fans@9fans.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).