On 2/24/21 11:37 AM, Theodore Ts'o wrote: > Oh, sure. I agree completely that it's 180 degrees from the original > golden rule; it had intended to be a joke. Unfortunately, years of > living in a country whre the ones with the Gold really do make all > of the Rules has gotten me to the point where if I don't laugh at it, > I would have to cry.... When colleagues would say "you would think" or "I've been thinking" or the likes, with "We don't do that! The logo does it for us!" when dealing with IBM shenanigans. Again, laugh, lest I cry. > So technically it doesn't wipe out UEFI; it just will destroy the > ability to boot the system. (e.g., this is where Grub lives, and if > you delete it, UEFI will no longer be able to launch Grub, and hence, > not boot Linux.) ACK Either way, it causes someone to have a Bad Day™. > Fortunately, if you have a rescue CD / USB Thumb drive, it's relatively > easy to recover from this. And now we're back towards the start of this (sub)thread of a system being able to boot strap itself or not. > A rogue rm which deletes /bin (even if /bin is a symlink to /usr/bin, > all of the shell scripts and /etc/passwd entries probably still refer > to /bin/sh) is going to make the system similarly unbootable. Agreed. Though I think there is a difference in containing the damage to the OS vs going beyond it and damaging the firmware configuration. > As far as making a system more robust against rogue rm's, I really > like scheme used by ChromeOS, where the entire file system is > not only read-only, but protected by a cryptographic Merkle Tree > such that if malware attempts to modify it, the system will crash. > This is combined with firmware which will only load a kernel with a > valid digital signature, and the user data is stored on an encrypted > file system mounted on /mnt/stateful_partition and it is the only > file system mounted read/write on a ChromeOS system. It violates > a lot of expectations about where files should live on a "normal" > Unix or Linux system, but it's defnitely way more safe and secure. I've not looked at Chrome OS or how it does things because of my dislike for actually /using/ it. However, it sounds like it's worth popping the hood and looking at things. > For now, as far as I know, Debian still supports a 486 (or i386 with > an i387 co-processor, which was my first Linux system). But yes, > it is very likely, absent people showing up to volunteer to support > 32-bit userspace at Debian (e.g., ongoing security updates, support > for the i386 build farm, reporting and triaging build failures of > packages on i386, etc.), that the i386 arch will probably get dropped > after Debian Bullseye release (which will probably happpen sometime > in mid-2021 if I had to guess). I don't know how quickly 32-bit will disappear. I think the embedded market and other non-i386 32-bit platforms will likely keep 32-bit code around for a while yet. At least user space application code. Maybe the i386 kernel code will languish ~> bit rot. Or worse, get in the way of maintaining 64-bit code and thereby be ejected. > I'm not sure there are any 486's around any more, and it's likely most > uses of systems with i386 binaries are on 64-bit processors running > in 32-bit mode, so 486 vs 586 is probably not all that important in > the grand scheme of things. ¯\_(ツ)_/¯ -- Grant. . . . unix || die