]>
Commit | Line | Data |
---|---|---|
afe3ab58 | 1 | Bugfixes: |
c343be28 | 2 | |
54fcb619 ZJS |
3 | * Many manager configuration settings that are only applicable to user |
4 | manager or system manager can be always set. It would be better to reject | |
5 | them when parsing config. | |
6 | ||
5b326dee ZJS |
7 | * Jun 01 09:43:02 krowka systemd[1]: Unit user@1000.service has alias user@.service. |
8 | Jun 01 09:43:02 krowka systemd[1]: Unit user@6.service has alias user@.service. | |
9 | Jun 01 09:43:02 krowka systemd[1]: Unit user-runtime-dir@6.service has alias user-runtime-dir@.service. | |
10 | ||
f38afcd0 | 11 | External: |
f85857df | 12 | |
f38afcd0 | 13 | * Fedora: add an rpmlint check that verifies that all unit files in the RPM are listed in %systemd_post macros. |
bafb15ba | 14 | |
07eabc2b LB |
15 | * dbus: |
16 | - natively watch for dbus-*.service symlinks (PENDING) | |
17 | - teach dbus to activate all services it finds in /etc/systemd/services/org-*.service | |
18 | ||
07eabc2b LB |
19 | * fedora: suggest auto-restart on failure, but not on success and not on coredump. also, ask people to think about changing the start limit logic. Also point people to RestartPreventExitStatus=, SuccessExitStatus= |
20 | ||
21 | * neither pkexec nor sudo initialize environ[] from the PAM environment? | |
22 | ||
23 | * fedora: update policy to declare access mode and ownership of unit files to root:root 0644, and add an rpmlint check for it | |
24 | ||
25 | * register catalog database signature as file magic | |
26 | ||
27 | * zsh shell completion: | |
28 | - <command> <verb> -<TAB> should complete options, but currently does not | |
29 | - systemctl add-wants,add-requires | |
76c068b7 | 30 | - systemctl reboot --boot-loader-entry= |
07eabc2b LB |
31 | |
32 | * systemctl status should know about 'systemd-analyze calendar ... --iterations=' | |
33 | * If timer has just OnInactiveSec=..., it should fire after a specified time | |
34 | after being started. | |
35 | ||
36 | * write blog stories about: | |
37 | - hwdb: what belongs into it, lsusb | |
38 | - enabling dbus services | |
39 | - how to make changes to sysctl and sysfs attributes | |
40 | - remote access | |
41 | - how to pass throw-away units to systemd, or dynamically change properties of existing units | |
42 | - testing with Harald's awesome test kit | |
43 | - auto-restart | |
44 | - how to develop against journal browsing APIs | |
45 | - the journal HTTP iface | |
46 | - non-cgroup resource management | |
47 | - dynamic resource management with cgroups | |
48 | - refreshed, longer missions statement | |
49 | - calendar time events | |
50 | - init=/bin/sh vs. "emergency" mode, vs. "rescue" mode, vs. "multi-user" mode, vs. "graphical" mode, and the debug shell | |
51 | - how to create your own target | |
52 | - instantiated apache, dovecot and so on | |
3a9e659a | 53 | - hooking a script into various stages of shutdown/early boot |
07eabc2b LB |
54 | |
55 | Regularly: | |
56 | ||
57 | * look for close() vs. close_nointr() vs. close_nointr_nofail() | |
58 | ||
59 | * check for strerror(r) instead of strerror(-r) | |
60 | ||
61 | * pahole | |
62 | ||
63 | * set_put(), hashmap_put() return values check. i.e. == 0 does not free()! | |
64 | ||
65 | * use secure_getenv() instead of getenv() where appropriate | |
66 | ||
67 | * link up selected blog stories from man pages and unit files Documentation= fields | |
68 | ||
5e524b40 LP |
69 | Janitorial Clean-ups: |
70 | ||
bb527e11 LP |
71 | * rework mount.c and swap.c to follow proper state enumeration/deserialization |
72 | semantics, like we do for device.c now | |
73 | ||
f461a28d | 74 | * get rid of prefix_roota() and similar, only use chase() and related |
180efdb7 LP |
75 | calls instead. |
76 | ||
77 | * get rid of basename() and replace by path_extract_filename() | |
78 | ||
ca424984 ZJS |
79 | * Replace our fstype_is_network() with a call to libmount's mnt_fstype_is_netfs()? |
80 | Having two lists is not nice, but maybe it's now worth making a dependency on | |
81 | libmount for something so trivial. | |
82 | ||
f24e1b54 LP |
83 | * drop set_free_free() and switch things over from string_hash_ops to |
84 | string_hash_ops_free everywhere, so that destruction is implicit rather than | |
85 | explicit. Similar, for other special hashmap/set/ordered_hashmap destructors. | |
86 | ||
b3e199ce | 87 | * generators sometimes apply C escaping and sometimes specifier escaping to |
33bc21c3 LP |
88 | paths and similar strings they write out. Sometimes both. We should clean |
89 | this up, and should probably always apply both, i.e. introduce | |
90 | unit_file_escape() or so, which applies both. | |
91 | ||
9b85e907 LP |
92 | * xopenat() should pin the parent dir of the inode it creates before doing its |
93 | thing, so that it can create, open, label somewhat atomically. | |
94 | ||
3345802c LP |
95 | Deprecations and removals: |
96 | ||
97 | * Remove any support for booting without /usr pre-mounted in the initrd entirely. | |
98 | Update INITRD_INTERFACE.md accordingly. | |
99 | ||
b3e199ce | 100 | * remove cgroups v1 support EOY 2023. As per |
b98445cd LP |
101 | https://lists.freedesktop.org/archives/systemd-devel/2022-July/048120.html |
102 | and then rework cgroupsv2 support around fds, i.e. keep one fd per active | |
103 | unit around, and always operate on that, instead of cgroup fs paths. | |
104 | ||
3345802c LP |
105 | * drop support for kernels that lack ambient capabilities support (i.e. make |
106 | 4.3 new baseline). Then drop support for "!!" modifier for ExecStart= which | |
9eb41aab | 107 | is only supported for such old kernels. |
3345802c | 108 | |
f18b0a76 LP |
109 | * drop support for kernels lacking memfd_create() (i.e. make 3.17 new |
110 | baseline), then drop all pipe() based fallbacks. | |
111 | ||
9eb41aab | 112 | * drop support for getrandom()-less kernels. (GRND_INSECURE means once kernel |
3345802c | 113 | 5.6 becomes our baseline). See |
9eb41aab LP |
114 | https://github.com/systemd/systemd/pull/24101#issuecomment-1193966468 for |
115 | details. Maybe before that: at taint-flags/warn about kernels that lack | |
3345802c LP |
116 | getrandom()/environments where it is blocked. |
117 | ||
9eb41aab LP |
118 | * drop support for LOOP_CONFIGURE-less loopback block devices, once kernel |
119 | baseline is 5.8. | |
3345802c | 120 | |
dec6f619 LP |
121 | * drop fd_is_mount_point() fallback mess once we can rely on |
122 | STATX_ATTR_MOUNT_ROOT to exist i.e. kernel baseline 5.8 | |
123 | ||
bc09c2d8 JL |
124 | * Remove /dev/mem ACPI FPDT parsing when /sys/firmware/acpi/fpdt is ubiquitous. |
125 | That requires distros to enable CONFIG_ACPI_FPDT, and have kernels v5.12 for | |
126 | x86 and v6.2 for arm. | |
127 | ||
43057bf6 LP |
128 | * Once baseline is 4.13, remove support for INTERFACE_OLD= checks in "udevadm |
129 | trigger"'s waiting logic, since we can then rely on uuid-tagged uevents | |
130 | ||
3345802c LP |
131 | Features: |
132 | ||
831ad06b LP |
133 | * find a nice way to opt-in into auto-masking SIGCHLD on first |
134 | sd_event_add_child(), and then get rid of many more explicit sigprocmask() | |
135 | calls. | |
136 | ||
229d4a98 LP |
137 | * maybe set shell.prompt.prefix credential in run0 to some warning emoji, |
138 | i.e. ⚠️ or ☢️ or ⚡ or 👊 or 🧑🔧 or so. | |
e3cd748e | 139 | |
38c00863 LP |
140 | * introduce new structure Tpm2CombinedPolicy, that combines the various TPm2 |
141 | policy bits into one structure, i.e. public key info, pcr masks, pcrlock | |
142 | stuff, pin and so on. Then pass that around in tpm2_seal() and tpm2_unseal(). | |
143 | ||
cb1e7ab5 LP |
144 | * look at nsresourced, mountfsd, homed, importd, and try to come up with a way |
145 | how the forked off worker processes can be moved into transient services with | |
146 | sandboxing, without breaking notify socket stuff and so on. | |
147 | ||
4b752770 LP |
148 | * replace all \x1b, \x1B, \033 C string escape sequences in our codebase with a |
149 | more readable \e. It's a GNU extension, but a ton more readable than the | |
150 | others, and most importantly it doesn't result in confusing errors if you | |
151 | suffix the escape sequence with one more decimal digit, because compilers | |
152 | think you might actually specify a value outside the 8bit range with that. | |
153 | ||
1717a939 LP |
154 | * homed: allow login via username + realm on getty/login prompt. Then rewrite |
155 | the user name in the PAM stack | |
156 | ||
157 | * homed/userdb: add "aliases" field to user record, which can alternatively be | |
158 | used for logging in. Rewrite user name in the PAM stack once acquired. | |
159 | ||
160 | * confext/sysext: instead of mounting the overlayfs directly on /etc/ + /usr/, | |
161 | insert an intermediary bind mount on itself there. This has the benefit that | |
162 | services where mount propagation from the root fs is off, an still have | |
163 | confext/sysext propagated in. | |
164 | ||
1717a939 LP |
165 | * support F_DUDFD_QUERY for comparing fds in same_fd (requires kernel 6.10) |
166 | ||
8f036c92 LP |
167 | * generic interface for varlink for setting log level and stuff that all our daemons can implement |
168 | ||
169 | * use pty ioctl to get peer wherever possible (TIOCGPTPEER) | |
170 | ||
171 | * maybe teach repart.d/ dropins a new setting MakeMountNodes= or so, which is | |
172 | just like MakeDirectories=, but uses an access mode of 0000 and sets the +i | |
173 | chattr bit. This is useful as protection against early uses of /var/ or /tmp/ | |
174 | before their contents is mounted. | |
175 | ||
c4ecc023 LP |
176 | * go through all uses of table_new() in our codebase, and make sure we support |
177 | all three of: | |
178 | 1. --no-legend properly | |
179 | 2. --json= properly | |
180 | 3. --no-pager properly | |
181 | ||
182 | * go through all --help texts in our codebases, and make sure: | |
183 | 1. the one sentence description of the tool is highlighted via ANSI how we | |
184 | usually do it | |
185 | 2. If more than one or two commands are supported (as opposed to switches), | |
186 | separate commands + switches from each other, using underlined --help sections. | |
187 | 3. If there are many switches, consider adding additional --help sections. | |
188 | ||
189 | * go through our codebase, and convert "vertical tables" (i.e. things such as | |
190 | "systemctl status") to use table_new_vertical() for output | |
191 | ||
a2369d02 LP |
192 | * pcrlock: add support for multi-profile UKIs |
193 | ||
9545512f LP |
194 | * logind: when logging in use new tmpfs quota support to configure quota on |
195 | /tmp/ + /dev/shm/. But do so only in case of tmpfs, because otherwise quota | |
196 | is persistent and any persistent settings mean we don#t have to reapply them. | |
197 | ||
ead6c49e LP |
198 | * initrd: when transitioning from initrd to host, validate that |
199 | /lib/modules/`uname -r` exists, refuse otherwise | |
200 | ||
26c5eebb LP |
201 | * tmpfiles: add "owning" flag for lines that limits effect of --purge |
202 | ||
440531c8 LP |
203 | * signed bpf loading: to address need for signature verification for bpf |
204 | programs when they are loaded, and given the bpf folks don't think this is | |
205 | realistic in kernel space, maybe add small daemon that facilitates this | |
206 | loading on request of clients, validates signatures and then loads the | |
207 | programs. This daemon should be the only daemon with privs to do load BPF on | |
208 | the system. It might be a good idea to run this daemon already in the initrd, | |
209 | and leave it around during the initrd transition, to continue serve requests. | |
210 | Should then live in its own fs namespace that inherits from the initrd's | |
211 | fs tree, not from the host, to isolate it properly. Should set | |
212 | PR_SET_DUMPABLE so that it cannot be ptraced from the host. Should have | |
213 | CAP_SYS_BPF as only service around. | |
214 | ||
215 | * add a mechanism we can drop capabilities from pid1 *before* transitioning | |
216 | from initrd to host. i.e. before we transition into the slightly lower trust | |
217 | domain that is the host systems we might want to get rid of some caps. | |
218 | Example: CAP_SYS_BPF in the signed bpf loading logic above. (We already have | |
219 | CapabilityBoundingSet= in system.conf, but that is enforced when pid 1 | |
220 | initializes, rather then when it transitions to the next.) | |
221 | ||
222 | * maybe add a new standard slice where process that are started in the initrd | |
223 | and stick around for the whole system runtime (i.e. root fs storage daemons, | |
224 | the bpf loader daemon discussed above, and such) are placed. maybe | |
225 | protected.slice or so? Then write docs that suggest that services like this | |
226 | set Slice=protected.sice, RefuseManualStart=yes, RefuseManualStop=yes and a | |
227 | couple of other things. | |
228 | ||
c7dd491d LP |
229 | * add feature to xopenat() that implements O_REGULAR in userspace: i.e. let's |
230 | open the inode via O_PATH first, then validate its type, and then convert to | |
231 | proper fd via fd_reopen() | |
232 | ||
2f92e5c3 LP |
233 | * rough proposed implementation design for remote attestation infra: add a tool |
234 | that generates a quote of local PCRs and NvPCRs, along with synchronous log | |
235 | snapshot. use "audit session" logic for that, so that we get read-outs and | |
236 | signature in one step. Then turn this into a JSON object. Use the "TCG TSS 2.0 | |
237 | JSON Data Types and Policy Language" format to encode the signature. And CEL | |
238 | for the measurement log. | |
239 | ||
240 | * creds: add a new cred format that reused the JSON structures we use in the | |
241 | LUKS header, so that we get the various newer policies for free. | |
242 | ||
243 | * drop PCR 7 from default PCR mask in credentials and LUKS2 enrollments | |
244 | ||
245 | * systemd-analyze: port "pcrs" verb to talk directly to TPM device, instead of | |
246 | using sysfs interface (well, or maybe not, as that would require privileges?) | |
247 | ||
248 | * pcrextend/tpm2-util: add a concept of "rotation" to event log. i.e. allow | |
249 | trailing parts of the logs if time or disk space limit is hit. Protect the | |
250 | boot-time measurements however (i.e. up to some point where things are | |
251 | settled), since we need those for pcrlock measurements and similar. When | |
252 | deleting entries for rotation, place an event that declares how many items | |
253 | have been dropped, and what the hash before and after that. | |
254 | ||
255 | * measure information about all DDIs as we activate them to an NvPCR. We | |
256 | probably should measure the dm-verity root hash from the kernel side, but | |
257 | DDI meta info from userspace. | |
258 | ||
51a9a006 LP |
259 | * rework tpm2_parse_pcr_argument_to_mask() to refuse literal hash value |
260 | specifications. They are currently parsed but ignored. We should refuse them | |
261 | however, to not confuse people. | |
262 | ||
031304d5 LP |
263 | * use name_to_handle_at() with AT_HANDLE_FID instead of .st_ino (inode |
264 | number) for identifying inodes, for example in copy.c when finding hard | |
265 | links, or loop-util.c for tracking backing files, and other places. | |
266 | ||
84bdf715 | 267 | * cryptenroll/cryptsetup/homed: add unlock mechanism that combines tpm2 and |
a5cbc0fa | 268 | fido2, as well as tpm2 + ssh-agent, inspired by ChromeOS' logic: encrypt the |
84bdf715 LP |
269 | volume key with the TPM, with a policy that insists that a nonce is signed by |
270 | the fido2 device's key or ssh-agent key. Thus, add unlock/login time the TPM | |
271 | generates a nonce, which is sent as a challenge to the fido2/ssh-agent, which | |
272 | returns a signature which is handed to the tpm, which then reveals the volume | |
273 | key to the PC. | |
274 | ||
275 | * cryptenroll/cryptsetup/homed: similar to this, implement TOTP backed by TPM. | |
276 | ||
3c64aca5 LP |
277 | * expose the handoff timestamp fully via the D-Bus properties that contain |
278 | ExecStatus information | |
279 | ||
280 | * properly serialize the ExecStatus data from all ExecCommand objects | |
281 | associated with services, sockets, mounts and swaps. Currently, the data is | |
282 | flushed out on reload, which is quite a limitation. | |
283 | ||
d58997e6 LP |
284 | * Clean up "reboot argument" handling, i.e. set it through some IPC service |
285 | instead of directly via /run/, so that it can be sensible set remotely. | |
286 | ||
00244c49 LP |
287 | * userdb: add concept for user "aliases", to cover for cases where you can log |
288 | in under the name lennart@somenetworkfsserver, and it would automatically | |
289 | generate a local user, and from the one both names can be used to allow | |
290 | logins into the same account. | |
291 | ||
292 | * systemd-tpm2-support: add a some logic that detects if system is in DA | |
293 | lockout mode, and queries the user for TPM recovery PIN then. | |
294 | ||
3f011540 LP |
295 | * systemd-repart should probably enable btrfs' "temp_fsid" feature for all file |
296 | systems it creates, as we have no interest in RAID for repart, and it should | |
297 | make sure that we can mount them trivially everywhere. | |
298 | ||
d2420ea6 LP |
299 | * systemd-nspawn should get the same SSH key support that vmspawn now has. |
300 | ||
54b0e05e LP |
301 | * move documentation about our common env vars (SYSTEMD_LOG_LEVEL, |
302 | SYSTEMD_PAGER, …) into a man page of its own, and just link it from our | |
fcaa5105 | 303 | various man pages that so far embed the whole list again and again, in an |
54b0e05e LP |
304 | attempt to reduce clutter and noise a bid. |
305 | ||
c89d067f LP |
306 | * vmspawn switch default swtpm PCR bank to SHA384-only (away from SHA256), at |
307 | least on 64bit archs, simply because SHA384 is typically double the hashing | |
308 | speed than SHA256 on 64bit archs (since based on 64bit words unlike SHA256 | |
309 | which uses 32bit words). | |
310 | ||
afd20791 | 311 | * In vmspawn/nspawn/machined wait for X_SYSTEMD_UNIT_ACTIVE=ssh-active.target |
fdc1b714 | 312 | and X_SYSTEMD_SIGNALS_LEVEL=2 as indication whether/when SSH and the POSIX |
afd20791 LP |
313 | signals are available. Similar for D-Bus (but just use sockets.target for |
314 | that). Report as property for the machine. | |
50a38492 LP |
315 | |
316 | * teach nspawn/machined a new bus call/verb that gets you a | |
317 | shell in containers that have no sensible pid1, via joining the container, | |
318 | and invoking a shell directly. Then provide another new bus call/vern that is | |
319 | somewhat automatic: if we detect that pid1 is running and fully booted up we | |
320 | provide a proper login shell, otherwise just a joined shell. Then expose that | |
321 | as primary way into the container. | |
322 | ||
323 | * make vmspawn/nspawn/importd/machined a bit more usable in a WSL-like | |
324 | fashion. i.e. teach unpriv systemd-vmspawn/systemd-nspawn a reasonable | |
325 | --bind-user= behaviour that mounts the calling user through into the | |
326 | machine. Then, ship importd with a small database of well known distro images | |
327 | along with their pinned signature keys. Then add some minimal glue that binds | |
328 | this together: downloads a suitable image if not done so yet, starts it in | |
329 | the bg via vmspawn/nspawn if not done so yet and then requests a shell inside | |
330 | it for the invoking user. | |
331 | ||
50a38492 LP |
332 | * importd/…: define per-user dirs for container/VM images too. |
333 | ||
666a348d | 334 | * add a new specifier to unit files that figures out the DDI the unit file is |
630023e2 | 335 | from, tracing through overlayfs, DM, loopback block device. |
666a348d | 336 | |
7e9cdafa | 337 | * importd/importctl |
7e9cdafa | 338 | - port tar handling to libarchive |
eac0cbed | 339 | - complete varlink interface |
7e9cdafa LP |
340 | - download images into .v/ dirs |
341 | ||
a050dc50 LP |
342 | * in os-release define a field that can be initialized at build time from |
343 | SOURCE_DATE_EPOCH (maybe even under that name?). Would then be used to | |
344 | initialize the timestamp logic of ConditionNeedsUpdate=. | |
345 | ||
085a4d47 LP |
346 | * nspawn/vmspawn/pid1: add ability to easily insert fully booted VMs/FOSC into |
347 | shell pipelines, i.e. add easy to use switch that turns off console status | |
348 | output, and generates the right credentials for systemd-run-generator so that | |
349 | a program is invoked, and its output captured, with correct EOF handling and | |
350 | exit code propagation | |
351 | ||
10048b2e LP |
352 | * new systemd-analyze "join" verb or so, for debugging services. Would be |
353 | nsenter on steroids, i.e invoke a shell or command line in an environment as | |
354 | close as we can make it for the MainPID of a service. Should be built around | |
355 | pidfd, so that we can reasonably robustly do this. Would only cover the | |
356 | execution environment like namespaces, but not the privilege settings. | |
357 | ||
10e3f15a | 358 | * Introduce a CGroupRef structure, inspired by PidRef. Should contain cgroup |
ff509772 | 359 | path, cgroup id, and cgroup fd. Use it to continuously pin all v2 cgroups via |
10e3f15a LP |
360 | a cgroup_ref field in the CGroupRuntime structure. Eventually switch things |
361 | over to do all cgroupfs access only via that structure's fd. | |
362 | ||
00f329f4 LP |
363 | * Get rid of the symlinks in /run/systemd/units/* and exclusively use cgroupfs |
364 | xattrs to convey info about invocation ids, logging settings and so on. | |
365 | support for cgroupfs xattrs in the "trusted." namespace was added in linux | |
366 | 3.7, i.e. which we don't pretend to support anymore. | |
367 | ||
9af6ab44 LP |
368 | * rewrite bpf-devices in libbpf/C code, rather than home-grown BPF assembly, to |
369 | match bpf-restrict-fs, bpf-restrict-ifaces, bpf-socket-bind | |
370 | ||
371 | * ditto: rewrite bpf-firewall in libbpf/C code | |
372 | ||
fd40e7da LP |
373 | * credentials: if we ever acquire a secure way to derive cgroup id of socket |
374 | peers (i.e. SO_PEERCGROUPID), then extend the "scoped" credential logic to | |
375 | allow cgroup-scoped (i.e. app or service scoped) credentials. Then, as next | |
376 | step use this to implement per-app/per-service encrypted directories, where | |
377 | we set up fscrypt on the StateDirectory= with a randomized key which is | |
378 | stored as xattr on the directory, encrypted as a credential. | |
379 | ||
380 | * credentials: optionally include a per-user secret in scoped user-credential | |
381 | encryption keys. should come from homed in some way, derived from the luks | |
382 | volume key or fscrypt directory key. | |
383 | ||
384 | * credentials: add a flag to the scoped credentials that if set require PK | |
385 | reauthentication when unlocking a secret. | |
386 | ||
387 | * teach systemd --user to properly load credentials off disk, with | |
3600b0f4 | 388 | /etc/credstore equivalent and similar. Make sure that $CREDENTIALS_DIRECTORY= |
fd40e7da LP |
389 | actually works too when run with user privs. |
390 | ||
bf543ba6 LP |
391 | * extend the smbios11 logic for passing credentials so that instead of passing |
392 | the credential data literally it can also just reference an AF_VSOCK CID/port | |
393 | to read them from. This way the data doesn't remain in the SMBIOS blob during | |
394 | runtime, but only in the credentials fs. | |
395 | ||
d9a57a55 LP |
396 | * machined: optionally track nspawn unix-export/ runtime for each machined, and |
397 | then update systemd-ssh-proxy so that it can connect to that. | |
9a1dc754 | 398 | |
73d8041c | 399 | * add a new ExecStart= flag that inserts the configured user's shell as first |
bdc79e5f | 400 | word in the command line. (maybe use character '.'). Usecase: tool such as |
7aed4343 | 401 | run0 can use that to spawn the target user's default shell. |
73d8041c | 402 | |
360b9db3 LP |
403 | * introduce mntid_t, and make it 64bit, as apparently the kernel switched to |
404 | 64bit mount ids | |
405 | ||
1fdab6c3 LP |
406 | * use udev rule networkd ownership property to take ownership of network |
407 | interfaces nspawn creates | |
408 | ||
18098d7d LP |
409 | * mountfsd/nsresourced |
410 | - userdb: maybe allow callers to map one uid to their own uid | |
411 | - bpflsm: allow writes if resulting UID on disk would be userns' owner UID | |
412 | - make encrypted DDIs work (password…) | |
413 | - add API for creating a new file system from scratch (together with some | |
414 | dm-integrity/HMAC key). Should probably work using systemd-repart (access | |
415 | via varlink). | |
416 | - add api to make an existing file "trusted" via dm-integry/HMAC key | |
417 | - port: portabled | |
418 | - port: tmpfiles, sysusers and similar | |
419 | - lets see if we can make runtime bind mounts into unpriv nspawn work | |
420 | ||
097445d0 LP |
421 | * add a kernel cmdline switch (and cred?) for marking a system to be |
422 | "headless", in which case we never open /dev/console for reading, only for | |
423 | writing. This would then mean: systemd-firstboot would process creds but not | |
424 | ask interactively, getty would not be started and so on. | |
425 | ||
face0d0e LP |
426 | * cryptsetup: new crypttab option to auto-grow a luks device to its backing |
427 | partition size. new crypttab option to reencrypt a luks device with a new | |
428 | volume key. | |
429 | ||
3c28ebac LP |
430 | * we probably should have some infrastructure to acquire sysexts with |
431 | drivers/firmware for local hardware automatically. Idea: reuse the modalias | |
432 | logic of the kernel for this: make the main OS image install a hwdb file | |
433 | that matches against local modalias strings, and adds properties to relevant | |
434 | devices listing names of sysexts needed to support the hw. Then provide some | |
435 | tool that goes through all devices and tries to acquire/download the | |
436 | specified images. | |
437 | ||
869996dd LP |
438 | * repart + cryptsetup: support file systems that are encrypted and use verity |
439 | on top. Usecase: confexts that shall be signed by the admin but also be | |
440 | confidential. Then, add a new --make-ddi=confext-encrypted for this. | |
441 | ||
f3066d63 LP |
442 | * tmpfiles: add new line type for moving files from some source dir to some |
443 | target dir. then use that to move sysexts/confexts and stuff from initrd | |
444 | tmpfs to /run/, so that host can pick things up. | |
445 | ||
446 | * tiny varlink service that takes a fd passed in and serves it via http. Then | |
447 | make use of that in networkd, and expose some EFI binary of choice for | |
448 | DHCP/HTTP base EFI boot. | |
449 | ||
450 | * bootctl: add reboot-to-disk which takes a block device name, and | |
451 | automatically sets things up so that system reboots into that device next. | |
452 | ||
453 | * maybe: in PID1, when we detect we run in an initrd, make superblock read-only | |
454 | early on, but provide opt-out via kernel cmdline. | |
455 | ||
9f97ca70 LP |
456 | * systemd-pcrextend: |
457 | - support measuring to nvindex with PCR update semantics ("fake PCRs") | |
458 | - add api for "allocating" such an nvindex | |
459 | - once we have that start measuring every sysext we apply, every confext, | |
620788da | 460 | every RootImage= we apply, every nspawn and so on. All in separate fake |
9f97ca70 LP |
461 | PCRs. |
462 | ||
46859471 | 463 | * vmspawn: |
46859471 | 464 | - run in scope unit when invoked from command line, and machined registration is off |
46859471 LP |
465 | - sd_notify support |
466 | - --ephemeral support | |
467 | - --read-only support | |
468 | - automatically suspend/resume the VM if the host suspends. Use logind | |
469 | suspend inhibitor to implement this. request clean suspend by generating | |
470 | suspend key presses. | |
471 | - support for "real" networking via "-n" and --network-bridge= | |
46859471 LP |
472 | - translate SIGTERM to clean ACPI shutdown event |
473 | ||
474 | * systemd-pcrmachine should probably also measure the SMBIOS system UUID. | |
475 | ||
2259a452 LP |
476 | * sd-boot: allow synthesizing additional type1 entries via SMBIOS vendor strings |
477 | ||
478 | * storagetm: | |
479 | - add USB mass storage device logic, so that all local disks are also exposed | |
480 | as mass storage devices on systems that have a USB controller that can | |
481 | operate in device mode | |
482 | - add NVMe authentication | |
02484f20 LP |
483 | |
484 | * add support for activating nvme-oF devices at boot automatically via kernel | |
485 | cmdline, and maybe even support a syntax such as | |
486 | root=nvme:<trtype>:<traddr>:<trsvcid>:<nqn>:<partition> to boot directly from | |
487 | nvme-oF | |
488 | ||
e43f87a7 | 489 | * pcrlock: |
e43f87a7 LP |
490 | - add kernel-install plugin that automatically creates UKI .pcrlock file when |
491 | UKI is installed, and removes it when it is removed again | |
492 | - automatically install PE measurement of sd-boot on "bootctl install" | |
e43f87a7 LP |
493 | - pre-calc sysext + kernel cmdline measurements |
494 | - pre-calc cryptsetup root key measurement | |
495 | - maybe make systemd-repart generate .pcrlock for old and new GPT header in | |
496 | /run? | |
497 | - Add support for more than 8 branches per PCR OR | |
498 | - add "systemd-pcrlock lock-kernel-current" or so which synthesizes .pcrlock | |
499 | policy from currently booted kernel/event log, to close gap for first boot | |
500 | for pre-built images | |
501 | ||
0e9f2297 LP |
502 | * in sd-boot and sd-stub measure the SMBIOS vendor strings to some PCR (at |
503 | least some subset of them that look like systemd stuff), because apparently | |
504 | some firmware does not, but systemd honours it. avoid duplicate measurement | |
505 | by sd-boot and sd-stub by adding LoaderFeatures/StubFeatures flag for this, | |
506 | so that sd-stub can avoid it if sd-boot already did it. | |
507 | ||
508 | * cryptsetup: a mechanism that allows signing a volume key with some key that | |
509 | has to be present in the kernel keyring, or similar, to ensure that confext | |
510 | DDIs can be encrypted against the local SRK but signed with the admin's key | |
511 | and thus can authenticated locally before they are decrypted. | |
512 | ||
513 | * image policy should be extended to allow dictating *how* a disk is unlocked, | |
514 | i.e. root=encrypted-tpm2+encrypted-fido2 would mean "root fs must be | |
515 | encrypted and unlocked via fido2 or tpm2, but not otherwise" | |
516 | ||
517 | * systemd-repart: add support for formatting dm-crypt + dm-integrity file | |
518 | systems. | |
519 | ||
d2c5b50a LP |
520 | * homed: use systemd-storagetm to expose home dirs via nvme-tcp. Then, |
521 | teach homed/pam_systemd_homed with a user name such as | |
522 | lennart%nvme_tcp_192.168.100.77_8787 to log in from any linux host with the | |
523 | same home dir. Similar maybe for nbd, iscsi? this should then first ask for | |
524 | the local root pw, to authenticate that logging in like this is ok, and would | |
525 | then be followed by another password prompt asking for the user's own | |
526 | password. Also, do something similar for CIFS: if you log in via | |
0e9f2297 | 527 | lennart%cifs-someserver_someshare, then set up the homed dir for it |
d2c5b50a LP |
528 | automatically. The PAM module should update the user name used for login to |
529 | the short version once it set up the user. Some care should be taken, so that | |
530 | the long version can be still be resolved via NSS afterwards, to deal with | |
531 | PAM clients that do not support PAM sessions where PAM_USER changes half-way. | |
0e9f2297 | 532 | |
9f3ed6fd LP |
533 | * redefine /var/lib/extensions/ as the dir one can place all three of sysext, |
534 | confext as well is multi-modal DDIs that qualify as both. Then introduce | |
535 | /var/lib/sysexts/ which can be used to place only DDIs that shall be used as | |
536 | sysext | |
537 | ||
3d1831b9 LP |
538 | * Varlinkification of the following command line tools, to open them up to |
539 | other programs via IPC: | |
540 | - bootctl | |
541 | - journalctl (allowing journal read access via IPC) | |
542 | - coredumpcl | |
543 | - systemd-bless-boot | |
544 | - systemd-measure | |
3d1831b9 LP |
545 | - systemd-cryptenroll (to allow UIs to enroll FIDO2 keys and such) |
546 | - systemd-dissect | |
3d1831b9 LP |
547 | - systemd-sysupdate |
548 | - systemd-analyze | |
549 | - kernel-install | |
f277d99c | 550 | - systemd-mount (with PK so that desktop environments could use it to mount disks) |
3d1831b9 | 551 | |
90eabfe6 LP |
552 | * enumerate virtiofs devices during boot-up in a generator, and synthesize |
553 | mounts for rootfs, /usr/, /home/, /srv/ and some others from it, depending on | |
02c9d62b | 554 | the "tag". (waits for: https://gitlab.com/virtio-fs/virtiofsd/-/issues/128) |
90eabfe6 LP |
555 | |
556 | * automatically mount one virtiofs during early boot phase to /run/host/, | |
557 | similar to how we do that for nspawn, based on some clear tag. | |
558 | ||
8b9c3af0 LP |
559 | * add some service that makes an atomic snapshot of PCR state and event log up |
560 | to that point available, possibly even with quote by the TPM. | |
561 | ||
8f533730 LP |
562 | * encode type1 entries in some UKI section to add additional entries to the |
563 | menu. | |
564 | ||
3d1831b9 LP |
565 | * Add ACL-based access management to .socket units. i.e. add AllowPeerUser= + |
566 | AllowPeerGroup= that installs additional user/group ACL entries on AF_UNIX | |
567 | sockets. | |
8f533730 | 568 | |
1a9454a9 LP |
569 | * systemd-tpm2-setup should probably have a factory reset logic, i.e. when some |
570 | kernel command line option is set we reset the TPM (equivalent of tpm2_clear | |
eb9b95f9 | 571 | -c owner? or rather echo 5 >/sys/class/tpm/tpm0/ppi/request?). |
1a9454a9 LP |
572 | |
573 | * systemd-tpm2-setup should support a mode where we refuse booting if the SRK | |
574 | changed. (Must be opt-in, to not break systems which are supposed to be | |
575 | migratable between PCs) | |
576 | ||
8f533730 LP |
577 | * when systemd-sysext learns mutable /usr/ (and systemd-confext mutable /etc/) |
578 | then allow them to store the result in a .v/ versioned subdir, for some basic | |
579 | snapshot logic | |
580 | ||
581 | * add a new PE binary section ".mokkeys" or so which sd-stub will insert into | |
582 | Mok keyring, by overriding/extending whatever shim sets in the EFI | |
583 | var. Benefit: we can extend the kernel module keyring at ukify time, | |
fcdd21ec | 584 | i.e. without recompiling the kernel, taking an upstream OS' kernel and adding |
8f533730 LP |
585 | a local key to it. |
586 | ||
a1f7cdc6 | 587 | * PidRef conversion work: |
1158b06b LP |
588 | - cg_pid_get_xyz() |
589 | - pid_from_same_root_fs() | |
590 | - get_ctty_devnr() | |
4775b55d | 591 | - actually wait for POLLIN on pidref's pidfd in service logic |
a1f7cdc6 | 592 | - openpt_allocate_in_namespace() |
d94dc50c LP |
593 | - unit_attach_pid_to_cgroup_via_bus() |
594 | - cg_attach() – requires new kernel feature | |
a1f7cdc6 | 595 | |
354e5b88 LP |
596 | * ddi must be listed as block device fstype |
597 | ||
598 | * measure some string via pcrphase whenever we end up booting into emergency | |
599 | mode. | |
600 | ||
3a9e659a | 601 | * homed: add a basic form of secrets management to homed, that stores |
354e5b88 LP |
602 | secrets in $HOME somewhere, is protected by the accounts own authentication |
603 | mechanisms. Should implement something PKCS#11-like that can be used to | |
604 | implement emulated FIDO2 in unpriv userspace on top (which should happen | |
605 | outside of homed), emulated PKCS11, and libsecrets support. Operate with a | |
606 | 2nd key derived from volume key of the user, with which to wrap all | |
607 | keys. maintain keys in kernel keyring if possible. | |
608 | ||
97046f2f LP |
609 | * use sd-event ratelimit feature optionally for journal stream clients that log |
610 | too much | |
c5783453 | 611 | |
fcdd21ec | 612 | * systemd-mount should only consider modern file systems when mounting, similar |
c5783453 LP |
613 | to systemd-dissect |
614 | ||
be76bf62 LP |
615 | * add another PE section ".fname" or so that encodes the intended filename for |
616 | PE file, and validate that when loading add-ons and similar before using | |
617 | it. This is particularly relevant when we load multiple add-ons and want to | |
618 | sort them to apply them in a define order. The order should not be under | |
619 | control of the attacker. | |
620 | ||
c4ffb530 LP |
621 | * also include packaging metadata (á la |
622 | https://systemd.io/ELF_PACKAGE_METADATA/) in our UEFI PE binaries, using the | |
623 | same JSON format. | |
624 | ||
625 | * make "bootctl install" + "bootctl update" useful for installing shim too. For | |
626 | that introduce new dir /usr/lib/systemd/efi/extra/ which we copy mostly 1:1 | |
627 | into the ESP at install time. Then make the logic smart enough so that we | |
628 | don't overwrite bootx64.efi with our own if the extra tree already contains | |
629 | one. Also, follow symlinks when copying, so that shim rpm can symlink their | |
630 | stuff into our dir (which is safe since the target ESP is generally VFAT and | |
631 | thus does not have symlinks anyway). Later, teach the update logic to look at | |
632 | the ELF package metadata (which we also should include in all PE files, see | |
633 | above) for version info in all *.EFI files, and use it to only update if | |
634 | newer. | |
635 | ||
0f85a0d3 LP |
636 | * in sd-stub: optionally add support for a new PE section .keyring or so that |
637 | contains additional certificates to include in the Mok keyring, extending | |
638 | what shim might have placed there. why? let's say I use "ukify" to build + | |
639 | sign my own fedora-based UKIs, and only enroll my personal lennart key via | |
640 | shim. Then, I want to include the fedora keyring in it, so that kmods work. | |
641 | But I might not want to enroll the fedora key in shim, because this would | |
642 | also mean that the key would be in effect whenever I boot an archlinux UKI | |
643 | built the same way, signed with the same lennart key. | |
644 | ||
29de4eba LP |
645 | * resolved: take possession of some IPv6 ULA address (let's say |
646 | fd00:5353:5353:5353:5353:5353:5353:5353), and listen on port 53 on it for the | |
647 | local stubs, so that we can make the stub available via ipv6 too. | |
648 | ||
aafd429c LP |
649 | * Maybe add SwitchRootEx() as new bus call that takes env vars to set for new |
650 | PID 1 as argument. When adding SwitchRootEx() we should maybe also add a | |
651 | flags param that allows disabling and enabling whether serialization is | |
652 | requested during switch root. | |
9c9b9b89 | 653 | |
89ee9e59 LP |
654 | * introduce a .acpitable section for early ACPI table override |
655 | ||
9c9b9b89 LP |
656 | * add proper .osrel matching for PE addons. i.e. refuse applying an addon |
657 | intended for a different OS. Take inspiration from how confext/sysext are | |
658 | matched against OS. | |
659 | ||
5596fd8f LP |
660 | * figure out what to do about credentials sealed to PCRs in kexec + soft-reboot |
661 | scenarios. Maybe insist sealing is done additionally against some keypair in | |
662 | the TPM to which access is updated on each boot, for the next, or so? | |
663 | ||
9287925a LP |
664 | * logind: when logging in, always take an fd to the home dir, to keep the dir |
665 | busy, so that autofs release can never happen. (this is generally a good | |
666 | idea, and specifically works around the fact the autofs ignores busy by mount | |
667 | namespaces) | |
668 | ||
f351e951 LP |
669 | * mount most file systems with a restrictive uidmap. e.g. mount /usr/ with a |
670 | uidmap that blocks out anything outside 0…1000 (i.e. system users) and similar. | |
671 | ||
672 | * mount the root fs with MS_NOSUID by default, and then mount /usr/ without | |
673 | both so that suid executables can only be placed there. Do this already in | |
674 | the initrd. If /usr/ is not split out create a bind mount automatically. | |
675 | ||
f447b741 | 676 | * fix our various hwdb lookup keys to end with ":" again. The original idea was |
94d82b59 | 677 | that hwdb patterns can match arbitrary fields with expressions like |
f447b741 LP |
678 | "*:foobar:*", to wildcard match both the start and the end of the string. |
679 | This only works safely for later extensions of the string if the strings | |
680 | always end in a colon. This requires updating our udev rules, as well as | |
681 | checking if the various hwdb files are fine with that. | |
682 | ||
c1c4ecd3 LP |
683 | * mount /tmp/ and /var/tmp with a uidmap applied that blocks out "nobody" user |
684 | among other things such as dynamic uid ranges for containers and so on. That | |
94d82b59 | 685 | way no one can create files there with these uids and we enforce they are only |
c1c4ecd3 LP |
686 | used transiently, never persistently. |
687 | ||
aa03f499 LP |
688 | * rework loopback support in fstab: when "loop" option is used, then |
689 | instantiate a new systemd-loop@.service for the source path, set the | |
690 | lo_file_name field for it to something recognizable derived from the fstab | |
691 | line, and then generate a mount unit for it using a udev generated symlink | |
692 | based on lo_file_name. | |
693 | ||
97c493f2 LP |
694 | * teach systemd-nspawn the boot assessment logic: hook up vpick's try counters |
695 | with success notifications from nspawn payloads. When this is enabled, | |
56a89426 | 696 | automatically support reverting back to older OS version images if newer ones |
97c493f2 LP |
697 | fail to boot. |
698 | ||
699 | * implement new "systemd-fsrebind" tool that works like gpt-auto-generator but | |
700 | looks at a root dir and then applies vpick on various dirs/images to pick a | |
701 | root tree, a /usr/ tree, a /home/, a /srv/, a /var/ tree and so on. Dirs | |
702 | could also be btrfs subvols (combine with btrfs auto-snapshort approach for | |
703 | creating versions like these automatically). | |
704 | ||
a69a520b LP |
705 | * remove tomoyo support, it's obsolete and unmaintained apparently |
706 | ||
8b098d94 LP |
707 | * In .socket units, add ConnectStream=, ConnectDatagram=, |
708 | ConnectSequentialPacket= that create a socket, and then *connect to* rather than | |
709 | listen on some socket. Then, add a new setting WriteData= that takes some | |
710 | base64 data that systemd will write into the socket early on. This can then | |
711 | be used to create connections to arbitrary services and issue requests into | |
712 | them, as long as the data is static. This can then be combined with the | |
713 | aforementioned journald subscription varlink service, to enable | |
714 | activation-by-message id and similar. | |
715 | ||
ed856ea1 ZJS |
716 | * .service with invalid Sockets= starts successfully. |
717 | ||
512f2da5 | 718 | * landlock: lock down RuntimeDirectory= via landlock, so that services lose |
3a9e659a | 719 | ability to write anywhere else below /run/. Similar for |
512f2da5 LP |
720 | StateDirectory=. Benefit would be clear delegation via unit files: services |
721 | get the directories they get, and nothing else even if they wanted to. | |
722 | ||
723 | * landlock: for unprivileged systemd (i.e. systemd --user), use landlock to | |
724 | implement ProtectSystem=, ProtectHome= and so on. Landlock does not require | |
725 | privs, and we can implement pretty similar behaviour. Also, maybe add a mode | |
726 | where ProtectSystem= combined with an explicit PrivateMounts=no could request | |
727 | similar behaviour for system services, too. | |
728 | ||
13340701 LP |
729 | * Add systemd-mount@.service which is instantiated for a block device and |
730 | invokes systemd-mount and exits. This is then useful to use in | |
731 | ENV{SYSTEMD_WANTS} in udev rules, and a bit prettier than using RUN+= | |
732 | ||
3d092a70 LP |
733 | * udevd: extend memory pressure logic: also kill any idle worker processes |
734 | ||
12c346d8 ZJS |
735 | * udevadm: to make symlink querying with udevadm nicer: |
736 | - do not enable the pager for queries like 'udevadm info -q -r symlink' | |
737 | - add mode with newlines instead of spaces (for grep)? | |
738 | ||
3d092a70 LP |
739 | * SIGRTMIN+18 and memory pressure handling should still be added to: hostnamed, |
740 | localed, oomd, timedated. | |
741 | ||
1c904337 LP |
742 | * repart/gpt-auto/DDIs: maybe introduce a concept of "extension" partitions, |
743 | that have a new type uuid and can "extend" earlier partitions, to work around | |
744 | the fact that systemd-repart can only grow the last partition defined. During | |
745 | activation we'd simply set up a dm-linear mapping to merge them again. A | |
746 | partition that is to be extended would just set a bit in the partition flags | |
747 | field to indicate that there's another extension partition to look for. The | |
627cdcc7 | 748 | identifying UUID of the extension partition would be hashed in counter mode |
1c904337 LP |
749 | from the uuid of the original partition it extends. Inspiration for this is |
750 | the "dynamic partitions" concept of new Android. This would be a minimalistic | |
751 | concept of a volume manager, with the extents it manages being exposes as GPT | |
752 | partitions. I a partition is extended multiple times they should probably | |
753 | grow exponentially in size to ensure O(log(n)) time for finding them on | |
754 | access. | |
8f8d7dff | 755 | |
2259a452 LP |
756 | * Make nspawn to a frontend for systemd-executor, so that we have to ways into |
757 | the executor: via unit files/dbus/varlink through PID1 and via cmdline/OCI | |
758 | through nspawn. | |
32284ffc | 759 | |
46730cd6 LP |
760 | * sd-stub: detect if we are running with uefi console output on serial, and if so |
761 | automatically add console= to kernel cmdline matching the same port. | |
762 | ||
e793038a LP |
763 | * add a utility that can be used with the kernel's |
764 | CONFIG_STATIC_USERMODEHELPER_PATH and then handles them within pid1 so that | |
765 | security, resource management and cgroup settings can be enforced properly | |
766 | for all umh processes. | |
767 | ||
a1ad873d LP |
768 | * homed: when resizing an fs don't sync identity beforehand there might simply |
769 | not be enough disk space for that. try to be defensive and sync only after | |
770 | resize. | |
771 | ||
772 | * homed: if for some reason the partition ended up being much smaller than | |
773 | whole disk, recover from that, and grow it again. | |
774 | ||
a0bccdd3 LP |
775 | * timesyncd: when saving/restoring clock try to take boot time into account. |
776 | Specifically, along with the saved clock, store the current boot ID. When | |
777 | starting, check if the boot id matches. If so, don't do anything (we are on | |
778 | the same boot and clock just kept running anyway). If not, then read | |
779 | CLOCK_BOOTTIME (which started at boot), and add it to the saved clock | |
780 | timestamp, to compensate for the time we spent booting. If EFI timestamps are | |
781 | available, also include that in the calculation. With this we'll then only | |
782 | miss the time spent during shutdown after timesync stopped and before the | |
783 | system actually reset. | |
784 | ||
785 | * systemd-stub: maybe store a "boot counter" in the ESP, and pass it down to | |
e591cd5c LP |
786 | userspace to allow ordering boots (for example in journalctl). The counter |
787 | would be monotonically increased on every boot. | |
a0bccdd3 | 788 | |
87a7084b LP |
789 | * pam_systemd_home: add module parameter to control whether to only accept |
790 | only password or only pcks11/fido2 auth, and then use this to hook nicely | |
791 | into two of the three PAM stacks gdm provides. | |
792 | See discussion at https://github.com/authselect/authselect/pull/311 | |
793 | ||
4cb8a25b | 794 | * sd-boot: make boot loader spec type #1 accept http urls in "linux" |
1c904337 | 795 | lines. Then, do the uefi http dance to download kernels and boot them. This |
fcdd21ec | 796 | is then useful for network boot, by embedding a cpio with type #1 snippets |
4cb8a25b LP |
797 | in sd-boot, which reference remote kernels. |
798 | ||
d995ccd7 LP |
799 | * maybe prohibit setuid() to the nobody user, to lock things down, via seccomp. |
800 | the nobody is not a user any code should run under, ever, as that user would | |
801 | possibly get a lot of access to resources it really shouldn't be getting | |
802 | access to due to the userns + nfs semantics of the user. Alternatively: use | |
803 | the seccomp log action, and allow it. | |
804 | ||
0b556555 LP |
805 | * sd-boot: add a new PE section .bls or so that carries a cpio with additional |
806 | boot loader entries (both type1 and type2). Then when initializing, find this | |
807 | section, iterate through it and populate menu with it. cpio is simple enough | |
808 | to make a parser for this reasonably robust. use same path structures as in | |
809 | the ESP. Similar add one for signature key drop-ins. | |
810 | ||
4cb8a25b LP |
811 | * sd-boot: also allow passing in the cpio as in the previous item via SMBIOS |
812 | ||
0b556555 LP |
813 | * add a new EFI tool "sd-fetch" or so. It looks in a PE section ".url" for an |
814 | URL, then downloads the file from it using UEFI HTTP APIs, and executes it. | |
7227dd81 | 815 | Use case: provide a minimal ESP with sd-boot and a couple of these sd-fetch |
0b556555 LP |
816 | binaries in place of UKIs, and download them on-the-fly. |
817 | ||
084ecae5 | 818 | * maybe: systemd-loop-generator that sets up loopback devices if requested via kernel |
7227dd81 | 819 | cmdline. use case: include encrypted/verity root fs in UKI. |
084ecae5 LP |
820 | |
821 | * systemd-gpt-auto-generator: add kernel cmdline option to override block | |
822 | device to dissect. also support dissecting a regular file. useccase: include | |
823 | encrypted/verity root fs in UKI. | |
824 | ||
6d040d84 | 825 | * sd-stub: add ".bootcfg" section for kernel bootconfig data (as per |
4cb8a25b | 826 | https://docs.kernel.org/admin-guide/bootconfig.html) |
6d040d84 LP |
827 | |
828 | * tpm2: add (optional) support for generating a local signing key from PCR 15 | |
829 | state. use private key part to sign PCR 7+14 policies. stash signatures for | |
830 | expected PCR7+14 policies in EFI var. use public key part in disk encryption. | |
831 | generate new sigs whenever db/dbx/mok/mokx gets updated. that way we can | |
832 | securely bind against SecureBoot/shim state, without having to renroll | |
833 | everything on each update (but we still have to generate one sig on each | |
834 | update, but that should be robust/idempotent). needs rollback protection, as | |
835 | usual. | |
836 | ||
e8cb96ac LP |
837 | * Lennart: big blog story about DDIs |
838 | ||
839 | * Lennart: big blog story about building initrds | |
840 | ||
841 | * Lennart: big blog story about "why systemd-boot" | |
842 | ||
0cdb1a2f LP |
843 | * bpf: see if we can use BPF to solve the syslog message cgroup source problem: |
844 | one idea would be to patch source sockaddr of all AF_UNIX/SOCK_DGRAM to | |
845 | implicitly contain the source cgroup id. Another idea would be to patch | |
846 | sendto()/connect()/sendmsg() sockaddr on-the-fly to use a different target | |
847 | sockaddr. | |
848 | ||
849 | * bpf: see if we can address opportunistic inode sharing of immutable fs images | |
850 | with BPF. i.e. if bpf gives us power to hook into openat() and return a | |
851 | different inode than is requested for which we however it has same contents | |
852 | then we can use that to implement opportunistic inode sharing among DDIs: | |
853 | make all DDIs ship xattr on all reg files with a SHA256 hash. Then, also | |
854 | dictate that DDIs should come with a top-level subdir where all reg files are | |
855 | linked into by their SHA256 sum. Then, whenever an inode is opened with the | |
856 | xattr set, check bpf table to find dirs with hashes for other prior DDIs and | |
857 | try to use inode from there. | |
858 | ||
0cdb1a2f LP |
859 | * extend the verity signature partition to permit multiple signatures for the |
860 | same root hash, so that people can sign a single image with multiple keys. | |
861 | ||
efe7ab96 LP |
862 | * consider adding a new partition type, just for /opt/ for usage in system |
863 | extensions | |
864 | ||
865 | * gpt-auto-discovery: also use the pkcs7 signature stuff, and pass signature to | |
866 | kernel. So far we only did this for the various --image= switches, but not | |
867 | for the root fs or /usr/. | |
868 | ||
9ef6330e LP |
869 | * dissection policy should enforce that unlocking can only take place by |
870 | certain means, i.e. only via pw, only via tpm2, or only via fido, or a | |
871 | combination thereof. | |
872 | ||
873 | * make the systemd-repart "seed" value provisionable via credentials, so that | |
874 | confidential computing environments can set it and deterministically | |
875 | enforce the uuids for partitions created, so that they can calculate PCR 15 | |
876 | ahead of time. | |
877 | ||
878 | * systemd-repart: also derive the volume key from the seed value, for the | |
879 | aforementioned purpose. | |
880 | ||
881 | * in the initrd: derive the default machine ID to pass to the host PID 1 via | |
882 | $machine_id from the same seed credential. | |
883 | ||
f87338fa DDM |
884 | * Add systemd-sysupdate-initrd.service or so that runs systemd-sysupdate in the |
885 | initrd to bootstrap the initrd to populate the initial partitions. Some things | |
886 | to figure out: | |
887 | - Should it run on firstboot or on every boot? | |
888 | - If run on every boot, should it use the sysupdate config from the host on | |
889 | subsequent boots? | |
890 | ||
924a329a LP |
891 | * revisit default PCR bindings in cryptenroll and systemd-creds. Currently they |
892 | use PCR 7 which should contain secureboot state db/dbx. Which sounded like a | |
893 | safe bet, given that it should change only on policy changes, and not | |
894 | software updates. But that's wrong. Recent fwupd (rightfully) contains code | |
895 | for updating the dbx denylist. This means even without any active policy | |
896 | change PCR 7 might change. Hence, better idea might be in systemd-creds to | |
6d040d84 LP |
897 | default to PCR 15 at least if sd-stub is used (i.e. bind to system identity), |
898 | and in cryptsetup simply the empty list? Also, PCR 14 almost certainly should | |
899 | be included as much as PCR 7 (as it contains shim's policy, which is | |
900 | certainly as relevant as PCR 7 on many systems) | |
924a329a | 901 | |
924a329a LP |
902 | * To mimic the new tpm2-measure-pcr= crypttab option add the same to veritytab |
903 | (measuring the root hash) and integritytab (measuring the HMAC key if one is | |
904 | used) | |
905 | ||
4554c178 LP |
906 | * We should start measuring all services, containers, and system extensions we |
907 | activate. probably into PCR 13. i.e. add --tpm2-measure-pcr= or so to | |
908 | systemd-nspawn, and MeasurePCR= to unit files. Should contain a measurement | |
909 | of the activated configuration and the image that is being activated (in case | |
910 | verity is used, hash of the root hash). | |
911 | ||
4d727f86 LP |
912 | * bootspec: permit graceful "update" from type #2 to type #1. If both a type #1 |
913 | and a type #2 entry exist under otherwise the exact same name, then use the | |
914 | type #1 entry, and ignore the type #2 entry. This way, people can "upgrade" | |
915 | from the UKI with all parameters baked in to a Type #1 .conf file with manual | |
7ff7eadf | 916 | parametrization, if needed. This matches our usual rule that admin config |
4d727f86 LP |
917 | should win over vendor defaults. |
918 | ||
4d727f86 LP |
919 | * write a "search path" spec, that documents the prefixes to search in |
920 | (i.e. the usual /etc/, /run/, /usr/lib/ dance, potentially /usr/etc/), how to | |
921 | sort found entries, how masking works and overriding. | |
922 | ||
923 | * automatic boot assessment: add one more default success check that just waits | |
924 | for a bit after boot, and blesses the boot if the system stayed up that long. | |
925 | ||
4d727f86 LP |
926 | * systemd-repart: add support for generating ISO9660 images |
927 | ||
928 | * systemd-repart: in addition to the existing "factory reset" mode (which | |
929 | simply empties existing partitions marked for that). add a mode where | |
7227dd81 | 930 | partitions marked for it are entirely removed. Use case: remove secondary OS |
4d727f86 LP |
931 | copy, and redundant partitions entirely, and recreate them anew. |
932 | ||
933 | * systemd-boot: maybe add support for collapsing menu entries of the same OS | |
934 | into one item that can be opened (like in a "tree view" UI element) or | |
935 | collapsed. If only a single OS is installed, disable this mode, but if | |
936 | multiple OSes are installed might make sense to default to it, so that user | |
937 | is not immediately bombarded with a multitude of Linux kernel versions but | |
938 | only one for each OS. | |
939 | ||
940 | * systemd-repart: if the GPT *disk* UUID (i.e. the one global for the entire | |
941 | disk) is set to all FFFFF then use this as trigger for factory reset, in | |
7ff7eadf | 942 | addition to the existing mechanisms via EFI variables and kernel command |
4d727f86 LP |
943 | line. Benefit: works also on non-EFI systems, and can be requested on one |
944 | boot, for the next. | |
945 | ||
4d727f86 LP |
946 | * systemd-sysupdate: make transport pluggable, so people can plug casync or |
947 | similar behind it, instead of http. | |
948 | ||
949 | * systemd-tmpfiles: add concept for conditionalizing lines on factory reset | |
950 | boot, or on first boot. | |
951 | ||
a5a0da08 LP |
952 | * we probably needs .pcrpkeyrd or so as additional PE section in UKIs, |
953 | which contains a separate public key for PCR values that only apply in the | |
954 | initrd, i.e. in the boot phase "enter-initrd". Then, consumers in userspace | |
955 | can easily bind resources to just the initrd. Similar, maybe one more for | |
956 | "enter-initrd:leave-initrd" for resources that shall be accessible only | |
957 | before unprivileged user code is allowed. (we only need this for .pcrpkey, | |
958 | not for .pcrsig, since the latter is a list of signatures anyway). With that, | |
959 | when you enroll a LUKS volume or similar, pick either the .pcrkey (for | |
960 | coverage through all phases of the boot, but excluding shutdown), the | |
961 | .pcrpkeyrd (for coverage in the initrd only) and .pcrpkeybt (for coverage | |
962 | until users are allowed to log in). | |
963 | ||
964 | * Once the root fs LUKS volume key is measured into PCR 15, default to binding | |
965 | credentials to PCR 15 in "systemd-creds" | |
966 | ||
feffee70 LP |
967 | * add support for asymmetric LUKS2 TPM based encryption. i.e. allow preparing |
968 | an encrypted image on some host given a public key belonging to a specific | |
969 | other host, so that only hosts possessing the private key in the TPM2 chip | |
7227dd81 | 970 | can decrypt the volume key and activate the volume. Use case: systemd-confext |
b60e0f57 | 971 | for a central orchestrator to generate confext images securely that can only |
feffee70 LP |
972 | be activated on one specific host (which can be used for installing a bunch |
973 | of creds in /etc/credstore/ for example). Extending on this: allow binding | |
974 | LUKS2 TPM based encryption also to the TPM2 internal clock. Net result: | |
b60e0f57 | 975 | prepare a confext image that can only be activated on a specific host that |
976 | runs a specific software in a specific time window. confext would be | |
feffee70 LP |
977 | automatically invalidated outside of it. |
978 | ||
979 | * maybe add a "systemd-report" tool, that generates a TPM2-backed "report" of | |
980 | current system state, i.e. a combination of PCR information, local system | |
981 | time and TPM clock, running services, recent high-priority log | |
982 | messages/coredumps, system load/PSI, signed by the local TPM chip, to form an | |
7227dd81 | 983 | enhanced remote attestation quote. Use case: a simple orchestrator could use |
ae24e4e8 | 984 | this: have the report tool upload these reports every 3min somewhere. Then |
feffee70 LP |
985 | have the orchestrator collect these reports centrally over a 3min time |
986 | window, and use them to determine what which node should now start/stop what, | |
b60e0f57 | 987 | and generate a small confext for each node, that uses Uphold= to pin services |
988 | on each node. The confext would be encrypted using the asymmetric encryption | |
feffee70 LP |
989 | proposed above, so that it can only be activated on the specific host, if the |
990 | software is in a good state, and within a specific time frame. Then run a | |
991 | loop on each node that sends report to orchestrator and then sysupdate to | |
b60e0f57 | 992 | update confext. Orchestrator would be stateless, i.e. operate on desired |
feffee70 LP |
993 | config and collected reports in the last 3min time window only, and thus can |
994 | be trivially scaled up since all instances of the orchestrator should come to | |
995 | the same conclusions given the same inputs of reports/desired workload info. | |
996 | Could also be used to deliver Wireguard secrets and thus to clients, thus | |
b60e0f57 | 997 | permitting zero-trust networking: secrets are rolled over via confext updates, |
feffee70 LP |
998 | and via the time window TPM logic invalidated if node doesn't keep itself |
999 | updated, or becomes corrupted in some way. | |
1000 | ||
a67a50e8 LP |
1001 | * in the initrd, once the rootfs encryption key has been measured to PCR 15, |
1002 | derive default machine ID to use from it, and pass it to host PID 1. | |
feffee70 | 1003 | |
eb8817db LP |
1004 | * sd-boot: for each installed OS, grey out older entries (i.e. all but the |
1005 | newest), to indicate they are obsolete | |
1006 | ||
d1666bde LP |
1007 | * automatically propagate LUKS password credential into cryptsetup from host |
1008 | (i.e. SMBIOS type #11, …), so that one can unlock LUKS via VM hypervisor | |
1009 | supplied password. | |
7dad7811 | 1010 | |
72a77377 LP |
1011 | * add ability to path_is_valid() to classify paths that refer to a dir from |
1012 | those which may refer to anything, and use that in various places to filter | |
1013 | early. i.e. stuff ending in "/", "/." and "/.." definitely refers to a | |
1014 | directory, and paths ending that way can be refused early in many contexts. | |
1015 | ||
fdcc31b7 LP |
1016 | * systemd-measure: add --pcrpkey-auto as an alternative to --pcrpkey=, where it |
1017 | would just use the same public key specified with --public-key= (or the one | |
1018 | automatically derived from --private-key=). | |
1019 | ||
72a77377 LP |
1020 | * Add "purpose" flag to partition flags in discoverable partition spec that |
1021 | indicate if partition is intended for sysext, for portable service, for | |
1022 | booting and so on. Then, when dissecting DDI allow specifying a purpose to | |
7227dd81 | 1023 | use as additional search condition. Use case: images that combined a sysext |
72a77377 LP |
1024 | partition with a portable service partition in one. |
1025 | ||
1026 | * On boot, auto-generate an asymmetric key pair from the TPM, | |
1027 | and use it for validating DDIs and credentials. Maybe upload it to the kernel | |
1028 | keyring, so that the kernel does this validation for us for verity and kernel | |
1029 | modules | |
1030 | ||
4e0ceefe LP |
1031 | * lock down acceptable encrypted credentials at boot, via simple allowlist, |
1032 | maybe on kernel command line: | |
1033 | systemd.import_encrypted_creds=foobar.waldo,tmpfiles.extra to protect locked | |
1034 | down kernels from credentials generated on the host with a weak kernel | |
1035 | ||
aa747c00 ZJS |
1036 | * Merge systemd-creds options --uid= (which accepts user names) and --user. |
1037 | ||
4e0ceefe LP |
1038 | * Add support for extra verity configuration options to systemd-repart (FEC, |
1039 | hash type, etc) | |
0fc40a0e | 1040 | |
f461a28d | 1041 | * chase(): take inspiration from path_extract_filename() and return |
be429c8f LP |
1042 | O_DIRECTORY if input path contains trailing slash. |
1043 | ||
f461a28d | 1044 | * chase(): refuse resolution if trailing slash is specified on input, |
4e0ceefe | 1045 | but final node is not a directory |
be429c8f | 1046 | |
be429c8f LP |
1047 | * document in boot loader spec that symlinks in XBOOTLDR/ESP are not OK even if |
1048 | non-VFAT fs is used. | |
1049 | ||
a9f1bf40 LP |
1050 | * measure credentials picked up from SMBIOS to some suitable PCR |
1051 | ||
b7b7441d LP |
1052 | * measure GPT and LUKS headers somewhere when we use them (i.e. in |
1053 | systemd-gpt-auto-generator/systemd-repart and in systemd-cryptsetup?) | |
1054 | ||
a9f1bf40 LP |
1055 | * pick up creds from EFI vars |
1056 | ||
acbb504e WR |
1057 | * Add and pickup tpm2 metadata for creds structure. |
1058 | ||
c794e280 LP |
1059 | * sd-boot: we probably should include all BootXY EFI variable defined boot |
1060 | entries in our menu, and then suppress ourselves. Benefit: instant | |
1061 | compatibility with all other OSes which register things there, in particular | |
1062 | on other disks. Always boot into them via NextBoot EFI variable, to not | |
1063 | affect PCR values. | |
1064 | ||
c0a74f62 LP |
1065 | * systemd-measure tool: |
1066 | - pre-calculate PCR 12 (command line) + PCR 13 (sysext) the same way we can precalculate PCR 11 | |
c0a74f62 | 1067 | |
5b6e5d57 LP |
1068 | * in sd-boot: load EFI drivers from a new PE section. That way, one can have a |
1069 | "supercharged" sd-boot binary, that could carry ext4 drivers built-in. | |
1070 | ||
812a8731 LP |
1071 | * sd-device: add an API for acquiring list of child devices, given a device |
1072 | objects (i.e. all child dirents that dirs or symlinks to dirs) | |
1073 | ||
1074 | * sd-device: maybe pin the sysfs dir with an fd, during the entire runtime of | |
1075 | an sd_device, then always work based on that. | |
1076 | ||
e1b45a75 | 1077 | * maybe add new flags to gpt partition tables for rootfs and usrfs indicating |
9f3a3ac7 LP |
1078 | purpose, i.e. whether something is supposed to be bootable in a VM, on |
1079 | baremetal, on an nspawn-style container, if it is a portable service image, | |
1080 | or a sysext for initrd, for host os, or for portable container. Then hook | |
1081 | portabled/… up to udev to watch block devices coming up with the flags set, and | |
1082 | use it. | |
1083 | ||
b89cfe8a LP |
1084 | * sd-boot should look for information what to boot in SMBIOS, too, so that VM |
1085 | managers can tell sd-boot what to boot into and suchlike | |
1086 | ||
52cd58b8 LP |
1087 | * add "systemd-sysext identify" verb, that you can point on any file in /usr/ |
1088 | and that determines from which overlayfs layer it originates, which image, and with | |
1089 | what it was signed. | |
1090 | ||
0fde330d LP |
1091 | * systemd-creds: extend encryption logic to support asymmetric |
1092 | encryption/authentication. Idea: add new verb "systemd-creds public-key" | |
1093 | which generates a priv/pub key pair on the TPM2 and stores the priv key | |
1094 | locally in /var. It then outputs a certificate for the pub part to stdout. | |
1095 | This can then be copied/taken elsewhere, and can be used for encrypting creds | |
1096 | that only the host on its specific hw can decrypt. Then, support a drop-in | |
1097 | dir with certificates that can be used to authenticate credentials. Flow of | |
1098 | operations is then this: build image with owner certificate, then after | |
1099 | boot up issue "systemd-creds public-key" to acquire pubkey of the machine. | |
1100 | Then, when passing data to the machine, sign with privkey belonging to one of | |
1101 | the dropped in certs and encrypted with machine pubkey, and pass to machine. | |
1102 | Machine is then able to authenticate you, and confidentiality is guaranteed. | |
1103 | ||
bbe29ca2 LP |
1104 | * building on top of the above, the pub/priv key pair generated on the TPM2 |
1105 | should probably also one you can use to get a remote attestation quote. | |
1106 | ||
d1666bde | 1107 | * Process credentials in: |
aafd429c LP |
1108 | • crypttab-generator: allow defining additional crypttab-like volumes via |
1109 | credentials (similar: verity-generator, integrity-generator). Use | |
1110 | fstab-generator logic as inspiration. | |
d1666bde LP |
1111 | • run-generator: allow defining additional commands to run via a credential |
1112 | • resolved: allow defining additional /etc/hosts entries via a credential (it | |
1113 | might make sense to then synthesize a new combined /etc/hosts file in /run | |
1114 | and bind mount it on /etc/hosts for other clients that want to read it. | |
d1666bde LP |
1115 | • repart: allow defining additional partitions via credential |
1116 | • timesyncd: pick NTP server info from credential | |
1117 | • portabled: read a credential "portable.extra" or so, that takes a list of | |
1118 | file system paths to enable on start. | |
1119 | • make systemd-fstab-generator look for a system credential encoding root= or | |
1120 | usr= | |
d1666bde LP |
1121 | • in gpt-auto-generator: check partition uuids against such uuids supplied via |
1122 | sd-stub credentials. That way, we can support parallel OS installations with | |
1123 | pre-built kernels. | |
bbe29ca2 | 1124 | |
f95db4d6 LP |
1125 | * define a JSON format for units, separating out unit definitions from unit |
1126 | runtime state. Then, expose it: | |
1127 | ||
1128 | 1. Add Describe() method to Unit D-Bus object that returns a JSON object | |
1129 | about the unit. | |
1130 | 2. Expose this natively via Varlink, in similar style | |
1131 | 3. Use it when invoking binaries (i.e. make PID 1 fork off systemd-executor | |
1132 | binary which reads the JSON definition and runs it), to address the cow | |
1133 | trap issue and the fact that NSS is actually forbidden in | |
1134 | forked-but-not-exec'ed children | |
1135 | 4. Add varlink API to run transient units based on provided JSON definitions | |
1136 | ||
81a96518 LP |
1137 | * Add SUPPORT_END_URL= field to os-release with more *actionable* information |
1138 | what to do if support ended | |
1139 | ||
1140 | * pam_systemd: on interactive logins, maybe show SUPPORT_END information at | |
3ff1721c | 1141 | login time, à la motd |
81a96518 | 1142 | |
e1b45a75 | 1143 | * sd-boot: instead of unconditionally deriving the ESP to search boot loader |
9c18b363 | 1144 | spec entries in from the paths of sd-boot binary, let's optionally allow it |
7227dd81 | 1145 | to be configured on sd-boot cmdline + efi var. Use case: embed sd-boot in the |
9c18b363 | 1146 | UEFI firmware (for example, ovmf supports that via qemu cmdline option), and |
e1b45a75 | 1147 | use it to load stuff from the ESP. |
9c18b363 | 1148 | |
b467422b LP |
1149 | * mount /var/ from initrd, so that we can apply sysext and stuff before the |
1150 | initrd transition. Specifically: | |
1151 | 1. There should be a var= kernel cmdline option, matching root= and usr= | |
1152 | 2. systemd-gpt-auto-generator should auto-mount /var if it finds it on disk | |
1153 | 3. mount.x-initrd mount option in fstab should be implied for /var | |
1154 | ||
d486b26f | 1155 | * make persistent restarts easier by adding a new setting OpenPersistentFile= |
47b86590 | 1156 | or so, which allows opening one or more files that is "persistent" across |
d486b26f LP |
1157 | service restarts, hot reboot, cold reboots (depending on configuration): the |
1158 | files are created empty on first invocation, and on subsequent invocations | |
1159 | the files are reboot. The files would be backed by tmpfs, pmem or /var | |
1160 | depending on desired level of persistency. | |
1161 | ||
1162 | * sd-event: add ability to "chain" event sources. Specifically, add a call | |
1163 | sd_event_source_chain(x, y), which will automatically enable event source y | |
1c904337 | 1164 | in oneshot mode once x is triggered. Use case: in src/core/mount.c implement |
d486b26f LP |
1165 | the /proc/self/mountinfo rescan on SIGCHLD with this: whenever a SIGCHLD is |
1166 | seen, trigger the rescan defer event source automatically, and allow it to be | |
1167 | dispatched *before* the SIGCHLD is handled (based on priorities). Benefit: | |
1168 | dispatch order is strictly controlled by priorities again. (next step: chain | |
1169 | event sources to the ratelimit being over) | |
1170 | ||
1171 | * if we fork of a service with StandardOutput=journal, and it forks off a | |
1172 | subprocess that quickly dies, we might not be able to identify the cgroup it | |
1173 | comes from, but we can still derive that from the stdin socket its output | |
1174 | came from. We apparently don't do that right now. | |
1175 | ||
d486b26f LP |
1176 | * add ability to set hostname with suffix derived from machine id at boot |
1177 | ||
d486b26f LP |
1178 | * add PR_SET_DUMPABLE service setting |
1179 | ||
027301b4 LP |
1180 | * homed/userdb: maybe define a "companion" dir for home directories where apps |
1181 | can safely put privileged stuff in. Would not be writable by the user, but | |
1182 | still conceptually belong to the user. Would be included in user's quota if | |
7227dd81 | 1183 | possible, even if files are not owned by UID of user. Use case: container |
027301b4 LP |
1184 | images that owned by arbitrary UIDs, and are owned/managed by the users, but |
1185 | are not directly belonging to the user's UID. Goal: we shouldn't place more | |
1186 | privileged dirs inside of unprivileged dirs, and thus containers really | |
1187 | should not be placed inside of traditional UNIX home dirs (which are owned by | |
3881fd40 | 1188 | users themselves) but somewhere else, that is separate, but still close |
027301b4 LP |
1189 | by. Inform user code about path to this companion dir via env var, so that |
1190 | container managers find it. the ~/.identity file is also a candidate for a | |
1191 | file to move there, since it is managed by privileged code (i.e. homed) and | |
1192 | not unprivileged code. | |
1193 | ||
3a466def LP |
1194 | * maybe add support for binding and connecting AF_UNIX sockets in the file |
1195 | system outside of the 108ch limit. When connecting, open O_PATH fd to socket | |
1196 | inode first, then connect to /proc/self/fd/XYZ. When binding, create symlink | |
1197 | to target dir in /tmp, and bind through it. | |
1198 | ||
fd74ed23 LP |
1199 | * add a proper concept of a "developer" mode, i.e. where cryptographic |
1200 | protections of the root OS are weakened after interactive confirmation, to | |
1201 | allow hackers to allow their own stuff. idea: allow entering developer mode | |
1202 | only via explicit choice in boot menu: i.e. add explicit boot menu item for | |
30fd9a2d | 1203 | it. When developer mode is entered, generate a key pair in the TPM2, and add |
fd74ed23 LP |
1204 | the public part of it automatically to keychain of valid code signature keys |
1205 | on subsequent boots. Then provide a tool to sign code with the key in the | |
30fd9a2d DL |
1206 | TPM2. Ensure that boot menu item is the only way to enter developer mode, by |
1207 | binding it to locality/PCRs so that keys cannot be generated otherwise. | |
fd74ed23 LP |
1208 | |
1209 | * services: add support for cryptographically unlocking per-service directories | |
1210 | via TPM2. Specifically, for StateDirectory= (and related dirs) use fscrypt to | |
1211 | set up the directory so that it can only be accessed if host and app are in | |
1212 | order. | |
1213 | ||
98045d12 LP |
1214 | * update HACKING.md to suggest developing systemd with the ideas from: |
1215 | https://0pointer.net/blog/testing-my-system-code-in-usr-without-modifying-usr.html | |
1216 | https://0pointer.net/blog/running-an-container-off-the-host-usr.html | |
1217 | ||
8b825133 LP |
1218 | * sd-event: compat wd reuse in inotify code: keep a set of removed watch |
1219 | descriptors, and clear this set piecemeal when we see the IN_IGNORED event | |
1220 | for it, or when read() returns EAGAIN or on IN_Q_OVERFLOW. Then, whenever we | |
1221 | see an inotify wd event check against this set, and if it is contained ignore | |
8ac6b05b | 1222 | the event. (to be fully correct this would have to count the occurrences, in |
8b825133 LP |
1223 | case the same wd is reused multiple times before we start processing |
1224 | IN_IGNORED again) | |
1225 | ||
5b06ad51 | 1226 | * for vendor-built signed initrds: |
a4b329e6 | 1227 | - kernel-install should be able to install encrypted creds automatically for |
62471289 LP |
1228 | machine id, root pw, rootfs uuid, resume partition uuid, and place next to |
1229 | EFI kernel, for sd-stub to pick them up. These creds should be locked to | |
1230 | the TPM, and bind to the right PCR the kernel is measured to. | |
11b957b5 LP |
1231 | - kernel-install should be able to pick up initrd sysexts automatically and |
1232 | place them next to EFI kernel, for sd-stub to pick them up. | |
5b06ad51 | 1233 | - systemd-fstab-generator should look for rootfs device to mount in creds |
62471289 | 1234 | - systemd-resume-generator should look for resume partition uuid in creds |
11b957b5 LP |
1235 | - sd-stub: automatically pick up microcode from ESP (/loader/microcode/*) |
1236 | and synthesize initrd from it, and measure it. Signing is not necessary, as | |
1237 | microcode does that on its own. Pass as first initrd to kernel. | |
5b06ad51 | 1238 | |
6fee7849 LP |
1239 | * Maybe extend the service protocol to support handling of some specific SIGRT |
1240 | signal for setting service log level, that carries the level via the | |
1241 | sigqueue() data parameter. Enable this via unit file setting. | |
2df2bb1f | 1242 | |
03ede612 | 1243 | * sd_notify/vsock: maybe support binding to AF_VSOCK in Type=notify services, |
c0da575a LP |
1244 | then passing $NOTIFY_SOCKET and $NOTIFY_GUESTCID with PID1's cid (typically |
1245 | fixed to "2", i.e. the official host cid) and the expected guest cid, for the | |
3a258d3a | 1246 | two sides of the channel. The latter env var could then be used in an |
c0da575a LP |
1247 | appropriate qemu cmdline. That way qemu payloads could talk sd_notify() |
1248 | directly to host service manager. | |
1249 | ||
2cf120f7 LP |
1250 | * sd-device should return the devnum type (i.e. 'b' or 'c') via some API for an |
1251 | sd_device object, so that data passed into sd_device_new_from_devnum() can | |
1252 | also be queried. | |
1253 | ||
5b89bff5 LP |
1254 | * sd-event: optionally, if per-event source rate limit is hit, downgrade |
1255 | priority, but leave enabled, and once ratelimit window is over, upgrade | |
1256 | priority again. That way we can combat event source starvation without | |
1257 | stopping processing events from one source entirely. | |
1258 | ||
e4f92a62 LP |
1259 | * sd-event: similar to existing inotify support add fanotify support (given |
1260 | that apparently new features in this area are only going to be added to the | |
1261 | latter). | |
5b89bff5 LP |
1262 | |
1263 | * sd-event: add 1st class event source for clock changes | |
1264 | ||
1265 | * sd-event: add 1st class event source for timezone changes | |
1266 | ||
9e83d3e4 LP |
1267 | * support uefi/http boots with sd-boot: instead of looking for dropin files in |
1268 | /loader/entries/ dir, look for a file /loader/entries/SHA256SUMS and use that | |
1269 | as directory manifest. The file would be a standard directory listing as | |
1270 | generated by GNU sha256sums. | |
1271 | ||
47a9f917 LP |
1272 | * sd-boot: maybe add support for embedding the various auxiliary resources we |
1273 | look for right in the sd-boot binary. i.e. take inspiration from sd-stub | |
02c914ef | 1274 | logic: allow combining sd-boot via ukify with kernels to enumerate, .conf |
47a9f917 | 1275 | files, drivers, keys to enroll and so on. Then, add whatever we find that way |
7227dd81 | 1276 | to the menu. Use case: allow building a single PE image you can boot into via |
47a9f917 LP |
1277 | UEFI HTTP boot. |
1278 | ||
1279 | * maybe add a new UEFI stub binary "sd-http". It works similar to sd-stub, but | |
1280 | all it does is download a file from a http server, and execute it, after | |
1281 | optionally checking its hash sum. idea would be: combine this "sd-http" stub | |
5bc9ea07 | 1282 | binary with some minimal info about a URL + hash sum, plus .osrel data, and |
47a9f917 LP |
1283 | drop it into the unified kernel dir in the ESP. And bam you have something |
1284 | that is tiny, feels a lot like a unified kernel, but all it does is chainload | |
1285 | the real kernel. benefit: downloading these stubs would be tiny and quick, | |
1286 | hence cheap for enumeration. | |
1287 | ||
d360eafb LP |
1288 | * sysext: measure all activated sysext into a TPM PCR |
1289 | ||
d360eafb LP |
1290 | * systemd-dissect: show available versions inside of a disk image, i.e. if |
1291 | multiple versions are around of the same resource, show which ones. (in other | |
1292 | words: show partition labels). | |
1293 | ||
f1a147f2 LP |
1294 | * systemd-dissect: add --cat switch for dumping files such as /etc/os-release |
1295 | ||
f5d0f21c LP |
1296 | * per-service sandboxing option: ProtectIds=. If used, will overmount |
1297 | /etc/machine-id and /proc/sys/kernel/random/boot_id with synthetic files, to | |
1298 | make it harder for the service to identify the host. Depending on the user | |
1299 | setting it should be fully randomized at invocation time, or a hash of the | |
1300 | real thing, keyed by the unit name or so. Of course, there are other ways to | |
1301 | get these IDs (e.g. journal) or similar ids (e.g. MAC addresses, DMI ids, CPU | |
1302 | ids), so this knob would only be useful in combination with other lockdown | |
1303 | options. Particularly useful for portable services, and anything else that | |
1304 | uses RootDirectory= or RootImage=. (Might also over-mount | |
1305 | /sys/class/dmi/id/*{uuid,serial} with /dev/null). | |
1306 | ||
a57d72ce LP |
1307 | * doc: prep a document explaining resolved's internal objects, i.e. Query |
1308 | vs. Question vs. Transaction vs. Stream and so on. | |
1309 | ||
a5a316e7 LP |
1310 | * doc: prep a document explaining PID 1's internal logic, i.e. transactions, |
1311 | jobs, units | |
1312 | ||
594f64f4 LP |
1313 | * automatically ignore threaded cgroups in cg_xyz(). |
1314 | ||
e6f48be8 LP |
1315 | * add linker script that implicitly adds symbol for build ID and new coredump |
1316 | json package metadata, and use that when logging | |
1317 | ||
d1666bde | 1318 | * Enable RestrictFileSystems= for all our long-running services (similar: |
f08e143c LP |
1319 | RestrictNetworkInterfaces=) |
1320 | ||
1321 | * Add systemd-analyze security checks for RestrictFileSystems= and | |
1322 | RestrictNetworkInterfaces= | |
1323 | ||
1ccfb792 LP |
1324 | * cryptsetup/homed: implement TOTP authentication backed by TPM2 and its |
1325 | internal clock. | |
1326 | ||
f5ba8115 LP |
1327 | * man: rework os-release(5), and clearly separate our extension-release.d/ and |
1328 | initrd-release parts, i.e. list explicitly which fields are about what. | |
1329 | ||
1330 | * sysext: before applying a sysext, do a superficial validation run so that | |
1331 | things are not rearranged to wildy. I.e. protect against accidental fuckups, | |
1332 | such as masking out /usr/lib/ or so. We should probably refuse if existing | |
1333 | inodes are replaced by other types of inodes or so. | |
1334 | ||
af11e0ef LP |
1335 | * userdb: when synthesizing NSS records, pick "best" password from defined |
1336 | passwords, not just the first. i.e. if there are multiple defined, prefer | |
1337 | unlocked over locked and prefer non-empty over empty. | |
1338 | ||
1c5d03c0 LP |
1339 | * homed: if the homed shell fallback thing has access to an SSH agent, try to |
1340 | use it to unlock home dir (if ssh-agent forwarding is enabled). We | |
af11e0ef LP |
1341 | could implement SSH unlocking of a homedir with that: when enrolling a new |
1342 | ssh pubkey in a user record we'd ask the ssh-agent to sign some random value | |
1343 | with the privkey, then use that as luks key to unlock the home dir. Will not | |
1344 | work for ECDSA keys since their signatures contain a random component, but | |
1345 | will work for RSA and Ed25519 keys. | |
1346 | ||
bb5464ad LP |
1347 | * add tiny service that decrypts encrypted user records passed via initrd |
1348 | credential logic and drops them into /run where nss-systemd can pick them up, | |
7227dd81 | 1349 | similar to /run/host/userdb/. Use case: drop a root user JSON record there, |
bb5464ad | 1350 | and use it in the initrd to log in as root with locally selected password, |
7227dd81 | 1351 | for debugging purposes. Other use case: boot into qemu with regular user |
11b957b5 | 1352 | mounted from host. maybe put this in systemd-user-sessions.service? |
bb5464ad LP |
1353 | |
1354 | * drop dependency on libcap, replace by direct syscalls based on | |
30fd9a2d | 1355 | CapabilityQuintet we already have. (This likely allows us to drop libcap |
bb5464ad LP |
1356 | dep in the base OS image) |
1357 | ||
bb5464ad LP |
1358 | * add concept for "exitrd" as inverse of "initrd", that we can transition to at |
1359 | shutdown, and has similar security semantics. This should then take the place | |
1360 | of dracut's shutdown logic. Should probably support sysexts too. Care needs | |
1361 | to be taken that the resulting logic ends up in RAM, i.e. is copied out of | |
1362 | on-disk storage. | |
1363 | ||
a07ab1dd LP |
1364 | * userdbd: implement an additional varlink service socket that provides the |
1365 | host user db in restricted form, then allow this to be bind mounted into | |
1366 | sandboxed environments that want the host database in minimal form. All | |
1367 | records would be stripped of all meta info, except the basic UID/name | |
1368 | info. Then use this in portabled environments that do not use PrivateUsers=1. | |
1369 | ||
8825e90a LB |
1370 | * portabled: when extracting unit files and copying to system.attached, if a |
1371 | .p7s is available in the image, use it to protect the system.attached copy | |
1372 | with fs-verity, so that it cannot be tampered with | |
1373 | ||
da3ab57c LP |
1374 | * /etc/veritytab: allow that the roothash column can be specified as fs path |
1375 | including a path to an AF_UNIX path, similar to how we do things with the | |
1376 | keys of /etc/crypttab. That way people can store/provide the roothash | |
1377 | externally and provide to us on demand only. | |
1378 | ||
3fc0688d | 1379 | * we probably should extend the root verity hash of the root fs into some PCR |
7dad7811 LP |
1380 | on boot. (i.e. maybe add a veritytab option tpm2-measure=12 or so to measure |
1381 | it into PCR 12); Similar: we probably should extend the LUKS volume key of | |
1382 | the root fs into some PCR on boot. (i.e. maybe add a crypttab option | |
1383 | tpm2-measure=15 or so to measure it into PCR 15); once both are in place | |
1384 | update gpt-auto-discovery to generate these by default for the partitions it | |
1385 | discovers. Static vendor stuff should probably end up in PCR 12 (i.e. the | |
1386 | verity hash), with local keys in PCR 15 (i.e. the encryption volume | |
1387 | key). That way, we nicely distinguish resources supplied by the OS vendor | |
1388 | (i.e. sysext, root verity) from those inherently local (i.e. encryption key), | |
1389 | which is useful if they shall be signed separately. | |
3fc0688d | 1390 | |
c0a74f62 LP |
1391 | * in uefi stub: query firmware regarding which PCR banks are being used, store |
1392 | that in EFI var. then use this when enrolling TPM2 in cryptsetup to verify | |
1393 | that the selected PCRs actually are used by firmware. | |
f4529c4d | 1394 | |
322b3b38 LP |
1395 | * rework recursive read-only remount to use new mount API |
1396 | ||
63a185dc | 1397 | * PAM: pick up authentication token from credentials |
9a6549f6 | 1398 | |
9a6549f6 LP |
1399 | * when mounting disk images: if IMAGE_ID/IMAGE_VERSION is set in os-release |
1400 | data in the image, make sure the image filename actually matches this, so | |
1401 | that images cannot be misused. | |
1402 | ||
aca8ecc3 | 1403 | * New udev block device symlink names: |
178d3ff2 | 1404 | /dev/disk/by-parttypelabel/<pttype>-<ptlabel>. Use case: if pt label is used |
aca8ecc3 LP |
1405 | as partition image version string, this is a safe way to reference a specific |
1406 | version of a specific partition type, in particular where related partitions | |
1407 | are processed (e.g. verity + rootfs both named "LennartOS_0.7"). | |
1408 | ||
178d3ff2 LP |
1409 | * sysupdate: |
1410 | - add fuzzing to the pattern parser | |
1411 | - support casync as download mechanism | |
178d3ff2 LP |
1412 | - "systemd-sysupdate update --all" support, that iterates through all components |
1413 | defined on the host, plus all images installed into /var/lib/machines/, | |
1414 | /var/lib/portable/ and so on. | |
1415 | - figure out what to do about system extensions (i.e. they need to imply an | |
b3e199ce DV |
1416 | update component, since otherwise sysupdate.d/ files would override the |
1417 | host's update files.) | |
178d3ff2 LP |
1418 | - Allow invocation with a single transfer definition, i.e. with |
1419 | --definitions= pointing to a file rather than a dir. | |
1420 | - add ability to disable implicit decompression of downloaded artifacts, | |
1421 | i.e. a Compress=no option in the transfer definitions | |
1422 | ||
cf2ab2e7 LP |
1423 | * in sd-id128: also parse UUIDs in RFC4122 URN syntax (i.e. chop off urn:uuid: prefix) |
1424 | ||
31892e8d LP |
1425 | * DynamicUser= + StateDirectory= → use uid mapping mounts, too, in order to |
1426 | make dirs appear under right UID. | |
1427 | ||
f3e58b55 LP |
1428 | * systemd-sysext: optionally, run it in initrd already, before transitioning |
1429 | into host, to open up possibility for services shipped like that. | |
1430 | ||
24063ba1 | 1431 | * introduce /dev/disk/root/* symlinks that allow referencing partitions on the |
f3e58b55 LP |
1432 | disk the rootfs is on in a reasonably secure way. (or maybe: add |
1433 | /dev/gpt-auto-{home,srv,boot,…} similar in style to /dev/gpt-auto-root as we | |
1434 | already have it. | |
24063ba1 | 1435 | |
7ed72cfa LP |
1436 | * whenever we receive fds via SCM_RIGHTS make sure none got dropped due to the |
1437 | reception limit the kernel silently enforces. | |
1438 | ||
1c904337 | 1439 | * Add service unit setting ConnectStream= which takes IP addresses and connects to them. |
256cfb71 LP |
1440 | |
1441 | * Similar, Load= which takes literal data in text or base64 format, and puts it | |
1442 | into a memfd, and passes that. This enables some fun stuff, such as embedding | |
1443 | bash scripts in unit files, by combining Load= with ExecStart=/bin/bash | |
1444 | /proc/self/fd/3 | |
1445 | ||
66e52d22 LP |
1446 | * add a ConnectSocket= setting to service unit files, that may reference a |
1447 | socket unit, and which will connect to the socket defined therein, and pass | |
1448 | the resulting fd to the service program via socket activation proto. | |
1449 | ||
1450 | * Add a concept of ListenStream=anonymous to socket units: listen on a socket | |
7227dd81 | 1451 | that is deleted in the fs. Use case would be with ConnectSocket= above. |
66e52d22 | 1452 | |
14f7d087 LP |
1453 | * importd: support image signature verification with PKCS#7 + OpenBSD signify |
1454 | logic, as alternative to crummy gpg | |
1455 | ||
9786ba13 LP |
1456 | * add "systemd-analyze debug" + AttachDebugger= in unit files: The former |
1457 | specifies a command to execute; the latter specifies that an already running | |
1458 | "systemd-analyze debug" instance shall be contacted and execution paused | |
1459 | until it gives an OK. That way, tools like gdb or strace can be safely be | |
1460 | invoked on processes forked off PID 1. | |
1461 | ||
38abd1bf LP |
1462 | * expose MS_NOSYMFOLLOW in various places |
1463 | ||
199b097d | 1464 | * credentials system: |
199b097d | 1465 | - acquire from EFI variable? |
30fd9a2d | 1466 | - acquire via ask-password? |
199b097d LP |
1467 | - acquire creds via keyring? |
1468 | - pass creds via keyring? | |
1469 | - pass creds via memfd? | |
1470 | - acquire + decrypt creds from pkcs11? | |
199b097d | 1471 | - make PAMName= acquire pw via creds logic |
bf543ba6 LP |
1472 | - make macsec code in networkd read key via creds logic (copy logic from |
1473 | wireguard) | |
1474 | - make gatewayd/remote read key via creds logic | |
199b097d LP |
1475 | - add sd_notify() command for flushing out creds not needed anymore |
1476 | ||
07eabc2b LB |
1477 | * TPM2: auto-reenroll in cryptsetup, as fallback for hosed firmware upgrades |
1478 | and such | |
1479 | ||
1480 | * introduce a new group to own TPM devices | |
80670e74 | 1481 | |
02c914ef | 1482 | * cryptsetup: add option for automatically removing empty password slot on boot |
80670e74 | 1483 | |
7d7c75f1 | 1484 | * cryptsetup: optionally, when run during boot-up and password is never |
80670e74 LP |
1485 | entered, and we are on battery power (or so), power off machine again |
1486 | ||
80670e74 LP |
1487 | * cryptsetup: when waiting for FIDO2/PKCS#11 token, tell plymouth that, and |
1488 | allow plymouth to abort the waiting and enter pw instead | |
7d7c75f1 | 1489 | |
07eabc2b LB |
1490 | * make cryptsetup lower --iter-time |
1491 | ||
1492 | * cryptsetup: allow encoding key directly in /etc/crypttab, maybe with a | |
1493 | "base64:" prefix. Useful in particular for pkcs11 mode. | |
1494 | ||
1495 | * cryptsetup: reimplement the mkswap/mke2fs in cryptsetup-generator to use | |
1496 | systemd-makefs.service instead. | |
1497 | ||
1498 | * cryptsetup: | |
1499 | - cryptsetup-generator: allow specification of passwords in crypttab itself | |
1500 | - support rd.luks.allow-discards= kernel cmdline params in cryptsetup generator | |
1501 | ||
08d33656 | 1502 | * systemd-analyze netif that explains predictable interface (or networkctl) |
d775d8e6 | 1503 | |
9a2b54d9 ZJS |
1504 | * systemd-analyze inspect-elf should show other notes too, at least build-id. |
1505 | ||
aa747c00 ZJS |
1506 | * Figure out naming of verbs in systemd-analyze: we have (singular) capability, |
1507 | exit-status, but (plural) filesystems, architectures. | |
1508 | ||
816d460a LP |
1509 | * Add service setting to run a service within the specified VRF. i.e. do the |
1510 | equivalent of "ip vrf exec". | |
1511 | ||
f461a28d | 1512 | * special case some calls of chase() to use openat2() internally, so |
e59d030f LP |
1513 | that the kernel does what we otherwise do. |
1514 | ||
f461a28d | 1515 | * add a new flag to chase() that stops chasing once the first missing |
6dbfbc46 LB |
1516 | component is found and then allows the caller to create the rest. |
1517 | ||
fc733bed LP |
1518 | * make use of new glibc 2.32 APIs sigabbrev_np() and strerrorname_np(). |
1519 | ||
effefa30 LP |
1520 | * if /usr/bin/swapoff fails due to OOM, log a friendly explanatory message about it |
1521 | ||
7cc8fb3e LP |
1522 | * pid1: also remove PID files of a service when the service starts, not just |
1523 | when it exits | |
1524 | ||
cdfd8537 LP |
1525 | * make us use dynamically fewer deps for containers in general purpose distros: |
1526 | o turn into dlopen() deps: | |
a52dc0b6 | 1527 | - libblkid (only in RootImage= handling in PID 1, but not elsewhere) |
cdfd8537 | 1528 | - libpam (only when called from PID 1) |
cdfd8537 | 1529 | |
77169ed0 LP |
1530 | * seccomp: maybe use seccomp_merge() to merge our filters per-arch if we can. |
1531 | Apparently kernel performance is much better with fewer larger seccomp | |
1532 | filters than with more smaller seccomp filters. | |
1533 | ||
00244c49 LP |
1534 | * systemd-path: Add "private" runtime/state/cache dir enum, mapping to |
1535 | $RUNTIME_DIRECTORY, $STATE_DIRECTORY and such | |
bfafec25 | 1536 | |
112bed84 LP |
1537 | * seccomp: by default mask x32 ABI system wide on x86-64. it's on its way out |
1538 | ||
1539 | * seccomp: don't install filters for ABIs that are masked anyway for the | |
1540 | specific service | |
1541 | ||
cbe952fe LP |
1542 | * busctl: maybe expose a verb "ping" for pinging a dbus service to see if it |
1543 | exists and responds. | |
1544 | ||
91fc013f | 1545 | * socket units: allow creating a udev monitor socket with ListenDevices= or so, |
86b52a39 | 1546 | with matches, then activate app through that passing socket over |
91fc013f | 1547 | |
7e8facb3 | 1548 | * unify on openssl: |
070f7370 LB |
1549 | - kill gnutls support in resolved |
1550 | - figure out what to do about libmicrohttpd, which has a hard dependency on | |
1551 | gnutls | |
1552 | - port fsprg over to a dlopen lib, then switch it to openssl | |
492f91d8 | 1553 | |
492f91d8 LP |
1554 | * add growvol and makevol options for /etc/crypttab, similar to |
1555 | x-systemd.growfs and x-systemd-makefs. | |
1556 | ||
77b19caf LP |
1557 | * userdb: allow username prefix searches in varlink API, allow realname and |
1558 | realname substr searches in varlink API | |
006c44c1 | 1559 | |
76410e98 LP |
1560 | * userdb: allow uid/gid range checks |
1561 | ||
2a4be3c5 | 1562 | * userdb: allow existence checks |
006c44c1 | 1563 | |
f1eb0ccd | 1564 | * pid1: activation by journal search expression |
006c44c1 | 1565 | |
492f91d8 LP |
1566 | * when switching root from initrd to host, set the machine_id env var so that |
1567 | if the host has no machine ID set yet we continue to use the random one the | |
1568 | initrd had set. | |
1569 | ||
173c7873 | 1570 | * sd-event: add native support for P_ALL waitid() watching, then move PID 1 to |
84a1ff94 | 1571 | it for reaping assigned but unknown children. This needs to some special care |
173c7873 LP |
1572 | to operate somewhat sensibly in light of priorities: P_ALL will return |
1573 | arbitrary processes, regardless of the priority we want to watch them with, | |
1574 | hence on each event loop iteration check all processes which we shall watch | |
1575 | with higher prio explicitly, and then watch the entire rest with P_ALL. | |
1576 | ||
1577 | * tweak sd-event's child watching: keep a prioq of children to watch and use | |
1578 | waitid() only on the children with the highest priority until one is waitable | |
1579 | and ignore all lower-prio ones from that point on | |
1580 | ||
173c7873 LP |
1581 | * maybe introduce xattrs that can be set on the root dir of the root fs |
1582 | partition that declare the volatility mode to use the image in. Previously I | |
1583 | thought marking this via GPT partition flags but that's not ideal since | |
1584 | that's outside of the LUKS encryption/verity verification, and we probably | |
1585 | shouldn't operate in a volatile mode unless we got told so from a trusted | |
1586 | source. | |
1587 | ||
97e5cc88 LP |
1588 | * coredump: maybe when coredumping read a new xattr from /proc/$PID/exe that |
1589 | may be used to mark a whole binary as non-coredumpable. Would fix: | |
1590 | https://bugs.freedesktop.org/show_bug.cgi?id=69447 | |
1591 | ||
f3e361c1 LP |
1592 | * teach parse_timestamp() timezones like the calendar spec already knows it |
1593 | ||
6fe23ff3 LB |
1594 | * We should probably replace /etc/rc.d/README with a symlink to doc |
1595 | content. After all it is constant vendor data. | |
9c230b8f | 1596 | |
c6526b8d | 1597 | * maybe add kernel cmdline params: to force random seed crediting |
312dc153 | 1598 | |
ac5dca64 LP |
1599 | * introduce a new per-process uuid, similar to the boot id, the machine id, the |
1600 | invocation id, that is derived from process creds, specifically a hashed | |
1601 | combination of AT_RANDOM + getpid() + the starttime from | |
1602 | /proc/self/status. Then add these ids implicitly when logging. Deriving this | |
1603 | uuid from these three things has the benefit that it can be derived easily | |
1604 | from /proc/$PID/ in a stable, and unique way that changes on both fork() and | |
1605 | exec(). | |
1606 | ||
1607 | * let's not GC a unit while its ratelimits are still pending | |
1608 | ||
5daeeecf LP |
1609 | * when killing due to service watchdog timeout maybe detect whether target |
1610 | process is under ptracing and then log loudly and continue instead. | |
1611 | ||
5802d977 LP |
1612 | * make rfkill uaccess controllable by default, i.e. steal rule from |
1613 | gnome-bluetooth and friends | |
1614 | ||
03ccc7f0 LP |
1615 | * make MAINPID= message reception checks even stricter: if service uses User=, |
1616 | then check sending UID and ignore message if it doesn't match the user or | |
1617 | root. | |
1618 | ||
1619 | * maybe trigger a uevent "change" on a device if "systemctl reload xyz.device" | |
1620 | is issued. | |
1621 | ||
db3cea22 LP |
1622 | * when importing an fs tree with machined, optionally apply userns-rec-chown |
1623 | ||
1624 | * when importing an fs tree with machined, complain if image is not an OS | |
1625 | ||
707b3fbd LP |
1626 | * Maybe introduce a helper safe_exec() or so, which is to execve() which |
1627 | safe_fork() is to fork(). And then make revert the RLIMIT_NOFILE soft limit | |
1628 | to 1K implicitly, unless explicitly opted-out. | |
d7b659ef | 1629 | |
d238709c | 1630 | * rework seccomp/nnp logic that even if User= is used in combination with |
d96c081a LP |
1631 | a seccomp option we don't have to set NNP. For that, change uid first whil |
1632 | keeping CAP_SYS_ADMIN, then apply seccomp, the drop cap. | |
1633 | ||
8a7cf157 LP |
1634 | * when no locale is configured, default to UEFI's PlatformLang variable |
1635 | ||
d96c081a LP |
1636 | * add a new syscall group "@esoteric" for more esoteric stuff such as bpf() and |
1637 | usefaultd() and make systemd-analyze check for it. | |
1638 | ||
06898123 | 1639 | * paranoia: whenever we process passwords, call mlock() on the memory |
309c6b19 | 1640 | first. i.e. look for all places we use free_and_erasep() and |
9ae4ef49 | 1641 | augment them with mlock(). Also use MADV_DONTDUMP. |
8b213bf1 | 1642 | Alternatively (preferably?) use memfd_secret(). |
06898123 | 1643 | |
32875617 LP |
1644 | * Move RestrictAddressFamily= to the new cgroup create socket |
1645 | ||
06898123 LP |
1646 | * optionally: turn on cgroup delegation for per-session scope units |
1647 | ||
42e18088 LP |
1648 | * sd-boot: optionally, show boot menu when previous default boot item has |
1649 | non-zero "tries done" count | |
1650 | ||
8f2eb730 LP |
1651 | * augment CODE_FILE=, CODE_LINE= with something like CODE_BASE= or so which |
1652 | contains some identifier for the project, which allows us to include | |
1653 | clickable links to source files generating these log messages. The identifier | |
1654 | could be some abberviated URL prefix or so (taking inspiration from Go | |
1655 | imports). For example, for systemd we could use | |
1656 | CODE_BASE=github.com/systemd/systemd/blob/98b0b1123cc or so which is | |
1657 | sufficient to build a link by prefixing "http://" and suffixing the | |
1658 | CODE_FILE. | |
1659 | ||
8f2eb730 LP |
1660 | * Augment MESSAGE_ID with MESSAGE_BASE, in a similar fashion so that we can |
1661 | make clickable links from log messages carrying a MESSAGE_ID, that lead to | |
1662 | some explanatory text online. | |
1663 | ||
7bd4bcf7 LP |
1664 | * maybe extend .path units to expose fanotify() per-mount change events |
1665 | ||
d1797c42 | 1666 | * hibernate/s2h: if swap is on weird storage and refuse if so |
c633b0a6 | 1667 | |
070d0ac9 LP |
1668 | * cgroups: use inotify to get notified when somebody else modifies cgroups |
1669 | owned by us, then log a friendly warning. | |
1670 | ||
e44924f5 LP |
1671 | * beef up log.c with support for stripping ANSI sequences from strings, so that |
1672 | it is OK to include them in log strings. This would be particularly useful so | |
1673 | that our log messages could contain clickable links for example for unit | |
1674 | files and suchlike we operate on. | |
070d0ac9 | 1675 | |
8c4c2dfc LP |
1676 | * add support for "portablectl attach http://foobar.com/waaa.raw (i.e. importd integration) |
1677 | ||
8c4c2dfc LP |
1678 | * sync dynamic uids/gids between host+portable srvice (i.e. if DynamicUser=1 is set for a service, make sure that the |
1679 | selected user is resolvable in the service even if it ships its own /etc/passwd) | |
1680 | ||
5da19043 | 1681 | * Fix DECIMAL_STR_MAX or DECIMAL_STR_WIDTH. One includes a trailing NUL, the |
63a185dc | 1682 | other doesn't. What a disaster. Probably to exclude it. |
5da19043 | 1683 | |
16270697 LP |
1684 | * Check that users of inotify's IN_DELETE_SELF flag are using it properly, as |
1685 | usually IN_ATTRIB is the right way to watch deleted files, as the former only | |
1686 | fires when a file is actually removed from disk, i.e. the link count drops to | |
1687 | zero and is not open anymore, while the latter happens when a file is | |
1688 | unlinked from any dir. | |
1689 | ||
dd411431 LP |
1690 | * systemctl, machinectl, loginctl: port "status" commands over to |
1691 | format-table.c's vertical output logic. | |
5da19043 | 1692 | |
7bc756ff LP |
1693 | * pid1: lock image configured with RootDirectory=/RootImage= using the usual nspawn semantics while the unit is up |
1694 | ||
1695 | * add --vacuum-xyz options to coredumpctl, matching those journalctl already has. | |
1696 | ||
53c70a27 | 1697 | * add CopyFile= or so as unit file setting that may be used to copy files or |
5238e957 | 1698 | directory trees from the host to the services RootImage= and RootDirectory= |
53c70a27 LP |
1699 | environment. Which we can use for /etc/machine-id and in particular |
1700 | /etc/resolv.conf. Should be smart and do something useful on read-only | |
2aed63f4 | 1701 | images, for example fall back to read-only bind mounting the file instead. |
53c70a27 | 1702 | |
d9b50610 LP |
1703 | * bypass SIGTERM state in unit files if KillSignal is SIGKILL |
1704 | ||
9711b1ad LP |
1705 | * add proper dbus APIs for the various sd_notify() commands, such as MAINPID=1 |
1706 | and so on, which would mean we could report errors and such. | |
1707 | ||
6b7b0f39 LP |
1708 | * introduce DefaultSlice= or so in system.conf that allows changing where we |
1709 | place our units by default, i.e. change system.slice to something | |
1710 | else. Similar, ManagerSlice= should exist so that PID1's own scope unit could | |
1711 | be moved somewhere else too. Finally machined and logind should get similar | |
1712 | options so that it is possible to move user session scopes and machines to a | |
7227dd81 | 1713 | different slice too by default. Use case: people who want to put resources on |
6b7b0f39 LP |
1714 | the entire system, with the exception of one specific service. See: |
1715 | https://lists.freedesktop.org/archives/systemd-devel/2018-February/040369.html | |
1716 | ||
46099c9e LP |
1717 | * calenderspec: add support for week numbers and day numbers within a |
1718 | year. This would allow us to define "bi-weekly" triggers safely. | |
1719 | ||
c3cd7cc9 LP |
1720 | * sd-bus: add vtable flag, that may be used to request client creds implicitly |
1721 | and asynchronously before dispatching the operation | |
1722 | ||
d0e5db44 ZJS |
1723 | * sd-bus: parse addresses given in sd_bus_set_addresses immediately and not |
1724 | only when used. Add unit tests. | |
1725 | ||
06345858 LP |
1726 | * make use of ethtool veth peer info in machined, for automatically finding out |
1727 | host-side interface pointing to the container. | |
1728 | ||
48f1b5e5 LP |
1729 | * add some special mode to LogsDirectory=/StateDirectory=… that allows |
1730 | declaring these directories without necessarily pulling in deps for them, or | |
1731 | creating them when starting up. That way, we could declare that | |
1732 | systemd-journald writes to /var/log/journal, which could be useful when we | |
1733 | doing disk usage calculations and so on. | |
1734 | ||
899feb72 | 1735 | * deprecate RootDirectoryStartOnly= in favour of a new ExecStart= prefix char |
c6009ff0 | 1736 | |
5f7ecd61 | 1737 | * support projid-based quota in machinectl for containers |
5962e9db | 1738 | |
17b6f896 LP |
1739 | * add a way to lock down cgroup migration: a boolean, which when set for a unit |
1740 | makes sure the processes in it can never migrate out of it | |
1741 | ||
17b6f896 LP |
1742 | * blog about fd store and restartable services |
1743 | ||
1744 | * document Environment=SYSTEMD_LOG_LEVEL=debug drop-in in debugging document | |
1745 | ||
370f9c21 LP |
1746 | * rework ExecOutput and ExecInput enums so that EXEC_OUTPUT_NULL loses its |
1747 | magic meaning and is no longer upgraded to something else if set explicitly. | |
1748 | ||
17b6f896 LP |
1749 | * in the long run: permit a system with /etc/machine-id linked to /dev/null, to |
1750 | make it lose its identity, i.e. be anonymous. For this we'd have to patch | |
1751 | through the whole tree to make all code deal with the case where no machine | |
1752 | ID is available. | |
1753 | ||
1754 | * optionally, collect cgroup resource data, and store it in per-unit RRD files, | |
1755 | suitable for processing with rrdtool. Add bus API to access this data, and | |
1756 | possibly implement a CPULoad property based on it. | |
1757 | ||
e7e4a258 LP |
1758 | * beef up pam_systemd to take unit file settings such as cgroups properties as |
1759 | parameters | |
1760 | ||
63a185dc | 1761 | * maybe hook up xfs/ext4 quotactl() with services? i.e. automatically manage |
d51c4fca | 1762 | the quota of the user indicated in User= via unit file settings, like the |
5962e9db LP |
1763 | other resource management concepts. Would mix nicely with DynamicUser=1. Or |
1764 | alternatively, do this with projids, so that we can also cover services | |
1765 | running as root. Quota should probably cover all the special dirs such as | |
1766 | StateDirectory=, LogsDirectory=, CacheDirectory=, as well as RootDirectory= if it | |
1767 | is set, plus the whole disk space any image configured with RootImage=. | |
6fc373ee | 1768 | |
9a92a97a LP |
1769 | * In DynamicUser= mode: before selecting a UID, use disk quota APIs on relevant |
1770 | disks to see if the UID is already in use. | |
1771 | ||
d73b607d LP |
1772 | * Add AddUser= setting to unit files, similar to DynamicUser=1 which however |
1773 | creates a static, persistent user rather than a dynamic, transient user. We | |
1774 | can leverage code from sysusers.d for this. | |
1775 | ||
fd63f36c LP |
1776 | * add some optional flag to ReadWritePaths= and friends, that has the effect |
1777 | that we create the dir in question when the service is started. Example: | |
1778 | ||
1779 | ReadWritePaths=:/var/lib/foobar | |
1780 | ||
f59d1da8 LP |
1781 | * Add ExecMonitor= setting. May be used multiple times. Forks off a process in |
1782 | the service cgroup, which is supposed to monitor the service, and when it | |
1783 | exits the service is considered failed by its monitor. | |
1784 | ||
33bac67b LP |
1785 | * track the per-service PAM process properly (i.e. as an additional control |
1786 | process), so that it may be queried on the bus and everything. | |
1787 | ||
1788 | * add a new "debug" job mode, that is propagated to unit_start() and for | |
1789 | services results in two things: we raise SIGSTOP right before invoking | |
1790 | execve() and turn off watchdog support. Then, use that to implement | |
1791 | "systemd-gdb" for attaching to the start-up of any system service in its | |
1792 | natural habitat. | |
1793 | ||
d1666bde LP |
1794 | * gpt-auto logic: support encrypted swap, add kernel cmdline option to force |
1795 | it, and honour a gpt bit about it, plus maybe a configuration file | |
8eb7383b | 1796 | |
b5bdbcd5 LP |
1797 | * add a percentage syntax for TimeoutStopSec=, e.g. TimeoutStopSec=150%, and |
1798 | then use that for the setting used in user@.service. It should be understood | |
1799 | relative to the configured default value. | |
1800 | ||
d21494ea LP |
1801 | * enable LockMLOCK to take a percentage value relative to physical memory |
1802 | ||
04397464 | 1803 | * Permit masking specific netlink APIs with RestrictAddressFamily= |
d82047be | 1804 | |
d82047be LP |
1805 | * define gpt header bits to select volatility mode |
1806 | ||
42d61ded LP |
1807 | * ProtectClock= (drops CAP_SYS_TIMES, adds seecomp filters for settimeofday, adjtimex), sets DeviceAllow o /dev/rtc |
1808 | ||
04397464 | 1809 | * ProtectTracing= (drops CAP_SYS_PTRACE, blocks ptrace syscall, makes /sys/kernel/tracing go away) |
42d61ded | 1810 | |
04397464 | 1811 | * ProtectMount= (drop mount/umount/pivot_root from seccomp, disallow fuse via DeviceAllow, imply Mountflags=slave) |
563a69f4 | 1812 | |
04397464 | 1813 | * ProtectKeyRing= to take keyring calls away |
2c5f2958 | 1814 | |
8ce9b83a | 1815 | * RemoveKeyRing= to remove all keyring entries of the specified user |
a46eac1b LP |
1816 | |
1817 | * ProtectReboot= that masks reboot() and kexec_load() syscalls, prohibits kill | |
1818 | on PID 1 with the relevant signals, and makes relevant files in /sys and | |
1819 | /proc (such as the sysrq stuff) unavailable | |
1820 | ||
88511a37 LB |
1821 | * Support ReadWritePaths/ReadOnlyPaths/InaccessiblePaths in systemd --user instances |
1822 | via the new unprivileged Landlock LSM (https://landlock.io) | |
1823 | ||
e40a326c | 1824 | * make sure the ratelimit object can deal with USEC_INFINITY as way to turn off things |
89f193fa | 1825 | |
8ce9b83a LP |
1826 | * in nss-systemd, if we run inside of RootDirectory= with PrivateUsers= set, |
1827 | find a way to map the User=/Group= of the service to the right name. This way | |
1828 | a user/group for a service only has to exist on the host for the right | |
1829 | mapping to work. | |
1830 | ||
2c5f2958 LP |
1831 | * add bus API for creating unit files in /etc, reusing the code for transient units |
1832 | ||
1833 | * add bus API to remove unit files from /etc | |
1834 | ||
1835 | * add bus API to retrieve current unit file contents (i.e. implement "systemctl cat" on the bus only) | |
1836 | ||
b8c7afdf LP |
1837 | * rework fopen_temporary() to make use of open_tmpfile_linkable() (problem: the |
1838 | kernel doesn't support linkat() that replaces existing files, currently) | |
1839 | ||
1e555cb5 LP |
1840 | * transient units: don't bother with actually setting unit properties, we |
1841 | reload the unit file anyway | |
1842 | ||
c8048350 LP |
1843 | * optionally, also require WATCHDOG=1 notifications during service start-up and shutdown |
1844 | ||
3d39e6e5 LP |
1845 | * cache sd_event_now() result from before the first iteration... |
1846 | ||
bd098bce LP |
1847 | * PID1: find a way how we can reload unit file configuration for |
1848 | specific units only, without reloading the whole of systemd | |
1849 | ||
f9bf1b8f | 1850 | * add an explicit parser for LimitRTPRIO= that verifies |
de7399eb | 1851 | the specified range and generates sane error messages for incorrect |
f9bf1b8f | 1852 | specifications. |
de7399eb | 1853 | |
3efc8c72 LP |
1854 | * when we detect that there are waiting jobs but no running jobs, do something |
1855 | ||
e6a26d8c LP |
1856 | * PID 1 should send out sd_notify("WATCHDOG=1") messages (for usage in the --user mode, and when run via nspawn) |
1857 | ||
a2088fd0 | 1858 | * there's probably something wrong with having user mounts below /sys, |
5238e957 | 1859 | as we have for debugfs. for example, src/core/mount.c handles mounts |
a2088fd0 | 1860 | prefixed with /sys generally special. |
41d6f3bf | 1861 | https://lists.freedesktop.org/archives/systemd-devel/2015-June/032962.html |
a2088fd0 | 1862 | |
8aa20381 LP |
1863 | * fstab-generator: default to tmpfs-as-root if only usr= is specified on the kernel cmdline |
1864 | ||
a65b8648 | 1865 | * docs: bring https://systemd.io/MY_SERVICE_CANT_GET_REALTIME up to date |
b18d23d7 | 1866 | |
60d17b74 LP |
1867 | * add a job mode that will fail if a transaction would mean stopping |
1868 | running units. Use this in timedated to manage the NTP service | |
1869 | state. | |
41d6f3bf | 1870 | https://lists.freedesktop.org/archives/systemd-devel/2015-April/030229.html |
60d17b74 | 1871 | |
477e75ef LP |
1872 | * The udev blkid built-in should expose a property that reflects |
1873 | whether media was sensed in USB CF/SD card readers. This should then | |
1874 | be used to control SYSTEMD_READY=1/0 so that USB card readers aren't | |
1875 | picked up by systemd unless they contain a medium. This would mirror | |
1876 | the behaviour we already have for CD drives. | |
1877 | ||
c3a0d00d LP |
1878 | * hostnamectl: show root image uuid |
1879 | ||
d2f81fb0 | 1880 | * Find a solution for SMACK capabilities stuff: |
41d6f3bf | 1881 | https://lists.freedesktop.org/archives/systemd-devel/2014-December/026188.html |
98cd2651 | 1882 | |
0a86c1a9 | 1883 | * synchronize console access with BSD locks: |
41d6f3bf | 1884 | https://lists.freedesktop.org/archives/systemd-devel/2014-October/024582.html |
0a86c1a9 | 1885 | |
e031c227 | 1886 | * as soon as we have sender timestamps, revisit coalescing multiple parallel daemon reloads: |
41d6f3bf | 1887 | https://lists.freedesktop.org/archives/systemd-devel/2014-December/025862.html |
0a86c1a9 | 1888 | |
8514b677 LP |
1889 | * figure out when we can use the coarse timers |
1890 | ||
8483d73f LP |
1891 | * maybe allow timer units with an empty Units= setting, so that they |
1892 | can be used for resuming the system but nothing else. | |
1893 | ||
25e773ee | 1894 | * what to do about udev db binary stability for apps? (raw access is not an option) |
b857e042 | 1895 | |
720652b3 | 1896 | * exponential backoff in timesyncd when we cannot reach a server |
42aeb14a | 1897 | |
720652b3 | 1898 | * timesyncd: add ugly bus calls to set NTP servers per-interface, for usage by NM |
e25b5a8d | 1899 | |
6bd7941e TG |
1900 | * add systemd.abort_on_kill or some other such flag to send SIGABRT instead of SIGKILL |
1901 | (throughout the codebase, not only PID1) | |
1902 | ||
07eabc2b LB |
1903 | * drop nss-myhostname in favour of nss-resolve? |
1904 | ||
9d6db739 | 1905 | * resolved: |
9d6db739 | 1906 | - mDNS/DNS-SD |
ccc3e8a1 LP |
1907 | - service registration |
1908 | - service/domain/types browsing | |
0f47ed0a | 1909 | - avahi compat |
9d6db739 | 1910 | - DNS-SD service registration from socket units |
e25b5a8d DH |
1911 | - resolved should optionally register additional per-interface LLMNR |
1912 | names, so that for the container case we can establish the same name | |
1913 | (maybe "host") for referencing the server, everywhere. | |
720652b3 | 1914 | - allow clients to request DNSSEC for a single lookup even if DNSSEC is off (?) |
3efb871a | 1915 | - hook up resolved with machined-based address resolution |
3f77a1b1 | 1916 | |
e25b5a8d | 1917 | * refcounting in sd-resolve is borked |
e2a69298 | 1918 | |
a940778f LP |
1919 | * add new gpt type for btrfs volumes |
1920 | ||
3de03738 LP |
1921 | * generator that automatically discovers btrfs subvolumes, identifies their purpose based on some xattr on them. |
1922 | ||
37efac5d LP |
1923 | * a way for container managers to turn off getty starting via $container_headless= or so... |
1924 | ||
7348b3ad LP |
1925 | * figure out a nice way how we can let the admin know what child/sibling unit causes cgroup membership for a specific unit |
1926 | ||
81429136 KS |
1927 | * For timer units: add some mechanisms so that timer units that trigger immediately on boot do not have the services |
1928 | they run added to the initial transaction and thus confuse Type=idle. | |
e107ed18 | 1929 | |
edb2935c LP |
1930 | * add bus api to query unit file's X fields. |
1931 | ||
6a3f892a | 1932 | * gpt-auto-generator: |
2a781fc9 | 1933 | - Define new partition type for encrypted swap? Support probed LUKS for encrypted swap? |
6a3f892a | 1934 | - Make /home automount rather than mount? |
6a3f892a | 1935 | |
65026403 LP |
1936 | * add generator that pulls in systemd-network from containers when |
1937 | CAP_NET_ADMIN is set, more than the loopback device is defined, even | |
1938 | when it is otherwise off | |
f8901862 | 1939 | |
f9bf1b8f | 1940 | * MessageQueueMessageSize= (and suchlike) should use parse_iec_size(). |
eda8f067 | 1941 | |
af1082b0 LP |
1942 | * implement Distribute= in socket units to allow running multiple |
1943 | service instances processing the listening socket, and open this up | |
1944 | for ReusePort= | |
1945 | ||
f38afcd0 | 1946 | * cgroups: |
f38afcd0 | 1947 | - implement per-slice CPUFairScheduling=1 switch |
f38afcd0 LP |
1948 | - introduce high-level settings for RT budget, swappiness |
1949 | - how to reset dynamically changed unit cgroup attributes sanely? | |
1950 | - when reloading configuration, apply new cgroup configuration | |
1951 | - when recursively showing the cgroup hierarchy, optionally also show | |
1952 | the hierarchies of child processes | |
97046f2f LP |
1953 | - add settings for cgroup.max.descendants and cgroup.max.depth, |
1954 | maybe use them for user@.service | |
0bee65f0 | 1955 | |
f38afcd0 | 1956 | * transient units: |
f38afcd0 | 1957 | - add field to transient units that indicate whether systemd or somebody else saves/restores its settings, for integration with libvirt |
ebcf1f97 | 1958 | |
718db961 LP |
1959 | * libsystemd-journal, libsystemd-login, libudev: add calls to easily attach these objects to sd-event event loops |
1960 | ||
966204e0 LP |
1961 | * be more careful what we export on the bus as (usec_t) 0 and (usec_t) -1 |
1962 | ||
41644622 LP |
1963 | * rfkill,backlight: we probably should run the load tools inside of the udev rules so that the state is properly initialized by the time other software sees it |
1964 | ||
19aadacf JE |
1965 | * If we try to find a unit via a dangling symlink, generate a clean |
1966 | error. Currently, we just ignore it and read the unit from the search | |
df5f6971 LP |
1967 | path anyway. |
1968 | ||
04397464 | 1969 | * refuse boot if /usr/lib/os-release is missing or /etc/machine-id cannot be set up |
fcba531e | 1970 | |
bdeeb6b5 LP |
1971 | * man: the documentation of Restart= currently is very misleading and suggests the tools from ExecStartPre= might get restarted. |
1972 | ||
07eabc2b | 1973 | * There's currently no way to cancel fsck (used to be possible via C-c or c on the console) |
f38afcd0 | 1974 | |
07eabc2b | 1975 | * add option to sockets to avoid activation. Instead just drop packets/connections, see http://cyberelk.net/tim/2012/02/15/portreserve-systemd-solution/ |
eb01ba5d | 1976 | |
07eabc2b LB |
1977 | * make sure systemd-ask-password-wall does not shutdown systemd-ask-password-console too early |
1978 | ||
1979 | * verify that the AF_UNIX sockets of a service in the fs still exist | |
1980 | when we start a service in order to avoid confusion when a user | |
1981 | assumes starting a service is enough to make it accessible | |
1982 | ||
1983 | * Make it possible to set the keymap independently from the font on | |
1984 | the kernel cmdline. Right now setting one resets also the other. | |
1985 | ||
1986 | * and a dbus call to generate target from current state | |
1987 | ||
1988 | * investigate whether the gnome pty helper should be moved into systemd, to provide cgroup support. | |
1989 | ||
1990 | * dot output for --test showing the 'initial transaction' | |
1991 | ||
1992 | * be able to specify a forced restart of service A where service B depends on, in case B | |
1993 | needs to be auto-respawned? | |
1994 | ||
1995 | * pid1: | |
1996 | - When logging about multiple units (stopping BoundTo units, conflicts, etc.), | |
1997 | log both units as UNIT=, so that journalctl -u triggers on both. | |
1998 | - generate better errors when people try to set transient properties | |
1999 | that are not supported... | |
41d6f3bf | 2000 | https://lists.freedesktop.org/archives/systemd-devel/2015-February/028076.html |
07eabc2b | 2001 | - recreate systemd's D-Bus private socket file on SIGUSR2 |
07eabc2b LB |
2002 | - when we automatically restart a service, ensure we restart its rdeps, too. |
2003 | - hide PAM options in fragment parser when compile time disabled | |
2004 | - Support --test based on current system state | |
2005 | - If we show an error about a unit (such as not showing up) and it has no Description string, then show a description string generated form the reverse of unit_name_mangle(). | |
2006 | - after deserializing sockets in socket.c we should reapply sockopts and things | |
2007 | - drop PID 1 reloading, only do reexecing (difficult: Reload() | |
2008 | currently is properly synchronous, Reexec() is weird, because we | |
2009 | cannot delay the response properly until we are back, so instead of | |
2010 | being properly synchronous we just keep open the fd and close it | |
2011 | when done. That means clients do not get a successful method reply, | |
2012 | but much rather a disconnect on success. | |
2013 | - when breaking cycles drop sysv services first, then services from /run, then from /etc, then from /usr | |
2014 | - when a bus name of a service disappears from the bus make sure to queue further activation requests | |
2015 | - maybe introduce CoreScheduling=yes/no to optionally set a PR_SCHED_CORE cookie, so that all | |
2016 | processes in a service's cgroup share the same cookie and are guaranteed not to share SMT cores | |
2017 | with other units https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/admin-guide/hw-vuln/core-scheduling.rst | |
e478fa2a LB |
2018 | - ExtensionImages= deduplication for services is currently only applied to disk images without GPT envelope. |
2019 | This should be extended to work with proper DDIs too, as well as directory confext/sysext. Moreover, | |
2020 | system-wide confex/sysext should support this too. | |
b3014aaf LB |
2021 | - Pin the mount namespace via FD by sending it back from sd-exec to the manager, and use it |
2022 | for live mounting, instead of doing it via PID | |
07eabc2b LB |
2023 | |
2024 | * unit files: | |
2025 | - allow port=0 in .socket units | |
2026 | - maybe introduce ExecRestartPre= | |
07eabc2b LB |
2027 | - implement Register= switch in .socket units to enable registration |
2028 | in Avahi, RPC and other socket registration services. | |
2029 | - allow Type=simple with PIDFile= | |
2030 | https://bugzilla.redhat.com/show_bug.cgi?id=723942 | |
2031 | - allow writing multiple conditions in unit files on one line | |
2032 | - introduce Type=pid-file | |
2033 | - add a concept of RemainAfterExit= to scope units | |
2034 | - Allow multiple ExecStart= for all Type= settings, so that we can cover rescue.service nicely | |
2035 | - add verification of [Install] section to systemd-analyze verify | |
2036 | ||
2037 | * timer units: | |
63a185dc | 2038 | - timer units should get the ability to trigger when DST changes |
07eabc2b LB |
2039 | - Modulate timer frequency based on battery state |
2040 | ||
2041 | * add libsystemd-password or so to query passwords during boot using the password agent logic | |
2042 | ||
2043 | * clean up date formatting and parsing so that all absolute/relative timestamps we format can also be parsed | |
2044 | ||
2045 | * on shutdown: move utmp, wall, audit logic all into PID 1 (or logind?), get rid of systemd-update-utmp-runlevel | |
2046 | ||
2047 | * make repeated alt-ctrl-del presses printing a dump | |
2048 | ||
07eabc2b | 2049 | * currently x-systemd.timeout is lost in the initrd, since crypttab is copied into dracut, but fstab is not |
461bd8e4 | 2050 | |
ab8e074c LP |
2051 | * add a pam module that on password changes updates any LUKS slot where the password matches |
2052 | ||
fff87a35 | 2053 | * test/: |
20d52ab6 | 2054 | - add unit tests for config_parse_device_allow() |
b8b4d3dd | 2055 | |
b5c03638 | 2056 | * seems that when we follow symlinks to units we prefer the symlink |
d28315e4 | 2057 | destination path over /etc and /usr. We should not do that. Instead |
b5c03638 LP |
2058 | /etc should always override /run+/usr and also any symlink |
2059 | destination. | |
2060 | ||
eece8c6f LP |
2061 | * when isolating, try to figure out a way how we implicitly can order |
2062 | all units we stop before the isolating unit... | |
2063 | ||
356ce991 LP |
2064 | * teach ConditionKernelCommandLine= globs or regexes (in order to match foobar={no,0,off}) |
2065 | ||
6daebf9e ZJS |
2066 | * Add ConditionDirectoryNotEmpty= handle non-absoute paths as a search path or add |
2067 | ConditionConfigSearchPathNotEmpty= or different syntax? See the discussion starting at | |
2068 | https://github.com/systemd/systemd/pull/15109#issuecomment-607740136. | |
2069 | ||
1ccfb792 LP |
2070 | * BootLoaderSpec: Define a way how an installer can figure out whether a BLS |
2071 | compliant boot loader is installed. | |
795607b2 | 2072 | |
7227dd81 | 2073 | * think about requeuing jobs when daemon-reload is issued? use case: |
0be8342c LP |
2074 | the initrd issues a reload after fstab from the host is accessible |
2075 | and we might want to requeue the mounts local-fs acquired through | |
2076 | that automatically. | |
2077 | ||
e5ec62c5 | 2078 | * systemd-inhibit: make taking delay locks useful: support sending SIGINT or SIGTERM on PrepareForSleep() |
54c31a79 | 2079 | |
ccddd104 | 2080 | * remove any syslog support from log.c — we probably cannot do this before split-off udev is gone for good |
826872b6 | 2081 | |
3679d112 LP |
2082 | * shutdown logging: store to EFI var, and store to USB stick? |
2083 | ||
356ce991 | 2084 | * merge unit_kill_common() and unit_kill_context() |
490b7e47 | 2085 | |
07eabc2b LB |
2086 | * add a dependency on standard-conf.xml and other included files to man pages |
2087 | ||
2088 | * MountFlags=shared acts as MountFlags=slave right now. | |
2089 | ||
2090 | * properly handle loop back mounts via fstab, especially regards to fsck/passno | |
2091 | ||
2092 | * initialize the hostname from the fs label of /, if /etc/hostname does not exist? | |
2093 | ||
2094 | * sd-bus: | |
2095 | - EBADSLT handling | |
2096 | - GetAllProperties() on a non-existing object does not result in a failure currently | |
2097 | - port to sd-resolve for connecting to TCP dbus servers | |
2098 | - see if we can introduce a new sd_bus_get_owner_machine_id() call to retrieve the machine ID of the machine of the bus itself | |
2099 | - see if we can drop more message validation on the sending side | |
2100 | - add API to clone sd_bus_message objects | |
2101 | - longer term: priority inheritance | |
2102 | - dbus spec updates: | |
2103 | - NameLost/NameAcquired obsolete | |
07eabc2b LB |
2104 | - path escaping |
2105 | - update systemd.special(7) to mention that dbus.socket is only about the compatibility socket now | |
2106 | ||
2107 | * sd-event | |
2108 | - allow multiple signal handlers per signal? | |
2109 | - document chaining of signal handler for SIGCHLD and child handlers | |
2110 | - define more intervals where we will shift wakeup intervals around in, 1h, 6h, 24h, ... | |
2111 | - maybe support iouring as backend, so that we allow hooking read and write | |
2112 | operations instead of IO ready events into event loops. See considerations | |
2113 | here: | |
2114 | http://blog.vmsplice.net/2020/07/rethinking-event-loop-integration-for.html | |
2115 | ||
2116 | * dbus: when a unit failed to load (i.e. is in UNIT_ERROR state), we | |
2117 | should be able to safely try another attempt when the bus call LoadUnit() is invoked. | |
2118 | ||
9140404a ZJS |
2119 | * document org.freedesktop.MemoryAllocation1 |
2120 | ||
07eabc2b LB |
2121 | * maybe do not install getty@tty1.service symlink in /etc but in /usr? |
2122 | ||
2123 | * print a nicer explanation if people use variable/specifier expansion in ExecStart= for the first word | |
2124 | ||
2125 | * mount: turn dependency information from /proc/self/mountinfo into dependency information between systemd units. | |
2126 | ||
b44be3ec | 2127 | * EFI: |
b44be3ec LP |
2128 | - honor language efi variables for default language selection (if there are any?) |
2129 | - honor timezone efi variables for default timezone selection (if there are any?) | |
631427d6 | 2130 | * bootctl |
631427d6 | 2131 | - recognize the case when not booted on EFI |
e4181484 | 2132 | |
07eabc2b | 2133 | * bootctl: |
483091b0 | 2134 | - show whether UEFI audit mode is available |
07eabc2b LB |
2135 | - teach it to prepare an ESP wholesale, i.e. with mkfs.vfat invocation |
2136 | - teach it to copy in unified kernel images and maybe type #1 boot loader spec entries from host | |
f620a368 | 2137 | |
b44be3ec LP |
2138 | * logind: |
2139 | - logind: optionally, ignore idle-hint logic for autosuspend, block suspend as long as a session is around | |
b44be3ec LP |
2140 | - logind: wakelock/opportunistic suspend support |
2141 | - Add pretty name for seats in logind | |
2142 | - logind: allow showing logout dialog from system? | |
f38afcd0 LP |
2143 | - add Suspend() bus calls which take timestamps to fix double suspend issues when somebody hits suspend and closes laptop quickly. |
2144 | - if pam_systemd is invoked by su from a process that is outside of a | |
2145 | any session we should probably just become a NOP, since that's | |
2146 | usually not a real user session but just some system code that just | |
2147 | needs setuid(). | |
279f0366 LP |
2148 | - logind: make the Suspend()/Hibernate() bus calls wait for the for |
2149 | the job to be completed. before returning, so that clients can wait | |
2150 | for "systemctl suspend" to finish to know when the suspending is | |
2151 | complete. | |
2152 | - logind: when the power button is pressed short, just popup a | |
2153 | logout dialog. If it is pressed for 1s, do the usual | |
2154 | shutdown. Inspiration are Macs here. | |
28423d9a | 2155 | - expose "Locked" property on logind session objects |
e25b5a8d DH |
2156 | - maybe allow configuration of the StopTimeout for session scopes |
2157 | - rename session scope so that it includes the UID. THat way | |
2158 | the session scope can be arranged freely in slices and we don't have | |
2159 | make assumptions about their slice anymore. | |
2160 | - follow PropertiesChanged state more closely, to deal with quick logouts and | |
2161 | relogins | |
77b19caf | 2162 | - (optionally?) spawn seat-manager@$SEAT.service whenever a seat shows up that as CanGraphical set |
07eabc2b LB |
2163 | |
2164 | * move multiseat vid/pid matches from logind udev rule to hwdb | |
2165 | ||
07eabc2b LB |
2166 | * delay activation of logind until somebody logs in, or when /dev/tty0 pulls it |
2167 | in or lingering is on (so that containers don't bother with it until PAM is used). also exit-on-idle | |
2168 | ||
b44be3ec | 2169 | * journal: |
57f2a947 | 2170 | - consider introducing implicit _TTY= + _PPID= + _EUID= + _EGID= + _FSUID= + _FSGID= fields |
b44be3ec LP |
2171 | - journald: also get thread ID from client, plus thread name |
2172 | - journal: when waiting for journal additions in the client always sleep at least 1s or so, in order to minimize wakeups | |
2173 | - add API to close/reopen/get fd for journal client fd in libsystemd-journal. | |
2aed63f4 | 2174 | - fall back to /dev/log based logging in libsystemd-journal, if we cannot log natively? |
b44be3ec | 2175 | - declare the local journal protocol stable in the wiki interface chart |
b44be3ec LP |
2176 | - sd-journal: speed up sd_journal_get_data() with transparent hash table in bg |
2177 | - journald: when dropping msgs due to ratelimit make sure to write | |
2178 | "dropped %u messages" not only when we are about to print the next | |
5238e957 | 2179 | message that works, but already after a short timeout |
b44be3ec LP |
2180 | - check if we can make journalctl by default use --follow mode inside of less if called without args? |
2181 | - maybe add API to send pairs of iovecs via sd_journal_send | |
f47ec8eb | 2182 | - journal: add a setgid "systemd-journal" utility to invoke from libsystemd-journal, which passes fds via STDOUT and does PK access |
02c914ef | 2183 | - journalctl: support negative filtering, i.e. FOOBAR!="waldo", |
b44be3ec | 2184 | and !FOOBAR for events without FOOBAR. |
06847d0f | 2185 | - journal: store timestamp of journal_file_set_offline() in the header, |
038cf334 | 2186 | so it is possible to display when the file was last synced. |
b44be3ec LP |
2187 | - journal-send.c, log.c: when the log socket is clogged, and we drop, count this and write a message about this when it gets unclogged again. |
2188 | - journal: find a way to allow dropping history early, based on priority, other rules | |
2189 | - journal: When used on NFS, check payload hashes | |
b44be3ec LP |
2190 | - journald: add kernel cmdline option to disable ratelimiting for debug purposes |
2191 | - refuse taking lower-case variable names in sd_journal_send() and friends. | |
2192 | - journald: we currently rotate only after MaxUse+MaxFilesize has been reached. | |
2193 | - journal: deal nicely with byte-by-byte copied files, especially regards header | |
b44be3ec | 2194 | - journal: sanely deal with entries which are larger than the individual file size, but where the components would fit |
601d9d6f | 2195 | - Replace utmp, wtmp, btmp, and lastlog completely with journal |
f38afcd0 | 2196 | - journalctl: instead --after-cursor= maybe have a --cursor=XYZ+1 syntax? |
f38afcd0 LP |
2197 | - when a kernel driver logs in a tight loop, we should ratelimit that too. |
2198 | - journald: optionally, log debug messages to /run but everything else to /var | |
2199 | - journald: when we drop syslog messages because the syslog socket is | |
2200 | full, make sure to write how many messages are lost as first thing | |
2201 | to syslog when it works again. | |
279f0366 LP |
2202 | - journald: allow per-priority and per-service retention times when rotating/vacuuming |
2203 | - journald: make use of uid-range.h to managed uid ranges to split | |
2204 | journals in. | |
2205 | - journalctl: add the ability to look for the most recent process of a binary. journalctl /usr/bin/X11 --pid=-1 or so... | |
2206 | - improve journalctl performance by loading journal files | |
2207 | lazily. Encode just enough information in the file name, so that we | |
2208 | do not have to open it to know that it is not interesting for us, for | |
2209 | the most common operations. | |
e25b5a8d | 2210 | - man: document that corrupted journal files is nothing to act on |
e25b5a8d DH |
2211 | - rework journald sigbus stuff to use mutex |
2212 | - Set RLIMIT_NPROC for systemd-journal-xyz, and all other of our | |
2213 | services that run under their own user ids, and use User= (but only | |
2214 | in a world where userns is ubiquitous since otherwise we cannot | |
2215 | invoke those daemons on the host AND in a container anymore). Also, | |
2216 | if LimitNPROC= is used without User= we should warn and refuse | |
2217 | operation. | |
2218 | - journalctl --verify: don't show files that are currently being | |
b3e199ce | 2219 | written to as FAIL, but instead show that they are being written to. |
e25b5a8d DH |
2220 | - add journalctl -H that talks via ssh to a remote peer and passes through |
2221 | binary logs data | |
e25b5a8d | 2222 | - add a version of --merge which also merges /var/log/journal/remote |
e25b5a8d DH |
2223 | - journalctl: -m should access container journals directly by enumerating |
2224 | them via machined, and also watch containers coming and going. | |
2225 | Benefit: nspawn --ephemeral would start working nicely with the journal. | |
2226 | - assign MESSAGE_ID to log messages about failed services | |
06847d0f | 2227 | - check if loop in decompress_blob_xz() is necessary |
b44be3ec | 2228 | |
07eabc2b LB |
2229 | * journald: support RFC3164 fully for the incoming syslog transport, see |
2230 | https://github.com/systemd/systemd/issues/19251#issuecomment-816601955 | |
2231 | ||
2232 | * Hook up journald's FSS logic with TPM2: seal the verification disk by | |
2233 | time-based policy, so that the verification key can remain on host and ve | |
2234 | validated via TPM. | |
2235 | ||
0134afe3 ZJS |
2236 | * rework journalctl -M to be based on a machined method that generates a mount |
2237 | fd of the relevant journal dirs in the container with uidmapping applied to | |
2238 | allow the host to read it, while making everything read-only. | |
2239 | ||
2240 | * journald: add varlink service that allows subscribing to certain log events, | |
2241 | for example matching by message ID, or log level returns a list of journal | |
2242 | cursors as they happen. | |
2243 | ||
2244 | * journald: also collect CLOCK_BOOTTIME timestamps per log entry. Then, derive | |
2245 | "corrected" CLOCK_REALTIME information on display from that and the timestamp | |
2246 | info of the newest entry of the specific boot (as identified by the boot | |
2247 | ID). This way, if a system comes up without a valid clock but acquires a | |
2248 | better clock later, we can "fix" older entry timestamps on display, by | |
2249 | calculating backwards. We cannot use CLOCK_MONOTONIC for this, since it does | |
2250 | not account for suspend phases. This would then also enable us to correct the | |
2251 | kmsg timestamping we consume (where we erroneously assume the clock was in | |
2252 | CLOCK_MONOTONIC, but it actually is CLOCK_BOOTTIME as per kernel). | |
2253 | ||
2254 | * in journald, write out a recognizable log record whenever the system clock is | |
2255 | changed ("stepped"), and in timesyncd whenever we acquire an NTP fix | |
2256 | ("slewing"). Then, in journalctl for each boot time we come across, find | |
2257 | these records, and use the structured info they include to display | |
cbcf76b1 | 2258 | "corrected" wallclock time, as calculated from the monotonic timestamp in the |
0134afe3 ZJS |
2259 | log record, adjusted by the delta declared in the structured log record. |
2260 | ||
2261 | * in journald: whenever we start a new journal file because the boot ID | |
2262 | changed, let's generate a recognizable log record containing info about old | |
2263 | and new ID. Then, when displaying log stream in journalctl look for these | |
2264 | records, to be able to order them. | |
2265 | ||
2266 | * journald: generate recognizable log events whenever we shutdown journald | |
2267 | cleanly, and when we migrate run → var. This way tools can verify that a | |
2268 | previous boot terminated cleanly, because either of these two messages must | |
2269 | be safely written to disk, then. | |
2270 | ||
2271 | * hook up journald with TPMs? measure new journal records to the TPM in regular | |
2272 | intervals, validate the journal against current TPM state with that. (taking | |
2273 | inspiration from IMA log) | |
2274 | ||
2275 | * sd-journal puts a limit on parallel journal files to view at once. journald | |
2276 | should probably honour that same limit (JOURNAL_FILES_MAX) when vacuuming to | |
2277 | ensure we never generate more files than we can actually view. | |
2278 | ||
dd411431 | 2279 | * bsod: maybe use graphical mode. Use DRM APIs directly, see |
0134afe3 ZJS |
2280 | https://github.com/dvdhrm/docs/blob/master/drm-howto/modeset.c for an example |
2281 | for doing that. | |
2282 | ||
2283 | * maybe implicitly attach monotonic+realtime timestamps to outgoing messages in | |
2284 | log.c and sd-journal-send | |
2285 | ||
2286 | * journalctl/timesyncd: whenever timesyncd acquires a synchronization from NTP, | |
2287 | create a structured log entry that contains boot ID, monotonic clock and | |
2288 | realtime clock (I mean, this requires no special work, as these three fields | |
2289 | are implicit). Then in journalctl when attempting to display the realtime | |
2290 | timestamp of a log entry, first search for the closest later log entry | |
2291 | of this kinda that has a matching boot id, and convert the monotonic clock | |
2292 | timestamp of the entry to the realtime clock using this info. This way we can | |
2293 | retroactively correct the wallclock timestamps, in particular for systems | |
2294 | without RTC, i.e. where initially wallclock timestamps carry rubbish, until | |
2295 | an NTP sync is acquired. | |
2296 | ||
2297 | * introduce per-unit (i.e. per-slice, per-service) journal log size limits. | |
07eabc2b LB |
2298 | |
2299 | * journald: do journal file writing out-of-process, with one writer process per | |
2300 | client UID, so that synthetic hash table collisions can slow down a specific | |
2301 | user's journal stream down but not the others. | |
2302 | ||
2303 | * tweak journald context caching. In addition to caching per-process attributes | |
2304 | keyed by PID, cache per-cgroup attributes (i.e. the various xattrs we read) | |
2305 | keyed by cgroup path, and guarded by ctime changes. This should provide us | |
2306 | with a nice speed-up on services that have many processes running in the same | |
2307 | cgroup. | |
2308 | ||
2309 | * maybe add call sd_journal_set_block_timeout() or so to set SO_SNDTIMEO for | |
2310 | the sd-journal logging socket, and, if the timeout is set to 0, sets | |
2311 | O_NONBLOCK on it. That way people can control if and when to block for | |
2312 | logging. | |
2313 | ||
2314 | * journalctl: make sure -f ends when the container indicated by -M terminates | |
2315 | ||
2316 | * journald: sigbus API via a signal-handler safe function that people may call | |
2317 | from the SIGBUS handler | |
2318 | ||
590171d1 ZJS |
2319 | * add a test if all entries in the catalog are properly formatted. |
2320 | (Adding dashes in a catalog entry currently results in the catalog entry | |
2321 | being silently skipped. journalctl --update-catalog must warn about this, | |
2322 | and we should also have a unit test to check that all our message are OK.) | |
2323 | ||
0134afe3 ZJS |
2324 | * build short web pages out of each catalog entry, build them along with man |
2325 | pages, and include hyperlinks to them in the journal output | |
2326 | ||
07eabc2b LB |
2327 | * homed: |
2328 | - when user tries to log into record signed by unrecognized key, automatically add key to our chain after polkit auth | |
2329 | - rollback when resize fails mid-operation | |
2330 | - GNOME's side for forget key on suspend (requires rework so that lock screen runs outside of uid) | |
07eabc2b LB |
2331 | - update LUKS password on login if we find there's a password that unlocks the JSON record but not the LUKS device. |
2332 | - create on activate? | |
dd411431 | 2333 | - properties: icon url?, administrator bool (which translates to 'wheel' membership)?, address?, telephone?, vcard?, samba stuff?, parental controls? |
07eabc2b LB |
2334 | - communicate clearly when usb stick is safe to remove. probably involves |
2335 | beefing up logind to make pam session close hook synchronous and wait until | |
2336 | systemd --user is shut down. | |
2337 | - logind: maybe keep a "busy fd" as long as there's a non-released session around or the user@.service | |
2338 | - maybe make automatic, read-only, time-based reflink-copies of LUKS disk | |
2339 | images (and btrfs snapshots of subvolumes) (think: time machine) | |
2340 | - distinguish destroy / remove (i.e. currently we can unregister a user, unregister+remove their home directory, but not just remove their home directory) | |
2341 | - in systemd's PAMName= logic: query passwords with ssh-askpassword, so that we can make "loginctl set-linger" mode work | |
2342 | - fingerprint authentication, pattern authentication, … | |
2343 | - make sure "classic" user records can also be managed by homed | |
2344 | - make size of $XDG_RUNTIME_DIR configurable in user record | |
07eabc2b LB |
2345 | - move acct mgmt stuff from pam_systemd_home to pam_systemd? |
2346 | - when "homectl --pkcs11-token-uri=" is used, synthesize ssh-authorized-keys records for all keys we have private keys on the stick for | |
2347 | - make slice for users configurable (requires logind rework) | |
2348 | - logind: populate auto-login list bus property from PKCS#11 token | |
2349 | - when determining state of a LUKS home directory, check DM suspended sysfs file | |
a11e7c0b LB |
2350 | - when homed is in use, maybe start the user session manager in a mount namespace with MS_SLAVE, |
2351 | so that mounts propagate down but not up - eg, user A setting up a backup volume | |
2352 | doesn't mean user B sees it | |
9c53de8b | 2353 | - use credentials logic/TPM2 logic to store homed signing key |
9c53de8b LP |
2354 | - permit multiple user record signing keys to be used locally, and pick |
2355 | the right one for signing records automatically depending on a pre-existing | |
2356 | signature | |
2357 | - add a way to "adopt" a home directory, i.e. strip foreign signatures | |
2358 | and insert a local signature instead. | |
2359 | - as an extension to the directory+subvolume backend: if located on | |
2360 | especially marked fs, then sync down password into LUKS header of that fs, | |
2361 | and always verify passwords against it too. Bootstrapping is a problem | |
2362 | though: if no one is logged in (or no other user even exists yet), how do you | |
2363 | unlock the volume in order to create the first user and add the first pw. | |
2364 | - support new FS_IOC_ADD_ENCRYPTION_KEY ioctl for setting up fscrypt | |
2365 | - maybe pre-create ~/.cache as subvol so that it can have separate quota | |
2366 | easily? | |
9c53de8b LP |
2367 | - store PKCS#11 + FIDO2 token info in LUKS2 header, compatible with |
2368 | systemd-cryptsetup, so that it can unlock homed volumes | |
6d975fe7 LP |
2369 | - maybe make all *.home files owned by `systemd-home` user or so, so that we |
2370 | can easily set overall quota for all users | |
2371 | - on login, if we can't fallocate initially, but rebalance is on, then allow | |
2372 | login in discard mode, then immediately rebalance, then turn off discard | |
cff559ec LP |
2373 | - add "homectl unbind" command to remove local user record of an inactive |
2374 | home dir | |
07eabc2b | 2375 | |
07eabc2b LB |
2376 | * add a new switch --auto-definitions=yes/no or so to systemd-repart. If |
2377 | specified, synthesize a definition automatically if we can: enlarge last | |
2378 | partition on disk, but only if it is marked for growing and not read-only. | |
2379 | ||
2df2bb1f | 2380 | * systemd-repart: read LUKS encryption key from $CREDENTIALS_DIRECTORY |
07eabc2b LB |
2381 | |
2382 | * systemd-repart: add a switch to factory reset the partition table without | |
2383 | immediately applying the new configuration again. i.e. --factory-reset=leave | |
2384 | or so. (this is useful to factory reset an image, then putting it into | |
2385 | another machine, ensuring that luks key is generated on new machine, not old) | |
2386 | ||
2387 | * systemd-repart: support setting up dm-integrity with HMAC | |
2388 | ||
2389 | * systemd-repart: maybe remove half-initialized image on failure. It fails | |
2390 | if the output file exists, so a repeated invocation will usually fail if | |
2391 | something goes wrong on the way. | |
2392 | ||
07eabc2b LB |
2393 | * systemd-repart: by default generate minimized partition tables (i.e. tables |
2394 | that only cover the space actually used, excluding any free space at the | |
2395 | end), in order to maximize dd'ability. Requires libfdisk work, see | |
2396 | https://github.com/karelzak/util-linux/issues/907 | |
2397 | ||
2398 | * systemd-repart: MBR partition table support. Care needs to be taken regarding | |
2399 | Type=, so that partition definitions can sanely apply to both the GPT and the | |
2400 | MBR case. Idea: accept syntax "Type=gpt:home mbr:0x83" for setting the types | |
2401 | for the two partition types explicitly. And provide an internal mapping so | |
2402 | that "Type=linux-generic" maps to the right types for both partition tables | |
2403 | automatically. | |
2404 | ||
2405 | * systemd-repart: allow sizing partitions as factor of available RAM, so that | |
2406 | we can reasonably size swap partitions for hibernation. | |
2407 | ||
2408 | * systemd-repart: allow boolean option that ensures that if existing partition | |
2409 | doesn't exist within the configured size bounds the whole command fails. This | |
2410 | is useful to implement ESP vs. XBOOTLDR schemes in installers: have one set | |
2411 | of repart files for the case where ESP is large enough and one where it isn't | |
2412 | and XBOOTLDR is added in instead. Then apply the former first, and if it | |
2413 | fails to apply use the latter. | |
2414 | ||
2415 | * systemd-repart: add per-partition option to never reuse existing partition | |
2416 | and always create anew even if matching partition already exists. | |
2417 | ||
2418 | * systemd-repart: add per-partition option to fail if partition already exist, | |
2419 | i.e. is not added new. Similar, add option to fail if partition does not exist yet. | |
2420 | ||
2421 | * systemd-repart: allow disabling growing of specific partitions, or making | |
2422 | them (think ESP: we don't ever want to grow it, since we cannot resize vfat) | |
d01d9197 | 2423 | Also add option to disable operation via kernel command line. |
07eabc2b LB |
2424 | |
2425 | * systemd-repart: make it a static checker during early boot for existence and | |
2426 | absence of other partitions for trusted boot environments | |
2427 | ||
92e72028 | 2428 | * systemd-repart: add support for SD_GPT_FLAG_GROWFS also on real systems, i.e. |
d01d9197 ZJS |
2429 | generate some unit to actually enlarge the fs after growing the partition |
2430 | during boot. | |
2431 | ||
2432 | * systemd-repart: do not print "Successfully resized …" when no change was done. | |
2433 | ||
b44be3ec | 2434 | * document: |
8b8f2591 | 2435 | - document that deps in [Unit] sections ignore Alias= fields in |
b44be3ec LP |
2436 | [Install] units of other units, unless those units are disabled |
2437 | - man: clarify that time-sync.target is not only sysv compat but also useful otherwise. Same for similar targets | |
b44be3ec | 2438 | - document that service reload may be implemented as service reexec |
f38afcd0 LP |
2439 | - add a man page containing packaging guidelines and recommending usage of things like Documentation=, PrivateTmp=, PrivateNetwork= and ReadOnlyDirectories=/etc /usr. |
2440 | - document systemd-journal-flush.service properly | |
f38afcd0 LP |
2441 | - documentation: recommend to connect the timer units of a service to the service via Also= in [Install] |
2442 | - man: document the very specific env the shutdown drop-in tools live in | |
5cf821ac ZJS |
2443 | - man: add more examples to man pages, |
2444 | - in particular an example how to do the equivalent of switching runlevels | |
f38afcd0 | 2445 | - man: maybe sort directives in man pages, and take sections from --help and apply them to man too |
17ec531f | 2446 | - document root=gpt-auto properly |
b44be3ec LP |
2447 | |
2448 | * systemctl: | |
b44be3ec LP |
2449 | - add systemctl switch to dump transaction without executing it |
2450 | - Add a verbose mode to "systemctl start" and friends that explains what is being done or not done | |
b44be3ec LP |
2451 | - print nice message from systemctl --failed if there are no entries shown, and hook that into ExecStartPre of rescue.service/emergency.service |
2452 | - add new command to systemctl: "systemctl system-reexec" which reexecs as many daemons as virtually possible | |
d28315e4 | 2453 | - systemctl enable: fail if target to alias into does not exist? maybe show how many units are enabled afterwards? |
b44be3ec | 2454 | - systemctl: "Journal has been rotated since unit was started." message is misleading |
f38afcd0 | 2455 | |
07eabc2b LB |
2456 | * introduce an option (or replacement) for "systemctl show" that outputs all |
2457 | properties as JSON, similar to busctl's new JSON output. In contrast to that | |
2458 | it should skip the variant type string though. | |
8b04b925 | 2459 | |
07eabc2b LB |
2460 | * Add a "systemctl list-units --by-slice" mode or so, which rearranges the |
2461 | output of "systemctl list-units" slightly by showing the tree structure of | |
2462 | the slices, and the units attached to them. | |
a19554ed | 2463 | |
07eabc2b LB |
2464 | * add "systemctl wait" or so, which does what "systemd-run --wait" does, but |
2465 | for all units. It should be both a way to pin units into memory as well as a | |
2466 | wait to retrieve their exit data. | |
a7a3f28b | 2467 | |
07eabc2b LB |
2468 | * show whether a service has out-of-date configuration in "systemctl status" by |
2469 | using mtime data of ConfigurationDirectory=. | |
08f95888 | 2470 | |
07eabc2b LB |
2471 | * "systemctl preset-all" should probably order the unit files it |
2472 | operates on lexicographically before starting to work, in order to | |
2473 | ensure deterministic behaviour if two unit files conflict (like DMs | |
2474 | do, for example) | |
dcfc4b2e | 2475 | |
07eabc2b LB |
2476 | * add "systemctl start -v foobar.service" that shows logs of a service |
2477 | while the start command runs. This is non-trivial to do without | |
2478 | races though, since we should flush out all journal messages before | |
2479 | returning from the "systemctl stop". | |
71ef24d0 | 2480 | |
07eabc2b LB |
2481 | * systemctl: if some operation fails, show log output? |
2482 | ||
2483 | * Add a new verb "systemctl top" | |
2484 | ||
2485 | * unit install: | |
2486 | - "systemctl mask" should find all names by which a unit is accessible | |
2487 | (i.e. by scanning for symlinks to it) and link them all to /dev/null | |
1b89884b | 2488 | |
b44be3ec | 2489 | * nspawn: |
e25b5a8d DH |
2490 | - emulate /dev/kmsg using CUSE and turn off the syslog syscall |
2491 | with seccomp. That should provide us with a useful log buffer that | |
2492 | systemd can log to during early boot, and disconnect container logs | |
2493 | from the kernel's logs. | |
2494 | - as soon as networkd has a bus interface, hook up --network-interface=, | |
2495 | --network-bridge= with networkd, to trigger netdev creation should an | |
2496 | interface be missing | |
e25b5a8d DH |
2497 | - a nice way to boot up without machine id set, so that it is set at boot |
2498 | automatically for supporting --ephemeral. Maybe hash the host machine id | |
2499 | together with the machine name to generate the machine id for the container | |
2500 | - fix logic always print a final newline on output. | |
2501 | https://github.com/systemd/systemd/pull/272#issuecomment-113153176 | |
2502 | - should optionally support receiving WATCHDOG=1 messages from its payload | |
2503 | PID 1... | |
e25b5a8d DH |
2504 | - optionally automatically add FORWARD rules to iptables whenever nspawn is |
2505 | running, remove them when shut down. | |
71b77f06 CB |
2506 | - add support for sysext extensions, too. i.e. a new --extension= switch that |
2507 | takes one or more arguments, and applies the extensions already during | |
2508 | startup. | |
2509 | - when main nspawn supervisor process gets suspended due to SIGSTOP/SIGTTOU | |
2510 | or so, freeze the payload too. | |
2511 | - support time namespaces | |
2512 | - on cgroupsv1 issue cgroup empty handler process based on host events, so | |
2513 | that we make cgroup agent logic safe | |
2514 | - add API to invoke binary in container, then use that as fallback in | |
2515 | "machinectl shell" | |
2516 | - make nspawn suitable for shell pipelines: instead of triggering a hangup | |
2517 | when input is finished, send ^D, which synthesizes an EOF. Then wait for | |
2518 | hangup or ^D before passing on the EOF. | |
2519 | - greater control over selinux label? | |
2520 | - support that /proc, /sys/, /dev are pre-mounted | |
2521 | - maybe allow TPM passthrough, backed by swtpm, and measure --image= hash | |
2522 | into its PCR 11, so that nspawn instances can be TPM enabled, and partake | |
2523 | in measurements/remote attestation and such. swtpm would run outside of | |
2524 | control of container, and ideally would itself bind its encryption keys to | |
2525 | host TPM. | |
2526 | - make boot assessment do something sensible in a container. i.e send an | |
2527 | sd_notify() from payload to container manager once boot-up is completed | |
2528 | successfully, and use that in nspawn for dealing with boot counting, | |
2529 | implemented in the partition table labels and directory names. | |
2530 | - optionally set up nftables/iptables routes that forward UDP/TCP traffic on | |
2531 | port 53 to resolved stub 127.0.0.54 | |
2532 | - maybe optionally insert .nspawn file as GPT partition into images, so that | |
2533 | such container images are entirely stand-alone and can be updated as one. | |
fdeabf57 CB |
2534 | - The subreaper logic we currently have seems overly complex. We should |
2535 | investigate whether creating the inner child with CLONE_PARENT isn't better. | |
3922f982 CB |
2536 | - Reduce the number of sockets that are currently in use and just rely on one |
2537 | or two sockets. | |
3734fec7 | 2538 | - Support running nspawn as an unprivileged user. |
07eabc2b | 2539 | |
e25b5a8d | 2540 | * machined: |
e25b5a8d DH |
2541 | - add an API so that libvirt-lxc can inform us about network interfaces being |
2542 | removed or added to an existing machine | |
2543 | - "machinectl migrate" or similar to copy a container from or to a | |
2544 | difference host, via ssh | |
e25b5a8d DH |
2545 | - introduce systemd-nspawn-ephemeral@.service, and hook it into |
2546 | "machinectl start" with a new --ephemeral switch | |
2547 | - "machinectl status" should also show internal logs of the container in | |
2548 | question | |
e25b5a8d DH |
2549 | - "machinectl history" |
2550 | - "machinectl diff" | |
2551 | - "machinectl commit" that takes a writable snapshot of a tree, invokes a | |
2552 | shell in it, and marks it read-only after use | |
2553 | ||
abd55b16 | 2554 | * udev: |
abd55b16 | 2555 | - move to LGPL |
abd55b16 KS |
2556 | - kill scsi_id |
2557 | - add trigger --subsystem-match=usb/usb_device device | |
e8d842a0 | 2558 | - reimport udev db after MOVE events for devices without dev_t |
75723d31 | 2559 | - re-enable ProtectClock= once only cgroupsv2 is supported. |
8cfde28b | 2560 | See f562abe2963bad241d34e0b308e48cf114672c84. |
b8217b7b | 2561 | |
e25b5a8d DH |
2562 | * coredump: |
2563 | - save coredump in Windows/Mozilla minidump format | |
73a99163 | 2564 | - when truncating coredumps, also log the full size that the process had, and make a metadata field so we can report truncated coredumps |
1a0281a3 | 2565 | - add examples for other distros in ELF_PACKAGE_METADATA |
87a8baa3 LP |
2566 | |
2567 | * support crash reporting operation modes (https://live.gnome.org/GnomeOS/Design/Whiteboards/ProblemReporting) | |
2568 | ||
f38afcd0 | 2569 | * tmpfiles: |
beca6b6e | 2570 | - allow time-based cleanup in r and R too |
614cc34f | 2571 | - instead of ignoring unknown fields, reject them. |
e25b5a8d DH |
2572 | - creating new directories/subvolumes/fifos/device nodes |
2573 | should not follow symlinks. None of the other adjustment or creation | |
2574 | calls follow symlinks. | |
ba405b22 ZJS |
2575 | - teach tmpfiles.d q/Q logic something sensible in the context of XFS/ext4 |
2576 | project quota | |
a9b0d0a2 | 2577 | - teach tmpfiles.d m/M to move / atomic move + symlink old -> new |
beca6b6e ZJS |
2578 | - add new line type for setting btrfs subvolume attributes (i.e. rw/ro) |
2579 | - tmpfiles: add new line type for setting fcaps | |
2479f0bb | 2580 | - add -n as shortcut for --dry-run in tmpfiles & sysusers & possibly other places |
1258097c | 2581 | |
af6f0d42 TG |
2582 | * udev-link-config: |
2583 | - Make sure ID_PATH is always exported and complete for | |
2584 | network devices where possible, so we can safely rely | |
2585 | on Path= matching | |
af6f0d42 | 2586 | |
88e4d1d7 | 2587 | * sd-rtnl: |
88e4d1d7 | 2588 | - add support for more attribute types |
c589a0e6 | 2589 | - inbuilt piping support (essentially degenerate async)? see loopback-setup.c and other places |
88e4d1d7 | 2590 | |
0a4b9a07 | 2591 | * networkd: |
c74ecd71 TG |
2592 | - add more keys to [Route] and [Address] sections |
2593 | - add support for more DHCPv4 options (and, longer term, other kinds of dynamic config) | |
e8d842a0 | 2594 | - add reduced [Link] support to .network files |
798e174a | 2595 | - properly handle routerless dhcp leases |
a8eaaee7 | 2596 | - work with non-Ethernet devices |
e25b5a8d | 2597 | - dhcp: do we allow configuring dhcp routes on interfaces that are not the one we got the dhcp info from? |
e25b5a8d DH |
2598 | - the DHCP lease data (such as NTP/DNS) is still made available when |
2599 | a carrier is lost on a link. It should be removed instantly. | |
2600 | - expose in the API the following bits: | |
e2da6491 | 2601 | - option 15, domain name |
38b38500 | 2602 | - option 12, hostname and/or option 81, fqdn |
e25b5a8d DH |
2603 | - option 123, 144, geolocation |
2604 | - option 252, configure http proxy (PAC/wpad) | |
2605 | - provide a way to define a per-network interface default metric value | |
2606 | for all routes to it. possibly a second default for DHCP routes. | |
2607 | - allow Name= to be specified repeatedly in the [Match] section. Maybe also | |
2608 | support Name=foo*|bar*|baz ? | |
e25b5a8d | 2609 | - whenever uplink info changes, make DHCP server send out FORCERENEW |
155e8b9a | 2610 | |
07eabc2b LB |
2611 | * in networkd, when matching device types, fix up DEVTYPE rubbish the kernel passes to us |
2612 | ||
d5e172d2 ZJS |
2613 | * Figure out how to do unittests of networkd's state serialization |
2614 | ||
ac976532 | 2615 | * dhcp: |
424a8732 | 2616 | - figure out how much we can increase Maximum Message Size |
ac976532 | 2617 | |
37d8b536 PF |
2618 | * dhcp6: |
2619 | - add functions to set previously stored IPv6 addresses on startup and get | |
2620 | them at shutdown; store them in client->ia_na | |
2621 | - write more test cases | |
37d8b536 | 2622 | - implement reconfigure support, see 5.3., 15.11. and 22.20. |
b3e199ce | 2623 | - implement support for temporary addresses (IA_TA) |
37d8b536 PF |
2624 | - implement dhcpv6 authentication |
2625 | - investigate the usefulness of Confirm messages; i.e. are there any | |
2626 | situations where the link changes without any loss in carrier detection | |
2627 | or interface down | |
2628 | - some servers don't do rapid commit without a filled in IA_NA, verify | |
2629 | this behavior | |
4a77c53d | 2630 | - RouteTable= ? |
7af442cf MY |
2631 | |
2632 | * shared/wall: Once more programs are taught to prefer sd-login over utmp, | |
2633 | switch the default wall implementation to wall_logind | |
2634 | (https://github.com/systemd/systemd/pull/29051#issuecomment-1704917074) |