Project

General

Profile

Freedom Issue #2909

fwupd has a nonfree repository Was: Do check fwupd

GNUtoo - over 3 years ago - . Updated almost 2 years ago.

Status:
fixed
Priority:
bug
Assignee:
% Done:

0%


Description

We ship the fwupd package unmodified from the various archlinux GNU/Linux distributions.

On i686 it comes from community:

$ pacman -sS fwupd
community/fwupd 1.4.6-1.0 [installed]
    Simple daemon to allow session software to update firmware
community/gnome-firmware 3.36.0-2.0
    Manage firmware on devices supported by fwupd

fwupd is a daemon that is meant to update various firmwares1 regardless of if they are free or not.

So it's a bit like a package manager for firmwares.

So if it has not been done already, it would be a good idea to check if its configuration is ok or not.

As at least one firmware (for the color huges if I recall the name well) is free software and known to be available through this system, so it might be a good idea to check if free firmwares are completely ok and keep such firmwares if that's easy to do.

1 Here firmware means code that is in various devices and not part of the operating system, so from SSD firmwares to even BIOS/UEFI.


Related issues

Related to Packages - Freedom Issue #1035: [your-system-sanity]: Non-Free Software From Third-party Package Managers (TPPM)in progress

Actions
Related to Packages - Freedom Issue #3299: [kinfocenter]: blacklisted fwupd is a dependencyfixed

Actions
Related to Packages - Freedom Issue #3000: [fwupd]: is an auto-updater , may also download proprietary firmwarefixed

Actions
Related to Packages - Freedom Issue #3270: [fwupd-efi] Appears only to be useful with blacklisted [fwupd]fixed

Actions

History

#1

Updated by GNUtoo over 3 years ago

I found some highly suspicious files:

$ pacman -Q -l  fwupd | grep -i lvfs
fwupd /etc/fwupd/remotes.d/lvfs-testing.conf
fwupd /etc/fwupd/remotes.d/lvfs.conf
[...]
$ cat /etc/fwupd/remotes.d/lvfs.conf
[fwupd Remote]

# this remote provides metadata and firmware marked as 'stable' from the LVFS
Enabled=true
Title=Linux Vendor Firmware Service
Keyring=gpg
MetadataURI=https://cdn.fwupd.org/downloads/firmware.xml.gz
ReportURI=https://fwupd.org/lvfs/firmware/report
OrderBefore=fwupd

https://cdn.fwupd.org/downloads/firmware.xml.gz seem to contain references to many nonfree firmwares.

#2

Updated by bill-auger over 3 years ago

  • Related to Freedom Issue #1035: [your-system-sanity]: Non-Free Software From Third-party Package Managers (TPPM) added
#3

Updated by bill-auger over 3 years ago

GNUtoo -

i notice that you do not fill in the descriptions for new
tickets that you open; but instead add a secondary comment
with the details later - the initial ticket form should have
a text field for the description - i wonder is the interface
broken for you maybe

this is also peculiar, because some people are not allowed to
submit the ticket if the description field is empty - redmine
normally rejects the post, with an error message: "description
can not be empty" - i have not investigated that, but i assumed
it was a global behavior

#4

Updated by GNUtoo over 3 years ago

i notice that you do not fill in the descriptions for new
tickets that you open; but instead add a secondary comment
with the details later - the initial ticket form should have
a text field for the description - i wonder is the interface
broken for you maybe

The reason is simple:
  • The first description cannot be edited later on
  • I often make mistakes also because I've no preview without JavaScript1.

1 JavaScript isn't bad per-se but here it acts as arbitrary execution of code, can be viewed as as a security issue, depending on your threat model. It is a good practice to not tie the security of one's computer to the computer(s) serving serving the JavaScript code and all the infrastructure in between (SSL PKI).

#5

Updated by bill-auger over 3 years ago

ok, understood - the description can be edited; but it does
require javascript to expose the form

this is the HTML element definition:

<span id="issue_description_and_toolbar" style="display:none">

you could probably do some magic by injecting some CSS with some
styling tool, to make the form always exposed

#issue_description_and_toolbar { display: block ; }

or with local javascript/greasemonkey:

document.getElementById('issue_description_and_toolbar').show()

a better solution would be to prevent redmine from hiding it for
admins and the OP - im sure thats a simple change

#6

Updated by GNUtoo about 2 years ago

  • Status changed from unconfirmed to confirmed
  • Subject changed from Do check fwupd to fwupd has a nonfree repository Was: Do check fwupd

Guix has a patch with a patch to remove lvfs: https://issues.guix.gnu.org/46278

#7

Updated by GNUtoo about 2 years ago

  • Assignee set to GNUtoo

I've just blacklisted the package in the blacklist repository, and also gnome-firmware whose only goal seem to be a graphical interface on top of fwupd.

f084014 Add gnome-firmware
1e458d4 Add fwupd

#8

Updated by GNUtoo about 2 years ago

  • Status changed from confirmed to fixed
#9

Updated by Megver83 almost 2 years ago

Do we really want this? this issue is similar to the ones of third party package managers (pip, npm, flatpak) which offer both free and non-free software. However, the big difference here is that fwupd manages firmware updates, which are a critical component. I think it should not be blacklisted, specially because it provides updates for coreboot devices (e.g. System76)

#10

Updated by bill-auger almost 2 years ago

  • Description updated (diff)
#11

Updated by bill-auger almost 2 years ago

#12

Updated by avalos almost 2 years ago

However, the big difference here is that fwupd manages firmware updates, which are a critical component.

Firmware is indeed critical, so maybe we should not allow the manufacturer to introduce backdoors or shady stuff in further versions.

I think it should not be blacklisted, specially because it provides updates for coreboot devices (e.g. System76)

I don't think that's relevant at all. FSDG doesn't care about how important it is for you to update your blob-infested System76 laptop, but rather about shipping a system that is as free as possible, which blacklisting fwupd would help achieve.

Do we really want this? this issue is similar to the ones of third party package managers (pip, npm, flatpak) which offer both free and non-free software.

Well, seeing it from that perspective, then yeah, maybe fwupd shouldn't be blacklisted, it's just that maybe most firmware is proprietary. I don't know, avoiding proprietary firmware feels like one of the main reasons things like Parabola and Linux-libre exist, so it doesn't feel right to have a tool like this.

Let me know what y'all think.

#13

Updated by gap almost 2 years ago

See also #3000.
As mentioned there, we can either:
1. Blacklist entirely
2. Blacklist and replace with libre version which patches out references to LVFS
3. Number 2 but also add references to an LVFS replacement repo which only hosts libre firmware

As 3 is not yet possible due to no such repo existing and 2 would incur a maintenance overhead for a package that doesn't do much in the free world because no FSDG-compliant repo exists to use it with, 1 is the only option we have at the moment.

Please add any other options if you think of one.

#14

Updated by bill-auger over 1 year ago

  • Related to Freedom Issue #3000: [fwupd]: is an auto-updater , may also download proprietary firmware added
#15

Updated by bill-auger over 1 year ago

  • Related to Freedom Issue #3270: [fwupd-efi] Appears only to be useful with blacklisted [fwupd] added

Also available in: Atom PDF