As Torvalds pointed out in 2019, is that while some major hardware vendors do sell Linux PCs – Dell, for example, with Ubuntu – none of them make it easy. There are also great specialist Linux PC vendors, such as System76, Germany’s TUXEDO Computers, and the UK-based Star Labs, but they tend to market to people who are already into Linux, not disgruntled Windows users. No, one big reason why Linux hasn’t taken off is that there are no major PC OEMs strongly backing it. To Torvalds, Chromebooks “are the path toward the desktop.”

    • realitista@lemmus.org
      link
      fedilink
      English
      arrow-up
      23
      arrow-down
      1
      ·
      edit-2
      18 hours ago

      For gaming and home use I think Windows will slowly die off. But I see precious few enterprise customers who are willing to consider Linux desktops for anyone other than sysadmins or programmers. Some will allow Macs for general users but I’ve never seen one that allows Linux.

      • ArcaneSlime@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 hours ago

        I’d try and get my work to switch, but apparently Zebra thermal printers (of which we have so many) don’t work well with CUPS, you may be able to do some weird shit to make them work but iirc it wasn’t too viable for a large scale operation.

        I’d wager a lot of companies do use things that just don’t work too well on linux yet, not that they couldn’t work it’s just that none of the people smarter than me who make linux happen have worked on it yet, and until they do it’s just what it is. Before we want to capture the enterprise market we need good easy to use thermal printing software, CNC software, laser etching software, stuff like that. It can be done too for at least most things I’m sure.

      • Em Adespoton@lemmy.ca
        link
        fedilink
        English
        arrow-up
        11
        ·
        16 hours ago

        Hard to enforce a GPO on Linux, unless it’s locked down like ChromeOS.

        That’s really the limiting factor: liability and support costs.

        • vacuumflower@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          2
          ·
          11 hours ago

          I think you can:

          1. set up something like Fedora Silverblue,
          2. disallow root,
          3. disallow sysrq and such,
          4. allow sudo only for select few things,
          5. refresh configuration centrally.

          I’m not sure it’s much more work than what I’ve seen in corporate environments with Windows.

          • enumerator4829@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            5
            ·
            10 hours ago

            I’ve managed Linux desktop fleets in enterprise-like environments. I’ll modify your list a bit:

            1. Use Rocky or RHEL (because the commercial software you want to use only has support for RHEL and/or Ubuntu)
            2. disallow root completely without exception
            3. do additional hardening
            4. don’t allow sudo for fucking anything
            5. run centrally controlled configuration management (most likely Puppet)
            6. Ironically - disallow any use of Flatpak, Snap and AppImage. They don’t play that well with Kerberized NFS-mounted home directories, which you absofuckinglutely will be required to use. (Might have improved since I tried last time, but probably not. Kerberos and network mounted directories,home or otherwise, are usually a hard requirement.)
            7. Install and manage all software via configuration management (again, somewhat ironically, this works very well with RPMs and DEBs, but not with Flatpak/Snap/Appimage). Update religiously, but controlled (i.e. Snap is out).
            8. A full reprovision of everything fairly regularly.
            9. You most likely want TPM-based unlocking of your LUKS encrypted drives, with SecureBoot turned on. This is very fun to get working properly in a Linux environment, but super simple to do on Windows.

            And as you have guessed, on Windows this requires a bit of point and click in SCCM to do decently.

            On Linux, you’ll wanna start by getting a few really good sysadmins to write a bunch of Puppet for a year or so.

            (If we include remote desktop capabilities in the discussion, I’ll do my yearly Wayland-rant.)

            • VirtuePacket@lemmy.zip
              link
              fedilink
              English
              arrow-up
              2
              ·
              7 hours ago

              The other thing you’ll need is for compliance and risk management frameworks (e.g. CMMC, ISO27001, CIS, etc.) to fully embrace Linux controls and environments. As of right now, it’s a patchwork full of holes and if you need to demonstrate compliance, it’s likely to be a lot more challenging running Linux workstations.

            • vacuumflower@lemmy.sdf.org
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              8 hours ago
              1. OK. I agree, but personally hate RHEL.
              2. Yes.
              3. Suppose so.
              4. Brightness and sound controls too?..
              5. Yep, meant that.
              6. I thought of something like company-issued laptops, which might be good to have functional without Internet connectivity sometimes, if it’s remote work.
              7. Dependent on the role some users might need to regularly install software you haven’t thought about.
              8. Yes.
              9. Well, disagree about SecureBoot, there’s nothing secure about MS signing your binaries. It’s just proof they are signed by MS. Setting TPM under Linux is, eh, something I’ve never done.
              • WhyJiffie@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                1
                ·
                6 hours ago

                Well, disagree about SecureBoot, there’s nothing secure about MS signing your binaries. It’s just proof they are signed by MS. Setting TPM under Linux is, eh, something I’ve never done.

                that’s the difficult part of SecureBoot: you need to set up MOK and somehow sign the bootloader, kernel, modules with it.
                but against small scale intrusions even the MS signed things could work

              • enumerator4829@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                1
                ·
                6 hours ago

                You need to have secure boot in order to have the disk decrypt without user input, otherwise the chain is untrusted. You can (and probably should) load your own keys into the firmware and sign everything yourself. MS has nothing to do with it, except that BitLocker is much better than anything any Linux distro has to offer today.

                You need to have the disk decrypt without user input, and you can’t have the secret with the user. (As the user is untrusted - could be someone stealing the laptop.) The normal Linux user mantra of ”I own the machine” does not apply here. In this threat model, the corporation owns the machine, and in particular any information on it.

                As for sudo, this is why we have polkit. (Yes, technically root, but you get my point)

                And as for number 7 - this is why most Windows fleets use ”Software Center” or similar. No reason you can’t do the same on Linux, just that no one has done it yet. (I mean, you can, with pull requests into a puppet repo, but that’s not very user friendly)

                Hate RHEL all you want, but first take a look at what distros have any kind of commercial support at all from software vendors. This is the complete list: RHEL, sometimes Rocky, sometimes Ubuntu. Go ask your vendor about Fedora Silverblue and see what happens. The primary reason to run Linux like this is usually to use a specific (and probably very expensive) software that works best on Linux, so distro choice is usually very limited to what that software vendor supports. (And when they say Linux, they are really saying ”the oldest still supported RHEL.)

                Basically, corporate requirements go completely against the requirements of enthusiasts and power users. You don’t need Secure Boot to protect your machine from thieves, but a corporation needs Secure Boot to protect the machine from you.

                • vacuumflower@lemmy.sdf.org
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  5 hours ago

                  MS has nothing to do with it, except that BitLocker is much better than anything any Linux distro has to offer today.

                  It’s a piece of software with closed source code. I am aware that people can hide (and have done so many times) a backdoor or a mistake in source code so that it’ll be harder to find than many problems in binaries without source provided.

                  Still harder to audit.

                  You need to have the disk decrypt without user input, and you can’t have the secret with the user. (As the user is untrusted - could be someone stealing the laptop.) The normal Linux user mantra of ”I own the machine” does not apply here. In this threat model, the corporation owns the machine, and in particular any information on it.

                  Smart cards?

                  Hate RHEL all you want, but first take a look at what distros have any kind of commercial support at all from software vendors. This is the complete list: RHEL, sometimes Rocky, sometimes Ubuntu.

                  I know.

                  Basically, corporate requirements go completely against the requirements of enthusiasts and power users. You don’t need Secure Boot to protect your machine from thieves, but a corporation needs Secure Boot to protect the machine from you.

                  Sigh. Okay.

                  • enumerator4829@sh.itjust.works
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    ·
                    3 hours ago

                    Look, I’m not saying BitLocker isn’t flawed. I’n m saying the alternatives on Linux are shit. All the primitives are there, and you can do it on Linux, with lots of work, testing and QC of all software updates on all your hardware (or else you’ll do manual entry of disaster recovery keys for the next decade). But on Windows it’s a checkbox to encrypt the entire fleet, along with management of recovery keys.

                    Also, on audits: for people doing checkbox security (i.e. most regulated industries), this is very easy to audit. You just smack in ”Bitlocker” and you are done. For some, the threat isn’t really information loss, it’s loss of compliance (and therefore revenue). Stupid, but here we are. If you mean actual security, then you are probably correct.

                    A smart cart only authenticates and identifies the user - it can’t do attestation of the boot chain. If we use a smart card for disk encryption, a malicious or compromised user can just pop out the SSD, mount and decrypt (using the smart card) on a separate machine and extract/modify data without a trace. If you use SB, the TPM and disk encryption as intended, you can trust both the user (via smart card) and the machine (probably via a Kerberos machine key). Basically, this method prevents the user from accessing or modifying data on their own machine.

                    Again, on Windows this is basic shit any Windows sysadmin can roll out easily following a youtube tutorial or something. Providing those same security controls on Linux will yield a world of pain.

                    We really need to make this easy on Linux. systemd-boot and UKIs are trying, but are not even close to enough.