I've done some reading about immutable Linux distros and, well, I guess I don't get what all the fuss is about. The idea seems to be to 'harden' a system by making it hard to modify, but. . .
Isn't that already supposed to be the case for non-root Linux users on any distro? - the filesystem is already functionally immutable for everyone but root, because of user/group/acl permissions restrictions on files and dir, outside of their own home dir (unless they are given write access for some reason, either via group membership, ACL, or being made the owner of a dir). An immutable home dir would be pretty useless, so I presume that even on immutable distros, you can still write to your home dir to your heart's content.
So what is actually new? I guess the idea is that even if, say some malware manages to get elevated to root through some exploit, it still couldn't change the system, but. . . well, I don't think long term that will work, because at some point, at the end of the day, root needs to be able to install new apps and make other changes to the system (e.g. changing config files under /etc), so there must still be a mechanism for root to make such changes, and so, whatever that mechanism is, what's to stop malware from, after elevating itself to root, using that mechanism to make changes?
Isn't that already supposed to be the case for non-root Linux users on any distro? - the filesystem is already functionally immutable for everyone but root, because of user/group/acl permissions restrictions on files and dir, outside of their own home dir (unless they are given write access for some reason, either via group membership, ACL, or being made the owner of a dir). An immutable home dir would be pretty useless, so I presume that even on immutable distros, you can still write to your home dir to your heart's content.
So what is actually new? I guess the idea is that even if, say some malware manages to get elevated to root through some exploit, it still couldn't change the system, but. . . well, I don't think long term that will work, because at some point, at the end of the day, root needs to be able to install new apps and make other changes to the system (e.g. changing config files under /etc), so there must still be a mechanism for root to make such changes, and so, whatever that mechanism is, what's to stop malware from, after elevating itself to root, using that mechanism to make changes?