LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 08-14-2020, 07:21 AM   #46
drmozes
Slackware Contributor
 
Registered: Apr 2008
Distribution: Slackware
Posts: 1,549

Rep: Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313

Quote:
Originally Posted by TheTKS View Post
It's overly generous to attribute this to a lack of command of the English language (another poster was allowing him the benefit of the doubt.) Both the essential overt message and the subtext come through loud and clear.
Agreed. I find abga's English perfectly good and quite frankly if they hadn't said so, I would have assumed native speaker.
 
Old 08-14-2020, 09:34 AM   #47
resolver
Member
 
Registered: Jun 2020
Posts: 61

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by Alien Bob View Post
Again, Slackware is not a from-source distribution. Packages get rebuilt using the binaries presently available. That means, there is an original rust package which was written in ocaml and compiled into a package.
If no talented hacker or state actor was able to inject any one of those binaries with a persistent malware during that chain of compilation, fine, but if they did, all future rust compilers and/or libraries could have that malware.

It's like you're cooking with a pot you never clean and you're proud of it, and if anyone questions you you sneer and walk away.
 
Old 08-14-2020, 09:39 AM   #48
resolver
Member
 
Registered: Jun 2020
Posts: 61

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by dugan View Post
Yes I did.
OK, here's what you said: To say that there's a "potential" backdoor is just a scary FUD way to say to say that there is "no" backdoor; it means exactly the same thing.

But if you think about it, potential is a probability > 0, whereas "no" is a probability of 0, these are by definition not the same thing.

You're making more of an evangelical argument of certainty with no proof to back it up except your blind faith, or perhaps fear and denial.
 
Old 08-14-2020, 09:46 AM   #49
drmozes
Slackware Contributor
 
Registered: Apr 2008
Distribution: Slackware
Posts: 1,549

Rep: Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313
Quote:
Originally Posted by resolver View Post
If no talented hacker or state actor was able to inject any one of those binaries with a persistent malware during that chain of compilation, fine, but if they did, all future rust compilers and/or libraries could have that malware.
I don't think anybody is arguing with this point. It's been pointed out already that this is a known hole in the whole chain of trust.

Quote:
It's like you're cooking with a pot you never clean and you're proud of it, and if anyone questions you you sneer and walk away.
No, this assertion also doesn't hold water (no pun intended!). With a dirty pot, you can clean it.
With what we're discussing here, this is not the case: we're *aware* of what you are saying (and I and many others in this thread acknowledge it and agree with it!), and pointing out the underlying principles and practicalities of obtaining software over the Internet from which one cannot escape.
I cannot see why this is not being comprehended.

Last edited by drmozes; 08-14-2020 at 09:57 AM.
 
Old 08-14-2020, 09:47 AM   #50
resolver
Member
 
Registered: Jun 2020
Posts: 61

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by drmozes View Post
To me, this is all security rhetoric. Security is about minimising risk, not elminating it.
You can minimize some risks and eliminate others.

1. Eliminating risk
Example: Removing the flash player eliminated scores of potential malware attacks.

2. Minimizing risk
To minimize you have to avoid reckless practices and taking risks. The decision of the Rust community to download binaries without asking permission, even if it doesn't apply to the way Slackware is actually built, shows a recklessness and riskiness like that of a drunk driver. The fact that mozilla thinks using Rust for Firefox is a good idea puts their commitment to protecting their users in doubt.
 
1 members found this post helpful.
Old 08-14-2020, 09:52 AM   #51
drmozes
Slackware Contributor
 
Registered: Apr 2008
Distribution: Slackware
Posts: 1,549

Rep: Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313
Quote:
Originally Posted by resolver View Post
The fact that mozilla thinks using Rust for Firefox is a good idea puts their commitment to protecting their users in doubt.
Given everything discussed here, the only thing extra I have to say on this is I wish they'd stop using rust because of a number of reasons.
1. The unstable ABI.
2. The complexity that exists within Firefox (and other projects) to try and map the rust architecture trip/quadlet names into the auto-tools versions. It's total madness to me, and only seems to affect non-x86/64 architectures.
 
Old 08-14-2020, 10:01 AM   #52
resolver
Member
 
Registered: Jun 2020
Posts: 61

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by chemfire View Post
Here is the thing; almost any attacker is going to take the path of least resistance.
Some would take the opposite approach: If they can expend a relatively large effort just once ("one and done") in order to gain a persistent compromise, some will.
Recall that some attacks have gone unnoticed for months and years. Attackers, especially governments, want to be on the most computers for the longest period of time. Linux can't be left out of that so they will seek a way in.
In the case of a computer language, the upfront effort would be technical to gain the compromise, and then after that it would be social, encouraging "useful idiots" (a term of art) to become fanboys and promote the language despite public resistance.
 
Old 08-14-2020, 10:04 AM   #53
resolver
Member
 
Registered: Jun 2020
Posts: 61

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by Alien Bob View Post
This is frankly quite insulting. Does not belong in this forum.
So says the person who issues ad hominem attacks. Pot kettle black.
 
1 members found this post helpful.
Old 08-14-2020, 10:18 AM   #54
resolver
Member
 
Registered: Jun 2020
Posts: 61

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by Geist View Post
Slackware is not LFS, yet it still also has all the sources visible.
So, you can theoretically build it from scratch, too, with some elbow grease on your end.
It should be possible for everyone to rebuild the distro, get hashes for every txz file, and when they compare their hashes they should be identical.

That's the concept of reproducible builds. It's just a simple concept that source tarball X always gives you binary Y.

Open source doesn't mean much if the binaries that are offered online don't match those that you build yourself.

Reproducible builds have the potential to protect against fraud, as when some project says "these are the sources we use" but actually they're patching it with malware because they want to, or some organization is pressuring them to.
 
Old 08-14-2020, 10:31 AM   #55
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: distro hopper
Posts: 11,242

Rep: Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322
Quote:
Originally Posted by resolver View Post
You're making more of an evangelical argument of certainty with no proof to back it up except your blind faith, or perhaps fear and denial.
Quote:
Originally Posted by resolver View Post
So says the person who issues ad hominem attacks. Pot kettle black.
* cough

...

I'm going to put you on my ignore list now. If you come back with taunts about cowardice or surrender (as I suspect your first impulse will be), then you will simply be proving that you've always intended to be the troll you've been acting like.

Last edited by dugan; 08-14-2020 at 10:35 AM.
 
Old 08-14-2020, 10:38 AM   #56
drmozes
Slackware Contributor
 
Registered: Apr 2008
Distribution: Slackware
Posts: 1,549

Rep: Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313Reputation: 1313
Quote:
Originally Posted by resolver View Post
It should be possible for everyone to rebuild the distro, get hashes for every txz file, and when they compare their hashes they should be identical.

That's the concept of reproducible builds. It's just a simple concept that source tarball X always gives you binary Y.

Open source doesn't mean much if the binaries that are offered online don't match those that you build yourself.

Reproducible builds have the potential to protect against fraud, as when some project says "these are the sources we use" but actually they're patching it with malware because they want to, or some organization is pressuring them to.
And what system are you going to be building on? a Slackware system? If this is the case, this highlights the fundamental problem you're referring to.
How do you know the system you're building the packages on (even if they give the same hashes) isn't already compromised.
This goes for any distribution, hence why I pointed out the issues with Symantec, Intel..
How do you know the food you eat isn't poisoned? Do you trust your supermarket/shops/whatever?

This is what we've been pointing out all along.

Last edited by drmozes; 08-14-2020 at 10:40 AM.
 
Old 08-14-2020, 10:39 AM   #57
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,616
Blog Entries: 19

Rep: Reputation: 4460Reputation: 4460Reputation: 4460Reputation: 4460Reputation: 4460Reputation: 4460Reputation: 4460Reputation: 4460Reputation: 4460Reputation: 4460Reputation: 4460
Surely the key to Slackware security is the slackbuild. With other binary distros, you have to take the downloaded package on trust. Essentially what you download is a blob. Yes, you have access to the source (GPL requires that) but, as resolver says, a single source package can generate multiple binaries depending on how the build was configured.

With source-based distros like Gentoo and Crux, you only download source code, which is plain text. No blobs! But you pay for that with long, slow builds. At least that's what happens when you use hardware like mine.

Now with Slackware, you have access to both the source and the slackbuild. That means you can build it yourself, knowing that the result will have the same functionality as the binary built by Pat and his team. In fact, once slack is installed, there's nothing to stop you from rebuilding each and every package if you're paranoid. You have the convenience of binary with the security of source.

As to FF using rust, I don't like it but I can see why they did it. The switch to rust hugely speeded up the running program. I remember being amazed at the difference the first time I used a rust-based version.

And btw, rustc isn't the only compiler that can only be built by itself. The same is true of gcc. Apparently other C compilers can't build it. But I haven't noticed anyone complaining about that.

Last edited by hazel; 08-14-2020 at 10:48 AM.
 
Old 08-14-2020, 10:41 AM   #58
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: distro hopper
Posts: 11,242

Rep: Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322
Quote:
Originally Posted by hazel View Post
And btw, rustc isn't the only compiler that can only be built by itself. The same is true of gcc. Apparently other C compilers can't build it. But I haven't noticed anyone complaining about that.
I've pointed that out multiple times. Resolver has made a point of ignoring it. (Obviously because acknowledging it would damage his position).

Last edited by dugan; 08-14-2020 at 11:06 AM.
 
Old 08-14-2020, 10:49 AM   #59
keithpeter
Member
 
Registered: Nov 2015
Location: 52:30N 1:55W
Distribution: Slackware 15.0, OpenBSD 7.4
Posts: 310

Rep: Reputation: Disabled
Quote:
Originally Posted by resolver View Post
That's the concept of reproducible builds. It's just a simple concept that source tarball X always gives you binary Y.
Good evening (UK) and hope we are all well.

I'm wondering if the OP would be happier contributing patches to one of the projects listed at

https://reproducible-builds.org/

Personally, I'm (provisionally) happy to trust the various moving parts in the Slackware project. It strikes me that this is at the end of the day a personal choice.
 
Old 08-14-2020, 11:15 AM   #60
resolver
Member
 
Registered: Jun 2020
Posts: 61

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by drmozes View Post
And what system are you going to be building on? a Slackware system? If this is the case, this highlights the fundamental problem you're referring to.
How do you know the system you're building the packages on (even if they give the same hashes) isn't already compromised.
Is it possible that working at a security company make someone give up all hope and become cynical? Like you feel you're trying to achieve good hygiene in a truck stop bathroom?

Generating a distro is a higher duty than keeping your personal computer clean. It is more like keeping a biosafety lab clean. It has to be done right. Minimize or eliminate all risks. Wipe the build computer's hard disk before starting. Install only the bare minimum, most carefully examined software to perform the build. Disconnect the Internet.

If a regimen of good computing hygiene is instituted, instead of shrugging it off as too hard, not worth my time, not my problem, impractical, then there is a real chance of improving security. It's when people take a bad attitude about following proper procedures that you hear in the news about 30 people getting food poisoning at a restaurant, or bridges collapsing, or any other number of disasters that result from shirking responsibility.
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Potential Exploit? Potential Backdoor? Strange code in '/usr/android/adb' Package: android-tools-adb slicktrail Linux - Security 1 12-05-2016 05:05 AM
LXer: What The Intelligence Community Doesn't Get: Backdoor For 'The Good Guys' Is Always A Backdoor LXer Syndicated Linux News 0 01-11-2014 06:50 AM
Will a RISK Processor Run on Linux, PA-RISK 8500 at 400MHz CPU IBNETMAN79 Linux - General 2 03-08-2002 07:09 PM
Will a RISK Processor Run Linux, PA-RISK 8500 CPU IBNETMAN79 Linux - Newbie 1 03-08-2002 06:49 PM
Will A RISK CPU Run Linux, HP PA-RISK 8500 CPU IBNETMAN79 General 0 03-08-2002 06:39 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 03:34 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration