!9IQChSjwSHXPPWTa:lix.systems

Lix

1138 Members
Lix user channel. Feel free to discuss on-topic issues here and give each other help. For matrix.to links to the rest of the Lix channels, see: https://wiki.lix.systems/books/lix-organisation/page/matrix-rooms314 Servers

Load older messages


SenderMessageTime
8 Apr 2026
@whispers:catgirl.cloudwhispers [& it/fae]if you've used cppnix, all of the same rules for auto-update apply, pretty much01:17:10
@whispers:catgirl.cloudwhispers [& it/fae]* it depends on how you install your lix. if you use nixos or nix-darwin it should automatically update. if you install it standalone from the install script, you'll have to update yourself.01:17:26
@idiomrat:matrix.orgidiomokay yeah i use nixos01:17:37
@idiomrat:matrix.orgidiomtyy01:17:41
@whispers:catgirl.cloudwhispers [& it/fae]* if you've used cppnix, pretty much all of the same rules for auto-update apply01:18:28
@aloisw:kde.orgaloisw
In reply to @blokyk:matrix.org
(basically, if i understand correctly: on linux, it allows giving as much flexibility as possible to derivations that use the network (normally only fixed-output derivations), by putting them in "user namespaces" (a similar mechanism to how isolation works for containers). without pasta, you'd need to run a larger chunk of the network- and isolation-managing code as root, extending the attack surface (and generally making things messier and harder to maintain))
The problem is not so much that the network management code runs as root but more that the builders share a network namespace with each other and the host.
04:44:17
@blokyk:matrix.orgzoë (she/her) thanks for the clarification! though i'll admit i'm a little confused as to why being in the same network namespace might be an attack vector (except from seeing "something something unix abstract domain socket something something dangerous" everywhere, for which i could only find one example of an attack and it did not seem relevant to nix) 06:22:42
@k900:0upti.meK900Leaking things over abstract domain sockets is a big part of that yes06:23:51
@blokyk:matrix.orgzoë (she/her)okay but how does that work exactly? do you have any example of a cve/attack or some ressource i could check out to understand how that might be a vulnerability? i don't know much about abstract domain sockets so i'm having a hard time seeing how a socket could be a vulnerability ;-;06:27:25
@k900:0upti.meK900Basically, abstract domain sockets are global in a netns06:29:53
@k900:0upti.meK900As in, two things can just bind and connect to a socket by name06:30:17
@k900:0upti.meK900And talk to each other06:30:20
@aloisw:kde.orgaloiswAnd send file descriptors to each other, which is what happened in multiple Nix/Lix vulnerabilities.07:15:22
@emilazy:matrix.orgemilyone of the 2025 CVEs involved abstract domain sockets11:41:07
@kfears:matrix.orgKFears& 🏳️‍⚧️ (they/them)For someone not familiar with abstract domain sockets: why are they a thing and why not just use network sockets?..11:49:11
@lotte:chir.rsLotte (it/its)/Cinny (she/her) θΔ&you can have however many you need of them (instead of a system-wide limit of 64511 per ip address for network sockets) and you can use them to transport file handles11:54:51
@delroth:delroth.netdelrothpeer credentials is another big reason11:57:23
@lotte:chir.rsLotte (it/its)/Cinny (she/her) θΔ&oh that too11:57:58
@goodboy:matrix.orglord_fomo joined the room.17:04:02
@goodboy:matrix.orglord_fomowoo y'all actually discussing the undelying issue. me likey B)17:06:10
@epiceric:nixos.devEpic Eric joined the room.17:12:09
@aloisw:kde.orgaloisw AF_UNIX sockets are nice, yes, but filesystem-bound ones and socketpair ones have the same advantages and don't weirdly live in the network namespace where no one expects them. 17:31:48
@llakala:matrix.orgllakala
In reply to @llakala:matrix.org
you have to use a lot of pwd nonsense bc when executing, ./. is defined as the path of the repl-overlay, not your current path
btw it would be wonderful if I didn't have to use $PWD to get the current path in a repl-overlay
18:00:03
@llakala:matrix.orgllakalafeels like a bug to me that the ./. isn't the current path in that context18:00:46
@llakala:matrix.orgllakalaI can make an issue if core team agreess18:00:53
@llakala:matrix.orgllakala* I can make an issue if core team agrees18:01:06
@acidbong:unredacted.orgAcid Bong joined the room.18:35:56
@acidbong:unredacted.orgAcid Bong evening. now that since 2.95 log format is configurable in nix.conf, it's also no longer possible to switch to with-logs version with -L (e.g., if multiline is used, appending -L would turn it into multiline-with-logs).

was that a desired change? is there maybe a move to a more symmetric switch, such that --log-format bar --log equals --log-format bar-with-logs and --log-format multiline-with-logs --no-log equals --log-format multiline?
18:49:43
@mall0c:matrix.orgmall0c joined the room.18:54:15
@mall0c:matrix.orgmall0cIs there a comparison of features or incompatibilities between CppNix and Lix?18:55:18

Show newer messages


Back to Room ListRoom Version: 10