NixOS Reproducible Builds | 555 Members | |
| Report: https://reproducible.nixos.org Project progress: https://github.com/orgs/NixOS/projects/30 | 128 Servers |
| Sender | Message | Time |
|---|---|---|
| 21 Jun 2021 | ||
In reply to @hexa:lossy.networkit's back to third place | 07:55:37 | |
| but i downvoted | 07:55:39 | |
this seems to miss the point of reproducibility, IMO | 07:58:03 | |
*
this seems to miss the point of reproducibility, IMO (I'm aware I'm preaching to the choir here though 😅) | 07:59:14 | |
| he wrote a blogpost about that a while back, too. I haven't re-read it, but it seems his point boils down to "X doesn't solve all problems of humanity, so it is useless" - which doesn't seem too helpful. | 08:00:16 | |
| * taviso wrote a blogpost about that a while back, too. I haven't re-read it, but it seems his point boils down to "X doesn't solve all problems of humanity, so it is useless" - which doesn't seem too helpful. | 08:01:18 | |
| I agree, that appears to be his opinion, and the claim that reproducible builds adds complexity is startling | 08:01:23 | |
| * taviso wrote a blogpost about that a while back, too. I haven't re-read it, but it seems the argument boils down to "X doesn't solve all problems of humanity, so it is useless" - which doesn't seem too helpful. | 08:01:33 | |
| well, it quite obviously adds complexity, as we have to Do Stuff to make it happen. It also reduces complexity in other places. How that balances out is not easy to quantify :) | 08:02:46 | |
| in the innocent case, unreproducible binaries still behave "the same" (this is very vague, since program equivalence is not trivial under compiler optimizations for instance) | 08:02:49 | |
| * in the innocent case, unreproducible binaries still behave "the same" (this is very vague, since program equivalence is not trivial under compiler optimizations for instance), but this quickly does not become the case | 08:03:28 | |
| you can use bit-for-bit reproducibility as evidence for the claim "my program is your program" | 08:04:03 | |
| and the more the environments under which you perform the build differ, if you still maintain identical binaries that's really good | 08:04:41 | |
| * and the more the environments under which you perform the build differ, if you still maintain identical binaries that's really good and the claim is even stronger | 08:04:57 | |
| taviso also makes a lot of incorrect assumptions on how we would use reproducibility, which makes his posts even harder to follow | 08:05:18 | |
| * taviso also makes a lot of incorrect assumptions on how we would use reproducibility, which makes the argument even harder to follow | 08:05:32 | |
| "the developer can insert a malicious bug therefore reproducibility is moot" | 08:08:02 | |
| atemu12: you mention you successfully reproduced the 21.05 ISO - did you also compare it to the one published at https://nixos.org/download.html ? When I did that I ran into https://github.com/NixOS/nixpkgs/issues/125380 | 08:09:25 | |
| 08:14:42 | ||
| Tavis in a nutshell: https://xkcd.com/2368/ | 08:16:19 | |
| But, not why I joined :) How is Nixos dealing with the linux signing key which gets generated during build to sign modules? | 08:16:52 | |
| Foxboron: IIRC we disable module signing, and then no key is generated (https://github.com/NixOS/nixpkgs/pull/107625) | 08:18:28 | |
| Thats.. uh.. not good? It makes lockdown mode unusable on NixOS if I'm not mistaken | 08:19:13 | |
| See the PR comments | 08:19:54 | |
| Yeah, that's not a good solution. But it also explains why I couldn't figure out how it was dealt with. :/ | 08:21:12 | |
In reply to @foxboron:archlinux.orgit makes lockdown unusable on a plain NixOS installation, but if you want lockdown, you likely also want other customizations. That is still very much possible on NixOS | 08:22:23 | |
| 'unusable' is perhaps not the right word, 'disabled by default'? | 08:22:36 | |
| You are also loosing the ability to detect tainted modules on any normal nixos installation. That is a net negative in terms of security for any live deployment. | 08:23:22 | |
| But yes, disabled by default is the correct word. | 08:23:40 | |
| for example, when using distro-provided signed modules, even after lockdown someone could get the signed modules for a floppy disk driver and elevate their privileges. Better to custom-compile a kernel and only sign the modules you want to have available on your secure system, or even disable the module system entirely. (though I realize I'm somewhat making the XKCD 2368 argument now ;) ) | 08:25:45 | |