NixOS Security Triage | 692 Members | |
| Coordination and triage of security issues in nixpkgs | 215 Servers |
| Sender | Message | Time |
|---|---|---|
| 30 May 2021 | ||
| both I'd say | 18:24:10 | |
| ok | 18:24:25 | |
| I even tried making NixOS play nice in Bedrock but failed (for now only, I'll continue research in that matter) | 18:24:30 | |
| So what I meant to say is: If we today encounter an issue with OpenSSL $version and we make a commit that bumps OpenSSL to $version+1 that is no longer affected by $heartbleed then we have a single git commit id that we can use to tell people: If you run anything >= $commit then you systems are not affected anymore. | 18:25:59 | |
| And we can also say: If you run < $commit you are (very?) likely affected | 18:26:15 | |
In reply to @kunrooted:matrix.orghttps://github.com/bedrocklinux/bedrocklinux-userland/issues/221 link related | 18:26:23 | |
In reply to @andi:kack.ityeah, quite simple concept I think | 18:26:46 | |
| Whilst with Debian, Ubuntu, RHEL, .. you'd have to stick to timestamps (uploaded to the repos) and package versions (that contain a fix) | 18:26:53 | |
| And to make it worse tell everyone which of the many repos have been updated | 18:27:19 | |
| Granted in practice that is slightly different but you get the picture. | 18:27:28 | |
| You have a lot more moveable parts that have to be checked. | 18:27:38 | |
| yeah, on non-Nix packages you're forced to that and you have no ability to use specific commits of software | 18:27:41 | |
| I liked that | 18:28:08 | |
| a) do I have the security repo? b) did I update the repo before installing upgrades/updates c) Was my mirror up2date? | 18:28:11 | |
| * I liked that in Nix and especially in flakes where I have more control over that | 18:28:22 | |
| andi-: My question on non nixos systems is usally "what version is that package", then list it via the package manager and check whether the version of that specific package is sufficient. | 18:29:18 | |
| btw, how well does single-user install of Nix work? | 18:29:44 | |
because when all users have an access to /nix/store, it doesn't sound good, or maybe I'm not too experienced to block it in other way than just performing a single-user installation of Nix on non-NixOS | 18:30:21 | |
on NixOS all users have an access to /nix/store, am I right? | 18:30:35 | |
| Yeah, you can have old (vulnerable) paths in /nix/store even after upgrading your system. | 18:30:54 | |
| but that is kind the point. You want the ability to go back or in Debian speech downgrade a package again if it turns out to be making trouble. | 18:31:30 | |
afaik nix-collect-garbage should take care of old versions laying in /nix/store, right? | 18:32:43 | |
| you should be able to install the store into your home dir | 18:32:47 | |
| One thing you could probably look into more: Time to rollout of fixes after they have been committed. How long does a rebuild of the closure take for an "average" user? Is that a huge downside? How much that this increase the risk of someone exploiting your systems? | 18:33:21 | |
| kunrooted: yes, nix-collect-garbage will do that while still honoring generations/profiles. | 18:33:52 | |
In reply to @andi:kack.itokie | 18:34:57 | |
| I also have a 'topic list' for now, maybe this will generate even more ideas if I share it:
in the meantime, I made a PoC of interpreter/loader/library hijack, which I'll also try to cover | 18:36:03 | |
| * I also have a 'topic list' for now, maybe this will generate even more ideas if I share it:
in the meantime, I made a PoC of interpreter/loader/library hijack, which I'll also try to cover as a topic in that paper of mine | 18:36:19 | |
| * I also have a 'topic list' for now, maybe this will generate even more ideas if I share it:
in the meantime, I made a PoC of interpreter/loader/library hijack, which I'll also try to cover as a topic in that paper of mine | 18:38:37 | |
about unpriviliged users can install packages: That is true on any normal linux desktop/server. Even if the package manager doesn't help you, local users will be able to execute all the code they want to. | 18:38:41 | |