!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

749 Members
Coordination and triage of security issues in nixpkgs231 Servers

Load older messages


SenderMessageTime
30 Jul 2021
@disrupt_the_flow:matrix.orgdisrupt_the_flowRedacted or Malformed Event11:44:22
@disrupt_the_flow:matrix.orgdisrupt_the_flowRedacted or Malformed Event11:45:30
@disrupt_the_flow:matrix.orgdisrupt_the_flowHello. Anyone using the hardened profile and KDE Wayland? Seems after issuing nixos-rebuild switch an error saying plasma5 attribute doesn't exist in pam.nix pops up. The fuck?11:50:50
@linus.heckemann:matrix.mayflower.deLinux Hackerman
In reply to @disrupt_the_flow:matrix.org
Hello. Anyone using the hardened profile and KDE Wayland? Seems after issuing nixos-rebuild switch an error saying plasma5 attribute doesn't exist in pam.nix pops up. The fuck?
Don't use the hardened profile
14:03:36
@linus.heckemann:matrix.mayflower.deLinux HackermanAt least not without reading and understanding it fully14:03:50
@disrupt_the_flow:matrix.orgdisrupt_the_flow
In reply to @linus.heckemann:matrix.mayflower.de
At least not without reading and understanding it fully
I did read it and somewhat understood it. An issue was with the memory allocator. If the allocator wasn't libc nothing worked. Even after reinstalling. Dunno why. Maybe Wayland? Anyway as for the above error idk.
14:28:42
@seniorivn:matrix.org@seniorivn:matrix.org joined the room.14:30:28
@linus.heckemann:matrix.mayflower.deLinux HackermanThe hardened profile breaks things. Don't use it if it break things you need.14:39:22
@linus.heckemann:matrix.mayflower.deLinux HackermanSorry, I'm in a bit of a foul mood for unrelated reasons and this probably isn't the best disposition to be helping people in. I'll be off.14:40:27
@tnias:stratum0.orgtniasEspecially on a desktop/workstation it is not usable. Would not recommend.14:41:14
@philipp:xndr.dephilipp changed their profile picture.20:21:15
@mlieberman85:matrix.orgMichael LiebermanHas anyone taken a look at OpenSSF's new SLSA standard for supply chain security? https://slsa.dev/ Seems like just by its nature Nix hits the highest level for most things. https://slsa.dev/21:00:55
@sandro:supersandro.deSandroDefinitely not A22:45:29
@sandro:supersandro.deSandroAnd most of the other could be circumvented but not in the default configuration. Also we could have bad npm packages, too.22:46:19
@sandro:supersandro.deSandroBut we avoid some attack vectors due to the build sandbox22:46:32
@mlieberman85:matrix.orgMichael LiebermanInteresting. I'm not super deep yet on Nix internals. Does SLSA seem like a reasonable standard? It's pretty new and based on Google's internal Binary Authorization standards. I'm a bit cautious on some of the claims the SLSA standard makes because it relies on "trusted control plane" and similar. If so is there any doc or anything I could read up on regarding current Nix security concerns (that aren't confidential)22:53:46
@sandro:supersandro.deSandro I don't know if it is reasonable but I didn't read to much weird stuff yet. 23:09:03
@sandro:supersandro.deSandroNix has probably all of the security problems that come with a big open source project where not everyone knows everyone and every part of the code23:09:56
31 Jul 2021
@roosemberth:orbstheorem.chRoos

Dependencies have their own SLSA ratings, and it is possible for a SLSA 4 artifact to be built from SLSA 0 dependencies

Specially this.

08:30:08
@roosemberth:orbstheorem.chRoos We may have provenance, build signature and somewhat reproducible builds (arguable), but we're still pulling stuff from unknown sources. 08:31:07
@sandro:supersandro.deSandroYeah well, we need to get the source from somewhere08:33:14
@roosemberth:orbstheorem.chRoosIMHO, SLSA 2 is missing non-repudiability.08:33:36
@roosemberth:orbstheorem.chRoos
In reply to @sandro:supersandro.de
Yeah well, we need to get the source from somewhere
Yes. Security-sensitive processes do review source changes before using them, we don't.
08:34:36
@disrupt_the_flow:matrix.orgdisrupt_the_flow
In reply to @linus.heckemann:matrix.mayflower.de
The hardened profile breaks things. Don't use it if it break things you need.
Yeah I know and I fixed some but this specific one is weird.
08:35:03
@roosemberth:orbstheorem.chRoosInteresting read, thanks ^^08:36:49
@sandro:supersandro.deSandro
In reply to @roosemberth:orbstheorem.ch
Yes. Security-sensitive processes do review source changes before using them, we don't.
I am pretty sure security sensitive processes also try to use as little packages as possible and not literally anything. I think we do it sometimes for core packages but not for every package
08:37:34
@roosemberth:orbstheorem.chRoosOh, I didn't know we did source-review!08:38:31
@r_i_s:matrix.orgris_.... depends what you mean by source review ....18:51:54
@r_i_s:matrix.orgris_and what sort of attack scenario we'd be trying to catch by such a review18:52:31
@r_i_s:matrix.orgris_there are few if any packages where we review the (source) diff of every bump18:54:20

Show newer messages


Back to Room ListRoom Version: 6