!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

340 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.123 Servers

Load older messages


SenderMessageTime
1 Apr 2025
@jade_:matrix.orgjade_I DONT KNOW BUT I DO KNOW HOW MANY CVES THIS FUCKIN THING HAS CAUSED23:33:11
@jade_:matrix.orgjade_ did you know they are isolated by network namespace on linux??? infinite CVEs in container runtimes... 23:33:30
@artemist:mildlyfunctional.gayartemistif you're forced to have them then network namespace feels like the least bad place to isolate them, but oh god23:34:05
@jade_:matrix.orgjade_no it's not23:34:13
@artemist:mildlyfunctional.gayartemistoh, mount namespace?23:34:35
@jade_:matrix.orgjade_host netns allowing containers to send each other fds is how you get CVE-2024-27297 23:34:45
@jade_:matrix.orgjade_among also docker ones23:34:51
@artemist:mildlyfunctional.gayartemistnetwork namespace is where i would expect them to go23:35:03
@jade_:matrix.orgjade_CVE-2020-15257 lol23:35:14
@jade_:matrix.orgjade_but unix sockets exist as a fd passing primitive and secondarily as a network feature, in my view :)23:35:42
@jade_:matrix.orgjade_ the fact that you have to shove containers into a netns with NAT if you don't want them sending each other fds is a hilarious linux moment 23:36:14
@artemist:mildlyfunctional.gayartemistYeah, that's not the worst interpretation. It makes me think of how systemd is a database for file descriptors23:36:49
@artemist:mildlyfunctional.gayartemistsending file descriptors between mount namespaces at all feels sus23:37:15
@jade_:matrix.orgjade_it combines somewhat poorly with the userspace nat implementations being all kind of annoying. pasta, slirp4netns, etc23:37:17
@jade_:matrix.orgjade_it's ... well. i can see the use case for it in container setup, but it is pretty sketchy23:37:42
@jade_:matrix.orgjade_(and i think that it really should only be allowed on inherited fds)23:38:06
@artemist:mildlyfunctional.gayartemistI wonder how much would break if I patched linux to disallow abstract sockets23:39:28
@jade_:matrix.orgjade_they can be disabled via apparmor and other LSMs23:40:22
@artemist:mildlyfunctional.gayartemistsounds boring, i should just use a bpf lsm23:40:59
@rhelmot:matrix.orgrhelmotit sounds like the basic consideration is that root-in-jail is the basic ingredient for privesc, though it can be mitigated away. might be something we want to enable with an option only exposed to trusted users23:44:32
@artemist:mildlyfunctional.gayartemistYeah, that's probably a reasonable explanation. There's a lot of weird edge cases to deal with if you have untrusted root23:46:33
@jade_:matrix.orgjade_yeah, linux has had infinite kernel bugs because userns root is kind of a security model break, but it's too useful to get rid of23:47:03
@rhelmot:matrix.orgrhelmotu_u23:47:24
@rhelmot:matrix.orgrhelmotwhat a world23:47:27
@kfears:matrix.orgKFears (burning out)It's almost like Linux has never had a good security model...23:51:07
@jade_:matrix.orgjade_more congealed than designed23:51:32
@kfears:matrix.orgKFears (burning out)Pretty much, yeah23:51:57
2 Apr 2025
@kfears:matrix.orgKFears (burning out)Does anyone use (or wants to use) Forgejo milestones and Projects for like tracking stuff and visibility?00:17:16
@just1602:systemli.orgjust1602
In reply to @kfears:matrix.org
Does anyone use (or wants to use) Forgejo milestones and Projects for like tracking stuff and visibility?
They're already use from what I understand! If you check the milestone to remove regex ans other stuff like that
00:18:43
@kfears:matrix.orgKFears (burning out)Yeah there is some stuff, particularly in Projects, but milestones seem quite unused, and Projects are very basic "TODO/Done"00:19:48

Show newer messages


Back to Room ListRoom Version: 10