!9IQChSjwSHXPPWTa:lix.systems

Lix

1117 Members
Lix user channel. Feel free to discuss on-topic issues here and give each other help. For matrix.to links to the rest of the Lix channels, see: https://wiki.lix.systems/books/lix-organisation/page/matrix-rooms309 Servers

Load older messages


SenderMessageTime
15 Mar 2026
@k900:0upti.meK900 No, you do all of the evaluation on a trusted evaluator 13:54:29
@k900:0upti.meK900 And the builders only do building 13:54:41
@k900:0upti.meK900The evaluator is necessarily trusted in any model, because the evaluator is what creates the identity of a workload13:55:14
@blokyk:matrix.orgzoë (she/her)so you have to trust every dependency of everything you're building? cause except if your top drv is the one that needs the secret, that seems like it just opens up more attack surface13:55:46
@k900:0upti.meK900 No, you trust your evaluator to only allow secret access to specific workloads 13:56:17
@blokyk:matrix.orgzoë (she/her)yes, i understand that the evaluator is implicitly trusted, i understand that; what i don't trust is the derivations13:56:29
@kfears:matrix.orgKFears 🏳️‍⚧️ (they/them)
In reply to @blokyk:matrix.org
so you have to trust every dependency of everything you're building? cause except if your top drv is the one that needs the secret, that seems like it just opens up more attack surface
That's kinda already the case
13:56:38
@blokyk:matrix.orgzoë (she/her)yes but how would it know that ;-;13:56:42
@k900:0upti.meK900 And if you're worried about trusting-trust style attacks where you build a hacked curl that steals your secrets 13:56:51
@k900:0upti.meK900 Then you have bigger problems anyway 13:56:57
@k900:0upti.meK900
In reply to @blokyk:matrix.org
yes but how would it know that ;-;
How would it know what?
13:57:23
@blokyk:matrix.orgzoë (she/her)how would it know which drv/workloads to allow secret access to?13:57:52
@k900:0upti.meK900 Likely via some meta attribute on the derivation 13:58:10
@k900:0upti.meK900 And probably some additional filtering on top 13:58:19
@blokyk:matrix.orgzoë (she/her) well that's the case with building the software, but that's a different problem (e.g. you might be able to jail/virtualize it or whatever depending on your context); here we're trying to protect secrets on the build machine, but builds with nix don't have access to those anyway by default, so even if a derivation is written in a malicious way that tries to access /etc/shadow or /run/secrets or whatever, it won't be able to 14:00:33
@blokyk:matrix.orgzoë (she/her)like yeah, it's already a (big) problem, but it's a different attack vector14:02:43
@blokyk:matrix.orgzoë (she/her) where would that come from? how do you know it's not some unrelated derivation that just skimmed the meta.identity attribute from another drv? cause i can't see anyway to do that with a user in the loop (or some kind of heuristics, but as we all know from avast&co, that'd never be reliable) ;-; 14:03:53
@blokyk:matrix.orgzoë (she/her) * where would that come from? how do you know it's not some unrelated derivation that just skimmed the meta.identity attribute from another drv? cause i can't see anyway to do that with a user in the loop (or some kind of heuristics, but as we all know from avast&co, that'd never be reliable ;-;) 14:03:58
@blokyk:matrix.orgzoë (she/her) * where would that come from? how do you know it's not some unrelated derivation that just skimmed the meta.identity attribute from another drv? cause i can't see anyway to do that with a user in the loop (or some kind of heuristics, but as we all know from avast&co, that'd never be reliable) ;-; 14:04:05
@k900:0upti.meK900You can generally track down where the attribute was defined14:04:19
@k900:0upti.meK900And e.g. assert it's in your code repository directly14:04:25
@k900:0upti.meK900And not somewhere in nixpkgs14:04:29
@k900:0upti.meK900Also, nixpkgs targeting your secret retrieval scheme is basically in the same threat model as trusting-curl14:04:49
@blokyk:matrix.orgzoë (she/her)hmm ok, i can see that; it's not a very elegant design but i'll admit i can't see any immediate security problems here for our attack model14:05:50
@blokyk:matrix.orgzoë (she/her)thank you for educating me :)14:05:59
@blokyk:matrix.orgzoë (she/her)* thank you for indulging/educating me :)14:06:06
@blokyk:matrix.orgzoë (she/her)* hmm ok, i can see that; it's not a very elegant design but i'll admit i can't see any immediate security problems here for our attack model (ignore trusting trust, but yeah that's a whole can o' worms)14:16:59
@blades:interestingt.imblades joined the room.17:25:32
@isabel:isabelroses.comisabel changed their profile picture.20:56:46
@blokyk:matrix.orgzoë (she/her) i git pulled my lix copy earlier and am now reading the 2.95 release notes ahead of time, and i just to say: i know it's a tiny ux thing, but Qyriad thank you so much for the nix store delete thing, it's so annoying every time, and the reason why i opened the repo was specifically because i wanted to figure out if that would be possible x) 21:11:14

Show newer messages


Back to Room ListRoom Version: 10