BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Debian 12 in the Cloud
- Subject: [Discuss] Debian 12 in the Cloud
- From: richard.pieri at gmail.com (Rich Pieri)
- Date: Tue, 4 Jun 2024 08:25:28 -0400
- In-reply-to: <20240604020416.0f730e28@mydesk.domain.cxm>
- References: <a09a4ca0-bfc8-4c5c-ad30-e307be9e2cc1@borg.org> <f840e62cb5c88c336909575f0acc5365.squirrel@mail.mohawksoft.com> <20240601230337.2a901446@mydesk.domain.cxm> <20240602104210.4165888d.Richard.Pieri@gmail.com> <20240603155857.3eae5d9d@mydesk.domain.cxm> <20240603174623.1bb67a97.Richard.Pieri@gmail.com> <20240604020416.0f730e28@mydesk.domain.cxm>
On Tue, 4 Jun 2024 02:04:16 -0400 Steve Litt <slitt at troubleshooters.com> wrote: > >You said there is a correlation even if it's not 1:1. > > > >I said that no such correlation exists. It's a myth. > > I'll need to see the URL to the statistical survey showing that in > order to accept it. I accept, and completely agree, that smaller, simpler code *can be* everything you say: easier to understand, easier to test, etc. It's a good programming philosophy to have. The myth is that size of attack surface *is* directly correlated with line count. This myth assumes that every line of every program is of consistent quality, and that every line of every program has the same exposure to attack. On the one hand, I don't know of any statistical surveys which demonstrate that neither assumption is true in the real world. On the other, do we really need such a thing in order prove that Daniel J. Bernstein writes better, safer code than Lennart Poettering? > The preceding timeline sounds reasonable and I believe it. However, it > doesn't contradict my point that systemd has too many dependencies for > them to handle, and distros deploying systemd can't do all the due > diligence to make sure it isn't a pathway to a supply chain attack. I have never denied the base assertion: systemd started life as a buggy mess, and has grown far too complicated with far too many dependencies to be reasonably managed. My disagreement is over the assertion that this badness is why the XZ supply chain attack happened. This simply is not true. The *form* of the attack was tailored to that specific dependency chain, but the reason why systemd and XZ were attacked and exploited is because they exist. If that dependency chain did not exist, if systemd were better designed, then the attack would have taken a different form, one tailored to that reality instead of ours. -- \m/ (--) \m/
- Follow-Ups:
- [Discuss] Debian 12 in the Cloud
- From: benjamin.p.kallus.gr at dartmouth.edu (Ben Kallus)
- [Discuss] Debian 12 in the Cloud
- From: daniel at syntheticblue.com (Daniel M Gessel)
- [Discuss] Debian 12 in the Cloud
- References:
- [Discuss] Debian 12 in the Cloud
- From: slitt at troubleshooters.com (Steve Litt)
- [Discuss] Debian 12 in the Cloud
- From: richard.pieri at gmail.com (Rich Pieri)
- [Discuss] Debian 12 in the Cloud
- From: slitt at troubleshooters.com (Steve Litt)
- [Discuss] Debian 12 in the Cloud
- From: richard.pieri at gmail.com (Rich Pieri)
- [Discuss] Debian 12 in the Cloud
- From: slitt at troubleshooters.com (Steve Litt)
- [Discuss] Debian 12 in the Cloud
- Prev by Date: [Discuss] Debian 12 in the Cloud
- Next by Date: [Discuss] Debian 12 in the Cloud
- Previous by thread: [Discuss] Debian 12 in the Cloud
- Next by thread: [Discuss] Debian 12 in the Cloud
- Index(es):