• Olap@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    When does systemd stop? Linux without it is increasingly looking unlikely in the future. Are we not worried about it being a single point of failure and attack vector?

    This isn’t a moan about the unix philosophy btw, but a genuine curiosity about how we split responsibilities in todays linux environment.

    • mogoh@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      By this logic the Linux kernel is also a single point of failure and attack vector.

      sudo isn’t going away, so does doas. run0 is just another alternative to use or not.

      There are still distribution out there without systemd and if there ever won’t be any systemd-free distributions left and systemd would become a critical part of the Linux ecosystem, then it would get the same treatment as the Linux kernel with many professional maintainers.

    • NateNate60@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      1 year ago

      SystemD will consume the entirety of Linux, bit by bit.

      • In 2032, SystemD announces they’re going to be introducing a new way to manage software on Linux
      • In 2035, SystemD will announce they’re making a display system to replace the ageing Wayland
      • In 2038, the SystemD team announces they’re making their own desktop environment
      • In 2039 SystemD’s codebase has grown to sixteen times its size in the 2020s. SystemD’s announces they’re going to release replacements for most other packages and ship their own vanilla distro.
      • In 2045 SystemD’s distro has become the standard Linux distribution. Most other distros have quietly faded away.
      • In 2047, SystemD announces they’re going to incorporate most of GNU into SystemD. Outrage ensues from the Free Software Foundation, which vehemently opposes this move.
      • In 2048, Richard Stallman dies of a heart attack after attempting to clone SystemD’s git repo. SystemD engages in a hostile takeover and all resistance within the FSF crumbles
      • In 2050, SystemD buys the struggling RedHat from IBM for $61 million.
      • In 2053, most world governments have been pressured into using SystemD.
      • In 2054, Linus Torvalds, fearing for his life, begins negotiations to merge kernel development into SystemD
      • In 2056, the final message on the Linux kernel development mailing list is sent.
      • In 2060, SystemD agents assassinate the CEO of Microsoft.
      • In 2063, after immense pressure from SystemD-controlled human rights organisations, Arch developers discontinue development.
      • In 2064, the remaining living Debian developers release the next stable version of their clandestine and highly illegal distro.
      • NekkoDroid@programming.dev
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        One way to notice a person has “systemd derangement syndrome” is by looking at how they write systemd: if they write it SystemD they are already in late stages of SDS and it isn’t curable anymore.

      • taladar@sh.itjust.works
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        I think you might want to recheck the ages of some of the people in your timeline, most of them aren’t that young anymore.

        • NateNate60@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          1 year ago

          Yes, because it’s easier to take care of octogenarians than people who might actually put up a fight to having their laptop batteries replaced with a pipe bomb.

        • TheGrandNagus@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          1 year ago

          Debian in many ways isn’t as slow-moving as people think.

          For example, they moved to Wayland by default (for Gnome anyway) in 2019. A number of well-known distros likely won’t have that until 2025/2026 or beyond.

          • 0x0@programming.dev
            link
            fedilink
            arrow-up
            0
            ·
            1 year ago

            Sadly they’ve been dropping archs throughout the years, meaning they’re no longer the distro you can use to run on “anything” from a pi to a mainframe…

            • yoevli@lemmy.world
              link
              fedilink
              English
              arrow-up
              0
              ·
              1 year ago

              Doesn’t trixie still support like a dozen arches? I think one of the more recent deprecations was MIPS BE which is functionally obsolete in 2024, at least insofar as practically no one is using it to run a modern distribution.

              • CrazyLikeGollum@lemmy.world
                link
                fedilink
                English
                arrow-up
                0
                ·
                1 year ago

                Bookworm, Trixie, and Sid all currently support a total of 10 different architectures.

                And looking through the Wikipedia article for Debian’s version history, most of the dropped architectures were functionally obsolete when they were dropped, or like the Motorola 68000, when support was added. (notable exceptions being IA-64 which was dropped 4 years before intel discontinued it, SPARC which is still supported by Oracle, and PowerPC.)

              • 0x0@programming.dev
                link
                fedilink
                arrow-up
                0
                ·
                1 year ago

                If your bar is “modern distribution” stick to Ubuntu.

                If you want to maintain older hardware Debian used to be a go-to solution.

    • 0x0@programming.dev
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      Gentoo, Slackware and Devuan can be used without svchost for linux.

      They’ll only stop when they rebrand it to systemd OS.

    • Cooleech@mstdn.plus
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      @Olap
      I agree. As someone who uses systemd on daily basis (I use Arch, BTW 😄) I really like it, but I am a bit worried about it being a single point of attack. Maybe just push doas as default instead? I never used doas but I watched few videos about it, so I guess it’s fine and probably better than sudo (less bloated).
      Just my few cents.

      • taladar@sh.itjust.works
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        I don’t see how something would be inherently easier to attack if it is called systemd-foo instead of just foo. Attack surface and vectors do not depend on which project develops a particular tool.

    • drwankingstein@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      Systemd is a bit of a hassle to be rid off, but thankfully it’s not actually that hard, the hardest part I found was converting systemd services to whatever init system I use.

        • notabot@lemm.ee
          link
          fedilink
          arrow-up
          0
          ·
          1 year ago

          Probably not much time, a lot of packages come with init scripts anyway, and they’re pretty trivial to write if not.

          You can certainly argue it’s a philosophical choice, I’d say it’s more down to recognising the many poor architectural choices in systemd, rubbing agaist its many pain points and misfeatures and being alarmed at the size of the attack surface it exposes. I understand there is an effort underway to reduce the size and complexity of the main shared library to help address the last point, but just the fact that is necessary shows the scope of the problem.

            • notabot@lemm.ee
              link
              fedilink
              arrow-up
              0
              ·
              1 year ago

              Let’s agree to disagree on that point. Redhat switched because they invented it, and so took all the RHEL derivative distros with them. Debian switched to prefer it after a rather contentious vote and so took all the Debian derivative distros, including Ubuntu, with them. That just leaves a lot of the smaller distros, most of which seem to have stuck with sysvinit or similar as far as I can see.

              • TrickDacy@lemmy.world
                link
                fedilink
                arrow-up
                0
                ·
                edit-2
                1 year ago

                The arguments against systemd are very unconvincing but more importantly, there is zero evidence that they actually matter.

                And it works.

                Further, in order to represent this as a nearly unilateral decision you failed to mention that arch, centos, and opensuse all opted in independently.

                And no offense but angry Internet randos arguing software philosophy will never convince me to disagree with the creator of the Linux kernel.

                Linus Torvalds said:

                “I don’t actually have any particularly strong opinions on systemd itself. I’ve had issues with some of the core developers that I think are much too cavalier about bugs and compatibility, and I think some of the design details are insane (I dislike the binary logs, for example), but those are details, not big issues.”

                • notabot@lemm.ee
                  link
                  fedilink
                  arrow-up
                  0
                  ·
                  1 year ago

                  I obviously find the arguments against systemd more persuasive than you do, and that’s fine, it’s all open source and we can all make our own choices about it. My experience with it over the years has been, and still is that it vastly over complicates things that used to be simple, often the less commonly used parts just don’t work right (the automounter is a particular bugbear of mine, and few distros seem to use the network management component). The arguments do matter in practical terms as they directly impact how it works.

                  Of the distros you mentioned, centos is a RHEL derivative and so wasn’t independent, arch packages multiple init systems, but yes, I’d forgotten opensuse, and they seem to be firmly in the systemd camp.

                  I may be an internet rando, but I’m not actually angry, more just disappointed. I’d agree with Mr Torvald’s opinion that some of the design details are insane, but I think they are more fundamental than just ‘details’ as many are to do with the fundamental concepts around what systemd is and how it works. Linus can be a real dragon around changes to the kernel, but he’s always tended to be more relaxed about the layers above it.

                  That the developers of systemd are ‘much too cavalier about bugs and compatibility’ is surely clear to anyone who follows the relevant mailing lists and bug trackers, and should alarm everyone.

    • Shareni@programming.dev
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      Systemd monolith - worst thing to have ever happened to Linux

      Wayland monolith - best thing to have ever happened to Linux

      • d_k_bo@feddit.de
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        Wayland monolith

        There seems to be misunderstanding about what Wayland is.

        Wayland is set of protocols. They are implemented by wayland servers (compositors) and wayland clients (applications) themselves. There is no single “wayland binary” like in the X11 days. Servers or clients may choose to implement or not implement a specific protocol.

        • NekkoDroid@programming.dev
          link
          fedilink
          arrow-up
          0
          ·
          1 year ago

          I think what they meant is that there are people that think: “Wayland is too fragmented, there should be 1 ‘Wayland Compositor’ and the rest should be window managers”

          • Shareni@programming.dev
            link
            fedilink
            arrow-up
            0
            ·
            edit-2
            1 year ago

            Nope, I meant that the wayland compositors are inflexible monoliths that are so tightly integrated into a DE that they can’t be replaced. Xorg might be bloated, but it follows the UNIX philosophy closely enough that each part of the stack above xorg can be trivially replaced.

            • NekkoDroid@programming.dev
              link
              fedilink
              arrow-up
              0
              ·
              1 year ago

              I guess my interpretation was too charitable.

              Nothing in the protocol prevents you from splitting the server from the window manager, just everyone implementing the wayland server protocol didn’t see any benefit in splitting it out.

        • Shareni@programming.dev
          link
          fedilink
          arrow-up
          0
          ·
          1 year ago

          Sure, but that doesn’t change the fact that Wayland compositors are forced to be inflexible monoliths that need to be so tightly integrated into a DE that they can’t be replaced.

          In xorg the server, wm, and compositor all do their own thing and can be replaced trivially. It took me like 5 minutes to replace xfwm4 with i3, and that included the research.

      • drwankingstein@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        I think wayland has potential but in it’s current state it’s just half baked. Once more protocols get merged, maybe in a decades time Wayland should be quite flexible and robust.

        • Shareni@programming.dev
          link
          fedilink
          arrow-up
          0
          ·
          1 year ago

          That’s how I feel as well. IMO it’s ridiculous that Fedora wants to remove xorg completely from the repos in the next version.

          • PseudoSpock@lemmy.dbzer0.com
            link
            fedilink
            arrow-up
            0
            ·
            1 year ago

            It is ridiculous. Nothing like says f you to a large percentage of your user base like pushing out a solution that doesn’t work for them.

            • Shareni@programming.dev
              link
              fedilink
              arrow-up
              0
              ·
              edit-2
              1 year ago

              The wildest thing is that current xorg package is maintained by the community and they’re still removing it completely because “xorg is taking up too much dev time”.

          • drwankingstein@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            0
            ·
            1 year ago

            It does have potential. I think anyone denying that is simply wrong. the issue with wayland is purely how slowly it moves and the fragmentation. Now the fragmentation is actually in large part due to how slowly it moves. There are numerous WIP protocols that will greatly decrease fragmentation when all are merged.

            I can’t wait because it seems like it will happen in the short future of one or two decades xD

    • Mactan@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      invoking them is kind of a pain, my sole experience with it was meson/ninja using it but then that default was removed and I’ve never been able to put it back to satisfy my curiosity of how it’s done

  • nifoc@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    This is great. Not having the attack surface of sudo (and not even being a SUID binary) certainly are great additions.

    And I hope people realize that systemd is not one large thing, but a (large) collection of tools.

    • DefederateLemmyMl@feddit.nl
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      The attack surface will be a systemd daemon running with UID=0 instead, because how else are you going to hand out root privileges?

      So it doesn’t really change anything to the attack surface, it just moves it to a different location.

        • DefederateLemmyMl@feddit.nl
          link
          fedilink
          English
          arrow-up
          0
          ·
          1 year ago

          Not really, because you’re now going to make it do more, i.e. incorporate the functionality of sudo and expose it to user input. So unless you can prove that the newly written code is somehow inherently more secure than sudo’s existing code, the attack surface is exactly the same.

    • lengau@midwest.social
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      Kinda feels like writing a script that implements the sudo CLI but calls pkexec would be an easier way to do it. Given that so many systems already come with both sudo and pkexec, do we really need yet another option?

      • chameleon@kbin.social
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        The point of this is to implement some form of privilege escalation without the SUID mechanism. sudo, pkexec and doas are all SUID.

    • DigitalDilemma@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      I’ve had to scroll down eight pages to find a post that seems to actually address the good points raised in the article.

    • MonkderDritte@feddit.de
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      1 year ago

      that systemd is not one large thing, but a (large) collection of tools.

      Who don’t work without Systemd. And Systemd can’t coexist with tools in the same repo doing the same job in a portable way.

      • lemmyreader@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        Right. That reminds of the time I was visiting a friend who had broken his Linux computer (No, not “apt-get remove --purge systemd” but they did something slightly similar). When I booted from a live Linux, used chroot and wanted to use configure networking : FAIL because systemd was … not running. As he had no Internet because of his broken machine this caused some delays in fixing this but we got the job done eventually.

    • lemmyreader@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      1 year ago

      This is great. Not having the attack surface of sudo (and not even being a SUID binary) certainly are great additions.

      And I hope people realize that systemd is not one large thing, but a (large) collection of tools.

      XZ-utils rings a bell ? It was among others Debian wanting to pull in part of a systemd tool into openssh and that almost turned into a world wide disaster :(

      • boredsquirrel@slrpnk.net
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        I didnt understand that sentence. Is that what you meant?

        Among other things, Debian wanted to integrate a part of the systemd tools into openssh, which almost led to a worldwide catastrophe

        xz is not part of systemd or openssh afaik.

        • lemmyreader@lemmy.ml
          link
          fedilink
          English
          arrow-up
          0
          ·
          1 year ago

          You didn’t follow the XZ-utils story ? The malicious actor worked for years on that XZ backdoor that targeted the fact that some Linux distributions were modifying their openssh package to enable systemd notifications.

          • boredsquirrel@slrpnk.net
            link
            fedilink
            arrow-up
            0
            ·
            1 year ago

            Ok true, it was a systemd dependent issue. But it only makes sense to have those notifications. The problem is dependency on small hardly maintained products, which systemd will improve by centralizing it.

            • lemmyreader@lemmy.ml
              link
              fedilink
              English
              arrow-up
              0
              ·
              edit-2
              1 year ago

              But it only makes sense to have those notifications.

              Maybe in your mind it makes sense. Going for ease of use rather than security is not something that OpenBSD would quickly do. If you read some more about what “jwz” has to say about all the screensaver bugs in Linux, like here : https://www.jwz.org/blog/2021/01/i-told-you-so-2021-edition and realize what a mess that Linux maintainers are making again and again, and then have a look at Debian and their packaging of xscreensaver. Guess what ? Debian added some systemd thingie to xscreensaver. 🤯

              I like Debian since a long time and I use it. But the tinkering of Debian package maintainers and always wanting to do things the Debian way is not something I am always very pleased with. Remember the OpenSSL Debian fiasco ? That shows a problem with Debian which may still exist. Too many packages, not enough maintainers with enough spare time, and no coherent team work of a security team.

            • Macros@feddit.de
              link
              fedilink
              arrow-up
              0
              ·
              1 year ago

              And where do maintainers for the new parts of systemd come from? The larger systemd grows the more parts of it will be neglected. Also in regard to people checking commits, opening up doors for exploits like the one in xz.

    • Shareni@programming.dev
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      That was so bad that vim users needed to make nvim to handle Emacs envy, and every modern ide tries to do the same in worse ways.

      (Not trying to start a holy war, I use both)

  • Yeah, that makes a lot of sense. Not needing the SUID bit on a complex tool is just a good idea. The simpler use cases can switch to doas, the use cases that require complex configuration can switch to something like run0, and the world of Linux is just a little bit harder to hack.

    • million@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      1 year ago

      I read the original mastodon post by the developer of run0 and I am still don’t understand what the problem with SUID is.

      Whats an example of an attack that would work with sudo and doas (which also uses SUID) and not on run0?

      • Any code execution inside of a SUID binary basically becomes root access. That means that SUID binaries need a lot of security measures for everything they do. The more complex you make your SUID capable binary, the more work this adds, and the higher the probability that you’re introducing some kind of bypass vulnerability.

        With sudo and to some extent doas, the process that should be in charge of vetting whether or not a user can become root/another user (and probably should only be doing that) is also parsing files, interacting with the network, possibly doing I/O on the filesystem. The binary is started as a user with limited permissions, but that user has full control of the binary’s environment.

        With a root daemon (the one your system already needs if you’re running systemd in the first place), the binary that submits the elevation request can be as small as possible, and have no additional permissions. You can trick run0 into doing something, but that won’t give you root access, as polkit and other mechanisms actually decide if you’re root or not. If you’re not root, you’re not going to be able to seriously influence those daemons, even if you debug and monitor the memory of the application that’s communicating with them, or somehow manage to LD_PRELOAD some malware into it.

        Take, for instance, CVE-2023–22809. This vulnerability allowed some users to write files with root permissions (think /etc/sudoers) when the low privilege user was permitted to only edit files on a whitelist, because rather than taking the root user environment variables, various sudo tools accepted the user’s environment variables (the ones you provide on the command line) to decide what editor to launch. This editor could (basically) be ‘nano /etc/passwd’ and when you sudoedit /etc/user/tool/file/here.conf (as specified in sido’s config), sudoedit would spawn an editor opening /etc/passwd instead.

        In the daemon model of run0, the daemon would be the one evaluating its (root) environment variables and picking the editor. However, in sudo, the binary that allowed itself to become root, could also be directly influenced by the low privilege user, and its protections against tampering proved insufficient.

        This entire class of attacks just isn’t viable when the binary the end user runs doesn’t have the ability to exert any control. All the important bits are on the “other side”, running as a different user, isolated from the low privilege side.

        • ZeDoTelhado@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          1 year ago

          Thanks for taking the time to explain. I was trying to get my head around on how this works but could not understand much of it. A lot of people here are very much against systemd in all senses, but this sounds like a better approach. Even if it not done as systemd, makes more sense than checking files and getting elevated privileges for a scope and use guardrails everywhere

    • d3Xt3r@lemmy.nzM
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      1 year ago

      Agreed, this is a nice inclusion. I also hate sudoers with a passion - I already use doas but it’s not standard (in the Linux world anyway), but with systemd providing an alternative means that it’ll become a standard which most distros would adopt, and I hope this means we can finally ditch the convoluted sudoers file once and for all.

      • I wouldn’t rely on distros adopting it as a default. systemd has a whole range of features, like network management, that many distros still use other tools for, like NetworkManager and netplan.

        • NekkoDroid@programming.dev
          link
          fedilink
          arrow-up
          0
          ·
          1 year ago

          The thing with this is: its just a symlink to the systemd-run binary, which talks to PID1 to spawn new processes (in separate cgroups IIRC). Its one of the most fundamental parts of systemd. Even the debian systemd package includes systemd-run.

          • I haven’t checked the details yet, but surely this will need configuration to decide what users are allowed to use run0. The binary might exist, ready to be configured (the same is true for many systemd deployments that use alternative network managers!) but without configuration to match, I don’t think run0 will be usable for users that don’t already have root access.

            • NekkoDroid@programming.dev
              link
              fedilink
              arrow-up
              0
              ·
              1 year ago

              it does its authorization with polkit (which IIRC defaults to allow all wheel group members) and giving users that shouldn’t be allowed root access, root access, is not something you ever want. This is usually referred to as unauthorized privilege escalation. Also, it isn’t like sudo doesn’t need configuration.

        • d3Xt3r@lemmy.nzM
          link
          fedilink
          arrow-up
          0
          ·
          edit-2
          1 year ago

          doas is quite popular in the BSD world, and was ported to Linux a few years ago (via the OpenDoas project).

          For starters, it’s is a lot smaller than sudo - under 2k lines of code vs sudo’s 132k - this makes it lot more easier to audit and maintain, and technically less likely to have vulnerabilities.

          Another security advantage is that doas doesn’t pass on the environment variables by default (you’d have to explicitly declare the ones you want to pass, which you can do so in the config).

          The config is also a lot simpler, and doesn’t force you to use visudo - which never made sense to me, visudo should’ve just generated the actual config, instead of checking it after the fact. Kinda like how grubby or grub2-mkconfig works. But no need for that complexity with doas.

          Eg, the most basic doas config could just have one line in the file: permit: wheel. Maybe have another line for programs you want to run without a password, like permit nopass dexter cmd pacman.

          • Technus@lemmy.zip
            link
            fedilink
            arrow-up
            0
            ·
            1 year ago

            Nice to see that Mastodon has the same problem as Twitter with people trying to use it for long-form blog posts for some godforsaken reason.

            • Regalia@lemmy.blahaj.zone
              link
              fedilink
              arrow-up
              0
              ·
              1 year ago

              Blame the Mastodon team, if you’re not running a fork, you have to go into the source and adjust the character limit manually.

              Nobody has to do it like this, Mastodon supports longer posts since other servers and clients support more, it’s seemingly just a choice from upstream.

            • taladar@sh.itjust.works
              link
              fedilink
              arrow-up
              0
              ·
              1 year ago

              Makes sense considering people who moved from one micro-blogging service to another instead of giving up on the idea completely are probably the ones deeply committed to that flawed idea.

          • UID_Zero@infosec.pub
            link
            fedilink
            English
            arrow-up
            0
            ·
            1 year ago

            I admit, I’m not a big fan of putting more functionality into systemd (or just of systemd in general), but that is a well-reasoned argument for having sudo live in the init system.

  • vanderbilt@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    A lot (and I mean a lot) of criticism can be leveled at systemD. One of the upsides of it becoming popular is the standardization of much of things from the developers’ perspective. It’s easier to target multiple distros when you can rely on systemD’s single implementation of the feature. Over the next decade, I forsee systemD eating more and more of the userspace, until you are only left with managing the differences between DEs and which display server they are using. We’re already headed towards immutable base systems with apps shipping with their own dependencies, which we reduce the differences between distros even further.

    • baru@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      until you are only left with managing the differences between DEs

      Maybe they’ll add a DE as well?

      Just kidding!

      • vanderbilt@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        Don’t give them ideas 😂

        If Canonical and RedHat weren’t backing different horses (Snap vs Flatpak), I could see the app containerization system coming under systemD as well fairly soon. The Cosmic DE project uses functionality from systemD to overlay changes onto the system that are reversible, so that alpha versions of Cosmic can be tested without permanently changing the base system. Imagine apps shipping on whatever container runtime, and dynamically overlaying system-level changes as needed for things that tap into the host system via systemd-sysext.

  • allywilson@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    However, distributions like Fedora will definitely be in the lead, judging by previous experiences and stories of adapting new Linux technologies and Systemd components.

    I wonder if this is still true, now that he no longer works for RedHat, but Microsoft.

    • baru@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      I wonder if this is still true, now that he no longer works for RedHat, but Microsoft.

      Why wouldn’t Fedora do that? Decisions are decided by multiple people, they are not forced through or just decided unilaterally by one person.

      Enough people in Fedora try to improve the low level stuff. I’m looking forward to that homedir systemd stuff. Don’t care about this sudo alternative.

      • youmaynotknow@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        Decisions are decided by multiple people, they are not forced through or just decided unilaterally by one person.

        Unless you’re talking about GrapheneOS, but that’s an horror story for another night 🤣

  • gandalf_der_12te@discuss.tchncs.de
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    I honestly started out not liking systemd at all, mostly due to the reports that it did waaay to much, but nowadays, I like the concept.

    It is basically officially moving daemon management from a script-based approach to a table/database-based approach. That improves static analyzability, therefore increasing clarity, and probably even performance.

    I agree that we should abandon scripts and move towards declarative software management, and abandoning sudo for a more declarative system seems like a good step to me.

  • vsis@feddit.cl
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    Oh, it’s gonna use polkit. Sudo bloat is a grain of sand compared to polkit.

    Why people want to replace sudo with polkit? Visudo is no near as obscure as configuring polkit.

    I hope distro maintainers don’t follow this.

    • lengau@midwest.social
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      …is pkexec not good enough already as a polkit based sudo replacement? Why would one need to systemd-ify that?

    • voxel@sopuli.xyz
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      I just treat polkit as “set it and forget” kind of thing and leave it on defaults, I’d rather spend my time on something more important

    • john89@lemmy.ca
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      First thing I do with any new desktop installation is disable polkit prompts.

      Fuck having to enter my password every time I want to do something.

  • SuperSpruce@lemmy.zip
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    I’m no Linux expert, but I’ve never had any problems with sudo, it just works. Shouldn’t systemd have higher priorities on their mind? This feels like change for the sake of change. And if this does happen, I sincerely hope that it just works, like sudo.

    • Kwdg@discuss.tchncs.de
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      I think the article (or more Lennart Poertting post) explains it quite nicely. The problem with sudo is that the sudo binary itself has the ability to gane elevated privileges which is a potential attack surface

  • TCB13@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    1 year ago

    Well… Poettering will eventually work his way up to browser engines and then we’ll get something efficient… Here’s the announcement:

    "There’s a new component in systemd, called “engined”. Or actually, it’s not a new component, it’s actually the long existing “WebKit” engine now done properly. The engine is also a lot more fun to use than “WebKit” or “Blink” because you can finally have hundreds of tabs open in your browser without running out of RAM.

    Coming soon in Coming for systemd 981.

  • onlinepersona@programming.dev
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    There’s a rewrite of sudo happening in rust, but he wants to throw out the SUID idea altogether?

    when invoked under the “run0” name (via a symlink) it behaves a lot like a sudo clone. But with one key difference: it’s not in fact SUID. Instead it just asks the service manager to invoke a command or shell under the target user’s UID. It allocates a new PTY for that, and then shovels data back and forth from the originating TTY and this PTY.

    That sounds like opening up the door to what windows is doing UAC and the wonderful vulnerability that the GOG Launcher had for privilege escalation.

    I’m not a security researcher, but giving arbitrary users the ability to tel PID 1 to run a binary of the user’s choosing is… probably not what Pottering is suggesting, but opens up to such vulnerabilities. And if it’s written in C/C++ my trust is further reduced.

    Anti Commercial-AI license

    • ulkesh@beehaw.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      And if it’s written in C/C++ my trust is further reduced.

      Do you trust Linux? Because if so, have I got news for you.

      • shirro@aussie.zone
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        Wait until they hear the language used to implement OpenBSD. Imagine being one of the authors of seL4 encountering a member of the rust cult.

    • barsoap@lemm.ee
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      Giving users access to PID1 running binaries, giving users access to the kernel running binaries as root, I don’t see much difference. SUID was notorious in the past for being leaky, it only ended when distros got serious about fencing use of it in, giving it only to programs actually needing it, making sure that they drop privilege properly, etc.

      If anything I’m in the PID1 camp because it’s more microkernely. But in any case broader userspace shouldn’t really care about the mechanism, only have an API to do it and that API being a bit in the file permissions is soooo 1960s.