TE
TechEcho
StartseiteTop 24hNeuesteBesteFragenZeigenJobs
GitHubTwitter
Startseite

TechEcho

Eine mit Next.js erstellte Technologie-Nachrichtenplattform, die globale Technologienachrichten und Diskussionen bietet.

GitHubTwitter

Startseite

StartseiteNeuesteBesteFragenZeigenJobs

Ressourcen

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. Alle Rechte vorbehalten.

Demonstrably Secure Software Supply Chains with Nix

116 Punktevon todsacerdotivor 2 Tagen

12 comments

beardedwizardvor 2 Tagen
The bummer about lots of supply chain work is that it does not address the attacks we see in the wild like xz where malicious code was added at the source, and attested all the way through.<p>There are gains to be had through these approaches, like inventory, but nobody has a good approach to stopping malicious code entering the ecosystem through the front door and attackers find this much easier than tampering with artifacts after the fact.
评论 #43966027 未加载
评论 #43964927 未加载
评论 #43964942 未加载
评论 #43968621 未加载
sollewittvor 2 Tagen
Valuably you also get demonstrable _insecure_ status - half the pain for our org of log4js was figuring out where it was in the stacks, and at which versions. This kind of accounting is really valuable when you&#x27;re trying to figure out if and where you are affected.
niamvor 2 Tagen
&gt; it offers integrity and reproducibility like no other tool (btw. guix also exists)<p>This rubs me the wrong way. They acknowledge that alternative tools exist, but willfully use the wrong-er statement in pursuit of a vacuous marketing idiom.
评论 #43968149 未加载
abhisekvor 1 Tag
This solves the problem of provenance and possibly build integrity. Given an artifact, it will allow identifying exact source from which each components are built.<p>But it still implicitly assumes that the source is secure and trusted. This is where a lot of problem happens when the source is compromised and malicious code is added.
评论 #43975950 未加载
ngangagavor 1 Tag
I wish we would use terms like &quot;verifiable&quot; or &quot;reproducible&quot; rather than &quot;secure&quot;, which is quite difficult to evaluate out of context of usage.
seeknotfindvor 1 Tag
Nothing is demonstrably secure, only not demonstrably insecure. This is - hey our builds come with a bunch of resources you can use to try to prove they&#x27;re insecure, but you probably can&#x27;t - but it&#x27;s an advertisement.
huimangvor 1 Tag
Is the header image ai generated? For shame. No point in reading any further.
cyrnelvor 2 Tagen
This seems to only address a few of the nine threats to the software supply chain, mainly &quot;(D) External build parameters&quot; and maybe the content-addressable storage addresses some of the distribution phase threats: <a href="https:&#x2F;&#x2F;slsa.dev&#x2F;spec&#x2F;v1.1&#x2F;threats" rel="nofollow">https:&#x2F;&#x2F;slsa.dev&#x2F;spec&#x2F;v1.1&#x2F;threats</a><p>There are still many other ways that a dependency can be exploited before or after the build phase.
评论 #43967983 未加载
gitroomvor 2 Tagen
Hard agree on the pain of tracking all this - been there. Respect for the grind to actually lock this stuff down.
Tractor8626vor 1 Tag
Classical Nih<p>&quot;It&#x27;s easier to do ThingA with Nix because you don&#x27;t have to do ThingB!&quot; (proceed to explain how to do ThingB but with Nix)<p>&gt; You don&#x27;t need to maintain your own forks and patchsets<p>... but you need to maintain your own nix packages and build scripts which is basically same amount of work
评论 #43971526 未加载
XorNotvor 2 Tagen
This still doesn&#x27;t fix the &quot;trusting trust&quot; attack: which Guix actually can, and which can bootstrap sideways to build other distros.<p>It also doesn&#x27;t do anything which regular packaging systems don&#x27;t (nix does have some interesting qualities, security ain&#x27;t one of them): I.e. that big list of dependencies isn&#x27;t automatic in any way, someone had to write them, which in turn makes it exactly the same as any other packaging systems build-deps.
评论 #43968642 未加载
tucnakvor 2 Tagen
The laborious extents to which people would go simply to not use Guix.
评论 #43967373 未加载