Posts
4826
Following
321
Followers
488
Linux kernel hacker and maintainer etc.

OpenPGP: 3AB05486C7752FE1

Jarkko Sakkinen

Edited 1 year ago
@argv_minus_one Also, you are essentially now disagreeing on that Rust is not feature. I.e. you are agreeing on that Rust is a feature 🤷
0
0
0

Jarkko Sakkinen

Edited 1 year ago
@calbaker That said obviously those checks that exist given the validation make the injection harder but I would not hold my breath seeing a Rust program used in volumes with zero CVE's in its life-cycle. That has never happened in history of security vulnerabilities so far.
2
0
0
@argv_minus_one Such language that would be memory safe does not exist.
1
0
0

@calbaker No.

It has static and run-time checks for memory safety, which is not the same as being memory safe. Just like Go, Java, Python and what not have measures for memory safety but instead of borrow checker they use a garbage collector.

Rust is less safe than any of those languages because the result is an ELF binary, which is roughly a twist of what C++ source generates with fancy checks. Same attack techniques, like ROP (return-oriented programming) gadgets still apply as for any possible ELF binary ever compiled.

3
0
1

Jarkko Sakkinen

Edited 1 year ago
When promoting apps, it is good to remember that #Rust is not a #feature :-) I zero care what language is used. Programming language is only a recipe. A CPU has only one single language that it runs baked from that recipe.

Or actually I do care in the sense that it is a huge turn back. It is misguided advertisement by definition because a competing app might not have this artificial feature. Some casual users might even think that an app is somehow better because it has the imaginary performance improvement thanks to Rust.

#rustlang
7
4
13

Jarkko Sakkinen

Don’t you see why many Americans see such talk of dictatorship as contrary to our most cherished principles? Trump says no. Quite the opposite, he insists. “I think a lot of people like it.” -Trump in https://time.com/6972021/donald-trump-2024-election-interview/

Not my vote so no further comments. I just imagine that I did not read this 🤷

#democracy
0
0
0

LWN.net is now @LWN@lwn.net

[$] Inheritable credentials for directory file descriptors https://lwn.net/Articles/971825/

0
2
0

Jarkko Sakkinen

Edited 1 year ago

Despite the misleading name, apparently rust-vmm/vm-memory can do memory mapped I/O on a wider scope. I.e. it could be used in a project having nothing to do with virtualization. In Enarx the situation is two-folded:

  • SGX needs device memory maps
  • KVM based confidential computing needs whatever the name of “the thing” providing private memory areas is ATM through KVM shenanigans ;-) Have to check.
0
0
0

WhatsApp Spam has been increasingly annoying recently, how can someone be calling me on WhatsApp that ISN'T a WhatsApp user?

2
1
2

Happy 60th, BASIC!

0
2
1
@pid_eins with this, TPM2 measured/encrypted boot and also TPM bus protection (which I'm hoping to pick today) we are finally reaching to a security model that is getting competitive with proprietary Mac's security despite being factors more open and giving the user control and choice :-)
0
0
1

Jarkko Sakkinen

Edited 1 year ago
I don't usually put my own pics to social media but here's one that I randomly found from my girlfriends daughters 12th birthday (about year ago). I also take kids birthdays like a pro :-------)

EDIT: i do put a lot of pics of cool hardware tho...
0
0
1
Duh, stupid of me. Obviously for build deps :-) I had them enabled in my earlier Ubuntu installation that had forgotten.
0
0
0

Jarkko Sakkinen

Edited 1 year ago

I’m wondering why in #OpenSUSE #Tumbleweed zypper si -d needs the source package as -d should tell to get only build dependencies, and not the source package.

1
0
0
I'll hold my pull request to next week as it is so near the finish line and I just got testing guidelines from @jejb (author of the patch set). It would be great timing given the work already happening on hard drive encryption side.
0
0
0
I will need to get this done tho even if it is manual troff. Cannot help it being a huge demotivating factor tho... Especially writing something like code examples with manual troff is a tedious job tbh.
0
0
0

Jarkko Sakkinen

Edited 1 year ago
#TPM integrity protection is almost there:

https://lore.kernel.org/linux-integrity/D0X00LTUCCC8.X8LKLJHZZRGP@kernel.org/#t

Those are my only remaining remarks for v8.

The idea is that HMAC pipe is used for communication derived from null seed (which changes each power cycle). If the integrity is compromised access to the TPM device will be denied.

I still need to figure out the negative testing. This series has been already tested when machine works as expected and the bus is not compromised.

Combined with TPM2 sealed hard drive encryption should be quite reasonable way to secure a system (of course nothing never is perfect).
1
6
7

Jarkko Sakkinen

Edited 1 year ago
Kernel man page generation: is that acceptable for the official linux man pages? I should put out SGX man pages at some point (has been in queue for 2 years) but using troff is not something I can say that I enjoy doing.

I.e. there is man page generation instructions here: https://www.kernel.org/doc/html/latest/doc-guide/kernel-doc.html
1
0
0
Show older