Originally posted by varikonniemi
View Post
Announcement
Collapse
No announcement yet.
Systemd Continues Getting Bigger, Almost At 550k Lines Of Code
Collapse
X
-
-
Looking at the graph i would say something happened in systemd in late 2012. What new role did it take back then from being an init system to being an operating system?
Leave a comment:
-
So how do you claim Systemd can send my encryption passphrase to the NSA
Originally posted by scjet View Postsystemd = just another NSA-sponsored injection into the Linux bloodsystem.
The init system isn't even IN the path of keyboard-bios-kernel-cryptsetup, all it does is call those post-kernel programs that are. As for systemd's native cryptsetup modules, the source code is available, tell me where you think the NSA put a back door in cryptsetup.c . I just looked through it line by line and could not find any references to sending something out over a network or saving it to a file on disk somewhere, hell you'd have to MOUNT a disk to save from disk in the initramfs.
As for cryptsetup-generator.c, all generators do is write service files on the fly, and all service files do is fire up the various programs that must be started in the boot process. They are not the programs themselves.
OK, now this one: How can systemd help the NSA get my email passwords or read the content of my Tor traffic? I don't have Facebook and the only thing systemd needs to do to get the NSA into that is boot the NSA's own computers (my guess would be RHEL on those) to receive all the snitching Facebook happily sends them unsolicited. In short, my guess is systemd does for the NSA the exact same thing it does for me: start up their computers and then get out of the way, while presenting a consistant interface for troubleshooting.
If you claim systemd was written to allows remote exploits (by NSA or anyone else), name the part of systemd that permits someone over the network to get root on my box. How does using a service file to start the programs that handle networking suddenly open those programs to exploits, and how would an exploitable program having been started by the init system mean it could take control of its parent process to control OTHER programs started by the init system-in ANY init system.
Systemd is an init system like upstart or Sysvinit, it is not the kernel and it it not black magic. If A controls B, it does not mean that B controls A. To control an opponents computer by screwing with systemd, it seems you would first need to break root, and having done that you no longer need to deal with systemd unless of course your lack of familarity with systemd meant you could not write and test the service file needed to restart your keylogger, phone home CIPAV, or whatever at the next boot.Last edited by Luke; 30 May 2014, 01:18 AM.
Leave a comment:
-
Originally posted by scjet View PostThe Snowden's,..., and Assange's already DID
-too stoopid to look ?
Either show the backdoor in system or propose real working alternative. Based on the topics, it becomes clear most systemd detractors offer nothing to improve Linux ecosystems.Last edited by finalzone; 29 May 2014, 10:22 PM.
Leave a comment:
-
Originally posted by Vim_User View PostNo, it doesn't depend on some random blog post or boycott website, to support your claim that this is NSA-sponsored stuff you have to privide evidence for a connection of the systemd developers and the NSA, and/or review the code and actually find a backdoor.
-too stoopid to look ?
Leave a comment:
-
Originally posted by scjet View Postit depends on how much you want to read into these, unless you're just a blind fanbot,
but systemD'uh, is far from perfect ?:
Bringing some links buried in comments below to the top, I think these critiques of systemd’s integration and maintenance deserve some review. First, kernel developer Theodore Ts’o, the…
http://boycottsystemd.org/
Leave a comment:
-
Originally posted by MartinN View PostIs this opinion or fact?
but systemD'uh, is far from perfect ?:
Bringing some links buried in comments below to the top, I think these critiques of systemd’s integration and maintenance deserve some review. First, kernel developer Theodore Ts’o, the…
Last edited by scjet; 29 May 2014, 08:39 PM.
Leave a comment:
-
systemd = just another NSA-sponsored injection into the Linux bloodsystem.
Leave a comment:
-
Originally posted by interested View PostI think the point is that the systemd patches now actually makes it safe to run X as non-root on multi-user systems. (Moblin from your second link was single user). There have been several problems like input devices etc. that could lead to massive security problems when running X as a non-root user.
not that it matters as X input handling is the biggest security problem, one that can not be solved in X (it would not be X then, or with another solution that comes to mind it would not be linux anymore)
does not matter anyway as the problems will be solved properly with wayland and it's spawns, not by ugly hacking around
i hope at least, i don't care about security enough to check
systemd's only original thing is the session management, and not even that is original (or something that linux natively lacks, even thou it does but does in a way but does not not solve the bigger problem (not fully solved with mentioned things either))
PS i'm not talking about sessions on purpose and i won't reply to any such things (maybe if console kit and the like are not the topic i would)
just feels like people think that the systemd people made all they use, when i don't honestly know of anything worth mentioning that they themselves made
(except... maybe.. console kit; even thou i can't, in my honest opinion, say it is a good thing, but i guess it would be worth mentioning)
actually, i'm sorry, just wanted to correct to who the credit should go toLast edited by gens; 26 May 2014, 04:03 PM.
Leave a comment:
Leave a comment: