Announcement

Collapse
No announcement yet.

Systemd Continues Getting Bigger, Almost At 550k Lines Of Code

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • tomegun
    replied
    Originally posted by varikonniemi View Post
    Looking at the graph i would say something happened in systemd in late 2012. What new role did it take back then from being an init system to being an operating system?
    A quick look at the NEWS files from around that time, my guess would be that http://cgit.freedesktop.org/systemd/systemd/tree/hwdb is the culprit (which just shows how worthless counting the number of lines is).

    Leave a comment:


  • varikonniemi
    replied
    Looking at the graph i would say something happened in systemd in late 2012. What new role did it take back then from being an init system to being an operating system?

    Leave a comment:


  • Luke
    replied
    So how do you claim Systemd can send my encryption passphrase to the NSA

    Originally posted by scjet View Post
    systemd = just another NSA-sponsored injection into the Linux bloodsystem.
    How can Systemd do something like sending my encryption passphrase to the NSA especially when I have a systemd service file calling my own code to unlock my disks rather than the current cryptsetup implementation due to having many disks to unlock. To be of use to the NSA for exploiting computers, systemd would have to either control what the network stack is permitted to access, install a backdoored SSL binary, or install a backdoored cryptsetup binary or script. The service files are far too simple to pull something like this.

    The init system isn't even IN the path of keyboard-bios-kernel-cryptsetup, all it does is call those post-kernel programs that are. As for systemd's native cryptsetup modules, the source code is available, tell me where you think the NSA put a back door in cryptsetup.c . I just looked through it line by line and could not find any references to sending something out over a network or saving it to a file on disk somewhere, hell you'd have to MOUNT a disk to save from disk in the initramfs.

    As for cryptsetup-generator.c, all generators do is write service files on the fly, and all service files do is fire up the various programs that must be started in the boot process. They are not the programs themselves.

    OK, now this one: How can systemd help the NSA get my email passwords or read the content of my Tor traffic? I don't have Facebook and the only thing systemd needs to do to get the NSA into that is boot the NSA's own computers (my guess would be RHEL on those) to receive all the snitching Facebook happily sends them unsolicited. In short, my guess is systemd does for the NSA the exact same thing it does for me: start up their computers and then get out of the way, while presenting a consistant interface for troubleshooting.

    If you claim systemd was written to allows remote exploits (by NSA or anyone else), name the part of systemd that permits someone over the network to get root on my box. How does using a service file to start the programs that handle networking suddenly open those programs to exploits, and how would an exploitable program having been started by the init system mean it could take control of its parent process to control OTHER programs started by the init system-in ANY init system.

    Systemd is an init system like upstart or Sysvinit, it is not the kernel and it it not black magic. If A controls B, it does not mean that B controls A. To control an opponents computer by screwing with systemd, it seems you would first need to break root, and having done that you no longer need to deal with systemd unless of course your lack of familarity with systemd meant you could not write and test the service file needed to restart your keylogger, phone home CIPAV, or whatever at the next boot.
    Last edited by Luke; 30 May 2014, 01:18 AM.

    Leave a comment:


  • finalzone
    replied
    Originally posted by scjet View Post
    The Snowden's,..., and Assange's already DID
    -too stoopid to look ?
    None of them claimed systemd is sponsored by NSA. The problem is looking for the excuse about the inability to adapt to the new technologies solving real problem that plagued Linux distributions for decades. Systemd detractors spent too much times attacking it rather than coming with alternative during four years.
    Either show the backdoor in system or propose real working alternative. Based on the topics, it becomes clear most systemd detractors offer nothing to improve Linux ecosystems.
    Last edited by finalzone; 29 May 2014, 10:22 PM.

    Leave a comment:


  • scjet
    replied
    Originally posted by Vim_User View Post
    No, it doesn't depend on some random blog post or boycott website, to support your claim that this is NSA-sponsored stuff you have to privide evidence for a connection of the systemd developers and the NSA, and/or review the code and actually find a backdoor.
    The Snowden's,..., and Assange's already DID
    -too stoopid to look ?

    Leave a comment:


  • Vim_User
    replied
    Originally posted by scjet View Post
    it depends on how much you want to read into these, unless you're just a blind fanbot,
    but systemD'uh, is far from perfect ?:

    http://igurublog.wordpress.com/2014/...ainst-systemd/

    http://boycottsystemd.org/
    No, it doesn't depend on some random blog post or boycott website, to support your claim that this is NSA-sponsored stuff you have to privide evidence for a connection of the systemd developers and the NSA, and/or review the code and actually find a backdoor.

    Leave a comment:


  • scjet
    replied
    Originally posted by MartinN View Post
    Is this opinion or fact?
    it depends on how much you want to read into these, unless you're just a blind fanbot,
    but systemD'uh, is far from perfect ?:

    http://igurublog.wordpress.com/2014/...ainst-systemd/

    http://boycottsystemd.org/
    Last edited by scjet; 29 May 2014, 08:39 PM.

    Leave a comment:


  • MartinN
    replied
    Originally posted by scjet View Post
    systemd = just another NSA-sponsored injection into the Linux bloodsystem.
    Is this opinion or fact?

    Leave a comment:


  • scjet
    replied
    systemd = just another NSA-sponsored injection into the Linux bloodsystem.

    Leave a comment:


  • gens
    replied
    Originally posted by interested View Post
    I think the point is that the systemd patches now actually makes it safe to run X as non-root on multi-user systems. (Moblin from your second link was single user). There have been several problems like input devices etc. that could lead to massive security problems when running X as a non-root user.
    if it does it like console kit did, then it just changes the problem (and makes people believe it has been solved)
    not that it matters as X input handling is the biggest security problem, one that can not be solved in X (it would not be X then, or with another solution that comes to mind it would not be linux anymore)

    does not matter anyway as the problems will be solved properly with wayland and it's spawns, not by ugly hacking around
    i hope at least, i don't care about security enough to check

    systemd's only original thing is the session management, and not even that is original (or something that linux natively lacks, even thou it does but does in a way but does not not solve the bigger problem (not fully solved with mentioned things either))

    PS i'm not talking about sessions on purpose and i won't reply to any such things (maybe if console kit and the like are not the topic i would)

    just feels like people think that the systemd people made all they use, when i don't honestly know of anything worth mentioning that they themselves made
    (except... maybe.. console kit; even thou i can't, in my honest opinion, say it is a good thing, but i guess it would be worth mentioning)
    actually, i'm sorry, just wanted to correct to who the credit should go to
    Last edited by gens; 26 May 2014, 04:03 PM.

    Leave a comment:

Working...
X