logoalt Hacker News

PunchyHamstertoday at 10:09 AM5 repliesview on HN

There was no bug or attack on Debian since 2007 that reproducible packages would prevent.

"Well worth it" is not correct. And it just ups the the contribution barrier to Debian higher, I already heard a lot of people complaining that contributing to Debian is hard and while in past I defended it by "they need all the checks and bounds to make sure packages play with eachother nicely", this is just step that makes it hard for no reason and little benefit.


Replies

savolaitoday at 10:34 AM

” If you are wondering why we are doing this at all, then hopefully the Reproducible Builds website will explain why this is useful.”

https://reproducible-builds.org/

Could you perhaps respond to the argumentation here?

show 1 reply
azkalamtoday at 10:36 AM

Reproducible builds reduce the need for trusted parties.

Have many organizations produce the binaries independently and post the arifacts.

Once n of m parties agree on the arifact hash, take that as the trusted build.

If every party reaches a different hash then we cannot build consensus.

show 1 reply
MomsAVoxelltoday at 11:02 AM

Reproducible builds are applicable not only to respond to ‘attacks’, a subject you seem to be bikeshedding, but also for other reasons too.

Anyone having to maintain a code base or a distributed fleet of devices will gain from this decision, immensely, as their operational periods come and go.

Reproducible builds are about longevity as much as they are about security.

Please don’t make bold claims about ‘no reason and little benefit’ while demonstrating ignorance of this hard fact: reproducible builds should have been the norm, in computing, from the get-go.

show 1 reply
eptcykatoday at 10:46 AM

It makes shipping backdoors a whole lot harder, yes.

show 1 reply
aborsytoday at 10:12 AM

There was perhaps no detected bug or attack. There have most likely been bugs or attacks that reproducible builds would have prevented.

show 1 reply