Advertisement · 728 × 90

Posts by Ariadne Conill 🐰

Preview
a boy with a sword is standing next to a girl and says sit boy Alt: a boy with a sword is standing next to a girl and says sit boy
1 day ago 1 0 1 0

instructions unclear: posting inuyasha memes on linkedin to describe various business strategies

1 day ago 0 0 1 0

this is a great proposal and one that i think is worth studying. sound transit is already over-committed to light rail for the “spine” service, but building ballard/west seattle rail as an automated light *metro* makes an incredible amount of sense. our neighbours to the north have proved it.

1 day ago 23 4 2 1

gitlab.alpinelinux.org/alpine/aports

1 day ago 1 0 1 0

contribute it to aports? we would love to have it...

1 day ago 1 0 1 0

QNX is oldschool microkernel-ish unix clone. it is actually really neat. unfortunately, they open sourced it, and then blackberry rugpulled the open source version.

1 day ago 1 0 0 0

debating writing a personal activitypub server that also functions as an atproto PDS. that way i can talk to my friends on either platform easily.

1 day ago 4 0 2 0

clearly, it is time to go back to linkedin, the premier social network for professional posters

1 day ago 6 2 0 0
Advertisement

Bluesky is a fun toy but for serious posters like myself the uptime is frankly unacceptable. I require enterprise-level availability and durability SLAs for any website where I'm going to post. I'm going to have my SRE team start looking into other options for my posts.

1 day ago 156 16 3 1

banned from the delivery tracking website for pressing F5 too many times

2 days ago 102 7 2 1

oh? what sort of unholy things? i am trying to improve the user experience of pkgconf on windows right now.

1 week ago 1 0 1 0

it does not matter if they are lying or not, people need to be building their systems as if it were true anyway

1 week ago 2 0 0 0

the reason i bring this up is because it highlights my earlier thesis: complex systems are *exploitable* systems.

1 week ago 10 0 0 1

as an aside, a random fun fact: most CVEs in sudo are not related to memory safety at all, but rather in the way that sudo processes its access control rules.

1 week ago 10 0 1 0

and in a world where anyone can rent APT-level capability for $200/month…

you can’t afford to rely on “probably safe.”

you need to build systems which are *correct by construction*.

1 week ago 5 0 1 0

but capability systems only work if “starting from nothing” is real.

if there’s hidden ambient authority, the whole model collapses.

in capability systems, security is not obtained through enforcement, but rather through construction.

1 week ago 4 0 1 0

the alternative to chipping away at default ambient authority is to build a capability system.

in a capability system, your program receives all of the authority it needs to run, and nothing more, when the program starts.

1 week ago 5 0 1 0
Advertisement

seccomp, however, is much worse. seccomp is fragile: i have had to downgrade musl on a few occasions in alpine because upgrading it broke everyone due to the seccomp policy included with containerd not being updated for newer syscalls.

1 week ago 6 0 1 0

the problem with subtractive sandboxing is that they are imperfect.

while approaches like landlock and pledge reduce authority more strictly, the runtime environment and programs must voluntarily facilitate installation of a landlock or pledge policy.

1 week ago 6 0 1 0

a subtractive sandbox starts from a position of ambient authority and voluntarily reduces that authority before executing code in the sandbox.

subtractive sandboxes are built with things like seccomp, openbsd's pledge and landlock.

1 week ago 8 0 1 0

so how do we actually reduce ambient authority?

there are two broad approaches: subtractive sandboxes and capability systems.

1 week ago 6 0 1 0

but even when you get isolation right… it’s still not enough.

because while isolation reduces ambient authority, it doesn’t eliminate it.

and ambient authority is where things get dangerous.

1 week ago 5 0 1 0

and that has turned out to be a lot harder than expected, because you’re constantly balancing strong guarantees vs. real-world usability.

but it is necessary work because if you get that balance wrong, the system doesn’t fail securely… it just gets disabled instead.

1 week ago 6 0 1 0

this problem is deeper than it looks.

“just make isolation stronger” isn’t enough. it has to feel usable.

we’ve spent the past two years at @edera.dev working on exactly this:

making isolation not just strong, but *ergonomic enough that people keep it on*.

1 week ago 6 0 1 0

this is part of why things like kata and firecracker haven’t fully taken off.

too hard, too limiting and people turn it off.

1 week ago 7 0 1 0

modern workloads make this worse.

people want GPUs.

they want CUDA.

they want direct access to hardware that was never designed for this model.

so now your isolation layer has to preserve guarantees and expose extremely privileged, messy interfaces safely.

that’s a very hard problem.

1 week ago 7 0 1 0
Advertisement

we’ve seen this before: “just turn off SELinux”

every enterprise software 10 years ago had this in their install instructions.

and today enterprise software says "turn off seccomp" or "use privileged mode".

1 week ago 7 0 1 0

we started with isolation because it’s *the* foundation.

almost every other security property assumes you already have it.

but isolation is a paradox:

it has to be strong enough to withstand attacks…
while still being flexible enough that users don’t disable it.

because they *will* disable it.

1 week ago 9 0 1 0

resilient systems are *intentional*.

they do more with less.
they are built from primitives that are easy to reason about.

enabling people to easily build resilient systems is why i started @edera.dev.

1 week ago 11 1 2 0

my take: complexity is the enemy.

because AI doesn’t get tired.

it will happily explore every edge case, every weird state, every undefined behavior in your system.

so the more complex your system is, the more opportunities you’re giving an attacker’s AI to find a way in.

1 week ago 14 0 1 0