From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp10.migadu.com ([2001:41d0:8:6d80::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms5.migadu.com with LMTPS id uBikBI7Ks2L6ewAAbAwnHQ (envelope-from ) for ; Thu, 23 Jun 2022 04:06:06 +0200 Received: from aspmx1.migadu.com ([2001:41d0:8:6d80::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp10.migadu.com with LMTPS id vwKlAo7Ks2LscQAAG6o9tA (envelope-from ) for ; Thu, 23 Jun 2022 04:06:06 +0200 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id AF9191CA2B for ; Thu, 23 Jun 2022 04:06:05 +0200 (CEST) Received: from localhost ([::1]:60786 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1o4CEO-0006o7-I1 for larch@yhetil.org; Wed, 22 Jun 2022 22:06:04 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:39730) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1o4CE4-0006nz-AX for guix-devel@gnu.org; Wed, 22 Jun 2022 22:05:44 -0400 Received: from cascadia.aikidev.net ([2600:3c01:e000:267:0:a171:de7:c]:60648) by eggs.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1o4CE0-0007PH-SB for guix-devel@gnu.org; Wed, 22 Jun 2022 22:05:44 -0400 Received: from localhost (unknown [IPv6:2600:3c01:e000:21:7:77:0:20]) (Authenticated sender: vagrant@aikidev.net) by cascadia.aikidev.net (Postfix) with ESMTPSA id E8FD11ABD9; Wed, 22 Jun 2022 19:05:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=reproducible-builds.org; s=1.vagrant; t=1655949938; bh=h6cm/fPkkSuYnxEy1knU0ge6Rs5sqMhn16VuuxnDsf4=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=rpJ8AN+NBNyo2qC7DJudNNpbqg596LmrpjCrVnVnw/xhD/VX0g8rdEEek5VqLjFZg +OgSWzODUnr5z4Z8tmryJ+BS7VtKP7PsTlXkM8jamcUcaKaYP0vKrHfrqLevZB6hb3 q6A/9Ycm3s4RKoH7IwjfyU86GsOy0DDi9qP6OnIdE6ZA9jbmWmojhAa0KIBcxVgTp3 Pr1wqmgNvxHtQxdynasBrwr6hnBwGXiJ/QXuRzDLMzv49ajb18o0NmdblcBoo0F4IN rqFKamI3tDh9RNXIBg4umGPaAMUGklHTWbsNunnVuC352hULfbUSsbbBW7R59IFm17 0EtHt2/lVMVrw== From: Vagrant Cascadian To: Efraim Flashner , Julien Lepiller Cc: guix-devel@gnu.org, Felix Lechner Subject: Re: maradns reproducibility fixes and the merits of picking a random number In-Reply-To: <87a6amgak1.fsf@contorta> References: <87pmjlfdjl.fsf@contorta> <310AD876-916E-4020-A87E-5609E8166432@lepiller.eu> <87a6amgak1.fsf@contorta> Date: Wed, 22 Jun 2022 19:05:33 -0700 Message-ID: <87r13grv6a.fsf@contorta> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" Received-SPF: none client-ip=2600:3c01:e000:267:0:a171:de7:c; envelope-from=vagrant@reproducible-builds.org; helo=cascadia.aikidev.net X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: guix-devel@gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+larch=yhetil.org@gnu.org Sender: "Guix-devel" X-Migadu-Flow: FLOW_IN X-Migadu-To: larch@yhetil.org X-Migadu-Country: US ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1655949965; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:in-reply-to:in-reply-to: references:references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:dkim-signature; bh=502VpU6ZZRHOJnHFIikqm4mWnAebJ6mGyje4snApfYo=; b=oXZlZM+Uk4ccxsHgOvEjH1iQF3TDlqft9OLZovzXeUuPtryjhDw294uVlk8kvTIHAEaMEK JIOInXhlZP53B3S5lpqMeQK2Mqeq2vv7ylkLHqIkK8Nbl0KTZiTAfJ+w4VUumiaX5NWYVV d4It1boWvF+3x2Pxk5Vz6kcEbjdmyupvswIPxncJRfH/Q8SDqagG/G4qoHdL9ZVDafbMgY 2Tt3I1q1oKj3A12L+wZo18hKRsf03RtR6l+/neVejkgCzH1q5Brx/esceFiv340AwEK6tu OQ4/DQi1i/8hy9NQCPNrs/+/p+sUApNZglj7RladPNbOkzaZ2CTX72C7KnhEDg== ARC-Seal: i=1; s=key1; d=yhetil.org; t=1655949965; a=rsa-sha256; cv=none; b=IMGtvBcMfqPjvlhnMOvNvyLMGa4ZbEOvOS0PXEhLWLzPFLwntFhs8jGyQ/HCnOm6nYMovb kMlOzSPnh7sThAcTPPmkyQH530YzPQXSV52f3tYHSP9u0ywaZlfeIiNXAtif6yhoti6rnQ Dix9NnRbFfyTbICucNO6iX488eqVZ2BS3yxnoMsVQFJKO3faHKe913PMbJcbNlm84TX3Yp ioo7sdwywDQ2j4+GY8n66rrYVSeabpIUhfwzno/4XDzdTISE+LBw6WierI97ImjM6RrTop oWcZ8WWBe289KL9dzqleZARQ+nbtI4uLc9g8Sr1cbRF9w5q5wddZi9X1lfA48g== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=pass header.d=reproducible-builds.org header.s=1.vagrant header.b=rpJ8AN+N; dmarc=none; spf=pass (aspmx1.migadu.com: domain of "guix-devel-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-devel-bounces+larch=yhetil.org@gnu.org" X-Migadu-Spam-Score: -3.56 Authentication-Results: aspmx1.migadu.com; dkim=pass header.d=reproducible-builds.org header.s=1.vagrant header.b=rpJ8AN+N; dmarc=none; spf=pass (aspmx1.migadu.com: domain of "guix-devel-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-devel-bounces+larch=yhetil.org@gnu.org" X-Migadu-Queue-Id: AF9191CA2B X-Spam-Score: -3.56 X-Migadu-Scanner: scn0.migadu.com X-TUID: 3vIuEMlE2nXz --=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable On 2022-06-08, Vagrant Cascadian wrote: > On 2022-06-08, Efraim Flashner wrote: >> On Tue, Jun 07, 2022 at 07:20:25AM +0200, Julien Lepiller wrote: >>> On June 7, 2022 5:24:22 AM GMT+02:00, Felix Lechner wrote: >>> >On Mon, Jun 6, 2022 at 6:50 PM Vagrant Cascadian >>> > wrote: >> This is something we can work with. We can just mark the package as >> '#:substitutable? #f' and then everyone will have to build it >> themselves. It still won't really be reproducible, but everyone will >> actually have their own special random number. > > This actually seems like the best approach in the short term! Leaving > time to work out a better fix long-term, probably by working with > upstream... > > Thoughts? Should I just push that part for the short-term workaround? Or does someone else want to push that? >>> >MaraDNS does not support DNSSEC so the program may not use entropy for >>> >keys. Either way, I'd rather use an unreproducible build than, >>> >accidentally, a known number series to encrypt secrets. Can one patch >>> >out the constant entirely so it is no longer available? >>> > >>> >The upstream website says: "People like MaraDNS because it=E2=80=99s .= .. >>> >remarkably secure." [1] Since many distributions have the same issue, >>> >upstream could perhaps offer the patch as a build switch to enable a >>> >build-time seed only when needed. >>>=20 >>> Sounds like the safest option. Maybe we could change the code that uses= that number to naise an exception or abort? > > Yeah, seems worth taking this or similar ideas upstream... And, this was the best place I found to mention this issue upstream, will see what kind of response I get: https://github.com/samboy/MaraDNS/discussions/101#discussioncomment-30064= 87 live well, vagrant --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEARYKAB0WIQRlgHNhO/zFx+LkXUXcUY/If5cWqgUCYrPKbgAKCRDcUY/If5cW qgnAAP9KduQtLvvU/+oRlDAypadxsOOoy84o/JlLcAQ3dPTJDwD/a05gDoEfw5Qn rzuDmywzFrVbdjEB3phscAlaSpXmkA0= =2NEV -----END PGP SIGNATURE----- --=-=-=--