public inbox for libc-alpha@sourceware.org
 help / color / mirror / Atom feed
From: "Ludovic Courtès" <ludo@gnu.org>
To: DJ Delorie <dj@redhat.com>
Cc: carlos@redhat.com,  ashankar@redhat.com,  fweimer@redhat.com,
	adhemerval.zanella@linaro.org,  libc-alpha@sourceware.org
Subject: Re: On the removal of nscd from Fedora, and the future of nscd.
Date: Tue, 01 Mar 2022 18:44:49 +0100	[thread overview]
Message-ID: <87mti94lf2.fsf@gnu.org> (raw)
In-Reply-To: <xnpmn57gwl.fsf@greed.delorie.com> (DJ Delorie's message of "Tue,  01 Mar 2022 11:54:02 -0500")

DJ Delorie <dj@redhat.com> skribis:

> Ludovic Courts <ludo@gnu.org> writes:
>> This nscd requirement is one of the few must-haves to ensure, as
>> Joseph writes, that processes (in particular those linked against
>> Guix’s libc) do not end up dlopening arbitrary, possibly incompatible
>> libraries.
>
> My point is, if there's a risk that a Guix binary *could* load a host
> dso, then Guix is insufficiently isolated from the host system.  nscd is
> just one example of how this could happen.  If you accept this
> non-isolation, you need to accept that dsos need to be cross-usable.

Actually, by default, a Guix program on (say) Fedora-without-nscd won’t
dlopen Fedora’s libnss_sssd.so.  Instead, it’ll search in vain for
libnss_sssd.so in its search path (which does not include /usr/lib), and
have its name lookups fail with EAI_SYSTEM, ENOENT, or some other
unclear error.

IMO the situation of NSS is singular.  The use case of Guix, Nix, and
others is also very real, used today just fine even without full
isolation (separate namespaces & co.).

I hope this clarifies the context.

Ludo’.

  reply	other threads:[~2022-03-01 17:44 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-02-28 20:55 Carlos O'Donell
2022-02-28 23:02 ` DJ Delorie
2022-02-28 23:09   ` Joseph Myers
2022-03-01  1:02     ` DJ Delorie
2022-03-01  9:10   ` Ludovic Courtès
2022-03-01 16:54     ` DJ Delorie
2022-03-01 17:44       ` Ludovic Courtès [this message]
2022-03-01 18:31         ` DJ Delorie
2022-03-03 13:40           ` Ludovic Courtès
2022-03-06 22:05             ` John Ericson
2022-11-20 18:34               ` Florian Klink

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87mti94lf2.fsf@gnu.org \
    --to=ludo@gnu.org \
    --cc=adhemerval.zanella@linaro.org \
    --cc=ashankar@redhat.com \
    --cc=carlos@redhat.com \
    --cc=dj@redhat.com \
    --cc=fweimer@redhat.com \
    --cc=libc-alpha@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).