chr15p | 5 months ago | on: IBM Technology Atlas
chr15p's comments
chr15p | 2 years ago | on: What Unix Cost Us (2020) [video]
That's not what the talk is about, that's one of the examples of brokenness he's talking about, as is the kill example, and yes they are deliberately troll-y examples.
The talk is about the very last statement "sometimes you have to drop your tools and make new ones" whether that's "everything is a file", "do one thing and do it well" (the ps example), or the way communities are structured. You don't have to agree with him on any of them but to dismiss them as "whitestraightmansplaining" is to duck as the point flies over your head.
chr15p | 2 years ago | on: Ubuntu stops shipping Flatpak by default
I think you're right that Canonical creates and releases projects and assumes they are in charge of them, but I disagree about Red Hat (honestly not sure what you mean by "rough ideas and code"), I think they tend to see whats already out there and then throw their weight behind that, then only if there isn't do they create their own and even then they are more open about how the project runs. That difference means Red Hat gets more momentum behind its projects, and that is what counts. (of course RH can throw more engineers at stuff as well, and that also helps a lot)
Its not some sort of conspiracy, nothing Canonical has ever done has had the same amount of hate as systemd has, its just a difference in approach.
chr15p | 2 years ago | on: Ubuntu stops shipping Flatpak by default
This. Also bzr. They seem to want to control their projects completely and so even when they have good tech they lose out to more open, community developed, equivalents that build wide engagement and momentum.
I honestly don't understand it, you would have thought they would have learned by now that they don't have the engineering resources to do everything by themselves.
Compare that to Red Hat who always try (and sometimes even succeed!) at developing projects with the community and are far more successful at getting their projects adopted (I know people don't like them, but you cant deny they are effective at it)
chr15p | 2 years ago | on: Red Hat 30th anniversary
I'm sure there are lots of places that still use vsftpd though (I have a vague memory that it supported kerberos at least), so it might still be useful for some people
chr15p | 2 years ago | on: Red Hat 30th anniversary
chr15p | 2 years ago | on: Red Hat 30th anniversary
1) it looks good on the resume, which can help you get past the initial sift by people who dont understand what your experience actually means.
2) They give you the chance to fill in the gaps in what you think you know. My experience of doing my RHCE after 10 years of professional sysadmining was of the 14 chapters in the book I knew maybe 10 already and had never touched the other 4 because they never came up in my job, and the prospect of a looming exam gave me a deadline and the motivation to actually sit down and learn them, which then paid off later in other jobs that did use them.
3) to test whether you are as good as you think you are :)
If those don't speak to you then they're probably not super important to do, luckily we mostly work in an industry where experience trumps exams.
chr15p | 2 years ago | on: Red Hat 30th anniversary
chr15p | 3 years ago | on: IBM to cut about 3,900 workers while still hiring in ‘higher growth’ areas
> Krishna’s strategy has been focused on bolstering the company’s offerings in hybrid cloud — providing services to customers that run their own data centers in some combination with public cloud
i.e. making it easier to move between data centers and cloud, and back again, so if "companies are taking a look at how much they are spending on cloud." then sounds like IBM are skating towards where the puck is going.
chr15p | 3 years ago | on: IBM to cut about 3,900 workers while still hiring in ‘higher growth’ areas
Mainframes: $4.5 billion
Consulting: $4.8 billion (even after selling off Kyndral)
Software: $7.3 billion
Software includes all of Red Hat, a pretty big security business, and "transaction processing" which isn't explained but I guess is running payroll and the like for other companies.
So lots of un-sexy stuff that never makes HN but keeps the world running.
chr15p | 3 years ago | on: The Chaos (1922)
Then sit back and get very upset with anyone who tries to remove the 'u' from colour.
chr15p | 3 years ago | on: Responsible stewardship of the UEFI Secure Boot ecosystem
chr15p | 3 years ago | on: Why Linux Succeeded
But without that (and no one has figured out how to do it so far) I agree, I cant see it happening.
chr15p | 3 years ago | on: Ask HN: How does HN manage to be always online?
The FAANGs operate the first kind, k8s is mostly aimed at the second kind scale, so its designed "for scale", for some definitions of scale.
chr15p | 3 years ago | on: Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found in the wild
The greater the difference between the kernel version you compiled for, and the kernel version you are trying to load it on, the greater the chance something you are relying on changed and the module loader cant resolve all the symbols and so it fails.
So saying a kmod has to match the kernel version is good practice but the reality is not quite as strict.
Red Hat has a list of "white listed" symbols that they try to maintain across a major version of RHEL so if your kmod only relies on them and nothing else then it should load on any kernel version within that release. But that's a Red Hat thing, not a Linux kernel thing.
chr15p | 3 years ago | on: What's new in Red Hat Enterprise Linux 9
CONFIG_LSM="lockdown,yama,integrity,selinux,bpf"
on kernel 5.14.0-70.13.1.el9_0.aarch64
So not on ARM at least
chr15p | 3 years ago | on: Cockpit Project
chr15p | 3 years ago | on: SELinux is unmanageable; just turn it off if it gets in your way
That shows the list of what labels are allowed to do what to which labels, so run ps -Z to get the label of your process and grep the sesearch output for it, and that will tell you what labels it's allowed to interact with and in what ways.
selinux is generally pretty straightforward, but it has a reputation for being impenetrable which puts people of trying to learn it.
chr15p | 3 years ago | on: SELinux is unmanageable; just turn it off if it gets in your way
sesearch -A will show you every thing that is allowed, and gives you (a lot of) lines like:
allow httpd_t httpd_t:dir { getattr ioctl lock open read search };
Which says that things (i.e. processes) with the httpd_t label are allowed to perform getattr, ioctl, lock, open, read, and search operations on directories with the httpd_t label.
ps -Z and ls -Z will then list the labels of processes, and the labels of files and directories. If your processes label does not have an allow rule for your file label for the correct action you are denied.
The only trick really is that when it reports a label as say "system_u:system_r:httpd_t:s0" thats 4 different colon separated fields and the only one you really care about is the type field "httpd_t", because thats what the rules are defined for (unless you're the NSA or doing Very Interesting things (the other fields are user, role, and security level, but the default Red Hat etc selinux policies dont use them))
There is no wiki with definitive list of labels because they are just strings and the policy writer can call them what they like, even the _t suffix is just a convention to denote the type.
chr15p | 3 years ago | on: SELinux is unmanageable; just turn it off if it gets in your way
SELinux also supports interesting things like applying security levels and contexts to data, so you can have data that is only accessible to appropriatly cleared users in one department but not to people with similar clearances in other departments. Very few people use this stuff though.
Selinux uses extended attributes to store its labels which is a pretty standard way of associating metadata with objects, and is supported by most standard unix commands (via the -Z flag) so I'm not sure what you mean by "filesystem hacks". Fundamentally they are both implemented as security modules in the kernel and do pretty much the same thing, which is best depends on whether the added security of SELinux is worth it to you.
Its not that someone writes that sort of stuff, its that it people read and think "yeah! give me some of that!" that makes me worry for humanity.