bluca, to random
@bluca@fosstodon.org avatar

Alright, this took some team effort but in git main we are now at:

$ lddtree build/libsystemd.so.0
build/libsystemd.so.0 (interpreter => None)
libcap.so.2 => /lib/x86_64-linux-gnu/libcap.so.2
libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6
ld-linux-x86-64.so.2 => /lib/x86_64-linux-gnu/ld-linux-x86-64.so.2

for a full-feature build, down 5 libs which are now dlopened on demand. Last one, libcap, will need to be swapped for some ioctls which won't happen for this release.

linuxiac, to linux
@linuxiac@mastodon.social avatar
crepels, to linux
@crepels@mastodon.social avatar

✨New post in the systemd by example series!✨

This time, I'm taking a look at systemd timers.⏱️

Compared to adding entries to crontab, timers are more powerful and flexible, and in my opinion a lot simpler.

https://seb.jambor.dev/posts/systemd-by-example-part-5-timers/

jph, to random
@jph@hachyderm.io avatar

Anyone got any ideas about how to do this very-specific thing? https://systemd-by-example.com/system/13ef8a77f2add98b78e65ba4fe694a8e

I'm trying to have a Target get disabled by a Condition, and then not pull in its dependencies, but the systemd documentation says it's not possible - but doesn't suggest an alternative

sekenre, to random
@sekenre@fosstodon.org avatar

Wait. Lemme rewind just a sec. Why is PID 1 dynamically linked? #XZBackdoor #XZ #systemd

winterschon, to infosec
@winterschon@hachyderm.io avatar

we're all aware of the xz issue, but systemd and CVEs are intertwined. linux distros choose insecurity + instability by using systemd.

it's brought to you by:

  • a dev who despises POSIX
  • a dev who eschews security, ethics, and foundations of UNIX
  • a dev explicitly aligned to microsoft propaganda
  • a dev who is anti-FOSS
  • a dev fiscally compensation by the closed-source juggernaut

never forget: https://pwnies.com/systemd-bugs/

danvratil, to KDE
@danvratil@fosstodon.org avatar

A lazy (and free!) Saturday, time to play around and experiment. How about managed by ?

(Don't worry, I'm not merging this (for now 😈). I'm not even sure if it's a good or a bad idea. And even if it gets merged, it will be optional. I rewrote the process management code to make it extensible, so in the future we can also run Akonadi as a Windows Service or whatever is native on MacOS, with fallback to the mechanism we use today)

swelljoe, to random
@swelljoe@mas.to avatar

The abusive behavior that was being used to manipulate Lasse Collin into bringing on more maintainers for went unnoticed because abusive behavior in Open Source communities is so pervasive. In context, we can clearly see it was part of an orchestrated operation. Out of context, it looks like just another asshole complaining about stuff they have no right to complain about. https://robmensching.com/blog/posts/2024/03/30/a-microcosm-of-the-interactions-in-open-source-projects/

Okanogen,
@Okanogen@mastodon.social avatar

@swelljoe
Lol. I wrote this even before knowing that this vuln was caused by a kludge to make SSHD work with authentication and targets that.
I'm sure the sysemd maintainers have a great corporate excuse for why it's not any of their fault.

nf3xn, to random
@nf3xn@mastodon.social avatar

Fuck

This has been a public service announcement.

irfan, to linux

There's a huge backdoor ( -2024-3094) allowing remote SSH access (as far as I can tell at this moment) caused by a util called affecting a ton of systems ( and , well not really) and it's causing quite a huge panic. I honestly don't know much about it just yet, but just sharing some pieces to read about the huge vulnerability.

The person who had maliciously planted this vulnerability into xz-utils, Jia Tan, has made at least 750 contributions to the project over the past 2 years. They even have direct push access to the code repo, allowing them to have pushed commits with forged authors. Being "free" from this vulnerability is not as simple as reverting to a previous version due to just how much and how long they've contributed to the project, and people are rightfully suspicious that this person might have hidden other backdoors in xz.

Unlike most other vulnerabilities, it's a lot harder to pinpoint versions affected by this but the most likely case is most systems out there have xz installed on their system that are impacted - which at this moment, the info being thrown around is any version past 5.3.1, 5.4.6, or 5.6.0 (latest is 5.6.1).

🔗 https://access.redhat.com/security/cve/CVE-2024-3094

🔗 https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094

🔗 https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users

🔗 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024

irfan,

As far as I can tell, you're only impacted by this vulnerability only if:

  • Your distro sources/packages xz from their release tarballs rather than through the Git source directly.

  • The payload was only included for the or packaging, so unless your distro uses these - you're probably safe.

  • As far as I can tell, it also only affects x86 systems so based systems should be fine.

  • As far as I can tell, your system needs to be running to be impacted by this, so / should mostly if not entirely be fine....? maybe.


In other news, people are currently investigating and evaluating other projects also actively contributed by the compromised developer, Jia Tan, including .

People are also analysing the dev's commit history to deduce their background from their activity lol. They've been found to push commits during office hours Mon-Fri, every other Saturdays, presumably Public Holidays that seem to align with China's PH, and seems to be on GMT +8 locale.

🔗 https://github.com/libarchive/libarchive

🔗 https://twitter.com/hackerfantastic/status/1773864354439417983

Taffer, to openSUSE
@Taffer@mastodon.gamedev.place avatar

Is there some sort of systemd event or trigger when a Bluetooth I/O device (a mouse in my case) is attached or removed?

Wondering if I could use this to automatically (and emphatically) disable my laptop's touchpad when the mouse connects.

nixCraft, to linux
@nixCraft@mastodon.social avatar

This page explains how to increase file descriptor limits using systemd or an older init system. Both soft and hard limits can be set per user or service, or system-wide. https://www.cyberciti.biz/faq/linux-increase-the-maximum-number-of-open-files/

maxamillion, to linux
@maxamillion@fosstodon.org avatar

I'm just going to say it, and we can agree to disagree if you do in fact disagree...

systemd has categorically made Linux better in basically every way imaginable

It's earnestly cool if you don't agree but it's really really good

🤷

alexleduc, to ai
@alexleduc@mstdn.ca avatar
konstantin, to rust
@konstantin@social.headbright.eu avatar

I love how Go and Rust programs just compile down to a single binary you can do whatever you want with. Sprinkle a systemd definition and voila, you’ve got yourself a long running service with superpowers 🥰.

linmob, to linuxphones
@linmob@fosstodon.org avatar
alxdre301, to linux
@alxdre301@urusai.social avatar

My livestream of switching from GRUB2 to systemd-boot! (I will try to speak in Vietnamese so please forgive me T_T)

https://spectra.video/w/7SqM553Qf5EUkFzQWRnu4s

sonny, to GNOME
@sonny@floss.social avatar

About the true purpose of systemd

I've been involved with #GNOME, #KDE, #freedesktop and #postmarketOS, ...

I've met @pid_eins and other prominent figures behind closed doors

I can confirm from first-hand experience that systemd is indeed a conspiracy to make better operating systems with Linux

#systemd #Linux #postmarketOS

angdraug, to random
@angdraug@mastodon.social avatar

It's ok to summarily block people spreading FUD and conspiracy theories about .

kzimmermann, to debian
@kzimmermann@fosstodon.org avatar

456 packages now in the waiting list because of one unmet dependency in a compatibility package.

Is this what war of attrition feels like?

C'mon :(

bart, to KDE
@bart@mastodon.fam-ribbers.com avatar

And of course, also runs great with on ! Just got this running a few minutes ago.

postmarketOS, to random

let us know if you give these demo images a try

https://mirror.postmarketos.org/temp.fdcc091b56f5/

postmarketOS, (edited ) to random
linuxiac, to linux
@linuxiac@mastodon.social avatar

openSUSE Tumbleweed integrates systemd-boot for improved boot performance and security, with GRUB still the default choice.
https://linuxiac.com/opensuse-tumbleweed-integrates-systemd-boot/

phryk, to random
@phryk@mastodon.social avatar

My very first impression of :

  • Try to write service file
  • Have error in service file
  • Fix error in service file
  • systemctl still complains about error in file, referring to the number of the line I deleted
  • Look for problem on SO, find systemctl daemon-reload
  • Doesn't actually reload service file
  • Triple check official documentation
  • Documentation confirms that this SHOULD work and reload service files
  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • InstantRegret
  • DreamBathrooms
  • ethstaker
  • magazineikmin
  • thenastyranch
  • ngwrru68w68
  • Youngstown
  • slotface
  • tester
  • love
  • kavyap
  • everett
  • cubers
  • megavids
  • mdbf
  • khanakhh
  • tacticalgear
  • osvaldo12
  • rosin
  • normalnudes
  • GTA5RPClips
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • modclub
  • JUstTest
  • All magazines