Hacker Newsnew | past | comments | ask | show | jobs | submit | jmb99's commentslogin

Yes, that’s right, don’t buy any new car, any phone, any television. Hell don’t buy any x86 laptop or desktop computer, since you can’t disable out replace Intel ME/etc.

How is that better?

You can focus all of your energy into strengthening and testing a single point of the system instead of having to do it for many.

You're grasping for straws a bit here. This is already done for ssh as the defacto remote access mechanism for a very long time.

How does SSH become an arbitrary user without effective root?

SSH should not become a different user; it should call something like `/bin/login` which uses PAM for authentication and is capable of starting user sessions.

How on god’s green earth is `sudo apt install telnet` sufficiently challenging to be a driving factor to creating your own distro??

Because I go long periods of time without internet access, and I don't want to have to "sudo apt install" a fucking thing, ever. Especially not a tiny utility that is all of 172k in size, that I might need for something. Understand?

I want EVERYTHING that I might use installed AT ALL TIMES, FROM DAY ONE, so that I can IMMEDIATELY USE IT when required.

This is only one of many reasons why I abandoned the giant dumpster fire that is mainstream Linux. I do not agree with their idiotic philosophy, on practically every level.

You've now discovered that there are sections of God's Green Earth that you never knew existed! One of many benefits of stepping outside the Matrix for a moment.


I would never ever install your distro for this reason alone.

Someone has already pointed out that old/deprecated/obsolete software like a telnet client represent tech debt.

Removing the telnet client was, in part, a recognition that its complementary server was deprecated and unsafe. If everyone was transitioned to ssh and nc, [and custom MUD clients], why keep telnet around?

Any software like this represents tech debt and a support burden for the upstreams and distros which carry them. You have unnecessarily assumed a burden in this way.

Furthermore, ask the maintainers of OpenBSD or any hardened OS about attack surfaces. The more software that you cram into the default distribution, the more bundled features an OS or system has, you are multiplying your potential vulnerabilities, your zero-days, and your future CVE/patch updates.

Especially in the face of growing supply-chain attacks and LLM-automated vulnerability disclosure. Your focus should be on limiting attack surface in every regard.

It is good practice for everyone to uninstall unnecessary apps and software. Whether you use Android, iOS, Mac, Linux, BeOS or Plan9 or Inferno. Do not install and maintain software that you do not use or need. It will come back to bite you.


> Furthermore, ask the maintainers of OpenBSD or any hardened OS about attack surfaces.

OpenBSD still ships with telnet.

Their developers don't entertain nonsense virtue signaling about things that are "unsafe" and they know their users are not idiots that need to be coddled.

Hammers and matches are unsafe if you use them wrong.


> I would never ever install your distro for this reason alone.

And you are? Completely mystified as to why you'd think I would care. I built this distro for me and my people, not you. That's the whole point. We're getting off this ride.

> Someone has already pointed out that old/deprecated/obsolete software like a telnet client represent tech debt.

Not a subscriber to this religion. There is nothing about new software that inherently makes it safe, and nothing about old software that inherently makes it vulnerable.

New flaws are introduced all the time, and old bugs do get found and fixed.

I can patch old code. I can't guarantee that new code doesn't contain bugs.

The ONLY way to ensure code is flawless is through validation--mathematical proof. When you have devised a proof framework that I can use across my distro, get back to me. At this time you're nowhere near that level, and are therefore unqualified to lecture anyone about security.

> Removing the telnet client was, in part, a recognition that its complementary server was deprecated and unsafe.

Unsafe? On my personal LAN? I think not.

You don't get to just 'deprecate' things that I might need, or want to use for perfectly valid reasons.

That's the entire point of my distro: computing the way I WANT IT, not the way Ubuntu wants it.

> If everyone was transitioned to ssh and nc, [and custom MUD clients], why keep telnet around?

Because it's 172 kilobytes. Contrast with the giant bloated carcass of everything else they shove in there that's oh-so-needed by the herd.

> Any software like this represents tech debt and a support burden for the upstreams and distros which carry them. You have unnecessarily assumed a burden in this way.

I'm a distro maintainer. Hello? Telnet represents ZERO maintenance burden for me. There are no operators standing by on hotlines to "support" any of this. It's a 172 kilobyte utility.

> Furthermore, ask the maintainers of OpenBSD or any hardened OS about attack surfaces. The more software that you cram into the default distribution, the more bundled features an OS or system has, you are multiplying your potential vulnerabilities, your zero-days, and your future CVE/patch updates.

Nobody can magically teleport themselves inside my computer and compromise my telnet client. Nobody is injecting packets into my LAN.

> Especially in the face of growing supply-chain attacks and LLM-automated vulnerability disclosure. Your focus should be on limiting attack surface in every regard.

You're concerned about supply chain attacks, so your mitigation is...doubling down on getting the Latest Updates to everything? Because new code is inherently good.

Telnet has to go--way too risky to keep that around--but KDE/Gnome/systemd/dbus/etc stays?

'traceroute' is useless and dangerous, but let's keep the giant QT framework with its vendored copy of Chromium? (That's QT5 and QT6, each with a vendored Chromium, mind you.)

Chromium, by the way, itself represents tens of gigabytes of code/data now inside its repository, with 'third party' directories vendored three or even four levels deep. But a 72k traceroute utility is likely to be packed with security flaws and should be avoided.

> It is good practice for everyone to uninstall unnecessary apps and software. Whether you use Android, iOS, Mac, Linux, BeOS or Plan9 or Inferno. Do not install and maintain software that you do not use or need. It will come back to bite you.

Completely wrong and misleading theory of security you are proposing here.

I devised this new distro exactly because I was tired of my computing experience being shaped and controlled by clueless kids with intellectually bankrupt arguments and/or wolves in sheeps' clothing.


Well this is weird.

You talk about me, my, mine, my network, my computer. But you're promoting a "distro". That means you're distributing software. It's not yours anymore.

Attackers on a network will use techniques to "pivot". Once a "foothold" is established then they scan for other places to attack. They will indeed get inside "your" computer, or router, and then compromise your telnetd.

It comes back to the liberty of swinging your arms vs. the proximity to my nose. If your distro is connected to a network, then you're responsible and accountable for security issues that result. There are thousands of distro kiddies sending out their favorite flavor of Linux, but how many audited it like Theo de Raadt?

You don't seem to understand the CVE under discussion. It doesn't even affect telnet(1). Practically nobody runs telnetd(8) anymore since the introduction of encryption, ssh, and the like. MUD players use MUD clients. Network admins use nc(1). The reason "telnet" was deprecated is: it's just not really useful anymore without its complementary service. telnet(1) isn't inherently dangerous, it's just superfluous, and distros pretty much evaluated that it wasn't worth hanging on to.

As for "traceroute", I'm not sure it's "useless or dangerous", but it can be misleading and definitely superfluous. It is widely misinterpreted by novices trying to prove something about their WAN connectivity. It misrepresents network topology and doesn't work real good with modern equipment or protocols. It was a judicious decision to bundle it with network debugging tools, because not everyone needs to debug networks. Especially the ones who believe that they can.

I would say that any network debugging tool available is also useful to your attackers with a foothold. A "living off the land" attack will leverage your telnet client, will run traceroutes on your network, and they will use all the software cruft that you didn't uninstall! I am pretty sure there are distros that simply don't come with development environments, C compilers, or various interpreters anymore, and it is for this reason: they are not inherently insecure or vulnerable, but "living off the land" will weaponize them every time.

However, I must concede that your temperament and tone is well-suited to being a distro administrator. You remind me of Linus Torvalds vs. Andrew Tanenbaum, or Theo de Raadt vs. FreeBSD. Perhaps Scott Adams vs. the world. Carry on, good sir.


The easiest way to make your own “distro” is apt-get install stuffiwant…

> I have a 21 yo car and a 12 yo car and will eventually have to get something 'modern' (worse) that forces spyware/subscriptions on me just to get from point at to point b

I daily a 30 year old car. There exists a sweet spot of reliability, safety, and comfort (probably the early-mid 2000s) that in theory, you should never have to buy a vehicle outside of, newer or older. There will always be clean old cars in good shape you can buy, you don't need a new vehicle.

Unless you can't buy gasoline anymore. But that's still quite a long ways away imo.


luckily I don't drive much. The one car is just falling apart and is ridiculously expensive to maintain (don't buy a used Mercedes, ever). The other is just not fun to be in but at least it gets reasonable gas mileage. I really want an electric vehicle, especially the way things are going right now, but buying anything built in the last 10 years is just depressing at best and electric vehicle life is much lower on average than ICE lifespan due to battery life. Ah well. Maybe this will push me to an electric scooter for all the in-town travel and I will only need a 'real car' once a month or so.


> He finally found a safe spot and successfully pitted the car to a stop.

No such thing as a safe spot to PIT someone, ever, let alone while they're asleep at the wheel. This is a great example of why people hate all cops, anyone with two brain cells to rub together would get in front of the car and gradually slow to a stop.


It's a bit grim, but equally what else are you supposed to do? This car will definitely crash into something pretty soon.


I agree with the recommendation that you yourself replied to: move in front of the vehicle, and gradually slow to a stop, with lights and sirens optional but recommended

I am thrown by the question of "What else should have been done" though, after grandparent made an explicit recommendation


Oof, imagine an airbag going off while slumped over the wheel!


Damn, is this the first time ever the east coast is doing better than Colorado? We’ve had record snowfalls all over Quebec, I spent all day last Friday skiing in a foot of fresh powder. Unheard of on the ice coast*.

*not literally. But still, crazy amount of snow this year so far


Neighboring ski areas in Maine have just so so snow. NOAA Northeast snowpack map. One of my favorites.

https://www.weather.gov/images/nerfc/ops/nohrsc_full_sd.png

I usually use this one but the previous includes Quebec.

https://www.weather.gov/images/nerfc/ops/NOHRSC_SD_highcontr...


I have a decent amount of second hand experience with used cars, through my brother who is a mechanic and spent a number of years working at a used car dealership. Hyundai/Kia is the only company he ever had to do engine replacements for at said dealership, and he did dozens. All under 200k km (frequently right after the extended warranty on the engines ran out, and occasionally on the second or even third engine for the vehicle). These are cars with good service history and otherwise in excellent condition. Sometimes cars they got on trade, sometimes purchased from auctions, sometimes customer cars (after they were sold). No rhyme or reason, just a genuinely bad design that was “fixed” but never fixed.

The only other universally-bad major component is JATCO CVT transmissions. I think his record was an Infiniti QX60 that had 95k km and a blown transmission. Most small vehicle/sedan CVTs he did were in the 160-190k km range, with some lasting as long as 250k km. And of course they were not repairable, since even if parts were available, the entire thing grenades leaving basically nothing left to rebuild.

Point being, “one engine issue due to a manufacturing flaw” is drastically underselling the issue, at best. It is an incorrectly-engineered engine that fails prematurely when built within specification, except when the tolerance stackup lines up in your favour and you perform much more frequent maintenance than prescribed. Oh and the affected engines were manufactured over about 15 years (and there’s signs that their current GDI 4-cylinders are still affected).


The theta 2 is installed in millions. It the failure rate was even close to 20% within 30k miles dealers would be overwhelmed.

It may it be as well designed and that is responsible for some failures when combined with poor maintenance. I think the manufacturing issues bumped it to a percentage that is noticeable.

However. It can't be a significant amount because it would collapse the dealer network


>It can't be significant

1.3 Billion-Dollar settlement.

Seems significant.

https://safetyresearch.net/hyundai-kias-billion-dollar-engin...


I mean, if you’re in the top 3 percent of anything, yes that’s pretty good, but not unbelievably so, especially in the field of chess. If for instance you randomly put together a classroom full of chess players, there’s decent odds one of them is better than top 3%. Two classrooms and it’s almost a certainty.

Put another way, looking at chess.com users, there are ~6 million people who would count as the top 3 percent. Difficult to achieve, yes, but if 6 million people can achieve it, it’s not really a “humble brag,” it’s just a statement.


It made me smile to hear “I’m only 97th percentile” isn’t a humblebrag. You may be employing an old saw of mine, you can make people* react however you want by leaning on either percentages or whole numbers when you shouldn’t.

* who don’t have strong numeracy and time to think


> and wireguard is about as easy a personal VPN as there is.

I would argue OpenVPN is easier. I currently run both (there are some networks I can’t use UDP on, and I haven’t bothered figuring out how to get wireguard to work with TCP), and the OpenVPN initial configuration was easier, as is adding clients (DHCP, pre-shared cert+username/password).

This isn’t to say wireguard is hard. But imo OpenVPN is still easier - and it works everywhere out of the box. (The exception is networks that only let you talk on 80 and 443, but you can solve that by hosting OpenVPN on 443, in my experience.)

This is all based on my experience with opnsense as the vpn host (+router/firewall/DNS/DHCP). Maybe it would be a different story if I was trying to run the VPN server on a machine behind my router, but I have no reason to do so - I get at least 500Mbps symmetrical through OpenVPN, and that’s just the fastest network I’ve tested a client on. And even if that is the limit, that’s good enough for me, I don’t need faster throughput on my VPN since I’m almost always going to be latency limited.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: