<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: blucaz</title><link>https://news.ycombinator.com/user?id=blucaz</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 21 Apr 2026 13:42:23 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=blucaz" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by blucaz in "Systemd, Vsock, & OpenSSH-Server"]]></title><description><![CDATA[
<p>"While the above attack did use the systemd vsock sshd listener for Escape
to Host, the attacker could have just directly listened over the vsock loopback."<p><a href="https://www.openwall.com/lists/oss-security/2026/01/08/7" rel="nofollow">https://www.openwall.com/lists/oss-security/2026/01/08/7</a><p>TL;DR: a clueless user fails to understand and configure his own systems, but for clickbait effect chooses to blame the evil SyStEmD!!!11 instead of his own incompetence</p>
]]></description><pubDate>Fri, 16 Jan 2026 10:41:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46645083</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=46645083</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46645083</guid></item><item><title><![CDATA[New comment by blucaz in "Debian's Git Transition"]]></title><description><![CDATA[
<p>Maintaining separate upstream sources and downstream patches does provide value. Maybe not to you, but it does.<p>For example, it's trivial from a web browser with a couple of clicks to go and find out all the downstream changes to a package. For example to see how glibc is currently customized in debian testing/unstable you can just navigate this webpage:<p><a href="https://sources.debian.org/src/glibc/2.42-6/debian/patches" rel="nofollow">https://sources.debian.org/src/glibc/2.42-6/debian/patches</a><p>If everything gets merged in the same git tree it's way harder. Harder but doable with a rebase+force push workflow, which makes collaboration way harder. Just impossible with a merge workflow.<p>As an upstream maintainer of several project, being able to tell at a glance and with a few clicks how one of my projects is patched in a distribution is immensely useful when bug reports are opened.<p>In a past job it also literally saved a ton of money because we could show legal how various upstreams were customized by providing the content of a few .debian.tar.gz tarballs with a few small, detached patches that could be analyzed, instead of massive upstream trees that would take orders of magnitude more time to go through.</p>
]]></description><pubDate>Tue, 23 Dec 2025 16:42:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46366756</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=46366756</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46366756</guid></item><item><title><![CDATA[New comment by blucaz in "Systemd v259"]]></title><description><![CDATA[
<p>It gracefully falls back if the new option is not available at runtime</p>
]]></description><pubDate>Thu, 18 Dec 2025 18:56:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46316924</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=46316924</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46316924</guid></item><item><title><![CDATA[New comment by blucaz in "Fedora Linux devs discuss dropping 32-bit packages – bad news for Steam gamers"]]></title><description><![CDATA[
<p>No, the graphics stack needs to be native and in sync for obvious reasons, and that includes the mesa libraries. What can be in the runtime is already in the runtime.</p>
]]></description><pubDate>Wed, 25 Jun 2025 10:25:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=44375630</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=44375630</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44375630</guid></item><item><title><![CDATA[New comment by blucaz in "Introducing stronger dependencies on systemd"]]></title><description><![CDATA[
<p>> The reality is that no such documentation is provided, so the only way to avoid systemd is to become an expert in its internals.<p>The blog post subject of the thread literally links to the documentation. If you can't even be bothered clicking on the provided links, what are you even doing commenting on such a thread. But by all means, don't let facts get in the way of a good baseless rant.</p>
]]></description><pubDate>Fri, 13 Jun 2025 21:47:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=44272591</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=44272591</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44272591</guid></item><item><title><![CDATA[New comment by blucaz in "Introducing stronger dependencies on systemd"]]></title><description><![CDATA[
<p>It's not even that, that whole story's main point was about how an incredibly complex, sophisticated and lengthy social engineering attack was carried out, probably by a nation-state actor, after singleing out an over-worked open source maintainer of a core project (xz) doing a thankless job and getting pressured left-and-right until he caved (no fault of his own), and they managed to install an updatable, generic backdoor that could be used to attack literally anything. The initial version was chosen to target sshd <-- libsystemd <-- xz.<p>The takeway that sensible people go away with is that core critical infrastructure needs to be properly funded, and people need to stop harassing open source maintainers.<p>Idiots instead rant about "muh systemd" and use it to attack other maintainers.</p>
]]></description><pubDate>Fri, 13 Jun 2025 21:40:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=44272535</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=44272535</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44272535</guid></item><item><title><![CDATA[New comment by blucaz in "Systemd ParticleOS"]]></title><description><![CDATA[
<p>> I’m somewhat a fan of systemd and I’m interested in immutable images, but I don’t want to build systemd from source:<p>You don't have to, we build packages and publish repositories from latest main, and the particle configs can use those by enabling the 'obs' build profile</p>
]]></description><pubDate>Fri, 11 Apr 2025 09:40:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=43652104</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=43652104</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43652104</guid></item><item><title><![CDATA[New comment by blucaz in "Reasons to Love Systemd"]]></title><description><![CDATA[
<p>> So how do I replace any of them with my own, small tool?<p>You write them with an equivalent public interface.<p>> They have no stable interfaces.<p>This is nonsense. All the D-Bus (and now Varlink too) interfaces are stable, documented and we do not break backward compatibility.<p>> yet nobody was able to write a replacement.<p>That's because actually doing things is hard, but complaining on social media is extremely easy.</p>
]]></description><pubDate>Tue, 18 Feb 2025 15:20:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=43090514</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=43090514</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43090514</guid></item><item><title><![CDATA[New comment by blucaz in "Bypassing disk encryption on systems with automatic TPM2 unlock"]]></title><description><![CDATA[
<p>> The fact the initramfs is not signed/verified on any desktop Linux distro means secure boot is completely pointless right now on Linux, and is very dissapointing.<p>It is not. There are other, very real and very important problems with that fact and reasons why it should be fixed, but this is not it. The point of SecureBoot is to protect the firmware from userspace. It works very well for that purpose, as evidenced by the facts that exploits to bypass it have to continuosly be found.</p>
]]></description><pubDate>Fri, 17 Jan 2025 15:08:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=42738281</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=42738281</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42738281</guid></item><item><title><![CDATA[New comment by blucaz in "Why systemd is a problem for embedded Linux"]]></title><description><![CDATA[
<p>> When configuring boot media, like an SD card, for an embedded ssystem that is not the running system where the configuration is occurring, this is an impediment. There is systemd-firstboot, etc, but this is not as convenient as just being able to set config options on the mounted (non-booted) embeddded media.<p>systemctl --root /path/to/sd/card/ <...></p>
]]></description><pubDate>Mon, 04 Nov 2024 01:26:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=42037590</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=42037590</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42037590</guid></item><item><title><![CDATA[New comment by blucaz in "Why systemd is a problem for embedded Linux"]]></title><description><![CDATA[
<p>Debian, Ubuntu and all derivatives thereof use initramfs-tools, which does not use systemd in the initrd, and things work just fine</p>
]]></description><pubDate>Mon, 04 Nov 2024 01:12:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=42037529</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=42037529</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42037529</guid></item><item><title><![CDATA[New comment by blucaz in "Porting systemd to musl Libc-powered Linux"]]></title><description><![CDATA[
<p>malloc_info() is not consumed internally but it is only wired up as a debugging utility via systemd-analyze, which is sorely needed when things go bad in strange and weird ways. It would be entirely fine for a libc to just implement a stub that returns a fixed string:<p><malloc version="0">Not implemented</malloc><p>or so.</p>
]]></description><pubDate>Mon, 09 Sep 2024 09:01:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=41486674</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=41486674</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41486674</guid></item><item><title><![CDATA[New comment by blucaz in "Dhcpcd replacing dhclient for Debian Trixie or perhaps networkd?"]]></title><description><![CDATA[
<p>For the record, it turned out this was just a series of misunderstandings on the part of the OP on how configuring networking works on Linux, and the differences between how the kernel and how userspace manage and configure addresses. These points have all been clarified by myself and another maintainer on <a href="https://github.com/systemd/systemd/issues/33866">https://github.com/systemd/systemd/issues/33866</a><p>- the assertion is made that networkd creates link local addresses - it does not, the kernel does.<p>- the assertion is made that configuring how the _kernel_ sets up link local addresses must automatically and silently affect how userspace network managers configure global addresses. This is of course not the case, and one might ask for such a feature, but its absence most definitely does not mean that it is "utterly inadequate for IPv6 or dual-stack installations".<p>- the assertion is made that userspace network managers independently listening on RA packets and creating SLAAC global addresses independently of the kernel must set the stable-privacy interface flag. This is not the case, such flags are owned by the kernel and cannot be set by userspace. Being absent does not mean the the addresses are not private or stable, it just means they are not kernel managed, and thus a different (RFC 7217 compliant) algorithm is used as explained on <a href="https://www.freedesktop.org/software/systemd/man/latest/systemd.network.html#prefixstable%5B:ADDRESS%5D%5B,UUID%5D" rel="nofollow">https://www.freedesktop.org/software/systemd/man/latest/syst...</a><p>- the assertion is made that the suffixes generated by the _kernel_ to set up link local addresses must automatically and silently be copied by userspace network managers to configure global addresses on the respective interfaces. This is also of course not the case, the algorithm is described in the link above, and again asking for such a new feature is fine, but its absence does not mean that it is "utterly inadequate for IPv6 or dual-stack installations".<p>- the assertion is made that certain defaults must be changed to meet the OP's personal preferences. This of course cannot really be done in a project like systemd, where we try our best to keep backward compatibility, even if we don't always succeed. The desired configuration is very easy to setup, for example this should suffice:<p>[Network]
IPv6PrivacyExtensions=yes
IPv6LinkLocalAddressGenerationMode=stable-privacy<p>[IPv6AcceptRA]
Token=prefixstable<p>As usual, it would be best to ask clarification questions and investigate how things actually work _before_ making definitive assertions on a blog post about a component for which one has a cursory understanding at best, but that's not nearly as much fun as a good ol' systemd bashing blog post, right?</p>
]]></description><pubDate>Wed, 31 Jul 2024 11:49:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=41118336</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=41118336</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41118336</guid></item><item><title><![CDATA[New comment by blucaz in "No more boot loader: Please use the kernel instead"]]></title><description><![CDATA[
<p>> Systemd-boot, any boot loader, that aims to replicate the things that the kernel does is ultimately going to run into the same problems as grub. We're going to have the font CVEs, we're going to have filesystem and storage and memory allocation bugs. All of that stuff is going to exist in whatever boot loader.
> Again, for an individual user, if you want to install systemd-boot, great, go ahead and use it. It's good, it works. But as a general option it's just going to have the same issues, unfortunately.<p>This is completely wrong though - the main point of sd-boot is that it does _not_ implement any of that - no filesystems, no fonts, no themes, nothing at all, the firmware is used to do all the risky stuff via the UEFI protocols. So it is very much not reimplementing what grub or the kernel do, the exact opposite in fact, it's the number one design goal.</p>
]]></description><pubDate>Wed, 10 Jul 2024 10:24:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=40925462</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=40925462</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40925462</guid></item><item><title><![CDATA[New comment by blucaz in "Version 256 of systemd boasts '42% less Unix philosophy'"]]></title><description><![CDATA[
<p>Yes: it's a joke. Here, have some chills, on the house:</p>
]]></description><pubDate>Tue, 18 Jun 2024 10:17:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=40715957</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=40715957</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40715957</guid></item><item><title><![CDATA[New comment by blucaz in "Debian's /tmpest in a teapot"]]></title><description><![CDATA[
<p>The fact that YOU have a particular use case doesn't necessarily mean much either. Just customize your configuration accordingly, and move on.</p>
]]></description><pubDate>Wed, 05 Jun 2024 13:40:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=40584623</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=40584623</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40584623</guid></item><item><title><![CDATA[New comment by blucaz in "Debian's /tmpest in a teapot"]]></title><description><![CDATA[
<p>Or what about, delete it after 10 days it was last accessed (regardless of whether for read or write)? Hint: that's already how tmpfiles.d works</p>
]]></description><pubDate>Wed, 05 Jun 2024 13:37:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=40584599</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=40584599</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40584599</guid></item><item><title><![CDATA[New comment by blucaz in "Debian's /tmpest in a teapot"]]></title><description><![CDATA[
<p>> Why not just have the installer _ask_ me what configuration I prefer?<p>Because nobody bothered to actually put in some work to implement that. As I've said on the ML, if somebody does the work, I'll review it. But it's one of hundreds of different settings, and it's obviously not worth anybody's time to do this work, as it's largely inconsequential and trivial to configure via the supported config files. Complaining on social media is of course cheap enough that we get plenty of it.</p>
]]></description><pubDate>Wed, 05 Jun 2024 09:32:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=40583025</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=40583025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40583025</guid></item><item><title><![CDATA[New comment by blucaz in "DBus and Systemd"]]></title><description><![CDATA[
<p>What a genius idea, how bizarre that nobody ever thought about that before! We just need to get the bus dependencies up first and then... oh. Oh wait. Oh no.</p>
]]></description><pubDate>Thu, 30 May 2024 20:27:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=40528240</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=40528240</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40528240</guid></item><item><title><![CDATA[New comment by blucaz in "DBus and Systemd"]]></title><description><![CDATA[
<p>> kdbus didn't even make it into staging. Project mainline put in some serious work to get where it got.
>
> And quite probably part of it going better was not insisting on becoming mandatory solution for everyone. If anything, it might have been less "wheelbarrows of cash" and more conflicts involving kdbus principal developer and Linus.<p>You mean, because it would actually be _used_ somewhere in open source distributions (that is, not just deep inside some de-facto proprietary half-closed-source fork owned by a single mega-corp)? Yeah when things are hidden away in some cupboard in the basement it's much easier not to ruffle feathers. But yeah the LKML is bad today, but back then it was a veritable open-air cesspool<p>> The kdbus docs could do better job declaring why it's needed then.<p>Well, it's dead, so what's the point...</p>
]]></description><pubDate>Thu, 30 May 2024 20:24:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=40528196</link><dc:creator>blucaz</dc:creator><comments>https://news.ycombinator.com/item?id=40528196</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40528196</guid></item></channel></rss>