Hacker Newsnew | past | comments | ask | show | jobs | submit | davexunit's commentslogin

Go away.

Go cry me a river. How can I donate to some platforms advertised by Guix with just running free software as you state? Go on.

Explain us.


Always interesting to see an older article come back around. I could probably update this a bit for 2026 but my workflow is just about the same now as it was then. Guix is good and just released 1.5.0, check it out.

(Small) discussion of the release.

https://news.ycombinator.com/item?id=46732047


It's possible to do continuations on Wasm now and it will be made even easier by the stack switching proposal.

I've worked with Andy a bunch and am glad to see him getting recognition for his work on Guile.


Came here to see if anyone mentioned propagators. That thesis is excellent. I second the recommendation.


But do you want your web browser to have the privilege to read your SSH private key? That's the risk of running programs "as you".


The whole problem is mapping privilege to users and groups, so doas doesn't solve the issues explained in the article.

> The key difference here would be that www-deployment can not delegate as easily to arbitrary users, as they would need to ask someone with root access to add additional users to the www-deployment group. But I am left wondering if this use case (if it is important enough)...

Delegation is the killer feature of the object capability model. It's not just important enough, it's the most important. Keep in mind that the ACL model allows delegation, too, it's just unsafe. Users share credentials all the time. Capabilities allow delegation in a way that can be attenuated, revoked, and audited.


Firstly, thank you for engaging and trying to enlighten me.

I do understand why capability delegation is useful and I am familiar with using Unix sockets to delegate the control of daemons using socket permissions, which feels similar to what we see here with capsudod (I have not read the code sadly, too much other code to read today).

However, I am still puzzled what the advantage of having a herd of capsudod instances running is to say my proposal of allowing users to set up their own doas.conf(5)s to delegate capabilities. Yes, we still need SUID and we will need to be darn sure 1,000 or so lines are properly secured, but it is attenuable, revocable, auditable, and feels (perhaps wrongly, because I have a bias towards text files describing the state of a system?) more natural to me than putting it all into the running state of a daemon.

Is there some other strength/weakness of these approaches that I am failing to see? I am no systems programmer, but I find topics like this interesting and dream of a day when I could be one.


> However, I am still puzzled what the advantage of having a herd of capsudod instances running is to say my proposal of allowing users to set up their own doas.conf(5)s to delegate capabilities. Yes, we still need SUID and we will need to be darn sure 1,000 or so lines are properly secured, but it is attenuable, revocable, auditable, and feels (perhaps wrongly, because I have a bias towards text files describing the state of a system?) more natural to me than putting it all into the running state of a daemon.

I think two separate discussions are being mixed here. The above seems mostly concerned with the chosen interface of capsudo. Imperative vs. declarative is orthogonal to the discussion about object capabilities vs. ACLs.


It's nice to see other people writing about the capability transfer feature of Unix domain sockets. File paths are not object capabilities, but file descriptors are. Using a privileged daemon on top of an ambient authority system like Linux seems to be a good way to retrofit object capabilities onto the operating systems we already use. This is the same approach we took in Goblins[0] for our Unix domain socket netlayer for the OCapN[1] protocol.

[0] https://spritely.institute/news/spritely-goblins-v0-16-0-rel...

[1] https://ocapn.org


> Large language models (LLMs) are an indisputable breakthrough of the last five years

Actually a lot people dispute this and I'm sure the author knows that!


UT2k4 was a LAN party favorite of mine. One of the last good multiplayer FPS games before Epic lost its way.


UT2004 (and its Xbox counterpart Unreal Championship 2) were great experiences. UT3 tried to set itself apart by tuning its pace significantly higher, and it lost its audience, and UT2016 was never going to be a significant title given its development history.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: