notes
sudo
notes | sudo | |
---|---|---|
3 | 48 | |
1,260 | 1,105 | |
- | 2.9% | |
0.0 | 9.5 | |
almost 5 years ago | 2 days ago | |
C | ||
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
notes
-
GitHub will require 2FA by the end of 2023
This change would certainly have helped against the infamous "Gathering weak npm credentials" research[0] from 2017, but I think that most recent supply chain security issues (in NPM, at least) have been due to: 1) typosquatting, 2) developers deliberately adding malicious (or unwanted) code into their own packages, and 3) deep transitive dependencies on packages that have genuine bugs that lead to vulnerabilities.
It's not clear that this 2FA requirement would fix any of those problems, but it could one day allow package management tools to flag up when one developer has given/sold control of their package over to someone else who has less of a reputation and might be malicious, as was the case with the event-stream package.[1]
[0] https://github.com/ChALkeR/notes/blob/master/Gathering-weak-...
[1] https://www.eweek.com/security/node.js-event-stream-hack-exp...
-
Securities in NodeJs
According to one research, 14% of the Node Package Manager is affected with some or the other security issues. So, what is the cause of these security issues?
-
A series of unfortunate commits: notable software security stories
In 2015, Nikita Andreevich Skovoroda, a member of the Node.js Technical Steering Committee, performed a scan on GitHub search and npm. Afterwards, he was able to obtain over 100 passwords and nearly 200 tokens for accounts associated with a number of frequently installed packages.
sudo
-
Run0 – systemd based alternative to sudo announced
It depends on whether sudo was compiled with --disable-env-reset or not, it's on by default[1].
Also some variables are inherited regardless (e.g. DISPLAY, TERM), and some useful ones (e.g. HOME) are initialized by sudo, but I can't tell where that's done.
[1]: https://github.com/sudo-project/sudo/blob/ef52db46f9b375d7ff...
- Sudo Contributors
-
Sudo for Windows
Side note that I've always found interesting: sudo is almost entirely maintained by one dude: https://github.com/sudo-project/sudo/graphs/contributors
-
Rowhammer Resistant Coding in Sudo
The n=2 case also occurs in the commit: https://github.com/sudo-project/sudo/commit/7873f8334c8d3103...
And indeed, the two values ate bitwise complements.
-
The First Stable Release of a Rust-Rewrite Sudo Implementation
One feature they didn't mention they left out was the ability to run `make me a sandwich` (https://github.com/sudo-project/sudo/blob/main/Makefile.in#L...)
-
to Linus Torvalds, maybe?
It's (kind of) back - https://github.com/sudo-project/sudo/commit/9757d29a24ac1872872cf09757b0439c54089707
-
Testing the memory safe Rust implementation of Sudo/Su
└───────────────────────────────────────────────────────────────────────────────────────┘
As a comparison, this is the output for https://github.com/sudo-project/sudo:
0.0439 secs
-
what is funniest prompt u have got from the terminal for incorrect password
Complete list (can be found here, files ins_*.h):
-
Get gnu gnu'd
Fun fact, the “incident will be reported” message was close to being removed from sudo recently: https://github.com/sudo-project/sudo/commit/6aa320c96a37613663e8de4c275bd6c490466b01
- ‘Godfather of AI’ quits Google and gives terrifying warning
What are some alternatives?
php-docker - Docker Official Image packaging for PHP
doas - A port of OpenBSD's doas which runs on FreeBSD, Linux, NetBSD, and illumos
totp - Time-Based One-Time Password Code Generator
cosmopolitan - build-once run-anywhere c library
sudo-rs - A memory safe implementation of sudo and su.
dotfiles
CppCoreGuidelines - The C++ Core Guidelines are a set of tried-and-true guidelines, rules, and best practices about coding in C++
systemd - The systemd System and Service Manager
please
nosystemd.org - Website for arguments against systemd and further resources
automaxprocs - Automatically set GOMAXPROCS to match Linux container CPU quota.