< Return to Video

Stretching out for trustworthy reproducible builds creating bit by bit identical binaries

  • Not Synced
    Welcome and good morning
  • Not Synced
    This is the reproducible builds team,
    talking about
  • Not Synced
    "Stretching out towards trustworthy
    computing"
  • Not Synced
    [Applause]
  • Not Synced
    We're 4 on stage, but actually this is a
    team effort.
  • Not Synced
    All these people listed here have
    contributed to the project at one point.
  • Not Synced
    The 4 of us, that's
  • Not Synced
    Lunar − me
  • Not Synced
    there's Dhole,
  • Not Synced
    Chris Lamb − lamby
  • Not Synced
    and Holger.
  • Not Synced
    But actually, this is DebConf and so a lot
    more of us have been or are
  • Not Synced
    currently here and so, if you want to
    thank anybody that is working on this
  • Not Synced
    you need to actually thank all of
    these folks
  • Not Synced
    'cause, yay.
  • Not Synced
    [Applause]
  • Not Synced
    [Holger] The people in blue are here.
  • Not Synced
    [Lunar] Let's get started.
  • Not Synced
    Quick ??? on what we're talking
    about.
  • Not Synced
    We have software, it's made from source.
  • Not Synced
    Source is readable by humans or at least
    a good amount of humans.
  • Not Synced
    In this room it's good.
  • Not Synced
    Binary, readable by computer and some
    tiny fraction of humanity.
  • Not Synced
    Going from source to binary is called
    build, or like building or compiling
  • Not Synced
    and we're doing free software and
    free software is awesome because
  • Not Synced
    we can actually run these binaries like
    we want
  • Not Synced
    We can actually study the software, how
    it's been made by studying the source
  • Not Synced
    and by studying the source we can assess
    that it does what it's supposed to do
  • Not Synced
    and not something else that does not
  • Not Synced
    have malware, or trojans or security bugs
  • Not Synced
    So we have the binary that can be used,
    fine.
  • Not Synced
    We have the source that can be verified.
  • Not Synced
    Problem is that right now, the only way we
    know that a binary that we get…
  • Not Synced
    We have to trust a website or a Debian
    repository that says
  • Not Synced
    "Well, this binary has been made with this
    source"
  • Not Synced
    But there's no way we can actually prove
    that.
  • Not Synced
    This is actually a problem that has been
    well explained by
  • Not Synced
    Mike Perry and Seth Schoen at the 31c3
    in Hamburg last december.
  • Not Synced
    For example, Seth Schoen made a proof of
    concept exploit for the Linux kernel
  • Not Synced
    that when GCC was called, the kernel would
    without modifying anything on the disk
  • Not Synced
    when the kernel detects that GCC is going
    to read a C file, it will insert some
  • Not Synced
    extra lines of code, and these lines of
    code can be a very bad thing
  • Not Synced
    in the case of 31c3 talk I was just
    recalling.
  • Not Synced
    Actually, you can even have developpers
    who are in very good faith, who have
  • Not Synced
    totally secure dev machines, or they
    thought they have,
  • Not Synced
    who have reviewed all their source code
    for any bugs
  • Not Synced
    and we would still get totally owned as
    soon as their computer gets compromised
  • Not Synced
    or one of the build demons from Debian
    gets compromised for example.
Title:
Stretching out for trustworthy reproducible builds creating bit by bit identical binaries
Description:

more » « less
Video Language:
English
Team:
Debconf
Project:
2015_debconf15

English subtitles

Revisions Compare revisions