On 6/2/24 07:42, Rich Pieri wrote:
Numbers of lines of code does not correlate with attack surface.
Neither does code complexity.

Silliness.

Lines of code isn't identical to the size of the attack surface, but it has to be strongly correlated, the same way that not wearing a seat belt isn't identical to "you will die in a car crash", but it is strongly so correlated. I can't say I have seen studies to prove it, but I have personally seen that more lines of code means less is known about what is really going on inside that code, which means lower odds that the right (and safe) stuff is going on in there.

- The fact that test and build processes are intertwined and so complicated that they can't be trusted to produce the right output—and people apparently think this complexity is a reasonable state of affairs—should be an embarrassment, not an excuse.

- The fact that people might want to make systemd happier by patching OpenSSH should be an embarrassment, not an excuse. (The fact that anyone would patch OpenSSH at *all* should be an embarrassment.)

- The fact that it was possible for any bad guys to thread through this chaos and plant a backdoor in sshd (sshd!) should be taken as evidence that it is a horribly embarrassing mess, not an excuse.


-kb


P.S. And to unfairly beat up on the proverbial "some random person in Nebraska": The fact the the xz test code is so obscure that no one understands it should be embarrassment, not an excuse. (Test code should be simpler than the stuff it is testing.)

_______________________________________________
Discuss mailing list
Discuss@driftwood.blu.org
https://driftwood.blu.org/mailman/listinfo/discuss

Reply via email to