On Sat, Dec 1, 2012 at 7:32 AM, Tomáš Chvátal <tomas.chva...@gmail.com> wrote: > Bundling few libs and bundling 40 of them is bit of difference, will YOU do > the audit?
We don't require security audits for packages to be in portage. Any package can have a security problem, whether it is in a bundled lib or otherwise. Besides, if we can trust Google to audit their bundled libs, why can't we trust other upstreams to do the same if they do not have a bad reputation? And the last time I checked chromium had a ton of bundled libs - just extract the source tarball and note that about 90% of the file size is in the 3rd party tree (and as I said, to their credit the chromium team has done a wonderful job of eliminating the need to build a fair bit of that). > Still keep in mind most distros won't allow inclusion of such software into > main repositories at all, so we allow something fishy others avoid a lot. Yeah, but with other distros there is a much stronger tradition of alternate repositories. Half the stuff we stick in portage isn't in main repository for distros like Debian/Ubuntu. The other issue is that we're always tweaking ebuilds so that we can do dependency bumps. Packages not in portage don't benefit from that, so they're much more prone to breaking. A distro like Debian/Ubuntu freezes the core libs so that alternate repository maintainers only have to mess with their packages a few times per year on a well-defined schedule. And if we force some types of packages to be masked all the time, then what do we do if we actually need to mask them for removal or security. Users won't even realize they have a known flaw, because they had to unmask the package just to install it. I think there is a big difference between "bundles libs and therefore might have a security issue" and "has a known security issue." I also am not convinced that bundling libs actually exposes you to more security issues. It simply makes it more likely that you'll be exposed to a discovered security issue. If I have a million lines of code that is a million places I could be vulnerable. If I half half a million lines of original code and half a million lines of bundled libs, that is a million places I could be vulnerable, except that at least the libs have gotten more eyeballs. The reason that zlib issues get talked about is that people actually security audit zlib. Nobody security audits stuff like amarok so it could have 10x as many security holes and nobody would notice, but if it bundled a vulnerable zlib version suddenly everybody would notice that. I'm all for trying to unbundle things, but I don't think failure to do so is a reason to mask a package. That is an upstream quality issue, and if we can improve on it great, but if not, well, I think emacs is painful to use but I'm not going to ask for it to be masked until we can patch in the vim key bindings. I recall having a similar email discussion to this one years ago. I think an issue is that everybody wants quality but no two people can agree on what exactly the standards should be. I think we almost need some way to flag packages by quality level. If you could tag a package with "includes unaudited bundled libraries" the way you can tag it with "has a non-free license" then end users could choose the stance they want. Of course, to do that right you'd probably need context. As drobbins pointed out in the bug report my stance towards a media player is likely to be different from my stance towards a web server/browser or email client. And yet, I do use chromium as my browser despite the fact that it still bundles a ton of libs. Rich