Independently verifying Go's reproducible builds

120 pointsposted 2 days ago
by speckx

14 Comments

donatj

6 minutes ago

I started compiling the Go compiler myself over well over ten years ago when you had to compile it yourself to enable cross-compiling. That has not been the case in almost as long.

I have not stopped. I really should stop. At this point it's just kind of fun, but I have an unbroken chain of self-compiled Go compilers going back to the days when Go was written in C and not Go.

I am frankly really curious if my Go binary lives up to the reproducible build, or if some sort of Reflections on Trusting Trust type flaw worked itself in 10 years ago.

jasonthorsness

11 hours ago

It’s great that these reproducible builds are possible and this is an incredibly thorough and careful validation. Thanks!

This is important work, and I thank you for it. These public transparency logs are important for keeping honest people honest, but also for keeping dishonest people out - If someone does manage to backdoor Google's build process, this is how they'll know.

charcircuit

7 hours ago

Why is this important work to you? Reproducible builds to me is a complete waste of engineering resources and times that could be used elsewhere. All of this work goes towards protecting against theoretical attacks rather than practical ones that are actually happening in the wild.

cpuguy83

5 hours ago

Distributing software is a lot harder than just building it (with the caveat that people don't want to install build dependencies). So we rely on centralized distribution (and build). Because of this we have to assume trust of that entire chain.

When builds are reproducible they are independently verifiable which means you only have to trust the code and not the entire distribution chain (build systems, storage, etc).

Of course if no one bothers to verify then it doesn't matter. This is sort of how xz happened, no one verified that the release tarballs were what they were purported to be.

charcircuit

4 hours ago

I know what reproducible builds are, but they do not solve practical problems. That are actively happening.

>This is sort of how xz happened

Reproducible builds wouldn't have caught this. You would reproduce the malicous library the same since the vulnerability is in the input.

Orygin

24 minutes ago

Wasn't the vulnerability triggered by a malicious script that was added silently to the tarball? Reproducible builds would have shown that the tarball is not the exact output of the build. Even though the malicious payload was already in the code, the trigger was not and was hidden

cpuguy83

4 hours ago

Right, my point was that nobody bothered to check the source tarballs which should be completely reproducible already,

anilgulecha

6 hours ago

Supply chain attacks are not theoretical! Just take a look at npm, docker and other repo lands.

charcircuit

5 hours ago

Those attacks were not prevented by reproducible builds. Those supply chain attacks are the kind of things resources should be put into preventing.

cpuguy83

4 hours ago

They were completely preventable by independent verification. Just that without reproducible build you can't independently verify anything.

charcircuit

3 hours ago

Maybe some of them were preventable, but if it was in place attackers would easily adapt to fool the automated systems and we would be back at status quo.

>without reproducible build you can't independently verify anything.

This is myth propagated by reproducible builds people. Byte for byte similarity is not required to detect a Trojan was injected into one.

cpuguy83

3 hours ago

You are right, I should not have said "you can't independently verify anything", but then you generally need to know what you are looking for.