NixOS Reproducible Builds: minimal ISO successfully independently rebuilt

548 points by CathalMullan 1 year ago | 173 comments
  • onedognight 1 year ago
    Rebuilding the minimal ISO from source is an impressive milestone on the journey to a system that builds from source reproducibly. Guix had an orthogonal but equally impressive milestone on the same journey recently[0], bootstrapping a full compiler toolchain from a single reproducible 357 byte binary without any other binary compiler blobs. These two features may one day soon be combined to reproducibly build a full distribution from source.

    [0] https://guix.gnu.org/en/blog/2023/the-full-source-bootstrap-...

    • TacticalCoder 1 year ago
      That is amazing and it is great to see there are people out there fighting the good fight (while others ask: "but where's the benefit!? if there's a backdoor, everybody is still going to get the backdoor!").

      > it gives us a reliable way to verify the binaries we ship are faithful to their sources

      That's the thing many don't understand: it's not about proving that the result is 100% trustable. It's about proving it's 100% faithful to the source. Which means that should monkey business be detected (like a sneaky backdoor), it can be recreated deterministically 100% of the time.

      In other words for the bad guys: nowhere to run, nowhere to hide.

      • TheDong 1 year ago
        To me, the largest benefit isn't even related to "bad guys", but rather in being able to understand and debug issues.

        Reproducibility makes bugs more shallow. If hydra builds a bit-for-bit identical iso to what you build locally, that means a developer can make a change to the iso inputs, test it, and know that testing will also apply to the final ci-built one.

        If a user reports a bug in the iso, and you want to test if a change fixes it locally, you can start from an identical source-code commit as the iso was built from, make some minimal changes, and debug from there, all without worrying that you're accidentally introducing unintended differences.

        It minimizes "but it works on my machine" type issues.

        • tomcam 1 year ago
          Super clarifying, thank you.
        • tracnar 1 year ago
          It's not yet as far as the Guix stage0, but there was an interesting talk about bootstrapping nix from TinyCC at NixCon: https://media.ccc.de/v/nixcon-2023-34402-bootstrapping-nix-a...
          • Thrir94994i 1 year ago
            357 bytes for bootstrap compiler binary is VERY impressive!
          • 15155 1 year ago
            At 357 bytes, do you need a reproducible binary at all?

            I'd think one could hand-document all 357 bytes of machine code and have them be intelligible.

            • jowea 1 year ago
              This[0] is basically the hand-documentation of those bytes then. Handwritten ELF header and assembly code.

              [0] https://github.com/oriansj/bootstrap-seeds/blob/master/POSIX...

              • ralferoo 1 year ago
                Just had a read of this to see what it did... And I must admit, I don't understand what purpose this is supposed to serve.

                All it seems to do is convert hex into binary and dump it to a file. Not sure how that's any more useful than just copying the binary for next stage directly, after all this binary had to get on the system somehow.

              • ahoka 1 year ago
                That’s just the first stage. Simple enough to be audited manually.
                • forkerenok 1 year ago
                  Or tattooed on oneself! Or etched on a dog tag!
              • tomcam 1 year ago
                > bootstrapping a full compiler toolchain from a single reproducible 357 byte binary without any other binary compiler blobs.

                wtf that is mind-boggling. Thanks for the link.

                • 1 year ago
                  • hardwaresofton 1 year ago
                    Classic HN, the top comment in a Nix post is about Guix.

                    Nix has more packages and advocacy (even if the vast majority of people exposed to nix/guix will never actually use it), but Guix is a lot more interesting to me with the expressive power of scheme on offer.

                    That said, there are some sharp edges[0] that seem a bit harder to figure out (is this just as inscrutable/difficult as nix?).

                    Does anyone have some good links with people hacking/working with guix? Maybe some blogs to follow?

                    I care more about the server use-case and I'm a bit worried about the choice of shepherd over something more widely used like systemd and some of the other libre choices which make Guix what it is. Guix is fine doing what it does, but it seems rather hard to run a Guix-managed system with just a few non-libre parts, which is a non-starter.

                    Also, as mentioned elsewhere in this thread, the lack-of-package-signing-releases is kind of a problem for me. Being source and binary compatible is awesome, but I just don't have time to follow the source of every single dependency... At some point you have to trust people (and honestly organizations) -- the infrastructure for that is signatures.

                    Would love to hear of people using Guix in a production environment, but until then it seems like stuff like Fedora CoreOS/Flatcar Linux + going for reproducible containers & binaries is what makes the most sense for the average devops practitioner.

                    CoreOS/Flatcar are already "cutting edge" as far as I'm concerned for most ops teams (and arguably YAGNI), and it seems like Nix/Guix are just even farther afield.

                    [EDIT] Nevermind, Guix has a fix for the signature problem, called authorizations![1]

                    [0]: https://unix.stackexchange.com/questions/698811/in-guix-how-...

                    [1]: https://guix.gnu.org/manual/devel/en/html_node/Specifying-Ch...

                    • rekado 1 year ago
                      > Does anyone have some good links with people hacking/working with guix?

                      We've just had a conference about Guix in HPC: https://youtu.be/dT5S72x18R8

                      This is a recording of a stream for the second day with talks about large scale deployments of Guix System in HPC.

                  • dataflow 1 year ago
                    How long does a fully bootstrapped build take?
                    • mbakke 1 year ago
                      It obviously depends on the hardware, but IIRC for me maybe 3-4 hours building from the 357 byte seed to the latest GCC.

                      The early binaries are not very optimized :-)

                      • pharmakom 1 year ago
                        With caching, just the time to download the artefact.
                        • dataflow 1 year ago
                          Doesn't caching completely defeat the point of bootstrapping? How do you know the cached artifact is correct? You have to build it manually to verify that, at which point you're still building manually...
                    • ahmedfromtunis 1 year ago
                      Stupid question as I never worked on something like this before: why isn't reproducibility the default behavior?

                      I mean if 2 copies of a piece of software were compiled from the same source, what stops them from being identical each and every time?

                      I know there are so many moving parts, but I still can't understand how discrepancies can manifest themselves.

                      • dwheeler 1 year ago
                        There are many specific causes, time stamps probably being the most common issue. You can see a list of common issues here:

                        https://reproducible-builds.org/docs/

                        The main overall issue is that developers don't test to ensure they reproduce. Once it's part of the release tests it tends to stay reproducible.

                        • acaloiar 1 year ago
                          I agree, although I wouldn't describe the overall issue as developers not testing to ensure reproducibility. The reason most builds aren't reproducible is that build reproducibility isn't a goal for most projects.

                          It would be great if 100% of builds were reproducible, but I don't believe developers shouldn't be testing for reproducibility unless it's a defined goal.

                          As generalized reproducible build tooling (guix, nix, etc.) becomes more mainstream, I imagine we'll see more reproducible builds as adoption grows and reproducibility is no longer something developers have to "check for", but simply rely upon from their tooling.

                          • zimbatm 1 year ago
                            It's also because the cost of making things reproducible is still too high.

                            We have the tooling, but it still takes a bit of effort from the developer's side to integrate those into their CI pipeline.

                            Eventually we will get to a place where this will be the default. It will be integrated into day-to-day tooling like `cargo release`, `npm publish`, ...

                            • acaloiar 1 year ago
                              Typo: I don't believe developers shouldn't be -> I don't believe developers should be
                          • Smaug123 1 year ago
                            Loads of things. Obvious ones where the decision is explicitly taken to be non-reproducible include timestamps and authorship information. There are also other places where reproducibility is implicitly broken by default: e.g. many runtimes don't define the order of entries in a hashmap, and then the compiler iterates over a hashmap to build the binary.
                            • londons_explore 1 year ago
                              I can see why devs would want "This Software was built on 10/10/2007 by bob7 from git hash aaffaaff" to appear on the splash screen of software.

                              How do you get similar behaviour while having a reproducible build?

                              Can you, for example, have the final binary contain a reproducible part, and another section of the elf file for deliberately non-reproducible info?

                              • beisner 1 year ago
                                if you have a reproducible build, then the notion of "software was built on date by user" is kind of useless information, no? Because it does not matter - if you can verify that a specific git hash of a codebase results in a particular binary through reproducible builds, a malicious adversary could have built it yesterday and given it to me and i can be almost surely confident (barring hash-collisions...) it's identical to a known trusted team member building it.

                                Having information about which git has was used, as well as the time it was published, is part of the source distribution so an output can contain references to these inputs and still be deterministic w.r.t. those inputs.

                                If you REALLY want to know when/who built something, you could add in an auxiliary source file which contains that information, which is required to build. Which is essentially what compilers which leverage current time do anyway, it's just implicit.

                                • Smaug123 1 year ago
                                  Yeah, "who built this" information belongs in a signing certificate that accompanies the build artefact, not in the artefact itself. The Git hash can certainly appear in the binary (it's a reproducible part of the build input), and the date can instead be e.g. the commit date, which is probably more relevant to a user anyway.
                                  • preisschild 1 year ago
                                    You can still include the git hash or a git tag/release version info, since the reproducer has the same git repo anyway.

                                    But including timestamp of build would necessitate “spoofing” the timestamp by the reproducer to be the same as the original.

                                    • 1 year ago
                                  • kaba0 1 year ago
                                    Parallelism. There might be actions that are not order-independent, and the state of the CPU might result in slightly different binaries, but all are correct.
                                    • edgyquant 1 year ago
                                      Why does this matter though? Why does order of compilation result in a different binary?
                                      • kaba0 1 year ago
                                        Just some random, made up example: say you want to compile an OOP PL that has interfaces and implementations of that. You discover reachable implementations through static analysis, which is multi-threaded. You might discover implementations A,B,C in any order — but they will get their methods placed in the jump table based on this order. This will trivially result in semantically equivalent, but not binary-equivalent executables.

                                        Of course there would have been better designs for this toy example, but binary reproducibility is/was usually not of the highest priority historically in most compiler infrastructures, and in some cases it might be a relatively big performance regression to fix, or simply just a too big refactor.

                                        • speed_spread 1 year ago
                                          Because order of completion of the parallel tasks is not guaranteed, if all tasks write to the same file you might get a different result each time.
                                        • TacticalCoder 1 year ago
                                          > There might be actions that are not order-independent, and the state of the CPU might result in slightly different binaries, but all are correct.

                                          Well no: that's really the thing reproducible packages are showing: there's only one correct binary.

                                          And it's the one that's 100% reproducible.

                                          I'd even say that that's the whole point: there's only one correct binary.

                                          I'll die on the hill that if different binaries are "all correct", then none are: for me they're all useless if they're not reproducible.

                                          And it looks like people working on entire .iso being fully bit-for-bit reproducible are willing to die on that hill too.

                                          • mike_hock 1 year ago
                                            "Correct" does not mean "reproducible" just because you think lowly of irreproducible builds.

                                            A binary consisting of foo.o and bar.o is correct whether foo.o was linked before bar.o or vice versa, provided that both foo.o and bar.o were compiled correctly.

                                            • kaba0 1 year ago
                                              See my reply to the sibling post — binary reproducibility is not the end goal. It is an important property, and I do agree that most compiler toolchains should strive for that, but e.g. it might not be a priority for, say, a JIT compiler.
                                          • cpuguy83 1 year ago
                                            Here is a very recent post from the Go team on things they had to do to make the Go toolchain fully reproducible.

                                            https://go.dev/blog/rebuild

                                            • dataflow 1 year ago
                                              Sometimes it's randomized algorithms, sometimes it's performance (e.g. it might be faster not to sort something), sometimes it's time or environment-dependent metadata, sometimes it's thread interleaving, etc.
                                              • drdrey 1 year ago
                                                a very common one is pointer values being different from run to run and across different operating systems. Any code that intentionally or accidentally relies on pointer values will be non-deterministic
                                                • dataflow 1 year ago
                                                  Would be nice if you could explain how/why this happens, given that normally, pointers aren't persisted.
                                                  • edgyquant 1 year ago
                                                    That’s runtime behavior
                                                • fooker 1 year ago
                                                  A surprising amount of compiler and program behavior depends on how pointer values compare.

                                                  These comparisons don't have to go the same way for everything to be correct.

                                                  • bravetraveler 1 year ago
                                                    I don't develop enough to give a particularly good answer, but one example I've heard of involves timestamps

                                                    Imagine the program uses the current date or time as a value. When compiled at different moments, the bits change.

                                                    Same applies to anything where the build environment or timing influences the output binary

                                                    • mseepgood 1 year ago
                                                      Laziness and carelessness of compiler developers.
                                                      • jonhohle 1 year ago
                                                        As others have mentioned, there’s sorting issues (are directory entries created in the same order for a project that compiled everything in a directory?), timestamps (archive files and many other formats embed timestamps), and things that you really want to be random (tmpdir on Linux [at least in the past] would create directories of varying length).

                                                        I’ve successfully built tools to compare Java JARs that required getting around two of those and other test tools that required the third. I’m sure there are more.

                                                    • mihalycsaba 1 year ago
                                                      Sorry for being dense, but I thought one of the main reason for nixos's existence is reproducibilty. I thought they have these kinds of things solved already.

                                                      I have only ~2 hours experience with Nixos, wanted to try hyprland, I thought it would be easier on Nixos since hyprland needs a bit of setup and maybe it's easier to use someone else's config on nixos, than on some other distro. Finding a config was hard too, found like 3 on some random github gists, thought there would be more... and none of them worked, at that point I gave up.

                                                      • chpatrick 1 year ago
                                                        > Sorry for being dense, but I thought one of the main reason for nixos's existence is reproducibilty. I thought they have these kinds of things solved already.

                                                        Nixos has the advantage that everything is built in its own sandbox with only its explicitly declared (and hashed) dependencies available, unlike in mainstream distros where it's the full system environment, so in many cases you already get the same binary every time. But this doesn't immediately lead to reproducibility because the build process might be nondeterministic for various packages.

                                                        • goodpoint 1 year ago
                                                          > unlike in mainstream distros

                                                          Debian has been building in a clean sandbox with only required, tracked dependencies since decades.

                                                          It's also building the large majority of packages reproducibly including the binary and whole installation packages (not just the sources like nixos)

                                                          • chpatrick 1 year ago
                                                            > not just the sources like nixos

                                                            Not sure what you mean by that, the Nix packages that are reproducible have reproducible binaries.

                                                            In the Nixos world there isn't really a concept of a "binary/installation package" like in Debian or elsewhere. Everything can be rebuilt from source on any machine, but because everything is hashed, if the official binary caches have already built something with the same inputs, they can just give you the outputs directly. So it's more like memoization than a .deb or something that you install.

                                                            Nix is a functional language that builds recipes (derivations) to build stuff, with all the inputs and outputs hashed. If the derivation you want to build has already been built by a cache you trust, the system will just fetch it instead of building locally.

                                                            What the Nix reproducability project checks is that the same derivation produces the same output regardless of what machine it's built on.

                                                          • WhyNotHugo 1 year ago
                                                            > unlike in mainstream distros where it's the full system environment

                                                            Usually packages are built in an environment which has only a minimal base system plus the package's explicitly dependencies. They don't have random unnecessary packages installed.

                                                            • benreesman 1 year ago
                                                              This is a really good comment, I have no idea why it’s going grey.

                                                              Upvote from me FWIW.

                                                            • quietbritishjim 1 year ago
                                                              There are two senses of reproducible.

                                                              The sense you're thinking of is that you can easily rebuild a binary package and it will use the same dependency versions, build options, etc. There should be no chance of a compiler error that didn't happen the first time (the old "but it worked on my laptop" syndrome).

                                                              The sense used here is that every build output is byte-for-byte binary identical. It doesn't depend on the machine name, the time it was compiled or anything like that (or, in a parallel build, the order in which files finish compiling). That is much harder.

                                                              • jowea 1 year ago
                                                                > The sense you're thinking of is that you can easily rebuild a binary package and it will use the same dependency versions, build options, etc. There should be no chance of a compiler error that didn't happen the first time (the old "but it worked on my laptop" syndrome).

                                                                And that's just for Nixpkgs, the packages themselves that also work outside NixOS. NixOS has reproducibility of the entire system complete with configuration.

                                                              • rgoulter 1 year ago
                                                                Yeah, Nix is a tough tool to learn. It's probably never the right tool to pick for "I just want something that works right now" if you're unfamiliar with it.

                                                                > I thought one of the main reason for nixos's existence is reproducibilty

                                                                NixOS uses "reproducible" to mean "with the same Nix code, you get the same program behaviour". This is more/less what people hope Dockerfiles provide.

                                                                This is the level of reproducibility you want when you say "it works on my machine" or "it worked last time I tried it".

                                                                Whereas "reproducible build" aims for bit-for-bit equality for artifacts build on different machines. -- With this, there's a layer of security in that you can verify that code has been built from a particular set of sources.

                                                                > Finding a config was hard too

                                                                What search query were you using? Searching "nixos configuration" on https://github.com/search?q=nixos%20configuration&type=repos...

                                                                Or searching for hyprland specifically, there seem to be many using that https://github.com/search?q=wayland.windowManager.hyprland&t...

                                                                • amarshall 1 year ago
                                                                  > NixOS uses "reproducible" to mean "with the same Nix code, you get the same program behaviour".

                                                                  Note that ”Nix code” also includes the hashes of all non-Nix sources. One way to think of it is that Nix has reliable build cache invalidation.

                                                                  > This is more/less what people hope Dockerfiles provide.

                                                                  Indeed, but importantly they do not provide input-reproducibility (while Nix does) because, at least, there are no hashes for remote data.

                                                                  • __MatrixMan__ 1 year ago
                                                                    PSA: you can build OCI images with nix, then they'll be a pure function of their input like we've all wished was the case with Dockerfiles.
                                                                  • mihalycsaba 1 year ago
                                                                    I don't remember, some of them needed some other tools installed(like flakes whatever it is), I looked for configs, that looked like they don't need a few more hours to learn and to setup some other tools for them to work.

                                                                    I just wanted to take a quick look at hyprland, I imagined I just use an existing config, I never thought it would need hours of research. Later I installed an arch vm and managed to install hyprland with some basic components in less than an hour from the first guide I found.

                                                                    Looks like I misunderstood, what nix was made for. I just want a system I can more or less set up with a simple config file.

                                                                    I saw this os, didn't have time to try it yet, but I thought this is how nix works. https://blendos.co/

                                                                    For example you just define gnome like this, the nix configs I found looked similar, they just didn't work.

                                                                    >gnome:

                                                                    > enabled: true

                                                                    > style: light

                                                                    > gtk-theme: 'adw-gtk3'

                                                                    > icon-theme: 'Adwaita'

                                                                    > titlebar:

                                                                    > button-placement: 'right'

                                                                    > double-click-action: 'toggle-maximize'

                                                                    > middle-click-action: 'minimize'

                                                                    > right-click-action: 'menu'

                                                                    • lifeisstillgood 1 year ago
                                                                      I am on a similar journey

                                                                      I built https://github.com/mikadosoftware/workstation (hey nearly 500 stars!) as the idea of defining a reproducible laptop build.

                                                                      I don't think docker is the right level - so my next project when i have free time (!) is to do a box build that then might compile to docker

                                                                      I think there is a sensible point of being able to define via nix both developer workstations and servers

                                                                      • ParetoOptimal 1 year ago
                                                                        > I just wanted to take a quick look at hyprland, I imagined I just use an existing config, I never thought it would need hours of research.

                                                                        It shouldn't.

                                                                        You'd want a simple flake to start with that has home-manager (for higher chance of finding declarative vest practice configs and modules) and to add small things to that.

                                                                        I imagine you tried grabbing someone's complex config, modifying it, and ran into issues?

                                                                    • Aerbil313 1 year ago
                                                                      Check out https://github.com/donovanglover/nix-config . Flake based config with hyprland and cool stuff.

                                                                      > at that point I gave up.

                                                                      NixOS is not for the weak or time constrained, currently. Hopefully it will be one day. Still if you push through, you reap the benefits.

                                                                      • flkiwi 1 year ago
                                                                        Another good option: https://github.com/Misterio77/nix-starter-configs

                                                                        I started with this one, the minimal version, then moved on to something more like the standard version, and now I'm moving on to something based on his much more complicated and flexible build in a different repo. I had been flailing, then this repo made it click.

                                                                    • ParetoOptimal 1 year ago
                                                                      > Finding a config was hard too, found like 3 on some random github gists, thought there would be more..

                                                                      That sounds odd, did you use github code search?

                                                                      Find relevant home manager options:

                                                                      https://mipmip.github.io/home-manager-option-search/?query=h...

                                                                      Then search those on github:

                                                                      https://github.com/search?utf8=%E2%9C%93&q=lang%3Anix+hyprla...

                                                                      Note some option searches imply more casual or advanced users.

                                                                      • colordrops 1 year ago
                                                                        Nix is reproducteable in tbe environment sense, meaning you can get the exact same setup every time, but not in the bit-for-bit sense, meaning that the compiled binaries will be identical.
                                                                      • Reventlov 1 year ago
                                                                        For those wondering : it should be remembered that the reproducibility of Nix / NixOS / Nixpkgs is only a reproducibility of the sources: if the sources change, one is warned, but it is not a question of the reproducibility of the binaries (which can change at each build). This binary reproducibility of Nix / NixOS / Nixpkgs is indeed not really tested, at least not systematically.

                                                                        Guix, Archlinux, Debian do the binary reproducibility better than Nix / NixOS / Nixpkgs.

                                                                        Sources :

                                                                        - https://r13y.com/ ( Nix* )

                                                                        - https://tests.reproducible-builds.org/debian/reproducible.ht... ( Debian )

                                                                        - https://tests.reproducible-builds.org/archlinux/archlinux.ht... ( Archlinux )

                                                                        - https://data.guix.gnu.org/repository/1/branch/master/latest-... (Guix, might be a bit slow to load, here is some cached copy https://archive.is/lTuPk )

                                                                        • mauricioc 1 year ago
                                                                          To emphasize chpatrick's point below, there are two definitions of "reproducibility" in this context:

                                                                          * Input reproducibility, meaning "perfect cache invalidation for inputs". Nix and Guix do this perfectly by design (which sometimes leads to too many rebuilds). This is not on the radar for Debian and Arch Linux, which handle the rebuild problem ("which packages should I rebuild if a particular source file is updated?") on an ad-hoc basis by triggering manual rebuilds.

                                                                          * Output reproducibility, meaning "the build process is deterministic and will always produce the same binary". This is the topic of the OP. Nix builds packages in a sandbox, which helps but is not a silver bullet. Nix is in the same boat as Debian and Arch Linux here; indeed, distros frequently upstream patches to increase reproducibility and benefit all the other distros. In this context, https://reproducible.nixos.org is the analogue of the other links you posted, and I agree Nix reports aren't as detailed (which does not mean binary reproducibility is worse on Nix).

                                                                          Your comment can be misinterpreted as saying "Nix does not do binary reproducibility very well, just input reproducibility", which is false. That's the whole point of the milestone being celebrated here!

                                                                          • Foxboron 1 year ago
                                                                            > Your comment can be misinterpreted as saying "Nix does not do binary reproducibility very well, just input reproducibility", which is false.

                                                                            It's only "false" as nobody has actually tried to rebuild the entire package repository of nixpkgs, which to my knowledge is an open problem nobody has really worked on.

                                                                            The current result is "only" ~800 packages and the set has regular regressions.

                                                                            • prateem_ 1 year ago
                                                                              I am probably misunderstanding your point BUT I have actually depended on Nix for "reproducible docker images" for confidential compute usecase so that all parties can independently verify the workload image hash. Rarely (actually only once) it did fail to produce bit identical images every other time it successfully produced bit identical images on very different machine setups. Granted this is not ISO but docker images, but I would say Nix does produce reproducible builds for many real world complex uses.

                                                                              Ref: [1] https://gitlab.com/prateem/turning-polyglot-solutions-into-t... [2] https://discourse.nixos.org/t/docker-image-produced-by-docke...

                                                                          • dathinab 1 year ago
                                                                            I think you might want to read the article.

                                                                            it's about binary bit by bit reproducibility of not just the binaries but also how they get packed into an iso (i.e. r13y.com is outdated, the missing <1% where also as far as I remember a _upstream_ python regression as reproducability of binaries (ignoring the packaging into an iso) was already there a few years ago)

                                                                            now when it comes to packages beyond the core iso things become complicated to compare due to the subtle but in this regard significant different ways they handle packages, e.g. a bunch of packages you would find on arch in aur you find as normal packages in nix and most of the -bin upstream packages are simply not needed with nix

                                                                            in general nix makes it easier to create reproducible builds but (independent of nix) this doesn't mean that it's always possible and often needs patching which often but not always is done if you combine this with the default package repository of nix being much larger (>80k) then e.g. arch (<15k non aur) comparing percentages there isn't very useful.

                                                                            through one very common misconception is that the hash in the nix store path is based on the build output, but it's instead based on all sources (weather binary not) used for building the binary in an isolated environment

                                                                            this means it has not quite the security benefit some people might think it has, but in turn is necessary as it means nix can use software which is non reproducible buildable in a way which still produces reasonable reproducable deplyments (as in not necessary all bits the same but all functionality, compiler-cfgs, dependencies versions, users, configurations etc. being the same

                                                                            • chpatrick 1 year ago
                                                                              > but it is not a question of the reproducibility of the binaries (which can change at each build). This binary reproducibility of Nix / NixOS / Nixpkgs is indeed not really tested, at least not systematically.

                                                                              Isn't that exactly what your first source and OP are about? They check that the binaries are the same when built from the same sources on different machines. The point is exactly that the binaries don't change with every build.

                                                                              > How are these tested?

                                                                              > Each build is run twice, at different times, on different hardware running different kernels.

                                                                              • Reventlov 1 year ago
                                                                                Yeah, that represent maybe 1% of the packages in nixpkgs (only the installation iso).
                                                                                • chpatrick 1 year ago
                                                                                  Sure but the goal is the same, binary reproducibility, and it is systematic. It's just less far along than Debian.

                                                                                  Also I'm pretty sure a big percent of nixpkgs is already reproducible, we just don't know for sure.

                                                                                  They say the next step might be the GNOME-based ISO, which would be a big achievement because it's basically a full-featured system.

                                                                              • dicytea 1 year ago
                                                                                > Guix, Archlinux, Debian do the binary reproducibility better than Nix / NixOS / Nixpkgs.

                                                                                Huh, didn't know that Arch Linux tests reproducibility. It's apparently 85.6% reproducible: https://reproducible.archlinux.org

                                                                                I wonder how much work would be needed for NixOS, considering it has more than 80k packages in the official repository.

                                                                                • chpatrick 1 year ago
                                                                                  I think that's also a bit of an unfair comparison given the number of AUR packages you usually use on Arch. With nixpkgs there isn't a distinction between official and community packages.
                                                                                  • 1 year ago
                                                                                    • iopq 1 year ago
                                                                                      Sure there is, the NUR has a few thousand community packages that are not ready for release

                                                                                      The nixpkgs are all official packages, it's just really easy to become a maintainer (you make a pull request adding the package you want to maintain)

                                                                                  • clhodapp 1 year ago
                                                                                    That is not true at all, with respect to the aims or the reality of nixpkgs. The original post here is talking about reproducing the (binary) minimal iso, which contains a bunch of binary packages.
                                                                                    • Reventlov 1 year ago
                                                                                      It is true. The original post writes about reproducing the minimal iso, which contains probably around 1% of the packages in nixpkgs. The remaining packages are not tested regarding binary reproducibility, or, at least, not in a systematic manner, which means regressions may happen regularly (which is exactly what happened with the .iso, see the previous announcement from 2021: https://discourse.nixos.org/t/nixos-unstable-s-iso-minimal-x... .)
                                                                                      • raboof 1 year ago
                                                                                        While I would love testing reproducibility more systematically, it would not really have helped for the Python 3.10 regression: in this case we knew full well that it would break reproducibility even before we merged the change, but the performance advantage it unlocked seemed too big to ignore. Such trade-offs are luckily rare - I'm happy that with Python 3.11 we can now have both :)
                                                                                    • amarshall 1 year ago
                                                                                      r13y.com is outdated vs. https://reproducible.nixos.org/
                                                                                      • watersucks 1 year ago
                                                                                        Doesn’t the content-addressed derivation experimental feature address this issue? Instead of store hashes being input-addressed as you mention, the derivation outputs are used to calculate the store hash, which ensures binary reproducibility.
                                                                                        • Smaug123 1 year ago
                                                                                          Ish. This is covered in section 6.4.1 of Eelco's thesis (https://edolstra.github.io/pubs/phd-thesis.pdf). It all becomes much simpler if evaluating a build many times can only ever result in one output, but the Nix content-addressed model does permit multiple outputs. In such cases, the system just has to choose a canonical output and use that one, rewriting hashes as necessary to canonicalise inputs which are non-canonical.
                                                                                          • raboof 1 year ago
                                                                                            Not really:

                                                                                            With input-addressing you look things up in the store based on the input hash. You can determine the input hash yourself, but you have to trust the store to provide a response that corresponds to the sources. With Reproducible Builds you can have a third party confirm that output matches that input.

                                                                                            With content-addressing, you look things up in the store based on the output hash. You no longer need to trust the store here: you can check yourself the response matches the hash. However, you now have to trust who-ever told you that output hash corresponds to the input you're interested in. With Reproducible Builds you can now have a third party confirm that output hash matches that input.

                                                                                            I have not worked with content-addressed nix in depth yet, but my understanding is that this stores the mapping between the inputs and their output hashes in 'realizations' which are also placed in the store. Reproducible Builds will still be useful to validate this mapping is not tampered with.

                                                                                        • somat 1 year ago
                                                                                          I find it funny(ironic) that the OpenBSD project is trying hard to go the other way, every single install has unique and randomized address offsets.

                                                                                          While I understand that these two goals, reproducible builds and unique installs, are orthogonal to each other, both can be had at the same time, the duality of the situation still makes me laugh.

                                                                                          • oever 1 year ago
                                                                                            If the address offsets can be randomized with a provided seed, then demonstrating reproducibility is still possible.

                                                                                            Alternatively, randomizing the offsets when starting the program is another way to keep reproducibility and even increase security; the offsets would change at every run.

                                                                                            • WhyNotHugo 1 year ago
                                                                                              OpenBSD does randomised linking at boot time. Packages themselves can still be reproducible. All the randomisation is done locally after the packages are downloaded and their checksums validated.
                                                                                            • lrvick 1 year ago
                                                                                              Now if only they would have maintainers sign packages like almost every other linux distribution has done since the 90s, so we have any idea if the code everyone is building is the same code submitted and reviewed by known individuals.

                                                                                              Until signing is standardized, it is hard to imagine using nix in any production use case that protects anything of value.

                                                                                              • __MatrixMan__ 1 year ago
                                                                                                My impression of nix package maintainers is that they are providing a useful interface so that software can be composed easily. Most of them are not making any kind of assertion about the contents of the package. Expecting to use their signatures for anything meaningful strikes me as a bit like expecting product support from a delivery driver.

                                                                                                You don't need to trust it wasn't packaged maliciously, nix does reproducible builds so you can just look at the derivation and build it yourself if you don't feel like relying on the binary cache.

                                                                                                As for whether the underlying contents are malicious, that's between you and the developer. If other distributions have have lead you to believe otherwise, then I think they have misled you.

                                                                                                The only exception I can think of is Tails, and they don't exactly have the breadth that Nix does.

                                                                                                • lrvick 1 year ago
                                                                                                  "Expecting to use their signatures for anything meaningful strikes me as a bit like expecting product support from a delivery driver."

                                                                                                  And yet most of the packages from most major linux distributions are signed. If you are going to spend hours maintaining a package, it takes only an extra half a second to tap a yubikey to prevent someone from impersonating you.

                                                                                                  Package maintainers from say Arch and Debian go through a vetting process, multiple people sign their keys, and it is a responsibility. Yes, it is volunteer, but there are also volunteer firefighers. Some volunteer jobs are important to keep others safe, and they should be done with care.

                                                                                                  If Arch, Debian, Fedora, Ubuntu can all sign packages, then this excuse does not really hold for Nix.

                                                                                                  "You don't need to trust it wasn't packaged maliciously, nix does reproducible builds so you can just look at the derivation and build it yourself if you don't feel like relying on the binary cache."

                                                                                                  Reproducible builds and package definition signing solve totally different problems. Assume you trust a given developer has been maintaining a package non-maliciously, then you see they made a new update, and so you and other people trust it and build it. You get the same result, so you trust the binaries too. However, you still end up with malware. How? Simple. The developers github account was compromised due to a sim swap on their email account while they were on vacation, and someone pushed a fake commit as that person.

                                                                                                  Or maybe a malicious Github employee is bribed to serve manipulated git history only to the reproducible build servers but to no one else, so it goes undetected for years.

                                                                                                  Supply chain attacks like this are becoming very common, and there is a lot of motivation to do it to Linux distributions which power systems worth billions of dollars regularly.

                                                                                                  It is also so easy to close these risks. Just tap the damn yubikey or nitrokey when it blinks. It is wildly irresponsible not to mandate this, and we should question the motivations of anyone not willing to do something so basic to protect users.

                                                                                                  • KingMachiavelli 1 year ago
                                                                                                    Nix doesn't have maintainers sign anything because it isn't necessary. The Nix binary cache is built and signed but that's done by builders only the NiXOS foundation controls.

                                                                                                    Individual maintainers just commit Nix code to build the packages... Do you mean you want their Git commits to be signed?

                                                                                                    Edit: I guess that is what you mean. That is distinct from package (binary) signing. How do you know that a distro's repos built using the signed commits? NixOS is actually better suited to prove that an particular commit produced the package.

                                                                                                    • __MatrixMan__ 1 year ago
                                                                                                      > The developers github account was compromised due to a sim swap on their email account while they were on vacation, and someone pushed a fake commit as that person.

                                                                                                      ...which is why it's irresponsible to sign packages unless you have a strong enough relationship with the developer (or are that developer) such that you would notice the malicious release. Signing packages without that level of trust creates a false sense of security in the user.

                                                                                                      The Nix approach is to solve the packaging problems in a transparent and verifiable way so that the users can more quickly move from scrutinizing the package to scrutinizing the underlying software--which is where the scrutiny is most helpful anyway.

                                                                                                      > we should question the motivations of anyone not willing to do something so basic to protect users.

                                                                                                      There are a lot of valid criticisms you could reach for about Nix or its community, but lazy about security just isn't one of them. Our strategy involves different trade-offs than is typical, but that doesn't make them negligent or malicious.

                                                                                                  • amarshall 1 year ago
                                                                                                    What distros do this? As far as I can tell Debian doesn’t anymore (the build system signs builds), Fedora doesn’t, and Arch…I can’t tell but I don’t think it does. But maybe I’m wrong.

                                                                                                    The NixOS build system signs all build outputs with its key and the signature is verified upon download. If you’re paranoid, Nix at least makes it easy to just build everything from source.

                                                                                                    • lrvick 1 year ago
                                                                                                      Yes packages are reproduced and signed. I get that and this is fantastic. That is not the big gap I am talking about which is making sure the expressions themselves even use the correct sources and are not tampered with. Making sure the central signing key is not compromised is pretty critical too, but that can be mitigated with independent reproduction servers that also sign, requiring a minimum of 3 before a new package is trusted.

                                                                                                      As for Debian, maintainers must still all be part of the web of trust with an application process and a registered key in the web of trust to contribute packages. https://wiki.debian.org/DebianMaintainer#step_5_:_Keyring_up...

                                                                                                      Arch also still has each maintainer sign the packages they maintain, and there is a similar approval process to earn enough trust in your keys to become a maintainer, so there is a decentralized web of trust. Then you add reproducible builds on top of that to almost complete the story.

                                                                                                      Signed reviews would remove the remaining SPOFs in debian and arch but sadly no one does this. Nix however does not even allow -optional- key pinning or verify signatures of any authors that choose to sign expressions or their commits, so NixOS is way behind Arch and Debian in this respect.

                                                                                                      • amarshall 1 year ago
                                                                                                        Ah so you’re talking about the package sources (e.g. Nix files, PKGBUILD, etc.). I guess that’s closer to commit signing, I think? Well Nixpkgs maintainership is much more bazaar than cathedral, for better or worse, and that stymies some of that. However most Nixpkgs maintainers do not have commit access at all. Nixpkgs is at least moving the right direction (I think) by limiting the power of committers to submit changes without review. Should Nixpkgs committers sign their commits? Probably, yea.
                                                                                                  • mbakke 1 year ago
                                                                                                    Very impressive milestone, congrats to those who made this possible!

                                                                                                    > [...] actually rebuilding the ISO still introduced differences. This was due to some remaining problems in the hydra cache and the way the ISO was created.

                                                                                                    Can anyone shed some light on the fix for "how the ISO was created"? I attempted making a reproducible ISO a while back but could not make the file system create extents in a deterministic fashion.

                                                                                                    • raboof 1 year ago
                                                                                                      For NixOS, it's in the 'how did we reproduce' section of the article: the last step of that process produces the iso in the ./result/iso directory.

                                                                                                      It sounds like what you're looking for is the commands that that build invoked, but I'm not sure what step you're looking for. For example, the xorriso invocations are at https://github.com/NixOS/nixpkgs/blob/master/nixos/lib/make-...

                                                                                                    • mgaunard 1 year ago
                                                                                                      Don't you have to fake the system time to do this? The time often ends up inside the binaries one way or another.
                                                                                                      • mbakke 1 year ago
                                                                                                        Indeed time stamps are probably the most common sources of indeterminism. So common that a de-facto standard variable to fake a timestamp has been implemented in many compilers:

                                                                                                        https://reproducible-builds.org/docs/source-date-epoch/

                                                                                                        • amelius 1 year ago
                                                                                                          Could you name an example of how (and for what reason) this might happen?
                                                                                                          • mbakke 1 year ago
                                                                                                            Typically part of a "version string":

                                                                                                                $ python3
                                                                                                                Python 3.10.7 (main, Jan  1 1970, 00:00:01) [GCC 11.3.0] on linux
                                                                                                                Type "help", "copyright", "credits" or "license" for more information.
                                                                                                                >>>
                                                                                                            
                                                                                                            Perhaps a relic from when software had to be manually updated?
                                                                                                            • oever 1 year ago
                                                                                                              On NixOS, I think the release time or commit time is used:

                                                                                                                  $ python3
                                                                                                                  Python 3.10.11 (main, Apr  4 2023, 22:10:32) [GCC 12.2.0] on linux
                                                                                                                  Type "help", "copyright", "credits" or "license" for more information.
                                                                                                                  >>> 
                                                                                                              
                                                                                                              That is more useful than the build time.
                                                                                                            • mgaunard 1 year ago
                                                                                                              GCC embeds timestamps in o/gcno/gcda files to check they match.

                                                                                                              It's mostly annoying as gcov will actively prevent you from using gcda files from a different but equivalent binary than what generated the gcno.

                                                                                                            • preisschild 1 year ago
                                                                                                              You would just either not include the timestamp at all in all builds, or set 0, so the build date is 1970 everywhere.
                                                                                                            • Uptrenda 1 year ago
                                                                                                              Wouldn't this help solve the problem Ken Thompson wrote about in 'reflections on trusting trust?' If you can fully bootstrap a system from source code then it's harder to have things like back-doored compilers.
                                                                                                              • raboof 1 year ago
                                                                                                                It indeed helps, but it is not a full 'solution': you could still in theory envision elaborate backdoors in the 'environment' in which the ISO is built. If you really want to 'solve' the problem describe there, you could look into Diverse Double Compiling (https://dwheeler.com/trusting-trust/) or bootstrapping the entire environment (https://bootstrappable.org/) - see also the 'Aren’t there bootstrap problems with the above approach?' section of the post.

                                                                                                                Reproducing the build already goes a long way in making such attacks increasingly unlikely, though.

                                                                                                              • KennyFromIT 1 year ago
                                                                                                                I've lived in the Red Hat ecosystem for work recently. How does this compare to something like... Fedora Silverblue? Ansible? Fedora Silverblue + Ansible?
                                                                                                                • TheDong 1 year ago
                                                                                                                  The closest equivalent to the nixos ISO builder and reproducibility related to it in the fedora ecosystem is osbuild / imagebuilder - https://www.osbuild.org/guides/introduction.html

                                                                                                                  Imagebuilder claims reproducibility, but as far as I know it mostly installed rpm packages as binaries, not from source, so it's not really proper reproducibility unless all the input packages are also reproducible.

                                                                                                                  If the descriptions of building packages from source, building distro images, and reproducibility in the linked thread didn't make sense to you, you're probably not really the target audience anyway.

                                                                                                                  • candiddevmike 1 year ago
                                                                                                                    Nix is a declarative OS, where you describe what the OS should look like, instead of Ansible where you give the OS steps to follow. Silverblue and Nix are orthogonal aside from being Linux distributions--Silverblue is attempting to change how software is delivered using only containers on an immutable host.

                                                                                                                    If you're interested in an Ansible alternative that uses Jsonnet and state tracking to somewhat mimic Nix, check out Etcha: https://etcha.dev

                                                                                                                    • rgoulter 1 year ago
                                                                                                                      > Nix is a declarative OS

                                                                                                                      I think precision is important.

                                                                                                                      "Nix" refers to the package manager (and the language the package manager uses).

                                                                                                                      Whereas it's "NixOS" that's the OS which makes use of Nix to manage the system configuration.

                                                                                                                      • Ericson2314 1 year ago
                                                                                                                        Thank you. This is important. Too bad our website doesn't make it clear at all.
                                                                                                                      • 1 year ago
                                                                                                                      • hiepph 1 year ago
                                                                                                                        Ansible makes mutable changes to the OS, task by task.

                                                                                                                        Nix is immutable. A new change is made entirely new, and only after the build is successful, all packages are "symlinked" to the current system.

                                                                                                                        Fedora Silverblue is based on ostree [1]. It works similarly like git, but on your root tree. But it requires you to reboot the whole system for the changes to take effect. Since Nix is just symlinked packages, you don't need to reboot the system.

                                                                                                                        More detailed explanation here [2].

                                                                                                                        [1]: https://github.com/ostreedev/ostree

                                                                                                                        [2]: https://dataswamp.org/~solene/2023-07-12-intro-to-immutable-...

                                                                                                                        • KennyFromIT 1 year ago
                                                                                                                          This is a great explanation of the technical differences between the available options. What are the practical differences - is one option better from a maintenance and usability standpoint for creating systems that are reproducible?
                                                                                                                      • 1 year ago
                                                                                                                        • Crontab 1 year ago
                                                                                                                          I love that there are people out there who cares about things like this.