Skip to content
GitLab
Projects
Groups
Topics
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Register
Sign in
Toggle navigation
Menu
Reproducible Builds
reproducible-website
Compare revisions
762197acecd02d48e28c12bed986447e6b94d524...8a379d5dce28585de0711b72c1f5d4e2b55beaf6
Commits (4)
Move news-related files out of top-level directory.
· 4aa04078
Chris Lamb
authored
Sep 25, 2020
4aa04078
Show the news in the archive from latest -> oldest.
· 5998e6f0
Chris Lamb
authored
Sep 25, 2020
5998e6f0
Rewrite the GNU Mes announcement to use more professional formatting.
· 5b0a5a24
Chris Lamb
authored
Sep 25, 2020
5b0a5a24
Add ARDC announcement.
· 8a379d5d
Chris Lamb
authored
Sep 25, 2020
8a379d5d
Hide whitespace changes
Inline
Side-by-side
_posts/2019-12-21-reproducible-bootstrap-of-mes-c-compiler.md
View file @
8a379d5d
---
layout
:
post
title
:
"
r
eproducible
bootstrap
of
Mes
C
compiler"
date
:
2019-12-21 00:00:00
title
:
"
R
eproducible
bootstrap
of
Mes
C
compiler"
date
:
2019-12-21 00:00:00
categories
:
org
draft
:
false
---
During the
[
Reproducible Builds Summit in Marrakesh
](
https://reproducible-builds.org
/events/Marrakesh2019/
)
,
three distr
o
s (
[
GNU Guix
](
https://guix.gnu.org
)
,
[
Nix
](
https://nixos.org
)
and
[
Debian
](
https://debian.org
)
) were able to produce a bit-for-bit
identical
binary when building
[
GNU Mes
](
https://www.gnu.org/software/mes/
)
,
despite
using three different major versions of GCC to build the initial Mes
compiler,
which was then used to build the bit-for-bit identical Mes binary.
Since the
summit, additional work resulted in a bit-for-bit i
n
dentical
Mes binary using
tcc.
During the
[
Reproducible Builds Summit in Marrakesh
](
{{
"
/events/Marrakesh2019/
"
| relative_url }}
),
three distr
ibution
s (
[
GNU Guix
](
https://guix.gnu.org
)
,
[
Nix
](
https://nixos.org
)
and
[
Debian
](
https://debian.org
)
) were able to produce a bit-for-bit
identical
binary when building
[
GNU Mes
](
https://www.gnu.org/software/mes/
)
,
despite
using three different major versions of GCC to build the initial Mes
compiler,
which was then used to build the bit-for-bit identical Mes binary.
Since the
summit, additional work resulted in a bit-for-bit identical
Mes binary using
`
tcc
`
.
At a previous Reproducible Builds Summit people implemented a
[
proof of concept build of TinyCC
](
https://github.com/bmwiedemann/ddcpoc
)
,
At a previous Reproducible Builds Summit people implemented a
[
proof of concept build of TinyCC
](
https://github.com/bmwiedemann/ddcpoc
)
,
using multiple different compiler implementations, though notably GNU
Mes is used by
[
GNU Guix to bootstrap
](
https://guix.gnu.org/blog/2019/guix-reduces-bootstrap-seed-by-50/
)
a complete software distribution from a minimal set of binary seeds.
These accomplishments are early steps towards demonstrating the
viability to use
[
GNU Guix to bootstrap
](
https://guix.gnu.org/blog/2019/guix-reduces-bootstrap-seed-by-50/
)
a complete software distribution from a minimal set of binary seeds. These
accomplishments are early steps towards demonstrating the viability to use
[
Diverse Double-Compiling
](
https://dwheeler.com/trusting-trust/dissertation/html/wheeler-trusting-trust-ddc.html
)
techniques in the real world to counter
[
Trusting Trust attacks
](
https://archive.org/details/reflections-on-trusting-trust
)
.
Future plans include attempting to bootstrap Mes with an even more
diverse set of compilers such as Clang and Microsoft's C compiler,
aiming for a proper real-world demonstration of Diverse
Double-Compiling.
Future plans include attempting to bootstrap Mes with an even more diverse set
of compilers such as Clang and Microsoft's C compiler, aiming for a proper
real-world demonstration of Diverse Double-Compiling.
The Mes binary produced as a result of this work is available in GNU Guix as
the
`mes-rb5`
package, and in the Debian
`i386`
mes
`0.21-3`
version as the
`mes-boot0-static`
binary. And... the moment you've all been waiting for, the
SHA-256 checksum of this version is:
The Mes binary produced as a result of this work is available in GNU
Guix as the mes-rb5 package, and in the Debian i386 mes 0.21-3 version
as the "mes-boot0-static" binary.
And the moment you've all been waiting for:
sha256sum 9e0bcb1633c58e7bc415f6ea27cee7951d6b0658e13cdc147e992b31a14625fb
`9e0bcb1633c58e7bc415f6ea27cee7951d6b0658e13cdc147e992b31a14625fb`
_posts/2020-09-25-ardc-sponsors-the-reproducible-builds-project.md
0 → 100644
View file @
8a379d5d
---
layout
:
post
title
:
"
ARDC
sponsors
the
Reproducible
Builds
project"
date
:
2020-09-25 00:00:00
categories
:
org
draft
:
false
---
<big>
**
The Reproducible Builds project is pleased to announce a donation from
[
Amateur Radio Digital Communications
](
https://ampr.org/
)
(
ARDC
)
in support
of its goals.
**
ARDC's contribution will propel the Reproducible Builds
project's efforts in ensuring the future health, security and sustainability of
our increasingly digital society.
</big>
## About Amateur Radio Digital Communications (ARDC)
[
]({{ "https://ampr.org/" | relative_url }})
[
Amateur Radio Digital Communications
](
https://ampr.org/
)
(
ARDC
)
is a
non-profit that was formed to further research and experimentation with digital
communications using radio, with a goal of advancing the state of the art of
amateur radio and to educate radio operators in these techniques.
It does this by managing the allocation of network resources, encouraging
research and experimentation with networking protocols and equipment,
publishing technical articles and number of other activities to promote the
public good of amateur radio and other related fields. ARDC has recently begun
to contribute funding to organisations, groups, individuals and projects
towards these and related goals, and their grant to the Reproducible Builds
project is part of this new initiative.
Amateur radio is an entirely volunteer activity performed by knowledgeable
hobbyists who have proven their ability by passing the appropriate government
examinations. No remuneration is permitted. "Ham radio," as it is also known,
has proven its value in advancements of the state of the communications arts,
as well as in public service during disasters and in times of emergency.
For more information about ARDC, please see their website at
[
ampr.org
](
https://ampr.org/
)
.
## About the Reproducible Builds project
[
]({{ "/" | relative_url }})
One of the original promises of open source software was that peer review would
result in greater end-user security and stability of our digital ecosystem.
However, although it is theoretically possible to inspect and build the
original source code in order to avoid maliciously-inserted flaws, almost all
software today is distributed in prepackaged form.
This disconnect allows third-parties to compromise systems by injecting code
into seemingly secure software during the build process, as well as by
manipulating copies distributed from 'app stores' and other package repositories.
In order to address this, 'Reproducible builds' are a set of software
development practices, ideas and tools that create an independently-verifiable
path from the original source code, all the way to what is actually running on
our machines. Reproducible builds can reveal the injection of backdoors
introduced by the hacking of developers' own computers, build servers and
package repositories, but can also expose where volunteers or companies have
been coerced into making changes via blackmail, government order, and so on.
A world without reproducible builds is a world where our digital infrastructure
cannot be trusted and where online communities are slower to grow, collaborate
less and are increasingly fragile. Without reproducible builds, we leave space
for greater encroachments on our liberties both by individuals as well as
powerful, unaccountable actors such as governments, large corporations and
autocratic regimes.
The Reproducible Builds project began as a project within the Debian community,
but is now working with many crucial and well-known free software projects such
as Coreboot, openSUSE, OpenWrt, Tails, GNU Guix, Arch Linux, Tor, and many
others. It is now an entirely Linux distribution independent effort and serves
as the central 'clearing house' for all issues related to securing build
systems and software supply chains of all kinds.
For more about the Reproducible Builds project, please see their website at
[
reproducible-builds.org
](
{{
"/"
| relative_url }}).
<br>
<small>
If you are interested in ensuring the ongoing security of the software that
underpins our civilisation, and wish to sponsor the Reproducible Builds
project, please reach out to the project by emailing
[
contact@reproducible-builds.org
](
mailto:contact@reproducible-builds.org
)
.
</small>
images/news/ardc-sponsors-the-reproducible-builds-project/ardc.png
0 → 100644
View file @
8a379d5d
9.54 KB
images/news/ardc-sponsors-the-reproducible-builds-project/reproducible-builds.png
0 → 100644
View file @
8a379d5d
8.41 KB
news
-
archive.md
→
news
/
archive.md
View file @
8a379d5d
...
...
@@ -7,7 +7,7 @@ permalink: /news/archive/
# News archive
<ul
class=
"list-unstyled"
>
{% assign posts = site.posts | sort: 'year, month' | where: 'draft', 'false'
| reverse
%}
{% assign posts = site.posts | sort: 'year, month' | where: 'draft', 'false' %}
{% for post in posts %}
<li>
<a
href=
"{{ post.url | relative_url }}"
>
{{ post.title }}
</a>
...
...
news.md
→
news
/index
.md
View file @
8a379d5d
File moved