Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]
Groups > comp.os.vms > #378785
| From | cross@spitfire.i.gajendra.net (Dan Cross) |
|---|---|
| Newsgroups | comp.os.vms |
| Subject | Re: No Country for Old System Administrators |
| Date | 2026-05-07 14:22 +0000 |
| Organization | PANIX Public Access Internet and UNIX, NYC |
| Message-ID | <10ti76v$9t7$1@reader1.panix.com> (permalink) |
| References | <10t685f$2ilti$1@dont-email.me> <10tft85$hu8$1@reader1.panix.com> <zvadnQ3POdq2nGH0nZ2dnZfqnPednZ2d@giganews.com> <10ti0vj$21brr$1@dont-email.me> |
In article <10ti0vj$21brr$1@dont-email.me>, Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> wrote: >On 2026-05-06, Dennis Boone <drb@ihatespam.msu.edu> wrote: >> > I don't think you understand the point. It is being claimed, >> > without evidence, that the directions for installing `rustup` >> > are a "security issue." >> >> The problem here isn't really rustup. A better objection to "curl|bash" >> is that it normalizes a habit of failing to think critically and act >> carefully. > >And that is _exactly_ the point I am making. Is it, though? It sounds like you're making a specious claim about a group of people asserting something that they are not actually saying, and then using their recommended method for installing a toolchain as evidence for a conclusion you drew from that strawman. >This is what I see on that installation page: > >|Using rustup (Recommended) >| >|It looks like you're running macOS, Linux, or another Unix-like OS. To >|download Rustup and install Rust, run the following in your terminal, >|then follow the on-screen instructions. See "Other Installation >|Methods" if you are on Windows. >| >|curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh > >I never even read that other page because they said it was for Windows >but I now see they have actually been forced to say the exact same thing >as I have just done (but they have buried it on something they described >as a Windows-only page). The text at the bottom of that page says: |Other installation methods | |The installation described above, via rustup, is the preferred |way to install Rust for most developers. However, Rust can be |installed via other methods as well. | |[LEARN MORE](https://forge.rust-lang.org/infra/other-installation-methods.html) Nothing in that text says, "windows only." >I stand by my original comments, especially after reading that "Windows"-only >page. Presumably you are referring to the part of the text that you quoted above that reads, "See 'Other Installation Methods' if you are on Windows." First, that does not say "only if you are on windows." It merely says that if you're using Windows, do this instead of that. No one is forcing you to use rustup if you don't want to or do not feel comfortable doing so. Second, if you are serious about security, and want to approach it with the mental mindset you are advocating, shouldn't you read more than the first paragraph of the installation instructions? >I also stand by my approach that security is a frame of mind, and which >cannot be replaced by some claimed "magic" tool. Tools can help (and are >required), but that's all they can do (and they are not magic). So you have traced the the source-level provenance of all software running on your computer and audited it for bugs, right? :-D Jokes aside, you seem to be implying that someone has suggested that e.g. Rust is a "magic tool" for solving security problems and that it can replace one's mental model of security. I don't think anyone in a position of authority with respect to Rust has ever said that. The claims they do make are that the requirements imposed by using the safe subset of Rust eliminate several categories of common programming errors related to type and memory safety. To the extent that intersects with "security" at all, those errors are frequently associated with security vulnerabilities, and so programs written in safe Rust are free from those kinds of vulnerabilities as a side-effect. Furthermore, safe rust and the standard library provide enough functionality for the vast majority of programming needs; most Rust programmers will never have to type `unsafe` into a program in their careers. But it does not follow that Rust programs are free from _all_ security vulnerabilities, and no one claims that they are; at least no one who understands these things at more than a cursory level[*]. You can obviously write Rust programs with security vulnerabilities. And rust is not perfect: I could go into some of the problems that _I_ see in the language, if you like, but I'm striving for brevity here. I realize that the claims mentioned above are bold, and I truly believe that one _should_ approach them with a healthy dose of skepticism (I did and I'm glad for it). But to dismiss Rust, or anything for that matter, out of hand because you don't like the recommended toolchain installation process is not skepticism. I encourage you to look at an alternative installation method and explore it for yourself before drawing conclusions. - Dan C. [*] An admitted problem with the larger Rust ecosystem is that it tends to attract rabid Lawrence-style fanboys who oversell it and make specious claims about its capabilities; these do not stand up to scrutiny. But that is not the fault of the language any more than it is Linux's fault that Lawrence is so obnoxious and uninformed in his advocacy for it. In any event, "there are people who like this and behave like jerks about it on the Internet, therefore it must suck" is poor logic. Further, without making an effort to understand the presumed threat model, asserting that the installation process is evidence of "bad security" or a cavalier attitude towards security from the larger project, is specious at best.
Back to comp.os.vms | Previous | Next — Previous in thread | Next in thread | Find similar
No Country for Old System Administrators Subcommandante XDelta <vlf@star.enet.dec.com> - 2026-05-03 11:25 +1000
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-02 22:08 -0400
Re: No Country for Old System Administrators Lawrence D’Oliveiro <ldo@nz.invalid> - 2026-05-03 06:43 +0000
Re: No Country for Old System Administrators cross@spitfire.i.gajendra.net (Dan Cross) - 2026-05-04 01:02 +0000
Re: No Country for Old System Administrators Lawrence D’Oliveiro <ldo@nz.invalid> - 2026-05-03 06:45 +0000
Re: No Country for Old System Administrators bill <bill.gunshannon@gmail.com> - 2026-05-03 08:59 -0400
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-03 11:53 -0400
Re: No Country for Old System Administrators kludge@panix.com (Scott Dorsey) - 2026-05-03 12:10 -0400
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-03 13:24 -0400
Re: No Country for Old System Administrators kludge@panix.com (Scott Dorsey) - 2026-05-03 19:27 -0400
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-03 20:28 -0400
Re: No Country for Old System Administrators Lawrence D’Oliveiro <ldo@nz.invalid> - 2026-05-04 02:26 +0000
Re: No Country for Old System Administrators kludge@panix.com (Scott Dorsey) - 2026-05-03 22:46 -0400
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-03 23:29 -0400
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-03 23:39 -0400
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-04 11:17 -0400
Re: No Country for Old System Administrators cross@spitfire.i.gajendra.net (Dan Cross) - 2026-05-04 02:24 +0000
Re: No Country for Old System Administrators Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> - 2026-05-05 13:02 +0000
Re: No Country for Old System Administrators kludge@panix.com (Scott Dorsey) - 2026-05-05 16:10 -0400
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-05 16:29 -0400
Re: No Country for Old System Administrators Lawrence D’Oliveiro <ldo@nz.invalid> - 2026-05-05 21:59 +0000
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-05 18:43 -0400
Re: No Country for Old System Administrators Lawrence D’Oliveiro <ldo@nz.invalid> - 2026-05-05 23:04 +0000
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-05 19:13 -0400
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-05 19:41 -0400
Re: No Country for Old System Administrators kludge@panix.com (Scott Dorsey) - 2026-05-05 21:47 -0400
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-05 22:17 -0400
Re: No Country for Old System Administrators Lawrence D’Oliveiro <ldo@nz.invalid> - 2026-05-06 04:17 +0000
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-06 09:29 -0400
Re: No Country for Old System Administrators Lawrence D’Oliveiro <ldo@nz.invalid> - 2026-05-06 21:20 +0000
Re: No Country for Old System Administrators cross@spitfire.i.gajendra.net (Dan Cross) - 2026-05-06 12:55 +0000
Re: No Country for Old System Administrators Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> - 2026-05-06 12:46 +0000
Re: No Country for Old System Administrators cross@spitfire.i.gajendra.net (Dan Cross) - 2026-05-06 17:36 +0000
New language features Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> - 2026-05-06 12:44 +0000
Safer programming languages Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> - 2026-05-05 12:24 +0000
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-03 13:28 -0400
Re: No Country for Old System Administrators Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> - 2026-05-05 12:59 +0000
Re: No Country for Old System Administrators cross@spitfire.i.gajendra.net (Dan Cross) - 2026-05-05 21:30 +0000
Re: No Country for Old System Administrators Arne Vajhøj <arne@vajhoej.dk> - 2026-05-05 19:05 -0400
Re: No Country for Old System Administrators cross@spitfire.i.gajendra.net (Dan Cross) - 2026-05-06 17:20 +0000
Re: No Country for Old System Administrators drb@ihatespam.msu.edu (Dennis Boone) - 2026-05-07 03:04 +0000
Re: No Country for Old System Administrators Simon Clubley <clubley@remove_me.eisner.decus.org-Earth.UFP> - 2026-05-07 12:36 +0000
Re: No Country for Old System Administrators cross@spitfire.i.gajendra.net (Dan Cross) - 2026-05-07 14:22 +0000
Re: No Country for Old System Administrators cross@spitfire.i.gajendra.net (Dan Cross) - 2026-05-07 13:00 +0000
csiph-web