Systemd as tragedy
Systemd as tragedy
Posted Jan 29, 2019 0:35 UTC (Tue) by dgm (subscriber, #49227)Parent article: Systemd as tragedy
Posted Jan 29, 2019 4:24 UTC (Tue)
by mathstuf (subscriber, #69389)
[Link]
Posted Jan 29, 2019 15:05 UTC (Tue)
by nettings (subscriber, #429)
[Link] (4 responses)
Posted Jun 4, 2019 19:25 UTC (Tue)
by mikebabcock (guest, #132457)
[Link] (3 responses)
This is not a well-integrated system (it almost can't be) and is redundant. There are good ways to handle inter-process communication and it doesn't belong in systemd.
Posted Jun 4, 2019 20:41 UTC (Tue)
by zdzichu (subscriber, #17118)
[Link] (2 responses)
Posted Jun 24, 2019 14:54 UTC (Mon)
by nix (subscriber, #2304)
[Link]
Posted Sep 5, 2019 19:25 UTC (Thu)
by soes (guest, #134247)
[Link]
I uses cfengine, which has its own rather dependable solution to authorizing/authentication access to the
the rule languages itself has constructs to authorize policy users ie hosts with only particular
cf-serverd uses a private-public private key pair to authenticate the connection including authenticating itself !
The authentication is done in C(C++) code, and has had basically no security holes the last 10 years.
Posted Feb 1, 2019 4:21 UTC (Fri)
by zblaxell (subscriber, #26385)
[Link]
The lifecycle management, scheduling, dependency management, and external triggers (sockets / mount points / etc) are all jumbled together in systemd, whereas they were traditionally managed by separate specialized daemons and command-line tools.
Systemd as tragedy
Systemd as tragedy
Systemd as tragedy
Systemd as tragedy
Systemd as tragedy
Systemd as tragedy
policy distribution process (or the policy activation on a client.)
Writing a systemd aware version of cf-serverd (which distributes policy and also
is used to activate the installed policy) would require a fork of the software ie cfengine due to:
IP addresses will get an open socket at all, other hosts will not get anything ie connects at all
Systemd as tragedy