jens, (edited ) to random
@jens@social.finkhaeuser.de avatar

Unpopular opinion: If your hobby is responsible for running the modern world, you deserve to be paid a living wage for running it.

jwildeboer, to random
@jwildeboer@social.wildeboer.net avatar

The backdoor story is making rounds. The New York Times:

"Did One Guy Just Stop a Huge Cyberattack?

A Microsoft engineer noticed something was off on a piece of software he worked on. He soon discovered someone was probably trying to gain access to computers all over the world."

(possibly paywalled) https://www.nytimes.com/2024/04/03/technology/prevent-cyberattack-linux.html

benroyce, to random
@benroyce@mastodon.social avatar

i hesitate to post this, some kinds of wide attention is undesired

but thank @AndresFreundTec

don't lambast him with praise or bombard him with chit chat:

he's busy

but you should know that he just saved the world from what could have been a crippling hack on, well, anything and everything. what he prevented can modestly and credibly be estimated as amongst the worst (potential) hacks ever. possibly nation state sponsored. no one knows for sure right now

https://www.nytimes.com/2024/04/03/technology/prevent-cyberattack-linux.html

jgoerzen, to security
@jgoerzen@floss.social avatar

I am getting tired of reading about the issue as if it is all about issues within . It is much bigger than that, and those takes conflate the problem with the solution.

So I wrote "The xz issue isn't about Open Source" here: https://changelog.complete.org/archives/10642-the-xz-issue-isnt-about-open-source

clairegiordano, to PostgreSQL
@clairegiordano@hachyderm.io avatar

I always liked being on the same Postgres team as @AndresFreundTec because he was smart + hard-working + hypercompetent.

But with his xz backdoor discovery Andres has taken things to a whole new level. Hence this NYT Kevin Roose story and the whole breadbaking & yeast analogy 🤯 for Andres's stubbornly persistent investigation, driven by a "That's weird" feeling....

/cc @bcantrill

Thank you Andres 🙌 https://www.nytimes.com/2024/04/03/technology/prevent-cyberattack-linux.html

aires, to NixOS
@aires@tiggi.es avatar

Looks like the backport has made its way to the unstable repo. Lots of updated derivations to download :blobcateyes:

downey, to Matrix
@downey@floss.social avatar

"You have to understand, we’re responsible for taxpayer money here. We can’t just make a donation to your open source project."

— a national government who relies on when being asked to support it financially

Read more about the problem and some initiatives that are responding to it:

https://matrix.org/blog/2024/04/open-source-publicly-funded-service/

matrix, (edited ) to Matrix
@matrix@mastodon.matrix.org avatar

Open source infrastructure must be a publicly funded service, and funders need to support maintenance – not just new feature development 📣

This is on our minds this week in the wake of the #xz news, and as we continue to seek funding to support #Matrix.

Read the latest from project lead, @matthew: https://matrix.org/blog/2024/04/open-source-publicly-funded-service/

#OpenSource #FOSS #OpenStandards

vegos_f06, to security

@anonymiss@despora.de:> ### : Times, damned times, and scams

However, I believe that he is actually from somewhere in the UTC+02 (winter)/UTC+03 (DST) timezone, which includes Eastern Europe (EET), but also Israel (IST), and some others. Forging time zones would be easy — no need to do any math or delay any commits. He likely just changed his system time to Chinese time every time he committed.

source: rheaeve.substack.com/p/xz-back…

sovtechfund, to foss German
@sovtechfund@mastodon.social avatar

Wir beim Sovereign Tech Fund verfolgen den -Vorfall aufmerksam und hören die vielen Stimmen aus der -Community dazu. Es ist uns klar, dass der xz-Vorfall Anzeichen einer strukturellen Herausforderung ist.

https://www.sovereigntechfund.de/de/neuigkeiten/xz-anzeichen-strukturelle-herausforderung

sovtechfund, to foss
@sovtechfund@mastodon.social avatar

At Sovereign Tech Fund, we're following the incident closely and listening to the many voices in the maintainer community.

What's clear to us is that the xz incident shows the need for structural change:

https://www.sovereigntechfund.de/news/xz-structural-change

stooovie, to random
@stooovie@mas.to avatar

“This upstream supply chain security attack is the kind of nightmare scenario that has gotten people describing it called hysterical for years,” Kubernetes Security Chairperson Ian Coldwaterhad written on X. “It’s real.

👍

https://thenewstack.io/linux-xz-backdoor-damage-could-be-greater-than-feared/

lumiere, to linux

After the recent xz-utils attack, guess what was the response some developers thought of?
9to5 Linux, Phoronix
Instead of helping Lasse Collin, the xz-utils maintainer who was tricked and mentally abused, they jumped ship, because the new solution is "more dependable". Wow, I applaud for this stupidity.
Let's shift our gaze somewhere else a bit. netfilter, the management framework of network operations on Linux that's used by virtually every Linux distribution, effectively only has Pablo Neira Ayuso left to maintain the project after Florian Westphal quit the core team. strace only has Dmitry V. Levin there to keep the cogs running. tcpdump and libpcap have only very few people to maintain the lights. And Bash should probably get abandoned with the few people there to keep everything up. The list goes on and on, because this is the freaking norm!
With the current mindset, support of any form, be it encouragement, financial support or contributing, is way too expensive for anyone to give out. I suggest just don't offer the maintainers the love and help they deserve, and speed up the downfall of the current landscape.
To every FOSS developer out there who has been thanklessly maintaining projects, please accept my deepest gratitude. However, to those who either shifted the blame to the xz-utils project and Lasse Collin, or jumped ship because xz-utils is deemed "unsafe" by you, I have two words most suitable for you:
FUCK YOU. 🖕🏼

jejb, to random
@jejb@mastodon.online avatar

On the debate on the exploit: did we just get lucky or does the discovery demonstrate the strength of open source.

I think it's a bit of both: we definitely got lucky, but we did have a hand in making our luck: Open Source, by design, empowers the curious and it only takes one curious person to dig deeply enough, so our luck was there being that one curious person; the rest we made.

So your mission, if you choose to accept it, is to be more curious

passthejoe, to random
@passthejoe@ruby.social avatar

xz/liblzma: Bash-stage Obfuscation Explained - gynvael.coldwind//vx.log https://gynvael.coldwind.pl/?lang=en&id=782

Gallorum, to random French
@Gallorum@mamot.fr avatar


Questions subsidiaires ...

Pourquoi XZ Utils (liblzma) reste autant utilisé alors que libzstd/Zstandard est bien maintenu, aussi efficace en compression et nettement plus rapide ?

gabrielesvelto, to rust
@gabrielesvelto@fosstodon.org avatar

In the light of the backdoor, if you're a developer, I recommend you familiarize yourself with cargo vet:

https://mozilla.github.io/cargo-vet/

Auditing your dependencies, or relying on external audits, adds an important layer of protection.

It's not a silver bullet against bad dependencies as there's no such thing. However adding more layers of protection makes attackers' lives harder and this is one of them.

shaft, to random
@shaft@piaille.fr avatar

X to the Z, -utils ☝️

xtaran, to debian
@xtaran@chaos.social avatar

Yay, reduces dependencies (in Debian Unstable for now) and removes dependency.

openssh (1:9.7p1-4) unstable; urgency=medium

  • Rework systemd readiness notification and socket activation patches to not link against libsystemd (the former via an upstream patch).
  • […]

Thanks Colin Watson!

(via https://tracker.debian.org/news/1516548/accepted-openssh-197p1-4-source-into-unstable/)

shaft, to random
@shaft@piaille.fr avatar

If you had a system infected with backdoor, you should check its initramfs

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068348

(Debian bug here, but the same goes for RedHat or Fedora)

drahardja, to Software
@drahardja@sfba.social avatar

This is a fascinating glimpse into the beginning of the exploit, i.e. the social engineering.

Some users (accomplices of the attacker?) used the dev mailing list to badger and harass the maintainer of the project who was on the verge of burnout, to pressure him to grant co-maintainer status to the attacker.

Whether this was part of the attack or not, it’s a sad glimpse into the toxic pattern often found in open-source software, where users demand maintainers’ free labor, instead of helping them strike a healthy work-life balance.

https://robmensching.com/blog/posts/2024/03/30/a-microcosm-of-the-interactions-in-open-source-projects/

dlakelan, to random
@dlakelan@mastodon.sdf.org avatar

Just had a long talk with my poor overworked wife about my realization that when it comes to research, Universities are just rent-seeking middlemen. There is no reason why researchers should be EMPLOYEES of Universities (other than historical accident). In fact, Universities, which are big capital holders funded by the govt should be employed BY researchers and competing to provide researchers with quality facilities at competitive prices.

dlakelan,
@dlakelan@mastodon.sdf.org avatar

This is very closely related to the problems being discussed in the hack. Just as some major fraction of the US economic output relies on an anarchic group of open software developers that need funding, we need to solve that problem in a way compatible with the inherently anarchic nature of anyone being able to write software together. And when we solve that problem we should also solve the problem of funding literally anyone who has a worthwhile research project.

floofloof, (edited ) to opensource in Bullying in Open Source Software Is a Massive Security Vulnerability

Three years ago, had a similar kind of attempt as the . A new contributor submitted a merge request to improve the search, which was oft requested but the maintainers hadn’t found time to work on. There was also pressure from other random accounts to merge it. In the end, it became clear that it added a . In this case, we managed to catch it before it was merged. Since similar tactics were used, I think its relevant now

social.librem.one/

Steiner wrote this week that the original coder deleted their account as soon as F-Droid’s maintainers attempted to review the code, and that he thinks that the user’s behavior, as well as “all the attention from random new accounts” has led him to believe “it could be a deliberate attempt to insert the vuln.”

This is pretty significant: the first documented case of these tactics being used to insert a vulnerability, apart from xz. So probably the same actors have been trying this on multiple projects.

I hope other maintainers who have experienced similar pressure tactics will come forward, even if they’re not aware of any backdoors. For any project where this has taken place and the code was merged, the code and commit history needs to be audited.

jdkiser, to fediverse
@jdkiser@social.sdf.org avatar

A week or so later, one good thing about the is how it all pretty much played out on Mastodon and in the . The discussion wasn't on #x or , not or or whatever. Analysis and investigation and discussion happened here on . Even magazine gave credit.

That's a pretty cool milestone.

ivan, to NixOS
@ivan@hachyderm.io avatar

A PSA for anyone trying to garbage collect the malicious versions of and wondering why it’s not going away even after deleting previous generations and gc roots: make sure keep-outputs and keep-derivations is disabled in your Nix conf. You can turn them back on after running nix-collect-garbage

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • ethstaker
  • magazineikmin
  • thenastyranch
  • rosin
  • osvaldo12
  • Youngstown
  • slotface
  • khanakhh
  • kavyap
  • Durango
  • DreamBathrooms
  • megavids
  • modclub
  • tacticalgear
  • cubers
  • InstantRegret
  • cisconetworking
  • GTA5RPClips
  • tester
  • everett
  • normalnudes
  • Leos
  • anitta
  • provamag3
  • lostlight
  • All magazines