jomo, to random
@jomo@mstdn.io avatar

thomasfricke, to foss German
@thomasfricke@23.social avatar

@isotopp
@mainec

@krakenbuerger

@littledetritus
@bkastl

Ich habe mein Dokument zur Gründung des @sovtechfund
mit allen Referenzen mal auf meine Webseite gestellt
https://thomasfricke.de/pages/fossec/

Stand 2021. Aber da fehlt für die Reaktionen auf oder andere Katastrophen nur noch

  1. Inzidenz Unterstützung für das betroffenene Projekt.

  2. Forensik und Aufräumen

  3. Langfristige Identifizierung von "wichtigen" Projekten unter Stress

Die Phasen schreibe ich noch sauber auf.

kuketzblog, to security German
@kuketzblog@social.tchncs.de avatar

Wie man sich die Ursache zur xz-Hintertür (CVE-2024-3094) am besten vorstellen kann. 👇

tinfoil-hat, to debian
@tinfoil-hat@social.tinfoil-hat.net avatar
jwildeboer, to random
@jwildeboer@social.wildeboer.net avatar

cc @thesamesam FYI - backdoor functions are being unraveled here too: https://social.wildeboer.net/@jwildeboer/112229155593174442

jwildeboer, (edited ) to random
@jwildeboer@social.wildeboer.net avatar

Now that the backdoor is uncovered and contained, the work on analysing its inner workings is moving forward. By triggering function calls inside the binary payload in a safe environment, for example https://threadreaderapp.com/thread/1776691497506623562.html

nonlinear, to random
@nonlinear@mastodon.nz avatar

Another though about the near-miss. Anyone who thinks that closed source software is fundamentally better supported and maintained is, imo, not informed. I have worked at multiple places there the one person who really knew a system and maintained it left the company. It was still sold and used, but no one had the primary responsibility to maintain it. They might touch it once in a while when they had free time (between features for other "more important" projects) and added bugs every time.

passthejoe, to random
@passthejoe@ruby.social avatar

FOSS Weekly .14: Homelab Special Edition (and Discussing XZ Backdoor in Linux) https://itsfoss.com/newsletter/foss-weekly-24-14/

passthejoe, to random
@passthejoe@ruby.social avatar

What can be done to protect open source devs from next xz backdoor drama? • The Register https://www.theregister.com/2024/04/06/register_kettle_xz/

kawie, to random German
@kawie@chaos.social avatar

gute zusammenfassung

senficon, to random
@senficon@ohai.social avatar

Lasse Collin has posted an update on his plans for and clearing up what happened: https://tukaani.org/xz-backdoor/ I hope he’s met with all the support and patience he needs.

passthejoe, to linux
@passthejoe@ruby.social avatar

The Linux xz Backdoor Episode: An Open Source Mystery - The New Stack https://thenewstack.io/the-linux-xz-backdoor-episode-an-open-source-mystery/

forteller, to random
@forteller@tutoteket.no avatar

You know how governments typically pay for creation & maintenance of physical infrastructure, and are seen as responsible for making sure at least not too many people are hurt by them, and Do Something when people are? (not that they always do, but at least there's some kinda expectation/demand)

And you know how that goes even if only civilians use those water pipes, roads etc, not just when the gov itself use them?

Maybe we should start thinking like that for digital infrastructure too?

selviano, to sustainability
@selviano@mastodon.online avatar
xtaran, to random
@xtaran@chaos.social avatar

, Day 5, Part 2: Went into the weekend a bit earlier due the time I worked during the Easter weekend on understanding and locally mitigating the f🤬ckup. Ran some cycling related errands: bringing a rain jacket to for repair and visiting my repair shop for making an appointment for the next maintenance. The boss came out, pointed to their window and said "You're hanging in our window!" And indeed, there's a printed version of https://www.provelozuerich.ch/magazin/bromptonaut-unter-strom/

treuss, to RedHat German
@treuss@metalhead.club avatar

Das ist inzwischen auch aufgewacht und warnt vor dem Backdoor. Das ist löblich, die Warnung selbst aber nicht ganz korrekt.

Die vielen Millionen Internet-Server laufen in den seltensten Fällen auf Bleeding-Edge-Systemen, sondern auf stabilen, wie etwa , , oder . Keine der genannten Distributionen enthält den .

Ist das wieder nur schlafmütziger Fick-Fuck einer deutschen Behörde, oder möchte man ...

(1/2)

@bsi

astroboy, to random
@astroboy@fosstodon.org avatar

@brianokken @mkennedy Hey guys! Thanks for the news on xz! I just did some research. If you had an Ubuntu PC or a server, then you weren't infected since Ubuntu checks packages before they get published, so you didn't get infected unless you were using the latest alpha version of Ubuntu: https://askubuntu.com/questions/1509015/is-ubuntu-affected-by-the-xz-backdoor-compromise

And on MacOS, yeah, I also checked, and I had version 5.6.0. But the brew team says the malware was only for deb and rpm packages, so doesn't affect Mac: https://github.com/orgs/Homebrew/discussions/5243

mkennedy,
@mkennedy@fosstodon.org avatar

@brianokken @astroboy Thanks @astroboy. Much appreciated.

Here is a very good video about the social aspect of #xz that should be required watching. The first couple minutes is about the tech details, then the rest about the open source hack.

But that first tech bit shows a build flag mixing in the exploit if you're running x86_64 Linux. Other platforms seem to be excluded. So add that to your recommendation / limitations you just gave.

https://www.youtube.com/watch?v=0pT-dWpmwhA

ajuvo, to random German
@ajuvo@chaos.social avatar

Ogottogott.

Das hier machen "Qualitätsmedien" aus dem - Vorfall

Deutscher Entwickler rettet Millionen Rechner vor Hacker-Angriff - FOCUS online
https://m.focus.de/panorama/welt/generalschluessel-zum-internet-deutscher-entwickler-rettet-millionen-rechner-vor-hacker-angriff_id_259826720.html

Thierry31, to random French
@Thierry31@piaille.fr avatar

Question bête: le processus d'acceptation de packages pour une release (LTS notemment) de distribution n'aurait pas permis de déceler la backdoor ?

SolInfoNat, to random
@SolInfoNat@syndicat.solidaires.org avatar

: so from now on, companies will invest time and money on libre projects they depends on instead of vulturing everything they can, won't they ? No ?

happyborg, to random
@happyborg@fosstodon.org avatar

Hands up if you'd never heard of #xz until last week.

senficon, to random German
@senficon@ohai.social avatar
pbarker, to opensource
@pbarker@social.afront.org avatar

This, from the naive and innocent days of just under a month ago, is worth re-reading in light of the xz backdoor:

"In essence, having a lot of dependencies results in two problems. The first is the burden problem, where each added dependency requires extra effort. That manifests in tasks such as keeping up to date with dependencies, but also requires extra work for downstream users like people packaging the project for a Linux distribution.

The second problem is a trust problem: each additional dependency is another team to trust and another codebase to validate. This trust problem is especially important to sudo-rs. As a setuid program meant for elevating privileges, all code that is compiled into sudo-rs has the potential to accidentally (or intentionally) give access to system resources to people who should not have that access. The setuid context additionally puts some constraints on how code is executed, and dependencies might not have accounted for that context. We could not expect any of our dependencies to take into account such a context either."

https://www.memorysafety.org/blog/reducing-dependencies-in-sudo/

popey, to linux
@popey@mastodon.social avatar

If you would like a well informed, accessible breakdown of the recent backdoor issue on - give Ubuntu Security Podcast episode 224 a listen. It’s only ~30 minutes in duration. Mostly not actually Ubuntu specific, and very digestible.

https://ubuntusecuritypodcast.org/episode-224/

dystroy, to random
@dystroy@mastodon.dystroy.org avatar

Everyday, there are new issues registered on the projects I maintain.

I know how to handle them, I just don't have the time after work.

There's no way I solve all your requests unless a company sponsors me, which is unlikely.

So I'll more and more focus on the features I personally need, sorry.

happyborg,
@happyborg@fosstodon.org avatar

@dystroy
For the first time I'm starting to get PRs for one of my moderately popular projects, used by people who are potential targets just because they use it.

Meanwhile I'm putting lots of time into another project which is much more fun.

I'm grateful to the attacker for showing me that it is best to let them sit there, with a little explanation and thanks, until I have time to review them properly.

Maintaining comes with responsibilities we need to take seriously.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines