LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-06-2024, 04:24 PM   #16
mw.decavia
Member
 
Registered: Feb 2024
Distribution: Slackware64-15 & Afterstep , oh my
Posts: 78

Rep: Reputation: 8

I do have sshd disabled, I unselected it at install/setup time.

So far I have not been able to disable systemd . Which was not supposed to be on my Slackware system in the first place. I never installed systemd, did not notice any other package installing it. How did systemd get there? Slackware tells everyone it does not use systemd. A week ago I would not have cared so much. But now knowing there is a backdoor into systemd, I do care.

Quote:
Originally Posted by yvesjv View Post
Don't see what the hurdle is.
If you do not need it for now, disable it.
'/etc/rc.d/rc.sshd stop' followed with 'chmod -x /etc/rc.d/rc.sshd'

If you do need it and wants to remain somewhat safe on the net, then stay away from systemd distros.
 
Old 04-06-2024, 06:10 PM   #17
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS,Manjaro
Posts: 5,658

Rep: Reputation: 2708Reputation: 2708Reputation: 2708Reputation: 2708Reputation: 2708Reputation: 2708Reputation: 2708Reputation: 2708Reputation: 2708Reputation: 2708Reputation: 2708
Quote:
Originally Posted by mw.decavia View Post
I do have sshd disabled, I unselected it at install/setup time.

So far I have not been able to disable systemd . Which was not supposed to be on my Slackware system in the first place. I never installed systemd, did not notice any other package installing it. How did systemd get there? Slackware tells everyone it does not use systemd. A week ago I would not have cared so much. But now knowing there is a backdoor into systemd, I do care.
There is NOT a back door into SystemD (as far as we know). There ALMOST was a back door into SystemD, but that problem has been solved. Still, SystemD is an unneeded vulnerability in my opinion. And, yes, I also care. I never liked SystemD, but now I have about 6 more reasons why.
 
Old 04-06-2024, 06:24 PM   #18
astrogeek
Moderator
 
Registered: Oct 2008
Distribution: Slackware [64]-X.{0|1|2|37|-current} ::12<=X<=15, FreeBSD_12{.0|.1}
Posts: 6,269
Blog Entries: 24

Rep: Reputation: 4196Reputation: 4196Reputation: 4196Reputation: 4196Reputation: 4196Reputation: 4196Reputation: 4196Reputation: 4196Reputation: 4196Reputation: 4196Reputation: 4196
Quote:
Originally Posted by mw.decavia View Post
So far I have not been able to disable systemd . Which was not supposed to be on my Slackware system in the first place. I never installed systemd, did not notice any other package installing it. How did systemd get there?
Could you be more specific, _exactly_ what have you found on your Slackware system that you are calling systemd, and that you cannot disable?
 
Old 04-06-2024, 09:20 PM   #19
panorain
Member
 
Registered: Dec 2018
Location: North Pole
Distribution: LinuxMint 21.2 Mate Desktop/openSUSE Tumbleweed KDE/Plasma
Posts: 63

Rep: Reputation: Disabled
Quote:
Originally Posted by rokytnji View Post
What a systemd free install returns in my Terminal

Code:
$ xz -V
xz (XZ Utils) 5.4.1
liblzma 5.4.1
harry@antiX-23.1:~
$ ldd /usr/sbin/sshd | grep 'lzma|systemd'
harry@antiX-23.1:~
$
If any return output on ldd command is what to look out for. I run stable and backports instead of testing and sid repos also.
Not nervous here.
I am running openSUSE Tumbleweed on this machine.

CPE OS Name: cpe:2.3pensuse:tumbleweed:20240404:*:*:*:*:*:*:*


Thinkcentre-M57p:~> xz -V
xz (XZ Utils) 5.4.6
liblzma 5.4.6
Thinkcentre-M57p:~> ldd /usr/sbin/sshd | grep 'lzma|systemd'
Thinkcentre-M57p:~>

-Thanks
 
Old 04-06-2024, 09:35 PM   #20
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,332
Blog Entries: 28

Rep: Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144
Here's Bruce Schneier's take on this.
 
3 members found this post helpful.
Old 04-07-2024, 08:00 AM   #21
ntubski
Senior Member
 
Registered: Nov 2005
Distribution: Debian, Arch
Posts: 3,783

Rep: Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083
Quote:
Originally Posted by rokytnji View Post
Code:
$ ldd /usr/sbin/sshd | grep 'lzma|systemd'
harry@antiX-23.1:~
Um, that grep isn't testing what you think it is (though looks like your xz version is too old for this attack anyway).

Code:
$ echo -e 'systemd\nlzma' | grep 'systemd|lzma'
$ echo -e 'systemd\nlzma' | grep 'systemd\|lzma'
systemd
lzma
 
Old 04-07-2024, 02:20 PM   #22
yvesjv
Member
 
Registered: Sep 2015
Location: Australia
Distribution: Slackware, Devuan, Freebsd
Posts: 569

Rep: Reputation: Disabled
Quote:
Originally Posted by mw.decavia View Post
So far I have not been able to disable systemd . Which was not supposed to be on my Slackware system in the first place. I never installed systemd, did not notice any other package installing it. How did systemd get there? Slackware tells everyone it does not use systemd. A week ago I would not have cared so much. But now knowing there is a backdoor into systemd, I do care.
Very interested how you claim to have that trojan aka systemd installed on your Slackware machine.
Could you please run this command in cli and paste it here?
systemctl --version
 
Old 04-07-2024, 02:31 PM   #23
panorain
Member
 
Registered: Dec 2018
Location: North Pole
Distribution: LinuxMint 21.2 Mate Desktop/openSUSE Tumbleweed KDE/Plasma
Posts: 63

Rep: Reputation: Disabled
Hi, I thought to show information on the openSUSE machine here:

Thinkcentre-M57p:~> systemctl --version
systemd 255 (255.4+suse.22.g56b53b17bc)
+PAM +AUDIT +SELINUX +APPARMOR +IMA -SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK -XKBCOMMON -UTMP +SYSVINIT default-hierarchy=unified

-Thanks
 
1 members found this post helpful.
Old 04-07-2024, 06:44 PM   #24
rkelsen
Senior Member
 
Registered: Sep 2004
Distribution: slackware
Posts: 4,457
Blog Entries: 7

Rep: Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560
Quote:
Originally Posted by mw.decavia View Post
So far I have not been able to disable systemd . Which was not supposed to be on my Slackware system in the first place. I never installed systemd, did not notice any other package installing it. How did systemd get there?
Hey man, you're about a week too late for April fool's day.
Quote:
Originally Posted by mw.decavia View Post
Slackware tells everyone it does not use systemd.
I can't tell if you're trolling, but in case you're not: Slackware doesn't use systemd.
 
2 members found this post helpful.
Old 04-07-2024, 09:55 PM   #25
mw.decavia
Member
 
Registered: Feb 2024
Distribution: Slackware64-15 & Afterstep , oh my
Posts: 78

Rep: Reputation: 8
Quote:
Originally Posted by rkelsen View Post
Hey man, you're about a week too late for April fool's day.

I can't tell if you're trolling, but in case you're not: Slackware doesn't use systemd.
First I tested for whether systemd sockets were active,
setting (in my unbound.conf) to use only systemd sockets,
unbound ran fine with no errors.

Then I looked around for files/links named "systemd". There
were too many to post here. But here is a small sample.

run/systemd
var/run/systemd
sys/fs/cgroup/systemd
usr/include/elogind/systemd

proc/1/cwd/run/systemd@
proc/1/root/run/systemd@
proc/10/cwd/run/systemd@
proc/10/root/run/systemd@
proc/1000/cwd/run/systemd@
proc/1000/root/run/systemd@
...
...
...
proc/self/cwd/run/systemd@
proc/self/root/run/systemd@
proc/thread-self/cwd/run/systemd@
proc/thread-self/root/run/systemd@

systemd appears to being running on process 1, and quite a few others.

Considering that the xz threat of controlling systemd had to do with how systemd (among other things) controls logins and could be given a backdoor -

- then the freely confessed use of "elogind" for slackware's logins, when elogind contains all of the login code from systemd including any weakness in systemd's login security

- then the difference in login security between systemd vs elongind is only a matter similar to how you pronounce potato and tomato.

As far as I have read right now, it is only gnome and kde which must have systemd/elogind. And I use neither of those.

As of now, I am considering a major distro leap. I am in the process of installing void linux. When they say "no systemd", they appear to sincerely mean it. I have not yet found any files named "systemd".
 
Old 04-07-2024, 10:33 PM   #26
rkelsen
Senior Member
 
Registered: Sep 2004
Distribution: slackware
Posts: 4,457
Blog Entries: 7

Rep: Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560
Quote:
Originally Posted by mw.decavia View Post
proc/1/cwd/run/systemd@
proc/1/root/run/systemd@
The 'cwd' and 'root' directories under the process directories are just symlinks to /

What you're seeing there are symlinks required by elogind.
Quote:
Originally Posted by mw.decavia View Post
systemd appears to being running on process 1, and quite a few others.
It's not:
Code:
# ps -p 1
  PID TTY          TIME CMD
    1 ?        00:00:10 init

# ps ax | grep systemd
11502 pts/1    S+     0:00 grep systemd
Quote:
Originally Posted by mw.decavia View Post
As far as I have read right now, it is only gnome and kde which must have systemd/elogind. And I use neither of those.
So remove it:
Code:
# removepkg elogind
Quote:
Originally Posted by mw.decavia View Post
As of now, I am considering a major distro leap. I am in the process of installing void linux. When they say "no systemd", they appear to sincerely mean it.
Hmmm: https://docs.voidlinux.org/config/se...anagement.html Good luck!
 
2 members found this post helpful.
Old 04-08-2024, 08:03 AM   #27
boughtonp
Senior Member
 
Registered: Feb 2007
Location: UK
Distribution: Debian
Posts: 3,610

Rep: Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553

Whilst the xz backdoor may be related to systemd, the presence/absence of systemd in Slackware is entirely off-topic and should be discussed in a distinct thread.

Please keep posts in this thread on the topic of XZ Utils being backdoored, and the security concerns which directly surround that event.

(If any moderators can split posts 13..19 and 21..26 into a new thread, that'd be helpful; I sent in a report but the only listed moderator for this section hasn't been active in over two years.)

 
1 members found this post helpful.
Old 04-08-2024, 11:16 AM   #28
_blackhole_
Member
 
Registered: Mar 2023
Distribution: FreeBSD
Posts: 92

Rep: Reputation: 68
Quote:
Originally Posted by wpeckham View Post
Interesting that desktop/client installations that do not run SSHD were immune.

The entire purpose of the injection appears to have been to provide a back door on servers running SYSTEMD using SSHD for secure remote access.
https://lcamtuf.substack.com/p/techn...he-xz-backdoor

https://marc.info/?l=openbsd-misc&m=171179460913574&w=2

While it's easy to blame systemd for everything, this was malicious code implanted by malicious actors in a carefully prepared supply chain attack, which was meticulously planned and executed - and most likely state sponsored. If systemd didn't exist, those same actors would adjust their code/mode of attack to target whatever else.

Debian/Ubuntu and Red Hat based servers running systemd are the biggest target and more likely to be found in corporate/government, so of course they hit those rather than something very obscure.

But yes, a lot of questions arise from this... but for me they're questions about the broader issue of Linux security as a whole, rather than just systemd.
Quote:
Originally Posted by mw.decavia View Post
When I was installing slackware lately, I saw that it would enable sshd as a system service by default, except I cleared the asterix for that. How many other distros might be enabling sshd by default?
This was as a result of an upstream Linux/systemd specific patch to xz-utils. It was not a patch to OpenSSH as you seem to think.

OpenSSH is developed by the OpenBSD project and had nothing to do with this patch to xz-utils.

xz-utils maintainer-ship was taken over from the original author by another developer - you can read a plethora of articles about this and what is currently known - many linked here.

Quote:
Originally Posted by mw.decavia View Post
As far as I have read right now, it is only gnome and kde which must have systemd/elogind. And I use neither of those.

As of now, I am considering a major distro leap. I am in the process of installing void linux. When they say "no systemd", they appear to sincerely mean it. I have not yet found any files named "systemd".
I'm with you on the use of elogind, but I feel you're flagging up a lot of false positives. The entries in procfs for example are most likely harmless.

You may find systemd related entries in /proc as well as systemd unit files, even when systemd is not installed - this is most likely due to upstream software which has systemd support and may be used by elogind if that's installed.

However, your conclusions seem quite alarmist and not based on any actual problems. Clearly you see the word "systemd" and you're jumping to conclusions... you're not alone.

This used to happen a lot, maybe still does for all I know, with Devuan the "systemd free" distribution based on Debian. The "zealots" who migrated to Devuan used to complain endlessly if any file whatsoever called "systemd" (such as "libsystemd0" or some unit files) appeared to be installed - without any real understanding of what those files were or the reasons they were there. This was/is fairly typical of Devuan and the "cult like" following it gained - intentional or not - and instead of ignoring these zealots, the distribution maintainers mostly appeased them, because Devuan (understandably) did not want to lose users. Unfortunately that reluctance to lose users and tolerance towards the intolerable has harmed the project and driven people away - only to be replaced by users with the same kind of hysterical, alarmist views you've been posting here.

Last edited by _blackhole_; 04-08-2024 at 11:18 AM.
 
1 members found this post helpful.
Old 04-19-2024, 09:25 PM   #29
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,332
Blog Entries: 28

Rep: Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144Reputation: 6144
Bruce Scheier reports that further review has shown that the attack on xz was not a one-of.
 
1 members found this post helpful.
Old 04-20-2024, 02:21 PM   #30
yvesjv
Member
 
Registered: Sep 2015
Location: Australia
Distribution: Slackware, Devuan, Freebsd
Posts: 569

Rep: Reputation: Disabled
Quote:
Originally Posted by frankbell View Post
Bruce Scheier reports that further review has shown that the attack on xz was not a one-of.
We can thank our lucky stars it is all open source and subject to review/scrutiny.
Were these projects closed source, we would be up the proverbial &^%$ creek without a paddle.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: European Court of Human Rights Declares Backdoored Encryption Illegal LXer Syndicated Linux News 0 02-17-2024 06:32 PM
LXer: Warning — Linux Mint Website Hacked and ISOs replaced with Backdoored Operating System LXer Syndicated Linux News 0 02-23-2016 10:21 AM
LXer: Has your Linux Mint desktop been backdoored? LXer Syndicated Linux News 0 02-23-2016 04:40 AM
OpenBSD IPSEC backdoored? mjolnir *BSD 11 12-20-2010 08:36 AM
WARN: poss backdoored ircii-pana at ftp.bitchx.org unSpawn Linux - Security 0 07-01-2002 06:16 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:44 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration