LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 04-02-2024, 10:24 PM   #61
guanx
Senior Member
 
Registered: Dec 2008
Posts: 1,179

Rep: Reputation: 236Reputation: 236Reputation: 236

(Not sure if off-topic)

Probably virtual-machine encryption of modern CPUs partly defeats these attacks.

Less solid defenses may include process isolation, seccomp and so on. BTW, These should have proven that moving from C to Rust is unnecessary. Ridiculous that Linux developed the Rust infrastructure which is practically not used.

Last edited by guanx; 04-02-2024 at 10:25 PM.
 
Old 04-02-2024, 10:43 PM   #62
guanx
Senior Member
 
Registered: Dec 2008
Posts: 1,179

Rep: Reputation: 236Reputation: 236Reputation: 236
Quote:
Originally Posted by yvesjv View Post
Why bring Lennart and systemd into this?
Lennart with systemd is just for commercial benefit and possibly also for personal credit. Exactly the same motive as this Jia TAN.

The only difference is that Lennart is more straightforward. He aims at making the operating system more error prone so that he can earn more from providing commercial support. This is obvious.

While Jia TAN shows love and loyalty to the state ("love the state not the people", a concept mostly advocated by the chinese and u.s. politicians), it is actually as selfish as Lennart is.
 
1 members found this post helpful.
Old 04-03-2024, 12:59 AM   #63
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,591
Blog Entries: 19

Rep: Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455
Trust is a fragile thing. During the McCarthy era in America, there actually were some people in the public eye who were communist apologists and sympathisers. Because of that, McCarthy's accusations seemed reasonable at first. But they ended up ruining the careers and lives of a lot of completely innocent people. Once the witch hunt started, it couldn't be stopped.

Do we really want to go down that road?
 
7 members found this post helpful.
Old 04-03-2024, 05:34 AM   #64
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,325

Rep: Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330
To a great extent, how trustworthy someone is depends on his/her motivation.

In post #55 I copied an extract that points out that the sophistication of this backdoor points to a state sponsored hacking group. The link to the article is in post #54. Suitably motivated people will do their job and get their pay, even if it means making life difficult for others. The U.S. had no scruples about targeting the firmware on Iran's nuclear centrifuges. I'm sure the people who programmed that were themselves 'programmed' to see it as a good thing to do. We have already met incoming "products" from hacking groups. I'm sure the people who programmed them were also 'programmed' to see hacking the Western powers as a good thing to do.

And I imagine that Jia Tan was simply a front man for whatever group it was. The sophistication indicates that his commits could have been perfected in group sessions. The group certainly would have thought long and hard to try and find a way around disabling a compile feature. You just wonder how many 'sleepers' are in other OSS projects.
 
3 members found this post helpful.
Old 04-03-2024, 07:09 AM   #65
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,591
Blog Entries: 19

Rep: Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455
Some of the most sophisticated "black hat" groups are in North Korea. It seems weird that such a backward medievalised nation could excel in cracking computer systems but they recruit them young and train them carefully.

Last edited by hazel; 04-03-2024 at 07:12 AM.
 
Old 04-03-2024, 08:13 AM   #66
allend
LQ 5k Club
 
Registered: Oct 2003
Location: Melbourne
Distribution: Slackware64-15.0
Posts: 6,374

Rep: Reputation: 2752Reputation: 2752Reputation: 2752Reputation: 2752Reputation: 2752Reputation: 2752Reputation: 2752Reputation: 2752Reputation: 2752Reputation: 2752Reputation: 2752
Rather than the link posted in post#54, I prefer the link posted in post#11 (from which I draw subsequent references).

Quote:
We do not want to speculate on the people behind this project in this document. This is not a productive use of our time, and law enforcement will be able to handle identifying those responsible.
Personally, I am not so convinced on "law enforcement will be able to handle identifying those responsible". The trail back is thin. In hindsight, the targeting of xz, a widely used project with a leader lacking support, appears very deliberate. To me, this is the basis of the attack on trust that we find so hurtful.

The sophistication of the attack from the analysis to date is undeniable. The co-option of the build system to incorporate the object file containing the malware code is evil genius.

The full capabilities of the malware are still being discovered. The presence of code to hide from debuggers, the string handling code and the possible ability to add additional malware have been reported.

OK, the backdoor works by targeting a weakness in patching sshd for use with systemd. Slackware dodged the bullet. But that is no reason for complacency or personal attacks. Lennart Poettering is working for Microsoft these days, but has been actively involved in addressing this abuse of the OSS ecosystem. It will take a united coalition to repel this sustained and co-ordinated subversion of our beloved Linux operating systems.
 
1 members found this post helpful.
Old 04-03-2024, 12:28 PM   #67
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,371

Rep: Reputation: 4088Reputation: 4088Reputation: 4088Reputation: 4088Reputation: 4088Reputation: 4088Reputation: 4088Reputation: 4088Reputation: 4088Reputation: 4088Reputation: 4088
I think that people or companies who use free software, xz for example, but also frmpeg, x264, ... to make money, should be much more involved than they are in supporting these projects.
 
Old 04-03-2024, 12:31 PM   #68
rizitis
Member
 
Registered: Mar 2009
Location: Greece,Crete
Distribution: Slackware64-current, Slint
Posts: 644

Rep: Reputation: 490Reputation: 490Reputation: 490Reputation: 490Reputation: 490
Fyi https://github.com/amlweems/xzbot
 
1 members found this post helpful.
Old 04-03-2024, 12:56 PM   #69
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,325

Rep: Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330Reputation: 2330
Quote:
Originally Posted by hazel View Post
Some of the most sophisticated "black hat" groups are in North Korea. It seems weird that such a backward medievalised nation could excel in cracking computer systems but they recruit them young and train them carefully.
I have read nearly all of them work abroad, where they don't show as North Korean. I imagine all have their CS degree from abroad, and perhaps are embassy staff. NK's internet infrastructure is rudimentary and tiny.

This story is interesting and developing, and analysis appears to be a work in progress. What struck me is that even the kernel could be vulnerable. Any chunk of kernel code is thoroughly vetted, I am sure. But these guys have the time and patience to assemble one piecemeal, between various common existing user space binaries and kernel options.

Last edited by business_kid; 04-03-2024 at 01:09 PM.
 
Old 04-03-2024, 01:16 PM   #70
yvesjv
Member
 
Registered: Sep 2015
Location: Australia
Distribution: Slackware, Devuan, Freebsd
Posts: 567

Rep: Reputation: Disabled
There I was making a joke on Lennart... he's chimed in
Read this: https://news.ycombinator.com/item?id=39867126

Last edited by yvesjv; 04-03-2024 at 01:30 PM.
 
1 members found this post helpful.
Old 04-03-2024, 01:21 PM   #71
Pithium
Member
 
Registered: Jul 2014
Location: Far side of the Oregon Trail
Distribution: Slackware64 15.0
Posts: 502

Rep: Reputation: 586Reputation: 586Reputation: 586Reputation: 586Reputation: 586Reputation: 586
I don't have to bring Lennart into this, he brings himself in!
 
3 members found this post helpful.
Old 04-03-2024, 08:55 PM   #72
thirdm
Member
 
Registered: May 2013
Location: Massachusetts
Distribution: Slackware, NetBSD, Debian, 9front
Posts: 317

Rep: Reputation: Disabled
Funny.

But addressing his point that you don't need to link libsystemd to send the messages over the socket or whatever pathway there is for these notifications, seems like Damian Miller and friends are already on top of it: https://bugzilla.mindrot.org/attachm...09&action=edit

(Sorry if this has been posted already. It's a long thread, but feel free to yell at me for bad form laziness on that note.)

Oh, and am I reading it correctly that the need for all those extra libraries comes down to writing 7 characters down a socket?

+void
+ssh_systemd_notify_ready(void)
+{
+ ssh_systemd_notify("READY=1");
+}
+

The rest is all the usual C futzing to get to that right?

Last edited by thirdm; 04-03-2024 at 08:59 PM. Reason: to be more annoying
 
3 members found this post helpful.
Old 04-04-2024, 12:29 PM   #73
yvesjv
Member
 
Registered: Sep 2015
Location: Australia
Distribution: Slackware, Devuan, Freebsd
Posts: 567

Rep: Reputation: Disabled
And the suspicions are spreading...

Some guy 'Neustradamus'
https://github.com/avahi/avahi/issues/388
https://github.com/microsoft/vcpkg/issues/37197
https://github.com/ifupdown-ng/ifupdown-ng/issues/234

I think pandoras box has been opened.
Reminds me of this back in the early 2010s.
https://thehackernews.com/2013/09/us...rvalds-to.html
 
Old 04-04-2024, 06:58 PM   #74
Pithium
Member
 
Registered: Jul 2014
Location: Far side of the Oregon Trail
Distribution: Slackware64 15.0
Posts: 502

Rep: Reputation: 586Reputation: 586Reputation: 586Reputation: 586Reputation: 586Reputation: 586
Nah pandora's box was opened decades ago. But now all of a sudden people who weren't paying attention are realizing what has always been possible. Kind of like those people who waited 50 years to get upset about climate change.
 
Old 04-04-2024, 07:28 PM   #75
rkelsen
Senior Member
 
Registered: Sep 2004
Distribution: slackware
Posts: 4,456
Blog Entries: 7

Rep: Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560Reputation: 2560
Quote:
Originally Posted by Pithium View Post
Nah pandora's box was opened decades ago.
Maybe 14 years ago.

I'll note here that some people can't help but to self-sabotage, as per this article published merely days after details of the xz vulnerability were publicised: https://linuxconfig.org/enable-ssh-r...n-linux-server

It beggars belief!
 
4 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: What The Intelligence Community Doesn't Get: Backdoor For 'The Good Guys' Is Always A Backdoor LXer Syndicated Linux News 0 01-11-2014 06:50 AM
Upstream Shapping qtgeo *BSD 2 11-08-2004 01:53 PM
ADSL upstream problems. marvin_robot Linux - Networking 1 03-08-2004 06:16 AM
SuSE 9.0 Wireless & Ethernet connect but no upstream puyan909 Linux - Wireless Networking 1 02-20-2004 03:23 PM
Upstream/Downstream stats jeucken Linux - Networking 4 01-06-2003 02:28 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 03:51 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration