xz Exploit Is WILD - Must See Bash Part

Поделиться
HTML-код
  • Опубликовано: 10 ноя 2024

Комментарии • 915

  • @JannePaalijarvi
    @JannePaalijarvi 7 месяцев назад +745

    My heart breaks when hearing all this new info about Lasse Collin. His companions betrayed him and now he is there alone, unable to trust anyone, battling mental issues and still trying to clean up one of the biggest security fiascos of the decade :(

    • @lfarrocodev
      @lfarrocodev 7 месяцев назад +152

      I do suspect that some of the pressure that he received was part of a coordinate attack

    • @markhaus
      @markhaus 7 месяцев назад

      @@lfarrocodevvery likely and hopefully this spurs more active efforts in taming the community around maintership. Not just allowing giant companies to freeride on over worked underpaid contributors. Same for people who use these projects on smaller scales but abuse and exploit the work of maintainers. It’s literally a security risk now if there was a coordinated social engineering attack on this poor maintainer of you allow these projects to go on with shoe string support

    • @LookRainy
      @LookRainy 7 месяцев назад

      @@lfarrocodevthat’s very likely. Most of those accounts were just disposable accounts created with the sole purpose of posting the nasty comments to pressure the original maintainer

    • @nefrace
      @nefrace 7 месяцев назад

      ​@@lfarrocodev of course it is. The moment I saw these messages about progress and stuff I thought about coordinated attack

    • @astronemir
      @astronemir 7 месяцев назад

      They probably fucked with him behind the scenes on alt accounts etc. If they go this deep not beyond messing with his socials and so on, to cultivate him as a vulnerable target

  • @arbyyyyh
    @arbyyyyh 7 месяцев назад +552

    Hot take: Everyone has been saying that this is proving the short comings of OSS, I think the opposite. If some idiot got themself a job at MS and did something like this, you would see that PS-Remote or perhaps RDP takes an extra half a second and say "what did MS do now??" and move on with your day. The beauty of OSS, the ability for someone to look at the code did what it needed to do: Someone who had nothing to do with the project was able to look at the code and sound the alarm.

    • @random_bit
      @random_bit 7 месяцев назад +80

      Preach brother, this is a strength, not a weakness

    • @NetscapeSato
      @NetscapeSato 7 месяцев назад +48

      exactly. you cant peek behind the curtain with proprietary OS'es. With linux and OSS, anyone can view or modify code. Thats the whole reason this was even found in the first place.

    • @craigslist6988
      @craigslist6988 7 месяцев назад +38

      💯💯💯💯 people failing to see how good this is.
      How would MS even be able to tell if someone put in a backdoor in anything closed source, it would be impossible to spot ten seconds of performance lag on anything from MS, let alone half a second.. and noticing one more backdoor among the dozens of 'telemetry' backdoors they already put in there? Nah.

    • @evancombs5159
      @evancombs5159 7 месяцев назад +47

      The irony here is that this exploit was discovered by an MS employee.

    • @random_bit
      @random_bit 7 месяцев назад

      @@evancombs5159 sometimes you gotta work for the devil to get the bag

  • @isaacalves6846
    @isaacalves6846 7 месяцев назад +1529

    Gladly TempleOS is doing just fine.

    • @MuhammadYusuf-nz5nj
      @MuhammadYusuf-nz5nj 7 месяцев назад +66

      So you know that from FIRESHIP 🔥

    • @orbatos
      @orbatos 7 месяцев назад +39

      Everybody is fine, only an idiot would be pulling from git to build a library for server deployment and most servers are on 5.4.x.

    • @Rugg-qk4pl
      @Rugg-qk4pl 7 месяцев назад

      @@MuhammadYusuf-nz5nj Or we know it from.. TempleOS

    • @gwentarinokripperinolkjdsf683
      @gwentarinokripperinolkjdsf683 7 месяцев назад

      Unrelated, but temple OS is actually a lot cooler than a people think and it is basically the perfect OS for learning about hardware, as it's complete lack of permissions and it's unique paging setup makes working with hardware very easy, also the fact you have the holyC REPL, you can experiment without friction. Seriously go take a look at zeal OS (a modern port) and start messing around with it

    • @DarkerCry
      @DarkerCry 7 месяцев назад +10

      @@orbatos God bless

  • @JmbFountain
    @JmbFountain 7 месяцев назад +264

    What's the lesson here? Don't get between a DB engineer and performance.

    • @local9
      @local9 7 месяцев назад +12

      Trust me, don't

    • @pedrolopez8057
      @pedrolopez8057 7 месяцев назад +19

      Having been a DB Engineer and having been blamed many times for poor performance when it actually it was some half-bright code monkey we get very thorough and very cranky.

    • @vitalis
      @vitalis 5 месяцев назад +2

      The real lesson, working on open source projects doesn’t pay

    • @lucaxtshotting2378
      @lucaxtshotting2378 5 месяцев назад +2

      @@vitalis the real leson is use winrar

  • @weakspirit_
    @weakspirit_ 7 месяцев назад +295

    the scariest part is the social engineering did on Lasse. this person was manipulated for YEARS and the team (probably) behind it saw the opportunity and exploited it. exploiting Lasse's mental health, trust and desire to pass on the torch. this is actually evil

    • @themodfather9382
      @themodfather9382 7 месяцев назад +2

      You guys are awfully quick to clear this guy's name, it's sad when people get falsely accused, but that's life.

    • @SpiDey1500
      @SpiDey1500 7 месяцев назад

      They may also caused the mental health problems…

    • @privateagent
      @privateagent 7 месяцев назад

      Maybe you guys forgot about the covid psyop. Everyone is prone to be manipulated.

    • @connorskudlarek8598
      @connorskudlarek8598 7 месяцев назад +5

      @@SpiDey1500 my god, didn't even think about it but they could totally have had accounts sending him hate comments over the xz utils not getting enough updates, which caused him to want to find someone else to take it over.

    • @squirlmy
      @squirlmy 7 месяцев назад +12

      ​@@themodfather9382 absolutely no evidence Lasse Collin did anything wrong, while I see Andres Freund being congratulated with quips like "lifetime free drinks", which makes treatment of Collin even more stark contrast. No it's not "life" to throw wild accusations. It's just more prejudice against "mental health issues" being not real, so he must be suspect. Really uncool to suggest this.

  • @aaaaanh
    @aaaaanh 7 месяцев назад +340

    Freund isn’t even a security engineer (disclaimer at the end of the post on openwall). Man is just that big of a gigachad.

    • @Julzaa
      @Julzaa 7 месяцев назад +48

      He is now I guess

    • @homeape.
      @homeape. 7 месяцев назад +26

      That's what freunds are for 🎶

    • @aaaaanh
      @aaaaanh 7 месяцев назад +17

      Freundlich neighboorhood engineer 🫡

    • @1337kaas
      @1337kaas 7 месяцев назад +13

      Database engineers are from a different breed man

    • @Ellefsen97
      @Ellefsen97 7 месяцев назад +14

      «Freund» is also German for «Friend», which is very fitting here

  • @kuertoes
    @kuertoes 7 месяцев назад +80

    This whole situation just feels like a movie. The fact that this is real is insane. And I can't decide what's more impressive - developing this backdoor or finding the backdoor ... this just shows me how little I actually know. I feel vulnerable ... just let me cry...

    • @magicmulder
      @magicmulder 7 месяцев назад +7

      It feels like someone held a genius coder hostage to develop the backdoor and then the criminal half-assed the distribution of the backdoor (using accounts that were just created to push for inclusion, come on! That's like composing Beethoven's Tenth and then playing it on a glass bottle.).

    • @sultanhanga
      @sultanhanga 7 месяцев назад +3

      And they're guessing there is more backdoors

    • @properwaffles
      @properwaffles 2 месяца назад

      Putting aside the likely-nefarious intentions of the chef, I appreciate that there are minds out there that can think like this and produce technical artwork of this caliber with such a niche medium, it’s really impressive.

  • @havokgames8297
    @havokgames8297 7 месяцев назад +101

    You and lowlevellearning have really good energy together. Great video. More collabs please.

  • @EwanMarshall
    @EwanMarshall 7 месяцев назад +66

    The pushing might be because there are 2 other things happening that are each likely to kill the attack chain.
    1. openssh was already working on their own method for calling systemd-notify without linking it (upto now they did not link it due to them being very careful on dependency checking). Debian, Fedora and OpenSuse were patching sshd to do this linking. This is how liblzma got linked to openssh at all, this wouldn't be done anymore.
    2. systemd is looking at better isolating and reducing their dependencies, especially for more critical parts of the system themselves and liblzma is looking to be dropped as a dependency.
    Given these things, this backdoor may have been on a sudden clock where it is get it in next release or it is likely to be several years of setup for nothing.

    • @chilversc
      @chilversc 7 месяцев назад +11

      I was also thinking once in the wild they're on a time limit before someone notices it so as soon as the malicious code was merged they need to infect as many machines as possible before that happens.

    • @EwanMarshall
      @EwanMarshall 7 месяцев назад

      @@chilverscthat is always a risk, there is a chance that the moment this backdoor is actually first used in earnest it would set off some intrustion detection of why are we suddenly getting an ssh connectiong from some foreign country where we don't have any offices or something.

    • @sfulibarri
      @sfulibarri 7 месяцев назад +9

      Yea this makes a lot of sense especially given how ham fisted the push was compared to the slow preparation.

  • @DuRoehre90210
    @DuRoehre90210 7 месяцев назад +40

    28:25 The obvious reason for the rush is probably a branch+ticket+PR in systemd repo to switch the library loading to runtime and be optional, and this looks almost ready. Just imagine, the hard work of many years to be flushed down the sink.

  • @the_real_ch3
    @the_real_ch3 7 месяцев назад +46

    There's an episode of The Sopranos where the FBI spends the entire ep putting a bug into a desk lamp and then planting the lamp in Tony's basement where he talks business with his associates. They only capture a single conversation, of Tony talking to a plumber about his water heater, before the whole scheme is undone by Meadow grabbing the lamp and taking it to her dorm room. Feels like a good metaphor for this guy's exploit getting caught so quickly.

    • @superscatboy
      @superscatboy 5 месяцев назад +1

      Or that time the CIA spent millions putting a microphone and radio transmitter into a cat, deployed the cat, and it immediately ran into a road and got hit by a car.

    • @NSA-admin
      @NSA-admin 2 месяца назад

      ​@@superscatboyhey, it was a decent PoC.
      The good thing about this situation is now people can really see some techniques one might use to obfuscate and maybe people will be able to look out for similar situations. However there's also tons of different commands and techniques to do essentially the same thing, but it's all patterns. Also people might take testing code more seriously.

  • @benjaminhon86
    @benjaminhon86 7 месяцев назад +123

    Saved by some random engineer benchmarking postgres which 99.9% of SE engineers won't even have time to do :D

    • @themodfather9382
      @themodfather9382 7 месяцев назад +5

      ssh is very widely used so yeah people will benchmark commonly used tools, it was a weird mistake

  • @st0ox
    @st0ox 7 месяцев назад +162

    It took me over an hour to realize that this wasn't an April fools.

  • @peachezprogramming
    @peachezprogramming 7 месяцев назад +334

    I don't know how developers are so smart that they can find this shit.
    Blows my mind

    • @zelllers
      @zelllers 7 месяцев назад

      yeah so what hasn't been found yet that's out there right now. Don't trust the computers!

    • @blackjackjester
      @blackjackjester 7 месяцев назад +116

      This is not doing good things for my imposter syndrome

    • @allsunday1485
      @allsunday1485 7 месяцев назад +79

      Wait until you hear about mathematicians

    • @smnomad9276
      @smnomad9276 7 месяцев назад +12

      @@allsunday1485 what the hell does mathematicians have to do with any of this

    • @00jknight
      @00jknight 7 месяцев назад +106

      I imagine the guy discovering this was just saying "Wtf is this" the entire time as he unravelled the shit storm.

  • @awesomedavid2012
    @awesomedavid2012 7 месяцев назад +44

    I think this backdoor ultimately is going to do more good than harm, because now people are on the lookout for backdoors in tests and similar wild exploits.

    • @complexity5545
      @complexity5545 7 месяцев назад +8

      You dang right about that. My last 3 days have been auditing and catching up on dependencies and scraping the git projects' comments. So many eyes are on it now.

  • @Ellefsen97
    @Ellefsen97 7 месяцев назад +25

    My speculation is that the person is not Chinese.
    The information that the name had mixes of Mandarin and Cantonese makes it sound more likely that it’s a non-Chinese person attempting to create a Chinese identity.
    I think it’s a very clever ploy to leave digital breadcrumbs that align with people’s existing beliefs. People want it to be a big grand Chinese cyberattack, so by intentionally choosing a Chinese sounding username people will immediately jump to that conclusion.
    We obviously can’t rule out the potential of it being a state sponsored cyberattack and perhaps even a CCP coordinated attack. But I think it’s important to be aware of our existing confirmation bias

    • @magicmulder
      @magicmulder 7 месяцев назад +7

      I think they picked the name as another test of how easy it would be to sneak in malicious stuff. People in the US would be very suspicious of Chinese contributors, so an actual attempt to be as sneaky as possible would probably use a French or Swedish name. Look at the first vulnerability in 2021, replaced a secure function with an insecure one while having an apparent Chinese name, and it got through. That was part of the test.

    • @Ellefsen97
      @Ellefsen97 7 месяцев назад

      @@magicmulder I like this theory, it makes a lot of sense. It’s like the Nigerian Prince emails where they are sending obvious scams to filter out people that are smart enough to recognize the scam

    • @Ellefsen97
      @Ellefsen97 6 месяцев назад +2

      @@magicmulder Makes a lot of sense. This theory is similar to how email scammers purposefully make the scam more obvious to filter out the people smart enough to avoid getting scammed. So this could be a similar thing where they tested the waters before commiting the time needed to create the backdoor

  • @SoapSoapCrayon
    @SoapSoapCrayon 7 месяцев назад +29

    Having extremely complicated bash scripts that modify files during the build step is kind of wild in 2024. I'm not sure why you'd even set a build system up like this, seems like hell to work with, let alone audit for security.

    • @autohmae
      @autohmae 7 месяцев назад +15

      Let's be very clear: he already was the active maintainer of the project, if he wasn't the code would probably not have been accepted. This was only possible because he played the long game. Assuming it's even a he, not a she or a group, etc.

    • @mk72v2oq
      @mk72v2oq 7 месяцев назад +7

      It's called GNU Autotools and there are still huge amount of projects using it. Migrating to something else like Meson or CMake takes a long time.

    • @grzegorzdomagala9929
      @grzegorzdomagala9929 7 месяцев назад +2

      You can do it in makefiles too. And if the project uses scons (python based build tool) it's even easier.

  • @mhdmuzaffar-vr5mb
    @mhdmuzaffar-vr5mb 7 месяцев назад +340

    Where is the 13% accurate guy who was going to solve Open Source Issues, weren't he supposed to take our jobs??

    • @NeverTrust298
      @NeverTrust298 7 месяцев назад +20

      ​@ChuckNorris-lf6vo yeah I just asked chatgpt about how to fix the current state of the Open Source Community and yeah I totally agree these guys are wasting their time AI

    • @bugzpodder
      @bugzpodder 7 месяцев назад +5

      if you were given 20 issues from 20 different repos and asked to address them in a week, realistically speaking you might get maybe 20%-25% done in that amount of time if you are that good. And that's probably the best you can ever do, but then imagine the 13% accurate guy can one day do 50% or more with an upgraded model

    • @edgars9581
      @edgars9581 7 месяцев назад +5

      ​@@bugzpodderBut then you waste 87% of the maintainer's time. Because they can only tell if a contribution is bad when someone looks into it deeply.
      It isn't better for open source if (even *if* the model is 50% accurate) half of the PRs maintainers need to go through are plausible looking but actually don't work

    • @blarghblargh
      @blarghblargh 7 месяцев назад

      @ChuckNorris-lf6vo they're being sarcastic. Both NeverTrust298 and mhdmuzaffar-vr5mb. I don't think that counts as trolling.
      Unless you were replying originally to mhdmuz* in earnest, in which case NeverTrust may be trolling you in specific.

    • @blarghblargh
      @blarghblargh 7 месяцев назад

      @@edgars9581 sure. but the submitter doesn't have to be a bot that submits everything the AI cooks up. it could be a dev who is just using it as a tool to surface potential bugs, then only submits the legit ones. they could also use the AI to help them come up with legit repro cases, and possibly a new test case.
      it isn't really much different than fuzz testing in that way. or plain old static analysis/compiler warnings.

  • @mike200017
    @mike200017 7 месяцев назад +101

    For me, the big problem that this has exposed is the vulnerability inherent to the OSS / Linux / GNU building and packaging systems. It's an arcane mess of Makefiles, Bash scripts, ad hoc patches, and tar-ballz inside tar-ballz. It's long overdue for some security to be built into all that, like properly sandboxing builds versus tests, and having verifiable steps. In this particular exploit, it looks like a crazy mess of bash magic, but ultimately it's scary because of how easy it was.

    • @nb6175
      @nb6175 7 месяцев назад +34

      it exposes a psychological weakness in test code really. It's mind tormentingly bureaucratic and boring and our mind just defaults to "looks good to me" ... "ah yes, random shit... that looks like good random shit to me" and "tests PASSED".

    • @avarise5607
      @avarise5607 7 месяцев назад +8

      GNU package installer when? Gotta admit, build and package process is whack, each dev does their own random shit

    • @simonschneider5913
      @simonschneider5913 7 месяцев назад +4

      @@onewildviktor i, too, think that OSS is simply the least bad option out there, and thats demonstrated perfectly with this story now.

    • @simonschneider5913
      @simonschneider5913 7 месяцев назад +1

      whats the alternative?

    • @spicybaguette7706
      @spicybaguette7706 7 месяцев назад +7

      @@jamesnewman9547 Pressuring open source maintainers, seems like a great idea. Fundamentally, the software is provided _as is_ (as is stated in the MIT and GPL licenses). Solving this problem starts with finding a solution to better compensate OSS developers for their work and getting more eyeballs on barely maintained software

  • @robertjif6337
    @robertjif6337 7 месяцев назад +76

    I got hit with skill issue every line of the article

    • @kzalesak4
      @kzalesak4 7 месяцев назад +1

      Really? Where?

  • @fernandobalieiro
    @fernandobalieiro 7 месяцев назад +219

    Imagine all the potencial back doors we still dont know about

    • @ThePlayerOfGames
      @ThePlayerOfGames 7 месяцев назад +51

      The way that open source projects are worked on; at least you can find them in open source code. This compromise began when the attacker did a Social Engineering attack to get onto the project and add these commits
      In closed source code you'll never know you were compromised

    •  7 месяцев назад

      Imagine! I remember that years ago the curl author shared a tweet about some guy saying something like "Thanks to curl (codebase) I can enjoy all my CVEs bounties"...

    • @youtubelisk
      @youtubelisk 7 месяцев назад

      No. It seems pointless.

    • @demolazer
      @demolazer 7 месяцев назад +8

      No way this is the first time. It's too sophisticated and well thought out to be an opportunistic attempt.

    • @simonschneider5913
      @simonschneider5913 7 месяцев назад +13

      @@ThePlayerOfGames exactly. i think this being found and explained the way it is now is actually great for open source, isnt it?

  • @notapplicable7292
    @notapplicable7292 7 месяцев назад +32

    Almost definitely a nation state. Lots of carefully crafted obfuscation & social engineering. I think over all this is a very strong argument for reducing our reliance on shit build systems

    • @evancombs5159
      @evancombs5159 7 месяцев назад +6

      I think it is unlikely to be an individual, but it could be any large nefarious organization not just a nation state.

    • @magicmulder
      @magicmulder 7 месяцев назад +3

      @@evancombs5159 To me it almost feels like an org that had one genius coder and then total doofuses trying to actually get the code published.

    • @complexity5545
      @complexity5545 7 месяцев назад +3

      We're not going to narrow it down until we do heuristics on the accounts. Right now the bad guys are scrubbing and even scrubbing sticks out like a sore thumb. If it is a state or gov't sponsored effort, then a deal will be made behind closed doors.

  • @blackjackjester
    @blackjackjester 7 месяцев назад +137

    I'm an industry veteran of 15 years.
    I understand some of these words.

    • @chupasaurus
      @chupasaurus 7 месяцев назад +11

      Things that run COBOL don't have native xz libraries. /s

    • @JeremyAndersonBoise
      @JeremyAndersonBoise 7 месяцев назад +2

      @@chupasaurusCOBOL, lol wut? 15 years was not as long ago as you surmise. Learn to history. Probably the guy was writing JQuery 15 years ago.

    • @chupasaurus
      @chupasaurus 7 месяцев назад +14

      @@JeremyAndersonBoise /s stands for SARCASM.

    • @o1-preview
      @o1-preview 2 месяца назад

      skill issue

  • @thegrumpydeveloper
    @thegrumpydeveloper 7 месяцев назад +23

    “Reproduce the binary via the source code.” Npm just a giant binary basically at this point. Needs to be compiled by an independent source.

  • @maxparker4808
    @maxparker4808 7 месяцев назад +8

    Compression algorithms do a lot of data deduplication so a real test file will have duplicated data to prove that the algorithm actually works.
    Files with high entropy don’t benefit much from compression.
    Just noting this as it would be expected for test files on a compression library to have that kind of repeated/duplicated data.
    If I were an attacker I might theorise that adding data to a test file would be less conspicuous if the added data compressed effectively 🧐

  • @canberkbaci
    @canberkbaci 7 месяцев назад +46

    Attackers didnt have much time left, as xz dependency was about to be removed/lazy loaded from libsystemd, breaking the backdoor.
    Might be the reason why they pushed for it.

  • @yeahaddigirl
    @yeahaddigirl 7 месяцев назад +53

    *laptop bag with stickers all over it lid opens*
    How do you do fellow open source maintainers?

  • @fpsmeter
    @fpsmeter 7 месяцев назад +6

    All major security agencies should be after the perpetrator(s). The caliber is HUGE. If those guys aren't caught and the whole thing is silenced then it must have been state sponsored.

  • @pianochess1882
    @pianochess1882 7 месяцев назад +18

    19:26 "fork yourself" lol. new insult dropped

    • @magicmulder
      @magicmulder 7 месяцев назад +1

      I've been saying "fork" and "shirt" ever since watching The Good Place.

    • @wietvergiet
      @wietvergiet 7 месяцев назад +1

      Not really a new thing. I saw someone walking around in a "Go fork yourself" tshirt before.

  • @StrengthOfADragon13
    @StrengthOfADragon13 7 месяцев назад +8

    Suspending the original maintainer with appropriate explanation could be net positive regardless of if he was intentionally involved. Sometimes a forced break from things is good (also might keep him from getting hate mail while things are hot)

  • @Volvith
    @Volvith 7 месяцев назад +8

    This opens up a whole new world of attack vectors.
    Even just the proliferation of this one aside, we have no way of knowing just how broad the compromise is.
    Scary shit.

    • @danielschmider5069
      @danielschmider5069 7 месяцев назад +1

      not really, first of all stop building half the operating system off of tarballs which arent peer-reviewed, OR actually inspect and scrutinize what's in them, especially some big "testfile_good-trust-me" binary which is loaded during the build process, for absolutely no reason at all.

  • @jesusmgw
    @jesusmgw 7 месяцев назад +33

    "I'm receiving 16$ a week from my patrons, my goal is 20$ a week". Open source culture right there.

    • @alexnoman1498
      @alexnoman1498 7 месяцев назад +2

      It's someone's personal blog, no? Making $2k+ a year from a blog sounds very reasonable.

    • @complexity5545
      @complexity5545 7 месяцев назад

      @@alexnoman1498Especially if you're in a non-western country.

    • @o1-preview
      @o1-preview 2 месяца назад

      @@complexity5545 if you live off that money in any developed country, you will starve.

  • @theApeShow
    @theApeShow 7 месяцев назад +63

    Exploit discovered because some guy on the internet didn't like the noise his fans were making.
    Head cannon.

  • @andreasgkizis2135
    @andreasgkizis2135 7 месяцев назад +4

    after watching for 56 minutes i was already at " i am too stupid for this " however hearing the priameagean say it made me LoL

  • @snowSecurityneeded
    @snowSecurityneeded 7 месяцев назад +39

    Flip is my favorite editor.

    • @xthebumpx
      @xthebumpx 7 месяцев назад +10

      Neovim is my favorite editor.
      But Flip is cool too.

    • @rogergalindo7318
      @rogergalindo7318 7 месяцев назад +1

      prime and flip W right there

    • @inertia_dagger
      @inertia_dagger 7 месяцев назад +1

      this is my favorite comment

  • @beerat36
    @beerat36 7 месяцев назад +3

    41:03 One note on chinese name things: many groups do speak multiple dialects of chinese, particularly in areas like Malaysia or Singapore (where the Tan last name would be used in Hokkien communities) or other areas with large dispersed chinese populations. My fiancée’s family, for example, primarily speak Mandarin and pronounce their chinese names in Mandarin, but use the Hokkien anglicization of their surname. So, while it’s a good to look at, it’s not necessarily indicative that the Jia Cheong Tan name is fake.

  • @WaseemAshraf
    @WaseemAshraf 7 месяцев назад +3

    Being this backdoor so much complex, I highly doubt it is being implemented for the first time. From start to end, everything seems well crafted and maybe improved on the possible previous iterations.

    • @schwingedeshaehers
      @schwingedeshaehers 7 месяцев назад

      but it is to specific to xz that it is to easy i think

  • @nuclearmedicineman6270
    @nuclearmedicineman6270 7 месяцев назад +10

    The sudden rush to get it done after taking 3 years to set it up sounds a lot like management interference, like there's a boss demanding results.

    • @NoidoDev
      @NoidoDev 7 месяцев назад +6

      Some other comment pointed out that some lazyloading dependency of XZ in systemd would soon have been removed, and this is most likely what they were interested in.

    • @magicmulder
      @magicmulder 7 месяцев назад

      It sounds like the coder selling his backdoor and the buyer being incompetent in getting it out.

    • @complexity5545
      @complexity5545 7 месяцев назад

      @@NoidoDevI read that too from some BSD guys. This is so big that even the BSD security nut guys are on it (and the gov't).

  • @gima123123
    @gima123123 7 месяцев назад +2

    Honestly, seeing how much effort was put into this makes me think the guy who did is simply a madman. Like lots of steps could be skipped with same effect. But guy wanted to prove a point and flex his genius on everyone

    • @magicmulder
      @magicmulder 7 месяцев назад +2

      Also zero preparation for the actual push to get it included in distributions. 3 years of backdoor preparation and then they use two freshly created accounts to push distributors? Sounds incongruous to me.

  • @user-qr4jf4tv2x
    @user-qr4jf4tv2x 7 месяцев назад +7

    Exploiter: i would have gotten away with it if it weren't for those meddling Microsoft guys

    • @ark_knight
      @ark_knight 7 месяцев назад +1

      *Exploiter - I would have gotten away with it if it weren't for those meddling friend guy

  • @asjsjsienxjsks673
    @asjsjsienxjsks673 7 месяцев назад +83

    It’s because it’s open source that we’ve discovered this. Had it been hidden, we would’ve never known about it

    • @pluto8404
      @pluto8404 7 месяцев назад

      exactly, theres gaurenteed to be russian and chinese spies in every major US tech company. No doubt about that. Who knows what sort of damage they are doing. Netflix probably has a spy as well, probably a streamer too, as a disguise.

    • @alpacamax3404
      @alpacamax3404 7 месяцев назад +9

      Had it been hidden the backdoor probably wouldn't be introduced in the first place lol. This xz situation definitely complicates stuff.

    • @gileee
      @gileee 7 месяцев назад +26

      ​@@alpacamax3404 Not true. If he had a job for some Microsoft team he could have slipped the same code through.

    • @lucasjames8281
      @lucasjames8281 7 месяцев назад +20

      @@gileeeDave Plumber had made at least 1 video about this, there are significant QC checks in place at Microsoft. You’d need multiple people on the inside, which is possible. But much much much easier in open source

    • @mortvald
      @mortvald 7 месяцев назад

      @@lucasjames8281 the thing is microsoft can spare like what a couple thousand engineers? open source you have a much bigger population, it doesn't matter what the backdoor is, it'll get found out. good luck finding this kind of issues with just a few hundred to thousands. Then there is the elephant in the room, what of microsoft approved backdoors? they're not your friends either

  • @lobaxx
    @lobaxx 7 месяцев назад +7

    Just an FYI: Lasse is pronounced ”Las-eh”, not ”Las”

  • @AngeredZeus336
    @AngeredZeus336 7 месяцев назад +2

    If this happened inside of a large proprietary C/C++ code base, for example a foreign independent contractor with a fake identity at Microsoft or Riot Games was compromised and committed a malicious tar ball, most of the country would be compromised and almost no one would have the ability to find the issue. I don't think businesses are immune from attacks as sophisticated as this. At least with open source we have a chance to find the backdoors.

  • @scooter4196
    @scooter4196 7 месяцев назад +34

    Where was Devin when we needed him?!!!?

    • @michaelb4727
      @michaelb4727 7 месяцев назад +5

      How can you be sure it's not Devin?

    • @julians.2597
      @julians.2597 7 месяцев назад

      ​@@michaelb4727 the backdoor works

    • @mllenessmarie
      @mllenessmarie 7 месяцев назад

      ?

    • @bionic_batman
      @bionic_batman 7 месяцев назад

      too busy inserting print statements into some random python scripts

  • @mariobrito427
    @mariobrito427 7 месяцев назад +1

    Great analysis, thanks for going through it!
    This is truly scary stuff! it really makes you think how much stuff is out there actually compromising open source software that we're not aware of... 😢
    Consider the following: this was only caught because of increased delay introduced by the exploit code. Now, what would have happened if whatever actors who cooked up this mess added a simple delayed activation logic? The exploit would be everywhere and likely no one would have been the wiser
    Scary scary shit

  • @nb6175
    @nb6175 7 месяцев назад +19

    This is so obscure I'm getting paranoid about the guy who even found the bug in the first place... my brain is like, "oh HOW CONVENIENT, you just simply stumbled on that!?" but then just has nothing to put after that. ... like maybe this was a compromised APT that was already under observation and "discovering" the backdoor was just a parallel construction--a way to expose it without exposing that they have a peep-hole into the APT's activities.

    • @IronicHavoc
      @IronicHavoc 7 месяцев назад +3

      Dude chill

    • @nb6175
      @nb6175 7 месяцев назад +7

      ​@@IronicHavocIt's OK bro. I've learned to type real quietly so they can't hear my keystrokes through the matrix. It's everyone else I'm worried about. TRUST NO ONE.

    • @lowhat
      @lowhat 7 месяцев назад

      Exactly. If the NSA discovered it, they would find a misdirected way to disclose it.

    • @craigslist6988
      @craigslist6988 7 месяцев назад

      if the NSA wanted to expose it they wouldn't need to find some guy to claim he found it..
      they could do the most Chad git move ever and make a new anonymous account and submit a PR on the repo titled "Fix backdoor introduced by.."
      That'd be the most epic commit ever..

    • @xB-yg2iw
      @xB-yg2iw 7 месяцев назад

      Meds now

  • @peteredmonds1712
    @peteredmonds1712 7 месяцев назад +22

    Seeing a lot of commentary on this issue pointing out how catastrophic this *could* have ended if it weren't for Andres' diligence. While that is of course true, the takeaway from this cannot be the story of how one very knowledgeable and detail oriented man saved the world. The discovery of a sophisticated, catastrophic RCE like this *necessarily* requires unlikely circumstances. If the attack was not discovered through these unlikely circumstances, we would never know how sophisticated and catastrophic the attack is. Conversely, if the attack was not sophisticated, it would not require unlikely circumstances to discover. Therefore, it is expected that catastrophic and sophisticated attacks will be discovered through unlikely circumstances. This is something like the anthropic principle for cybersecurity. The real takeaway here is that the more effective and catastrophic an attack is, the more unlikely you are to discover it.

  • @xiangfred214
    @xiangfred214 7 месяцев назад +102

    Potential State Actor behind this attack

    • @orbatos
      @orbatos 7 месяцев назад +24

      Clearly, it's flat out espionage

    • @roymarshall_
      @roymarshall_ 7 месяцев назад +6

      PSA about a PSA

    • @kiwikemist
      @kiwikemist 7 месяцев назад +7

      LMAO is it Russia Gate 2.0 for you libs

    • @orbatos
      @orbatos 7 месяцев назад +24

      @@kiwikemist Apparently you don't know what Russia did then or what "lib" even refers to. But no, this is espionage by an organized group and it is targeted. we don't know yet who made it, but the list isn't that long. Learn what words mean and try again.

    • @kiwikemist
      @kiwikemist 7 месяцев назад

      @@orbatos lmao this is funny like the new Havana syndrome hysteria.

  • @RobRoss
    @RobRoss 7 месяцев назад +3

    I think it was Richard Stallman who warned us about this kind of thing the 1960s!. It’s one of the things that is supposed to make Open Source software more secure than proprietary software. But the price is eternal vigilance.

    • @maksymiliank5135
      @maksymiliank5135 7 месяцев назад +2

      On the other hand, If something like that happened in a proprietary codebase, nobody would even notice because they wouldn't have access to the source code

    • @complexity5545
      @complexity5545 7 месяцев назад

      And stop using blobs. I hope it makes true open source instead of binaries sometimes (for drivers (cough cough Nvidia and broadcom)).

  • @matthewrease2376
    @matthewrease2376 7 месяцев назад +8

    Some binary can't be reproduced with code, like image files for example. Those were never compiled, they were just created. But even an image could have code in it.

    • @magicmulder
      @magicmulder 7 месяцев назад

      Wasn't there a recent attack on the boot process using a replaced boot loader graphic?

  • @alexfedorov1160
    @alexfedorov1160 7 месяцев назад +2

    I believe GH repo was blocked so that automatic build systems don't pull tars from there. Despite that Lasse Collin stated that GH repo is unaffected, who knows?

  • @fulconandroadcone9488
    @fulconandroadcone9488 7 месяцев назад +6

    low level learning is lock picking lawyer of software, they would a neat team

  • @canadiannomad4088
    @canadiannomad4088 7 месяцев назад +2

    Would isolating the build and test environments (ie via containers) limit this class of attack? Might take longer to build, but if the test suites can't touch the binary that is going out, then the injection should be impossible, no?

  • @arcuscerebellumus8797
    @arcuscerebellumus8797 7 месяцев назад +3

    I get the "no comments in my code" policy, but whenever I see expressions like this -> (49:10) -> it kinda starts falling apart for me... I think in such a case it really starts being nearly crucial to comment. Not even necessarily "what" you're doing, but more importantly "WHY"!

  • @Nullzero98
    @Nullzero98 7 месяцев назад +23

    0:44 welcome to Costco I love you

  • @Papageno123
    @Papageno123 7 месяцев назад +7

    12:40 this case may or may not be state affiliated. but it's extremely obvious there are state actors who are intended to deploy subtle bugs into widely used software.

  • @c0ldfury
    @c0ldfury 7 месяцев назад +8

    The guy that discovered the backdoor and "got suspicious" needs approx. $100 million deposited in his account and be bought a beer.

  • @koltonkulis4763
    @koltonkulis4763 7 месяцев назад +1

    Because of the number of heads in this command, I've been calling this The Hydra.

  • @RYOkEkEN
    @RYOkEkEN 7 месяцев назад +4

    amazon,twitch,google ,youtube gotta retro actively pay open source creators going back to at least 95

  • @Nil-js4bf
    @Nil-js4bf 7 месяцев назад +1

    The ingenuity of humans is amazing and sometimes scary. We did manage to harness the power of the atom in nuclear bombs decades ago after all.

  • @bokunochannel84207
    @bokunochannel84207 7 месяцев назад +27

    imagine someone inject a crypto mining code into you CI pipeline.

    • @Max24871
      @Max24871 7 месяцев назад +1

      This seems so obvious once you hear it, I'm surprised it hasn't happened yet/wasn't reported widely.

  • @ShankingDisaster
    @ShankingDisaster 7 месяцев назад +1

    LLL got me hip to the importance of C, i friggin love the latest Prime collabs!!!!!!!!!

  • @jameshinds2510
    @jameshinds2510 7 месяцев назад +3

    Question: would the backdoor still be relevant if SSH is disabled? Most linux Desktop users do not have SSH enabled, so this would mean the target was entirely servers.

    • @xB-yg2iw
      @xB-yg2iw 7 месяцев назад +1

      Yeah it was backdooring the OpenSSH server process, if you aren't running that you are good

  • @scottsch6505
    @scottsch6505 7 месяцев назад +1

    Amazing how the person who miraculously discovered this, also works for the largest beneficiary of its discovery. Embrace, extend, extinguish...

  • @Maxible
    @Maxible 7 месяцев назад +4

    Read KenThompson's "Reflection on Trusting Trust" next 😁

  • @MikkoRantalainen
    @MikkoRantalainen 7 месяцев назад +2

    48:59 In the team where I work, when you do code review and accept the code, you'll be the one fixing the bugs when the original author is on the holiday. That results in automatic "nope" whenever some piece of code cannot be understood.
    A code like the crap in this m4-file is clearly either an exploit or totally unmaintainable. Either way, it doesn't get to live in the official master branch.
    I'm not sure if I'm just old enough but the bash scripts seemed easy to understand compared to the m4-stuff.

    • @guillaumebrunerie
      @guillaumebrunerie 7 месяцев назад +6

      The thing is precisely that it did not live in the master branch, it was *only* present (added by hand) in the source tarballs. And I guess nobody bothered to check if the source tarballs actually matched the source code from the repository.

    • @MikkoRantalainen
      @MikkoRantalainen 7 месяцев назад

      @@guillaumebrunerie Same happens with npm way too often. The code you get from npm doesn't match the code published in GitHub for many projects!

  • @jeffwells641
    @jeffwells641 7 месяцев назад +5

    "The Three Body Problem" is the best sci-fi book I've read in years, hands down. Also, I refused to get the sequels because the first book freaked me out so much, and I know things don't actually get serious until books 2 and 3.

    • @magicmulder
      @magicmulder 7 месяцев назад +1

      Read them, it's worth it.

  • @TreeLuvBurdpu
    @TreeLuvBurdpu 7 месяцев назад +2

    I don't think The Primagean is right about compression code being inscrutable. I think it's investigatable in it's raw form, and LLL is right that that's how it should be committed, or at least SHA256 hash addressable back to compilable code.

  • @hemmper
    @hemmper 7 месяцев назад +3

    Shouldnt `binary_blob | manipulation | eval` be a red flag that could maybe be scanned for somewhat automagically? Not sure if I understand everything here though.

  • @arnabbiswasalsodeep
    @arnabbiswasalsodeep 7 месяцев назад

    Simple proposition: Make things be more human friendly for some crucial items. For eg, at vulnerable/failure points have understandable code, which I prioritised as chip verification engineer. Everything we do has to send data as binary & get it as binary, so its good practice to have understandable code for someone else

  • @victordvickie
    @victordvickie 7 месяцев назад +31

    man jblow really predicted these

    • @smnomad9276
      @smnomad9276 7 месяцев назад +7

      what did he say?

    • @victordvickie
      @victordvickie 7 месяцев назад

      @@smnomad9276 ruclips.net/video/WGekWFxeD6c/видео.htmlsi=zBJA4Sc6Dyk_mwyO

    • @zanilen98
      @zanilen98 7 месяцев назад

      ​@@smnomad9276ruclips.net/video/ypZ9JvUqaao/видео.htmlsi=jpgqQSxR1oHxHhAd

    • @lucasjames8281
      @lucasjames8281 7 месяцев назад +12

      He described exactly this sort of thing happening. That there’s thousand of nation state threat actors who’s role is to do stuff just like this

    • @autohmae
      @autohmae 7 месяцев назад +5

      I watched his video, some of his assessments in his video are definitely wrong, but I think it all comes down to: you are accepting code from random person on the Internet.
      That code possibly needs more attention than some of that in your own company.
      But notice how with the XZ hack they played the long game, to become the new main contributor. NSA does the same when they infiltrate a company. The difference is basically 0.

  • @scbtripwire
    @scbtripwire 2 месяца назад

    As an appreciator of origins of words, I love that you just randomly mentioned the origin of the word handsome. 😊

  • @Software_Artificer
    @Software_Artificer 7 месяцев назад +3

    This hack makes my production code look poor with all of its robustness and future proofing 🤣

  • @aes0p895
    @aes0p895 7 месяцев назад +1

    This is why I leave my repos on private most of the time. I've never been totally sold on open source; I have been on the bad end of unreasonable expectations too many times.

  • @stxnw
    @stxnw 7 месяцев назад +20

    “gaslit by the whole community”
    it’s literally just one guy bro..

    • @mis4vr877
      @mis4vr877 7 месяцев назад

      Open source community in general with all open source projects

    • @IronicHavoc
      @IronicHavoc 7 месяцев назад

      IIRC there were like coordinated sock puppets trying to get PRs pushed through.

    • @IronicHavoc
      @IronicHavoc 7 месяцев назад +2

      Yeah they were referring to the other accounts that are now suspected of being sock puppets

    • @stxnw
      @stxnw 7 месяцев назад

      @@IronicHavoc even if they were individuals themselves, it would still be like 3 at most lol, nothing to cry over. ive seen women get more hate under instagram comments.

  • @allenng2348
    @allenng2348 3 месяца назад +1

    @ThePrimeTimeagen @LowLevelLearning Do either of you (or anyone here) know what tool they used to generate those entropy maps?

  • @bertram-raven
    @bertram-raven 7 месяцев назад +4

    Whilst not specifically this exploit, this is why I have been so anti binary repositories for years. That does not mean always building from source is safe; clearly this could have been put into source and still have been missed. However, the main takeaway is not the details of the exploit itself but how once again "social engineering / psychological" attacks against one or a limited number of dedicated individuals enables bad-actors to fly under the radar. Small cogs in a big machine are important. We need to support them!

    • @autohmae
      @autohmae 7 месяцев назад +3

      Agree that any binaries should not be included true and if they do, they should not try to take data from it. It should just be: test is OK if it can be decoded. Test fails if it can't be decoded.
      But let's be very clear, they played the long game and were the active maintainer. So they set the policy of the project.
      Sadly, this should mean changes to the processes of the Linux distributions. They should look at the parent project and point out problems that don't match the policy of the Linux distribution which is to not take in stuff which can't easily be audited/simple aka fit for purpose.

    • @bertram-raven
      @bertram-raven 7 месяцев назад

      @@autohmae Although I am sure there will be legitimate exceptions, I agree.

  • @paxdriver
    @paxdriver 7 месяцев назад

    I'm so glad you two tag teamed this bad boy. What a delicious bro AF gigchad exploit lol I absolutely love this, it's a work of art.

  • @Papageno123
    @Papageno123 7 месяцев назад +19

    8:45 He said he noticed it because of high CPU usage, not because the slowdown

  • @ES-cf4ph
    @ES-cf4ph 7 месяцев назад +2

    I think the key takeaway of this situation should not be "Oh don't commit binary data to a repository" but rather "how do you enforce integrity of the released build to the actual source code + don't do magic in build systems". 1. For the integrity part, this exploit only worked this way by modifying the build file where the archive got depbfuscated, so if the release tarballs would have been exactly the same as the repos, the payload for the exploit would have only been gibberish to begin with. 2. I think they would also get away with it if the build script would have been committed to the source code. Yes, it would be more obvious, but realistically, nobody would have audited a complicated build like this where sed, tr and other magic commands are normal.

    • @TurtleKwitty
      @TurtleKwitty 7 месяцев назад

      They really shouldnt be normal parts of a build though. There's essentially 0 reason to have those as part of a normal build. The only time I can think of is "here is a plaintext/image file that is perfectly legible, this command will compress and corrupt the file" for the bad case instead of submitting a binary blob

    • @ES-cf4ph
      @ES-cf4ph 7 месяцев назад

      @@TurtleKwitty You are right, modifying a good file would be the best if possible. But still only solves one of the holes, because the release tarball still contained changes to the original source and could have made any change to any file, from build scripts to source itself

    • @TurtleKwitty
      @TurtleKwitty 7 месяцев назад

      @@ES-cf4ph I'm on nix; everything gets built from source release tarballs don't make sense anyways honestly

  • @khalilzakariazemmoura8995
    @khalilzakariazemmoura8995 7 месяцев назад +11

    I don't think this is related to Open source specifically. This could happen even in commercial software. Nothing in the source, everything is split between the tests and the build system!

    • @autohmae
      @autohmae 7 месяцев назад +3

      Agreed, I do think maybe the git repo with the normal code should be separate from the repo with the test-code.
      And both should not be run in the same environment. Only the result of the build (without test-cases) should be packaged.

    • @khalilzakariazemmoura8995
      @khalilzakariazemmoura8995 7 месяцев назад +2

      ​@@autohmae Totally agree since the source code is not compromised

    • @autohmae
      @autohmae 7 месяцев назад

      @@khalilzakariazemmoura8995 the scary part is, is the real issue: the active maintainer was the compromise. I really hope Linux distributions and package maintainers take a couple of lessons out of this. They are the most important barrier after code review by the people directly involved in the project itself.

  • @digicyc
    @digicyc 7 месяцев назад

    This has been happening for some time. There was a case where a group at a university tried to sneak in a backdoor into the Linux Kernel and got dang close before someone found it and Linus then went back and pulled ALL code that came from that University and banned them from any and all commits going forward. It was much more complex than this condition, but interesting it wasn't as popular because it wasn't on the twitters.

  • @The1RandomFool
    @The1RandomFool 7 месяцев назад +4

    There must be more compromised packages.

  • @samiralibabic
    @samiralibabic 7 месяцев назад

    The best demonstration of human intelligence and creativity I've ever seen.

  • @Exilum
    @Exilum 7 месяцев назад +5

    Others might get scared by this. I, on the other hand, am getting reassured a bit. There's bound to be backdoors, the fact people are finding some, means there's one less backdoor to worry about.

    • @bertram-raven
      @bertram-raven 7 месяцев назад

      From WarGames:
      D1: "You're telling him about our backdoors!"
      D2: "Backdoors are not secrets!"
      D1: "Yeah! But you're giving away all our best stuff!"

    • @Ellefsen97
      @Ellefsen97 7 месяцев назад

      The main scary part for me is that it was barely found and that it was found accidentally. I’m very glad that it did get found, since this will likely lead to developers scanning through tons of OSS libs

  • @jimhrelb2135
    @jimhrelb2135 7 месяцев назад

    1:02:35 these guys vibe so hard LLL can keep up the tempo by telling a story out of no where. Keep up the good work :D

  • @canardcoincoin1582
    @canardcoincoin1582 7 месяцев назад +8

    It is really MOSSAD-ish.

  • @ViolentOrchid
    @ViolentOrchid 7 месяцев назад

    I would guess the 5 checks for Linux has something to do with finding where you are in the memory. You land somewhere in the checks, go until you find the last open/close square brackets, and then you know where you are. You could probably find the checks for Linux being passed to the OS for evaluation.

  • @darkquaesar2460
    @darkquaesar2460 7 месяцев назад +4

    it's the NSA

    • @autohmae
      @autohmae 7 месяцев назад +1

      I don't know the country, but state-actor is an option.

    • @darkquaesar2460
      @darkquaesar2460 7 месяцев назад

      @@autohmae It's literally the NSA, it's not even the first time they infiltrated Linux to push intentional backdoors to the Linux OS.

  • @martijn3151
    @martijn3151 7 месяцев назад +1

    So this one got caught, but do we really expect this to be the only one? Just imagine how many of these clever backdoors slipped through the cracks because there wasn’t a clever Andres paying attention…

  • @Firstname_
    @Firstname_ 7 месяцев назад +9

    Tan Jia Cheong is a pretty legit name in Singapore

    • @stxnw
      @stxnw 7 месяцев назад +2

      The way he types in his PR is also oddly Singaporean..

  • @j2devstudio
    @j2devstudio 7 месяцев назад

    This is Dennis Nedry level !
    “The only way to find him now is to go through each line of code one by one. About 2 billion.”

  • @uuu12343
    @uuu12343 7 месяцев назад +6

    I love LLL, but ngl, everytime LLL goes online, I get the biggest imposter syndrome anxiety I ever had after my previous biggest
    Like i'm also doing cybersecurity and software development, so it doesnt help

    • @uuu12343
      @uuu12343 7 месяцев назад +2

      Also, the NSA be punching the sky right now

  • @MikeBurton89
    @MikeBurton89 7 месяцев назад +1

    Tom would have caught it without the need to experience a random slowdown.

  • @OdyseeEnjoyer
    @OdyseeEnjoyer 7 месяцев назад +18

    xz -V returns 5.4.1.
    I love Debian Stable

    • @abbe9641
      @abbe9641 7 месяцев назад +11

      Do not ask a potentially malicious software what version it is, use your package manager to do so, use common sense on the internet.

    • @ark_knight
      @ark_knight 7 месяцев назад +6

      `sudo apt list --installed | grep xz`
      That's what the above guy meant to say. Run this instead of asking the malicious program its version. Because that means you are executing the program, potentially running it.

    • @OdyseeEnjoyer
      @OdyseeEnjoyer 7 месяцев назад +1

      @@abbe9641 I do only that command because I know 5.6.1 is only available on testing and sid and I was just curious to know how old my version was. Stable doesn't get updates that fast

  • @mistere8055
    @mistere8055 7 месяцев назад +1

    The repetition in the bash script (as well as the binary comment) sounds like an attempt to ensure certain attributes in the compressed data. Padding length and possibly targeting a certain CRC, or maybe to set conditions for the tr replacement to work properly.

  • @JordanShurmer
    @JordanShurmer 7 месяцев назад +3

    plot twist - the person who found the backdoor is the person who implemented it. He's just after a bonus

  • @johanngambolputty5351
    @johanngambolputty5351 7 месяцев назад +1

    There was something about moving to zstd from xz in this video, but looking at what the xz package is required by on my system, zstd is one of them (along with rustup and the base package)... Kinda goes back to being able to scarily run arbitrary code at build time in stuff like build(dot)rs (which I remember Jon Gjengset talking about), I guess being more readable/auditable than some of the arcane build systems is one step, but yeah, some sandboxing, like even having all the features (like network or filesystem access), but having to turn them on one by one as needed, and having to justify turning them on to maintainers... because otherwise it all comes back to trusting upstream. I mean given that they set the scene for themselves, by patching the fuzzing library and what not, could still potentially be bypassed, but the more steps a bad actor would have to go through (so long as it doesn't add much more steps to normal users), the less likely.

  • @eightdeekay
    @eightdeekay 7 месяцев назад +4

    I think it _looks_ complex from the outside - but if you were _creating_ this kind of hack, it's not too hard, I think. You're _setting_ the rules, not trying to figure them out.

    • @Luka-fu2bd
      @Luka-fu2bd 7 месяцев назад

      agreed, it's really not that complex, which leads me to believe it wasn't even state sponsored
      if it was state sponsored it would probably be the tiniest security bugs that allow for a full exploit chain, not an obvious backdoor

  • @Omnifarious0
    @Omnifarious0 7 месяцев назад +1

    For testing of things like decompression, it's hard to get away from binary blobs. I think the remedy is to treat binary blobs with a lot of suspicion and look carefully at exactly how they're used.
    For fuzz testing input... Just use a deterministic random number generator and provide the seeds that have caused problems in the past.

    • @magicmulder
      @magicmulder 7 месяцев назад

      Why would anyone want test stuff in production? I'm not deploying my unit/integration/E2E tests onto production servers.

    • @Omnifarious0
      @Omnifarious0 7 месяцев назад

      @@magicmulder - In this case, the test code affected the production build through a lot of bash sleight of hand.

    • @magicmulder
      @magicmulder 7 месяцев назад

      @@Omnifarious0 I mean its mere presence in the release tarball should've raised flags. "WTF are these large 'test files' doing in a production release?"
      (Though of course it would probably easy to hide nefarious stuff in image files that appear to belong in production.)

    • @GenesisAkaG
      @GenesisAkaG 7 месяцев назад +1

      Binary blobs are only a problem if you get no info of how they were created. The fact that the bad.xz got in without any receipts of how it was created/getting creation parameters set by a second source is really the big takeaway no-no for me.
      Funny thing is, you could probably do similar things with more 'truly' random blobs, but reconstructing those would then be a (de)compression problem