this post was submitted on 31 Mar 2024
258 points (98.1% liked)

Open Source

30369 readers
861 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 5 years ago
MODERATORS
top 24 comments
sorted by: hot top controversial new old
[–] [email protected] 103 points 5 months ago

Let's keep in mind that if this is a state actor or some sort of global organized crime, then they don't put all their eggs into one basket. If that's the case, they're going to have a bunch of other plans and backdoor attempts ongoing. This isn't the end and we can assume there's something else somewhere that went unnoticed.

Security is a constantly changing war of attrition, not a goal/product/configuration.

[–] [email protected] 35 points 5 months ago (2 children)

If anything it highlights how great open source actually is when it comes to security. People saw it and immediately flagged it.

[–] [email protected] 24 points 5 months ago (1 children)

I don't think this one counts as a big win to be honest It was just freakish luck

[–] [email protected] 13 points 5 months ago (2 children)

It's definitely freakish luck but at least it got found out. A closed source software would have gone through unnoticed.

[–] [email protected] 11 points 5 months ago

the fact that it was found by luck, not methodically, to me implies that there probably are other backdoors we didn't get lucky with.

[–] [email protected] 5 points 5 months ago

Or found out in corporate code review / pentest. We just don't know. I get that we want to say FOSS is great due to the "many eyes/shallow bugs" thing, but that didn't work for OpenSSL or log4j. The fact that it did now is great, but let's not get carried away. It was just pure luck.

[–] [email protected] 21 points 5 months ago (2 children)

Dude, the issue was found purely by coincidence, it very nearly made it through

[–] [email protected] 27 points 5 months ago (1 children)

Yes, but it didn’t. Has it made it through on closed software? Who knows?

[–] [email protected] 19 points 5 months ago (3 children)

My takeaway is more like: This one almost made it through and was caught by accident. How much more backdoors actually were not caught and made it through? I would bet some money on it being more than 0 :(

[–] [email protected] 2 points 5 months ago

Yep for sure. But open source at least let's you examine every part of the ecosystem.

No software is perfect even if all contributors have good intentions and do all due diligence.

Throw some malice and there is a chance something will get through.

[–] [email protected] 1 points 5 months ago

Im not sure why it being caught by accident is a factor here.

If devs knew what the pitfalls were before coding, there wouldn't be security risks in software.

Hackers do the same thing. They pen test, and if by chance they find something, they exploit it.

[–] [email protected] 1 points 5 months ago

Yes, probabky, but also might be possible to now find.

[–] [email protected] 9 points 5 months ago

Also this was a multi year effort that employed very complex knowledge. And still didn't get thru.

If it's multi year and very complex it's telling that this is what it takes. The bar is very high.

[–] [email protected] 21 points 5 months ago

Lost me at suggesting that we run EDR on prod Linux servers.

Literally installing a backdoor intentionally..wow

[–] [email protected] 15 points 5 months ago (2 children)

Smug users who don't run systemd be like...

[–] [email protected] 8 points 5 months ago

Laughs in Alpine

[–] [email protected] 2 points 5 months ago (1 children)

How does systemd solve this?

[–] [email protected] 7 points 5 months ago

The exploit only happens in systemd

[–] [email protected] 10 points 5 months ago (1 children)

What a dick. I couldn't imagine spending that much time contributing to a project so I could introduce security vulnerabilities.

If this is one individual, and not a nation state, somebody needs to make some friends and pick up some hobbies.

[–] [email protected] 18 points 5 months ago* (last edited 5 months ago) (1 children)

I think its more likely someone spent this time contributing to the project specifically to exploit it

[–] [email protected] 3 points 5 months ago

Yeah, I got that. I'm saying they need to make some friends and get some hobbies if they aren't being funded by a state.

[–] [email protected] 9 points 5 months ago (1 children)

Wish I could be a fly on the walk when the bad actor realized years of work has just gone down the drain

[–] [email protected] 7 points 5 months ago

Probably fear, then subsequently followed by their brains next to you on said wall. Whichever government paid for a multi-year campaign to backdoor enterprise Linux distributions is not going to be happy about this failure.

[–] [email protected] 2 points 5 months ago

globally

Meanwhile, no enterprise Linux or hypervisor got nabbed; nor could it.

But, carry on.