Steve Litt via plug on 2 Apr 2024 13:47:27 -0700 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] XZ scanner |
Rich Freeman via plug said on Tue, 2 Apr 2024 14:50:04 -0400 >On Tue, Apr 2, 2024 at 2:20 PM jeff via plug ><plug@lists.phillylinux.org> wrote: >> >> New XZ backdoor scanner detects implant in any Linux binary >> > >Seems useful, but the bigger problem is probably that so many core >libraries have minimal contributors, and there is a lot of value in >exploiting them. I think the bigger problem is developers incorporating libraries willy-nilly. Meanwhile, each of those libraries pulls in libraries that pull in libraries, adding a ginormous tree to the attack surface. All too often, a relatively few lines of code could have produced the benefit (perhaps in a different form) that the library tree did. "Reinventing the wheel" is a cute and persuasive phrase for trivializing developers who code their own rather than gleaning other peoples' code (OPC) far and wide, but for the past several years the OPC caused complexification with its attendant voluminous attack surface has been on full display. [NOTE: I know you didn't use the phrase "reinventing the wheel". However, whenever one suggests coding it one's self, one is accused, but somebody or other, of "reinventing the wheel".] > >Governments spend $100M on a single aircraft. For $1M/yr you could >hire a small team of developers working full time that would >out-contribute all the volunteers on 99% of the FOSS projects out >there, >and thus gain a voice in the project's governance as was done >here. Obviously something high-profile like a web browser has many >more eyeballs, but if you're willing to play the long game you could >work your way into their supply chain at main points and slowly work >in all the exploits you wanted. Even on something like the kernel or >a browser I bet you could slowly work your contributors in such that >they become the majority of eyeballs in a single subsystem and become >trusted to get code far enough along the QA process that it doesn't >get as much close attention. Yes. This is what happens when software gets big, ugly, entangled, and poorly designed. > >Something the NSA leaks taught us a decade ago is that governments are >willing to bring to bear a well-supported team with a variety of >backgrounds. You might have a core team of coders, and then a team of >communications specialists who maintain aliases with many online >personas seemingly in different countries who can even speak the local >language. So let's not make it easy for them. Before incorporating a library, everyone should ask: * Are the library's features worth the complexification and magnified attack surface? * How easy would it be to achieve the desired outcome, perhaps in a different form, with a reasonable number of lines of first person code? SteveT Steve Litt Autumn 2023 featured book: Rapid Learning for the 21st Century http://www.troubleshooters.com/rl21 ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug