[Discuss] Debian 12 in the Cloud

Rich Pieri richard.pieri at gmail.com
Mon Jun 3 17:46:23 EDT 2024


On Mon, 3 Jun 2024 15:58:57 -0400
Steve Litt <slitt at troubleshooters.com> wrote:

>> >Numbers of lines of code does not correlate with attack surface.  
> That's exactly what I said, except I used the word correlate.

You said there is a correlation even if it's not 1:1.

I said that no such correlation exists. It's a myth.

Because all other things are *not* equal. Smaller and simpler can be
easier to understand, test, and debug; but being easier to understand,
test and debug is not a function of size. A large, well-written program
can be easier to understand, etc., than a small, poorly-written program.

The Linux kernel vs. systemd. The kernel is ~15 times larger than
systemd in terms of lines of code, yet the attack surface is much
smaller due to better design and better coding practices.

I need to amend your timeline because systemd is getting better. The
developers have been removing potentially insecure external
dependencies, including XZ, so the timeline really looks like this:

* systemd incorporates XZ into itself [basic Unix philosophy of reusing
  existing tools/libraries]

* Long game evil SOB tortures unpaid, volunteer XZ maintainer [not
  underpaid; unpaid]

* SOB begins preparations for inserting their backdoor into XZ code

* Two years of SOB slowly and carefully implementing their payload
  delivery scheme [backdoor is not here, yet]

* systemd crew announce forthcoming removal of XZ dependency [disaster
  for SOB]

* SOB, now under severe time constraints, quickly commits obfuscated
  backdoor code into the 5.6.0 and 5.6.1 tarballs, hidden from the
  github repo using .gitignore.

* SOB asks Red Hat and Debian to accept the 5.6.0/5.6.1 releases into
  their testing/rolling releases which they do. Other rolling distros
  and development releases follow suit. [common practice for developers
  wanting their latest and greatest included in the latest and greatest
  distro releases] [backdoor is now live on a relatively small number
  of systems -- including two of mine running Tumbleweed, though
  neither exposed to the public network and therefore not exploitable]

* Andres Freund identifies an anomaly, tracks it to the backdoor
  [*very* lucky us]

-- 
\m/ (--) \m/


More information about the Discuss mailing list