Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Josh Bressers
@joshbressers@infosec.exchange  ·  activity timestamp last month

This week on #OpenSourceSecurity I talk to @ottok about his blog post about detecting an attack like xz in Debian

It's a fascinating conversation about a very complicated topic

There are things that could be detected, but this one would have been very very difficult

https://opensourcesecurity.io/2025/2025-11-xz-debian-otto/

Open Source Security

Detecting XZ in Debian with Otto Kekäläinen

In this episode, Josh and Otto dive into the world of Debian packaging, exploring the challenges of supply chain security and the importance of transparency in open source projects. They discuss Otto’s blog post about the XZ backdoor and how it’s a nearly impossible attack to detect. Otto does a great job breaking down an incredibly complex problem into understandable pieces. Episode Links Otto Could the XZ backdoor have been detected with better Git and Debian packaging practices? This episode is also available as a podcast, search for “Open Source Security” on your favorite podcast player.
  • Copy link
  • Flag this post
  • Block
daniel:// stenberg://
@bagder@mastodon.social replied  ·  activity timestamp last month

@joshbressers @ottok one thing we finally made real in #curl as a direct consequence of the xz attack was reproducible builds. Since the xz release added things into the release that did not come from autotools nor git, verifying reproducible builds would have caught that. Having that in place forces attackers to land their backdoor in git to be able to ship it, which should increase the bar significantly.

  • Copy link
  • Flag this comment
  • Block
Josh Bressers
@joshbressers@infosec.exchange replied  ·  activity timestamp last month

@bagder @ottok

This is a good point

It's of course extra hard in the distro world as using release source tarballs is still super common

But building out of git instead of a release is probably a future end state

  • Copy link
  • Flag this comment
  • Block
daniel:// stenberg://
@bagder@mastodon.social replied  ·  activity timestamp last month

@joshbressers @ottok building from git means building without autotools on every single platform and would mean I would have to use cmake on a daily basis which would drive me nuts. So not likely to happen anytime soon in curl 😃

  • Copy link
  • Flag this comment
  • Block
Otto
@ottok@mastodon.social replied  ·  activity timestamp last month

@bagder @joshbressers There are also many projects not using git. The plain files collection (tarball) will remain as the lowest common denominator for a long time. Anyway the build change could have also been committed to git just like the new test files were. Doing it in only the tarball was just one layer of extra obscurity, not really the key here.

  • Copy link
  • Flag this comment
  • Block
daniel:// stenberg://
@bagder@mastodon.social replied  ·  activity timestamp last month

@ottok @joshbressers I think it was part of the key for the xz attack. The git repository gets wider exposure and review by the public - that was avoided by injecting the files directly into the tarball.

  • Copy link
  • Flag this comment
  • Block
daniel:// stenberg://
@bagder@mastodon.social replied  ·  activity timestamp last month

@joshbressers @ottok yeah, in the #curl case I hope and wish that the people making the curl packages for distros (or build curl for other purposes) do the reproducible check - so that they know for sure that the one doing the curl releases didn't smuggle anything in. It also usually also requires that a few people do it and can trigger the alarm if they would find something odd.

At least we make it possible.

  • Copy link
  • Flag this comment
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1-alpha.8 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login