Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <661F3331.3020408@gmail.com>
Date: Tue, 16 Apr 2024 21:25:53 -0500
From: Jacob Bachmeyer <jcb62281@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: backdoor in upstream xz/liblzma leading to ssh
 server compromise

Solar Designer wrote:
> [...]
>
> xz backdoor analysis
> ====================
>
> More findings were made about the backdoor's functionality, notably as
> published on April 6 by blasty, who discovered that besides triggering
> system() the backdoor also allows interactive sessions:
>
> https://twitter.com/bl4sty/status/1776691497506623562
>
>   
>> [...]

There is almost certainly more yet to be uncovered:  Andres Freund's 
original report included timing for SSH client connections requesting a 
nonexistent account using publickey auth.  The backdoored SSH server was 
found to require significantly longer to reject those requests than the 
untampered sshd.  I do not believe that the currently known backdoor 
hooks are reachable by that means, so why did Andres Freund see that 
particular slowdown?  (Not the backdoor initialization making sshd take 
longer to start up---a running sshd taking longer to reject a session 
for a nonexistent account, unless Andres Freund forgot to tell us that 
he was running sshd from inetd and thereby including sshd startup 
latency in his measurements.)

> [...]
>
> OpenJS Foundation "Failed Credible Takeover Attempt"
> ====================================================
>
> On April 15, the OpenJS and OpenSSF foundations released the following:
>
> https://openjsf.org/blog/openssf-openjs-alert-social-engineering-takeovers
> https://openssf.org/blog/2024/04/15/open-source-security-openssf-and-openjs-foundations-issue-alert-for-social-engineering-takeovers-of-open-source-projects/
>
> I'll quote an excerpt:
>
>   
>> The OpenJS Foundation Cross Project Council received a suspicious series
>> of emails with similar messages, bearing different names and overlapping
>> GitHub-associated emails. These emails implored OpenJS to take action to
>> update one of its popular JavaScript projects to "address any critical
>> vulnerabilities," yet cited no specifics. The email author(s) wanted
>> OpenJS to designate them as a new maintainer of the project despite
>> having little prior involvement. This approach bears strong resemblance
>> to the manner in which "Jia Tan" positioned themselves in the XZ/liblzma
>> backdoor.
>>
>> [...]

Concerning, yes, but not quite the "Jia Tan" /modus operandi/---"Jia" 
seems to have been contributing patches for some time (with sockpuppets 
pushing their acceptance as needed) before making a move to be appointed 
co-maintainer of xz.  This looks to me like the common cybercrooks have 
seen the technique, decided that it sounds like a great idea, and are 
now trying to use it, but do not have the patience that the "Jia Tan" 
gang had.  In other words, now the "Nigerian Princes" want to help you 
maintain your project, just give them write access to the source 
repository up front.  :-P

I also want to call out a critical detail:  claims of vulnerabilities 
with no specifics that would aid in actually fixing them.  This should 
be a general red flag:  *anyone* who makes such claims is probably up to 
no good.

Lastly, thank you for making the summary.


-- Jacob

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.