Deep Dive into XZ Utils Backdoor - Columbia Engineering, Advanced Systems Programming Guest Lecture

แชร์
ฝัง
  • เผยแพร่เมื่อ 23 พ.ย. 2024

ความคิดเห็น • 33

  • @JoeTaber
    @JoeTaber 6 หลายเดือนก่อน +36

    Getting a backdoor into open source software: 1. Start making useful contributions, 2. write mean messages to push for shared maintainership, 3. step in as savior, 4. build trust as competent contributor over years, 5. add overly convoluted testing system, 6. insert payload into repo, 7. make your first release as co-maintainer with untracked release script that compiles in backdoor, 8. nag distros to use the new version, 9. get caught in prerelease by german dev that notices the backdoor delays logins by 0.3s and decompiles your code to figure out why.
    Getting a backdoor into proprietary software: 1. knock on CEO's office door, 2. present secret court order, 3. work with devs to add your backdoor.

    • @jamesburgess9101
      @jamesburgess9101 6 หลายเดือนก่อน +6

      Exactly! This is precisely why the xz backdoor does not weaken or invalidate open source, it's pretty interesting how it is being spun as the sky is falling for OSS. Which is total FUD.

  • @TestamentScar
    @TestamentScar หลายเดือนก่อน

    This was a great explanation of how it worked on a technical level. Thanks for the lecture + summary!

  • @brentknight9318
    @brentknight9318 5 หลายเดือนก่อน +1

    This was shockingly good & interesting. It is making me think about how a talk can be steered by posing an unusual audience - in this case, some college kids who just learned about linkers but can’t necessarily be assumed to know broadly what someone would typically know if they had that specialist knowledge. 5 stars, and your competition are the folks who’ve explained things from the internet worm thru stuxnet and beyond.

  • @2Pii
    @2Pii 7 หลายเดือนก่อน +15

    Awesome lecture! I learned a ton and it was super engaging.

  • @Jabbl
    @Jabbl 6 หลายเดือนก่อน +4

    This was a really interesting and detailed overview of the backdoor.
    I followed many of the discussions while it was being discovered, like how it was implemented, how it got compiled into the binary and what effect it had on sshd, but this lecture presented the actual effects on the system.
    After reading the different discussions, seeing code examples and the details about the social engineering aspect, this video helped me see how the backdoor actually loaded itself into memory.
    This reveals a lot more of the sophistication behind the backdoor and the layers of obfuscation wasn't really obvious to me before now.
    Extremely helpful!

  • @danygagnon8446
    @danygagnon8446 4 หลายเดือนก่อน +2

    This is amazing thank you so much for this lecture!

  • @cusematt23
    @cusematt23 6 หลายเดือนก่อน +3

    This won't blow up like it should because you have 97 subscribers ... but the amount of depth you went into and the ease with which you explained a ton of very complicated concepts stretched out over 1+ hr is pretty absurd to me given that you are 20? years old. Damn bro. You know computers.

  • @randomgeocacher
    @randomgeocacher 6 หลายเดือนก่อน +1

    Cool explainer of the linker hacks!

  • @michaelodonnell5710
    @michaelodonnell5710 6 หลายเดือนก่อน +7

    This is much needed presentation - thank you!
    Gripes: the audio is OK but could be better, but most of all - and this can't be said too often - all presenters (all the time, in all venues) when taking audience questions need to *REPEAT THE FSCKING QUESTIONS* before answering them....

  • @JohnAlanWoods
    @JohnAlanWoods 5 หลายเดือนก่อน +2

    great vid Denzel - so is it enough to update your XZ install to the "Fixed" packages with Jia's commits removed to fix this system wide?

    • @randomgeocacher
      @randomgeocacher 5 หลายเดือนก่อน +2

      Yes. Primarily rolling / experimental Linux released were affected (Debian Sid, Kali-Rolling, etc.) and only during a few days, so very few installs were affected. It had no special persistence / root kit capabilities found so far, reverting to older / newer package removed it.
      There is a very good write up from OpenSUSE - they went all in on assume everything compromised. Did the Thompson reflection on trusting trust exercise. Eventually the reverse engineering seemed to prove this mostly was a sshd backdoor “only”, and not a super-breaking distribution breaker infinite rootkit. But the scope of the backdoor was not fully understood in early days.
      So distros reverted all builds that had even been touched by xz. Apparently they had fun times with lots of work… and suspect the timing of the backdoor push to distros might have been timed to slow down security response. Apparently most maintainers and cultures has some holidays around end of march.

    • @JohnAlanWoods
      @JohnAlanWoods 5 หลายเดือนก่อน

      @randomgeocacher gotcha, thanks!

  • @playthingz
    @playthingz 6 หลายเดือนก่อน +1

    Hey, this was a good video, thanks. I can't hear all of the questions though, it would have been good if you had repeated the questions that were being asked. Some of them became clear due to your answers, others less so. This can sometimes be an issue in the auditorium too.

  • @gruselhaus
    @gruselhaus 6 หลายเดือนก่อน +3

    Lesson learned: dont't fuck around with database engineers unless you want to find out. Classic FAFO

  • @JB_inks
    @JB_inks 6 หลายเดือนก่อน +11

    At 4 minutes you said suppository rather than repository. Freudian slip methinks.

    • @reverse_meta9264
      @reverse_meta9264 6 หลายเดือนก่อน

      😂

    • @brandondabreo5442
      @brandondabreo5442 6 หลายเดือนก่อน +19

      backdoor in the repository and suppository in the backdoor. honest mistake

    • @JB_inks
      @JB_inks 6 หลายเดือนก่อน +1

      @@brandondabreo5442 haha yes

    • @lelandrb
      @lelandrb 6 หลายเดือนก่อน

      ​@@brandondabreo5442 bravo

  • @Tibug
    @Tibug 6 หลายเดือนก่อน +2

    What's the target audience that watches a talk about the details of the backdoor but doesn't know what SSH is or how the open-source community works?
    Nice talk anyway!

    • @svenbjorn9700
      @svenbjorn9700 6 หลายเดือนก่อน +3

      new (and not new) developers, new (and not new) cybersecurity staff, and probably a majority of people generally interested in the event

    • @denzelfarmer5393
      @denzelfarmer5393  6 หลายเดือนก่อน +2

      Yeah it’s a bit of an odd assumption for the real world, but since this was a lecture given to a specific class I could assume people knew linker stuff in a lot of depth, since we taught it. On the other hand, students don’t necessarily know about other more ‘basic’ concepts like OSS development.

  • @Shahriyarj
    @Shahriyarj 6 หลายเดือนก่อน +7

    "Probably not US", the hypocrisy is at same level of the backdoor.

  • @Flare03l
    @Flare03l 6 หลายเดือนก่อน +1

    the volume is very low :( hard to hear this

  • @felipec
    @felipec 7 หลายเดือนก่อน +1

    Pretty good, but please no more upspeak.

    • @ifedhimspaghetti
      @ifedhimspaghetti 6 หลายเดือนก่อน

      You don't like it?

    • @ancbi
      @ancbi 6 หลายเดือนก่อน

      I don't think "upspeak" means what you think it means.

    • @felipec
      @felipec 6 หลายเดือนก่อน +1

      @@ancbi It does mean what I think it means? It's when a speaker uses rising inflection at the end of declarative sentences? Which makes them sound like interrogative sentences?

    • @ancbi
      @ancbi 6 หลายเดือนก่อน

      @@felipec Thanks for clarifying.
      Then it's more likely that I just didn't pick up the upspeaks because it's too subtle for me as I'm not a native English speaker. Or because I have only just watched the leading parts.