Weekly Shaarli

All links of one week in a single page.

Week 15 (April 8, 2024)

Machine - Séries et fictions | ARTE

Une jeune marginale recherchée par les services secrets de l’armée est de retour dans sa ville natale. Embauchée dans une usine en pleine restructuration, elle met sa science du kung-fu au service de la lutte ouvrière. Série détonante, "Machine" mêle action et humour sur fond de colère sociale. Avec Margot Bancilhon et JoeyStarr.

research!rsc: Timeline of the xz open source attack

Over a period of over two years, an attacker using the name “Jia Tan” worked as a diligent, effective contributor to the xz compression library, eventually being granted commit access and maintainership. Using that access, they installed a very subtle, carefully hidden backdoor into liblzma, a part of xz that also happens to be a dependency of OpenSSH sshd on Debian, Ubuntu, and Fedora, and other systemd-based Linux systems that patched sshd to link libsystemd.
That backdoor watches for the attacker sending hidden commands at the start of an SSH session, giving the attacker the ability to run an arbitrary command on the target system without logging in: unauthenticated, targeted remote code execution.

The attack was publicly disclosed on March 29, 2024 and appears to be the first serious known supply chain attack on widely used open source software. It marks a watershed moment in open source supply chain security, for better or worse.

This post is a detailed timeline that I have constructed of the social engineering aspect of the attack, which appears to date back to late 2021.

research!rsc: Running the “Reflections on Trusting Trust” Compiler

In the lecture, Ken explains in three steps how to modify a C compiler binary to insert a backdoor when compiling the “login” program, leaving no trace in the source code. In this post, we will run the backdoored Go compiler using Ken’s actual code. But first, a brief summary of the important parts of the lecture.