Every intelligence service in the world wants one or more. Many can hire truly bright programmers who will contribute to Linux over years, doing nothing nefarious at all, to build a trustworthy profile. and even contribute meaningful and positive features.
Then, maybe 2 of 3 trusted profiles make tiny changes as part of a much larger valid contribution. each one a tiny adjustment, each one not particularly interesting from a security point of view, unless you look at all 3 at the same time, and of course they were not added at the same time.
I am quite certain they have people who are working at Apple and Microsoft as well with the same mission.
As this would only be like 10 lines of code, instead of linking a huge library that will in turn pull in another bunch of libs, it seems like it should reduce attack surface.
Luckily most users was unaffected unless they used a rolling release distro.
Finally, we still dont have a full analysis so its not known if systemd-enabled sshd is the only attack vector.
There is absolutely nothing that would suggest this hasn't happened before or will not happen again.
So yeah, congrats to everyone involved discovering this, excellent work, really! But how sure can we be, that there was no other successful attempt?
The more worrying question is, what else was compromised by these kinds of people, and for how long?
There has been a lot of interesting analysis of the code, which has a feeling of the awe and sophistication of stuxnet yet on the scale of “this could be the work of a single motivated coder … like one of us”.
But what I haven’t found yet, and would like leads on, is what ther thinking is about the attack in a wider context…
What is the current thinking on:
1. Was the malicious code inserted by the new contributor, or was this likely a compromised account?
2. If the new contributor did it, did they become an xz maintainer with the aim of acting maliciously?
3. If the new contributor was malicious, why take so long to attack and why do it in xz? Or are they also attacking lots of other systems, perhaps under other names?
4. And what can we do about these attacks? How can we build a system that isn’t ultimately brought crashing down by one or two bad actors?
5. Small technical detail I haven’t spotted in writeups: was the attack commands signed in some way so only the attacker can use it and the world can go hunting for a smoking gun cert that matches the attacker?
Certainly the worst of my career.
It’s also unfortunate that the maintainer will be associated with the lack of judgement. But they will get through it. Probably time to pass the torch fully now though.
Thankfully this only effects Swoole users, not all of PHP.
But IMO the real “bad” here is that it calls into question the entire model of volunteer open source contribution, which underpins a crazy amount of the tech world. No easy answers there.