A backdoor in xz
A backdoor in xz
Posted Mar 30, 2024 8:18 UTC (Sat) by DimeCadmium (subscriber, #157243)In reply to: A backdoor in xz by Cyberax
Parent article: A backdoor in xz
Posted Mar 30, 2024 10:54 UTC (Sat)
by khim (subscriber, #9252)
[Link] (1 responses)
Each patch add value to someone, or it wouldn't have existed. Sshd without PAM would be 100% useless to me because all machined that I use ssh with use authentication not supported by stock Debian. Similarly someone who needs to pass certain certification needs selinux and so on. That's the flip side of the story which made available open source in the first place: we have millions of users and even if 0.01% of them are developers it's enough to produce software for free. Remove all that “crap” and suddenly there are not enough developers to drive that thing forward because there are not enough users. There are no easy solution for that problem, unfortunately.
Posted Mar 31, 2024 1:27 UTC (Sun)
by DimeCadmium (subscriber, #157243)
[Link]
Posted Mar 30, 2024 19:32 UTC (Sat)
by Cyberax (✭ supporter ✭, #52523)
[Link] (5 responses)
These days, PAM can be mostly replaced by ephemeral SSH certificates for authentication. But it's still useful for auditing.
Posted Mar 30, 2024 21:25 UTC (Sat)
by apoelstra (subscriber, #75205)
[Link] (3 responses)
Posted Mar 31, 2024 0:47 UTC (Sun)
by Cyberax (✭ supporter ✭, #52523)
[Link] (2 responses)
Posted Mar 31, 2024 16:54 UTC (Sun)
by apoelstra (subscriber, #75205)
[Link] (1 responses)
Posted Mar 31, 2024 18:51 UTC (Sun)
by Cyberax (✭ supporter ✭, #52523)
[Link]
PAM was useful for custom authentication, such as LDAP-based auth or something similar. These days a fairly typical workflow is to use some kind of a daemon/utility on the developer's machine to get a temporary SSH certificate, and then just use this certificate to log in using the SSH.
Posted Mar 31, 2024 1:27 UTC (Sun)
by DimeCadmium (subscriber, #157243)
[Link]
> The question though is not "what pulls it in" but rather "what pulls it in without adding value"
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz