• 0 Posts
  • 26 Comments
Joined 10 months ago
cake
Cake day: September 9th, 2023

help-circle


  • flying_sheep@lemmy.mltoMemes@lemmy.mlsmoking
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    1 month ago

    So you’re agreeing. “one does not simply stop, because one needs to be really sure that they want to stop for some reason or another”. The desire to stop doesn’t come from nothing, yet it’s the vital ingredient for stopping successfully. Unless you have it, stopping is really hard.

    The contents of your message aren’t a “no”, they’re a “yes, and”














  • I don’t think those are better or worse. My point isn’t about some ancient far too limiting standard, but about how easy it is to wreck everything by not knowing some obscure syntactical rule. My issue is about implicit conversion between strings and arrays, about silently swallowing errors and so on. And the only shell languages that I know aren’t idiotic are nushell and Powershell.

    That KDE theme that nuked some user’s home directory? Used a bash script. That time the bumblebee graphics card switching utility deleted /var? Bash script. Any time some build system broke because of a space in a path: bash/ZSH/… script.

    Why would anyone make an init system based on shell scripts these days?




  • You’re right, there’s more parts to it, especially social engineering. Maybe there’s other ways to hide a payload, but there aren’t many avenues. You have to hide the payload in a binary artefact, which are pretty suspicious when you don’t do it in a (well scrutinized) cryptography lib, or a compression lib.

    Then that payload has to be executed for some reason, which means you need a really good reason to embed it (e.g. something like widevine), or have to modify the build script.


  • I think it needs to be

    • rolling release (because it was caught so quickly that it hasn’t made its way into any cadence based distro yet)
    • using the upstream Makefile task to build a RPM or DEB (because the compromised build script directly checks for that and therefore doesn’t trigger for a destdir build like Gentoo’s or Arch’s)
    • using the upstream provided tarball as opposed to the one GitHub provides, or a git clone (because only that contains the compromised Makefile, running autotools yourself is safe)

    Points 1 and 2 mean that only rolling release RPM and DEB distros like Debian Sid and Fedora are candidates. I didn’t check if they use the Makefile and the compromised tarballs.