TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A key-infra open-source project can get compromised

56 pointsby urlwolfalmost 3 years ago

10 comments

lionkoralmost 3 years ago
&gt; To make clear to everyone that I&#x27;m absolutely not joking:<p>&gt; $ base64 private.key<p>&gt; RBjU5k0Dfdqtyzx4ox6PfQoqrdCft&#x2F;aFJieD2DQvloY=<p>&gt; I&#x27;m publically leaking the key myself now. Don&#x27;t trust it.<p>What?<p><a href="https:&#x2F;&#x2F;github.com&#x2F;lawl&#x2F;NoiseTorch&#x2F;releases&#x2F;tag&#x2F;0.11.6" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;lawl&#x2F;NoiseTorch&#x2F;releases&#x2F;tag&#x2F;0.11.6</a>
评论 #31446084 未加载
lionkoralmost 3 years ago
The actual content is here: <a href="https:&#x2F;&#x2F;github.com&#x2F;lawl&#x2F;NoiseTorch" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;lawl&#x2F;NoiseTorch</a><p>The article just (badly) sums up what you can find in the release notes, the issues, and the readme.
jkaalmost 3 years ago
One of the largest risks of project-owner compromise to everyday users and businesses would, I think, be from widely used software where automated updates occur.<p>That leads to an argument for updates being performed manually after inspection of the changes involved.<p>Counter-arguments could include:<p>- Users will not care to see what has changed in an update<p>- Security updates are important to roll out immediately<p>Responses to <i>those</i> could include:<p>- Automated update rollout to the majority of users could be conditional on a smaller, inspective subset community of users manually examining and approving the update first (not too dissimilar to a Quality Assurance process). In the context of project owner compromise like the example in the article, this should catch the issue and prevent rollout to users. If an update is approved &quot;with concerns&quot;, then the review community is likely to share those concerns with a wider audience, leading to awareness and hopefully resolution.<p>- Security updates could be rolled out more quickly -- but with a requirement for sign-off by multiple security-focused engineers and product specialists. That could help to reduce exploit exposure time for users while providing for adequate review of changes (security fixes can, in themselves, be challenging to review and confirm).<p>Also potentially relevant to this topic: how would a community that uses proprietary software develop confidence in an update before choosing to apply it locally?
评论 #31446682 未加载
acattonalmost 3 years ago
&gt; a key-infra open source project<p>then proceeds to mention a project which is not officially packaged&#x2F;distributed by any of the major distributions.
bayesian_horsealmost 3 years ago
In my opinion there is not a lot of difference between a vulnerability that is introduced intentionally and one that is introduced unintentionally regarding their &quot;life cycle&quot;.<p>Trust is always relative. Just as in commercial software, trust in the original authors is never total and can only grow with continuous verification and non-exploitation.
WesolyKubeczekalmost 3 years ago
Dear Author&#x2F;Maintainer,<p>Why do you even accept giant patches which you can’t review?!
评论 #31445285 未加载
评论 #31447050 未加载
评论 #31445277 未加载
评论 #31445408 未加载
_wldualmost 3 years ago
Everyone should PGP sign their git commits with a secret key stored on a YubiKey. Make small changes to your code, read the diff, then commit and sign before pushing to the repo. IMPO, that&#x27;s really the only way to protect the integrity of source code.<p>If you are adding large changes without carefully reading the diffs and you do not sign the commits it&#x27;s just a matter of time.
评论 #31448618 未加载
评论 #31447568 未加载
0xbadcafebeealmost 3 years ago
Oof, not a great situation. I hope the devs can do an audit and confirm their code looks good. The C code and models are the only thing that needs scrutiny.<p>However, if someone wanted to use this code immediately they could run it in a qemu VM and forward a port or something.
Gordonjcpalmost 3 years ago
It&#x27;s a bit unclear as to what&#x27;s going on there.<p>Is the codebase itself compromised? Did the developer&#x27;s computer get compromised?<p>Did one of the external libraries that it pulls in from git get compromised?
评论 #31445437 未加载
评论 #31445415 未加载
评论 #31445872 未加载
评论 #31445407 未加载
ushakovalmost 3 years ago
from license:<p>&gt; This program comes with ABSOLUTELY NO WARRANTY<p>when it says no warranty, they <i>mean it</i>