TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Xz sshd backdoor collecting usernames from logs

143 pointsby babuskovabout 1 year ago

4 comments

unethical_banabout 1 year ago
Unrelated to the quality of the content:<p>This is not a new vuln. Nothing is actively occurring.
AshamedCaptainabout 1 year ago
&gt; The author(s) of the backdoor went a long way to make the backdoor look as innocent as possible.<p>No, not really. The technical part of this backdoor is not interesting at all. Obfuscating strings? Give me a break. That&#x27;s something your average commercial developer does. It wouldn&#x27;t even qualify as DRM. Wake me up when the software is self-modifying and&#x2F;or written in a way that makes IDA crash (seen it a lot, and I am not a security engineer).<p>&quot;Innocent as possible&quot; would be the something like that Debian weak keys fiasco, or the misleading indentation patch, etc. Those offer much more plausible deniability than this. &quot;Innocent as possible&quot; and interesting technical-wise would be something like the NIST curves. Decades from now people will still be arguing if they are backdoored or not.<p>The interest in this exploit is on the community&#x2F;supply side of things, but hardly the technical aspects.
评论 #40162087 未加载
评论 #40165117 未加载
squigzabout 1 year ago
Title is &quot;The amazingly scary xz sshd backdoor&quot; which is... dramatic
评论 #40165406 未加载
SubiculumCodeabout 1 year ago
Looks like the site is slowing down: This is the primary source: <a href="https:&#x2F;&#x2F;www.openwall.com&#x2F;lists&#x2F;oss-security&#x2F;2024&#x2F;03&#x2F;29&#x2F;4" rel="nofollow">https:&#x2F;&#x2F;www.openwall.com&#x2F;lists&#x2F;oss-security&#x2F;2024&#x2F;03&#x2F;29&#x2F;4</a>
评论 #40161873 未加载